mirror of
https://github.com/roles-ansible/ansible_role_gitea.git
synced 2024-08-16 11:39:50 +02:00
fix typo
This commit is contained in:
parent
2d174e2f8c
commit
fb4293b3e6
8 changed files with 18 additions and 18 deletions
|
@ -67,7 +67,7 @@ Either you define exactly which release you install. Or you use the option ``lat
|
||||||
| `gitea_user_home` | `{{ gitea_home }}` | home of gitea user |
|
| `gitea_user_home` | `{{ gitea_home }}` | home of gitea user |
|
||||||
| `gitea_executable_path` | `/usr/local/bin/gitea` | Path for gitea executable |
|
| `gitea_executable_path` | `/usr/local/bin/gitea` | Path for gitea executable |
|
||||||
| `gitea_forgejo_executable_path` | `/usr/local/bin/forgejo` | Path for forgejo executable |
|
| `gitea_forgejo_executable_path` | `/usr/local/bin/forgejo` | Path for forgejo executable |
|
||||||
| `gitea_configuraion_path` | `/etc/gitea` | Where to put the gitea.ini config |
|
| `gitea_configuration_path` | `/etc/gitea` | Where to put the gitea.ini config |
|
||||||
| `gitea_shell` | `/bin/false` | UNIX shell used by gitea. Set it to `/bin/bash` if you don't use the gitea built-in ssh server. |
|
| `gitea_shell` | `/bin/false` | UNIX shell used by gitea. Set it to `/bin/bash` if you don't use the gitea built-in ssh server. |
|
||||||
| `gitea_systemd_cap_net_bind_service` | `false` | Adds `AmbientCapabilities=CAP_NET_BIND_SERVICE` to systemd service file |
|
| `gitea_systemd_cap_net_bind_service` | `false` | Adds `AmbientCapabilities=CAP_NET_BIND_SERVICE` to systemd service file |
|
||||||
|
|
||||||
|
|
|
@ -20,7 +20,7 @@ gitea_home: '/var/lib/gitea'
|
||||||
gitea_user_home: '{{ gitea_home }}'
|
gitea_user_home: '{{ gitea_home }}'
|
||||||
gitea_executable_path: '/usr/local/bin/gitea'
|
gitea_executable_path: '/usr/local/bin/gitea'
|
||||||
gitea_forgejo_executable_path: '/usr/local/bin/forgejo'
|
gitea_forgejo_executable_path: '/usr/local/bin/forgejo'
|
||||||
gitea_configuraion_path: '/etc/gitea'
|
gitea_configuration_path: '/etc/gitea'
|
||||||
gitea_shell: '/bin/false'
|
gitea_shell: '/bin/false'
|
||||||
gitea_systemd_cap_net_bind_service: false
|
gitea_systemd_cap_net_bind_service: false
|
||||||
|
|
||||||
|
|
|
@ -29,7 +29,7 @@
|
||||||
- name: Backing up gitea before upgrade
|
- name: Backing up gitea before upgrade
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.command:
|
ansible.builtin.command:
|
||||||
cmd: "sudo -u {{ gitea_user }} {{ gitea_full_executable_path }} dump -c {{ gitea_configuraion_path }}/gitea.ini"
|
cmd: "sudo -u {{ gitea_user }} {{ gitea_full_executable_path }} dump -c {{ gitea_configuration_path }}/gitea.ini"
|
||||||
chdir: "{{ gitea_backup_location }}"
|
chdir: "{{ gitea_backup_location }}"
|
||||||
changed_when: true
|
changed_when: true
|
||||||
rescue:
|
rescue:
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: gitea.ini.j2
|
src: gitea.ini.j2
|
||||||
dest: "{{ gitea_configuraion_path }}/gitea.ini"
|
dest: "{{ gitea_configuration_path }}/gitea.ini"
|
||||||
owner: "{{ gitea_user }}"
|
owner: "{{ gitea_user }}"
|
||||||
group: "{{ gitea_group }}"
|
group: "{{ gitea_group }}"
|
||||||
mode: 0600
|
mode: 0600
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
group: "{{ gitea_group }}"
|
group: "{{ gitea_group }}"
|
||||||
mode: 'u=rwX,g=rX,o='
|
mode: 'u=rwX,g=rX,o='
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ gitea_configuraion_path }}"
|
- "{{ gitea_configuration_path }}"
|
||||||
- "{{ gitea_user_home }}"
|
- "{{ gitea_user_home }}"
|
||||||
- "{{ gitea_home }}"
|
- "{{ gitea_home }}"
|
||||||
- "{{ gitea_home }}/data"
|
- "{{ gitea_home }}/data"
|
||||||
|
|
|
@ -1,15 +1,15 @@
|
||||||
---
|
---
|
||||||
- name: Generate gitea SECRET_KEY if not provided
|
- name: Generate gitea SECRET_KEY if not provided
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.shell: 'umask 077; {{ gitea_full_executable_path }} generate secret SECRET_KEY > {{ gitea_configuraion_path }}/gitea_secret_key'
|
ansible.builtin.shell: 'umask 077; {{ gitea_full_executable_path }} generate secret SECRET_KEY > {{ gitea_configuration_path }}/gitea_secret_key'
|
||||||
args:
|
args:
|
||||||
creates: '{{ gitea_configuraion_path }}/gitea_secret_key'
|
creates: '{{ gitea_configuration_path }}/gitea_secret_key'
|
||||||
when: gitea_secret_key | string | length == 0
|
when: gitea_secret_key | string | length == 0
|
||||||
|
|
||||||
- name: Read gitea SECRET_KEY from file
|
- name: Read gitea SECRET_KEY from file
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.slurp:
|
ansible.builtin.slurp:
|
||||||
src: '{{ gitea_configuraion_path }}/gitea_secret_key'
|
src: '{{ gitea_configuration_path }}/gitea_secret_key'
|
||||||
register: remote_secret_key
|
register: remote_secret_key
|
||||||
when: gitea_secret_key | string | length == 0
|
when: gitea_secret_key | string | length == 0
|
||||||
|
|
||||||
|
@ -20,15 +20,15 @@
|
||||||
|
|
||||||
- name: Generate gitea INTERNAL_TOKEN if not provided
|
- name: Generate gitea INTERNAL_TOKEN if not provided
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.shell: 'umask 077; {{ gitea_full_executable_path }} generate secret INTERNAL_TOKEN > {{ gitea_configuraion_path }}/gitea_internal_token'
|
ansible.builtin.shell: 'umask 077; {{ gitea_full_executable_path }} generate secret INTERNAL_TOKEN > {{ gitea_configuration_path }}/gitea_internal_token'
|
||||||
args:
|
args:
|
||||||
creates: '{{ gitea_configuraion_path }}/gitea_internal_token'
|
creates: '{{ gitea_configuration_path }}/gitea_internal_token'
|
||||||
when: gitea_internal_token | string | length == 0
|
when: gitea_internal_token | string | length == 0
|
||||||
|
|
||||||
- name: Read gitea INTERNAL_TOKEN from file
|
- name: Read gitea INTERNAL_TOKEN from file
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.slurp:
|
ansible.builtin.slurp:
|
||||||
src: '{{ gitea_configuraion_path }}/gitea_internal_token'
|
src: '{{ gitea_configuration_path }}/gitea_internal_token'
|
||||||
register: remote_internal_token
|
register: remote_internal_token
|
||||||
when: gitea_internal_token | string | length == 0
|
when: gitea_internal_token | string | length == 0
|
||||||
|
|
||||||
|
|
|
@ -1,15 +1,15 @@
|
||||||
---
|
---
|
||||||
- name: Generate OAuth2 JWT_SECRET if not provided
|
- name: Generate OAuth2 JWT_SECRET if not provided
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.shell: 'umask 077; {{ gitea_full_executable_path }} generate secret JWT_SECRET > {{ gitea_configuraion_path }}/gitea_oauth_jwt_secret'
|
ansible.builtin.shell: 'umask 077; {{ gitea_full_executable_path }} generate secret JWT_SECRET > {{ gitea_configuration_path }}/gitea_oauth_jwt_secret'
|
||||||
args:
|
args:
|
||||||
creates: '{{ gitea_configuraion_path }}/gitea_oauth_jwt_secret'
|
creates: '{{ gitea_configuration_path }}/gitea_oauth_jwt_secret'
|
||||||
when: gitea_oauth2_jwt_secret | length == 0
|
when: gitea_oauth2_jwt_secret | length == 0
|
||||||
|
|
||||||
- name: Read OAuth2 JWT_SECRET from file
|
- name: Read OAuth2 JWT_SECRET from file
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.slurp:
|
ansible.builtin.slurp:
|
||||||
src: '{{ gitea_configuraion_path }}/gitea_oauth_jwt_secret'
|
src: '{{ gitea_configuration_path }}/gitea_oauth_jwt_secret'
|
||||||
register: oauth_jwt_secret
|
register: oauth_jwt_secret
|
||||||
when: gitea_oauth2_jwt_secret | length == 0
|
when: gitea_oauth2_jwt_secret | length == 0
|
||||||
|
|
||||||
|
@ -20,15 +20,15 @@
|
||||||
|
|
||||||
- name: Generate LFS JWT_SECRET if not provided
|
- name: Generate LFS JWT_SECRET if not provided
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.shell: 'umask 077; {{ gitea_full_executable_path }} generate secret JWT_SECRET > {{ gitea_configuraion_path }}/gitea_lfs_jwt_secret'
|
ansible.builtin.shell: 'umask 077; {{ gitea_full_executable_path }} generate secret JWT_SECRET > {{ gitea_configuration_path }}/gitea_lfs_jwt_secret'
|
||||||
args:
|
args:
|
||||||
creates: '{{ gitea_configuraion_path }}/gitea_lfs_jwt_secret'
|
creates: '{{ gitea_configuration_path }}/gitea_lfs_jwt_secret'
|
||||||
when: gitea_lfs_jwt_secret | length == 0
|
when: gitea_lfs_jwt_secret | length == 0
|
||||||
|
|
||||||
- name: Read LFS JWT_SECRET from file
|
- name: Read LFS JWT_SECRET from file
|
||||||
become: true
|
become: true
|
||||||
ansible.builtin.slurp:
|
ansible.builtin.slurp:
|
||||||
src: '{{ gitea_configuraion_path }}/gitea_lfs_jwt_secret'
|
src: '{{ gitea_configuration_path }}/gitea_lfs_jwt_secret'
|
||||||
register: lfs_jwt_secret
|
register: lfs_jwt_secret
|
||||||
when: gitea_lfs_jwt_secret | length == 0
|
when: gitea_lfs_jwt_secret | length == 0
|
||||||
|
|
||||||
|
|
|
@ -5,7 +5,7 @@ After=network.target
|
||||||
[Service]
|
[Service]
|
||||||
User={{ gitea_user }}
|
User={{ gitea_user }}
|
||||||
Group={{ gitea_group }}
|
Group={{ gitea_group }}
|
||||||
ExecStart={{ gitea_full_executable_path }} web --config {{ gitea_configuraion_path }}/gitea.ini --custom-path {{ gitea_custom }}/
|
ExecStart={{ gitea_full_executable_path }} web --config {{ gitea_configuration_path }}/gitea.ini --custom-path {{ gitea_custom }}/
|
||||||
Restart=on-failure
|
Restart=on-failure
|
||||||
WorkingDirectory={{ gitea_home }}
|
WorkingDirectory={{ gitea_home }}
|
||||||
{% if gitea_systemd_cap_net_bind_service %}
|
{% if gitea_systemd_cap_net_bind_service %}
|
||||||
|
|
Loading…
Reference in a new issue