feat: remove forgejo-runner
This commit is contained in:
parent
6f9f930e04
commit
1fa6ee3028
2 changed files with 2 additions and 48 deletions
|
|
@ -1,41 +0,0 @@
|
||||||
---
|
|
||||||
x-runner-common: &runner-common
|
|
||||||
image: code.forgejo.org/forgejo/runner:12.7.3
|
|
||||||
links:
|
|
||||||
- docker-in-docker
|
|
||||||
depends_on:
|
|
||||||
docker-in-docker:
|
|
||||||
condition: service_started
|
|
||||||
user: 1001:1001
|
|
||||||
restart: unless-stopped
|
|
||||||
command: '/bin/sh -c "sleep 5; forgejo-runner daemon"'
|
|
||||||
environment:
|
|
||||||
DOCKER_HOST: tcp://docker-in-docker:2375
|
|
||||||
|
|
||||||
networks:
|
|
||||||
forgejo:
|
|
||||||
external: false
|
|
||||||
|
|
||||||
services:
|
|
||||||
docker-in-docker:
|
|
||||||
image: docker:dind
|
|
||||||
container_name: 'docker_dind'
|
|
||||||
privileged: true
|
|
||||||
command: ['dockerd', '-H', 'tcp://0.0.0.0:2375', '--tls=false']
|
|
||||||
restart: 'unless-stopped'
|
|
||||||
|
|
||||||
runner:
|
|
||||||
<<: *runner-common
|
|
||||||
container_name: 'runner'
|
|
||||||
volumes:
|
|
||||||
- ${FORGEJO_RUNNER_DATA:-/mnt/nas1/shared/forgejo-runner/data}:/data
|
|
||||||
- /etc/timezone:/etc/timezone:ro
|
|
||||||
- /etc/localtime:/etc/localtime:ro
|
|
||||||
|
|
||||||
runner-2:
|
|
||||||
<<: *runner-common
|
|
||||||
container_name: 'runner2'
|
|
||||||
volumes:
|
|
||||||
- ${FORGEJO_RUNNER_DATA:-/mnt/nas1/shared/forgejo-runner/data2}:/data
|
|
||||||
- /etc/timezone:/etc/timezone:ro
|
|
||||||
- /etc/localtime:/etc/localtime:ro
|
|
||||||
|
|
@ -17,7 +17,7 @@ config:
|
||||||
server:
|
server:
|
||||||
port: 8086
|
port: 8086
|
||||||
host: "0.0.0.0"
|
host: "0.0.0.0"
|
||||||
baseUrl: "http://cloud.example.com"
|
baseUrl: "https://cloud.example.com"
|
||||||
features:
|
features:
|
||||||
enableAuth: "true"
|
enableAuth: "true"
|
||||||
enableSharing: "true"
|
enableSharing: "true"
|
||||||
|
|
@ -44,11 +44,9 @@ wopi:
|
||||||
admin:
|
admin:
|
||||||
username: admin
|
username: admin
|
||||||
password: "wopi_admin_password"
|
password: "wopi_admin_password"
|
||||||
# In production behind an ingress, you'd likely enable SSL termination.
|
|
||||||
extraParams: "--o:ssl.enable=false --o:ssl.termination=false --o:net.frame_ancestors=http://* https://*"
|
extraParams: "--o:ssl.enable=false --o:ssl.termination=false --o:net.frame_ancestors=http://* https://*"
|
||||||
|
|
||||||
secrets:
|
secrets:
|
||||||
# If existingSecret is set, the chart will NOT create a Secret and will use this one instead.
|
|
||||||
existingSecret: ""
|
existingSecret: ""
|
||||||
jwtSecret: ""
|
jwtSecret: ""
|
||||||
oidcClientSecret: ""
|
oidcClientSecret: ""
|
||||||
|
|
@ -59,7 +57,7 @@ service:
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: true
|
enabled: true
|
||||||
className: "nginx" # Adjust to your ingress controller (e.g., traefik)
|
className: "traefik"
|
||||||
annotations: {}
|
annotations: {}
|
||||||
hosts:
|
hosts:
|
||||||
- host: cloud.example.com
|
- host: cloud.example.com
|
||||||
|
|
@ -67,6 +65,3 @@ ingress:
|
||||||
- path: /
|
- path: /
|
||||||
pathType: ImplementationSpecific
|
pathType: ImplementationSpecific
|
||||||
tls: []
|
tls: []
|
||||||
# - secretName: oxicloud-tls
|
|
||||||
# hosts:
|
|
||||||
# - cloud.example.com
|
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue