JordanSussman
4ae206d812
feat(repo): allow internal project visibility by default'
2019-09-10 22:16:19 -05:00
Brad Rydzewski
870e967ee8
added support for rollback
2019-09-03 21:11:49 -07:00
Brad Rydzewski
30ca88b9e6
added validation plugins
2019-09-03 15:05:53 -07:00
Brad Rydzewski
e272027814
include gitea changes in readme
2019-09-02 23:08:43 -07:00
Brad Rydzewski
d9b529f2f6
added support for convert plugins
2019-09-02 23:05:30 -07:00
techknowlogick
7b26269816
Merge branch 'master' into rm-basic-auth-gitea
2019-08-23 23:13:09 -04:00
Robert Lippens
e35d63203a
fix bucket check
2019-08-14 09:54:22 -07:00
Robert Lippens
411eb89740
refactor store injector
2019-08-14 09:32:59 -07:00
Robert Lippens
22d2e9db30
fix so always returns
2019-08-13 21:41:36 -07:00
Robert Lippens
11a7729db9
configure azure blob storage for drone
2019-08-13 21:12:39 -07:00
Brad Rydzewski
801212a923
improve error when malformed port
2019-07-29 19:55:25 -07:00
Brad Rydzewski
443b369b91
ability to limit webhook delivery by event and action
2019-07-28 12:22:16 -07:00
Matti R
8ad5123479
Merge remote-tracking branch 'upstream/master' into rm-basic-auth-gitea
2019-06-24 19:34:27 -04:00
Brad Rydzewski
6558d53de2
enable legacy token mapper
2019-06-06 13:27:38 -07:00
techknowlogick
448f1d54b4
rm basic auth option from Gitea
2019-06-05 17:36:10 -04:00
techknowlogick
774c37b53e
remove basic auth option for Gitea
2019-06-05 17:34:58 -04:00
Brad Rydzewski
7aba4b8234
fixes #2689
2019-05-30 09:11:01 -07:00
Brad Rydzewski
346743176b
separate healthz from other routes
2019-05-21 13:29:58 -07:00
Brad Rydzewski
b52456f652
fix regression with rpc v1 client
2019-05-21 13:00:16 -07:00
Brad Rydzewski
3d4418e351
add rpc/v2 endpoint
2019-05-21 11:45:42 -07:00
Jan Berktold
78547a6a01
Fixing wire_gen.go
2019-04-25 00:33:16 +02:00
Jan Berktold
058187f150
Code review feedback
2019-04-25 00:23:25 +02:00
Jan Berktold
e483fa505c
Add DRONE_PROMETHEUS_ANONYMOUS_ACCESS configuration option
2019-04-24 23:57:38 +02:00
Matti Ranta
b2d850f16f
add refresh to client as well
2019-04-22 20:09:40 -04:00
techknowlogick
6adbacd11c
update docs per feedback
2019-04-22 19:52:37 -04:00
techknowlogick
18b0959bbf
update per feedback
2019-04-22 19:50:31 -04:00
Matti Ranta
b7fc433b31
use switch case
2019-04-22 19:36:47 -04:00
techknowlogick
9ced52ab50
Refresh Gitea Oauth2 token
2019-04-22 16:54:25 -04:00
Brad Rydzewski
16707c4bdb
ability to set cookie secure flag, closes #2671
2019-04-19 12:32:35 -07:00
Brad Rydzewski
f647e9ac0e
Merge pull request #2670 from xuyang2/master [CI SKIP]
...
Fix typos
2019-04-16 16:14:16 -07:00
Brad Rydzewski
8042aa4519
include system in webhook payload
2019-04-16 08:21:05 -07:00
徐胖
1042b18716
fix some typos
2019-04-16 09:55:38 +08:00
徐胖
3883ee9614
fix some typos
2019-04-16 09:27:15 +08:00
Brad Rydzewski
96132e3d0a
support for per-organization secrets
2019-04-14 17:06:16 -07:00
Brad Rydzewski
1a01a70533
Merge pull request #2622 from techknowlogick/gitea-oauth
...
Add Gitea Oauth
2019-04-13 11:12:36 -07:00
Brad Rydzewski
2e36ee9c72
WIP endpoint to create build from branch, sha
2019-04-13 01:52:31 -07:00
Matti Ranta
236286ee14
Merge branch 'master' into gitea-oauth
2019-04-12 10:14:16 -04:00
Brad Rydzewski
316217a81d
bump version [CI SKIP]
2019-03-19 16:17:40 -07:00
techknowlogick
dd0795bb1c
Merge branch 'master' into gitea-oauth
2019-03-13 22:01:12 -04:00
Brad Rydzewski
5013cfa993
enable basic jsonnet in process
2019-03-13 16:12:54 -07:00
techknowlogick
39df2ffbad
Update config.go
2019-03-13 18:27:21 -04:00
Brad Rydzewski
ff8f29df53
audit headers
2019-03-13 14:47:47 -07:00
techknowlogick
911f7c1e64
update per @appleboy feedback
2019-03-08 21:56:45 -05:00
techknowlogick
b0f3ee3ce0
update per @appleboy feedback
2019-03-08 21:55:43 -05:00
techknowlogick
e4f5498850
pass redirect URL to Gitea
2019-03-08 14:35:41 -05:00
techknowlogick
63ba489310
Update inject_login.go
2019-03-08 13:38:20 -05:00
Matti Ranta
665398fb4f
Add Gitea Oauth
...
With fallback to basic auth if Gitea server does not support oauth
2019-03-08 12:22:20 -05:00
Brad Rydzewski
dd2cc872c2
remove deprecated scheduler
2019-03-05 23:47:55 -08:00
Brad Rydzewski
e9a74feda8
bump version [ci skip]
2019-03-05 16:04:10 -08:00
Brad Rydzewski
cfa4aa5672
added datadog sink
2019-03-04 23:16:53 -08:00
Brad Rydzewski
e52329b111
adde encrypt endpoint
2019-02-28 12:49:04 -08:00
Thomas Boerger
876645a1b0
Provide pathstyle for S3 log storage
2019-02-26 22:09:56 +01:00
Brad Rydzewski
84f6765def
Merge remote-tracking branch 'origin/master'
2019-02-22 09:01:23 -08:00
Brad Rydzewski
69a8e404bd
fix issue with wrong default .drone.yml file
2019-02-22 09:01:11 -08:00
JordanSussman
2b539ed123
feat(s3): allow user to specify s3 endpoint for non aws usage
2019-02-20 22:17:50 -06:00
Brad Rydzewski
6621f4c7f7
wip enable CE
2019-02-20 10:34:26 -08:00
Brad Rydzewski
5b6a3d8ff4
squash and merge local branch
2019-02-19 15:56:41 -08:00
Brad Rydzewski
6a651f1e39
move vault params to extras
2018-05-01 21:05:30 -07:00
Matt Leung
187d1d65bb
add additional opt to set v.auth
2018-04-27 14:50:47 -07:00
Matt Leung
79428aa231
Enable Vault auth through kubernetes auth method
...
Added a feature to obtain the initial Vault token from the Kubernetes
auth method.
This works by making a request to the Vault server at the specified auth
method mount point's login path and presenting the JWT located in a file
on a running pod, along with the Kubernetes role to authenticate as.
Vault will then respond with a token and its TTL, if the request is valid.
2018-04-24 14:56:28 -07:00
Brad Rydzewski
897eb95bcd
Merge pull request #2369 from JonasFranzDEV/master
...
Add context to Gitea status
2018-03-30 09:32:09 -07:00
Thomas Boerger
06ff6b50ed
Use specific token for prometheus metrics
2018-03-27 22:22:19 +02:00
Thomas Boerger
7f49e69607
Just fixed format with go fmt ./...
2018-03-21 14:02:17 +01:00
Jonas Franz
6a32935011
Add context to gitea status
...
Signed-off-by: Jonas Franz <info@jonasfranz.software>
2018-03-10 20:11:34 +01:00
Brad Rydzewski
580fe9abb7
add apache license header to files
2018-02-19 14:24:10 -08:00
Brad Rydzewski
ce740a635e
Merge pull request #2295 from jmccann/keepalive_server
...
Allow setting MinTime for keepalive enforcement on server
2018-02-19 13:36:13 -08:00
Tony Li
9651a8043e
add usage for cpu-set
2018-02-13 10:41:36 -08:00
Tony Li
84954e2d20
fix verbage
2018-01-30 13:30:06 -05:00
Tony Li
0a6666b4bf
update server-agent usage
2018-01-30 13:28:17 -05:00
Tony Li
22522bfe44
update server usages
2018-01-30 13:28:07 -05:00
Tony Li
73914fdbd5
update server cli usage
2018-01-29 19:21:32 -05:00
Jacob McCann
8295166ca4
Update usage for keepalive-min-time
2018-01-24 08:41:11 -06:00
jhernandezb
546e0bad00
Fix autocert generation
2018-01-18 10:33:41 -06:00
jhernandezb
32e80eca20
lets encrypt: migrate to http-01 challenge
2018-01-12 22:54:49 -06:00
Jacob McCann
6eb9af01c6
Allow setting MinTime for keepalive enforcement on server
...
This allows setting agent keepalive Time at value < 5m
2018-01-08 14:46:44 -06:00
Jesse Lang
b339532e0c
Fix DRONE_HOST check
2017-12-20 06:49:02 -06:00
Jesse Lang
453f415cc4
Validate DRONE_HOST to ensure it contains a scheme and not a trailing slash
2017-12-19 20:08:55 -06:00
Mark Spicer
8476c90bbf
Set the redirect handler for lets encrypt.
...
This commit sets the http handler to the redirect function for let's encrypt
enabled drone instances. In addition, the `Strict-Transport-Security` header is
added to the redirect given `header.Secure` will only be added for gin routes.
This commit resolves #2261 .
2017-11-15 23:27:57 -05:00
Mark Spicer
238e916fa0
Redirect HTTP to HTTPS when SSL is enabled.
...
In our current drone setup, we are not using a proxy, thus letting drone handle
SSL termination. In addition, we are not exposing port 80 (effectively disabling
insecure drone access). When new engineers join and attempt to access drone,
they are not sent a 301 and often complain that they either do not have access
or that drone is broken (when in reality they are just accessing drone via the
incorrect protocol/port).
This commit changes the default behavior when running drone with a server-cert
by only sending redirects on port 80 rather than allowing both secure and
insecure access.
2017-11-15 21:36:02 -05:00
Brad Rydzewski
ec6016062b
show loading status in user interface
2017-09-20 12:29:57 -07:00
Brad Rydzewski
ae51e9d1b9
force downgrade to http/1.1 because safari
2017-09-19 15:30:31 -07:00
Brad Rydzewski
bf454572f2
Merge pull request #2215 from bradrydzewski/master
...
add gitlab v3 option for backward compat
2017-09-14 07:57:53 -07:00
Brad Rydzewski
913d8701f2
add gitlab v3 option for backward compat
2017-09-14 07:50:07 -07:00
Matt Leung
820d07263b
Add server env var to specify .drone.yml location
...
Allow setting DRONE_REPO_CONFIG to override default location of .drone.yml
2017-09-12 17:06:12 -07:00
Brad Rydzewski
25c9b8050a
introduce limiter for planned refactoring
2017-09-11 10:22:45 -07:00
Joachim Hill-Grannec
c30198e412
Adding Environment variable to configure the session expiration
2017-08-17 12:50:31 -07:00
Brad Rydzewski
241d994a26
abstract the user interface
2017-07-31 15:15:05 -04:00
Brad Rydzewski
99b10537ba
enable redirect for http to https when certs provided
2017-07-26 10:44:38 -04:00
Brad Rydzewski
5e735c2632
improve experimental quic setup
2017-07-24 21:46:00 -04:00
Brad Rydzewski
2c8dbef79f
implement quic server
2017-07-24 19:15:25 -04:00
Brad Rydzewski
07c82aa1c6
Merge remote-tracking branch 'origin'
2017-07-24 13:23:47 -04:00
Brad Rydzewski
39251a85a9
removed unused and broken packages
2017-07-24 13:23:22 -04:00
mingshun
eb94dc0419
Added integration for coding.net
2017-07-22 17:12:09 +08:00
Brad Rydzewski
35e0ee2e5f
implement sync logic
2017-07-14 15:58:38 -04:00
Brad Rydzewski
f7066473c1
require DRONE_HOST on startup
2017-07-12 14:48:56 -04:00
Brad Rydzewski
a625f06c1a
enable grpc auth
2017-06-29 19:35:38 -04:00
Brad Rydzewski
1a6920e822
separate agent and server binary
2017-06-29 18:51:22 -04:00
Brad Rydzewski
155576fb03
moved to single binary project structure
2015-09-29 17:53:21 -07:00
Dan Williams
0407297229
Make exiting edit back to repo view more efficent
2015-09-28 16:54:51 -04:00
Brad Rydzewski
8535ea44fd
generate token via the UI
2015-09-09 14:34:28 -07:00