1
0
Fork 0
nix-configuration/modules/services/forgejo.nix

61 lines
1.6 KiB
Nix
Raw Normal View History

{
pkgs,
config,
lib,
...
}:
let
cfg = config.aux.system.services.forgejo;
in
{
options = {
aux.system.services.forgejo = {
2024-09-08 11:58:56 -04:00
enable = lib.mkEnableOption "Enables Forgejo Git hosting service.";
home = lib.mkOption {
default = "";
type = lib.types.str;
2024-05-20 20:52:57 -04:00
description = "Where to store Forgejo's files";
2024-06-04 14:18:45 -04:00
example = "/home/forgejo";
};
url = lib.mkOption {
default = "";
type = lib.types.str;
description = "The complete URL where Forgejo is hosted.";
example = "https://forgejo.example.com";
};
};
};
config = lib.mkIf cfg.enable {
services = {
forgejo = {
enable = true;
2024-09-28 13:39:05 -04:00
settings = {
server = {
DOMAIN = pkgs.util.getDomainFromURL cfg.url;
ROOT_URL = cfg.url;
HTTP_PORT = 3000;
2024-09-28 13:39:05 -04:00
};
indexer.REPO_INDEXER_ENABLED = true; # Enable code indexing
};
useWizard = true;
} // lib.optionalAttrs (cfg.home != null) { stateDir = cfg.home; };
2024-05-27 12:32:24 -04:00
nginx.virtualHosts."${cfg.url}" = {
2024-09-08 23:47:53 -04:00
useACMEHost = pkgs.util.getDomainFromURL cfg.url;
forceSSL = true;
locations."/" = {
proxyPass = "http://127.0.0.1:3000";
proxyWebsockets = true;
extraConfig = "proxy_ssl_server_name on;"; # required when the target is also TLS server with multiple hosts
2024-06-25 14:13:15 -04:00
};
};
};
systemd.services = {
2024-09-07 13:44:14 -04:00
forgejo.unitConfig.RequiresMountsFor = cfg.home;
nginx.wants = [ config.systemd.services.forgejo.name ];
};
};
}