Skip to content

Commit 421f96c

Browse files
chmouelclaude
andcommitted
docs(forgejo): fix incorrect webhook signature validation claim
The documentation incorrectly stated that PAC does not validate webhook signatures for Forgejo/Gitea. The code at pkg/provider/gitea/gitea.go fully implements HMAC-SHA256 signature validation using both X-Forgejo-Signature and X-Gitea-Signature headers. Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1 parent 4c8cf58 commit 421f96c

File tree

1 file changed

+1
-1
lines changed

1 file changed

+1
-1
lines changed

docs/content/docs/providers/forgejo.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -132,7 +132,7 @@ spec:
132132

133133
- **Forgejo Instance URL**: Specify `git_provider.url` pointing to your Forgejo instance URL.
134134

135-
- **Webhook Secret**: Pipelines-as-Code does not currently validate webhook signatures for Forgejo/Gitea. Secrets can be stored, but requests are accepted without signature verification.
135+
- **Webhook Secret**: Pipelines-as-Code validates webhook signatures for Forgejo/Gitea using HMAC-SHA256. A webhook secret must be configured both in the Forgejo webhook settings and in the Kubernetes secret referenced by the Repository CR. Requests without a valid signature will be rejected.
136136

137137
- The `git_provider.secret` key cannot reference a secret in another namespace. Pipelines-as-Code always assumes it is in the same namespace where the Repository CR has been created.
138138

0 commit comments

Comments
 (0)