00dc153121
provider=none forces not using a token.
2019-11-16 13:25:00 +01:00
c43eb7af42
Grooming.
...
Fixes some issues introduced in the last commit.
2019-11-10 19:25:45 +01:00
d3fe317665
Grooming, service reload
, Service#reload
.
...
`reload-command:` can be defined in service definition `.spec` files.
2019-11-09 21:52:43 +01:00
5852a1b818
Improved UI a bit.
2019-11-09 13:35:25 +01:00
c2730bdd71
Improved service removal.
2019-11-08 15:54:44 +01:00
Philippe PITTOLI
e0e81d8581
Services can now be "Non Runnable".
2019-11-08 01:08:57 +01:00
1c80a80158
Custom names for services.
...
Services must be created as `[env/]custom_name` and be passed a `type=`
parameter when created.
2019-11-07 18:08:57 +01:00
7fdccfa1b2
service status --verbose
2019-10-29 13:08:58 +01:00
6ee52f5baa
Ports management overhaul.
2019-10-29 12:32:49 +01:00
3349c3f251
WIP optional tokens.
2019-10-28 14:06:05 +01:00
55dbfa7999
Some services now require a domain name to be provided.
2019-10-28 13:22:15 +01:00
1f9264f97b
Improved service del
, service stop
, grooming.
2019-10-25 18:40:27 +02:00
21e6943868
service del-environment
2019-10-25 17:59:53 +02:00
add94be507
service del
takes service ids as parameters
2019-10-25 13:15:44 +02:00
479dffc6a0
Fixes and improves service show
’s CLI.
2019-10-25 12:28:39 +02:00
bdeb23c275
Better handling of commands.
2019-10-24 20:31:38 +02:00
3ca16cfcce
service help
updated slightly.
2019-10-24 18:52:30 +02:00
f085cac64e
service list
removed.
2019-10-24 18:50:23 +02:00
de2b124d09
service add-environment <name>, bugfixes.
2019-10-24 18:29:22 +02:00
c6dd306361
service: service add <service-id> [token=provider [...]]
2019-10-24 17:55:01 +02:00
75d5fd7874
status
can take several parameters or none.
2019-10-23 19:38:08 +02:00
3c20783f91
Updated dependencies and code for new Crystal version.
2019-10-19 18:08:34 +02:00
4eefe465f4
Providers are auto-guessed when adding services.
2019-08-10 22:29:11 +02:00
9e7921a803
service add
can be specified token providers.
2019-08-10 22:02:11 +02:00
5dd27e1101
Priviledges management.
...
- `service status` does not require priviledges anymore… if the
`status` binary is owned by root and has the setuid and setguid
flags. Hopefully, that binary only checks that a service’s process
exists.
2019-06-10 14:32:30 +02:00
5eb0849abd
Project organisation for WIP separate binaries.
...
- The idea would be to allow running specific commands from SUID
binaries when unpriviledged users should be able to run them. Such
commands include getting services status, which need root
priviledges to be implemented but shouldn’t be required by users.
- Because the repository now builds several binaries, src/main.cr is
now src/service.cr and a WIP src/status.cr has been added.
- The `status` binary will likely be installed in libexec in the
future, with the SUID bit set.
2019-06-09 18:08:59 +02:00
8a6829d803
Running daemons as a different user is now possible.
2019-06-09 17:14:18 +02:00
61c9f33f89
Sources split.
2019-06-09 16:59:05 +02:00