#!/bin/bash # # Gitea Service PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin . /etc/federated config_gitea() { echo -ne "* Configuring gitea container.." if [ ! -d "/federated/apps/gitea" ]; then mkdir -p /federated/apps/gitea/data/data mkdir -p /federated/apps/gitea/data/data/git/.ssh touch /federated/apps/gitea/data/data/git/.ssh/authorized_keys chmod 600 /federated/apps/gitea/data/data/git/.ssh/authorized_keys fi get_appvars cat > /federated/apps/gitea/docker-compose.yml < /federated/apps/gitea/.env < /federated/apps/gitea/.env < /federated/apps/gitea/data/creategitea.sh </dev/null | awk -F: '{ print \$4 }' | awk -F\" '{ print \$2 }'\` # Create the repository website, blog, and documentation curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"www","auto_init":true,"default_branch":"master","private":true}' curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"blog","auto_init":true,"default_branch":"master","private":true}' curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"documentation","auto_init":true,"default_branch":"master","private":true}' # Create the webhook inside the www repository curl -X 'POST' \ 'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/www/hooks' \ -H 'accept: application/json' \ -H 'Content-Type: application/json' \ -H "Authorization: token \$GITEA_TOKEN_2" \ -d '{ "active": true, "config": { "content_type": "json", "url": "https://caddy.$DOMAIN/webhook", "secret": "$WEBHOOK_SECRET" }, "events": [ "push" ], "type": "gitea" }' # Create the webhook inside the blog repository curl -X 'POST' \ 'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/blog/hooks' \ -H 'accept: application/json' \ -H 'Content-Type: application/json' \ -H "Authorization: token \$GITEA_TOKEN_2" \ -d '{ "active": true, "config": { "content_type": "json", "url": "https://blog.$DOMAIN/webhook", "secret": "$WEBHOOK_SECRET" }, "events": [ "push" ], "type": "gitea" }' # Create the webhook inside the documentation repository curl -X 'POST' \ 'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/documentation/hooks' \ -H 'accept: application/json' \ -H 'Content-Type: application/json' \ -H "Authorization: token \$GITEA_TOKEN_2" \ -d '{ "active": true, "config": { "content_type": "json", "url": "https://documentation.$DOMAIN/webhook", "secret": "$WEBHOOK_SECRET" }, "events": [ "push" ], "type": "gitea" }' EOF chmod +x /federated/apps/gitea/data/creategitea.sh # Create database and user in postgresql docker exec postgresql psql -U postgres -c "CREATE USER gitea WITH PASSWORD '$GITEA_SECRET'" &> /dev/null docker exec postgresql psql -U postgres -c "CREATE DATABASE gitea" &> /dev/null docker exec postgresql psql -U postgres -c "GRANT ALL PRIVILEGES ON DATABASE gitea TO gitea" &> /dev/null echo -ne "done.\n" } email_gitea() { echo -ne "* Sending email to customer.." cat > /federated/apps/mail/data/root/certs/mailfile <

Gitea is now installed on $DOMAIN

Here is your applications chart with on how to access this service:

Applications

Service Link User / Pass Access Docs Description
Gitea gitea.$DOMAIN admin@$DOMAIN
admin password above
User access is separate from panel Click here Gitea is a code repository system similar to GitHub

Thanks for your support!

Thank you for your support of Federated Computer. We really appreciate it and hope you have a very successful time with Federated Core.

Again, if we can be of any assistance, please don't hesitate to get in touch.

Support: https://support.federated.computer
Phone: (970) 722-8715
Email: support@federated.computer

It's your computer. Let's make it work for you! EOF # Send out e-mail from mail container with details docker exec mail bash -c "mail -r admin@$DOMAIN -a \"Content-type: text/html\" -s \"Application installed on $DOMAIN\" $EMAIL < /root/certs/mailfile" rm /federated/apps/mail/data/root/certs/mailfile echo -ne "done.\n" } uninstall_gitea() { echo -ne "* Uninstalling gitea container.." # First stop the service cd /federated/apps/gitea && docker compose -f docker-compose.yml -p gitea down &> /dev/null # Delete database and user in postgresql docker exec postgresql psql -U postgres -c "DROP DATABASE gitea" &> /dev/null docker exec postgresql psql -U postgres -c "DROP USER gitea" &> /dev/null # Delete the app directory rm -rf /federated/apps/gitea # Delete the image docker image rm gitea/gitea:$IMAGE_VERSION &> /dev/null # Delete the DNS record docker exec pdns pdnsutil delete-rrset $DOMAIN gitea A # Uninstall the SSO configuration if it exists in authelia (authelia must exist too) if [[ $(grep "### Gitea" /federated/apps/authelia/data/config/idproviders.yml 2>/dev/null) ]]; then sed -i '/### Gitea/,/### /{/### PowerDNS/!{/### /!d}}' /federated/apps/authelia/data/config/idproviders.yml sed -i '/### Gitea/d' /federated/apps/authelia/data/config/idproviders.yml /federated/bin/stop authelia /federated/bin/start authelia fi [[ "${PLUS}" != "true" ]] && docker exec pdns pdnsutil delete-rrset $DOMAIN gitea A &> /dev/null echo -ne "done.\n" } start_gitea() { # Start service with command to make sure it's up before proceeding start_service "gitea" "nc -z 192.168.0.30 3000 &> /dev/null" "7" # Copy creategitea.sh inside gitea container mv /federated/apps/gitea/data/creategitea.sh /federated/apps/gitea/data/data/creategitea.sh [ $? -ne 0 ] && fail "Couldn't mv creategitea.sh inside /federated/apps/gitea container" # Create admin user gitea docker exec --user 1000 gitea gitea admin user create --admin --username gitea --password $ADMINPASS --email admin@$DOMAIN &> /dev/null [ $? -ne 0 ] && fail "Couldn't run gitea user create inside /federated/apps/gitea container" # Run creategitea.sh inside gitea container docker exec gitea /data/creategitea.sh &> /dev/null [ $? -ne 0 ] && fail "Couldn't run creategitea.sh inside /federated/apps/gitea container" # Create token to use for Caddy starting up next GITEA_TOKEN_1=`docker exec gitea curl -H "Content-Type: application/json" -d '{"name":"gitea1","scopes":["all"]}' -u gitea:$ADMINPASS http://gitea.$DOMAIN:3000/api/v1/users/gitea/tokens 2>/dev/null | awk -F: '{ print $4 }' | awk -F\" '{ print $2 }'` &> /dev/null [ $? -ne 0 ] && fail "Couldn't run gitea curl to get token inside /federated/apps/gitea container" echo "$GITEA_TOKEN_1" > /federated/apps/gitea/.gitea.token.1 # Remove creategitea.sh rm /federated/apps/gitea/data/data/creategitea.sh [[ "${PLUS}" != "true" ]] && docker exec pdns pdnsutil add-record $DOMAIN gitea A 86400 $EXTERNALIP &> /dev/null echo -ne "done.\n" } configsso_gitea() { if [[ "${PLUS}" != "true" ]]; then echo -ne "* Configuring gitea container with SSO.." [ ! -d "/federated/apps/authelia" ] && failcheck "Authelia is not installed. You need this first before continuing." [ ! -f "/federated/apps/authelia/data/config/idproviders.yml" ] && failcheck "Authelia idproviders.yml is missing." [[ $(grep "### Gitea" /federated/apps/authelia/data/config/idproviders.yml 2>/dev/null) ]] && failcheck "Authelia already has a Gitea configuration." get_appvars GITEA_CLIENT_SECRET=$(create_password); GITEA_CLIENT_SECRET_HASH=$(docker run --rm authelia/authelia:latest authelia crypto hash generate pbkdf2 --password $GITEA_CLIENT_SECRET | awk '{ print $2 }') echo "$GITEA_CLIENT_SECRET" > /federated/apps/gitea/.gitea.client.secret cat >> /federated/apps/authelia/data/config/idproviders.yml <> /federated/apps/gitea/.env </dev/null; do [[ "$GITEA_RETRY" -eq 60 ]] && echo "ERROR - Can't connect gitea add-oauth to authelia" && break sleep 1 ((GITEA_RETRY++)) done echo -ne "done.\n" fi } configsso_gitea_plus() { GITEA_CLIENT_SECRET=$(cat /federated/apps/gitea/.gitea.client.secret) run_command "/federated/bin/stop gitea" run_command "/federated/bin/start gitea" sed -i "s/GITEA__service__DISABLE_REGISTRATION=.*/GITEA__service__DISABLE_REGISTRATION=false/g" /federated/apps/gitea/.env cat >> /federated/apps/gitea/.env </dev/null; do [[ "$GITEA_RETRY" -eq 60 ]] && echo "ERROR - Can't connect gitea add-oauth to authelia" && break sleep 1 ((GITEA_RETRY++)) done echo -ne "done.\n" }