Commit Graph

76 Commits

Author SHA1 Message Date
Cole Helbling
8c320971f9
Merge pull request #100 from DeterminateSystems/serialize
bump
2024-06-03 14:34:06 -07:00
Graham Christensen
7b943f9a7e update 2024-06-03 17:18:28 -04:00
Graham Christensen
40e4bc1e80 bump 2024-06-03 17:11:35 -04:00
Luc Perkins
f92f10828b
Use coalescing instead of or 2024-06-03 11:47:38 -07:00
Graham Christensen
1025a55627 track timings 2024-06-03 14:37:04 -04:00
Graham Christensen
5adb94fc48 science: probes to debug fly on GHA 2024-06-03 14:19:40 -04:00
Luc Perkins
db2c9be88c
Update detsys-ts (status page changes) 2024-06-03 09:11:14 -07:00
Graham Christensen
a2473ab552
Srv update (#97)
* Update to srv

* Hi, footgun

* Make sure we don't toString promises, update deps

* Update

* Pass - as the default diagnostic endpoint

* Specify the diagnostic suffix

* Update deps

* SRV update
2024-05-31 12:30:37 -04:00
Luc Perkins
e5b417b85f
Move comment to better location 2024-05-29 16:26:46 -03:00
Luc Perkins
8ef3f8c93e
Fix direction of Boolean check 2024-05-29 16:07:07 -03:00
Luc Perkins
ad8814ae5d
Fix check for ACT environment 2024-05-29 15:59:19 -03:00
Luc Perkins
9c4e8b237e
Provide better if statement 2024-05-29 15:51:33 -03:00
Luc Perkins
23e5c435a9
Update detsys-ts 2024-05-29 15:16:45 -03:00
Luc Perkins
7b0893fcd8
Regenerate dist 2024-05-22 18:29:40 -03:00
Luc Perkins
a56dda90ad
Update detsys-ts again 2024-05-22 13:47:58 -03:00
Luc Perkins
f6047128c4
Streamline runner OS logic 2024-05-22 13:40:01 -03:00
Luc Perkins
0b690dedac
Update detsys-ts 2024-05-22 13:19:09 -03:00
Graham Christensen
75ffa7fc74
Disable docker under act (#90)
* Rename IN_GITHUB_ACTIONS to IN_ACT

* If the trusted runner user is truthy, setup the runner as a trusted user.

The boolean option is always set.

* Set HAS_SYSTEMD in more cases

* Unquote trust-runner-user in the action.yml

* Don't bother with the docker shim under act

* fmt

* Regenerate

* fixup
2024-05-18 18:46:09 -04:00
Graham Christensen
1e58ce3980
Revert "Fix ESM build" (#86) 2024-05-15 20:45:00 +00:00
Luc Perkins
e4a38c246a
Regenerate dist 2024-05-15 17:17:12 -03:00
Luc Perkins
9243e9b760
Fix merge conflicts with main 2024-05-15 17:16:08 -03:00
Graham Christensen
8cdf194da9
Update dependencies (#85)
* Update dependencies

* Update deps again :)
2024-05-09 20:29:18 +00:00
Luc Perkins
51bc05e2ea
Fix method of finding docker shims 2024-05-02 17:19:07 -03:00
Luc Perkins
9ffa76fa74
Fix ESM build 2024-05-02 17:07:51 -03:00
Luc Perkins
337589f84d
Switch to tsup for building 2024-05-02 16:35:58 -03:00
Luc Perkins
ff707a0bf7
Fix merge conflict with main 2024-05-02 13:03:16 -03:00
Luc Perkins
57a6360160
Fix build issue due to detsys-ts update 2024-05-02 10:52:54 -03:00
Luc Perkins
a2856cdfd2
Prefer coalescing over or-ing 2024-04-24 11:13:40 -03:00
Luc Perkins
b87931b2dd
Add camelcase check 2024-04-24 11:09:55 -03:00
Cole Helbling
413ac98332 Gracefully handle FlakeHub login failure 2024-04-23 09:55:39 -07:00
Luc Perkins
c9a02f1141
Use bracket notation for env vars 2024-04-15 19:42:44 -03:00
Luc Perkins
413fb1beb4
Constify events and facts 2024-04-15 19:34:51 -03:00
Luc Perkins
8f4ca496eb
Enforce proper casing 2024-04-15 19:23:29 -03:00
Luc Perkins
c89881253c
Use detsys-ts functions for inputs 2024-04-15 19:09:42 -03:00
Graham Christensen
5c49fa4feb
Update detsys-ts (#75) 2024-04-12 15:31:59 -04:00
Graham Christensen
5d2215c1e1
Rebase on top of detsys-ts for abstracting over install.determinate.systems (#74)
* Rebase on top of detsys-ts for abstracting over install.determinate.systems

* Support the legacy nix-installer-xxx source prefs

* Document source-* opts

* Update deps

* cut duration so it doesn't take forever

* Move the complete step into a finally block

* Test a busted run

* come on ...

* update to the main detsys-ts

* Switch to the delegated execution model

* throw an error to check behavior

* Fixup lint errors

* Drop the forced error
2024-04-11 11:58:56 -04:00
Graham Christensen
de22e16c47
DETERMINATE_NIX_KVM fixup, support Magic Nix Cache + FlakeHub Cache on Namespace runners (#72)
* Share /bin with nix for post-build-hooks

* test the magic nix cache

* wtf

* permissions

* Share /home and the network namespace too

* test the devshell

* Don't force-set kvm to 0 ... d'oh!

* dev shell support for aarch64-linux

* ?

* More testing /  debug

* Make it run anyway

* Bind /lib too so /bin/sh works ... sigh

* Disable gha-cache for tesing

* Kill the magic nix cache before reinstalling

* Don't set the extra environment variables extraniously

* Enable gha cache again
2024-03-11 19:53:25 -04:00
Ana Hobden
f4a0ffe230 Don't use docker shim if only using a mounted docker.sock instead of docker-in-docker 2024-01-10 11:45:04 -08:00
Ana Hobden
4126bb83b3 Merge branch 'main' into hoverbear/fh-160-action-should-work-under-nektosact-in-the-absence-of-systemd 2024-01-09 10:38:56 -08:00
Ana Hobden
81ee88fd4a Handle docker not existing 2024-01-09 10:36:54 -08:00
Ana Hobden
f576e90e2d Fix logic inversion 2024-01-08 13:29:15 -08:00
Ana Hobden
161c1f6904 Use uid not username 2024-01-08 13:06:51 -08:00
Ana Hobden
0e5b724979 No longer require sudo 2024-01-08 10:50:02 -08:00
Cole Mickens
21affdd5d3
action: post-run-job: try clean daemon container, warn on failure (#61)
* flake: add typescript LSP tool

* action: post-run-job: try clean daemon container, warn on failure
2023-12-19 11:01:56 -05:00
Graham Christensen
cd46bde16a
Support GitHub Enterprise Server using ARC (#59)
* Test nix-installer-action on Namespace.so

It is special in that it doesn't have systemd, and it'd be great to
support Namespace.so. It is also a good test case for a variety
of self-hosted GHA runner use cases.

* Make correlation more confident

* Borrow docker as a process supervisor on Linux GHA runners without systemd

This change introduces a Docker container shim which spawns the Nix
daemon after bind mounting all the relevant paths into the container.

The image is actually completely empty, other than metadata about what
to run.

This is a cheap and cheerful way to get decent process supervision in
environments that don't bring systemd, but do have docker ... which
is most everywhere in the GHA ecosystem.

* Ignore generated files

* Run on arm64 why not

* Load a pre-built image, don't build

* Check the userInfo.username instead of an env var

* Stop double-printing output to the console

* can't rm and restart

* what

* Clean up the container at the end

* Emit the fetch line in the 'installing nix' section

* tweak output

* delete what
2023-12-04 14:17:47 -05:00
Graham Christensen
84fe9e450f
Support GitHub Enterprise Server in the github-token access token. (#58) 2023-12-01 10:23:32 -05:00
Graham Christensen
07b8bcba1b
KVM support out of the box, plus a refreshed README (#56)
* support kvm

* Refresh the readme

* Update README.md

Co-authored-by: Ana Hobden <operator@hoverbear.org>

* Update README.md

Co-authored-by: Luc Perkins <lucperkins@gmail.com>

* Update README.md

---------

Co-authored-by: Ana Hobden <operator@hoverbear.org>
Co-authored-by: Luc Perkins <lucperkins@gmail.com>
2023-11-21 19:06:06 +00:00
Ana Hobden
8b5f066806 Use Github Actions provided tool cache and exec 2023-11-02 10:48:10 -07:00
Hugo Santos
7fa8f59903
Detected whether we're running in a Namespace runner, and if so, set init: none. (#52)
Background: Namespace managed runners run each github job in a container, in a
separate micro-vm managed by Namespace. These VMs and containers do not rely on
systemd, and instead use Namespace's own init/process management.
2023-11-02 15:58:37 +00:00
Cole Mickens
bb22c86823
retries: autoClose, but open file with O_SYNC 2023-10-24 18:01:08 +02:00