Signed-off-by: Josh Soref <2119212+jsoref@users.noreply.github.com>
This commit is contained in:
Josh Soref 2022-11-09 02:12:17 -05:00 committed by GitHub
parent bb99d5cb6d
commit 023d03dd61
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
49 changed files with 76 additions and 76 deletions

View File

@ -4,7 +4,7 @@ variables:
- &when_path
- "docs/**"
- ".woodpecker/docs.yml"
# since we genereate docs for cli tool we have to watch this too
# since we generate docs for cli tool we have to watch this too
- "cli/**"
- "cmd/cli/**"

View File

@ -26,7 +26,7 @@
* SECURITY
* Update github.com/containerd/containerd (#978) (#980)
* BUGFIXES
* Return to page after clikcing login at navbar (#975) (#976)
* Return to page after clicking login at navbar (#975) (#976)
## [0.15.2](https://github.com/woodpecker-ci/woodpecker/releases/tag/v0.15.2) - 2022-06-14
@ -84,7 +84,7 @@
* Skip nested GitLab repositories during sync (#656), (#652)
* Build proc tree function should not depend on sorted procs list (#647)
* Fix sqlite migration on column drop of abnormal schemas (#629)
* Fix gRPC incomapatability in helm chart (#627)
* Fix gRPC incompatibility in helm chart (#627)
* Fix new pipeline not published to UI if protected repo mode enabled (#619)
* Dont panic, report error back (#582)
* Improve status updates (#561)
@ -105,7 +105,7 @@
* Add page to view all projects of a user / group (#741)
* Let non required migration tasks fail and continue (#729)
* Improve pipeline compiler (#699)
* Support ChangedFiles for Github & Gitlab PRs and pushes and Gitea pushes (#697)
* Support ChangedFiles for GitHub & Gitlab PRs and pushes and Gitea pushes (#697)
* Remove unused flags / options (#693)
* Automatically determine platform of agent (#690)
* Build ref link point to commit not compare if only one commit was pushed (#673)
@ -147,13 +147,13 @@
* Serve index.html directly without template (#539)
* Add linter revive, unused, ineffassign, varcheck, structcheck, staticcheck, whitespace, misspell (#550), (#551), (#554), (#538), (#537), (#535), (#531), (#530)
* Rename struct field and add new types into server/model's (#523)
* Update database in one transaction on syncing user repositorys (#513)
* Update database in one transaction on syncing user repositories (#513)
* Format code with 'simplify' flag and check via CI (#509)
* Use Goblin Assert as intended (#501)
* Embedding libcompose types for yaml parsing (#495)
* Use std method to get SystemCertPool (#488)
* Upgrade urfave/cli to v2 (#483)
* Remove some wrapper and make code more redable (#478)
* Remove some wrapper and make code more readable (#478)
* More logging and refactor (#457)
* Simplify routes (#437)
* Move api-routes to separate file (#434)
@ -229,7 +229,7 @@
## [v0.14.2](https://github.com/woodpecker-ci/woodpecker/releases/tag/v0.14.2) - 2021-10-19
* BUGFIXES
* Fix sanitziePath (#326) (aa4fa9aab3)
* Fix sanitizePath (#326) (aa4fa9aab3)
* Fix json tag for `Pos` at struct `Line` (#422) (#424)
* Fix channel buffer used with signal.Notify (#421) (#423)
* ENHANCEMENTS
@ -261,7 +261,7 @@
* Add support to gitea remote for path-prefix condition (#235)
* Enable go vet for ci (#230)
* Enforce code format (#228)
* Add mutli-pipeline to Gitea (#225)
* Add multi-pipeline to Gitea (#225)
* Move flag definitions into extra files (#215)
* Remove unused code in server (#213)
* Docs URL configuration (#206)

View File

@ -85,7 +85,7 @@ tolerations: []
affinity: {}
## Using topology spread constraints, you can ensure that there is at least one agent
## pod for each topology zone, e.g. one per arch for for multi-architecture clusters
## pod for each topology zone, e.g. one per arch for multi-architecture clusters
## or one for each region for geographically distributed cloud-hosted clusters.
## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-topology-spread-constraints/
topologySpreadConstraints: []

View File

@ -240,7 +240,7 @@ var flags = []cli.Flag{
Usage: "set the cpus allowed to execute containers",
},
//
// Github
// GitHub
//
&cli.BoolFlag{
EnvVars: []string{"WOODPECKER_GITHUB"},

View File

@ -138,7 +138,7 @@ func run(c *cli.Context) error {
}
grpcServer := grpc.NewServer(
grpc.StreamInterceptor(authorizer.streamInterceptor),
grpc.UnaryInterceptor(authorizer.unaryIntercaptor),
grpc.UnaryInterceptor(authorizer.unaryInterceptor),
grpc.KeepaliveEnforcementPolicy(keepalive.EnforcementPolicy{
MinTime: c.Duration("keepalive-min-time"),
}),
@ -337,7 +337,7 @@ func (a *authorizer) streamInterceptor(srv interface{}, stream grpc.ServerStream
return handler(srv, stream)
}
func (a *authorizer) unaryIntercaptor(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (resp interface{}, err error) {
func (a *authorizer) unaryInterceptor(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, handler grpc.UnaryHandler) (resp interface{}, err error) {
if err := a.authorize(ctx); err != nil {
return nil, err
}

View File

@ -190,7 +190,7 @@ func setupMembershipService(_ *cli.Context, r forge.Forge) cache.MembershipServi
func setupForge(c *cli.Context) (forge.Forge, error) {
switch {
case c.Bool("github"):
return setupGithub(c)
return setupGitHub(c)
case c.Bool("gitlab"):
return setupGitlab(c)
case c.Bool("bitbucket"):
@ -276,7 +276,7 @@ func setupGitlab(c *cli.Context) (forge.Forge, error) {
}
// helper function to setup the GitHub forge from the CLI arguments.
func setupGithub(c *cli.Context) (forge.Forge, error) {
func setupGitHub(c *cli.Context) (forge.Forge, error) {
opts := github.Opts{
URL: c.String("github-server"),
Client: c.String("github-client"),

View File

@ -360,7 +360,7 @@ Specify a configuration service endpoint, see [Configuration Extension](./100-ex
### `WOODPECKER_GITHUB_...`
See [Github configuration](forges/github/#configuration)
See [GitHub configuration](forges/github/#configuration)
### `WOODPECKER_GOGS_...`

View File

@ -84,7 +84,7 @@ WOODPECKER_CONFIG_SERVICE_ENDPOINT=https://example.com/ciconfig
"configs": [
{
"name": ".woodpecker.yml",
"data": "pipeline:\n backend:\n image: alpine\n commands:\n - echo \"Hello there from Repo (.woodpecekr.yml)\"\n"
"data": "pipeline:\n backend:\n image: alpine\n commands:\n - echo \"Hello there from Repo (.woodpecker.yml)\"\n"
}
]
}

View File

@ -72,7 +72,7 @@ Some versions need some changes to the server configuration or the pipeline conf
- Plugin Settings moved into `settings` section:
```diff
pipline:
pipeline:
something:
image: my/plugin
- setting1: foo

View File

@ -9,7 +9,7 @@ If you have some missing resources, please feel free to [open a pull-request](ht
- [Woodpecker CI pipeline configs](https://github.com/woodpecker-ci/woodpecker/tree/master/.woodpecker) - Complex setup containing different kind of pipelines
- [Golang tests](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/test.yml)
- [Typescript, eslint & Vue](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/web.yml)
- [Docusaurus & publishing to Github Pages](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/docs.yml)
- [Docusaurus & publishing to GitHub Pages](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/docs.yml)
- [Docker container building](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/docker.yml)
- [Helm chart linting & releasing](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/helm.yml)

View File

@ -47,7 +47,7 @@ A common config for debugging would look like this:
WOODPECKER_OPEN=true
WOODPECKER_ADMIN=your-username
# if you want to test webhooks with an online forge like Github this address needs to be accessible from public server
# if you want to test webhooks with an online forge like GitHub this address needs to be accessible from public server
WOODPECKER_HOST=http://your-dev-address.com/
# github (sample for a forge config - see /docs/administration/forge/overview for other forges)
@ -75,7 +75,7 @@ WOODPECKER_HEALTHCHECK=false
### Setup O-Auth
Create an O-Auth app for your forge as describe in the [forges documentation](../30-administration/11-forges/10-overview.md). If you set `WOODPECKER_DEV_OAUTH_HOST=http://localhost:8000` you can use that address with the path as explained for the specific forge to login without the need for a public address. For example for Github you would use `http://localhost:8000/authorize` as authorization callback URL.
Create an O-Auth app for your forge as describe in the [forges documentation](../30-administration/11-forges/10-overview.md). If you set `WOODPECKER_DEV_OAUTH_HOST=http://localhost:8000` you can use that address with the path as explained for the specific forge to login without the need for a public address. For example for GitHub you would use `http://localhost:8000/authorize` as authorization callback URL.
## Developing with VS-Code

View File

@ -64,7 +64,7 @@
},
{
"// todo": true,
"name": "Github release",
"name": "GitHub release",
"docs": "https://raw.githubusercontent.com/woodpecker-ci/plugin-github-release/master/docs.md",
"verified": true
},

View File

@ -290,7 +290,7 @@ Example: `WOODPECKER_LIMIT_CPU_SET=1,2`
### `WOODPECKER_GITHUB_...`
See [Github configuration](vcs/github/#configuration)
See [GitHub configuration](vcs/github/#configuration)
### `WOODPECKER_GOGS_...`

View File

@ -1,6 +1,6 @@
# Agent configuration
Agents are configured by the command line or environement variables. At the minimum you need the following information:
Agents are configured by the command line or environment variables. At the minimum you need the following information:
```yaml
# docker-compose.yml
@ -22,7 +22,7 @@ The following are automatically set and can be overridden:
## Processes per agent
By default the maximum processes that are run per agent is 1. If required you can add `WOODPECKER_MAX_PROCS` to increase your parellel processing on a per-agent basis.
By default the maximum processes that are run per agent is 1. If required you can add `WOODPECKER_MAX_PROCS` to increase your parallel processing on a per-agent basis.
```yaml
# docker-compose.yml

View File

@ -55,7 +55,7 @@ Some versions need some changes to the server configuration or the pipeline conf
- Plugin Settings moved into `settings` section:
```diff
pipline:
pipeline:
something:
image: my/plugin
- setting1: foo

View File

@ -9,7 +9,7 @@ If you have some missing resources, please feel free to [open a pull-request](ht
- [Woodpecker CI pipeline configs](https://github.com/woodpecker-ci/woodpecker/tree/master/.woodpecker) - Complex setup containing different kind of pipelines
- [Golang tests](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/test.yml)
- [Typescript, eslint & Vue](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/web.yml)
- [Docusaurus & publishing to Github Pages](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/docs.yml)
- [Docusaurus & publishing to GitHub Pages](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/docs.yml)
- [Docker container building](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/docker.yml)
- [Helm chart linting & releasing](https://github.com/woodpecker-ci/woodpecker/blob/master/.woodpecker/helm.yml)

View File

@ -31,7 +31,7 @@ A common config for debugging would look like this:
WOODPECKER_OPEN=true
WOODPECKER_ADMIN=your-username
# if you want to test webhooks with an online SCM like Github this address needs to be accessible from public server
# if you want to test webhooks with an online SCM like GitHub this address needs to be accessible from public server
WOODPECKER_HOST=http://your-dev-address.com/
# github (sample for a SCM config - see /docs/administration/vcs/overview for other SCMs)
@ -59,7 +59,7 @@ WOODPECKER_HEALTHCHECK=false
### Setup O-Auth
Create an O-Auth app for your SCM as describe in the [SCM documentation](../30-administration/11-vcs/10-overview.md). If you set `WOODPECKER_DEV_OAUTH_HOST=http://localhost:8000` you can use that address with the path as explained for the specific SCM to login without the need for a public address. For example for Github you would use `http://localhost:8000/authorize` as authorization callback URL.
Create an O-Auth app for your SCM as describe in the [SCM documentation](../30-administration/11-vcs/10-overview.md). If you set `WOODPECKER_DEV_OAUTH_HOST=http://localhost:8000` you can use that address with the path as explained for the specific SCM to login without the need for a public address. For example for GitHub you would use `http://localhost:8000/authorize` as authorization callback URL.
## Developing with VS-Code

View File

@ -40,7 +40,7 @@ var notAllowedEnvVarOverwrites = []string{
}
type local struct {
// TODO: make cmd a cmd list to itterate over, the hard part is to have a common ReadCloser
// TODO: make cmd a cmd list to iterate over, the hard part is to have a common ReadCloser
cmd *exec.Cmd
output io.ReadCloser
workingdir string

View File

@ -354,7 +354,7 @@ func PostPipeline(c *gin.Context) {
return
}
// refresh the token to make sure, pipeline.ReStart can still obtain the pipeline config if nessessary again
// refresh the token to make sure, pipeline.ReStart can still obtain the pipeline config if necessary again
refreshUserToken(c, user)
// make Deploy overridable

View File

@ -142,7 +142,7 @@ func LogStreamSSE(c *gin.Context) {
_store := store.FromContext(c)
// // parse the pipeline number and step sequence number from
// // the repquest parameter.
// // the request parameter.
pipelinen, _ := strconv.ParseInt(c.Param("pipeline"), 10, 64)
stepn, _ := strconv.Atoi(c.Param("number"))

View File

@ -49,7 +49,7 @@ func Start(ctx context.Context, store store.Store, forge forge.Forge) error {
crons, err := store.CronListNextExecute(now.Unix(), checkItems)
if err != nil {
log.Error().Err(err).Int64("now", now.Unix()).Msg("obtain cron cron list")
log.Error().Err(err).Int64("now", now.Unix()).Msg("obtain cron list")
return
}

View File

@ -256,7 +256,7 @@ func (c *config) Activate(ctx context.Context, u *model.User, r *model.Repo, lin
})
}
// Deactivate deactives the repository be removing repository push hooks from
// Deactivate deactivates the repository be removing repository push hooks from
// the Bitbucket repository.
func (c *config) Deactivate(ctx context.Context, u *model.User, r *model.Repo, link string) error {
client := c.newClient(ctx, u)
@ -296,7 +296,7 @@ func (c *config) Branches(ctx context.Context, u *model.User, r *model.Repo) ([]
return branches, nil
}
// BranchHead returns the sha of the head (lastest commit) of the specified branch
// BranchHead returns the sha of the head (latest commit) of the specified branch
func (c *config) BranchHead(ctx context.Context, u *model.User, r *model.Repo, branch string) (string, error) {
// TODO(1138): missing implementation
return "", forge_types.ErrNotImplemented

View File

@ -158,7 +158,7 @@ type PullRequestHook struct {
Updated time.Time `json:"updated_on"`
Source struct {
Repo Repo `json:"repsoitory"`
Repo Repo `json:"repository"`
Commit struct {
Hash string `json:"hash"`
Links Links `json:"links"`
@ -169,7 +169,7 @@ type PullRequestHook struct {
} `json:"source"`
Dest struct {
Repo Repo `json:"repsoitory"`
Repo Repo `json:"repository"`
Commit struct {
Hash string `json:"hash"`
Links Links `json:"links"`

View File

@ -238,7 +238,7 @@ func (c *Config) Branches(ctx context.Context, u *model.User, r *model.Repo) ([]
return branches, nil
}
// BranchHead returns the sha of the head (lastest commit) of the specified branch
// BranchHead returns the sha of the head (latest commit) of the specified branch
func (c *Config) BranchHead(ctx context.Context, u *model.User, r *model.Repo, branch string) (string, error) {
// TODO(1138): missing implementation
return "", forge_types.ErrNotImplemented

View File

@ -134,7 +134,7 @@ func (c *Coding) Auth(ctx context.Context, token, secret string) (string, error)
// Refresh refreshes an oauth token and expiration for the given
// user. It returns true if the token was refreshed, false if the
// token was not refreshed, and error if it failed to refersh.
// token was not refreshed, and error if it failed to refresh.
func (c *Coding) Refresh(ctx context.Context, u *model.User) (bool, error) {
config := c.newConfig("")
source := config.TokenSource(c.newContext(ctx), &oauth2.Token{RefreshToken: u.Secret})
@ -295,7 +295,7 @@ func (c *Coding) Branches(ctx context.Context, u *model.User, r *model.Repo) ([]
return []string{r.Branch}, nil
}
// BranchHead returns the sha of the head (lastest commit) of the specified branch
// BranchHead returns the sha of the head (latest commit) of the specified branch
func (c *Coding) BranchHead(ctx context.Context, u *model.User, r *model.Repo, branch string) (string, error) {
// TODO(1138): missing implementation
return "", forge_types.ErrNotImplemented

View File

@ -82,7 +82,7 @@ func Test_coding(t *testing.T) {
})
g.Describe("Given an access token", func() {
g.It("Should return the anthenticated user", func() {
g.It("Should return the authenticated user", func() {
login, err := c.Auth(ctx, fakeUser.Token, fakeUser.Secret)
g.Assert(err).IsNil()
g.Assert(login).Equal(fakeUser.Login)

View File

@ -107,7 +107,7 @@ func parseHook(r *http.Request) (*model.Repo, *model.Pipeline, error) {
case hookPR:
return parsePullRequestHook(raw)
case hookMR:
return parseMergeReuqestHook(raw)
return parseMergeRequestHook(raw)
}
return nil, nil, nil
}
@ -213,7 +213,7 @@ func parsePullRequestHook(raw []byte) (*model.Repo, *model.Pipeline, error) {
return repo, pipeline, nil
}
func parseMergeReuqestHook(raw []byte) (*model.Repo, *model.Pipeline, error) {
func parseMergeRequestHook(raw []byte) (*model.Repo, *model.Pipeline, error) {
hook := &MergeRequestHook{}
err := json.Unmarshal(raw, hook)
if err != nil {

View File

@ -196,7 +196,7 @@ func Test_hook(t *testing.T) {
Refspec: "branch1:master",
}
actualRepo, actualPipeline, err := parseMergeReuqestHook([]byte(fixtures.MergeRequestHook))
actualRepo, actualPipeline, err := parseMergeRequestHook([]byte(fixtures.MergeRequestHook))
g.Assert(err).IsNil()
g.Assert(actualRepo).Equal(repo)
g.Assert(actualPipeline).Equal(pipeline)

View File

@ -49,7 +49,7 @@ func (c *Client) AddWebhook(globalKey, projectName, link string) error {
u := fmt.Sprintf("/user/%s/project/%s/git/hook/%d", globalKey, projectName, webhook.ID)
params := url.Values{}
params.Set("hook_url", link)
params.Set("type_pust", "true")
params.Set("type_push", "true")
params.Set("type_mr_pr", "true")
_, err := c.Do("PUT", u, params)

View File

@ -406,7 +406,7 @@ func (c *Gitea) Activate(ctx context.Context, u *model.User, r *model.Repo, link
return nil
}
// Deactivate deactives the repository be removing repository push hooks from
// Deactivate deactivates the repository be removing repository push hooks from
// the Gitea repository.
func (c *Gitea) Deactivate(ctx context.Context, u *model.User, r *model.Repo, link string) error {
client, err := c.newClientToken(ctx, u.Token)
@ -455,7 +455,7 @@ func (c *Gitea) Branches(ctx context.Context, u *model.User, r *model.Repo) ([]s
return branches, nil
}
// BranchHead returns the sha of the head (lastest commit) of the specified branch
// BranchHead returns the sha of the head (latest commit) of the specified branch
func (c *Gitea) BranchHead(ctx context.Context, u *model.User, r *model.Repo, branch string) (string, error) {
token := ""
if u != nil {

View File

@ -294,7 +294,7 @@ const HookPullRequest = `
`
// HookPullRequestInvalidAction is a sample hook pull request that has an
// action not equal to synchrize or opened, and is expected to be ignored.
// action not equal to synchronize or opened, and is expected to be ignored.
const HookPullRequestInvalidAction = `
{
"action": "reopened",

View File

@ -304,7 +304,7 @@ func (c *client) Netrc(u *model.User, r *model.Repo) (*model.Netrc, error) {
}, nil
}
// Deactivate deactives the repository be removing registered push hooks from
// Deactivate deactivates the repository be removing registered push hooks from
// the GitHub repository.
func (c *client) Deactivate(ctx context.Context, u *model.User, r *model.Repo, link string) error {
client := c.newClientToken(ctx, u.Token)
@ -508,7 +508,7 @@ func (c *client) Branches(ctx context.Context, u *model.User, r *model.Repo) ([]
return branches, nil
}
// BranchHead returns the sha of the head (lastest commit) of the specified branch
// BranchHead returns the sha of the head (latest commit) of the specified branch
func (c *client) BranchHead(ctx context.Context, u *model.User, r *model.Repo, branch string) (string, error) {
token := ""
if u != nil {

View File

@ -112,7 +112,7 @@ func Test_github(t *testing.T) {
g.It("Should return a user team list")
g.It("Should register repositroy hooks")
g.It("Should register repository hooks")
g.It("Should return a repository file")

View File

@ -28,7 +28,7 @@ import (
)
const (
hookEvent = "X-Github-Event"
hookEvent = "X-GitHub-Event"
hookDeploy = "deployment"
hookPush = "push"
hookPull = "pull_request"

View File

@ -560,7 +560,7 @@ func (g *Gitlab) Branches(ctx context.Context, user *model.User, repo *model.Rep
return branches, nil
}
// BranchHead returns the sha of the head (lastest commit) of the specified branch
// BranchHead returns the sha of the head (latest commit) of the specified branch
func (g *Gitlab) BranchHead(ctx context.Context, u *model.User, r *model.Repo, branch string) (string, error) {
token := ""
if u != nil {

View File

@ -133,7 +133,7 @@ var notArchivedProjectsPayload = []byte(`
]
`)
var project4Paylod = []byte(`
var project4Payload = []byte(`
{
"id": 4,
"description": null,
@ -182,7 +182,7 @@ var project4Paylod = []byte(`
}
`)
var project6Paylod = []byte(`
var project6Payload = []byte(`
{
"id": 6,
"description": null,

View File

@ -43,10 +43,10 @@ func NewServer(t *testing.T) *httptest.Server {
return
case "/api/v4/projects/diaspora/diaspora-client":
w.Write(project4Paylod)
w.Write(project4Payload)
return
case "/api/v4/projects/brightbox/puppet":
w.Write(project6Paylod)
w.Write(project6Payload)
return
case "/api/v4/projects/4/hooks":
switch r.Method {

View File

@ -130,7 +130,7 @@ func Test_gogs(t *testing.T) {
})
})
g.It("Should register repositroy hooks", func() {
g.It("Should register repository hooks", func() {
err := c.Activate(ctx, fakeUser, fakeRepo, "http://localhost")
g.Assert(err).IsNil()
})
@ -160,7 +160,7 @@ func Test_gogs(t *testing.T) {
g.It("Should handle a parsing error")
})
g.It("Should return no-op for usupporeted features", func() {
g.It("Should return no-op for unsupported features", func() {
_, err1 := c.Auth(ctx, "octocat", "4vyW6b49Z")
err2 := c.Status(ctx, nil, nil, nil, nil)
err3 := c.Deactivate(ctx, nil, nil, "")

View File

@ -80,7 +80,7 @@ type Forge interface {
// TODO: Add proper pagination handling and remove workaround in gitea forge
Branches(ctx context.Context, u *model.User, r *model.Repo) ([]string, error)
// BranchHead returns the sha of the head (lastest commit) of the specified branch
// BranchHead returns the sha of the head (latest commit) of the specified branch
BranchHead(ctx context.Context, u *model.User, r *model.Repo, branch string) (string, error)
// Hook parses the post-commit hook from the Request body and returns the
@ -94,7 +94,7 @@ type Forge interface {
// Refresher refreshes an oauth token and expiration for the given user. It
// returns true if the token was refreshed, false if the token was not refreshed,
// and error if it failed to refersh.
// and error if it failed to refresh.
type Refresher interface {
Refresh(context.Context, *model.User) (bool, error)
}

View File

@ -11,7 +11,7 @@ import (
// the stream. This should be resolved.
// TODO (bradrydzewski) implement a mux.Info to fetch information and
// statistics for the multiplexier. Streams, subscribers, etc
// statistics for the multiplexer. Streams, subscribers, etc
// mux.Info()
// TODO (bradrydzewski) refactor code to place publisher and subscriber

View File

@ -97,7 +97,7 @@ func Tree(steps []*Step) ([]*Step, error) {
}
}
// assign children to parrents
// assign children to parents
for i := range steps {
if !steps[i].IsParent() {
parent, err := findNode(nodes, steps[i].PPID)

View File

@ -17,7 +17,7 @@ type Message struct {
// Data is the actual data in the entry.
Data []byte `json:"data"`
// Labels represents the key-value pairs the entry is lebeled with.
// Labels represents the key-value pairs the entry is labeled with.
Labels map[string]string `json:"labels,omitempty"`
}

View File

@ -96,7 +96,7 @@ var legacy2Xorm = task{
return err
}
if _, err := sess.Exec("INSERT INTO build_config (config_id, build_id) SELECT config_id,build_id FROM old_build_config;"); err != nil {
return fmt.Errorf("unable to set copy data in to temp table %s. Error: %v", "old_build_config", err)
return fmt.Errorf("unable to set copy data into temp table %s. Error: %v", "old_build_config", err)
}
if err := sess.DropTable("old_build_config"); err != nil {
return fmt.Errorf("could not drop table '%s': %v", "old_build_config", err)

View File

@ -130,7 +130,7 @@ type Store interface {
GlobalSecretFind(string) (*model.Secret, error)
GlobalSecretList() ([]*model.Secret, error)
// Registrys
// Registries
RegistryFind(*model.Repo, string) (*model.Registry, error)
RegistryList(*model.Repo) ([]*model.Registry, error)
RegistryCreate(*model.Registry) error
@ -148,7 +148,7 @@ type Store interface {
// Logs
LogFind(*model.Step) (io.ReadCloser, error)
// TODO: since we do ReadAll in any case a ioReader is not the best idear
// TODO: since we do ReadAll in any case a ioReader is not the best idea
// so either find a way to write log in chunks by xorm ...
LogSave(*model.Step, io.Reader) error

View File

@ -147,7 +147,7 @@ paths:
Unable to activate the Repository because it is already activate
500:
description: |
Unable to activate the Repository due to an internal server error. This may indicate a problem adding hooks to the remote system (ie Github), generating SSH deployment keys, or persisting to the database.
Unable to activate the Repository due to an internal server error. This may indicate a problem adding hooks to the remote system (ie GitHub), generating SSH deployment keys, or persisting to the database.
delete:
parameters:
@ -198,7 +198,7 @@ paths:
tags:
- Repos
summary: Encrypt repo secrets
description: Encryptes a Yaml file with secret environment variables for secure public storage.
description: Encrypts a Yaml file with secret environment variables for secure public storage.
security:
- accessToken: []
responses:

View File

@ -22,7 +22,7 @@ var PrivilegedPlugins = []string{
"woodpeckerci/plugin-docker-buildx",
}
// DefaultConfigOrder represent the priority in witch woodpecker serarch for a pipeline config by default
// DefaultConfigOrder represent the priority in witch woodpecker search for a pipeline config by default
// folders are indicated by supplying a trailing /
var DefaultConfigOrder = [...]string{
".woodpecker/",

View File

@ -26,13 +26,13 @@ import (
func WithContextSigtermCallback(ctx context.Context, f func()) context.Context {
ctx, cancel := context.WithCancel(ctx)
go func() {
recivedSignal := make(chan os.Signal, 1)
signal.Notify(recivedSignal, syscall.SIGINT, syscall.SIGTERM)
defer signal.Stop(recivedSignal)
receivedSignal := make(chan os.Signal, 1)
signal.Notify(receivedSignal, syscall.SIGINT, syscall.SIGTERM)
defer signal.Stop(receivedSignal)
select {
case <-ctx.Done():
case <-recivedSignal:
case <-receivedSignal:
cancel()
if f != nil {
f()

View File

@ -57,7 +57,7 @@ export function useTabsClient() {
const activeTab = inject<Ref<string>>('active-tab');
if (activeTab === undefined || tabs === undefined || disableHashMode === undefined) {
throw new Error('Please use this "useTabsClient" composition inside a compoent running "useTabsProvider".');
throw new Error('Please use this "useTabsClient" composition inside a component running "useTabsProvider".');
}
return { activeTab, tabs, disableHashMode };

View File

@ -92,8 +92,8 @@ export default defineStore({
this.setPipeline(owner, repo, pipelines);
},
async loadPipelineFeed() {
const pipeliness = await apiClient.getPipelineFeed();
this.pipelineFeed = pipeliness;
const pipelines = await apiClient.getPipelineFeed();
this.pipelineFeed = pipelines;
},
},
});