feat: auto-discover kubeadm node IPs from terraform state
All checks were successful
Terraform Plan / Terraform Plan (push) Successful in 17s

This commit is contained in:
2026-02-28 16:31:23 +00:00
parent b0779c51c0
commit 8bcc162956
4 changed files with 158 additions and 30 deletions

View File

@@ -32,22 +32,77 @@ jobs:
- name: Create SSH key
run: |
install -m 0700 -d ~/.ssh
cat > ~/.ssh/id_ed25519 << 'EOF'
${{ secrets.KUBEADM_SSH_PRIVATE_KEY }}
EOF
KEY_CONTENT="$(printf '%s' "${{ secrets.KUBEADM_SSH_PRIVATE_KEY }}")"
if [ -z "$KEY_CONTENT" ]; then
KEY_CONTENT="$(printf '%s' "${{ secrets.SSH_KEY_PRIVATE }}")"
fi
if [ -z "$KEY_CONTENT" ]; then
echo "Missing SSH private key secret. Set KUBEADM_SSH_PRIVATE_KEY or SSH_KEY_PRIVATE."
exit 1
fi
printf '%s\n' "$KEY_CONTENT" > ~/.ssh/id_ed25519
chmod 0600 ~/.ssh/id_ed25519
- name: Create kubeadm inventory
working-directory: nixos/kubeadm/scripts
- name: Set up Terraform
uses: hashicorp/setup-terraform@v2
with:
terraform_version: 1.6.6
terraform_wrapper: false
- name: Build Terraform backend files
working-directory: terraform
run: |
cat > inventory.env << EOF
SSH_USER=${{ secrets.KUBEADM_SSH_USER }}
CP_1=${{ secrets.KUBEADM_CP_1_IP }}
CP_2=${{ secrets.KUBEADM_CP_2_IP }}
CP_3=${{ secrets.KUBEADM_CP_3_IP }}
WK_1=${{ secrets.KUBEADM_WK_1_IP }}
WK_2=${{ secrets.KUBEADM_WK_2_IP }}
WK_3=${{ secrets.KUBEADM_WK_3_IP }}
cat > secrets.auto.tfvars << EOF
pm_api_token_secret = "${{ secrets.PM_API_TOKEN_SECRET }}"
SSH_KEY_PUBLIC = "$(printf '%s' "${{ secrets.SSH_KEY_PUBLIC }}" | tr -d '\r\n')"
EOF
cat > backend.hcl << EOF
bucket = "${{ secrets.B2_TF_BUCKET }}"
key = "terraform.tfstate"
region = "us-east-005"
endpoints = {
s3 = "${{ secrets.B2_TF_ENDPOINT }}"
}
access_key = "$(printf '%s' "${{ secrets.B2_KEY_ID }}" | tr -d '\r\n')"
secret_key = "$(printf '%s' "${{ secrets.B2_APPLICATION_KEY }}" | tr -d '\r\n')"
skip_credentials_validation = true
skip_metadata_api_check = true
skip_region_validation = true
skip_requesting_account_id = true
use_path_style = true
EOF
- name: Terraform init for state read
working-directory: terraform
run: terraform init -reconfigure -backend-config=backend.hcl
- name: Create kubeadm inventory
run: |
TF_OUTPUT_JSON="$(terraform -chdir=terraform output -json)"
CP_1="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-1"])' <<< "$TF_OUTPUT_JSON")"
CP_2="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-2"])' <<< "$TF_OUTPUT_JSON")"
CP_3="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-3"])' <<< "$TF_OUTPUT_JSON")"
WK_1="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-1"])' <<< "$TF_OUTPUT_JSON")"
WK_2="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-2"])' <<< "$TF_OUTPUT_JSON")"
WK_3="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-3"])' <<< "$TF_OUTPUT_JSON")"
SSH_USER="$(printf '%s' "${{ secrets.KUBEADM_SSH_USER }}")"
if [ -z "$SSH_USER" ]; then
SSH_USER="micqdf"
fi
cat > nixos/kubeadm/scripts/inventory.env << EOF
SSH_USER=$SSH_USER
CP_1=$CP_1
CP_2=$CP_2
CP_3=$CP_3
WK_1=$WK_1
WK_2=$WK_2
WK_3=$WK_3
EOF
- name: Validate nix installation

View File

@@ -32,22 +32,77 @@ jobs:
- name: Create SSH key
run: |
install -m 0700 -d ~/.ssh
cat > ~/.ssh/id_ed25519 << 'EOF'
${{ secrets.KUBEADM_SSH_PRIVATE_KEY }}
EOF
KEY_CONTENT="$(printf '%s' "${{ secrets.KUBEADM_SSH_PRIVATE_KEY }}")"
if [ -z "$KEY_CONTENT" ]; then
KEY_CONTENT="$(printf '%s' "${{ secrets.SSH_KEY_PRIVATE }}")"
fi
if [ -z "$KEY_CONTENT" ]; then
echo "Missing SSH private key secret. Set KUBEADM_SSH_PRIVATE_KEY or SSH_KEY_PRIVATE."
exit 1
fi
printf '%s\n' "$KEY_CONTENT" > ~/.ssh/id_ed25519
chmod 0600 ~/.ssh/id_ed25519
- name: Create kubeadm inventory
working-directory: nixos/kubeadm/scripts
- name: Set up Terraform
uses: hashicorp/setup-terraform@v2
with:
terraform_version: 1.6.6
terraform_wrapper: false
- name: Build Terraform backend files
working-directory: terraform
run: |
cat > inventory.env << EOF
SSH_USER=${{ secrets.KUBEADM_SSH_USER }}
CP_1=${{ secrets.KUBEADM_CP_1_IP }}
CP_2=${{ secrets.KUBEADM_CP_2_IP }}
CP_3=${{ secrets.KUBEADM_CP_3_IP }}
WK_1=${{ secrets.KUBEADM_WK_1_IP }}
WK_2=${{ secrets.KUBEADM_WK_2_IP }}
WK_3=${{ secrets.KUBEADM_WK_3_IP }}
cat > secrets.auto.tfvars << EOF
pm_api_token_secret = "${{ secrets.PM_API_TOKEN_SECRET }}"
SSH_KEY_PUBLIC = "$(printf '%s' "${{ secrets.SSH_KEY_PUBLIC }}" | tr -d '\r\n')"
EOF
cat > backend.hcl << EOF
bucket = "${{ secrets.B2_TF_BUCKET }}"
key = "terraform.tfstate"
region = "us-east-005"
endpoints = {
s3 = "${{ secrets.B2_TF_ENDPOINT }}"
}
access_key = "$(printf '%s' "${{ secrets.B2_KEY_ID }}" | tr -d '\r\n')"
secret_key = "$(printf '%s' "${{ secrets.B2_APPLICATION_KEY }}" | tr -d '\r\n')"
skip_credentials_validation = true
skip_metadata_api_check = true
skip_region_validation = true
skip_requesting_account_id = true
use_path_style = true
EOF
- name: Terraform init for state read
working-directory: terraform
run: terraform init -reconfigure -backend-config=backend.hcl
- name: Create kubeadm inventory
run: |
TF_OUTPUT_JSON="$(terraform -chdir=terraform output -json)"
CP_1="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-1"])' <<< "$TF_OUTPUT_JSON")"
CP_2="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-2"])' <<< "$TF_OUTPUT_JSON")"
CP_3="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["control_plane_vm_ipv4"]["value"]["cp-3"])' <<< "$TF_OUTPUT_JSON")"
WK_1="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-1"])' <<< "$TF_OUTPUT_JSON")"
WK_2="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-2"])' <<< "$TF_OUTPUT_JSON")"
WK_3="$(python3 -c 'import json,sys; d=json.loads(sys.stdin.read()); print(d["worker_vm_ipv4"]["value"]["wk-3"])' <<< "$TF_OUTPUT_JSON")"
SSH_USER="$(printf '%s' "${{ secrets.KUBEADM_SSH_USER }}")"
if [ -z "$SSH_USER" ]; then
SSH_USER="micqdf"
fi
cat > nixos/kubeadm/scripts/inventory.env << EOF
SSH_USER=$SSH_USER
CP_1=$CP_1
CP_2=$CP_2
CP_3=$CP_3
WK_1=$WK_1
WK_2=$WK_2
WK_3=$WK_3
EOF
- name: Run cluster reset