Commit graph

139 commits

Author SHA1 Message Date
Brad Rydzewski
6a651f1e39 move vault params to extras 2018-05-01 21:05:30 -07:00
Matt Leung
187d1d65bb add additional opt to set v.auth 2018-04-27 14:50:47 -07:00
Matt Leung
79428aa231 Enable Vault auth through kubernetes auth method
Added a feature to obtain the initial Vault token from the Kubernetes
auth method.

This works by making a request to the Vault server at the specified auth
method mount point's login path and presenting the JWT located in a file
on a running pod, along with the Kubernetes role to authenticate as.

Vault will then respond with a token and its TTL, if the request is valid.
2018-04-24 14:56:28 -07:00
Brad Rydzewski
897eb95bcd
Merge pull request #2369 from JonasFranzDEV/master
Add context to Gitea status
2018-03-30 09:32:09 -07:00
Thomas Boerger
06ff6b50ed
Use specific token for prometheus metrics 2018-03-27 22:22:19 +02:00
Thomas Boerger
7f49e69607
Just fixed format with go fmt ./... 2018-03-21 14:02:17 +01:00
Jonas Franz
6a32935011
Add context to gitea status
Signed-off-by: Jonas Franz <info@jonasfranz.software>
2018-03-10 20:11:34 +01:00
Brad Rydzewski
580fe9abb7 add apache license header to files 2018-02-19 14:24:10 -08:00
Brad Rydzewski
ce740a635e
Merge pull request #2295 from jmccann/keepalive_server
Allow setting MinTime for keepalive enforcement on server
2018-02-19 13:36:13 -08:00
Tony Li
9651a8043e
add usage for cpu-set 2018-02-13 10:41:36 -08:00
Tony Li
84954e2d20
fix verbage 2018-01-30 13:30:06 -05:00
Tony Li
0a6666b4bf
update server-agent usage 2018-01-30 13:28:17 -05:00
Tony Li
22522bfe44
update server usages 2018-01-30 13:28:07 -05:00
Tony Li
73914fdbd5
update server cli usage 2018-01-29 19:21:32 -05:00
Jacob McCann
8295166ca4 Update usage for keepalive-min-time 2018-01-24 08:41:11 -06:00
jhernandezb
546e0bad00
Fix autocert generation 2018-01-18 10:33:41 -06:00
jhernandezb
32e80eca20
lets encrypt: migrate to http-01 challenge 2018-01-12 22:54:49 -06:00
Jacob McCann
6eb9af01c6 Allow setting MinTime for keepalive enforcement on server
This allows setting agent keepalive Time at value < 5m
2018-01-08 14:46:44 -06:00
Jesse Lang
b339532e0c Fix DRONE_HOST check 2017-12-20 06:49:02 -06:00
Jesse Lang
453f415cc4 Validate DRONE_HOST to ensure it contains a scheme and not a trailing slash 2017-12-19 20:08:55 -06:00
Mark Spicer
8476c90bbf Set the redirect handler for lets encrypt.
This commit sets the http handler to the redirect function for let's encrypt
enabled drone instances. In addition, the `Strict-Transport-Security` header is
added to the redirect given `header.Secure` will only be added for gin routes.

This commit resolves #2261.
2017-11-15 23:27:57 -05:00
Mark Spicer
238e916fa0 Redirect HTTP to HTTPS when SSL is enabled.
In our current drone setup, we are not using a proxy, thus letting drone handle
SSL termination. In addition, we are not exposing port 80 (effectively disabling
insecure drone access). When new engineers join and attempt to access drone,
they are not sent a 301 and often complain that they either do not have access
or that drone is broken (when in reality they are just accessing drone via the
incorrect protocol/port).

This commit changes the default behavior when running drone with a server-cert
by only sending redirects on port 80 rather than allowing both secure and
insecure access.
2017-11-15 21:36:02 -05:00
Brad Rydzewski
ec6016062b show loading status in user interface 2017-09-20 12:29:57 -07:00
Brad Rydzewski
ae51e9d1b9 force downgrade to http/1.1 because safari 2017-09-19 15:30:31 -07:00
Brad Rydzewski
bf454572f2 Merge pull request #2215 from bradrydzewski/master
add gitlab v3 option for backward compat
2017-09-14 07:57:53 -07:00
Brad Rydzewski
913d8701f2 add gitlab v3 option for backward compat 2017-09-14 07:50:07 -07:00
Matt Leung
820d07263b Add server env var to specify .drone.yml location
Allow setting DRONE_REPO_CONFIG to override default location of .drone.yml
2017-09-12 17:06:12 -07:00
Brad Rydzewski
25c9b8050a introduce limiter for planned refactoring 2017-09-11 10:22:45 -07:00
Joachim Hill-Grannec
c30198e412 Adding Environment variable to configure the session expiration 2017-08-17 12:50:31 -07:00
Brad Rydzewski
241d994a26 abstract the user interface 2017-07-31 15:15:05 -04:00
Brad Rydzewski
99b10537ba enable redirect for http to https when certs provided 2017-07-26 10:44:38 -04:00
Brad Rydzewski
5e735c2632 improve experimental quic setup 2017-07-24 21:46:00 -04:00
Brad Rydzewski
2c8dbef79f implement quic server 2017-07-24 19:15:25 -04:00
Brad Rydzewski
07c82aa1c6 Merge remote-tracking branch 'origin' 2017-07-24 13:23:47 -04:00
Brad Rydzewski
39251a85a9 removed unused and broken packages 2017-07-24 13:23:22 -04:00
mingshun
eb94dc0419 Added integration for coding.net 2017-07-22 17:12:09 +08:00
Brad Rydzewski
35e0ee2e5f implement sync logic 2017-07-14 15:58:38 -04:00
Brad Rydzewski
f7066473c1 require DRONE_HOST on startup 2017-07-12 14:48:56 -04:00
Brad Rydzewski
a625f06c1a enable grpc auth 2017-06-29 19:35:38 -04:00
Brad Rydzewski
1a6920e822 separate agent and server binary 2017-06-29 18:51:22 -04:00
Brad Rydzewski
155576fb03 moved to single binary project structure 2015-09-29 17:53:21 -07:00
Dan Williams
0407297229 Make exiting edit back to repo view more efficent 2015-09-28 16:54:51 -04:00
Brad Rydzewski
8535ea44fd generate token via the UI 2015-09-09 14:34:28 -07:00
Brad Rydzewski
cdfec98cf4 cleaned up the token implementation for #1175 2015-09-09 14:05:52 -07:00
Brad Rydzewski
af82f7aa2c removed old, unused config package 2015-09-08 18:55:03 -07:00
Brad Rydzewski
2fcfd8100a re-enable SSL 2015-09-08 14:19:39 -07:00
Brad Rydzewski
c53e7173aa purging agent code from 0.4 ... out of scope for 0.4 release 2015-09-08 14:14:03 -07:00
Brad Rydzewski
008a16f7e7 removed drone-build to its owner repository, drone/drone-exec 2015-09-08 14:02:48 -07:00
Brad Rydzewski
5feac33f85 put yaml unmarshal after find/replace 2015-09-07 19:24:14 -07:00
Brad Rydzewski
5f802056e0 ability to encrypt the .drone.sec file 2015-09-07 15:33:55 -07:00