aboutsummaryrefslogblamecommitdiff
path: root/virtual/modules/gitolite/default.nix
blob: 78691fabcf1ee6a731f9981bc9098bcd8bc0d2dd (plain) (tree)
1
2
3
4
5
6
7
8
9
10





                                                      



                                    















                                                                          

                                                   






                                                   




                                                             
                                         







                                                                                       


                                                                                   
          

                                                        






























                                                                                                                                                                                                                                                                                                                                                                                                                                  
{ lib, pkgs, config, mylibs, ... }:
let
    cfg = config.services.myGitolite;
in {
  options.services.myGitolite = {
    enable = lib.mkEnableOption "my gitolite service";
    gitoliteDir = lib.mkOption {
      type = lib.types.string;
      default = "/var/lib/gitolite";
    };
  };

  config = lib.mkIf cfg.enable {
    nixpkgs.config.packageOverrides = oldpkgs: rec {
      gitolite = oldpkgs.gitolite.overrideAttrs(old: rec {
        name = "gitolite-${version}";
        version = "3.6.10";
        src = pkgs.fetchFromGitHub {
          owner = "sitaramc";
          repo = "gitolite";
          rev = "v${version}";
          sha256 = "0p2697mn6rwm03ndlv7q137zczai82n41aplq1g006ii7f12xy8h";
        };
      });
    };

    networking.firewall.allowedTCPPorts = [ 9418 ];

    services.gitDaemon = {
      enable = true;
      user = "gitolite";
      group = "gitolite";
      basePath = "${cfg.gitoliteDir}/repositories";
    };

    system.activationScripts.gitolite =
      assert mylibs.checkEnv "NIXOPS_GITOLITE_LDAP_PASSWORD";
      let
      gitolite_ldap_groups = mylibs.wrap {
        name = "gitolite_ldap_groups.sh";
        file = ./gitolite_ldap_groups.sh;
        vars = {
          LDAP_PASS = builtins.getEnv "NIXOPS_GITOLITE_LDAP_PASSWORD";
        };
        paths = [ pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.coreutils ];
      };
    in {
      deps = [ "users" ];
      text = ''
        if [ -d ${cfg.gitoliteDir} ]; then
          ln -sf ${gitolite_ldap_groups} ${cfg.gitoliteDir}/gitolite_ldap_groups.sh
          chmod g+rx ${cfg.gitoliteDir}
        fi
        if [ -f ${cfg.gitoliteDir}/projects.list ]; then
          chmod g+r ${cfg.gitoliteDir}/projects.list
        fi
      '';
    };

    users.users.wwwrun.extraGroups = [ "gitolite" ];

    users.users.gitolite.packages = let
      python-packages = python-packages: with python-packages; [
        simplejson
        urllib3
      ];
    in
      [
        (pkgs.python3.withPackages python-packages)
      ];
    # FIXME: after initial install, need to
    # (1) copy rc file (adjust gitolite_ldap_groups.sh)
    # (2) (mark old readonly and) sync repos except gitolite-admin
    #     rsync -av --exclude=gitolite-admin.git old:/var/lib/gitolite/repositories /var/lib/gitolite/
    #     chown -R gitolite:gitolite /var/lib/gitolite
    # (3) push force the gitolite-admin to new location (from external point)
    #     Don't use an existing key, it will take precedence over
    #     gitolite-admin
    # (4) su -u gitolite gitolite setup
    services.gitolite = {
      enable = true;
      # FIXME: key from ./ssh
      adminPubkey = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDXqRbiHw7QoHADNIEuo4nUT9fSOIEBMdJZH0bkQAxXyJFyCM1IMz0pxsHV0wu9tdkkr36bPEUj2aV5bkYLBN6nxcV2Y49X8bjOSCPfx3n6Own1h+NeZVBj4ZByrFmqCbTxUJIZ2bZKcWOFncML39VmWdsVhNjg0X4NBBehqXRIKr2gt3E/ESAxTYJFm0BnU0baciw9cN0bsRGqvFgf5h2P48CIAfwhVcGmPQnnAwabnosYQzRWxR0OygH5Kd8mePh6FheIRIigfXsDO8f/jdxwut8buvNIf3m5EBr3tUbTsvM+eV3M5vKGt7sk8T64DVtepTSdOOWtp+47ktsnHOMh immae@immae.eu";
    };
  };
}