Compare commits
No commits in common. "main" and "stable" have entirely different histories.
|
@ -1,92 +0,0 @@
|
||||||
# Example configuration file, it's safe to copy this as the default config file without any modification.
|
|
||||||
|
|
||||||
# You don't have to copy this file to your instance,
|
|
||||||
# just run `./act_runner generate-config > config.yaml` to generate a config file.
|
|
||||||
|
|
||||||
log:
|
|
||||||
# The level of logging, can be trace, debug, info, warn, error, fatal
|
|
||||||
level: info
|
|
||||||
|
|
||||||
runner:
|
|
||||||
# Where to store the registration result.
|
|
||||||
file: /data/.runner
|
|
||||||
# Execute how many tasks concurrently at the same time.
|
|
||||||
capacity: 1
|
|
||||||
# Extra environment variables to run jobs.
|
|
||||||
envs:
|
|
||||||
A_TEST_ENV_NAME_1: a_test_env_value_1
|
|
||||||
A_TEST_ENV_NAME_2: a_test_env_value_2
|
|
||||||
# Extra environment variables to run jobs from a file.
|
|
||||||
# It will be ignored if it's empty or the file doesn't exist.
|
|
||||||
env_file: .env
|
|
||||||
# The timeout for a job to be finished.
|
|
||||||
# Please note that the Forgejo instance also has a timeout (3h by default) for the job.
|
|
||||||
# So the job could be stopped by the Forgejo instance if it's timeout is shorter than this.
|
|
||||||
timeout: 3h
|
|
||||||
# Whether skip verifying the TLS certificate of the Forgejo instance.
|
|
||||||
insecure: false
|
|
||||||
# The timeout for fetching the job from the Forgejo instance.
|
|
||||||
fetch_timeout: 5s
|
|
||||||
# The interval for fetching the job from the Forgejo instance.
|
|
||||||
fetch_interval: 2s
|
|
||||||
# The labels of a runner are used to determine which jobs the runner can run, and how to run them.
|
|
||||||
# Like: ["macos-arm64:host", "ubuntu-latest:docker://node:16-bullseye", "ubuntu-22.04:docker://node:16-bullseye"]
|
|
||||||
# If it's empty when registering, it will ask for inputting labels.
|
|
||||||
# If it's empty when execute `deamon`, will use labels in `.runner` file.
|
|
||||||
labels: []
|
|
||||||
|
|
||||||
cache:
|
|
||||||
# Enable cache server to use actions/cache.
|
|
||||||
enabled: true
|
|
||||||
# The directory to store the cache data.
|
|
||||||
# If it's empty, the cache data will be stored in $HOME/.cache/actcache.
|
|
||||||
dir: ""
|
|
||||||
# The host of the cache server.
|
|
||||||
# It's not for the address to listen, but the address to connect from job containers.
|
|
||||||
# So 0.0.0.0 is a bad choice, leave it empty to detect automatically.
|
|
||||||
host: ""
|
|
||||||
# The port of the cache server.
|
|
||||||
# 0 means to use a random available port.
|
|
||||||
port: 0
|
|
||||||
# The external cache server URL. Valid only when enable is true.
|
|
||||||
# If it's specified, act_runner will use this URL as the ACTIONS_CACHE_URL rather than start a server by itself.
|
|
||||||
# The URL should generally end with "/".
|
|
||||||
external_server: ""
|
|
||||||
|
|
||||||
container:
|
|
||||||
# Specifies the network to which the container will connect.
|
|
||||||
# Could be host, bridge or the name of a custom network.
|
|
||||||
# If it's empty, create a network automatically.
|
|
||||||
network: ""
|
|
||||||
# Whether to create networks with IPv6 enabled. Requires the Docker daemon to be set up accordingly.
|
|
||||||
# Only takes effect if "network" is set to "".
|
|
||||||
enable_ipv6: false
|
|
||||||
# Whether to use privileged mode or not when launching task containers (privileged mode is required for Docker-in-Docker).
|
|
||||||
privileged: false
|
|
||||||
# And other options to be used when the container is started (eg, --add-host=my.forgejo.url:host-gateway).
|
|
||||||
options:
|
|
||||||
# The parent directory of a job's working directory.
|
|
||||||
# If it's empty, /workspace will be used.
|
|
||||||
workdir_parent:
|
|
||||||
# Volumes (including bind mounts) can be mounted to containers. Glob syntax is supported, see https://github.com/gobwas/glob
|
|
||||||
# You can specify multiple volumes. If the sequence is empty, no volumes can be mounted.
|
|
||||||
# For example, if you only allow containers to mount the `data` volume and all the json files in `/src`, you should change the config to:
|
|
||||||
# valid_volumes:
|
|
||||||
# - data
|
|
||||||
# - /src/*.json
|
|
||||||
# If you want to allow any volume, please use the following configuration:
|
|
||||||
# valid_volumes:
|
|
||||||
# - '**'
|
|
||||||
valid_volumes: []
|
|
||||||
# overrides the docker client host with the specified one.
|
|
||||||
# If it's empty, act_runner will find an available docker host automatically.
|
|
||||||
# If it's "-", act_runner will find an available docker host automatically, but the docker host won't be mounted to the job containers and service containers.
|
|
||||||
# If it's not empty or "-", the specified docker host will be used. An error will be returned if it doesn't work.
|
|
||||||
docker_host: ""
|
|
||||||
# Pull docker image(s) even if already present
|
|
||||||
force_pull: false
|
|
||||||
|
|
||||||
host:
|
|
||||||
# The parent directory of a job's working directory.
|
|
||||||
# If it's empty, $HOME/.cache/act/ will be used.
|
|
||||||
workdir_parent:
|
|
File diff suppressed because it is too large
Load diff
14
manifests/podmanrunner.pp
Normal file
14
manifests/podmanrunner.pp
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
# Class for forgeo action runner.
|
||||||
|
class podmanrunner::runner (
|
||||||
|
Integer $replicas = 2,
|
||||||
|
)
|
||||||
|
{
|
||||||
|
user {
|
||||||
|
'podmanuser':
|
||||||
|
ensure => present,
|
||||||
|
home => /opt/podmanuser,
|
||||||
|
shell => /usr/sbin/nologin,
|
||||||
|
uid => 1001,
|
||||||
|
managehome => true,
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,108 +0,0 @@
|
||||||
# Class for forgeo action runner.
|
|
||||||
class podmanrunner::runner (
|
|
||||||
Integer $replicas = 2,
|
|
||||||
)
|
|
||||||
{
|
|
||||||
$username='runneruser'
|
|
||||||
$runnerdata = lookup("runners",undef,undef,undef)
|
|
||||||
package { 'podman':
|
|
||||||
ensure => installed,
|
|
||||||
provider => apt,
|
|
||||||
}
|
|
||||||
|
|
||||||
package { 'systemd-container':
|
|
||||||
ensure => installed,
|
|
||||||
provider => apt,
|
|
||||||
}
|
|
||||||
|
|
||||||
package { 'python3-dotenv':
|
|
||||||
ensure => installed,
|
|
||||||
provider => apt,
|
|
||||||
}
|
|
||||||
|
|
||||||
file { "/usr/local/bin/podman-compose":
|
|
||||||
ensure => file,
|
|
||||||
mode => '0555',
|
|
||||||
source => 'puppet:///modules/podmanrunner/podman-compose-1.0.6',
|
|
||||||
owner => "root",
|
|
||||||
group => "root",
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
range(1,$replicas).each |$x| {
|
|
||||||
|
|
||||||
user { "${username}${x}":
|
|
||||||
ensure => present,
|
|
||||||
home => "/opt/${username}${x}",
|
|
||||||
shell => '/usr/sbin/nologin',
|
|
||||||
uid => "${ $x + 1001}",
|
|
||||||
managehome => true,
|
|
||||||
}
|
|
||||||
|
|
||||||
file { "/opt/${username}${x}/docker-compose.yaml":
|
|
||||||
ensure => file,
|
|
||||||
content => template('podmanrunner/docker-compose.yaml.erb'),
|
|
||||||
owner => "${username}${x}",
|
|
||||||
group => "${username}${x}",
|
|
||||||
mode => '0400',
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
file { "/opt/${username}${x}/runnerimage":
|
|
||||||
ensure => directory,
|
|
||||||
mode => '0700',
|
|
||||||
owner => "${username}${x}",
|
|
||||||
group => "${username}${x}",
|
|
||||||
}
|
|
||||||
|
|
||||||
file { "/opt/${username}${x}/runnerimage/Containerfile":
|
|
||||||
ensure => file,
|
|
||||||
content => template('podmanrunner/runnerimage-Containerfile.erb'),
|
|
||||||
owner => "${username}${x}",
|
|
||||||
group => "${username}${x}",
|
|
||||||
mode => '0400',
|
|
||||||
}
|
|
||||||
|
|
||||||
unless find_file("/opt/${username}${x}/runnerdata") {
|
|
||||||
file { "/opt/${username}${x}/runnerdata":
|
|
||||||
ensure => directory,
|
|
||||||
mode => '0700',
|
|
||||||
owner => "${username}${x}",
|
|
||||||
group => "${username}${x}",
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
file { "/opt/${username}${x}/runnerdata/config.yml":
|
|
||||||
ensure => file,
|
|
||||||
source => 'puppet:///modules/podmanrunner/forgejo-runner-config.yml',
|
|
||||||
owner => "${username}${x}",
|
|
||||||
group => "${username}${x}",
|
|
||||||
mode => '0400',
|
|
||||||
}
|
|
||||||
|
|
||||||
# Make sure the podman user can read the /data dir
|
|
||||||
exec { "make-${username}${x}-own-runnerdata":
|
|
||||||
command => "systemd-run --wait --user --machine=${username}${x}@ /bin/bash -c 'podman unshare chown 1000:1000 /opt/${username}${x}/runnerdata'",
|
|
||||||
path => '/usr/bin:/usr/sbin:/bin',
|
|
||||||
provider => shell,
|
|
||||||
logoutput => false,
|
|
||||||
unless => "systemd-run --wait --user --machine=${username}${x}@ /bin/bash -c 'podman unshare stat --format %u /opt/${username}${x}/runnerdata | grep ^1000$ && podman unshare stat --format %g /opt/${username}${x}/runnerdata | grep ^1000$'",
|
|
||||||
}
|
|
||||||
|
|
||||||
exec { "enable-${username}${x}-linger":
|
|
||||||
command => "loginctl enable-linger ${username}${x}",
|
|
||||||
path => '/usr/bin:/usr/sbin:/bin',
|
|
||||||
provider => shell,
|
|
||||||
logoutput => false,
|
|
||||||
unless => "test -f /var/lib/systemd/linger/${username}${x}",
|
|
||||||
}
|
|
||||||
|
|
||||||
if $runnerdata and $runnerdata["${username}${x}"] and 'url' in $runnerdata["${username}${x}"] {
|
|
||||||
notify {"runnercontent${x}":
|
|
||||||
message => $runnerdata["${username}${x}"]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,7 +0,0 @@
|
||||||
FROM code.forgejo.org/forgejo/runner:3.3.0 as runner
|
|
||||||
FROM quay.io/podman/stable:v4.8.3
|
|
||||||
COPY --from=runner /bin/forgejo-runner /bin/forgejo-runner
|
|
||||||
RUN dnf -y install nodejs git
|
|
||||||
VOLUME ["/data"]
|
|
||||||
WORKDIR /home/podman
|
|
||||||
CMD ["/bin/forgejo-runner","daemon","--config","/data/config.yml"]
|
|
Loading…
Reference in a new issue