Compare commits

...

10 Commits

Author SHA1 Message Date
16b36fe751 ci: typo depth
Some checks failed
Continuous Integration / lint_n_build (push) Successful in 1m16s
Continuous Delivery / build_n_upload (push) Failing after 19s
2026-03-08 02:49:03 +01:00
781a21a209 ci: set depth 0
Some checks failed
Continuous Integration / lint_n_build (push) Failing after 13s
2026-03-08 02:45:49 +01:00
bb08a22ad5 ci: add .gitea folder
Some checks failed
Continuous Integration / lint_n_build (push) Failing after 1m11s
2026-03-08 02:43:22 +01:00
571a660b75 ci: come back to gitea 2026-03-08 01:40:06 +01:00
378a44a7a5 ci: trigger actions 2026-03-07 13:41:36 +01:00
786a340122 fix: runner label 2026-03-07 12:52:11 +01:00
dc894293b6 refactor: migrate to forgejo 2026-03-07 12:50:53 +01:00
995b60af81 doc: improve sections 2026-02-17 14:28:39 +01:00
b1f6a731a7 doc: add security notes section 2026-02-17 14:23:29 +01:00
60ff95c8f7 doc: remove cd badge 2026-02-17 14:17:23 +01:00
5 changed files with 74 additions and 57 deletions

View File

@@ -7,20 +7,14 @@ on:
jobs: jobs:
build_n_upload: build_n_upload:
runs-on: linux runs-on: self-hosted
steps: steps:
- name: Git checkout - uses: actions/checkout@v6
uses: actions/checkout@v6
with: with:
fetch-depth: 0
fetch-tags: true fetch-tags: true
- name: Build tarball - run: make tarball
run: make tarball - run: rpmbuild -ba "$(make name).spec"
- run: make upload
env: env:
GIT_REFERENCE: ${{ github.ref }} PKG_TOKEN: ${{ secrets.PKG_TOKEN }}
- name: Build rpm package
run: rpmbuild -ba "$(make name).spec"
- name: Upload rpm package
run: make upload
env:
GIT_PACKAGES_USERNAME: ${{ vars.GIT_PACKAGES_USERNAME }}
GIT_PACKAGES_TOKEN: ${{ secrets.GIT_PACKAGES_TOKEN }}

View File

@@ -7,16 +7,12 @@ on:
jobs: jobs:
lint_n_build: lint_n_build:
runs-on: linux runs-on: self-hosted
steps: steps:
- name: Git checkout - uses: actions/checkout@v6
uses: actions/checkout@v6
with: with:
fetch-depth: 0 fetch-depth: 0
fetch-tags: true fetch-tags: true
- name: Lint shell scripts - run: shellcheck files/sbin/certbot_renew
run: shellcheck files/sbin/certbot_renew - run: make tarball
- name: Build tarball - run: rpmbuild -ba "$(make name).spec"
run: make tarball
- name: Build rpm file
run: rpmbuild -ba netoik-rp.spec

View File

@@ -1,16 +1,21 @@
NAME = netoik-rp NAME = netoik-rp
VERSION = $(shell git describe --abbrev=0) VERSION = $(shell git describe --abbrev=0)
RELEASE = $(shell git rev-parse --short HEAD) RELEASE = $(shell git rev-parse --short HEAD)
REFERENCE = $(if $(GIT_REFERENCE),$(GIT_REFERENCE),$(shell git branch --show-current)) ARCH = noarch
BUILD_ARCH = noarch OWNER = samuel
SUMMARY = "Netoïk Reverse Proxy"
LICENSE = "MIT"
URL = "https://git.netoik.io/$(OWNER)/$(NAME)"
SOURCE0 = "$(NAME)-$(VERSION)-$(RELEASE).tar.gz"
RPM_RPMDIR = $(shell rpm --eval '%{_rpmdir}') RPM_RPMDIR = $(shell rpm --eval '%{_rpmdir}')
RPM_SBINDIR = $(shell rpm --eval '%{_sbindir}') RPM_SBINDIR = $(shell rpm --eval '%{_sbindir}')
RPM_SOURCEDIR = $(shell rpm --eval '%{_sourcedir}') RPM_SOURCEDIR = $(shell rpm --eval '%{_sourcedir}')
RPM_SYSCONFDIR = $(shell rpm --eval '%{_sysconfdir}') RPM_SYSCONFDIR = $(shell rpm --eval '%{_sysconfdir}')
RPM_UNITDIR = $(shell rpm --eval '%{_unitdir}') RPM_UNITDIR = $(shell rpm --eval '%{_unitdir}')
RPM_TARBALL_PATH = $(RPM_SOURCEDIR)/$(NAME)-$(VERSION).tar.gz
RPM_BUILD_PATH = $(RPM_RPMDIR)/$(BUILD_ARCH)/$(NAME)-$(VERSION)-$(RELEASE).$(BUILD_ARCH).rpm RPM_TARBALL_PATH = $(RPM_SOURCEDIR)/$(SOURCE0)
RPM_BUILD_PATH = $(RPM_RPMDIR)/$(BUILD_ARCH)/$(NAME)-$(VERSION)-$(RELEASE).$(ARCH).rpm
.PHONY: name .PHONY: name
name: name:
@@ -24,9 +29,29 @@ version:
release: release:
@echo "$(RELEASE)" @echo "$(RELEASE)"
.PHONY: build_arch .PHONY: arch
build_arch: arch:
@echo "$(BUILD_ARCH)" @echo "$(ARCH)"
.PHONY: owner
owner:
@echo "$(OWNER)"
.PHONY: summary
summary:
@echo "$(SUMMARY)"
.PHONY: license
license:
@echo "$(LICENSE)"
.PHONY: url
url:
@echo "$(URL)"
.PHONY: source0
source0:
@echo "$(SOURCE0)"
.PHONY: install .PHONY: install
install: install:
@@ -41,11 +66,11 @@ $(RPM_TARBALL_PATH): *
--output="$@" \ --output="$@" \
--prefix="$(NAME)-$(VERSION)/" \ --prefix="$(NAME)-$(VERSION)/" \
--verbose \ --verbose \
"$(REFERENCE)" HEAD
.PHONY: tarball .PHONY: tarball
tarball: $(RPM_TARBALL_PATH) tarball: $(RPM_TARBALL_PATH)
.PHONY: upload .PHONY: upload
upload: upload:
curl --fail-with-body --upload-file "$(RPM_BUILD_PATH)" --user "$(GIT_PACKAGES_USERNAME):$(GIT_PACKAGES_TOKEN)" https://git.netoik.io/api/packages/samuel/rpm/upload curl --fail-with-body --upload-file "$(RPM_BUILD_PATH)" --user "$(OWNER):$(PKG_TOKEN)" https://git.netoik.io/api/packages/$(OWNER)/rpm/upload

View File

@@ -1,4 +1,4 @@
# Netoïk reverse proxy ![badge](https://git.netoik.io/samuel/netoik-rp/actions/workflows/ci.yaml/badge.svg) ![badge](https://git.netoik.io/samuel/netoik-rp/actions/workflows/cd.yaml/badge.svg) # Netoïk reverse proxy ![badge](https://git.netoik.io/samuel/netoik-rp/actions/workflows/ci.yaml/badge.svg)
Build an RPM package which will install several tools. Build an RPM package which will install several tools.
@@ -36,10 +36,9 @@ A `Makefile` is integrated to let you run some basic commands.
rpmbuild -ba netoik-rp.spec rpmbuild -ba netoik-rp.spec
``` ```
- To upload rpm package to Gitea repository: - To upload rpm package to Gitea repository
(env vars `GIT_PACKAGES_USERNAME` and `GIT_PACKAGES_TOKEN` needed):
```shell ```shell
# This command needs 2 env variables:
# GIT_PACKAGES_USERNAME and GIT_PACKAGES_TOKEN
make upload make upload
``` ```
@@ -62,25 +61,28 @@ Two workflows are set up.
# Deployment # Deployment
Security Notes: Some commands to deploy the RPM package on server
- no Continuous Deployment set for security reasons **(1)**
- no GPG signing for security reasons **(1)**
**(1)** Act runner does not have sudo access, which prevents - To add Gitea repo to your repo list:
from deploying via `dnf` and signing via `gpg`
Some commands to deploy the RPM package on server:
```shell ```shell
# Add Gitea repo to your repolist
dnf config-manager --add-repo https://git.netoik.io/api/packages/samuel/rpm.repo dnf config-manager --add-repo https://git.netoik.io/api/packages/samuel/rpm.repo
# Check Gitea repo is added
dnf repolist | grep gitea-samuel dnf repolist | grep gitea-samuel
# Show available package releases
dnf --showduplicates netoik-rp
# Install or upgrade package
dnf --nogpgcheck install netoik-rp
dnf --nogpgcheck upgrade netoik-rp
``` ```
- To show available versions:
```shell
dnf --showduplicates netoik-rp
```
- To install or upgrade:
```shell
dnf --nogpgcheck install netoik-rp
dnf --nogpgcheck upgrade netoik-rp
```
# Security Notes
For security reasons, act runners does not have sudo privileges and so there is:
- **no** Continuous Deployment because act runners cannot use `dnf`
- **no** GPG signing because act runners cannot use `gpg`

View File

@@ -3,12 +3,12 @@
Name: %(make name) Name: %(make name)
Version: %(make version) Version: %(make version)
Release: %(make release) Release: %(make release)
Summary: Netoik Reverse Proxy Summary: %(make summary)
License: MIT License: %(make license)
URL: https://git.netoik.io/samuel/netoik-rp URL: %(make url)
Source0: %{name}-%{version}.tar.gz Source0: %(make source0)
Buildarch: %(make build_arch) Buildarch: %(make arch)
BuildRequires: make BuildRequires: make
Requires: nginx python3 python-devel (augeas-devel or augeas-libs) gcc openssl Requires: nginx python3 python-devel (augeas-devel or augeas-libs) gcc openssl