feat: auto-discover kubeadm node IPs from terraform state
All checks were successful
Terraform Plan / Terraform Plan (push) Successful in 17s
All checks were successful
Terraform Plan / Terraform Plan (push) Successful in 17s
This commit is contained in:
@@ -32,22 +32,77 @@ jobs:
|
||||
- name: Create SSH key
|
||||
run: |
|
||||
install -m 0700 -d ~/.ssh
|
||||
cat > ~/.ssh/id_ed25519 << 'EOF'
|
||||
${{ secrets.KUBEADM_SSH_PRIVATE_KEY }}
|
||||
EOF
|
||||
KEY_CONTENT="$(printf '%s' "${{ secrets.KUBEADM_SSH_PRIVATE_KEY }}")"
|
||||
if [ -z "$KEY_CONTENT" ]; then
|
||||
KEY_CONTENT="$(printf '%s' "${{ secrets.SSH_KEY_PRIVATE }}")"
|
||||
fi
|
||||
|
||||
if [ -z "$KEY_CONTENT" ]; then
|
||||
echo "Missing SSH private key secret. Set KUBEADM_SSH_PRIVATE_KEY or SSH_KEY_PRIVATE."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
printf '%s\n' "$KEY_CONTENT" > ~/.ssh/id_ed25519
|
||||
chmod 0600 ~/.ssh/id_ed25519
|
||||
|
||||
- name: Create kubeadm inventory
|
||||
working-directory: nixos/kubeadm/scripts
|
||||
- name: Set up Terraform
|
||||
uses: hashicorp/setup-terraform@v2
|
||||
with:
|
||||
terraform_version: 1.6.6
|
||||
terraform_wrapper: false
|
||||
|
||||
- name: Build Terraform backend files
|
||||
working-directory: terraform
|
||||
run: |
|
||||
cat > inventory.env << EOF
|
||||
SSH_USER=${{ secrets.KUBEADM_SSH_USER }}
|
||||
CP_1=${{ secrets.KUBEADM_CP_1_IP }}
|
||||
CP_2=${{ secrets.KUBEADM_CP_2_IP }}
|
||||
CP_3=${{ secrets.KUBEADM_CP_3_IP }}
|
||||
WK_1=${{ secrets.KUBEADM_WK_1_IP }}
|
||||
WK_2=${{ secrets.KUBEADM_WK_2_IP }}
|
||||
WK_3=${{ secrets.KUBEADM_WK_3_IP }}
|
||||
cat > secrets.auto.tfvars << EOF
|
||||
pm_api_token_secret = "${{ secrets.PM_API_TOKEN_SECRET }}"
|
||||
SSH_KEY_PUBLIC = "$(printf '%s' "${{ secrets.SSH_KEY_PUBLIC }}" | tr -d '\r\n')"
|
||||
EOF
|
||||
|
||||
cat > backend.hcl << EOF
|
||||
bucket = "${{ secrets.B2_TF_BUCKET }}"
|
||||
key = "terraform.tfstate"
|
||||
region = "us-east-005"
|
||||
endpoints = {
|
||||
s3 = "${{ secrets.B2_TF_ENDPOINT }}"
|
||||
}
|
||||
access_key = "$(printf '%s' "${{ secrets.B2_KEY_ID }}" | tr -d '\r\n')"
|
||||
secret_key = "$(printf '%s' "${{ secrets.B2_APPLICATION_KEY }}" | tr -d '\r\n')"
|
||||
skip_credentials_validation = true
|
||||
skip_metadata_api_check = true
|
||||
skip_region_validation = true
|
||||
skip_requesting_account_id = true
|
||||
use_path_style = true
|
||||
EOF
|
||||
|
||||
- name: Terraform init for state read
|
||||
working-directory: terraform
|
||||
run: terraform init -reconfigure -backend-config=backend.hcl
|
||||
|
||||
- name: Create kubeadm inventory
|
||||
run: |
|
||||
TF_OUTPUT_JSON="$(terraform -chdir=terraform output -json)"
|
||||
|
||||
CP_1="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-1"])' <<< "$TF_OUTPUT_JSON")"
|
||||
CP_2="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-2"])' <<< "$TF_OUTPUT_JSON")"
|
||||
CP_3="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-3"])' <<< "$TF_OUTPUT_JSON")"
|
||||
WK_1="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-1"])' <<< "$TF_OUTPUT_JSON")"
|
||||
WK_2="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-2"])' <<< "$TF_OUTPUT_JSON")"
|
||||
WK_3="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-3"])' <<< "$TF_OUTPUT_JSON")"
|
||||
|
||||
SSH_USER="$(printf '%s' "${{ secrets.KUBEADM_SSH_USER }}")"
|
||||
if [ -z "$SSH_USER" ]; then
|
||||
SSH_USER="micqdf"
|
||||
fi
|
||||
|
||||
cat > nixos/kubeadm/scripts/inventory.env << EOF
|
||||
SSH_USER=$SSH_USER
|
||||
CP_1=$CP_1
|
||||
CP_2=$CP_2
|
||||
CP_3=$CP_3
|
||||
WK_1=$WK_1
|
||||
WK_2=$WK_2
|
||||
WK_3=$WK_3
|
||||
EOF
|
||||
|
||||
- name: Validate nix installation
|
||||
|
||||
@@ -32,22 +32,77 @@ jobs:
|
||||
- name: Create SSH key
|
||||
run: |
|
||||
install -m 0700 -d ~/.ssh
|
||||
cat > ~/.ssh/id_ed25519 << 'EOF'
|
||||
${{ secrets.KUBEADM_SSH_PRIVATE_KEY }}
|
||||
EOF
|
||||
KEY_CONTENT="$(printf '%s' "${{ secrets.KUBEADM_SSH_PRIVATE_KEY }}")"
|
||||
if [ -z "$KEY_CONTENT" ]; then
|
||||
KEY_CONTENT="$(printf '%s' "${{ secrets.SSH_KEY_PRIVATE }}")"
|
||||
fi
|
||||
|
||||
if [ -z "$KEY_CONTENT" ]; then
|
||||
echo "Missing SSH private key secret. Set KUBEADM_SSH_PRIVATE_KEY or SSH_KEY_PRIVATE."
|
||||
exit 1
|
||||
fi
|
||||
|
||||
printf '%s\n' "$KEY_CONTENT" > ~/.ssh/id_ed25519
|
||||
chmod 0600 ~/.ssh/id_ed25519
|
||||
|
||||
- name: Create kubeadm inventory
|
||||
working-directory: nixos/kubeadm/scripts
|
||||
- name: Set up Terraform
|
||||
uses: hashicorp/setup-terraform@v2
|
||||
with:
|
||||
terraform_version: 1.6.6
|
||||
terraform_wrapper: false
|
||||
|
||||
- name: Build Terraform backend files
|
||||
working-directory: terraform
|
||||
run: |
|
||||
cat > inventory.env << EOF
|
||||
SSH_USER=${{ secrets.KUBEADM_SSH_USER }}
|
||||
CP_1=${{ secrets.KUBEADM_CP_1_IP }}
|
||||
CP_2=${{ secrets.KUBEADM_CP_2_IP }}
|
||||
CP_3=${{ secrets.KUBEADM_CP_3_IP }}
|
||||
WK_1=${{ secrets.KUBEADM_WK_1_IP }}
|
||||
WK_2=${{ secrets.KUBEADM_WK_2_IP }}
|
||||
WK_3=${{ secrets.KUBEADM_WK_3_IP }}
|
||||
cat > secrets.auto.tfvars << EOF
|
||||
pm_api_token_secret = "${{ secrets.PM_API_TOKEN_SECRET }}"
|
||||
SSH_KEY_PUBLIC = "$(printf '%s' "${{ secrets.SSH_KEY_PUBLIC }}" | tr -d '\r\n')"
|
||||
EOF
|
||||
|
||||
cat > backend.hcl << EOF
|
||||
bucket = "${{ secrets.B2_TF_BUCKET }}"
|
||||
key = "terraform.tfstate"
|
||||
region = "us-east-005"
|
||||
endpoints = {
|
||||
s3 = "${{ secrets.B2_TF_ENDPOINT }}"
|
||||
}
|
||||
access_key = "$(printf '%s' "${{ secrets.B2_KEY_ID }}" | tr -d '\r\n')"
|
||||
secret_key = "$(printf '%s' "${{ secrets.B2_APPLICATION_KEY }}" | tr -d '\r\n')"
|
||||
skip_credentials_validation = true
|
||||
skip_metadata_api_check = true
|
||||
skip_region_validation = true
|
||||
skip_requesting_account_id = true
|
||||
use_path_style = true
|
||||
EOF
|
||||
|
||||
- name: Terraform init for state read
|
||||
working-directory: terraform
|
||||
run: terraform init -reconfigure -backend-config=backend.hcl
|
||||
|
||||
- name: Create kubeadm inventory
|
||||
run: |
|
||||
TF_OUTPUT_JSON="$(terraform -chdir=terraform output -json)"
|
||||
|
||||
CP_1="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-1"])' <<< "$TF_OUTPUT_JSON")"
|
||||
CP_2="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-2"])' <<< "$TF_OUTPUT_JSON")"
|
||||
CP_3="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-3"])' <<< "$TF_OUTPUT_JSON")"
|
||||
WK_1="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-1"])' <<< "$TF_OUTPUT_JSON")"
|
||||
WK_2="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-2"])' <<< "$TF_OUTPUT_JSON")"
|
||||
WK_3="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-3"])' <<< "$TF_OUTPUT_JSON")"
|
||||
|
||||
SSH_USER="$(printf '%s' "${{ secrets.KUBEADM_SSH_USER }}")"
|
||||
if [ -z "$SSH_USER" ]; then
|
||||
SSH_USER="micqdf"
|
||||
fi
|
||||
|
||||
cat > nixos/kubeadm/scripts/inventory.env << EOF
|
||||
SSH_USER=$SSH_USER
|
||||
CP_1=$CP_1
|
||||
CP_2=$CP_2
|
||||
CP_3=$CP_3
|
||||
WK_1=$WK_1
|
||||
WK_2=$WK_2
|
||||
WK_3=$WK_3
|
||||
EOF
|
||||
|
||||
- name: Run cluster reset
|
||||
|
||||
Reference in New Issue
Block a user