Compare commits
1 Commits
69b7e9ddcb
...
vibe/batch
| Author | SHA1 | Date | |
|---|---|---|---|
| d42b031ec8 |
@@ -106,3 +106,24 @@
|
|||||||
'OIDC_CLIENT_SECRET': gitea_app.secret,
|
'OIDC_CLIENT_SECRET': gitea_app.secret,
|
||||||
}) | b64encode }}
|
}) | b64encode }}
|
||||||
gitea_owner_type: 'org' # value != 'user'
|
gitea_owner_type: 'org' # value != 'user'
|
||||||
|
|
||||||
|
# Also propagate the same secret to user-owned namespaces. Gitea Action secrets
|
||||||
|
# are scoped per owner, so repos under a user account cannot read org-level
|
||||||
|
# secrets. Extend this list if other personal-namespace apps need vault auth.
|
||||||
|
- name: Propagate vault_oauth__sh_b64 to user-owned namespaces
|
||||||
|
include_role:
|
||||||
|
name: arcodange.factory.gitea_secret
|
||||||
|
vars:
|
||||||
|
gitea_secret_name: vault_oauth__sh_b64
|
||||||
|
gitea_secret_value: >-
|
||||||
|
{{ lookup('ansible.builtin.template', 'oidc_jwt_token.sh.j2', template_vars = {
|
||||||
|
'GITEA_BASE_URL': 'https://gitea.arcodange.lab',
|
||||||
|
'OIDC_CLIENT_ID': gitea_app.id,
|
||||||
|
'OIDC_CLIENT_SECRET': gitea_app.secret,
|
||||||
|
}) | b64encode }}
|
||||||
|
gitea_owner_type: 'user'
|
||||||
|
gitea_owner_name: '{{ item }}'
|
||||||
|
loop:
|
||||||
|
- arcodange
|
||||||
|
loop_control:
|
||||||
|
label: '{{ item }}'
|
||||||
Reference in New Issue
Block a user