xoxys.droneci/defaults/main.yml

109 lines
3.3 KiB
YAML

---
droneci_version: 1.6.0
droneci_image: "drone/drone:{{ droneci_version }}"
droneci_service_directory: /var/lib/docker/services/droneci
droneci_docker_socket_path: /var/run/docker.sock
droneci_container_name: droneci
droneci_restart_policy: always
droneci_service_stopped: False
droneci_host: http://localhost
droneci_secret: myveryownsecret
# @var droneci_license_key:description Path to the license key file
# @var droneci_license_key: $ "_unset_"
droneci_exposed_ports:
- "127.0.0.1:8080:80"
# @var droneci_volumes:description: > Define required docker volumes.
# If you don't use sqlite you could remove the default volume. To enable a Drone licences
# you will need to configure a bind mount to `/etc/drone.key`.
# @end
# @var droneci_volumes:example: >
# droneci_volumes:
# # Instead of the name you could specify a path on the container host system,
# # but you also have to enable bind mount for this volume
# - name: data
# # target location inside the container
# dest: /var/lib/drone
# # enable bind mount, if false volume will be configured as named volume
# # keep in mind you MUST set bind in any case
# bind: True
# @end
droneci_volumes:
- name: data
dest: /var/lib/drone
bind: False
# @var droneci_networks:example: >
# droneci_networks:
# - name: default
# # optional network driver, defaults to 'bride'
# driver: host
# @end
droneci_networks:
- name: default
droneci_networks_applied:
- default
# @var droneci_memory_limit: $ "_unset_"
# @var droneci_memory_limit:example: $ "512m"
# @var droneci_memory_reservation: $ "_unset_"
# @var droneci_memory_reservation:example: $ "256m"
droneci_privileged: False
droneci_db_type: sqlite
droneci_db_server: localhost
droneci_db_port: 5432
droneci_db_name: droneci
droneci_db_user: pgdroneci
droneci_db_password: secure
droneci_db_ssl_mode: disable
# @var droneci_db_secret:description: >
# Drone supports aesgcm encryption of secrets stored in the database. You must enable encryption
# before any secrets are stored in the database! You can generate an encryption key with e.g.
# `openssl rand -hex 16`.
# @end
# @var droneci_db_secret: $ "_unset_"
# @var droneci_db_secret:example: $ "0c549fd39ae397333761d2cb0c53c219"
# @var droneci_scm_provider:description: SCM provider to use with Drone (gitea|github)
droneci_scm_provider: none
## required gitea settings
droneci_gitea_server: http://my-git.example.com
droneci_gitea_skip_verify: False
# @var droneci_gitea_oauth_client_id:example: $ "1111-222-33333-44444"
# @var droneci_gitea_oauth_client_id: $ "_unset_"
# @var droneci_gitea_oauth_client_secret:example: $ "1234abcd5678efgh"
# @var droneci_gitea_oauth_client_secret: $ "_unset_"
## required github settings
# @var droneci_github_client_id: $ "_unset_"
# @var droneci_github_client_secret: $ "_unset_"
# @var droneci_repository_filter:description: >
# Optional comma-separated list of accounts, used to limit which repositories are
# syncronized between your source control management system and Drone.
# @end
droneci_repository_filter: []
droneci_user_filter: []
# @var droneci_admin_user: $ "_unset_"
# @var droneci_http_proxy: $ "_unset_"
# @var droneci_https_proxy: $ "_unset_"
droneci_prometheus_anonymous_access: False
# @var droneci_no_proxy: $ ["drone-server", "drone-agent"]
droneci_no_proxy: []
droneci_extra_hosts: []