107 lines
3.3 KiB
YAML
107 lines
3.3 KiB
YAML
---
|
|
droneci_version: 1.6.0
|
|
droneci_image: "drone/drone:{{ droneci_version }}"
|
|
|
|
droneci_service_directory: /var/lib/docker/services/droneci
|
|
droneci_docker_socket_path: /var/run/docker.sock
|
|
droneci_container_name: droneci
|
|
droneci_restart_policy: always
|
|
droneci_service_stopped: False
|
|
|
|
droneci_host: http://localhost
|
|
droneci_secret: myveryownsecret
|
|
|
|
# @var droneci_license_key:description Path to the license key file
|
|
# @var droneci_license_key: $ "_unset_"
|
|
|
|
droneci_exposed_ports:
|
|
- "127.0.0.1:8080:80"
|
|
|
|
# @var droneci_volumes:description: > Define required docker volumes.
|
|
# If you don't use sqlite you could remove the default volume. To enable a Drone licences
|
|
# you will need to configure a bind mount to `/etc/drone.key`.
|
|
# @end
|
|
# @var droneci_volumes:example: >
|
|
# droneci_volumes:
|
|
# # Instead of the name you could specify a path on the container host system,
|
|
# # but you also have to enable bind mount for this volume
|
|
# - name: data
|
|
# # target location inside the container
|
|
# dest: /var/lib/drone
|
|
# # enable bind mount, if false volume will be configured as named volume
|
|
# # keep in mind you MUST set bind in any case
|
|
# bind: True
|
|
# @end
|
|
droneci_volumes:
|
|
- name: data
|
|
dest: /var/lib/drone
|
|
bind: False
|
|
|
|
# @var droneci_networks:example: >
|
|
# droneci_networks:
|
|
# - name: default
|
|
# # optional network driver, defaults to 'bride'
|
|
# driver: host
|
|
# @end
|
|
droneci_networks:
|
|
- name: default
|
|
|
|
droneci_networks_applied:
|
|
- default
|
|
|
|
# @var droneci_memory_limit: $ "_unset_"
|
|
# @var droneci_memory_limit:example: $ "512m"
|
|
# @var droneci_memory_reservation: $ "_unset_"
|
|
# @var droneci_memory_reservation:example: $ "256m"
|
|
|
|
droneci_db_type: sqlite
|
|
droneci_db_server: localhost
|
|
droneci_db_port: 5432
|
|
droneci_db_name: droneci
|
|
droneci_db_user: pgdroneci
|
|
droneci_db_password: secure
|
|
|
|
droneci_db_ssl_mode: disable
|
|
|
|
# @var droneci_db_secret:description: >
|
|
# Drone supports aesgcm encryption of secrets stored in the database. You must enable encryption
|
|
# before any secrets are stored in the database! You can generate an encryption key with e.g.
|
|
# `openssl rand -hex 16`.
|
|
# @end
|
|
# @var droneci_db_secret: $ "_unset_"
|
|
# @var droneci_db_secret:example: $ "0c549fd39ae397333761d2cb0c53c219"
|
|
|
|
# @var droneci_scm_provider:description: SCM provider to use with Drone (gitea|github)
|
|
droneci_scm_provider: none
|
|
|
|
## required gitea settings
|
|
droneci_gitea_server: http://my-git.example.com
|
|
droneci_gitea_skip_verify: False
|
|
|
|
# @var droneci_gitea_oauth_client_id:example: $ "1111-222-33333-44444"
|
|
# @var droneci_gitea_oauth_client_id: $ "_unset_"
|
|
|
|
# @var droneci_gitea_oauth_client_secret:example: $ "1234abcd5678efgh"
|
|
# @var droneci_gitea_oauth_client_secret: $ "_unset_"
|
|
|
|
## required github settings
|
|
# @var droneci_github_client_id: $ "_unset_"
|
|
# @var droneci_github_client_secret: $ "_unset_"
|
|
|
|
# @var droneci_repository_filter:description: >
|
|
# Optional comma-separated list of accounts, used to limit which repositories are
|
|
# syncronized between your source control management system and Drone.
|
|
# @end
|
|
droneci_repository_filter: []
|
|
|
|
droneci_user_filter: []
|
|
# @var droneci_admin_user: $ "_unset_"
|
|
# @var droneci_http_proxy: $ "_unset_"
|
|
# @var droneci_https_proxy: $ "_unset_"
|
|
|
|
droneci_prometheus_anonymous_access: False
|
|
|
|
# @var droneci_no_proxy: $ ["drone-server", "drone-agent"]
|
|
droneci_no_proxy: []
|
|
droneci_extra_hosts: []
|