Archived
1
0
Commit Graph

3288 Commits

Author SHA1 Message Date
108eb297d8 Revert "Decomission Travis" 2020-02-04 11:35:19 -06:00
19f3acd9f0 Merge pull request #1334 from sr229/patch-1
Decomission Travis
2020-02-04 11:35:12 -06:00
3ee6b0ff0b Automatically push releases to GCS (#1318) 2020-02-04 11:32:45 -06:00
e270f7da1b Merge pull request #1335 from cdr/revert-1225-master
Revert "Updates manifest.json"
2020-02-04 11:30:14 -06:00
e6117decd0 Revert "Set display property in manifest to fullscreen"
This reverts commit c7127cb248.
2020-02-04 11:30:00 -06:00
c7127cb248 Set display property in manifest to fullscreen 2020-02-04 11:23:21 -06:00
50234e5f04 Reflects new location of vscodeVersion (#1327) 2020-02-04 11:10:32 -06:00
5f562dc113 Decomission Travis
We won't need Travis from now on since it's only purpose is to do Mac builds, which no one uses anymore.
2020-02-04 20:43:54 +08:00
bb8bad49dc Remvoe question issue template
Closes #1331
2020-02-03 11:35:18 -06:00
a674d882bf Remove buggy -v flag from README.md docker run
Closes #1270

Will describe in FAQ how to keep state.
2020-01-27 12:17:59 -06:00
f51e045cd5 Use the nbin centos container to build again
This will put the glibc requirement back down to what it used to be.
2.1698
2020-01-17 16:27:36 -06:00
8122b7f69e Remove unused upload service
No longer needed since VS Code has their own now.
2020-01-17 12:23:36 -06:00
25f18beda4 Fix version test 2020-01-16 18:09:19 -06:00
7e7923706f Fix version generated from Git tag 2020-01-16 17:59:11 -06:00
ae35673489 Use custom Yarn cache directory
Makes it easier to upload and restore.
2020-01-16 15:39:44 -06:00
23f142fdc6 Cache Yarn cache 2020-01-16 15:23:25 -06:00
101139fabf Fix Drone CI releases
Also skip the 32 bit arm releases since they don't currently build
anyway.
2020-01-16 14:53:59 -06:00
e2d354c8f2 Move manifest icon to the root as well 2020-01-16 12:11:56 -06:00
7c178805ea Add comment about the manifest's served location
Also for #1278.
2020-01-16 11:44:17 -06:00
45f70e741f Move manifest to the root
Fixes #1278.
2020-01-16 11:36:17 -06:00
1474a82c7d Add insecure access notification 2020-01-16 11:15:22 -06:00
d97feca3ba Add code-server version to the about dialog 2020-01-15 18:02:19 -06:00
b2669e78bf Implement ExtHostStoragePaths for the browser
This appears to make vscodevim work again.
2020-01-15 17:13:06 -06:00
66ee6e8201 Ignore 32 bit arm failures for now
Seems we are running out of memory.
2020-01-15 13:48:27 -06:00
62f050fda7 Add a simple test 2020-01-15 13:22:45 -06:00
57425377e5 Use CI dockerfile for pushing Docker image 2020-01-15 13:22:45 -06:00
174cb2f8a9 Remove unused Docker step from CI script 2020-01-15 13:22:42 -06:00
42bddce21f Add defaults for environment variables
So we don't have to keep setting them for each CI and every single step
since there doesn't seem to be a way to share them between steps in
Drone.
2020-01-15 13:21:58 -06:00
f2a15795a1 Use draft releases for Drone
This gives us a chance to review it and add notes.
2020-01-15 13:21:58 -06:00
6dd5e515c5 Travis release on tags only and remove Docker push
The manual tagging is necessary to sync up the releases of the two
different CIs.
2020-01-15 13:21:55 -06:00
92da02ef3e Add Drone CI caching 2020-01-15 13:20:58 -06:00
3ce7129492 Drone CI migration (#1261) 2020-01-15 13:14:05 -06:00
336ee28888 Update Node to 12.14.0 2020-01-08 16:30:44 -06:00
3f2240ab65 Update logger 2020-01-08 16:30:34 -06:00
1087037728 Don't push latest and v2 Docker tags automatically
We should only push those when the version is confirmed to work.
2020-01-08 15:05:12 -06:00
1959d82912 Increase cache timeout
The Mac build seems to be terminated due to a timeout during the caching
stage.
2020-01-08 13:20:50 -06:00
8024144381 Update VS Code to 1.41.1 2020-01-07 18:27:41 -06:00
6a1dcab7a6 Update nbin
Should finally be able to build with Node v12 now.
2020-01-07 18:27:28 -06:00
e6d1f2a7c8 Update VS Code to 1.41.0 2019-12-16 16:52:29 -06:00
44c4722edf Fix data directory path in Dockerfile 2019-12-10 12:06:52 -06:00
e5fc63f2c8 Fix accessing manifest behind basic auth
Apparently the manifest spec doesn't include sending credentials in an
attempt to be secure by default.

Fixes #1212.
2019-12-09 11:25:59 -06:00
015a99e87d Always install VS Code dependencies
This fixes the case where the script is killed before all the
dependencies were fully installed.
2019-12-09 10:55:24 -06:00
884491d72b Update Dockerfile to fix EACCES issue on mount (#1191)
https://github.com/cdr/code-server/issues/1188 
Fixes issue with permissions mounting in directories in the container. Folders are generated by root causing issues when the container user "coder" wants to create sub-folders. This fix solves it, at least on Crostini (ChromeOS)
2019-12-05 13:38:03 -06:00
e14362f322 Pass along Node options 2.1692-vsc1.39.2 2019-11-14 17:20:23 -06:00
917aa48072 Update enterprise link
Fixes #1172.
2019-11-14 11:16:08 -06:00
938c6ef829 Update fail2ban configuration
Fixes #1177.
2019-11-14 11:14:27 -06:00
0add01d383 Delete apt lists from final image (#1174) 2019-11-14 11:12:21 -06:00
2018024810 Hash password
Fixes issues with unexpected characters breaking things when setting the
cookie (like semicolons).

This change as-is does not affect the security of code-server
itself (we've just replaced the static password with a static hash) but
if we were to add a salt in the future it would let us invalidate keys
by rehashing with a new salt which could be handy.
2.1688-vsc1.39.2
2019-11-07 15:57:57 -06:00
a1d6bcb8e5 Handle cookies more robustly
If you visit /login/ instead of /login the cookie will be set at /login
instead of / which means the cookie can't be read at the root. It will
redirect to the login page which *can* read the cookie at /login and
redirect back resulting in an infinite loop.

The previous solution relied on setting the cookie at / (any invalid
value works) which then overrode the login page cookie since
parseCookies only kept a single value. So the login page would see the
same cookie the root was seeing and not redirect back. However, that
behavior depends on the cookies being in the right order which I'm not
sure is guaranteed.

This new method tests all available cookies and always sets the cookie
so the root path will be able to read it in case the login page is
seeing a cookie the root can't.

It also goes a step further and explicitly sets the path on the cookie
which fixes the case where there is a permanent misconfiguration
redirecting /login to /login/. Otherwise the cookie would continually be
set on /login only and you'd have another loop. It also means you only
need to delete one cookie to log out.

Lastly add some properties to make the cookies a bit more secure.
2019-11-07 13:36:18 -06:00
727ac6483b Clear password when redirecting to login
Should prevent endless redirects when the cookie is set on a different path or domain (like with a dot prefix).
2019-11-07 11:38:10 -06:00