nixos-config/services/gitea.nix

100 lines
2.5 KiB
Nix

{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.my.services.gitea;
my = config.my;
domain = config.networking.domain;
in {
options.my.services.gitea = {
enable = mkEnableOption "Personal Git hosting with Gitea";
privatePort = mkOption {
type = types.port;
default = 8082;
example = 8082;
description = "Port to serve the app";
};
};
config = mkIf cfg.enable {
# use git as user to have `git clone git@git.domain`
users.users.git = {
description = "Gitea Service";
home = config.services.gitea.stateDir;
useDefaultShell = true;
group = "git";
# the systemd service for the gitea module seems to hardcode the group as
# gitea, so, uh, just in case?
extraGroups = [ "gitea" ];
isSystemUser = true;
};
users.groups.git = { };
services.gitea = {
enable = true;
user = "git";
domain = "git.${domain}";
appName = "Personal Forge";
rootUrl = "https://git.${domain}/";
httpAddress = "127.0.0.1";
httpPort = cfg.privatePort;
log.level = "Info"; # [ "Trace" "Debug" "Info" "Warn" "Error" "Critical" ]
lfs.enable = true;
# NOTE: temporarily remove this for initial setup
disableRegistration = true;
# only send cookies via HTTPS
cookieSecure = true;
settings = {
other.SHOW_FOOTER_VERSION = false;
};
# NixOS module uses `gitea dump` to backup repositories and the database,
# but it produces a single .zip file that's not very borg-backup friendly.
# I configure my backup system manually below.
dump.enable = false;
database = {
type = "postgres";
# user needs to be the same as gitea user
user = "git";
};
};
# FIXME: Borg *could* be backing up files while they're being edited by
# gitea, so it may produce corrupt files in the snapshot if I push stuff
# around midnight. I'm not sure how `gitea dump` handles this either,
# though.
my.services.borg-backup = mkIf cfg.enable {
paths = [
config.services.gitea.lfs.contentDir
config.services.gitea.repositoryRoot
];
};
services.postgresqlBackup = {
databases = [ "gitea" ];
};
services.nginx = {
virtualHosts = {
"git.${domain}" = {
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://127.0.0.1:${toString cfg.privatePort}";
};
};
};
};
};
}