Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Repo service extensions #3349

Draft
wants to merge 37 commits into
base: main
Choose a base branch
from
Draft

Repo service extensions #3349

wants to merge 37 commits into from

Conversation

anbraten
Copy link
Member

@anbraten anbraten commented Feb 7, 2024

closes #783
closes #929

Allow users to set / use service extensions (config & secrets) on a per repo basis. Those extensions are little external webservice which can implement a set of endpoints to replace woodpeckers internal functionality like:

  • secrets storage
  • pipeline config processing

TODO

  • add config & secrets extension service urls to repo settings
  • allow to change extensions urls for repo
  • add docs
  • restrict http call locations (prevent local ips)

image

@anbraten anbraten changed the title Draft: rework addons DONT merge: Repo plugins old attempt for comparison Feb 7, 2024
@anbraten anbraten changed the title DONT merge: Repo plugins old attempt for comparison Repo service extensions Feb 11, 2024
@anbraten anbraten added feature add new functionality ui frontend related addon labels Feb 11, 2024
@anbraten
Copy link
Member Author

@qwerty287 Just discovered https://github.com/knqyf263/go-plugin. The idea of shipping plugins / extensions as wasm binary sounds quite interesting to me, however not sure if it is sth for woodpecker and how secure it would be.

@qwerty287
Copy link
Contributor

Yes, I also saw that when working on the add-on refactor but IIRC I didn't see any advantages in this over hashicorp's go-plugin.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
addon feature add new functionality ui frontend related
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Hashicorp vault as secret storage integration Configuration Extension
2 participants