tanker: Setup and configure Forgejo Actions
This commit is contained in:
parent
33c0c52454
commit
c0e392ae2a
7 changed files with 65 additions and 35 deletions
|
@ -1,9 +1,10 @@
|
||||||
age-encryption.org/v1
|
age-encryption.org/v1
|
||||||
-> ssh-ed25519 MtGp6g j3LJbMvC+F+WI80vay1mUtT4AU/iPrVlJspYtDwL5WI
|
-> ssh-ed25519 MtGp6g jM+++wGqvWlj9wKwKdrS3d8xpwfLp1ks4GCh3sm/6zM
|
||||||
JllJKpMrJtNEF2Wjlt+FQZjt0HYg1jcM5Z23Nyr0JDQ
|
QkBPJf0lBF617AFcko4KA/Aq6mi6eMWp/ye2Abf2fKk
|
||||||
-> ssh-ed25519 iO8/4g M2tItsaOdbUwDrIR6CniYnQtmdgLBL31D/xdYI27DR4
|
-> ssh-ed25519 iO8/4g IGCdvdMB6PdiqxA9yamSUMCfH4Bk0JmtOuZt4WZrFGM
|
||||||
hdQhMFbQ88Qd0b9/yUqSCp0jmWBVTamHRHxvfzMKQd0
|
cz19imzpQAkWv+iCoUzBfMRC5D0yusCMQkROrjBhoJ0
|
||||||
-> a88u-grease %<;6}T6g dP%)[l 5M?k?Ff
|
-> PT|e-grease cJG6UW4o
|
||||||
66xUudBfSs81QpoQPElEtQ9W5IUdTpeO613+2nVdnOVb
|
4G+Rp2jt1sZbGLxuKl7DgX1wl1kaOhhEjkloCeaHg0lt6P7bmjcg++jh6hWs7MhO
|
||||||
--- +iZj/5A8YtvHw9xzvg95+S7aYwRvA87KYF8fsZyuORk
|
dMp8SKY9
|
||||||
ÿ§Zh§è#ÊÖÆ&BÕÓ÷îÈKe¡Z`×òŠýD$;TH,ß¡Àì³ÏÿÓL´×%à•ŒƒÈX©Høh$8‚€Ù³„)ÊŒ÷HàX<qã
|
--- VdFRpEBs74LJOqJNYwiGeb/wy/e7Wm+aFQnw3AI1pFw
|
||||||
|
r‹åkòBúx–µvŠ™aob""éh&éÅîb{ñÌH´òã,’×q¢·Ã RSm½¤ûÃTûo ¾hB•gdµ
÷?GÒ¼n0©î
|
|
@ -109,10 +109,6 @@ in
|
||||||
hostName = "tanker";
|
hostName = "tanker";
|
||||||
hostId = "d89f488a";
|
hostId = "d89f488a";
|
||||||
useNetworkd = true;
|
useNetworkd = true;
|
||||||
|
|
||||||
extraHosts = ''
|
|
||||||
127.0.0.1 attic.cache.daniel.sx
|
|
||||||
'';
|
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd = {
|
systemd = {
|
||||||
|
|
|
@ -42,10 +42,6 @@ in
|
||||||
SAME_SITE = "strict";
|
SAME_SITE = "strict";
|
||||||
};
|
};
|
||||||
|
|
||||||
repository = {
|
|
||||||
DISABLE_HTTP_GIT = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
actions = {
|
actions = {
|
||||||
ENABLED = true;
|
ENABLED = true;
|
||||||
};
|
};
|
||||||
|
@ -68,8 +64,7 @@ in
|
||||||
tokenFile = config.age.secrets.forgejo-actions-token.path;
|
tokenFile = config.age.secrets.forgejo-actions-token.path;
|
||||||
|
|
||||||
labels = [
|
labels = [
|
||||||
"debian-bullseye:docker://node:18-bullseye"
|
"ubuntu-latest-amd64:docker://ghcr.io/catthehacker/ubuntu:act-latest"
|
||||||
"debian-bookworm:docker://node:18-bookworm"
|
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,3 +1,5 @@
|
||||||
|
{ lib, config, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
services.nginx.virtualHosts."default.internal.kempkens.network" = {
|
services.nginx.virtualHosts."default.internal.kempkens.network" = {
|
||||||
listen = [
|
listen = [
|
||||||
|
@ -34,4 +36,20 @@
|
||||||
return = "418";
|
return = "418";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
networking.firewall.interfaces =
|
||||||
|
let
|
||||||
|
interfaces = lib.mapAttrsToList (_: lib.attrsets.attrByPath [ "matchConfig" "Name" ] null) config.systemd.network.networks ++ [ "tailscale0" ];
|
||||||
|
in
|
||||||
|
builtins.listToAttrs
|
||||||
|
(builtins.map
|
||||||
|
(iface:
|
||||||
|
{
|
||||||
|
name = iface;
|
||||||
|
value = {
|
||||||
|
allowedTCPPorts = [ 80 443 ];
|
||||||
|
allowedUDPPorts = [ 443 ];
|
||||||
|
};
|
||||||
|
})
|
||||||
|
(builtins.filter builtins.isString interfaces));
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,3 +1,5 @@
|
||||||
|
{ lib, config, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
services.nginx.virtualHosts."default.internal.kempkens.network" = {
|
services.nginx.virtualHosts."default.internal.kempkens.network" = {
|
||||||
listen = [
|
listen = [
|
||||||
|
@ -34,4 +36,20 @@
|
||||||
return = "418";
|
return = "418";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
networking.firewall.interfaces =
|
||||||
|
let
|
||||||
|
interfaces = lib.mapAttrsToList (_: lib.attrsets.attrByPath [ "matchConfig" "Name" ] null) config.systemd.network.networks ++ [ "tailscale0" ];
|
||||||
|
in
|
||||||
|
builtins.listToAttrs
|
||||||
|
(builtins.map
|
||||||
|
(iface:
|
||||||
|
{
|
||||||
|
name = iface;
|
||||||
|
value = {
|
||||||
|
allowedTCPPorts = [ 80 443 ];
|
||||||
|
allowedUDPPorts = [ 443 ];
|
||||||
|
};
|
||||||
|
})
|
||||||
|
(builtins.filter builtins.isString interfaces));
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,3 +1,5 @@
|
||||||
|
{ lib, config, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
services.nginx.virtualHosts."default.kempkens.io" = {
|
services.nginx.virtualHosts."default.kempkens.io" = {
|
||||||
listen = [
|
listen = [
|
||||||
|
@ -34,4 +36,20 @@
|
||||||
return = "418";
|
return = "418";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
networking.firewall.interfaces =
|
||||||
|
let
|
||||||
|
interfaces = lib.mapAttrsToList (_: lib.attrsets.attrByPath [ "matchConfig" "Name" ] null) config.systemd.network.networks ++ [ "tailscale0" ];
|
||||||
|
in
|
||||||
|
builtins.listToAttrs
|
||||||
|
(builtins.map
|
||||||
|
(iface:
|
||||||
|
{
|
||||||
|
name = iface;
|
||||||
|
value = {
|
||||||
|
allowedTCPPorts = [ 80 443 ];
|
||||||
|
allowedUDPPorts = [ 443 ];
|
||||||
|
};
|
||||||
|
})
|
||||||
|
(builtins.filter builtins.isString interfaces));
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
{ pkgs, lib, config, ... }:
|
{ pkgs, ... }:
|
||||||
|
|
||||||
{
|
{
|
||||||
services.nginx = {
|
services.nginx = {
|
||||||
|
@ -25,20 +25,4 @@
|
||||||
access_log /var/log/nginx/access.log combined_anon buffer=32k flush=5m;
|
access_log /var/log/nginx/access.log combined_anon buffer=32k flush=5m;
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
networking.firewall.interfaces =
|
|
||||||
let
|
|
||||||
interfaces = lib.mapAttrsToList (_: lib.attrsets.attrByPath [ "matchConfig" "Name" ] null) config.systemd.network.networks ++ [ "tailscale0" ];
|
|
||||||
in
|
|
||||||
builtins.listToAttrs
|
|
||||||
(builtins.map
|
|
||||||
(iface:
|
|
||||||
{
|
|
||||||
name = iface;
|
|
||||||
value = {
|
|
||||||
allowedTCPPorts = [ 80 443 ];
|
|
||||||
allowedUDPPorts = [ 443 ];
|
|
||||||
};
|
|
||||||
})
|
|
||||||
(builtins.filter builtins.isString interfaces));
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue