SHA256
Visit Page
3
0
Fork
You've already forked pages
0
Pages repository for Itiquette organisation
CSS 54.4%
HTML 34.3%
Shell 7.4%
JavaScript 3.9%
Josef Andersson 46e318a15a
All checks were successful
Deploy to Codeberg Pages / build-and-deploy (push) Successful in 1m40s
ci: fix about
Signed-off-by: Josef Andersson <janderssonse@proton.me>
2026年01月14日 00:00:03 +01:00
.forgejo/workflows docs: improve posts 2026年01月11日 23:35:34 +01:00
archetypes chore: initial commit 2026年01月06日 11:33:15 +01:00
content ci: fix about 2026年01月14日 00:00:03 +01:00
scripts/ci chore: initial commit 2026年01月06日 11:33:15 +01:00
static chore: add robots.txt 2026年01月07日 00:52:22 +01:00
themes/terminal chore: initial commit 2026年01月06日 11:33:15 +01:00
.gitignore chore: initial commit 2026年01月06日 11:33:15 +01:00
hugo.toml chore: initial commit 2026年01月06日 11:33:15 +01:00
mise.toml docs: improve posts 2026年01月11日 23:35:34 +01:00
README.md chore: initial commit 2026年01月06日 11:33:15 +01:00
renovate.json chore: initial commit 2026年01月06日 11:33:15 +01:00

Itiquette Website

This repository hosts the Itiquette website built with Hugo and deployed to Codeberg Pages.

Live site: https://itiquette.codeberg.page/

Local Development

git clone https://codeberg.org/itiquette/pages.git
cd pages
git submodule update --init --recursive
hugo server -D

Visit http://localhost:1313 in your browser.

Deployment

The site is automatically deployed via Forgejo Actions when changes are pushed to main.

The workflow:

  1. Builds the Hugo site
  2. Pushes the output to the pages branch
  3. Codeberg Pages serves from that branch

Setup Requirements

  1. Self-hosted runner: Requires a runner with label ci-builder
  2. Secrets (Settings -> Actions -> Secrets):
Secret Purpose Required How to Create
CODEBERG_TOKEN_RELEASE Push to pages branch Yes Codeberg → Bot Profile → Settings → Applications → Generate Token. Scope: write:repository
SSH_SIGNING_KEY_RELEASE Sign deploy commits Yes ssh-keygen -t ed25519 -C "bot@email" -f key -N "". Add public key to bot's Codeberg profile under SSH/GPG Keys → Signing Keys. Store private key as secret.

Note: The public key is derived automatically from the private key during deployment - no separate SSH_SIGNING_KEY_PUB secret is needed.

Bot Account

Uses itiquette-release-bot for deployments. The same CODEBERG_TOKEN_RELEASE and SSH_SIGNING_KEY_RELEASE can be shared with other projects using this bot (e.g., gommitlint releases).

Credits