15 Commits

Author SHA1 Message Date
ff34faa937 Merge pull request 'add volume mount for nix' (#58) from feature/act-runner-volumes into main
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 19s
Check Nix formatting / Perform Nix format checks (push) Successful in 1m38s
Check Nix flake / Perform Nix flake checks (push) Successful in 8m36s
Check Nix flake / Build nix outputs (push) Successful in 12m47s
Reviewed-on: #58
2025-03-26 01:07:12 -04:00
761480ad61 add debug logging, shutdown timeout, revert container choice
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 23s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m40s
Check Nix flake / Perform Nix flake checks (pull_request) Successful in 8m54s
Check Nix flake / Build nix outputs (pull_request) Successful in 13m2s
2025-03-26 00:39:45 -04:00
d70903a84f revert volume changes
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 16s
Check Nix flake / Perform Nix flake checks (pull_request) Waiting to run
Check Nix flake / Build nix outputs (pull_request) Waiting to run
Check Nix formatting / Perform Nix format checks (pull_request) Failing after 44s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-26 00:28:23 -04:00
2b10fdd2cf disable bcg-plus
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 18s
Check Nix flake / Perform Nix flake checks (pull_request) Failing after 21s
Check Nix formatting / Perform Nix format checks (pull_request) Failing after 33s
Check Nix flake / Build nix outputs (pull_request) Failing after 11m2s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-25 23:43:46 -04:00
bc710058da revert dind rootless
Some checks failed
Check Nix formatting / Perform Nix format checks (pull_request) Waiting to run
Check Nix flake / Perform Nix flake checks (pull_request) Failing after 59s
Check Nix flake / Build nix outputs (pull_request) Failing after 41s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 15m20s
2025-03-25 23:41:15 -04:00
3d97fc743c update runner labels
Some checks failed
Check Nix formatting / Perform Nix format checks (pull_request) Waiting to run
Check Nix flake / Perform Nix flake checks (pull_request) Failing after 4s
Check Nix flake / Build nix outputs (pull_request) Failing after 5s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 8s
2025-03-25 23:37:36 -04:00
4cc29cc662 move to dind images
Some checks failed
Check Nix flake / Perform Nix flake checks (pull_request) Failing after 3s
Check Nix flake / Build nix outputs (pull_request) Failing after 3s
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 8s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 1m32s
2025-03-25 23:34:01 -04:00
064c8ff77a add volume mount for nix
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 9s
Check Nix flake / Build nix outputs (pull_request) Failing after 10s
Check Nix flake / Perform Nix flake checks (pull_request) Failing after 12s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 1m54s
Signed-off-by: ahuston-0 <aliceghuston@gmail.com>
2025-03-25 23:24:19 -04:00
dd6bc05361 Merge pull request 'scale down act runners' (#56) from feature/scale-act into main
All checks were successful
Check flake.lock / Check health of `flake.lock` (push) Successful in 11s
Check Nix formatting / Perform Nix format checks (push) Successful in 1m52s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 9m52s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 15m0s
Reviewed-on: #56
2025-03-25 10:39:08 -04:00
c35afc9802 scale down act runners
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 9s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m37s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 10m10s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 13m58s
2025-03-25 10:25:03 -04:00
4ba34f04e3 Merge pull request 'update flake lock manually' (#54) from update_flake_lock_action into main
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 18s
Check Nix formatting / Perform Nix format checks (push) Successful in 2m8s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 10m22s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Failing after 23m17s
Update flakes / update_lockfile (push) Failing after 34s
Reviewed-on: #54
2025-03-24 22:13:07 -04:00
45e92ae851 update flake lock manually
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 11s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 3m30s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 12m57s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 27m48s
2025-03-24 10:14:38 -04:00
669dcdb4de update flake lock manually
Some checks failed
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 53s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 2m58s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Has been cancelled
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Has been cancelled
2025-03-23 15:26:11 -04:00
164dba8047 Merge pull request 'automated: Update flake.lock' (#53) from update-flake-lock into main
Some checks failed
Check flake.lock / Check health of `flake.lock` (push) Successful in 11s
Check Nix formatting / Perform Nix format checks (push) Successful in 3m23s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (push) Successful in 11m40s
Check Nix flake / Build nix outputs (ubuntu-latest) (push) Successful in 16m45s
Update flakes / update_lockfile (push) Failing after 14m8s
Reviewed-on: #53
2025-03-23 14:52:24 -04:00
6c515a5447 automated: Update flake.lock
All checks were successful
Check flake.lock / Check health of `flake.lock` (pull_request) Successful in 9s
Check Nix flake / Perform Nix flake checks (ubuntu-latest) (pull_request) Successful in 14m44s
Check Nix formatting / Perform Nix format checks (pull_request) Successful in 11m44s
Check Nix flake / Build nix outputs (ubuntu-latest) (pull_request) Successful in 24m4s
- The following Nix Flake inputs were updated:

```
• Updated input 'firefox-addons':
    'gitlab:rycee/nur-expressions/1b0b14b56353040142e0ef5b0ab37743bbbf4ab4?dir=pkgs/firefox-addons&narHash=sha256-UVz7NhPzbEWey6mMJU3Jwjqfbp0xH0iKZDuoRjhZEN0%3D' (2025-03-20)
  → 'gitlab:rycee/nur-expressions/10f7b577f5081b30ca6b7fd5f98de8d7dfdb5a27?dir=pkgs/firefox-addons&narHash=sha256-OkYl/wf09cKviSV1R6SshcRmeX1iDNEKCMg5KlmTwK0%3D' (2025-03-20)
• Updated input 'home-manager':
    'github:nix-community/home-manager/94605dcadefeaff6b35c8931c9f38e4f4dc7ad0a?narHash=sha256-Q0KXcHQmum8L6IzGhhkVhjFMKY6BvYa/rhmLP26Ws8o%3D' (2025-03-20)
  → 'github:nix-community/home-manager/d61711497be9ad6a6633aaf203b038b5a970621f?narHash=sha256-yjBjRn294NpPagPAQCio20X5BzBXiOoz2%2BxF3/YmEkU%3D' (2025-03-21)
• Updated input 'nixpkgs':
    'github:nixos/nixpkgs/b64ec1944ea40d9f3920f938e17ed39a9978c6c7?narHash=sha256-lfOAAaX68Ed7R6Iy2nbFAkGj6B8kHBp3nqZhgZjxR5c%3D' (2025-03-20)
  → 'github:nixos/nixpkgs/fa6ab1d7fdf29a4ff0ac65f01ffdaea84f105280?narHash=sha256-hPzDbmo3T64R1rt8i8WonR/4VrSbE8ZxY6wFIguC4sc%3D' (2025-03-21)
• Updated input 'nixpkgs-stable':
    'github:nixos/nixpkgs/da044451c6a70518db5b730fe277b70f494188f1?narHash=sha256-IhnK4LhkBlf14/F8THvUy3xi/TxSQkp9hikfDZRD4Ic%3D' (2025-03-18)
  → 'github:nixos/nixpkgs/b75693fb46bfaf09e662d09ec076c5a162efa9f6?narHash=sha256-GheQGRNYAhHsvPxWVOhAmg9lZKkis22UPbEHlmZMthg%3D' (2025-03-19)
• Updated input 'rust-overlay':
    'github:oxalica/rust-overlay/f03085549609e49c7bcbbee86a1949057d087199?narHash=sha256-Vflb6KJVDikFcM9E231mRN88uk4%2Bjo7BWtaaQMifthI%3D' (2025-03-20)
  → 'github:oxalica/rust-overlay/70bf752d176b2ce07417e346d85486acea9040ef?narHash=sha256-KzTwk/5ETJavJZYV1DEWdCx05M4duFCxCpRbQSKWpng%3D' (2025-03-21)
• Updated input 'stylix':
    'github:danth/stylix/f122d70925ca44e5ee4216661769437ab36a6a3f?narHash=sha256-Djg5uMhIDPdFOZ7kTrqNlHaAqcx/4rp7BofZLsUHkLY%3D' (2025-03-19)
  → 'github:danth/stylix/7e9906679d384472849272e5a5eef7adbdb1d87f?narHash=sha256-UpJrU0DEhNLVZwL/RPVOEUHCG6iDOVDoYelkmgS4V38%3D' (2025-03-20)
```

```
comparing nixosConfigurations.artemision.config.system.build.toplevel:
<<< /nix/store/rc1kpjnas2xg49ibnflc4xcsl1wd5q0a-nixos-system-artemision-25.05.20250320.b64ec19.drv
>>> /nix/store/zrcgxrl58y6v6l5faar85r8nyx8l0s3b-nixos-system-artemision-25.05.20250321.fa6ab1d.drv
Version changes:
[U.]  #01  chromedriver-unwrapped   134.0.6998.88 -> 134.0.6998.117
[C.]  #02  chromium                 126-llvm-17.patch, 129-rust.patch, 134-rust-adler2.patch, 134.0.6998.88 -> 126-llvm-17.patch, 129-rust.patch, 134-rust-adler2.patch, 134.0.6998.117
[U.]  #03  chromium-unwrapped       134.0.6998.88 -> 134.0.6998.117
[U.]  #04  mdbook                   0.4.45 x2, 0.4.45-vendor x2, 0.4.45-vendor-staging x2 -> 0.4.47 x2, 0.4.47-vendor x2, 0.4.47-vendor-staging x2
[U.]  #05  mesa                     25.0.1 x2 -> 25.0.2 x2
[U.]  #06  nixos-system-artemision  25.05.20250320.b64ec19 -> 25.05.20250321.fa6ab1d
[U.]  #07  python3.12-ruff          0.11.0 -> 0.11.1
[U.]  #08  ruff                     0.11.0-vendor, 0.11.0-vendor-staging -> 0.11.1-vendor, 0.11.1-vendor-staging
[U.]  #09  skaffold                 2.14.1 -> 2.14.2
[C.]  #10  source                   <none> x1745 -> <none> x1747
[U.]  #11  vimplugin-mini.nvim      2025-03-13 -> 2025-03-16
Added packages:
[A.]  #1  alt-left-alt-right-word-navigation.patch  <none> x2
[A.]  #2  qv147kis0blxh4zrjsw7d9p331gx677z-source   <none>
Removed packages:
[R.]  #1  0ec174afd56fe48bcfa071d4b8ed704106f46f91.patch  <none> x2
[R.]  #2  s3yngd3jjkv6qcm7dagaiqzc7lnd825f-source         <none>
Closure size: 18717 -> 18719 (955 paths added, 953 paths removed, delta +2, disk usage -68.8KiB).

comparing checks.x86_64-linux.pre-commit-check:
<<< /nix/store/2gq4kvsi22nmskjc17h7hp49jyq0kgvp-pre-commit-run.drv
>>> /nix/store/2bx7720cnr2vgbc0dqxv9nqrawrycw6z-pre-commit-run.drv
Version changes:
[U.]  #1  mdbook  0.4.45, 0.4.45-vendor, 0.4.45-vendor-staging -> 0.4.47, 0.4.47-vendor, 0.4.47-vendor-staging
Added packages:
[A.]  #1  alt-left-alt-right-word-navigation.patch  <none>
[A+]  #2  qv147kis0blxh4zrjsw7d9p331gx677z-source   <none>
Removed packages:
[R-]  #1  s3yngd3jjkv6qcm7dagaiqzc7lnd825f-source  <none>
Closure size: 2605 -> 2606 (21 paths added, 20 paths removed, delta +1, disk usage +4.8KiB).

comparing formatter.x86_64-linux:
<<< /nix/store/6mnywnsbyzlwrwmh82h0wnszd3nwz1j1-nixfmt-unstable-2025-03-03.drv
>>> /nix/store/6mnywnsbyzlwrwmh82h0wnszd3nwz1j1-nixfmt-unstable-2025-03-03.drv
No version or selection state changes.
Closure size: 1308 -> 1308 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing nixosConfigurations.palatine-hill.config.system.build.toplevel:
<<< /nix/store/f71nr2gazvny89wzk8cz1wvxx35rj5y3-nixos-system-palatine-hill-25.05.20250320.b64ec19.drv
>>> /nix/store/gxwq2pagvpgl972pfqzr1cyrg8pk8016-nixos-system-palatine-hill-25.05.20250321.fa6ab1d.drv
Version changes:
[U.]  #1  chromedriver-unwrapped      134.0.6998.88 -> 134.0.6998.117
[C.]  #2  chromium                    126-llvm-17.patch, 129-rust.patch, 134-rust-adler2.patch, 134.0.6998.88 -> 126-llvm-17.patch, 129-rust.patch, 134-rust-adler2.patch, 134.0.6998.117
[U.]  #3  chromium-unwrapped          134.0.6998.88 -> 134.0.6998.117
[U.]  #4  mdbook                      0.4.45, 0.4.45-vendor, 0.4.45-vendor-staging -> 0.4.47, 0.4.47-vendor, 0.4.47-vendor-staging
[U.]  #5  mesa                        25.0.1 -> 25.0.2
[U.]  #6  nixos-system-palatine-hill  25.05.20250320.b64ec19 -> 25.05.20250321.fa6ab1d
[U.]  #7  python3.12-ruff             0.11.0 -> 0.11.1
[U.]  #8  ruff                        0.11.0-vendor, 0.11.0-vendor-staging -> 0.11.1-vendor, 0.11.1-vendor-staging
[C.]  #9  source                      <none> x816 -> <none> x817
Added packages:
[A.]  #1  alt-left-alt-right-word-navigation.patch  <none>
[A.]  #2  qv147kis0blxh4zrjsw7d9p331gx677z-source   <none>
Removed packages:
[R.]  #1  0ec174afd56fe48bcfa071d4b8ed704106f46f91.patch  <none>
[R.]  #2  s3yngd3jjkv6qcm7dagaiqzc7lnd825f-source         <none>
Closure size: 8595 -> 8596 (436 paths added, 435 paths removed, delta +1, disk usage -72.6KiB).

comparing packages.x86_64-linux.lego-latest:
<<< /nix/store/7nqs7hbygz05w1v0ma24hjby5c2wr7sk-lego-4.21.0.drv
>>> /nix/store/7nqs7hbygz05w1v0ma24hjby5c2wr7sk-lego-4.21.0.drv
No version or selection state changes.
Closure size: 768 -> 768 (0 paths added, 0 paths removed, delta +0, disk usage +0B).

comparing devShells.x86_64-linux.default:
<<< /nix/store/3vg66bimfy7bb38qawbf3xlvqc9maiqw-nix-shell.drv
>>> /nix/store/v9m2nngf47684104dm3cgpqwaccpnl7q-nix-shell.drv
Version changes:
[U.]  #1  mdbook  0.4.45, 0.4.45-vendor, 0.4.45-vendor-staging -> 0.4.47, 0.4.47-vendor, 0.4.47-vendor-staging
Added packages:
[A.]  #1  alt-left-alt-right-word-navigation.patch  <none>
Closure size: 2964 -> 2965 (30 paths added, 29 paths removed, delta +1, disk usage +4.8KiB).

```

Auto-generated by [update.yml][1] with the help of
[create-pull-request][2].

[1]: https://nayeonie.com/ahuston-0/nix-dotfiles/src/branch/main/.github/workflows/flake-update.yml
[2]: https://forgejo.stefka.eu/jiriks74/create-pull-request
2025-03-21 12:10:13 +00:00
6 changed files with 173 additions and 158 deletions

View File

@ -8,10 +8,7 @@ on:
jobs:
health-check:
name: "Perform Nix flake checks"
runs-on: ${{ matrix.os }}
strategy:
matrix:
os: [ubuntu-latest]
runs-on: ubuntu-latest
steps:
- uses: DeterminateSystems/nix-installer-action@main
- name: Setup Attic cache
@ -26,10 +23,7 @@ jobs:
- run: nix ./utils/attic-push.bash
build-checks:
name: "Build nix outputs"
runs-on: ${{ matrix.os }}
strategy:
matrix:
os: [ubuntu-latest]
runs-on: ubuntu-latest
steps:
- uses: DeterminateSystems/nix-installer-action@main
- name: Setup Attic cache

View File

@ -41,7 +41,6 @@
"codezombiech",
"compactmode",
"Compat",
"concat",
"concatLists",
"contentblocking",
"cookiebanners",
@ -154,7 +153,6 @@
"networkd",
"networkmanager",
"newtabpage",
"nixfmt",
"nixos",
"nixpkgs",
"nmap",
@ -216,8 +214,6 @@
"rofi",
"rpool",
"rspace",
"rsyslog",
"rsyslogd",
"rtkit",
"safebrowsing",
"Sandro",
@ -259,7 +255,6 @@
"topstories",
"Toqozz",
"torrenting",
"treefmt",
"twimg",
"uaccess",
"ublock",

66
flake.lock generated
View File

@ -78,11 +78,11 @@
},
"locked": {
"dir": "pkgs/firefox-addons",
"lastModified": 1742449434,
"narHash": "sha256-UVz7NhPzbEWey6mMJU3Jwjqfbp0xH0iKZDuoRjhZEN0=",
"lastModified": 1742773104,
"narHash": "sha256-dAhrL+gEjNN5U/Sosy7IrX0Y0qPA0U7Gp9TBhqEliNU=",
"owner": "rycee",
"repo": "nur-expressions",
"rev": "1b0b14b56353040142e0ef5b0ab37743bbbf4ab4",
"rev": "d74460da63a8c08a69a1f143b04f2ab1a6b2f5c2",
"type": "gitlab"
},
"original": {
@ -312,11 +312,11 @@
]
},
"locked": {
"lastModified": 1742447757,
"narHash": "sha256-Q0KXcHQmum8L6IzGhhkVhjFMKY6BvYa/rhmLP26Ws8o=",
"lastModified": 1742771635,
"narHash": "sha256-HQHzQPrg+g22tb3/K/4tgJjPzM+/5jbaujCZd8s2Mls=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "94605dcadefeaff6b35c8931c9f38e4f4dc7ad0a",
"rev": "ad0614a1ec9cce3b13169e20ceb7e55dfaf2a818",
"type": "github"
},
"original": {
@ -352,11 +352,11 @@
]
},
"locked": {
"lastModified": 1742174123,
"narHash": "sha256-pDNzMoR6m1ZSJToZQ6XDTLVSdzIzmFl1b8Pc3f7iV6Y=",
"lastModified": 1742701275,
"narHash": "sha256-AulwPVrS9859t+eJ61v24wH/nfBEIDSXYxlRo3fL/SA=",
"owner": "Mic92",
"repo": "nix-index-database",
"rev": "2cfb4e1ca32f59dd2811d7a6dd5d4d1225f0955c",
"rev": "36dc43cb50d5d20f90a28d53abb33a32b0a2aae6",
"type": "github"
},
"original": {
@ -388,11 +388,11 @@
]
},
"locked": {
"lastModified": 1742217219,
"narHash": "sha256-pLRjj0jTL1TloB0ptEwVF51IJJX8a17dSxg+gqiWb30=",
"lastModified": 1742568034,
"narHash": "sha256-QaMEhcnscfF2MqB7flZr+sLJMMYZPnvqO4NYf9B4G38=",
"owner": "nix-community",
"repo": "nixos-generators",
"rev": "83900d5154d840dfae1e0367c5290f59b9dccf03",
"rev": "42ee229088490e3777ed7d1162cb9e9d8c3dbb11",
"type": "github"
},
"original": {
@ -403,11 +403,11 @@
},
"nixos-hardware": {
"locked": {
"lastModified": 1742376361,
"narHash": "sha256-VFMgJkp/COvkt5dnkZB4D2szVdmF6DGm5ZdVvTUy61c=",
"lastModified": 1742806253,
"narHash": "sha256-zvQ4GsCJT6MTOzPKLmlFyM+lxo0JGQ0cSFaZSACmWfY=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "daaae13dff0ecc692509a1332ff9003d9952d7a9",
"rev": "ecaa2d911e77c265c2a5bac8b583c40b0f151726",
"type": "github"
},
"original": {
@ -441,11 +441,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1742450798,
"narHash": "sha256-lfOAAaX68Ed7R6Iy2nbFAkGj6B8kHBp3nqZhgZjxR5c=",
"lastModified": 1742800061,
"narHash": "sha256-oDJGK1UMArK52vcW9S5S2apeec4rbfNELgc50LqiPNs=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "b64ec1944ea40d9f3920f938e17ed39a9978c6c7",
"rev": "1750f3c1c89488e2ffdd47cab9d05454dddfb734",
"type": "github"
},
"original": {
@ -472,11 +472,11 @@
},
"nixpkgs-stable": {
"locked": {
"lastModified": 1742268799,
"narHash": "sha256-IhnK4LhkBlf14/F8THvUy3xi/TxSQkp9hikfDZRD4Ic=",
"lastModified": 1742751704,
"narHash": "sha256-rBfc+H1dDBUQ2mgVITMGBPI1PGuCznf9rcWX/XIULyE=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "da044451c6a70518db5b730fe277b70f494188f1",
"rev": "f0946fa5f1fb876a9dc2e1850d9d3a4e3f914092",
"type": "github"
},
"original": {
@ -520,11 +520,11 @@
]
},
"locked": {
"lastModified": 1742300892,
"narHash": "sha256-QmF0proyjXI9YyZO9GZmc7/uEu5KVwCtcdLsKSoxPAI=",
"lastModified": 1742649964,
"narHash": "sha256-DwOTp7nvfi8mRfuL1escHDXabVXFGT1VlPD1JHrtrco=",
"owner": "cachix",
"repo": "git-hooks.nix",
"rev": "ea26a82dda75bee6783baca6894040c8e6599728",
"rev": "dcf5072734cb576d2b0c59b2ac44f5050b5eac82",
"type": "github"
},
"original": {
@ -562,11 +562,11 @@
]
},
"locked": {
"lastModified": 1742437918,
"narHash": "sha256-Vflb6KJVDikFcM9E231mRN88uk4+jo7BWtaaQMifthI=",
"lastModified": 1742783666,
"narHash": "sha256-IwdSl51NL6V0f+mYXZR0UTKaGleOsk9zV3l6kt5SUWw=",
"owner": "oxalica",
"repo": "rust-overlay",
"rev": "f03085549609e49c7bcbbee86a1949057d087199",
"rev": "60766d63c227d576510ecfb5edd3a687d56f6bc7",
"type": "github"
},
"original": {
@ -582,11 +582,11 @@
]
},
"locked": {
"lastModified": 1742406979,
"narHash": "sha256-r0aq70/3bmfjTP+JZs4+XV5SgmCtk1BLU4CQPWGtA7o=",
"lastModified": 1742700801,
"narHash": "sha256-ZGlpUDsuBdeZeTNgoMv+aw0ByXT2J3wkYw9kJwkAS4M=",
"owner": "Mic92",
"repo": "sops-nix",
"rev": "1770be8ad89e41f1ed5a60ce628dd10877cb3609",
"rev": "67566fe68a8bed2a7b1175fdfb0697ed22ae8852",
"type": "github"
},
"original": {
@ -623,11 +623,11 @@
"tinted-zed": "tinted-zed"
},
"locked": {
"lastModified": 1742422444,
"narHash": "sha256-Djg5uMhIDPdFOZ7kTrqNlHaAqcx/4rp7BofZLsUHkLY=",
"lastModified": 1742753562,
"narHash": "sha256-EBXgl3sPi5AQUM58XGuuC8HQl/Df+Dbt6pOLInInJ/k=",
"owner": "danth",
"repo": "stylix",
"rev": "f122d70925ca44e5ee4216661769437ab36a6a3f",
"rev": "d9df91c55643a8b5229a3ae3a496a30f14965457",
"type": "github"
},
"original": {

View File

@ -6,6 +6,7 @@
let
vars = import ../vars.nix;
act_path = vars.primary_act;
act_config_path = ./act_config.yaml;
in
{
virtualisation.oci-containers.containers = {
@ -20,10 +21,9 @@ in
};
ports = [ "8088:8088" ];
volumes = [
"${act_path}/stable-latest-main/config.yaml:/config.yaml"
"${act_config_path}:/config.yaml"
"${act_path}/stable-latest-main/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
@ -43,10 +43,9 @@ in
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-1/config.yaml:/config.yaml"
"${./act_config.yaml}:/config.yaml"
"${act_path}/stable-latest-1/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
@ -66,10 +65,9 @@ in
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-2/config.yaml:/config.yaml"
"${act_config_path}:/config.yaml"
"${act_path}/stable-latest-2/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
@ -78,75 +76,6 @@ in
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
act-stable-latest-3 = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-3/config.yaml:/config.yaml"
"${act_path}/stable-latest-3/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-3";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
act-stable-latest-4 = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-4/config.yaml:/config.yaml"
"${act_path}/stable-latest-4/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-4";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
act-stable-latest-5 = {
image = "gitea/act_runner:latest";
extraOptions = [
"--stop-signal=SIGINT"
];
labels = {
"com.centurylinklabs.watchtower.enable" = "true";
"com.centurylinklabs.watchtower.scope" = "act-runner";
};
volumes = [
"${act_path}/stable-latest-5/config.yaml:/config.yaml"
"${act_path}/stable-latest-5/data:/data"
"/var/run/docker.sock:/var/run/docker.sock"
"/nix:/nix"
];
environment = {
CONFIG_FILE = "/config.yaml";
GITEA_RUNNER_NAME = "stable-latest-5";
};
environmentFiles = [ config.sops.secrets."docker/act-runner".path ];
log-driver = "local";
};
};
systemd = {
@ -174,7 +103,9 @@ in
"docker/act-runner" = {
owner = "root";
restartUnits = [
"docker-act-stable-latest-main.service"
"docker-act-stable-latest-1.service"
"docker-act-stable-latest-2.service"
];
};
};

View File

@ -0,0 +1,95 @@
# Example configuration file, it's safe to copy this as the default config file without any modification.
# You don't have to copy this file to your instance,
# just run `./act_runner generate-config > config.yaml` to generate a config file.
log:
# The level of logging, can be trace, debug, info, warn, error, fatal
level: debug
runner:
# Where to store the registration result.
file: .runner
# Execute how many tasks concurrently at the same time.
capacity: 1
# Extra environment variables to run jobs.
envs:
A_TEST_ENV_NAME_1: a_test_env_value_1
A_TEST_ENV_NAME_2: a_test_env_value_2
# Extra environment variables to run jobs from a file.
# It will be ignored if it's empty or the file doesn't exist.
env_file: .env
# The timeout for a job to be finished.
# Please note that the Gitea instance also has a timeout (3h by default) for the job.
# So the job could be stopped by the Gitea instance if it's timeout is shorter than this.
timeout: 3h
# The timeout for the runner to wait for running jobs to finish when shutting down.
# Any running jobs that haven't finished after this timeout will be cancelled.
shutdown_timeout: 30m
# Whether skip verifying the TLS certificate of the Gitea instance.
insecure: false
# The timeout for fetching the job from the Gitea instance.
fetch_timeout: 5s
# The interval for fetching the job from the Gitea instance.
fetch_interval: 2s
# The labels of a runner are used to determine which jobs the runner can run, and how to run them.
# Like: "macos-arm64:host" or "ubuntu-latest:docker://gitea/runner-images:ubuntu-latest"
# Find more images provided by Gitea at https://gitea.com/gitea/runner-images .
# If it's empty when registering, it will ask for inputting labels.
# If it's empty when execute `daemon`, will use labels in `.runner` file.
labels:
- "ubuntu-latest:docker://gitea/runner-images:ubuntu-latest"
- "ubuntu-22.04:docker://gitea/runner-images:ubuntu-22.04"
- "ubuntu-20.04:docker://gitea/runner-images:ubuntu-20.04"
#cache:
# Enable cache server to use actions/cache.
#enabled: true
# The directory to store the cache data.
# If it's empty, the cache data will be stored in $HOME/.cache/actcache.
#dir: ""
# The host of the cache server.
# It's not for the address to listen, but the address to connect from job containers.
# So 0.0.0.0 is a bad choice, leave it empty to detect automatically.
#host: ""
# The port of the cache server.
# 0 means to use a random available port.
#port: 0
# The external cache server URL. Valid only when enable is true.
# If it's specified, act_runner will use this URL as the ACTIONS_CACHE_URL rather than start a server by itself.
# The URL should generally end with "/".
#external_server: ""
container:
# Specifies the network to which the container will connect.
# Could be host, bridge or the name of a custom network.
# If it's empty, act_runner will create a network automatically.
network: ""
# Whether to use privileged mode or not when launching task containers (privileged mode is required for Docker-in-Docker).
privileged: false
# And other options to be used when the container is started (eg, --add-host=my.gitea.url:host-gateway).
options:
# The parent directory of a job's working directory.
# NOTE: There is no need to add the first '/' of the path as act_runner will add it automatically.
# If the path starts with '/', the '/' will be trimmed.
# For example, if the parent directory is /path/to/my/dir, workdir_parent should be path/to/my/dir
# If it's empty, /workspace will be used.
workdir_parent:
# Volumes (including bind mounts) can be mounted to containers. Glob syntax is supported, see https://github.com/gobwas/glob
# You can specify multiple volumes. If the sequence is empty, no volumes can be mounted.
# For example, if you only allow containers to mount the `data` volume and all the json files in `/src`, you should change the config to:
# valid_volumes:
# - data
# - /src/*.json
# If you want to allow any volume, please use the following configuration:
# valid_volumes:
# - '**'
valid_volumes: []
# overrides the docker client host with the specified one.
# If it's empty, act_runner will find an available docker host automatically.
# If it's "-", act_runner will find an available docker host automatically, but the docker host won't be mounted to the job containers and service containers.
# If it's not empty or "-", the specified docker host will be used. An error will be returned if it doesn't work.
docker_host: ""
# Pull docker image(s) even if already present
force_pull: true
# Rebuild docker image(s) even if already present
force_rebuild: false
host:
# The parent directory of a job's working directory.
# If it's empty, $HOME/.cache/act/ will be used.
workdir_parent:

View File

@ -9,31 +9,31 @@ let
divinejourney = "dj.alicehuston.xyz";
rlcraft = "rlcraft.alicehuston.xyz";
arcanum-institute = "arcanum.alicehuston.xyz";
bcg-plus = "bcg.alicehuston.xyz";
# bcg-plus = "bcg.alicehuston.xyz";
};
defaultServer = "rlcraft";
defaultEnv = {
EULA = "true";
TYPE = "AUTO_CURSEFORGE";
STOP_SERVER_ANNOUNCE_DELAY = "120";
STOP_DURATION = "600";
SYNC_CHUNK_WRITES = "false";
USE_AIKAR_FLAGS = "true";
MEMORY = "8GB";
ALLOW_FLIGHT = "true";
MAX_TICK_TIME = "-1";
};
# defaultEnv = {
# EULA = "true";
# TYPE = "AUTO_CURSEFORGE";
# STOP_SERVER_ANNOUNCE_DELAY = "120";
# STOP_DURATION = "600";
# SYNC_CHUNK_WRITES = "false";
# USE_AIKAR_FLAGS = "true";
# MEMORY = "8GB";
# ALLOW_FLIGHT = "true";
# MAX_TICK_TIME = "-1";
# };
defaultOptions = [
"--stop-signal=SIGTERM"
"--stop-timeout=1800"
"--network=minecraft-net"
];
# defaultOptions = [
# "--stop-signal=SIGTERM"
# "--stop-timeout=1800"
# "--network=minecraft-net"
# ];
vars = import ../vars.nix;
minecraft_path = "${vars.primary_games}/minecraft";
# vars = import ../vars.nix;
# minecraft_path = "${vars.primary_games}/minecraft";
in
{
virtualisation.oci-containers.containers = {
@ -67,24 +67,24 @@ in
# log-driver = "local";
# environmentFiles = [ config.sops.secrets."docker/minecraft".path ];
# };
bcg-plus = {
image = "itzg/minecraft-server:java17";
volumes = [
"${minecraft_path}/bcg-plus/modpacks:/modpacks:ro"
"${minecraft_path}/bcg-plus/data:/data"
];
hostname = "bcg-plus";
environment = defaultEnv // {
VERSION = "1.17";
CF_SLUG = "bcg";
DIFFICULTY = "normal";
DEBUG = "true";
# ENABLE_COMMAND_BLOCK = "true";
};
extraOptions = defaultOptions;
log-driver = "local";
environmentFiles = [ config.sops.secrets."docker/minecraft".path ];
};
# bcg-plus = {
# image = "itzg/minecraft-server:java17";
# volumes = [
# "${minecraft_path}/bcg-plus/modpacks:/modpacks:ro"
# "${minecraft_path}/bcg-plus/data:/data"
# ];
# hostname = "bcg-plus";
# environment = defaultEnv // {
# VERSION = "1.17";
# CF_SLUG = "bcg";
# DIFFICULTY = "normal";
# DEBUG = "true";
# # ENABLE_COMMAND_BLOCK = "true";
# };
# extraOptions = defaultOptions;
# log-driver = "local";
# environmentFiles = [ config.sops.secrets."docker/minecraft".path ];
# };
};
sops = {