\r\n\n\n### Steps to reproduce\n\n.\n\n### Expected behavior\n\n_No response_\n\n### System Info\n\n```shell\n\"next-d126cf9e35\"\n```\n\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]",[2015,2016],{"name":1985,"color":1986},{"name":2017,"color":2018},"ui","46DEA2",4677,"`tag` pipelines are missing avatar and commit title","2025-01-12T06:19:42Z","https://github.com/woodpecker-ci/woodpecker/issues/4677",0.7593689,{"description":2025,"labels":2026,"number":2031,"owner":1991,"repository":1992,"state":1993,"title":2032,"updated_at":2033,"url":2034,"score":2035},"and address\r\n- https://github.com/woodpecker-ci/woodpecker/issues/3503 -> #3820\r\n- https://github.com/woodpecker-ci/woodpecker/pull/3733#issuecomment-2180578290\r\n- ...\r\n\r\nTests to run:\r\n- [ ] Run workflow with steps that should only run if the step before [failed,succeded] (could help with questions like: https://github.com/woodpecker-ci/woodpecker/pull/3846#discussion_r1686246455)\r\n- [ ] Services and check if it is started before the steps who need it ...\r\n- [ ] Make sure the Queue respect **labels** and dependencies correctly\r\n- [ ] ...",[2027,2030],{"name":2028,"color":2029},"tests","ACEA1E",{"name":1988,"color":1989},3819,"Create \"backend integration test\" framework","2024-11-05T23:18:48Z","https://github.com/woodpecker-ci/woodpecker/issues/3819",0.76034963,{"description":2037,"labels":2038,"number":2042,"owner":1991,"repository":1992,"state":2043,"title":2044,"updated_at":2045,"url":2046,"score":2047},"### Clear and concise description of the problem\r\n\r\nWoodpecker can support setting the `runtimeClassName` configuration for a pipeline step Pod. `runtimeClassName` specifies the alternative container runtime to use, which is useful when we need different runtime features, most notably CUDA support from NVIDIA’s runtime distributions.\r\n\r\nI’m new to Woodpecker and Go, but I’m willing to help if I can learn the codebase.\r\n\r\n### Suggested solution\r\n\r\nAdd a configurable `runtimeClass` property in `steps[].backend_options.kubernetes`. When this property is specified, use it as the `spec.runtimeClassName` of the created Pod.\r\n\r\n### Alternative\r\n\r\n_No response_\r\n\r\n### Additional context\r\n\r\nRuntime Class | Kubernetes: https://kubernetes.io/docs/concepts/containers/runtime-class/\r\n\r\n### Validations\r\n\r\n- [X] Checked that the feature isn't part of the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]\r\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\r\n- [X] Check that there isn't already an [issue](https://github.com/woodpecker-ci/woodpecker/issues) that request the same feature to avoid creating a duplicate.",[2039,2040],{"name":2002,"color":2003},{"name":2041,"color":2006},"backend/kubernetes",3473,"closed","Support for setting runtime class on Kubernetes backend","2024-03-29T09:29:08Z","https://github.com/woodpecker-ci/woodpecker/issues/3473",0.701554,{"description":2049,"labels":2050,"number":2055,"owner":1991,"repository":1992,"state":2043,"title":2056,"updated_at":2057,"url":2058,"score":2059},"### Component\n\nserver\n\n### Describe the bug\n\nWe like to setup a workflow that is skipped if a change contains ONLY changes to a certain list of files. For that we tried using a `when` condition similar to this:\n\n```yaml\nwhen:\n - event: pull_request\n path:\n exclude: [ 'README.md' ]\n include: [ 'src/*.go' ]\n```\n\nThis will however make woodpecker skip the workflow for any commit that touches files listed in `exclude`. Including commits that change other files in addition. E.g. if I have a commit changing `src/main.go` and `README.md` the workflow will not be executed.\nIs that really the desired behavior? To me it looks more like a but. I could be wrong, but I would expect the more common use case for such an `exclude` constraint to be to skip execution when an change contains only files that are listed in `exclude` and to not skip as soon as at least one file is changed that is not excluded.\n\n### Steps to reproduce\n\n- Create a woodpecker workflow with the above `path` constraint. \n- Submit a change that touches `README.md` and `src/main.go` \n- The workflow will not be executed\n\n### Expected behavior\n\n_No response_\n\n### System Info\n\n```shell\nwoodpecker v3.4.x, happens also on the current main branch\n```\n\n### Additional context\n\nI'll try to submit a PR with adjusted unit tests to clarify what I think is the more useful behavior.\n\n### Validations\n\n- [x] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [x] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [x] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/versions]",[2051,2052],{"name":1985,"color":1986},{"name":2053,"color":2054},"pipeline-config","1BE540",5041,"Weird behavior on path exclude contraints","2025-04-01T18:05:53Z","https://github.com/woodpecker-ci/woodpecker/issues/5041",0.7190884,{"description":2061,"labels":2062,"number":2064,"owner":1991,"repository":1992,"state":2043,"title":2065,"updated_at":2066,"url":2067,"score":2068},"### Component\r\n\r\nagent\r\n\r\n### Describe the bug\r\n\r\nWhen having a backend error in the config, i.e. a malformed env var, the step and build are marked as successful even though they should be marked as \"failed\". \r\n\r\n\r\n\r\n\r\nk8s backend\r\n\r\n\r\n### System Info\r\n\r\n```shell\r\n{\"source\":\"https://github.com/woodpecker-ci/woodpecker\",\"version\":\"next-6ab9f802\"}\r\n```\r\n\r\n\r\n### Additional context\r\n\r\n_No response_\r\n\r\n### Validations\r\n\r\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/master/CONTRIBUTING.md).\r\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\r\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\r\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]\r\n- [X] Check that this is a concrete bug. For Q&A join our [Discord Chat Server](https://discord.gg/fcMQqSMXJy) or the [Matrix room](https://matrix.to/#/#woodpecker:matrix.org).",[2063],{"name":1985,"color":1986},1871,"Build is marked as \"successful\" although a backend error occurred","2025-01-10T21:25:48Z","https://github.com/woodpecker-ci/woodpecker/issues/1871",0.7215684,{"description":2070,"labels":2071,"number":2074,"owner":1991,"repository":1992,"state":2043,"title":2075,"updated_at":2076,"url":2077,"score":2078},"### Clear and concise description of the problem\r\n\r\nI'm trying to run a container image build step in my pipeline that uses [buildah](https://quay.io/repository/buildah/stable?tab=info). I'm running into a lot of permission errors like this:\r\n\r\n```\r\ntime=\"2023-10-07T19:59:26Z\" level=error msg=\"writing \\\"0 0 4294967295\\\\n\\\" to /proc/17/uid_map: write /proc/17/uid_map: operation not permitted\"\r\ntime=\"2023-10-07T19:59:26Z\" level=error msg=\"(Unable to determine exit status)\"\r\n```\r\n\r\nAfter some experimentation with podman and buildah containers on my cluster, I have determined that I need to configure a few different settings at the Pod level for this to work:\r\n\r\n- `metadata.annotations`: I need to be able to set `container.apparmor.security.beta.kubernetes.io/\u003Ccontainer_name>` to use a custom apparmor profile for my buildah container. I would like to use the `WOODPECKER_BACKEND_K8S_POD_ANNOTATIONS` env variable, but since the container names are randomly generated I'm not sure how to make this work.\r\n- `spec.securityContext`: The only way I have found to make buildah work is to run it as non-root. This means that I need to set `runAsUser`, `runAsGroup`, and `fsGroup` on the Pod level `securityContext` (not the container level).\r\n\r\n### Suggested solution\r\n\r\nAdding support for `securityContext` seems like it should be fairly straightforward. We could just follow that same approach that is currently used for `resources`, `nodeSelector`, etc. [documented here](https://woodpecker-ci.org/docs/next/administration/backends/kubernetes#resources).\r\n\r\nThe AppArmor profile is trickier since the container name needs to be included in the annotation key. I'm imagining a configuration like `backend_options.kubernetes.appArmorProfile` that could take all of the possible values for the annotation [documented here](https://kubernetes.io/docs/tutorials/security/apparmor/). Then, the pod generation logic would just look for this configuration and add the appropriate annotation if it's found.\r\n\r\n### Alternative\r\n\r\nI could disable AppArmor entirely, but that's not really advisable for a production environment. I could also try to find a way to get the buildah container running as root (it should be possible), but again, that's not ideal from a security perspective.\r\n\r\n### Additional context\r\n\r\nThis is somewhat of a follow up from #2510. I'm trying to get Woodpecker to run on my kubeadm/CRI-O based cluster running on Debian which I believe makes me some kind of leprechaun/unicorn/lochness monster. There definitely aren't many of us out there.\r\n\r\n### Validations\r\n\r\n- [X] Checked that the feature isn't part of the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]\r\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/main/CONTRIBUTING.md).\r\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\r\n- [X] Check that there isn't already an [issue](https://github.com/woodpecker-ci/woodpecker/issues) that request the same feature to avoid creating a duplicate.",[2072,2073],{"name":2002,"color":2003},{"name":2041,"color":2006},2545,"Support AppArmor annotations and securityContext in kubernetes backend","2024-01-12T22:32:26Z","https://github.com/woodpecker-ci/woodpecker/issues/2545",0.7296071,{"description":2080,"labels":2081,"number":2085,"owner":1991,"repository":1992,"state":2043,"title":2086,"updated_at":2087,"url":2088,"score":2089},"### Clear and concise description of the problem\r\n\r\n`Woodpecker CI` could benefit from using some defaults to avoid repetitive blocks and/or references to anchors.\r\n\r\nThis is something I used to use in `GitLab CI` and it makes the pipeline really compact. For instance, they have a `default` keyword to configure some \"default\" values that apply to all subsequent steps — when relevant.\r\n\r\n### Suggested solution\r\n\r\n```yaml\r\ndefault:\r\n image: docker.io/library/rust:1.61-slim-bullseye\r\n\r\npipeline:\r\n format:\r\n commands:\r\n - rustup component add rustfmt\r\n - cargo fmt -- --check\r\n environment:\r\n CARGO_HOME: .cargo/\r\n group: verify\r\n # No need to specify image here since it's inferred by \"default\"\r\n assemble:\r\n commands:\r\n - cargo build\r\n environment:\r\n CARGO_HOME: .cargo/\r\n group: assemble\r\n # No need to specify image here since it's inferred by \"default\"\r\n publish:\r\n commands:\r\n - cargo blah\r\n environment:\r\n CARGO_HOME: .cargo/\r\n group: publish\r\n image: docker.io/library/rust:1.62-slim-bullseye # ...if defined, overwrites what's in default\r\n```\r\n\r\n### Alternative\r\n\r\nYAML aliases and anchors :unamused:\r\n\r\n### Additional context\r\n\r\n_No response_\r\n\r\n### Validations\r\n\r\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/master/CONTRIBUTING.md).\r\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\r\n- [X] Check that there isn't already an [issue](https://github.com/woodpecker-ci/woodpecker/issues) that request the same feature to avoid creating a duplicate.",[2082],{"name":2083,"color":2084},"feature","180DBE",946,"Global defaults for some keywords","2023-08-20T20:29:48Z","https://github.com/woodpecker-ci/woodpecker/issues/946",0.7355966,{"description":2091,"labels":2092,"number":2093,"owner":1991,"repository":1992,"state":2043,"title":2094,"updated_at":2095,"url":2096,"score":2097},"### Component\n\nserver\n\n### Describe the bug\n\nI am attempting to deduplicate CI/CD code and one obvious option would be to include `.woodpecker` as Git submodule\n\n### Steps to reproduce\n\nI moved YAML files to separate repo https://git.k-space.ee/k-space/container-image-pipeline and included it as submodule https://git.k-space.ee/k-space/wildflock/commit/86d0b37713e19b66ee48187ba2e4f24fb3d4e0d2\r\n\r\nWoodpecker doesn't see any pipeline elements now\n\n### Expected behavior\n\nWoodpecker would look up YAML files in the referenced Git submodule\n\n### System Info\n\n```shell\n{\"source\":\"https://github.com/woodpecker-ci/woodpecker\",\"version\":\"2.7.0\"}\n```\n\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]",[],4050,"Can't include .woodpecker as Git submodule","2024-08-21T05:20:15Z","https://github.com/woodpecker-ci/woodpecker/issues/4050",0.7379475,["Reactive",2099],{},["Set"],["ShallowReactive",2102],{"TRc1wZytZ_XrK4EfJfei_Sz-An4H4Yy6syhVxH_PVJc":-1,"MVbc_gRkPRTssQUth6c0ckVlusCsH7x8O2Uutj9w-Xw":-1},"/woodpecker-ci/woodpecker/1760"]