Fix forgejo
This commit is contained in:
parent
1ac4ff7516
commit
4a53253800
4 changed files with 28 additions and 15 deletions
|
@ -1,4 +1,5 @@
|
||||||
{pkgs, ...}: {
|
{pkgs, ...}: {
|
||||||
|
networking.firewall.allowedTCPPorts = [443];
|
||||||
services.caddy = {
|
services.caddy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
email = "henry@henryhiles.com";
|
email = "henry@henryhiles.com";
|
||||||
|
@ -8,5 +9,4 @@
|
||||||
hash = "sha256-sdhX/dAQ7lIxBo/ZW6XYX8SRuacLO9HobtIVKD/cw0o=";
|
hash = "sha256-sdhX/dAQ7lIxBo/ZW6XYX8SRuacLO9HobtIVKD/cw0o=";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
networking.firewall.allowedTCPPorts = [2222 443]; # Git SSH, HTTPS, and Matrix
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,9 @@
|
||||||
{pkgs, ...}: {
|
{
|
||||||
|
pkgs,
|
||||||
|
config,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
networking.firewall.allowedTCPPorts = [22];
|
||||||
services = let
|
services = let
|
||||||
domain = "git.federated.nexus";
|
domain = "git.federated.nexus";
|
||||||
socket = "/run/forgejo/socket";
|
socket = "/run/forgejo/socket";
|
||||||
|
@ -21,7 +26,6 @@
|
||||||
PROTOCOL = "http+unix";
|
PROTOCOL = "http+unix";
|
||||||
|
|
||||||
START_SSH_SERVER = true;
|
START_SSH_SERVER = true;
|
||||||
SSH_LISTEN_PORT = 2222;
|
|
||||||
BUILTIN_SSH_SERVER_USER = "git";
|
BUILTIN_SSH_SERVER_USER = "git";
|
||||||
|
|
||||||
LANDING_PAGE = "explore";
|
LANDING_PAGE = "explore";
|
||||||
|
@ -31,17 +35,15 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# gitea-actions-runner = {
|
|
||||||
# package = pkgs.forgejo-actions-runner;
|
|
||||||
# instances.default = {
|
|
||||||
# enable = true;
|
|
||||||
# name = "monolith";
|
|
||||||
# url = domain;
|
|
||||||
# tokenFile = config.age.secrets."runnerToken.age".path;
|
|
||||||
# labels = ["native:host"];
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
|
|
||||||
caddy.virtualHosts."${domain}".extraConfig = "reverse_proxy unix/${socket}";
|
caddy.virtualHosts."${domain}".extraConfig = "reverse_proxy unix/${socket}";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd.sockets.forgejo = {
|
||||||
|
requiredBy = ["forgejo.service"];
|
||||||
|
wantedBy = ["sockets.target"];
|
||||||
|
|
||||||
|
listenStreams = [
|
||||||
|
(toString config.services.forgejo.settings.server.SSH_PORT)
|
||||||
|
];
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
7
modules/desktop/ssh.nix
Normal file
7
modules/desktop/ssh.nix
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
{
|
||||||
|
programs.ssh.extraConfig = ''
|
||||||
|
Host server
|
||||||
|
HostName ssh.federated.nexus
|
||||||
|
Port 2222
|
||||||
|
'';
|
||||||
|
}
|
|
@ -1,7 +1,11 @@
|
||||||
{
|
let
|
||||||
|
port = 2222;
|
||||||
|
in {
|
||||||
|
networking.firewall.allowedTCPPorts = [port];
|
||||||
users.users.quadradical.openssh.authorizedKeys.keys = import ../../secrets/keys.nix;
|
users.users.quadradical.openssh.authorizedKeys.keys = import ../../secrets/keys.nix;
|
||||||
services.openssh = {
|
services.openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
ports = [port];
|
||||||
settings = {
|
settings = {
|
||||||
PasswordAuthentication = false;
|
PasswordAuthentication = false;
|
||||||
AllowUsers = ["quadradical"];
|
AllowUsers = ["quadradical"];
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue