[add] role:gitea
This commit is contained in:
parent
8acbd0e794
commit
3008acbee4
|
|
@ -4,5 +4,24 @@
|
|||
"var_gitea_version": "latest",
|
||||
"var_gitea_platform": "linux-amd64",
|
||||
"var_gitea_secret_key": "REPLACE_ME",
|
||||
"var_gitea_internal_token": "REPLACE_ME"
|
||||
"var_gitea_internal_token": "REPLACE_ME",
|
||||
"var_gitea_domain": "gitea.example.org",
|
||||
"var_gitea_listen_address": "0.0.0.0",
|
||||
"var_gitea_listen_port": 2378,
|
||||
"var_gitea_database_kind": "sqlite",
|
||||
"var_gitea_database_data_sqlite_path": "/var/gitea/data.sqlite",
|
||||
"var_gitea_database_data_postgresql_host": "postgresql.example.org",
|
||||
"var_gitea_database_data_postgresql_port": 5432,
|
||||
"var_gitea_database_data_postgresql_username": "gitea_user",
|
||||
"var_gitea_database_data_postgresql_password": "REPLACE_ME",
|
||||
"var_gitea_database_data_postgresql_scheme": "gitea",
|
||||
"var_gitea_authentication_kind": "internal",
|
||||
"var_gitea_authentication_data_authelia_url": "authelia.example.org",
|
||||
"var_gitea_smtp_host": "smtp.example.org",
|
||||
"var_gitea_smtp_port": 465,
|
||||
"var_gitea_smtp_username": "REPLACE_ME",
|
||||
"var_gitea_smtp_password": "REPLACE_ME",
|
||||
"var_gitea_email_sending_enabled": false,
|
||||
"var_gitea_email_sending_sender": "gitea@example.org",
|
||||
"var_gitea_email_sending_html": false
|
||||
}
|
||||
|
|
|
|||
|
|
@ -27,5 +27,31 @@
|
|||
"dest": "{{var_gitea_directory}}/gitea",
|
||||
"mode": "u+rx"
|
||||
}
|
||||
},
|
||||
{
|
||||
"name": "config",
|
||||
"become": true,
|
||||
"become_user": "{{var_gitea_user}}",
|
||||
"ansible.builtin.template": {
|
||||
"src": "config.ini.j2",
|
||||
"dest": "{{var_gitea_directory}}/app.ini"
|
||||
}
|
||||
},
|
||||
{
|
||||
"name": "systemd unit",
|
||||
"become": true,
|
||||
"ansible.builtin.template": {
|
||||
"src": "systemd-unit.j2",
|
||||
"dest": "/etc/systemd/system/gitea.service"
|
||||
}
|
||||
},
|
||||
{
|
||||
"name": "start",
|
||||
"become": true,
|
||||
"ansible.builtin.systemd_service": {
|
||||
"enabled": true,
|
||||
"state": "restarted",
|
||||
"name": "gitea"
|
||||
}
|
||||
}
|
||||
]
|
||||
|
|
|
|||
File diff suppressed because it is too large
Load diff
|
|
@ -1,85 +1,21 @@
|
|||
[Unit]
|
||||
Description=Gitea (Git with a cup of tea)
|
||||
After=network.target
|
||||
###
|
||||
# Don't forget to add the database service dependencies
|
||||
###
|
||||
#
|
||||
#Wants=mysql.service
|
||||
#After=mysql.service
|
||||
#
|
||||
#Wants=mariadb.service
|
||||
#After=mariadb.service
|
||||
#
|
||||
#Wants=postgresql.service
|
||||
#After=postgresql.service
|
||||
#
|
||||
#Wants=memcached.service
|
||||
#After=memcached.service
|
||||
#
|
||||
#Wants=redis.service
|
||||
#After=redis.service
|
||||
#
|
||||
###
|
||||
# If using socket activation for main http/s
|
||||
###
|
||||
#
|
||||
#After=gitea.main.socket
|
||||
#Requires=gitea.main.socket
|
||||
#
|
||||
###
|
||||
# (You can also provide gitea an http fallback and/or ssh socket too)
|
||||
#
|
||||
# An example of /etc/systemd/system/gitea.main.socket
|
||||
###
|
||||
##
|
||||
## [Unit]
|
||||
## Description=Gitea Web Socket
|
||||
## PartOf=gitea.service
|
||||
##
|
||||
## [Socket]
|
||||
## Service=gitea.service
|
||||
## ListenStream=<some_port>
|
||||
## NoDelay=true
|
||||
##
|
||||
## [Install]
|
||||
## WantedBy=sockets.target
|
||||
##
|
||||
###
|
||||
{% if var_gitea_database_kind == 'postgresql' %}
|
||||
Wants=postgresql.service
|
||||
After=postgresql.service
|
||||
{% endif %}
|
||||
|
||||
[Service]
|
||||
# Uncomment the next line if you have repos with lots of files and get a HTTP 500 error because of that
|
||||
# LimitNOFILE=524288:524288
|
||||
RestartSec=2s
|
||||
Type=simple
|
||||
User=git
|
||||
Group=git
|
||||
WorkingDirectory=/var/lib/gitea/
|
||||
# If using Unix socket: tells systemd to create the /run/gitea folder, which will contain the gitea.sock file
|
||||
# (manually creating /run/gitea doesn't work, because it would not persist across reboots)
|
||||
#RuntimeDirectory=gitea
|
||||
ExecStart=/usr/local/bin/gitea web --config /etc/gitea/app.ini
|
||||
User={{var_gitea_user}}
|
||||
Group={{var_gitea_user}}
|
||||
WorkingDirectory={{var_gitea_directory}}
|
||||
ExecStart={{var_gitea_directory}}/gitea web --config {{var_gitea_directory}}/app.ini
|
||||
Restart=always
|
||||
Environment=USER=git HOME=/home/git GITEA_WORK_DIR=/var/lib/gitea
|
||||
# If you install Git to directory prefix other than default PATH (which happens
|
||||
# for example if you install other versions of Git side-to-side with
|
||||
# distribution version), uncomment below line and add that prefix to PATH
|
||||
# Don't forget to place git-lfs binary on the PATH below if you want to enable
|
||||
# Git LFS support
|
||||
# Environment=USER=git HOME=/home/git GITEA_WORK_DIR=/var/lib/gitea
|
||||
# Environment=PATH=/path/to/git/bin:/bin:/sbin:/usr/bin:/usr/sbin
|
||||
# If you want to bind Gitea to a port below 1024, uncomment
|
||||
# the two values below, or use socket activation to pass Gitea its ports as above
|
||||
###
|
||||
#CapabilityBoundingSet=CAP_NET_BIND_SERVICE
|
||||
#AmbientCapabilities=CAP_NET_BIND_SERVICE
|
||||
###
|
||||
# In some cases, when using CapabilityBoundingSet and AmbientCapabilities option, you may want to
|
||||
# set the following value to false to allow capabilities to be applied on gitea process. The following
|
||||
# value if set to true sandboxes gitea service and prevent any processes from running with privileges
|
||||
# in the host user namespace.
|
||||
###
|
||||
#PrivateUsers=false
|
||||
###
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
|
|
|
|||
|
|
@ -22,5 +22,89 @@
|
|||
"internal_token": {
|
||||
"type": "string",
|
||||
"mandatory": true
|
||||
},
|
||||
"domain": {
|
||||
"type": "string",
|
||||
"mandatory": false
|
||||
},
|
||||
"listen_address": {
|
||||
"type": "string",
|
||||
"mandatory": false
|
||||
},
|
||||
"listen_port": {
|
||||
"type": "integer",
|
||||
"mandatory": false
|
||||
},
|
||||
"database_kind": {
|
||||
"mandatory": false,
|
||||
"type": "string",
|
||||
"options": [
|
||||
"sqlite",
|
||||
"postgresql"
|
||||
]
|
||||
},
|
||||
"database_data_sqlite_path": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"database_data_postgresql_host": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"database_data_postgresql_port": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"database_data_postgresql_username": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"database_data_postgresql_password": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"database_data_postgresql_schema": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"authentication_kind": {
|
||||
"mandatory": false,
|
||||
"type": "string",
|
||||
"options": [
|
||||
"internal",
|
||||
"authelia"
|
||||
]
|
||||
},
|
||||
"authentication_data_authelia_url": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"smtp_host": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"smtp_port": {
|
||||
"mandatory": false,
|
||||
"type": "integer"
|
||||
},
|
||||
"smtp_username": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"smtp_password": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"email_sending_enabled": {
|
||||
"mandatory": false,
|
||||
"type": "boolean"
|
||||
},
|
||||
"email_sending_sender": {
|
||||
"mandatory": false,
|
||||
"type": "string"
|
||||
},
|
||||
"email_sending_html": {
|
||||
"mandatory": false,
|
||||
"type": "boolean"
|
||||
}
|
||||
}
|
||||
|
|
|
|||
Loading…
Reference in a new issue