Commit graph

167 commits

Author SHA1 Message Date
6543
bfc4aa8059
Enforce code format (#228)
* format .drone.yml & go code

* improve .editorconfig

* extend Makefile

* enforce go code format

* fix space

* update deps

* clean up
2021-06-22 12:34:35 +02:00
techknowlogick
77e046b47f
Add OAuth2 Support for Gitea Remote (#226)
* add oauth support for Gitea

* go fmt

* cli flags
2021-06-17 09:02:44 +02:00
Marian Steinbach
16bdc9fe12
Move flag definitions into extra files (#215) 2021-05-31 14:35:47 +02:00
Marian Steinbach
3d083ec058
Remove unused code in server (#213) 2021-05-31 14:34:00 +02:00
Marian Steinbach
8f76192b77
Show all env var names in log messages (#208) 2021-05-31 13:28:24 +02:00
Alex Eftimie
a3a361ad10
Update setup.go 2021-05-27 07:27:13 +02:00
Alex Eftimie
943a308afe Allow configuring the URL to user documentation 2021-05-27 06:58:30 +02:00
Laszlo Fogas
c7ebd68232 Relaced laszlocph/woodpecker with woodpecker-ci/woodpecker 2021-05-25 14:08:27 +02:00
Laszlo Fogas
5ea7098569 Go 1.16, go fmt, go modules update 2021-02-19 09:43:03 +01:00
Jens
6137045247 Add WOODPECKER_ variables 2020-08-26 13:40:26 +00:00
Jens Heinrich
aaf80259d3
Update server.go
Reference both possible values to make debugging easier
2020-08-04 18:03:15 +02:00
Laszlo Fogas
6feae313ec
Merge pull request #120 from imduffy15/docker-config-secrets
Add global registry from docker config file on woodpecker server
2020-05-20 08:43:11 +02:00
Laszlo Fogas
14636cc226
Merge pull request #119 from imduffy15/owner-filter
Add whitelist for syncable owners
2020-05-20 06:53:24 +02:00
Ian
de010dfb39 Add global registry from docker config file on woodpecker server 2020-05-19 13:44:16 +01:00
Laszlo Fogas
1444b06a7e
Merge pull request #118 from imduffy15/global-envs
Add support for a global env from a server flag
2020-05-19 14:26:33 +02:00
Ian
0d90789422 Add whitelist for syncable owners 2020-05-18 16:58:59 +01:00
Ian
070f6ea49c Add support for a global env from a server flag 2020-05-18 16:48:31 +01:00
Ian
a11db91e49 Upgrade dependencies 2020-05-18 16:41:15 +01:00
Laszlo Fogas
8dee34878d Version is now a string coming from ldlags and git tags 2019-11-12 21:10:16 +01:00
Laszlo Fogas
630c383181 Project is renamed to Woodpecker 2019-08-27 13:07:19 +02:00
Laszlo Fogas
f0c641fa9d Exposing waiting job count as metric 2019-07-10 10:00:38 +02:00
Laszlo Fogas
1d564e978f More prometheus metrics, refactoring 2019-06-28 14:28:41 +02:00
Laszlo Fogas
f25317599a Unlimited 2019-06-01 09:45:20 +02:00
Laszlo Fogas
16d68eddbf Was throwing: currval of sequence builds_build_id_seq is not yet defined in this session 2019-05-30 14:06:49 +02:00
Laszlo Fogas
f65c4993c1 Fixes 2019-05-30 12:15:29 +02:00
Laszlo Fogas
5dc9f7dc83 Reimlemented metrics 2019-05-30 11:11:14 +02:00
Laszlo Fogas
a4541ac901 Pull in cncd/* for simpler workflow 2019-04-06 15:44:04 +02:00
Laszlo Fogas
ca5817ffc2 Renamed package 2019-04-04 20:51:20 +02:00
Brad Rydzewski
6a651f1e39 move vault params to extras 2018-05-01 21:05:30 -07:00
Matt Leung
187d1d65bb add additional opt to set v.auth 2018-04-27 14:50:47 -07:00
Matt Leung
79428aa231 Enable Vault auth through kubernetes auth method
Added a feature to obtain the initial Vault token from the Kubernetes
auth method.

This works by making a request to the Vault server at the specified auth
method mount point's login path and presenting the JWT located in a file
on a running pod, along with the Kubernetes role to authenticate as.

Vault will then respond with a token and its TTL, if the request is valid.
2018-04-24 14:56:28 -07:00
Brad Rydzewski
897eb95bcd
Merge pull request #2369 from JonasFranzDEV/master
Add context to Gitea status
2018-03-30 09:32:09 -07:00
Thomas Boerger
06ff6b50ed
Use specific token for prometheus metrics 2018-03-27 22:22:19 +02:00
Thomas Boerger
7f49e69607
Just fixed format with go fmt ./... 2018-03-21 14:02:17 +01:00
Jonas Franz
6a32935011
Add context to gitea status
Signed-off-by: Jonas Franz <info@jonasfranz.software>
2018-03-10 20:11:34 +01:00
Brad Rydzewski
580fe9abb7 add apache license header to files 2018-02-19 14:24:10 -08:00
Brad Rydzewski
ce740a635e
Merge pull request #2295 from jmccann/keepalive_server
Allow setting MinTime for keepalive enforcement on server
2018-02-19 13:36:13 -08:00
Tony Li
9651a8043e
add usage for cpu-set 2018-02-13 10:41:36 -08:00
Tony Li
84954e2d20
fix verbage 2018-01-30 13:30:06 -05:00
Tony Li
0a6666b4bf
update server-agent usage 2018-01-30 13:28:17 -05:00
Tony Li
22522bfe44
update server usages 2018-01-30 13:28:07 -05:00
Tony Li
73914fdbd5
update server cli usage 2018-01-29 19:21:32 -05:00
Jacob McCann
8295166ca4 Update usage for keepalive-min-time 2018-01-24 08:41:11 -06:00
jhernandezb
546e0bad00
Fix autocert generation 2018-01-18 10:33:41 -06:00
jhernandezb
32e80eca20
lets encrypt: migrate to http-01 challenge 2018-01-12 22:54:49 -06:00
Jacob McCann
6eb9af01c6 Allow setting MinTime for keepalive enforcement on server
This allows setting agent keepalive Time at value < 5m
2018-01-08 14:46:44 -06:00
Jesse Lang
b339532e0c Fix DRONE_HOST check 2017-12-20 06:49:02 -06:00
Jesse Lang
453f415cc4 Validate DRONE_HOST to ensure it contains a scheme and not a trailing slash 2017-12-19 20:08:55 -06:00
Mark Spicer
8476c90bbf Set the redirect handler for lets encrypt.
This commit sets the http handler to the redirect function for let's encrypt
enabled drone instances. In addition, the `Strict-Transport-Security` header is
added to the redirect given `header.Secure` will only be added for gin routes.

This commit resolves #2261.
2017-11-15 23:27:57 -05:00
Mark Spicer
238e916fa0 Redirect HTTP to HTTPS when SSL is enabled.
In our current drone setup, we are not using a proxy, thus letting drone handle
SSL termination. In addition, we are not exposing port 80 (effectively disabling
insecure drone access). When new engineers join and attempt to access drone,
they are not sent a 301 and often complain that they either do not have access
or that drone is broken (when in reality they are just accessing drone via the
incorrect protocol/port).

This commit changes the default behavior when running drone with a server-cert
by only sending redirects on port 80 rather than allowing both secure and
insecure access.
2017-11-15 21:36:02 -05:00