Add gitea act deployment, persistent volume claim, and sealed secret

This commit is contained in:
2025-10-15 14:32:41 +05:30
parent ebebbfbe71
commit 2e5b5b4773
3 changed files with 106 additions and 0 deletions

View File

@@ -0,0 +1,77 @@
---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
app: gitea-act-runner
name: gitea-act-runner
namespace: default
spec:
replicas: 1
selector:
matchLabels:
app: gitea-act-runner
strategy:
type: Recreate
template:
metadata:
labels:
app: gitea-act-runner
spec:
restartPolicy: Always
volumes:
- name: docker-certs
emptyDir: {}
- name: runner-data
persistentVolumeClaim:
claimName: gitea-act-runner-longhorn
initContainers:
- name: wait-for-gitea
image: busybox
command:
- sh
- -c
- |
while ! nc -z gitea-int-service 3000; do
echo "Waiting for Gitea to be ready..."
sleep 5
done
echo "Gitea is ready!"
containers:
- name: runner
image: gitea/act_runner@sha256:8477d5b61b655caad4449888bae39f1f34bebd27db56cb15a62dccb3dcf3a944
command: ["sh", "-c", "while ! nc -z localhost 2376 </dev/null; do echo 'waiting for docker daemon...'; sleep 5; done; /sbin/tini -- run.sh"]
env:
- name: DOCKER_HOST
value: tcp://localhost:2376
- name: DOCKER_CERT_PATH
value: /certs/client
- name: DOCKER_TLS_VERIFY
value: "1"
- name: GITEA_INSTANCE_URL
valueFrom:
secretKeyRef:
key: URL
name: gitea-act-runner-secret
- name: GITEA_RUNNER_REGISTRATION_TOKEN
valueFrom:
secretKeyRef:
key: TOKEN
name: gitea-act-runner-secret
- name: CONFIG_FILE
value: "/data/config.yaml"
volumeMounts:
- name: docker-certs
mountPath: /certs
- name: runner-data
mountPath: /data
- name: daemon
image: docker:28.4.0-dind
env:
- name: DOCKER_TLS_CERTDIR
value: /certs
securityContext:
privileged: true
volumeMounts:
- name: docker-certs
mountPath: /certs