Following-up improvments for various PRs (#25620)
For: * #22743 * #25408 * #25412 * #25588
This commit is contained in:
		
							parent
							
								
									469d89b95a
								
							
						
					
					
						commit
						cea9401634
					
				|  | @ -193,8 +193,8 @@ RUN_USER = ; git | |||
| ;; Use `ssh-keygen` to parse public SSH keys. The value is passed to the shell. By default, Gitea does the parsing itself. | ||||
| ;SSH_KEYGEN_PATH = | ||||
| ;; | ||||
| ;; Enable SSH Authorized Key Backup when rewriting all keys, default is true | ||||
| ;SSH_AUTHORIZED_KEYS_BACKUP = true | ||||
| ;; Enable SSH Authorized Key Backup when rewriting all keys, default is false | ||||
| ;SSH_AUTHORIZED_KEYS_BACKUP = false | ||||
| ;; | ||||
| ;; Determines which principals to allow | ||||
| ;; - empty: if SSH_TRUSTED_USER_CA_KEYS is empty this will default to off, otherwise will default to email, username. | ||||
|  | @ -303,7 +303,10 @@ RUN_USER = ; git | |||
| ;; | ||||
| ;; | ||||
| ;; LFS authentication secret, change this yourself | ||||
| LFS_JWT_SECRET = | ||||
| ;LFS_JWT_SECRET = | ||||
| ;; | ||||
| ;; Alternative location to specify LFS authentication secret. You cannot specify both this and LFS_JWT_SECRET, and must pick one | ||||
| ;LFS_JWT_SECRET_URI = file:/etc/gitea/lfs_jwt_secret | ||||
| ;; | ||||
| ;; LFS authentication validity period (in time.Duration), pushes taking longer than this may fail. | ||||
| ;LFS_HTTP_AUTH_EXPIRY = 24h | ||||
|  | @ -527,6 +530,9 @@ ENABLE = true | |||
| ;; This setting is only needed if JWT_SIGNING_ALGORITHM is set to HS256, HS384 or HS512. | ||||
| ;JWT_SECRET = | ||||
| ;; | ||||
| ;; Alternative location to specify OAuth2 authentication secret. You cannot specify both this and JWT_SECRET, and must pick one | ||||
| ;JWT_SECRET_URI = file:/etc/gitea/oauth2_jwt_secret | ||||
| ;; | ||||
| ;; Lifetime of an OAuth2 access token in seconds | ||||
| ;ACCESS_TOKEN_EXPIRATION_TIME = 3600 | ||||
| ;; | ||||
|  |  | |||
|  | @ -336,7 +336,7 @@ The following configuration set `Content-Type: application/vnd.android.package-a | |||
| - `SSH_LISTEN_PORT`: **%(SSH\_PORT)s**: Port for the built-in SSH server. | ||||
| - `SSH_ROOT_PATH`: **~/.ssh**: Root path of SSH directory. | ||||
| - `SSH_CREATE_AUTHORIZED_KEYS_FILE`: **true**: Gitea will create a authorized_keys file by default when it is not using the internal ssh server. If you intend to use the AuthorizedKeysCommand functionality then you should turn this off. | ||||
| - `SSH_AUTHORIZED_KEYS_BACKUP`: **true**: Enable SSH Authorized Key Backup when rewriting all keys, default is true. | ||||
| - `SSH_AUTHORIZED_KEYS_BACKUP`: **false**: Enable SSH Authorized Key Backup when rewriting all keys, default is false. | ||||
| - `SSH_TRUSTED_USER_CA_KEYS`: **\<empty\>**: Specifies the public keys of certificate authorities that are trusted to sign user certificates for authentication. Multiple keys should be comma separated. E.g.`ssh-<algorithm> <key>` or `ssh-<algorithm> <key1>, ssh-<algorithm> <key2>`. For more information see `TrustedUserCAKeys` in the sshd config man pages. When empty no file will be created and `SSH_AUTHORIZED_PRINCIPALS_ALLOW` will default to `off`. | ||||
| - `SSH_TRUSTED_USER_CA_KEYS_FILENAME`: **`RUN_USER`/.ssh/gitea-trusted-user-ca-keys.pem**: Absolute path of the `TrustedUserCaKeys` file Gitea will manage. If you're running your own ssh server and you want to use the Gitea managed file you'll also need to modify your sshd_config to point to this file. The official docker image will automatically work without further configuration. | ||||
| - `SSH_AUTHORIZED_PRINCIPALS_ALLOW`: **off** or **username, email**: \[off, username, email, anything\]: Specify the principals values that users are allowed to use as principal. When set to `anything` no checks are done on the principal string. When set to `off` authorized principal are not allowed to be set. | ||||
|  | @ -368,6 +368,7 @@ The following configuration set `Content-Type: application/vnd.android.package-a | |||
| - `LFS_START_SERVER`: **false**: Enables Git LFS support. | ||||
| - `LFS_CONTENT_PATH`: **%(APP_DATA_PATH)s/lfs**: Default LFS content path. (if it is on local storage.) **DEPRECATED** use settings in `[lfs]`. | ||||
| - `LFS_JWT_SECRET`: **\<empty\>**: LFS authentication secret, change this a unique string. | ||||
| - `LFS_JWT_SECRET_URI`: **\<empty\>**: Instead of defining LFS_JWT_SECRET in the configuration, this configuration option can be used to give Gitea a path to a file that contains the secret (example value: `file:/etc/gitea/lfs_jwt_secret`) | ||||
| - `LFS_HTTP_AUTH_EXPIRY`: **24h**: LFS authentication validity period in time.Duration, pushes taking longer than this may fail. | ||||
| - `LFS_MAX_FILE_SIZE`: **0**: Maximum allowed LFS file size in bytes (Set to 0 for no limit). | ||||
| - `LFS_LOCKS_PAGING_NUM`: **50**: Maximum number of LFS Locks returned per page. | ||||
|  | @ -1097,6 +1098,7 @@ This section only does "set" config, a removed config key from this section won' | |||
| - `INVALIDATE_REFRESH_TOKENS`: **false**: Check if refresh token has already been used | ||||
| - `JWT_SIGNING_ALGORITHM`: **RS256**: Algorithm used to sign OAuth2 tokens. Valid values: \[`HS256`, `HS384`, `HS512`, `RS256`, `RS384`, `RS512`, `ES256`, `ES384`, `ES512`\] | ||||
| - `JWT_SECRET`: **\<empty\>**: OAuth2 authentication secret for access and refresh tokens, change this to a unique string. This setting is only needed if `JWT_SIGNING_ALGORITHM` is set to `HS256`, `HS384` or `HS512`. | ||||
| - `JWT_SECRET_URI`: **\<empty\>**: Instead of defining JWT_SECRET in the configuration, this configuration option can be used to give Gitea a path to a file that contains the secret (example value: `file:/etc/gitea/oauth2_jwt_secret`) | ||||
| - `JWT_SIGNING_PRIVATE_KEY_FILE`: **jwt/private.pem**: Private key file path used to sign OAuth2 tokens. The path is relative to `APP_DATA_PATH`. This setting is only needed if `JWT_SIGNING_ALGORITHM` is set to `RS256`, `RS384`, `RS512`, `ES256`, `ES384` or `ES512`. The file must contain a RSA or ECDSA private key in the PKCS8 format. If no key exists a 4096 bit key will be created for you. | ||||
| - `MAX_TOKEN_LENGTH`: **32767**: Maximum length of token/cookie to accept from OAuth2 provider | ||||
| 
 | ||||
|  |  | |||
|  | @ -101,9 +101,9 @@ func (err ErrBranchesEqual) Unwrap() error { | |||
| type Branch struct { | ||||
| 	ID            int64 | ||||
| 	RepoID        int64  `xorm:"UNIQUE(s)"` | ||||
| 	Name          string `xorm:"UNIQUE(s) NOT NULL"` | ||||
| 	Name          string `xorm:"UNIQUE(s) NOT NULL"` // git's ref-name is case-sensitive internally, however, in some databases (mssql, mysql, by default), it's case-insensitive at the moment
 | ||||
| 	CommitID      string | ||||
| 	CommitMessage string `xorm:"TEXT"` | ||||
| 	CommitMessage string `xorm:"TEXT"` // it only stores the message summary (the first line)
 | ||||
| 	PusherID      int64 | ||||
| 	Pusher        *user_model.User `xorm:"-"` | ||||
| 	IsDeleted     bool             `xorm:"index"` | ||||
|  |  | |||
		Loading…
	
		Reference in New Issue