mirror of
https://github.com/TheSL18/upptime.git
synced 2024-11-19 15:31:45 -06:00
85 lines
3.2 KiB
YAML
85 lines
3.2 KiB
YAML
#
|
|
# ===============================
|
|
# Do not edit this file directly!
|
|
# ===============================
|
|
#
|
|
# Your changes will be overwritten when the Upptime template updates (by default, weekly)
|
|
# Instead, change .upptimerc.yml configuration and the workflows will be generated accordingly.
|
|
#
|
|
# 🔼 Upptime @v1.36.2
|
|
# GitHub-powered open-source uptime monitor and status page by Anand Chowdhary
|
|
|
|
# * Source: https://github.com/upptime/upptime
|
|
# * Docs and more: https://upptime.js.org
|
|
# * More by Anand Chowdhary: https://anandchowdhary.com
|
|
|
|
|
|
name: Response Time CI
|
|
on:
|
|
schedule:
|
|
- cron: "0 23 * * *"
|
|
repository_dispatch:
|
|
types: [response_time]
|
|
workflow_dispatch:
|
|
jobs:
|
|
release:
|
|
name: Check status
|
|
runs-on: ubuntu-latest
|
|
steps:
|
|
- name: Checkout
|
|
uses: actions/checkout@v3
|
|
with:
|
|
ref: ${{ github.head_ref }}
|
|
token: ${{ secrets.GH_PAT || github.token }}
|
|
- name: Install WARP to support IPv6
|
|
run: |
|
|
if [ "${{ inputs.mode }}" == 'client' ]; then
|
|
echo "WARP mode: client warp+doh."
|
|
sudo apt-get -y update
|
|
curl -fsSL https://pkg.cloudflareclient.com/pubkey.gpg | sudo gpg --yes --dearmor --output /usr/share/keyrings/cloudflare-warp-archive-keyring.gpg
|
|
echo "deb [arch=amd64 signed-by=/usr/share/keyrings/cloudflare-warp-archive-keyring.gpg] https://pkg.cloudflareclient.com/ $(lsb_release -cs) main" | sudo tee /etc/apt/sources.list.d/cloudflare-client.list
|
|
sudo apt-get update
|
|
sudo apt-get install -y cloudflare-warp
|
|
sudo warp-cli --accept-tos register
|
|
sudo warp-cli --accept-tos set-mode warp+doh
|
|
sudo warp-cli --accept-tos connect
|
|
|
|
elif [ "${{ inputs.mode }}" == 'wireguard' ]; then
|
|
echo "WARP mode: wireguard."
|
|
sudo apt-get -y update
|
|
sudo apt-get -y install --no-install-recommends net-tools iproute2 openresolv dnsutils iptables wireguard-tools
|
|
LAN=$(ip route get 192.168.193.10 | grep -oP 'src KS+')
|
|
echo "[Interface]
|
|
PrivateKey = cKE7LmCF61IhqqABGhvJ44jWXp8fKymcMAEVAzbDF2k=
|
|
Address = 172.16.0.2/32
|
|
Address = fd01:5ca1:ab1e:823e:e094:eb1c:ff87:1fab/128
|
|
PostUp = ip -4 rule add from $LAN lookup main
|
|
PostDown = ip -4 rule delete from $LAN lookup main
|
|
DNS = 8.8.8.8,8.8.4.4
|
|
MTU = 1280
|
|
|
|
[Peer]
|
|
PublicKey = bmXOC+F1FxEMF9dyiK2H5/1SUtzH0JuVo51h2wPfgyo=
|
|
AllowedIPs = 0.0.0.0/0
|
|
AllowedIPs = ::/0
|
|
Endpoint = 162.159.193.10:2408" | sed "s/^[ ]+//g" | sudo tee /etc/wireguard/warp.conf
|
|
sudo wg-quick up warp
|
|
|
|
else
|
|
echo -e "WARP mode: ${{ inputs.mode }}.
|
|
You can choose client or wireguard."
|
|
exit 1
|
|
fi
|
|
|
|
sleep 1
|
|
sudo curl -s4m8 --retry 3 -A Mozilla https://api.ip.sb/geoip
|
|
|
|
shell: bash
|
|
- name: Update response time
|
|
uses: upptime/uptime-monitor@v1.36.2
|
|
with:
|
|
command: "response-time"
|
|
env:
|
|
GH_PAT: ${{ secrets.GH_PAT || github.token }}
|
|
SECRETS_CONTEXT: ${{ toJson(secrets) }}
|