nix-config/modules/containers/forgejo.nix
KoenDR06 dfcea20497 feat: flake update workflow (#1)
Co-authored-by: KoenDR06 <koen.de.ruiter@hotmail.com>
Co-committed-by: KoenDR06 <koen.de.ruiter@hotmail.com>
2026-02-10 18:25:00 +01:00

189 lines
4.6 KiB
Nix

{
inputs,
outputs,
lib,
config,
pkgs,
...
}: let
inherit (lib) types mkOption mkEnableOption mkIf;
cfg = config.horseman.containers.forgejo;
username = config.horseman.username;
BACKUP_DIR = config.horseman.containers.backupDir;
DATA_DIR = "/home/${username}/backups/volumes/forgejo";
in {
options = {
horseman.containers.forgejo = {
enable = mkEnableOption "forgejo containers";
port = mkOption {
default = 3000;
type = types.int;
};
sshPort = mkOption {
default = 34916;
type = types.int;
};
url = mkOption {
default = "https://git.koendev.nl";
type = types.str;
};
};
};
config = mkIf cfg.enable {
systemd.timers."backup-forgejo" = {
wantedBy = ["timers.target"];
timerConfig = {
OnCalendar = "daily";
Persistent = true;
};
};
environment.systemPackages = [pkgs.gnutar];
systemd.services."backup-forgejo" = {
script = ''
cd ${BACKUP_DIR}
${pkgs.gnutar}/bin/tar -cf forgejo-$(date +'%Y-%m-%d').tar ${DATA_DIR}
'';
serviceConfig = {
User = "root";
};
};
containers.forgejoRunner = {
autoStart = true;
privateNetwork = true;
hostAddress = "192.168.100.2";
localAddress = "192.168.100.102";
bindMounts = {
"/var/lib/secrets" = {
hostPath = "/run/forgejo-secrets";
isReadOnly = true;
};
};
config = {
config,
pkgs,
...
}: let
configFile = pkgs.writeText "runner.yml" ''
runner:
labels:
- "nixos:host"
'';
in {
environment.systemPackages = with pkgs; [
forgejo-runner
nodejs_24 # Needed for actions/checkout@v4 action
];
users.groups.runner = {};
users.users.runner = {
isNormalUser = true;
group = "runner";
};
systemd.services.startup = {
script = ''
cd ${config.users.users.runner.home}
${pkgs.forgejo-runner}/bin/forgejo-runner create-runner-file --instance ${cfg.url} --secret $(cat /var/lib/secrets/secret) --name runner
sleep 10
${pkgs.forgejo-runner}/bin/forgejo-runner daemon --config ${configFile}
'';
serviceConfig = {
User = "runner";
Environment = "PATH=$PATH:/run/current-system/sw/bin";
};
wantedBy = ["multi-user.target"];
};
system.stateVersion = "23.11";
};
};
containers.forgejo = {
autoStart = true;
privateNetwork = true;
hostAddress = "192.168.100.3";
localAddress = "192.168.100.103";
bindMounts = {
"/var/lib/forgejo" = {
hostPath = DATA_DIR;
isReadOnly = false;
};
"/var/lib/secrets" = {
hostPath = "/run/forgejo-secrets";
isReadOnly = true;
};
};
config = {
config,
pkgs,
...
}: {
environment.systemPackages = [pkgs.forgejo];
services.openssh = {
enable = true;
ports = [cfg.sshPort];
settings = {
PermitRootLogin = "no";
PasswordAuthentication = false;
KbdInteractiveAuthentication = false;
# AllowUsers = ["git"];
};
};
services.forgejo = {
enable = true;
stateDir = "/var/lib/forgejo";
settings = {
server = {
HTTP_PORT = cfg.port;
SSH_PORT = cfg.sshPort;
ROOT_URL = cfg.url;
};
session = {
COOKIE_SECURE = true;
};
service = {
DISABLE_REGISTRATION = true;
};
};
};
systemd.services.startup = {
script = ''
cd ${config.users.users.forgejo.home}
${pkgs.forgejo}/bin/forgejo forgejo-cli actions register --name runner --secret $(cat /var/lib/secrets/secret) --config ${config.services.forgejo.stateDir}/custom/conf/app.ini
'';
serviceConfig.User = "forgejo";
wantedBy = ["multi-user.target"];
};
networking = {
firewall = {
enable = true;
allowedTCPPorts = [cfg.port cfg.sshPort];
};
# Use systemd-resolved inside the container
# Workaround for bug https://github.com/NixOS/nixpkgs/issues/162686
useHostResolvConf = lib.mkForce false;
};
system.stateVersion = "23.11";
};
};
};
}