1
1
Fork 0
mirror of https://github.com/roles-ansible/ansible_role_gitea.git synced 2024-08-16 11:39:50 +02:00
ansible_role_gitea/tasks/jwt_secrets.yml

39 lines
1.4 KiB
YAML
Raw Normal View History

---
2022-09-29 23:09:19 +02:00
- name: Generate OAuth2 JWT_SECRET if not provided
become: true
ansible.builtin.shell: 'umask 077; {{ gitea_executable_path }} generate secret JWT_SECRET > {{ gitea_configuraion_path }}/gitea_oauth_jwt_secret'
args:
creates: '{{ gitea_configuraion_path }}/gitea_oauth_jwt_secret'
when: gitea_oauth2_jwt_secret | length == 0
2022-09-29 23:09:19 +02:00
- name: Read OAuth2 JWT_SECRET from file
become: true
2021-03-22 21:28:51 +01:00
ansible.builtin.slurp:
src: '{{ gitea_configuraion_path }}/gitea_oauth_jwt_secret'
register: oauth_jwt_secret
when: gitea_oauth2_jwt_secret | length == 0
2022-09-29 23:09:19 +02:00
- name: Set fact gitea_oauth2_jwt_secret
2021-03-22 21:28:51 +01:00
ansible.builtin.set_fact:
gitea_oauth2_jwt_secret: "{{ oauth_jwt_secret['content'] | b64decode }}"
when: gitea_oauth2_jwt_secret | length == 0
2022-09-29 23:09:19 +02:00
- name: Generate LFS JWT_SECRET if not provided
become: true
ansible.builtin.shell: 'umask 077; {{ gitea_executable_path }} generate secret JWT_SECRET > {{ gitea_configuraion_path }}/gitea_lfs_jwt_secret'
args:
creates: '{{ gitea_configuraion_path }}/gitea_lfs_jwt_secret'
when: gitea_lfs_jwt_secret | length == 0
2022-09-29 23:09:19 +02:00
- name: Read LFS JWT_SECRET from file
become: true
2021-03-22 21:28:51 +01:00
ansible.builtin.slurp:
src: '{{ gitea_configuraion_path }}/gitea_lfs_jwt_secret'
register: lfs_jwt_secret
when: gitea_lfs_jwt_secret | length == 0
2022-09-29 23:09:19 +02:00
- name: Set fact gitea_lfs_jwt_secret
2021-03-22 21:28:51 +01:00
ansible.builtin.set_fact:
gitea_lfs_jwt_secret: "{{ lfs_jwt_secret['content'] | b64decode }}"
when: gitea_lfs_jwt_secret | length == 0