hey nerds! i got a lovely email from GitHub this morning that their increasingly vibe-coded, barely-working Actions features are about to get more expensive (charging by the minute for something that notoriously spin-locks is a special flavor of shit sandwich).

i usually just use whatever i’m given at wherever i’m working. i do have a project that i maintain to parse Ollama Modelfiles tho: https://github.com/covercash2/modelfile and to be honest, Actions is the only solution i’ve ever used that came close to sparking joy, simply because it was easy to use and had tons of community mind-share (i’ve definitely heard horror stories and would never stake my business on it), but this price increase and all the other news around GitHub lately has got me side-eying self-hosting solutions for my git projects. Forgejo seems like the way to go for git hosting, but Actions in particular Just Works™️ for me, so i’m kind of dreading setting something up that will be yet another time sink/rabbit hole (just in time for the holidays! 🙃).

i can install most of my tooling with my language toolchain (read: rustup and cargo) which makes things fairly neat, but i just don’t have a sense for what people use outside of Jenkins and Actions.

i thought this community might have some insight beyond the LLM generated listicles that have blighted modern search results.

thanks in advance 🙏

        • Scrubbles@poptalk.scrubbles.tech
          link
          fedilink
          English
          arrow-up
          2
          ·
          6 hours ago

          Sure! I use Kaniko (Although I see now that it’s not maintained anymore). I’ll probably pull the image in locally to protect it…

          Kaniko does the Docker in Docker, and I found an action that I use, but it looks like that was taken down… Luckily I archived it! Make an action in Forgejo (I have an infrastructure group that I add public repos to for actions. So this one is called action-koniko-build and all it has is this action.yml file in it:

          name: Kaniko
          description: Build a container image using Kaniko
          inputs:
            Dockerfile:
              description: The Dockerfile to pass to Kaniko
              required: true
            image:
              description: Name and tag under which to upload the image
              required: true
            registry:
              description: Domain of the registry. Should be the same as the first path component of the tag.
              required: true
            username:
              description: Username for the container registry
              required: true
            password:
              description: Password for the container registry
              required: true
            context:
              description: Workspace for the build
              required: true
          runs:
            using: docker
            image: docker://gcr.io/kaniko-project/executor:debug
            entrypoint: /bin/sh
            args:
              - -c
              - |
                mkdir -p /kaniko/.docker
                echo '{"auths":{"${{ inputs.registry }}":{"auth":"'$(printf "%s:%s" "${{ inputs.username }}" "${{ inputs.password }}" | base64 | tr -d '\n')'"}}}' > /kaniko/.docker/config.json
                echo Config file follows!
                cat /kaniko/.docker/config.json
                /kaniko/executor --insecure --dockerfile ${{ inputs.Dockerfile }} --destination ${{ inputs.image }} --context dir://${{ inputs.context }}     
          

          Then, you can use it directly like:

          name: Build and Deploy Docker Image
          
          on:
            push:
              branches:
                - main
            workflow_dispatch:
          
          jobs:
            build:
              runs-on: docker
          
              steps:
              # Checkout the repository
              - name: Checkout code
                uses: actions/checkout@v3
          
              - name: Get current date # This is just how I label my containers, do whatever you prefer
                id: date
                run: echo "::set-output name=date::$(date '+%Y%m%d-%H%M')"
          
              - uses:  path.to.your.forgejo.instance:port/infrastructure/action-koniko-build@main # This is what I said above, it references your infrastructure action, on the main branch
                with:
                  Dockerfile: cluster/charts/auth/operator/Dockerfile
                  image: path.to.your.forgejo.instance:port/group/repo:${{ steps.date.outputs.date }}
                  registry: path.to.your.forgejo.instance:port/v1
                  username: ${{ env.GITHUB_ACTOR }}
                  password: ${{ secrets.RUNNER_TOKEN }} # I haven't found a good secret option that works well, I should see if they have fixed the built-in token
                  context: ${{ env.GITHUB_WORKSPACE }}
          

          I run my runners in Kubernetes in the same cluster as my forgejo instance, so this all hooks up pretty easy. Lmk if you want to see that at all if it’s relevant. The big thing is that you’ll need to have them be Privileged, and there’s some complicated stuff where you need to run both the runner and the “dind” container together.

          • felbane@lemmy.world
            link
            fedilink
            English
            arrow-up
            1
            ·
            5 hours ago

            Thanks for the write-up! I’ve been trying and failing to do DOOD and POOP runners via forgejo, but I haven’t had the time or energy to really dig in and figure out the issue. At this point I just want something to work so I’ll give your setup a try 😎

      • zr0@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        7
        arrow-down
        2
        ·
        22 hours ago

        Every language, that uses functional white spaces, is absolutely awesome!!

        — no one

      • Jayjader@jlai.lu
        link
        fedilink
        English
        arrow-up
        2
        ·
        23 hours ago

        I dislike yaml as much as the next person, but you can always “just” write Jason JSON (lol autocorrect). Unless I’m misunderstanding your criticism?

        • chilicheeselies@lemmy.world
          link
          fedilink
          English
          arrow-up
          2
          ·
          16 hours ago

          Yaml is vette than json for this IMO brcausebyou can write comments in yaml, and in general format multiline strings easier. Json is best for system to system comms. Human to system literlaly anything other text formst than json.