test/lib/gitea.sh

186 lines
6.1 KiB
Bash

#!/bin/bash
#
# Gitea Service
PATH=$HOME/.docker/cli-plugins:/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
config_gitea() {
echo -ne "\n* Configuring /federated/apps/gitea container.."
spin &
SPINPID=$!
if [ ! -d "/federated/apps/gitea" ]; then
mkdir -p /federated/apps/gitea/data/data
mkdir -p /federated/apps/gitea/data/data/git/.ssh
touch /federated/apps/gitea/data/data/git/.ssh/authorized_keys
chmod 600 /federated/apps/gitea/data/data/git/.ssh/authorized_keys
fi
cat > /federated/apps/gitea/docker-compose.yml <<EOF
version: "3.7"
services:
gitea:
image: gitea/gitea:\${IMAGE_VERSION}
container_name: gitea
hostname: gitea.$DOMAIN
domainname: $DOMAIN
restart: always
networks:
federated:
ipv4_address: 172.99.0.30
extra_hosts:
- "www.$DOMAIN:$EXTERNALIP"
- "blog.$DOMAIN:$EXTERNALIP"
- "documentation.$DOMAIN:$EXTERNALIP"
ports:
- "2222:22"
env_file:
- ./.env
volumes:
- ./data/data:/data
- ./data/data/git/.ssh:/data/git/.ssh
- /etc/timezone:/etc/timezone:ro
- /etc/localtime:/etc/localtime:ro
labels:
- "traefik.enable=true"
- "traefik.http.routers.gitea.rule=Host(\`gitea.$DOMAIN\`)"
- "traefik.http.routers.gitea.entrypoints=websecure"
- "traefik.http.routers.gitea.tls.certresolver=letsencrypt"
- "traefik.http.services.gitea.loadbalancer.server.port=3000"
networks:
federated:
external: true
EOF
cat > /federated/apps/gitea/.env <<EOF
IMAGE_VERSION="1.19.0"
USER_UID=1000
USER_GID=1000
GITEA__database__DB_TYPE=postgres
GITEA__database__HOST=postgresql.$DOMAIN:5432
GITEA__database__NAME=gitea
GITEA__database__USER=gitea
GITEA__database__PASSWD=$GITEA_SECRET
GITEA__database__SSL_MODE=verify-full
GITEA__mailer__ENABLED=true
GITEA__mailer__FROM=gitea@gitea.$DOMAIN
GITEA__mailer__MAILER_TYPE=smtp
GITEA__mailer__SMTP_PORT=587
GITEA__mailer__HOST=mail.$DOMAIN
GITEA__mailer__IS_TLS_ENABLED=true
GITEA__mailer__USER=admin
GITEA__mailer__PASSWD=$ADMINPASS
GITEA__security__INSTALL_LOCK=true
GITEA__server__ROOT_URL=https://gitea.$DOMAIN
GITEA__server__DOMAIN=$DOMAIN
GITEA__server__SSH_DOMAIN=$DOMAIN
GITEA__server__SSH_PORT=2222
GITEA__server__SSH_LISTEN_PORT=2222
EOF
chmod 600 /federated/apps/gitea/.env
WEBHOOK_SECRET=$(create_password);
cat > /federated/apps/gitea/data/creategitea.sh <<EOF
#!/bin/bash
# Get the Gitea API token
GITEA_TOKEN_2=\`curl -H "Content-Type: application/json" -d '{"name":"gitea2","scopes":["all"]}' -u gitea:$ADMINPASS http://gitea.$DOMAIN:3000/api/v1/users/gitea/tokens 2>/dev/null | awk -F: '{ print \$4 }' | awk -F\" '{ print \$2 }'\`
# Create the repository website, blog, and documentation
curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"www","auto_init":true,"default_branch":"master"}'
curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"blog","auto_init":true,"default_branch":"master"}'
curl -k -X POST http://gitea.$DOMAIN:3000/api/v1/user/repos -H "content-type: application/json" -H "Authorization: token \$GITEA_TOKEN_2" --data '{"name":"documentation","auto_init":true,"default_branch":"master"}'
# Create the webhook inside the www repository
curl -X 'POST' \
'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/www/hooks' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H "Authorization: token \$GITEA_TOKEN_2" \
-d '{
"active": true,
"config": {
"content_type": "json",
"url": "https://www.$DOMAIN/webhook",
"secret": "$WEBHOOK_SECRET"
},
"events": [
"push"
],
"type": "gitea"
}'
# Create the webhook inside the blog repository
curl -X 'POST' \
'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/blog/hooks' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H "Authorization: token \$GITEA_TOKEN_2" \
-d '{
"active": true,
"config": {
"content_type": "json",
"url": "https://blog.$DOMAIN/webhook",
"secret": "$WEBHOOK_SECRET"
},
"events": [
"push"
],
"type": "gitea"
}'
# Create the webhook inside the documentation repository
curl -X 'POST' \
'http://gitea.$DOMAIN:3000/api/v1/repos/gitea/documentation/hooks' \
-H 'accept: application/json' \
-H 'Content-Type: application/json' \
-H "Authorization: token \$GITEA_TOKEN_2" \
-d '{
"active": true,
"config": {
"content_type": "json",
"url": "https://documentation.$DOMAIN/webhook",
"secret": "$WEBHOOK_SECRET"
},
"events": [
"push"
],
"type": "gitea"
}'
EOF
chmod +x /federated/apps/gitea/data/creategitea.sh
kill -9 $SPINPID &> /dev/null
echo -ne "done."
}
start_gitea() {
# Grab the container IP from docker-compose above
SERVICE_IP=`grep ipv4_address /federated/apps/gitea/docker-compose.yml | awk '{ print $2 }'`
# Start service with command to make sure it's up before proceeding
start_service "gitea" "nc -z $SERVICE_IP 3000 &> /dev/null"
# Copy creategitea.sh inside gitea container
mv /federated/apps/gitea/data/creategitea.sh /federated/apps/gitea/data/data/creategitea.sh
[ $? -ne 0 ] && fail "Couldn't mv creategitea.sh inside /federated/apps/gitea container"
# Create admin user gitea
docker exec --user 1000 gitea gitea admin user create --admin --username gitea --password $ADMINPASS --email admin@$DOMAIN &> /dev/null
[ $? -ne 0 ] && fail "Couldn't run gitea user create inside /federated/apps/gitea container"
# Run creategitea.sh inside gitea container
docker exec -it gitea /data/creategitea.sh &> /dev/null
[ $? -ne 0 ] && fail "Couldn't run creategitea.sh inside /federated/apps/gitea container"
# Create token to use for Caddy starting up next
GITEA_TOKEN_1=`docker exec -it gitea curl -H "Content-Type: application/json" -d '{"name":"gitea1","scopes":["all"]}' -u gitea:$ADMINPASS http://gitea.$DOMAIN:3000/api/v1/users/gitea/tokens 2>/dev/null | awk -F: '{ print $4 }' | awk -F\" '{ print $2 }'` &> /dev/null
[ $? -ne 0 ] && fail "Couldn't run gitea curl to get token inside /federated/apps/gitea container"
kill -9 $SPINPID &> /dev/null
echo -ne "done."
}