• 27 Posts
  • 558 Comments
Joined 3 years ago
cake
Cake day: August 10th, 2023

help-circle

  • If you are not a Gitea customer, you are not being informed of security updates in a timely manner:

    Gitea repeatedly makes choices that leave Gitea admins exposed to known vulnerabilities during extended periods of time. For instance Gitea spent resources to undergo a SOC2 security audit for its SaaS offering while critical vulnerabilities demanded a new release. Advance notice of security releases is for customers only.

    https://forgejo.org/compare-to-gitea/#security

    Also, ForgeJo was promising federation which is still a WIP several years later.

    Oh no, it doesn’t do the big feature™. I guess it’s unusable now.

    I wish people would realize that software still works and is excellent even without the various flagship features. I use Kubernetes on a single node. I know there are people who use matrix without federation and e2ee because it’s actually a really good chat app, it just struggles with the performance demands of federation, and the e2ee ux isn’t quite there yet.



  • Yes. But this is a lot. It may be easier to use Forgejo’s built in migration tools, to copy over repositories along with their issues and other info. You would have to rebuild the admin parts of the site, like “organizations” and user privileges. (Well if you are using oauth and mapping users from oautb groups then you don’t…). And I don’t know if it’s automated for a many, many repos. But it’s just a click click click in the gui.

    I remember there was a tool, I think it was related to forgefed, that could do batch repo migrations via the cli. I can’t find it anymore though.













    1. Use an Identity Provider (IDP)*. Other people have mentioned LDAP, which can play this role.

    2. Use groups within the IDP to declare who has what privileges.

    3. Apps using the IDP for auth can read the groups and allow/deny permissions based on groups.

    *Or Identity and Access Management if you are in the cloud ig.

    For open source solutions, I would recommend:

    • Authentik (what I use)
    • Kanidm (doesn’t have web ui)
    • Nubus by Univention

    These three solutions all have invites, ldap, and can act as oauth providers. (Oauth is single sign on), which are the features I want. There are also integrated, including it all in the one app.

    There is also LLDAP, which is a web ui for ldap, and then you could use a service that connects to that, like authelia or keycloak, to add oauth on top.


  • No, Socks5 does not work for this usecase. You don’t get permissions to run it locally via crostini (or use crostini in general) and the relevant proxy settings are locked in the chromebook settings. In addition to this, it is too easy to fingerprint, and some of the more aggressive setups will catch it and block it. For example, my high school would autodetect wireguard and then kick you off of the network for 10 minutes if you attempted to connect.




  • This requires manually enabling every additional provider.

    No, it doesn’t. The docs are confusing on this, but forgejo has two methods to enable oauth/oidc. One is to manually enable them, but there is a second, where people bring their own openid link.

    The docs contain 3 things related to oauth:

    • Oauth provider forgejo acts as oauth for someone else
    • Ouath client — This is the one where you manually enable providers
    • But then there is a third config. Openid. This one lets users bring their own openid/oauth link and sign in with that. No manual configuration required on the side of the forgejo server per oauth provider being used.