\r\n\n\n### Steps to reproduce\n\n.\n\n### Expected behavior\n\n_No response_\n\n### System Info\n\n```shell\n\"next-d126cf9e35\"\n```\n\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]",[2015,2016],{"name":1985,"color":1986},{"name":2017,"color":2018},"ui","46DEA2",4677,"`tag` pipelines are missing avatar and commit title","2025-01-12T06:19:42Z","https://github.com/woodpecker-ci/woodpecker/issues/4677",0.7471901,{"description":2025,"labels":2026,"number":2030,"owner":1991,"repository":1992,"state":1993,"title":2031,"updated_at":2032,"url":2033,"score":2034},"### Clear and concise description of the problem\n\nIn a `Dockerfile` it is often necessary to connect to some resource (e.g. remote registry) and for that we need secrets.\r\n\r\nThere is no way to do this.\n\n### Suggested solution\n\nThe [official solution](https://docs.docker.com/engine/reference/builder/#run---mounttypesecret) is to use `RUN --mount=type=secret`. But that isn't supported by Woodpecker.\n\n### Alternative\n\n*There is no safe alternative.*\r\n\r\nUsing `ENV` is a terrible idea because they will be baked into the image. Unless they are passed into the docker build from the pipeline, but Woodpecker isn't able to do that currently.\r\n\r\nUsing `ARG` is also bad as they are [exposed](https://docs.docker.com/engine/reference/builder/#arg) in the docker history. So we can't use Woodpecker's `build_args` option.\n\n### Additional context\n\nI am sure some people will say that this is an easy problem to solve: \"just move that logic out of the Dockerfile and into the pipeline itself\".\r\n\r\nThat is not always possible. Some Dockerfiles are complex and must be used as-is. But they are managed by the pipeline, and the pipeline doesn't have any way to pass secrets (via environment variables or --mount=type=secret).\n\n### Validations\n\n- [X] Checked that the feature isn't part of the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/main/CONTRIBUTING.md).\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't already an [issue](https://github.com/woodpecker-ci/woodpecker/issues) that request the same feature to avoid creating a duplicate.",[2027],{"name":2028,"color":2029},"feature","180DBE",2446,"Support --mount=type=secret when building a Dockerfile","2023-09-11T23:45:21Z","https://github.com/woodpecker-ci/woodpecker/issues/2446",0.7565037,{"description":2036,"labels":2037,"number":2040,"owner":1991,"repository":1992,"state":2041,"title":2042,"updated_at":2043,"url":2044,"score":2045},"### Clear and concise description of the problem\n\nWhen committing with a structured message (e.g. following Conventional Commits specification), Woodpecker cramps the whole message together into one large string when displaying it in the repo commit list and the pipeline run title. This is usually pretty ugly and decreases readability. \r\n\r\nExample:\r\n\r\n\n\n### Suggested solution\n\nA new environment variable CI_COMMIT_MESSAGE_HEADER could be added which would be used to populate the strings mentioned above. This would of course require parsing the commit message first.\n\n### Alternative\n\nAlternatively, a UI section for the body and footer of the commit message could be added below the pipeline run title to display those variables. \r\n\r\nAll of the steps described above would still be necessary, but in addition, at least CI_COMMIT_MESSAGE_BODY (if one wants to treat body and footer as one) would have to be parsed and added as well.\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/master/CONTRIBUTING.md).\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't already an [issue](https://github.com/woodpecker-ci/woodpecker/issues) that request the same feature to avoid creating a duplicate.",[2038,2039],{"name":2017,"color":2018},{"name":2028,"color":2029},1489,"closed","Beautify display of commit messages with bodies and/or footers","2023-08-20T16:52:56Z","https://github.com/woodpecker-ci/woodpecker/issues/1489",0.6750619,{"description":2047,"labels":2048,"number":2050,"owner":1991,"repository":1992,"state":2041,"title":2051,"updated_at":2052,"url":2053,"score":2054},"### Component\n\nserver\n\n### Describe the bug\n\nThere is unnecessary empty table `registry_v031` in database.\n\n### Steps to reproduce\n\n```sql\r\npostgres=# \\c woodpecker\r\nYou are now connected to database \"woodpecker\" as user \"postgres\".\r\nwoodpecker=# \\dt\r\n List of relations\r\n Schema | Name | Type | Owner\r\n--------+------------------+-------+------------\r\n public | agents | table | woodpecker\r\n public | configs | table | woodpecker\r\n public | crons | table | woodpecker\r\n public | files | table | woodpecker\r\n public | forges | table | woodpecker\r\n public | log_entries | table | woodpecker\r\n public | migration | table | woodpecker\r\n public | orgs | table | woodpecker\r\n public | perms | table | woodpecker\r\n public | pipeline_configs | table | woodpecker\r\n public | pipelines | table | woodpecker\r\n public | redirections | table | woodpecker\r\n public | registries | table | woodpecker\r\n public | registry_v031 | table | woodpecker\r\n public | repos | table | woodpecker\r\n public | secrets | table | woodpecker\r\n public | server_configs | table | woodpecker\r\n public | steps | table | woodpecker\r\n public | tasks | table | woodpecker\r\n public | users | table | woodpecker\r\n public | workflows | table | woodpecker\r\n(21 rows)\r\n\r\nwoodpecker=# select * from registry_v031;\r\n registry_id | registry_repo_id | registry_addr | registry_username | registry_password\r\n-------------+------------------+---------------+-------------------+-------------------\r\n(0 rows)\r\n``` \n\n### Expected behavior\n\nThere is no garbage table.\n\n### System Info\n\n```shell\nWoodpecker `2.7.0`, Postgres 16.\n```\n\n\n### Additional context\n\n#3806\n\n### Validations\n\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Checked that the bug isn't fixed in the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]",[2049],{"name":1985,"color":1986},4104,"Garbage table registry_v031","2024-09-14T11:41:15Z","https://github.com/woodpecker-ci/woodpecker/issues/4104",0.67798185,{"description":2056,"labels":2057,"number":2061,"owner":1991,"repository":1992,"state":2041,"title":2062,"updated_at":2063,"url":2064,"score":2065},"https://ci.woodpecker-ci.org/repos/3780/pipeline/20983/15\r\n\r\nbuild-deb-rpo errors with:\r\n```\r\nVERSION_NUMBER=0.0.0 nfpm package --config ./nfpm/agent.yaml --target dist --packager deb\r\nmatching \"./woodpecker-agent.service\": file does not exist\r\nmake: *** [Makefile:319: bundle-agent] Error 1\r\n```",[2058],{"name":2059,"color":2060},"build","6AB8BA",4152,"fix 'binary' workflow","2024-10-05T14:43:41Z","https://github.com/woodpecker-ci/woodpecker/issues/4152",0.7124245,{"description":2067,"labels":2068,"number":2071,"owner":1991,"repository":1992,"state":2041,"title":2072,"updated_at":2073,"url":2074,"score":2075},"### Component\n\nweb-ui\n\n### Describe the bug\n\nThe spaces in task output should be kept.\r\n\r\n\r\n\n\n### System Info\n\n```shell\n\"source\": \"https://github.com/woodpecker-ci/woodpecker\",\r\n\"version\": \"next-9feb6be9\"\n```\n\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/master/CONTRIBUTING.md).\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't [already an issue](https://github.com/woodpecker-ci/woodpecker/issues) that reports the same bug to avoid creating a duplicate.\n- [X] Check that this is a concrete bug. For Q&A join our [Discord Chat Server](https://discord.gg/fcMQqSMXJy).",[2069,2070],{"name":1985,"color":1986},{"name":2017,"color":2018},718,"The spaces in task output should be kept.","2022-06-16T17:24:27Z","https://github.com/woodpecker-ci/woodpecker/issues/718",0.73531884,{"description":2077,"labels":2078,"number":2082,"owner":1991,"repository":1992,"state":2041,"title":2083,"updated_at":2084,"url":2085,"score":2086},"### Clear and concise description of the problem\r\n\r\nI'm trying to run a container image build step in my pipeline that uses [buildah](https://quay.io/repository/buildah/stable?tab=info). I'm running into a lot of permission errors like this:\r\n\r\n```\r\ntime=\"2023-10-07T19:59:26Z\" level=error msg=\"writing \\\"0 0 4294967295\\\\n\\\" to /proc/17/uid_map: write /proc/17/uid_map: operation not permitted\"\r\ntime=\"2023-10-07T19:59:26Z\" level=error msg=\"(Unable to determine exit status)\"\r\n```\r\n\r\nAfter some experimentation with podman and buildah containers on my cluster, I have determined that I need to configure a few different settings at the Pod level for this to work:\r\n\r\n- `metadata.annotations`: I need to be able to set `container.apparmor.security.beta.kubernetes.io/\u003Ccontainer_name>` to use a custom apparmor profile for my buildah container. I would like to use the `WOODPECKER_BACKEND_K8S_POD_ANNOTATIONS` env variable, but since the container names are randomly generated I'm not sure how to make this work.\r\n- `spec.securityContext`: The only way I have found to make buildah work is to run it as non-root. This means that I need to set `runAsUser`, `runAsGroup`, and `fsGroup` on the Pod level `securityContext` (not the container level).\r\n\r\n### Suggested solution\r\n\r\nAdding support for `securityContext` seems like it should be fairly straightforward. We could just follow that same approach that is currently used for `resources`, `nodeSelector`, etc. [documented here](https://woodpecker-ci.org/docs/next/administration/backends/kubernetes#resources).\r\n\r\nThe AppArmor profile is trickier since the container name needs to be included in the annotation key. I'm imagining a configuration like `backend_options.kubernetes.appArmorProfile` that could take all of the possible values for the annotation [documented here](https://kubernetes.io/docs/tutorials/security/apparmor/). Then, the pod generation logic would just look for this configuration and add the appropriate annotation if it's found.\r\n\r\n### Alternative\r\n\r\nI could disable AppArmor entirely, but that's not really advisable for a production environment. I could also try to find a way to get the buildah container running as root (it should be possible), but again, that's not ideal from a security perspective.\r\n\r\n### Additional context\r\n\r\nThis is somewhat of a follow up from #2510. I'm trying to get Woodpecker to run on my kubeadm/CRI-O based cluster running on Debian which I believe makes me some kind of leprechaun/unicorn/lochness monster. There definitely aren't many of us out there.\r\n\r\n### Validations\r\n\r\n- [X] Checked that the feature isn't part of the `next` version already [https://woodpecker-ci.org/faq#which-version-of-woodpecker-should-i-use]\r\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/main/CONTRIBUTING.md).\r\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\r\n- [X] Check that there isn't already an [issue](https://github.com/woodpecker-ci/woodpecker/issues) that request the same feature to avoid creating a duplicate.",[2079,2080],{"name":2002,"color":2003},{"name":2081,"color":2006},"backend/kubernetes",2545,"Support AppArmor annotations and securityContext in kubernetes backend","2024-01-12T22:32:26Z","https://github.com/woodpecker-ci/woodpecker/issues/2545",0.7375668,{"description":2088,"labels":2089,"number":2090,"owner":1991,"repository":1992,"state":2041,"title":2091,"updated_at":2092,"url":2093,"score":2094},"### Clear and concise description of the problem\n\nPeople miss this feature Drone CI has: https://docs.drone.io/runner/exec/overview/\r\n\r\nIt allows you to execute a build on a systems default shell, without isolation.\n\n### Suggested solution\n\nA user should be able to add and choose agents for a repo.\n\n### Alternative\n\nPeople keep using Drone CI.\n\n### Additional context\n\n_No response_\n\n### Validations\n\n- [X] Read the [Contributing Guidelines](https://github.com/woodpecker-ci/woodpecker/blob/master/CONTRIBUTING.md).\n- [X] Read the [docs](https://woodpecker-ci.org/docs/intro).\n- [X] Check that there isn't already an [issue](https://github.com/woodpecker-ci/woodpecker/issues) that request the same feature to avoid creating a duplicate.",[],847,"Support \"Exec runner\"","2022-03-23T16:56:18Z","https://github.com/woodpecker-ci/woodpecker/issues/847",0.7389256,["Reactive",2096],{},["Set"],["ShallowReactive",2099],{"TRc1wZytZ_XrK4EfJfei_Sz-An4H4Yy6syhVxH_PVJc":-1,"on1MR7vPCMltdV_sm0lF2sTqQK9ImCQtc7VMd5twRBo":-1},"/woodpecker-ci/woodpecker/4113"]