-
Time Estimate
- Reverse proxy selection and configuration: 1.5 hours
- TLS setup (self-signed / local CA): 1 hour
- Docker Compose integration and testing: 1 hour
- End-to-end validation with Sztabina: 0.5 hour
Total estimate: ~4 hours
Work Log (Planned)
- Analyze Forgejo HTTPS requirements
- Add reverse proxy service to docker-compose
- Configure TLS termination
- Update Forgejo configuration (
ROOT_URL) - Validate Git clone / push via HTTPS
- Verify default branch discovery via Sztabina
- Document Forgejo HTTPS setup in release notes
-
rksuma@Ramakrishnans-MacBook-Pro sztab % git checkout wolnosc Switched to branch 'wolnosc' Your branch is up to date with 'origin/wolnosc'. rksuma@Ramakrishnans-MacBook-Pro sztab % git pull Already up to date. rksuma@Ramakrishnans-MacBook-Pro sztab % git checkout -b feature/forgejo-https-proxy Switched to a new branch 'feature/forgejo-https-proxy' rksuma@Ramakrishnans-MacBook-Pro sztab % -
PR tested and merged: https://tigase.dev/sztab/~pulls/6
| Type |
New Feature
|
| Priority |
Blocker
|
| Assignee | |
| Version |
1.0
|
| Sprints |
n/a
|
| Customer |
n/a
|
Issue Votes (0)
Description
Forgejo integration in Sztab requires repositories to be accessed over HTTPS. Sztabina (the Go microservice that probes git repos for Sztab) intentionally rejects non-HTTPS Git URLs to prevent credentials (username / token) from being transmitted in cleartext.
Currently, Forgejo is exposed only via HTTP in the development / test setup. As a result:
To complete Forgejo support, an HTTPS reverse proxy must be placed in front of Forgejo.
This is an infrastructure task, not a functional defect in Forgejo or Sztabina.
Root Cause
Proposed Solution
I prefer to use Caddy as the lightweight reverse proxy:
ROOT_URLto HTTPSAcceptance Criteria
git clone https://…works for Forgejo repositoriesNotes
This task completes Forgejo readiness for:
Forgejo is functional now; but without TLS, it cannot be used in production.