jojo/cmd
Mathieu Fenniak 70f7260e66 feat: add CLI command 'admin user create-authorized-integration' (#12299)
Allows the creation of an authorized integration as a Forgejo administrator, either for development testing or to support server-automation.  Clipping out the CLI config options, looks like:

```
NAME:
   forgejo admin user create-authorized-integration - Create an authorized integration for a specific user

USAGE:
   forgejo admin user create-authorized-integration [options]

OPTIONS:
   --username string, -u string                               Username
   --issuer string                                            JWT issuer ('iss' claim), example: https://forgejo.example.org/api/actions
   --claim-eq string=string [ --claim-eq string=string ]      Zero-or-more claim equality checks, formatted as claim=value, example: "actor=someuser"
   --claim-glob string=string [ --claim-glob string=string ]  Zero-or-more claim glob checks, formatted as claim=value, example: "sub=repo:forgejo/*:pull_request"
   --scope string [ --scope string ]                          One-or-more scopes to apply to access token, examples: "all", "read:issue", "write:repository" (default: "all")
   --repo string [ --repo string ]                            Zero-or-more specific repositories that can be accessed, or "all" to allow access to all repositories, example: "owner1/repo1" (default: "all")
```

As an example, this will create an authorized integration that will permit Codeberg's Forgejo Actions to generate trusted JWTs that can access the local user `mfenniak`:
```bash
$ ./forgejo admin user create-authorized-integration \
    --username mfenniak \
    --issuer https://codeberg.org/api/actions \
    --claim-eq sub=repo:mfenniak/forgejo-runner-testrepo:pull_request \
    --scope read:user

{
  "message": "Authorized integration was successfully created.",
  "issuer": "https://codeberg.org/api/actions",
  "audience": "u:1:c97d83bc-fa4e-4db3-b898-414cd5b6ce33",
  "claim_rules": [
    {
      "description": "\"sub\" = \"repo:mfenniak/forgejo-runner-testrepo:pull_request\"",
      "claim": "sub",
      "compare": "eq",
      "value": "repo:mfenniak/forgejo-runner-testrepo:pull_request"
    }
  ]
}
```

The output is a JSON document to aid in use in automation.  The `audience` field is the audience generated by Forgejo that must be used by the remote to generate the JWT.  Continuing this example to the client-side, a matching Forgejo Action like this in the `mfenniak/forgejo-runner-testrepo` repo, for a `pull_request` event, then it will be able to access the Forgejo server that the authorized integration was created on like this:

```yaml
on:
  pull_request:

enable-openid-connect: true

jobs:
  job1:
    runs-on: docker
    steps:
      - name: Fetch JWT
        id: jwt
        run: |
          set -eux -o pipefail
          set +x
          jwt=$(curl --fail \
            -H "Authorization: bearer $ACTIONS_ID_TOKEN_REQUEST_TOKEN" "$ACTIONS_ID_TOKEN_REQUEST_URL&audience=u:1:c97d83bc-fa4e-4db3-b898-414cd5b6ce33" \
            | jq -r ".value")
          echo "::add-mask::$jwt"
          set -x
          echo "jwt=$jwt" >> $FORGEJO_OUTPUT

      - name: API call to Forgejo
        run: |
          curl \
            -v --fail \
            -H "Authorization: bearer ${{ steps.jwt.outputs.jwt }}" \
            "https://example.org/api/v1/user" | jq
```

CLI command is tested manually.  Supporting functions have associated unit tests.

## Checklist

The [contributor guide](https://forgejo.org/docs/next/contributor/) contains information that will be helpful to first time contributors. All work and communication must conform to Forgejo's [AI Agreement](https://codeberg.org/forgejo/governance/src/branch/main/AIAgreement.md). There also are a few [conditions for merging Pull Requests in Forgejo repositories](https://codeberg.org/forgejo/governance/src/branch/main/PullRequestsAgreement.md). You are also welcome to join the [Forgejo development chatroom](https://matrix.to/#/#forgejo-development:matrix.org).

### Tests for Go changes

- I added test coverage for Go changes...
  - [x] in their respective `*_test.go` for unit tests.
  - [ ] in the `tests/integration` directory if it involves interactions with a live Forgejo server.
- I ran...
  - [x] `make pr-go` before pushing

### Documentation

- [ ] I created a pull request [to the documentation](https://codeberg.org/forgejo/docs) to explain to Forgejo users how to use this change.
- [x] I did not document these changes and I do not expect someone else to do it.
    - CLI update should be automatic in docs -- more detailed Authorized Integration documentation is on my project plan.

### Release notes

- [x] This change will be noticed by a Forgejo user or admin (feature, bug fix, performance, etc.). I suggest to include a release note for this change.
- [ ] This change is not visible to a Forgejo user or admin (refactor, dependency upgrade, etc.). I think there is no need to add a release note for this change.

Reviewed-on: https://codeberg.org/forgejo/forgejo/pulls/12299
Reviewed-by: Andreas Ahlenstorf <aahlenst@noreply.codeberg.org>
2026-04-28 21:32:45 +02:00
..
forgejo ci: detect and prevent empty case statements in Go code (#11593) 2026-03-10 02:50:28 +01:00
actions.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
admin.go feat: replace repo based server-side hooks with centralised hooks (#10397) 2026-04-27 22:34:46 +02:00
admin_auth.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
admin_auth_ldap.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
admin_auth_ldap_test.go chore(upgrade): urfave/cli from v2 to v3 (#8035) 2025-06-01 22:16:37 +02:00
admin_auth_oauth.go feat: allow sync quota groups with oauth2 auth source (#8554) 2025-12-01 14:12:00 +01:00
admin_auth_oauth_test.go feat: allow sync quota groups with oauth2 auth source (#8554) 2025-12-01 14:12:00 +01:00
admin_auth_pam.go feat: allow to add pam source from command line (#10388) 2025-12-19 15:20:52 +01:00
admin_auth_pam_test.go feat: allow to add pam source from command line (#10388) 2025-12-19 15:20:52 +01:00
admin_auth_smtp.go fix: rename a file with typo STMP -> SMTP (#10389) 2025-12-10 14:20:05 +01:00
admin_regenerate.go feat: replace repo based server-side hooks with centralised hooks (#10397) 2026-04-27 22:34:46 +02:00
admin_user.go feat: add CLI command 'admin user create-authorized-integration' (#12299) 2026-04-28 21:32:45 +02:00
admin_user_change_password.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
admin_user_create.go feat: backend DB model for fine-grained repo access tokens 2026-02-27 17:17:29 +01:00
admin_user_delete.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
admin_user_generate_access_token.go feat: backend DB model for fine-grained repo access tokens 2026-02-27 17:17:29 +01:00
admin_user_generate_authorized_integration.go feat: add CLI command 'admin user create-authorized-integration' (#12299) 2026-04-28 21:32:45 +02:00
admin_user_list.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
admin_user_must_change_password.go chore(upgrade): urfave/cli from v2 to v3 (#8035) 2025-06-01 22:16:37 +02:00
admin_user_reset_mfa.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
cert.go chore: add modernizer linter (#11936) 2026-04-02 03:29:37 +02:00
cmd.go chore: use signal.NotifyContext over custom implementation (#10311) 2026-03-04 00:45:38 +01:00
cmd_test.go chore: use signal.NotifyContext over custom implementation (#10311) 2026-03-04 00:45:38 +01:00
doctor.go chore: correct spelling error in cleanup-commit-status CLI docs (#10780) 2026-01-11 23:36:19 +01:00
doctor_convert.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
doctor_test.go chore(upgrade): urfave/cli from v2 to v3 (#8035) 2025-06-01 22:16:37 +02:00
dump.go feat: enable compression on zip dump (#12296) 2026-04-28 02:11:26 +02:00
dump_repo.go chore: add modernizer linter (#11936) 2026-04-02 03:29:37 +02:00
dump_test.go feat: Replace mholt/archiver/v3 with mholt/archives (#7025) 2025-08-08 06:53:20 +02:00
embedded.go chore(upgrade): urfave/cli from v2 to v3 (#8035) 2025-06-01 22:16:37 +02:00
generate.go chore: unify the usage of CryptoRandomString (#10110) 2025-11-15 13:24:53 +01:00
hook.go chore: fix typos throughout the codebase (#10753) 2026-01-26 22:57:33 +01:00
hook_test.go fix: incorrect whitespace handling on pre&post receive hooks 2026-01-06 09:58:20 -07:00
keys.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
mailer.go chore: fix typos throughout the codebase (#10753) 2026-01-26 22:57:33 +01:00
main.go Update module github.com/urfave/cli/v3 to v3.7.0 (forgejo) (#11713) 2026-03-18 20:23:38 +01:00
main_test.go feat: replace repo based server-side hooks with centralised hooks (#10397) 2026-04-27 22:34:46 +02:00
manager.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
manager_logging.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
migrate.go chore: rename 'migrations' to 'gitea_migrations' 2025-10-14 14:40:49 -06:00
migrate_storage.go chore: rename 'migrations' to 'gitea_migrations' 2025-10-14 14:40:49 -06:00
migrate_storage_test.go Update module github.com/golangci/golangci-lint/cmd/golangci-lint to v2 (forgejo) (#7367) 2025-03-28 22:22:21 +00:00
restore_repo.go fix!: detect extra cmdline args and emit errors (#9458) 2025-10-08 18:20:28 +02:00
serv.go chore: unify signing key configuration across modules (#11194) 2026-04-21 19:39:33 +02:00
web.go chore: don't load settings twice for running web (#12111) 2026-04-14 07:25:05 +02:00
web_acme.go fix: use correct ACME default (#8550) 2025-07-17 20:40:09 +02:00
web_graceful.go chore: branding import path (#7337) 2025-03-27 19:40:14 +00:00
web_https.go chore: branding import path (#7337) 2025-03-27 19:40:14 +00:00