Laszlo Fogas
f0c641fa9d
Exposing waiting job count as metric
2019-07-10 10:00:38 +02:00
Laszlo Fogas
1d564e978f
More prometheus metrics, refactoring
2019-06-28 14:28:41 +02:00
Laszlo Fogas
f25317599a
Unlimited
2019-06-01 09:45:20 +02:00
Laszlo Fogas
16d68eddbf
Was throwing: currval of sequence builds_build_id_seq is not yet defined in this session
2019-05-30 14:06:49 +02:00
Laszlo Fogas
f65c4993c1
Fixes
2019-05-30 12:15:29 +02:00
Laszlo Fogas
5dc9f7dc83
Reimlemented metrics
2019-05-30 11:11:14 +02:00
Laszlo Fogas
a4541ac901
Pull in cncd/* for simpler workflow
2019-04-06 15:44:04 +02:00
Laszlo Fogas
ca5817ffc2
Renamed package
2019-04-04 20:51:20 +02:00
Brad Rydzewski
6a651f1e39
move vault params to extras
2018-05-01 21:05:30 -07:00
Matt Leung
187d1d65bb
add additional opt to set v.auth
2018-04-27 14:50:47 -07:00
Matt Leung
79428aa231
Enable Vault auth through kubernetes auth method
...
Added a feature to obtain the initial Vault token from the Kubernetes
auth method.
This works by making a request to the Vault server at the specified auth
method mount point's login path and presenting the JWT located in a file
on a running pod, along with the Kubernetes role to authenticate as.
Vault will then respond with a token and its TTL, if the request is valid.
2018-04-24 14:56:28 -07:00
Brad Rydzewski
897eb95bcd
Merge pull request #2369 from JonasFranzDEV/master
...
Add context to Gitea status
2018-03-30 09:32:09 -07:00
Thomas Boerger
06ff6b50ed
Use specific token for prometheus metrics
2018-03-27 22:22:19 +02:00
Thomas Boerger
7f49e69607
Just fixed format with go fmt ./...
2018-03-21 14:02:17 +01:00
Jonas Franz
6a32935011
Add context to gitea status
...
Signed-off-by: Jonas Franz <info@jonasfranz.software>
2018-03-10 20:11:34 +01:00
Brad Rydzewski
580fe9abb7
add apache license header to files
2018-02-19 14:24:10 -08:00
Brad Rydzewski
ce740a635e
Merge pull request #2295 from jmccann/keepalive_server
...
Allow setting MinTime for keepalive enforcement on server
2018-02-19 13:36:13 -08:00
Tony Li
9651a8043e
add usage for cpu-set
2018-02-13 10:41:36 -08:00
Tony Li
84954e2d20
fix verbage
2018-01-30 13:30:06 -05:00
Tony Li
0a6666b4bf
update server-agent usage
2018-01-30 13:28:17 -05:00
Tony Li
22522bfe44
update server usages
2018-01-30 13:28:07 -05:00
Tony Li
73914fdbd5
update server cli usage
2018-01-29 19:21:32 -05:00
Jacob McCann
8295166ca4
Update usage for keepalive-min-time
2018-01-24 08:41:11 -06:00
jhernandezb
546e0bad00
Fix autocert generation
2018-01-18 10:33:41 -06:00
jhernandezb
32e80eca20
lets encrypt: migrate to http-01 challenge
2018-01-12 22:54:49 -06:00
Jacob McCann
6eb9af01c6
Allow setting MinTime for keepalive enforcement on server
...
This allows setting agent keepalive Time at value < 5m
2018-01-08 14:46:44 -06:00
Jesse Lang
b339532e0c
Fix DRONE_HOST check
2017-12-20 06:49:02 -06:00
Jesse Lang
453f415cc4
Validate DRONE_HOST to ensure it contains a scheme and not a trailing slash
2017-12-19 20:08:55 -06:00
Mark Spicer
8476c90bbf
Set the redirect handler for lets encrypt.
...
This commit sets the http handler to the redirect function for let's encrypt
enabled drone instances. In addition, the `Strict-Transport-Security` header is
added to the redirect given `header.Secure` will only be added for gin routes.
This commit resolves #2261 .
2017-11-15 23:27:57 -05:00
Mark Spicer
238e916fa0
Redirect HTTP to HTTPS when SSL is enabled.
...
In our current drone setup, we are not using a proxy, thus letting drone handle
SSL termination. In addition, we are not exposing port 80 (effectively disabling
insecure drone access). When new engineers join and attempt to access drone,
they are not sent a 301 and often complain that they either do not have access
or that drone is broken (when in reality they are just accessing drone via the
incorrect protocol/port).
This commit changes the default behavior when running drone with a server-cert
by only sending redirects on port 80 rather than allowing both secure and
insecure access.
2017-11-15 21:36:02 -05:00
Brad Rydzewski
ec6016062b
show loading status in user interface
2017-09-20 12:29:57 -07:00
Brad Rydzewski
ae51e9d1b9
force downgrade to http/1.1 because safari
2017-09-19 15:30:31 -07:00
Brad Rydzewski
bf454572f2
Merge pull request #2215 from bradrydzewski/master
...
add gitlab v3 option for backward compat
2017-09-14 07:57:53 -07:00
Brad Rydzewski
913d8701f2
add gitlab v3 option for backward compat
2017-09-14 07:50:07 -07:00
Matt Leung
820d07263b
Add server env var to specify .drone.yml location
...
Allow setting DRONE_REPO_CONFIG to override default location of .drone.yml
2017-09-12 17:06:12 -07:00
Brad Rydzewski
25c9b8050a
introduce limiter for planned refactoring
2017-09-11 10:22:45 -07:00
Joachim Hill-Grannec
c30198e412
Adding Environment variable to configure the session expiration
2017-08-17 12:50:31 -07:00
Brad Rydzewski
241d994a26
abstract the user interface
2017-07-31 15:15:05 -04:00
Brad Rydzewski
99b10537ba
enable redirect for http to https when certs provided
2017-07-26 10:44:38 -04:00
Brad Rydzewski
5e735c2632
improve experimental quic setup
2017-07-24 21:46:00 -04:00
Brad Rydzewski
2c8dbef79f
implement quic server
2017-07-24 19:15:25 -04:00
Brad Rydzewski
07c82aa1c6
Merge remote-tracking branch 'origin'
2017-07-24 13:23:47 -04:00
Brad Rydzewski
39251a85a9
removed unused and broken packages
2017-07-24 13:23:22 -04:00
mingshun
eb94dc0419
Added integration for coding.net
2017-07-22 17:12:09 +08:00
Brad Rydzewski
35e0ee2e5f
implement sync logic
2017-07-14 15:58:38 -04:00
Brad Rydzewski
f7066473c1
require DRONE_HOST on startup
2017-07-12 14:48:56 -04:00
Brad Rydzewski
a625f06c1a
enable grpc auth
2017-06-29 19:35:38 -04:00
Brad Rydzewski
1a6920e822
separate agent and server binary
2017-06-29 18:51:22 -04:00
Brad Rydzewski
155576fb03
moved to single binary project structure
2015-09-29 17:53:21 -07:00
Dan Williams
0407297229
Make exiting edit back to repo view more efficent
2015-09-28 16:54:51 -04:00