mirror of
https://gitea.com/mcereda/oam.git
synced 2026-02-08 21:34:25 +00:00
chore(gitea): improve kubernetes settings and knowledge
This commit is contained in:
@@ -7,7 +7,7 @@ version: '2'
|
||||
|
||||
services:
|
||||
server:
|
||||
image: gitea/gitea:1.21.11-rootless
|
||||
image: gitea/gitea:1.22.2-rootless
|
||||
restart: unless-stopped
|
||||
volumes:
|
||||
- data:/var/lib/gitea
|
||||
|
||||
95
examples/kubernetes/values for helm charts/gitea.yaml
Normal file
95
examples/kubernetes/values for helm charts/gitea.yaml
Normal file
@@ -0,0 +1,95 @@
|
||||
---
|
||||
|
||||
###
|
||||
# Gitea
|
||||
# --------------------------------------
|
||||
# Single-pod, expendable instance for RO view only.
|
||||
# No need for HA or pod spreading affinity settings.
|
||||
#
|
||||
# Default values: `helm show values --repo 'https://dl.gitea.com/charts/' 'gitea'`
|
||||
###
|
||||
|
||||
image:
|
||||
registry: 012345678901.dkr.ecr.eu-west-1.amazonaws.com
|
||||
repository: docker-hub-cache/gitea/gitea
|
||||
tag: 1.22.2
|
||||
rootless: true
|
||||
postgresql-ha:
|
||||
# single-pod, expendable instance for RO view only, no need for HA
|
||||
enabled: false
|
||||
redis-cluster:
|
||||
# single-pod, expendable instance for RO view only, no need for HA
|
||||
enabled: false
|
||||
persistence:
|
||||
enabled: true
|
||||
create: true
|
||||
mount: true
|
||||
claimName: gitea-shared-storage
|
||||
size: 10Gi
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
strategy:
|
||||
type: Recreate # FIXME: RollingUpdate seem to have issues with persistence and locks the new pod in pending
|
||||
resources:
|
||||
# seems to usually use 4m CPUs and 125Mi RAM
|
||||
requests:
|
||||
cpu: 10m
|
||||
memory: 128Mi
|
||||
limits:
|
||||
cpu: 100m
|
||||
memory: 196Mi
|
||||
ingress:
|
||||
enabled: true
|
||||
className: alb
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: alb
|
||||
alb.ingress.kubernetes.io/load-balancer-name: gitea
|
||||
alb.ingress.kubernetes.io/target-type: ip
|
||||
alb.ingress.kubernetes.io/certificate-arn: 'arn:aws:acm:eu-west-1:012345678901:certificate/01234567-abcd-0123-abcd-0123456789ab'
|
||||
alb.ingress.kubernetes.io/ssl-policy: ELBSecurityPolicy-2016-08
|
||||
alb.ingress.kubernetes.io/ssl-redirect: 443
|
||||
hosts:
|
||||
- host: gitea.company.com
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
gitea:
|
||||
admin:
|
||||
existingSecret: gitea-admin-secret
|
||||
email: admin@company.com
|
||||
passwordMode: keepUpdated
|
||||
config:
|
||||
server:
|
||||
ROOT_URL: https://gitea.company.com # needed due to tls termination on the ingress
|
||||
LANDING_PAGE: login
|
||||
database:
|
||||
DB_TYPE: sqlite3
|
||||
queue:
|
||||
TYPE: level
|
||||
admin:
|
||||
DISABLE_REGULAR_ORG_CREATION: true
|
||||
oauth2_client:
|
||||
ENABLE_AUTO_REGISTRATION: true
|
||||
REGISTER_EMAIL_CONFIRM: true
|
||||
USERNAME: email
|
||||
UPDATE_AVATAR: true
|
||||
service:
|
||||
DISABLE_REGISTRATION: true
|
||||
DEFAULT_KEEP_EMAIL_PRIVATE: true
|
||||
DEFAULT_ALLOW_CREATE_ORGANIZATION: false
|
||||
DEFAULT_USER_VISIBILITY: limited # visible to authenticated users only
|
||||
DEFAULT_ORG_VISIBILITY: limited # visible to authenticated users only
|
||||
mailer:
|
||||
ENABLED: true
|
||||
PROTOCOL: smtp+starttls
|
||||
SMTP_ADDR: email-smtp.eu-west-1.amazonaws.com
|
||||
SMTP_PORT: 587
|
||||
USER: AKIA2HKHF0123456ABCD
|
||||
PASSWD: ABCD…ABCD
|
||||
FROM: noreply@gitea.company.com
|
||||
cache:
|
||||
ADAPTER: memory
|
||||
session:
|
||||
PROVIDER: memory
|
||||
migrations:
|
||||
ALLOWED_DOMAINS: gitlab.company.com
|
||||
@@ -4,8 +4,11 @@
|
||||
1. [Installation](#installation)
|
||||
1. [Configuration](#configuration)
|
||||
1. [LFS](#lfs)
|
||||
1. [HTTPS certificates](#https-certificates)
|
||||
1. [Set up HTTP redirection](#set-up-http-redirection)
|
||||
1. [HTTPS](#https)
|
||||
1. [HTTP redirection to HTTPS](#http-redirection-to-https)
|
||||
1. [Send emails](#send-emails)
|
||||
1. [Use Oauth2 for authentication](#use-oauth2-for-authentication)
|
||||
1. [Map OAuth2 users to Gitea teams and organizations](#map-oauth2-users-to-gitea-teams-and-organizations)
|
||||
1. [Further readings](#further-readings)
|
||||
1. [Sources](#sources)
|
||||
|
||||
@@ -46,15 +49,15 @@ helm upgrade --install 'gitea' 'gitea-charts/gitea'
|
||||
## Installation
|
||||
|
||||
<details>
|
||||
<summary>Container</summary>
|
||||
<summary style="padding-bottom: 1rem">Container image</summary>
|
||||
|
||||
Docker [compose file].
|
||||
[Compose file example][compose file].
|
||||
|
||||
The `git` user has UID and GID set to 1000 by default.<br/>
|
||||
Change those in the compose file or whatever.
|
||||
The `git` user has UID and GID set to `1000` by default.<br/>
|
||||
Change those in the compose file or whatever one needs to.
|
||||
|
||||
One can optionally define the administrative user during the initial setup.<br/>
|
||||
If no administrative user is defined in that moment, the first registered user becomes the administrator.
|
||||
If no administrative user is defined in that moment, the **first registered user** becomes the administrator.
|
||||
|
||||
</details>
|
||||
|
||||
@@ -62,83 +65,194 @@ If no administrative user is defined in that moment, the first registered user b
|
||||
|
||||
Refer the [Configuration cheat sheet].
|
||||
|
||||
Settings are loaded from the configuration file usually found at `/etc/gitea/app.ini`.
|
||||
|
||||
Container users can update the configuration file through environment variables.<br/>
|
||||
The image runs `environment-to-ini` before running the server, which maps them to values in the ini file:
|
||||
|
||||
- Variables in the form `GITEA__{{SECTION_NAME}}__{{KEY_NAME}}` are mapped to the `[section_name]` ini section and the
|
||||
`KEY_NAME` key with the provided value.
|
||||
- Variables in the form `GITEA__{{SECTION_NAME}}__{{KEY_NAME}}__{{PATH_TO_FILE}}` are mapped to the `[section_name]` ini
|
||||
section and the `KEY_NAME` key with the value loaded from the specified file.
|
||||
|
||||
Environment variables usually restricted to the `0-9A-Z_` reduced character.<br/>
|
||||
To allow setting up sections with characters outside of that set, characters shall be escaped as a UTF8 byte string.
|
||||
E.g. to configure:
|
||||
|
||||
```ini
|
||||
[log.console]
|
||||
COLORIZE = false
|
||||
STDERR = true
|
||||
```
|
||||
|
||||
One would need to encode `.` as `_0X2E_` and set the environment variables `GITEA__LOG_0x2E_CONSOLE__COLORIZE=false` and
|
||||
`GITEA__LOG_0x2E_CONSOLE__STDERR=false`.<br/>
|
||||
Other examples can be found on the [configuration cheat sheet].
|
||||
|
||||
If using the helm chart with Kubernetes, the configuration settings defined in the values' `gitea.config` key are saved
|
||||
in the `gitea-inline-config` secret and are then used to build the configuration file in the container.
|
||||
|
||||
### LFS
|
||||
|
||||
Enable the built-in LFS support by updating the `app.ini` configuration file:
|
||||
Enable the built-in LFS support:
|
||||
|
||||
```ini
|
||||
[server]
|
||||
LFS_START_SERVER = true
|
||||
|
||||
[lfs]
|
||||
PATH = /home/gitea/data/lfs # defaults to {{data}}/lfs
|
||||
PATH = /home/gitea/data/lfs # defaults to "{{data_directory}}/lfs"
|
||||
```
|
||||
|
||||
### HTTPS certificates
|
||||
### HTTPS
|
||||
|
||||
Refer [HTTPS setup to encrypt connections to Gitea].
|
||||
|
||||
If the certificate is signed by a third party certificate authority (i.e. not self-signed), then `cert.pem` should
|
||||
contain the certificate chain.<br/>
|
||||
If the certificate is signed by a third party certificate authority (i.e. not self-signed), then the `cert.pem` file
|
||||
shall contain the certificate chain too.<br/>
|
||||
The server certificate must be **the first entry** in `cert.pem`, followed by the intermediaries in order (if any).<br/>
|
||||
The root certificate does **not** have to be included as the connecting client must already have it in order to
|
||||
The root certificate does **not** need to be included, as the connecting client must already have it in order to
|
||||
establish any trust relationship.
|
||||
|
||||
The file path in the configuration is relative to the `GITEA_CUSTOM` environment variable when it is a relative path.
|
||||
|
||||
<details>
|
||||
<details style="padding-left: 1rem">
|
||||
<summary>Self-signed certificate</summary>
|
||||
|
||||
1. Generate a self signed certificate:
|
||||
|
||||
```sh
|
||||
gitea cert --host 'git.host.fqdn'
|
||||
docker compose exec server gitea cert --host 'git.host.fqdn'
|
||||
gitea cert --host 'gitea.company.com'
|
||||
docker compose exec server gitea cert --host 'gitea.company.com'
|
||||
```
|
||||
|
||||
1. Change the `app.ini` configuration file:
|
||||
1. Reference the certificate files in the configuration file:
|
||||
|
||||
```ini
|
||||
[server]
|
||||
PROTOCOL = https
|
||||
ROOT_URL = https://git.host.fqdn:3000/
|
||||
ROOT_URL = https://gitea.company.com:3000/
|
||||
HTTP_PORT = 3000
|
||||
CERT_FILE = /path/to/cert.pem
|
||||
KEY_FILE = /path/to/key.pem
|
||||
```
|
||||
|
||||
</details>
|
||||
<details>
|
||||
|
||||
<details style="padding-left: 1em">
|
||||
<summary>ACME certificate</summary>
|
||||
|
||||
Defaults to using Let's Encrypt.
|
||||
|
||||
Change the `app.ini` configuration file:
|
||||
|
||||
```ini
|
||||
[server]
|
||||
PROTOCOL = https
|
||||
DOMAIN=git.example.com
|
||||
DOMAIN = gitea.company.com
|
||||
ENABLE_ACME = true
|
||||
ACME_ACCEPTTOS = true
|
||||
ACME_DIRECTORY = https
|
||||
ACME_EMAIL=email@example.com # can be omitted here and provided manually at first run, after which it is cached
|
||||
ACME_EMAIL = user@company.com # can be omitted here and provided manually at first run, after which it is cached
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
### Set up HTTP redirection
|
||||
#### HTTP redirection to HTTPS
|
||||
|
||||
Gitea server is able to listen on one single port. Enable the HTTP redirection service to redirect HTTP requests to the
|
||||
HTTPS port:
|
||||
Gitea's server is able to listen on one port only and requires a separate service to provide redirection.<br/>
|
||||
If HTTPS is enabled and one wants to offer an HTTP port to redirect HTTP requests from, enable the HTTP redirection
|
||||
service:
|
||||
|
||||
```ini
|
||||
[server]
|
||||
REDIRECT_OTHER_PORT = true
|
||||
PORT_TO_REDIRECT = 3080 # http port to be redirected to https
|
||||
PORT_TO_REDIRECT = 3080 # http port that will be redirected to the https port
|
||||
```
|
||||
|
||||
When using Docker, make sure this port is published.
|
||||
When using Docker, make sure this port is published too.
|
||||
|
||||
### Send emails
|
||||
|
||||
Use SMTP servers as relay should one want to leverage accounts at email providers.
|
||||
|
||||
<details>
|
||||
<summary>AWS</summary>
|
||||
|
||||
```ini
|
||||
[mailer]
|
||||
ENABLED = true
|
||||
PROTOCOL = smtp+starttls
|
||||
SMTP_ADDR = email-smtp.eu-west-1.amazonaws.com
|
||||
SMTP_PORT = 587
|
||||
USER = AKIA…7890
|
||||
PASSWD = `ABCD…7890`
|
||||
FROM = noreply@gitea.company.com
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
<details>
|
||||
<summary style="padding-bottom: 1rem">Gmail</summary>
|
||||
|
||||
> Gmail will not allow the direct use of one's Google account password.<br/>
|
||||
> Create an App password and enable 2FA on one's Google account.
|
||||
|
||||
```ini
|
||||
[mailer]
|
||||
ENABLED = true
|
||||
PROTOCOL = smtps
|
||||
SMTP_ADDR = smtp.gmail.com
|
||||
SMTP_PORT = 465
|
||||
FROM = user@gmail.com
|
||||
USER = user
|
||||
PASSWD = `App_Password`
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
### Use Oauth2 for authentication
|
||||
|
||||
Remember to set up a mailer should one want to require email confirmation during registration.
|
||||
|
||||
<details>
|
||||
<summary>Google Cloud example</summary>
|
||||
|
||||
1. Create a Client ID in [Google Cloud](https://console.cloud.google.com/apis/credentials) with at least the following
|
||||
settings:
|
||||
|
||||
```yaml
|
||||
Application type: web application
|
||||
Name: whatever # anything is fine here
|
||||
Authorized JavaScript origins:
|
||||
- https://gitea.company.com:3000 # the ROOT_URL of one's instance
|
||||
Authorized redirect URIs:
|
||||
- # the 'Google' identifier here needs to be the name given to the provider in the next step
|
||||
https://gitea.company.com:3000/user/oauth2/Google/callback
|
||||
```
|
||||
|
||||
1. Configure the provider in the Gitea instance at
|
||||
_Site Administration_ > _Identity & Access_ > _Authentication Sources_ with at least the following settings:
|
||||
|
||||
```yaml
|
||||
Authentication Type: OAuth2
|
||||
Authentication Name: Google # this defines the identifier for the redirect URI above
|
||||
OAuth2 Provider: Google
|
||||
Client ID (Key): 012345678901-abcdefghijklmnopqrstuvwxyz012345.apps.googleusercontent.com
|
||||
Client Secret: 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
|
||||
```
|
||||
|
||||
1. Configure the Gitea instance to automatically create users from the provider:
|
||||
|
||||
```ini
|
||||
[oauth2_client]
|
||||
ENABLE_AUTO_REGISTRATION: true
|
||||
USERNAME: email
|
||||
```
|
||||
|
||||
</details>
|
||||
|
||||
#### Map OAuth2 users to Gitea teams and organizations
|
||||
|
||||
TODO
|
||||
|
||||
## Further readings
|
||||
|
||||
|
||||
Reference in New Issue
Block a user