Compare commits

...

2 Commits

Author SHA1 Message Date
Joey Hafner
b91d41cb90
#17 Trigger workflow
All checks were successful
Deploy NixOS System Configurations to Silver-Flame Hosts / deploy (push) Successful in 2m33s
2024-10-25 20:35:18 -07:00
Joey Hafner
ab7275b97d
#17 Revert: Re-enable configuring known_hosts, combine steps into "Configure SSH" 2024-10-25 20:35:02 -07:00
2 changed files with 6 additions and 10 deletions

View File

@ -27,20 +27,16 @@ jobs:
name: jafnernet name: jafnernet
authToken: '${{ secrets.CACHIX_TOKEN }}' authToken: '${{ secrets.CACHIX_TOKEN }}'
extraPullNames: nix-community extraPullNames: nix-community
- name: Configure SSH key - name: Configure SSH
run: | run: |
echo -e "${{ secrets.RUNNER_SSH_PRIVATEKEY }}" > /tmp/key echo -e "${{ secrets.RUNNER_SSH_PRIVATEKEY }}" > /tmp/key
chmod 600 /tmp/key chmod 600 /tmp/key
- name: Get list of hosts
run: |
nix eval --json .#deploy.nodes --apply 'builtins.attrValues' |\ nix eval --json .#deploy.nodes --apply 'builtins.attrValues' |\
jq -r '.[].hostname' | xargs echo > /tmp/hostlist jq -r '.[].hostname' | xargs echo > /tmp/hostlist
# - name: Add known hosts mkdir -p ~/.ssh && touch ~/.ssh/known_hosts && chmod 600 ~/.ssh/known_hosts
# run: | for host in $(cat /tmp/hostlist); do
# mkdir -p ~/.ssh && touch ~/.ssh/known_hosts && chmod 600 ~/.ssh/known_hosts ssh-keyscan -t ed25519 $host >> ~/.ssh/known_hosts
# for host in $(cat /tmp/hostlist); do done
# ssh-keyscan -t ed25519 $host >> ~/.ssh/known_hosts
# done
# - name: Test SSH connections # - name: Test SSH connections
# run: | # run: |
# for host in $(cat /tmp/hostlist); do # for host in $(cat /tmp/hostlist); do

View File

@ -33,7 +33,7 @@
clusterInit = (hostConf.name == "bard"); clusterInit = (hostConf.name == "bard");
serverAddr = (if hostConf.name == "bard" then "" else "https://192.168.1.31:6443"); serverAddr = (if hostConf.name == "bard" then "" else "https://192.168.1.31:6443");
# We are going to manage k8s resources separately from the infrastructure config # We are going to manage k8s resources separately from the infrastructure config
manifests = { }; manifests = { };
}; };
services.openiscsi = { services.openiscsi = {
enable = false; enable = false;