diff --git a/host_vars/forgejo.mgrote.net.yml b/host_vars/forgejo.mgrote.net.yml index 5c202e71..3f623bf5 100644 --- a/host_vars/forgejo.mgrote.net.yml +++ b/host_vars/forgejo.mgrote.net.yml @@ -81,14 +81,14 @@ gitea_db_type: "postgres" gitea_db_host: "localhost" gitea_db_name: "gitea" gitea_db_user: "gitea" -gitea_db_password: "{{ lookup('keepass', 'gitea_db_password', 'password') }}" +gitea_db_password: "{{ lookup('keepass', 'forgejo_db_password', 'password') }}" # indexer gitea_repo_indexer_enabled: true # security gitea_disable_webhooks: false gitea_password_check_pwn: false -gitea_internal_token: "{{ lookup('keepass', 'gitea_internal_token', 'password') }}" -gitea_secret_key: "{{ lookup('keepass', 'gitea_secret_key', 'password') }}" +gitea_internal_token: "{{ lookup('keepass', 'forgejo_internal_token', 'password') }}" +gitea_secret_key: "{{ lookup('keepass', 'forgejo_secret_key', 'password') }}" # service gitea_disable_registration: true gitea_register_email_confirm: true @@ -127,7 +127,7 @@ gitea_extra_config: | [migrations] ALLOWED_DOMAINS = * # oauth2 -gitea_oauth2_jwt_secret: "{{ lookup('keepass', 'gitea_oauth2_jwt_secret', 'password') }}" +gitea_oauth2_jwt_secret: "{{ lookup('keepass', 'forgejo_oauth2_jwt_secret', 'password') }}" # Fail2Ban configuration gitea_fail2ban_enabled: true gitea_fail2ban_jail_maxretry: "3" diff --git a/keepass_db.kdbx b/keepass_db.kdbx index 279fd743..b0f5aabf 100644 Binary files a/keepass_db.kdbx and b/keepass_db.kdbx differ