apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: name: runner-role rules: - apiGroups: ["*"] resources: ["*"] verbs: ["*"] --- apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: name: runner-role-binding subjects: - kind: ServiceAccount name: default roleRef: kind: Role name: runner-role apiGroup: rbac.authorization.k8s.io --- kind: PersistentVolumeClaim apiVersion: v1 metadata: name: act-runner-vol spec: accessModes: - ReadWriteOnce resources: requests: storage: 1Gi --- apiVersion: v1 stringData: # The registration token can be obtained from the web UI, API or command-line. # You can also set a pre-defined global runner registration token for the Gitea instance via # `GITEA_RUNNER_REGISTRATION_TOKEN`/`GITEA_RUNNER_REGISTRATION_TOKEN_FILE` environment variable. token: Dw48WxjKe1d8ahEEu4UIUlhp7G85zEg2v8D2fXpW kind: Secret metadata: name: runner-secret type: Opaque --- apiVersion: apps/v1 kind: Deployment metadata: labels: app: act-runner name: act-runner spec: replicas: 1 selector: matchLabels: app: act-runner strategy: {} template: metadata: labels: app: act-runner spec: restartPolicy: Always volumes: - name: docker-certs emptyDir: {} - name: runner-data persistentVolumeClaim: claimName: act-runner-vol containers: - name: runner image: gitea/act_runner:nightly command: ["sh", "-c", "while ! nc -z localhost 2376