nix machine / user configurations

feat: migrate to forgejo

ptr.pet 3067e5cf 4bf8285c

verified
Changed files
+48 -11
hosts
+36
hosts/wolumonde/modules/forgejo.nix
···
···
+
{pkgs, config, ...}: {
+
services.forgejo = {
+
enable = true;
+
package = pkgs.forgejo;
+
lfs.enable = true;
+
settings = {
+
DEFAULT.APP_NAME = "meow :3";
+
server = {
+
DOMAIN = "git.gaze.systems";
+
ROOT_URL = "https://git.gaze.systems/";
+
HTTP_PORT = 9008;
+
};
+
service = {
+
DISABLE_REGISTRATION = true;
+
};
+
session.COOKIE_SECURE = true;
+
attachment = {
+
MAX_SIZE = 50;
+
};
+
ui = {
+
DEFAULT_SHOW_FULL_NAME = true;
+
};
+
};
+
};
+
+
services.nginx.virtualHosts."git.gaze.systems" = {
+
useACMEHost = "gaze.systems";
+
forceSSL = true;
+
locations."/" = {
+
extraConfig = ''
+
client_max_body_size 50m;
+
'';
+
proxyPass = "http://localhost:${toString config.services.forgejo.settings.server.HTTP_PORT}";
+
};
+
};
+
}
hosts/wolumonde/modules/gitea-act.nix hosts/wolumonde/modules/gitea-act.disabled
hosts/wolumonde/modules/gitea.nix hosts/wolumonde/modules/gitea.disabled
+2 -1
hosts/wolumonde/modules/nginx.nix
···
webroot = "/var/lib/acme/acme-challenge";
extraDomainNames = [
"git.gaze.systems"
# "ms.gaze.systems"
# "mq.gaze.systems"
"couchdb.gaze.systems"
···
"limbus.gaze.systems"
# "bsky.gaze.systems"
"dawn.gaze.systems"
-
"guestbook.gaze.systems"
];
};
};
···
webroot = "/var/lib/acme/acme-challenge";
extraDomainNames = [
"git.gaze.systems"
+
"test.gaze.systems"
# "ms.gaze.systems"
# "mq.gaze.systems"
"couchdb.gaze.systems"
···
"limbus.gaze.systems"
# "bsky.gaze.systems"
"dawn.gaze.systems"
+
# "guestbook.gaze.systems"
];
};
};
+10 -10
hosts/wolumonde/modules/secrets.nix
···
owner = "systemd-network";
group = "systemd-network";
};
-
age.secrets.musikquadConfig.file = ../../../secrets/musikquadConfig.age;
-
age.secrets.tmodloaderServerPass.file = ../../../secrets/tmodloaderServerPass.age;
age.secrets.websiteConfig.file = ../../../secrets/websiteConfig.age;
-
age.secrets.giteaActRunnerToken.file = ../../../secrets/giteaActRunnerToken.age;
-
age.secrets.xrayConfig = {
-
name = "xrayConfig.json";
-
file = ../../../secrets/xrayConfig.age;
-
mode = "600";
-
# owner = "xray";
-
# group = "xray";
-
};
age.secrets.pdsConfig.file = ../../../secrets/pdsConfig.age;
}
···
owner = "systemd-network";
group = "systemd-network";
};
+
# age.secrets.musikquadConfig.file = ../../../secrets/musikquadConfig.age;
+
# age.secrets.tmodloaderServerPass.file = ../../../secrets/tmodloaderServerPass.age;
age.secrets.websiteConfig.file = ../../../secrets/websiteConfig.age;
+
# age.secrets.giteaActRunnerToken.file = ../../../secrets/giteaActRunnerToken.age;
+
# age.secrets.xrayConfig = {
+
# name = "xrayConfig.json";
+
# file = ../../../secrets/xrayConfig.age;
+
# mode = "600";
+
# # owner = "xray";
+
# # group = "xray";
+
# };
age.secrets.pdsConfig.file = ../../../secrets/pdsConfig.age;
}