woodpecker/cmd/agent
Lukas Bachschwell 09e6460f95
Allow loading sensitive flags from files (#815)
With systems like docker swarm or docker compose it is usually a little awkward to manage secrets. 
There is no way to directly inject them into the environment config. So you often have to write your secrets directly into the compose file

There are hacky workarounds such as overriding the entry-point of the container and loading a script which then fetches secrets from /run/secrets and replaces the environment variables, but this becomes very difficult once we are using docker images built from "scratch" (which is a really great practice otherwise) as there is no shell or standard tooling available

This adds a *_FILE variant of their Environment config values to work around this issue.

Signed-off-by: Lukas Bachschwell <lukas@lbsfilm.at>
2022-03-01 16:09:33 +01:00
..
agent.go Use shared func for registering Sigterm on a context (#799) 2022-02-28 09:27:31 +01:00
flags.go Allow loading sensitive flags from files (#815) 2022-03-01 16:09:33 +01:00
health.go Drop error only on purpose or else report back or log (#514) 2021-11-23 15:36:52 +01:00
health_test.go Create agent/ package for backend agnostic logic (#338) 2021-09-23 16:58:12 +02:00
main.go Upgrade urfave/cli to v2 (#483) 2021-10-27 21:03:14 +02:00