--- droneci_version: 1.6.0 droneci_image: "drone/drone:{{ droneci_version }}" droneci_service_directory: /var/lib/docker/services/droneci droneci_docker_socket_path: /var/run/docker.sock droneci_container_name: droneci droneci_restart_policy: always droneci_service_stopped: False droneci_host: http://localhost droneci_secret: myveryownsecret # @var droneci_license_key:description Path to the license key file # @var droneci_license_key: $ "_unset_" droneci_exposed_ports: - "127.0.0.1:8080:80" # @var droneci_volumes:description: > Define required docker volumes. # If you don't use sqlite you could remove the default volume. To enable a Drone licences # you will need to configure a bind mount to `/etc/drone.key`. # @end # @var droneci_volumes:example: > # droneci_volumes: # # Instead of the name you could specify a path on the container host system, # # but you also have to enable bind mount for this volume # - name: data # # target location inside the container # dest: /var/lib/drone # # enable bind mount, if false volume will be configured as named volume # # keep in mind you MUST set bind in any case # bind: True # @end droneci_volumes: - name: data dest: /var/lib/drone bind: False # @var droneci_networks:example: > # droneci_networks: # - name: default # # optional network driver, defaults to 'bride' # driver: host # @end droneci_networks: - name: default droneci_networks_applied: - default # @var droneci_memory_limit: $ "_unset_" # @var droneci_memory_limit:example: $ "512m" # @var droneci_memory_reservation: $ "_unset_" # @var droneci_memory_reservation:example: $ "256m" droneci_privileged: False droneci_db_type: sqlite droneci_db_server: localhost droneci_db_port: 5432 droneci_db_name: droneci droneci_db_user: pgdroneci droneci_db_password: secure droneci_db_ssl_mode: disable # @var droneci_db_secret:description: > # Drone supports aesgcm encryption of secrets stored in the database. You must enable encryption # before any secrets are stored in the database! You can generate an encryption key with e.g. # `openssl rand -hex 16`. # @end # @var droneci_db_secret: $ "_unset_" # @var droneci_db_secret:example: $ "0c549fd39ae397333761d2cb0c53c219" # @var droneci_scm_provider:description: SCM provider to use with Drone (gitea|github) droneci_scm_provider: none ## required gitea settings droneci_gitea_server: http://my-git.example.com droneci_gitea_skip_verify: False # @var droneci_gitea_oauth_client_id:example: $ "1111-222-33333-44444" # @var droneci_gitea_oauth_client_id: $ "_unset_" # @var droneci_gitea_oauth_client_secret:example: $ "1234abcd5678efgh" # @var droneci_gitea_oauth_client_secret: $ "_unset_" ## required github settings # @var droneci_github_client_id: $ "_unset_" # @var droneci_github_client_secret: $ "_unset_" # @var droneci_repository_filter:description: > # Optional comma-separated list of accounts, used to limit which repositories are # syncronized between your source control management system and Drone. # @end droneci_repository_filter: [] droneci_user_filter: [] # @var droneci_admin_user: $ "_unset_" # @var droneci_http_proxy: $ "_unset_" # @var droneci_https_proxy: $ "_unset_" droneci_prometheus_anonymous_access: False # @var droneci_no_proxy: $ ["drone-server", "drone-agent"] droneci_no_proxy: [] droneci_extra_hosts: []