Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
S
slapos-mynij-dev
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Analytics
Analytics
CI / CD
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Mynij
slapos-mynij-dev
Commits
0f441e98
Commit
0f441e98
authored
Sep 20, 2016
by
Nicolas Wavrant
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
resilient & slaprunner: force the upgrade of openssh keys
parent
bdf529da
Changes
6
Show whitespace changes
Inline
Side-by-side
Showing
6 changed files
with
18 additions
and
18 deletions
+18
-18
software/slaprunner/common.cfg
software/slaprunner/common.cfg
+1
-1
software/slaprunner/instance-runner.cfg
software/slaprunner/instance-runner.cfg
+6
-6
stack/resilient/buildout.cfg
stack/resilient/buildout.cfg
+3
-3
stack/resilient/pbsready-export.cfg.in
stack/resilient/pbsready-export.cfg.in
+1
-1
stack/resilient/pbsready-import.cfg.in
stack/resilient/pbsready-import.cfg.in
+1
-1
stack/resilient/pbsready.cfg.in
stack/resilient/pbsready.cfg.in
+6
-6
No files found.
software/slaprunner/common.cfg
View file @
0f441e98
...
...
@@ -54,7 +54,7 @@ mode = 0644
recipe = slapos.recipe.template
url = ${:_profile_base_location_}/instance-runner.cfg
output = ${buildout:directory}/template-runner.cfg.in
md5sum =
26a58e69c4c59d30c9e2f50075cdc679
md5sum =
71ce5a39bf61ae5f80a10c27b9c12761
mode = 0644
[template-runner-import-script]
...
...
software/slaprunner/instance-runner.cfg
View file @
0f441e98
...
...
@@ -251,16 +251,16 @@ recipe = slapos.cookbook:wrapper
command-line = $${directory:bin}/killpidfromfile $${runner-sshd-config:path_pid} SIGHUP
wrapper-path = $${directory:scripts}/runner-sshd-graceful
[sshkeys-directory]
[
runner-
sshkeys-directory]
recipe = slapos.cookbook:mkdirectory
requests = $${directory:sshkeys}/requests/
keys = $${directory:sshkeys}/keys/
requests = $${directory:sshkeys}/r
unner-r
equests/
keys = $${directory:sshkeys}/
runner-
keys/
[runner-sshkeys-authority]
recipe = slapos.cookbook:sshkeys_authority
request-directory = $${sshkeys-directory:requests}
keys-directory = $${sshkeys-directory:keys}
wrapper = $${directory:services}/sshkeys_authority
request-directory = $${
runner-
sshkeys-directory:requests}
keys-directory = $${
runner-
sshkeys-directory:keys}
wrapper = $${directory:services}/
runner_
sshkeys_authority
keygen-binary = ${openssh:location}/bin/ssh-keygen
[runner-sshkeys-sshd]
...
...
stack/resilient/buildout.cfg
View file @
0f441e98
...
...
@@ -41,7 +41,7 @@ eggs =
recipe = slapos.recipe.template
url = ${:_profile_base_location_}/pbsready.cfg.in
output = ${buildout:directory}/pbsready.cfg
md5sum =
fee06ab268015b394ec49cb4600de1ed
md5sum =
3dddf84daf5db8ff4ffc3878e206b467
mode = 0644
[pbsready-import]
...
...
@@ -50,7 +50,7 @@ mode = 0644
recipe = slapos.recipe.template
url = ${:_profile_base_location_}/pbsready-import.cfg.in
output = ${buildout:directory}/pbsready-import.cfg
md5sum =
89619b0d8626c76402a11bb08e7ba8a1
md5sum =
a13be3bd76d6a52b6527c7035ba33a06
mode = 0644
[pbsready-export]
...
...
@@ -59,7 +59,7 @@ mode = 0644
recipe = slapos.recipe.template
url = ${:_profile_base_location_}/pbsready-export.cfg.in
output = ${buildout:directory}/pbsready-export.cfg
md5sum =
48cf26431ab052eae8227efd457db8c3
md5sum =
cb2537598981a1a4af0dea05cc6ac6bd
mode = 0644
[template-pull-backup]
...
...
stack/resilient/pbsready-export.cfg.in
View file @
0f441e98
...
...
@@ -10,7 +10,7 @@ parts =
logrotate-entry-equeue
cron
cron-entry-logrotate
sshkeys-authority
resilient-
sshkeys-authority
sshd-raw-server
sshd-graceful
sshkeys-sshd
...
...
stack/resilient/pbsready-import.cfg.in
View file @
0f441e98
...
...
@@ -10,7 +10,7 @@ parts =
logrotate-entry-equeue
cron
cron-entry-logrotate
sshkeys-authority
resilient-
sshkeys-authority
sshd-raw-server
sshd-graceful
sshkeys-sshd
...
...
stack/resilient/pbsready.cfg.in
View file @
0f441e98
...
...
@@ -6,7 +6,7 @@ parts =
logrotate-entry-equeue
cron
cron-entry-logrotate
sshkeys-authority
resilient-
sshkeys-authority
sshd-graceful
sshkeys-sshd
sshd-promise
...
...
@@ -229,18 +229,18 @@ port = $${sshd-port:port}
[sshkeys-directory]
recipe = slapos.cookbook:mkdirectory
requests = $${directory:sshkeys}/requests
keys = $${directory:sshkeys}/keys
requests = $${directory:sshkeys}/re
silient-re
quests
keys = $${directory:sshkeys}/
resilient-
keys
[sshkeys-authority]
[
resilient-
sshkeys-authority]
recipe = slapos.cookbook:sshkeys_authority
request-directory = $${sshkeys-directory:requests}
keys-directory = $${sshkeys-directory:keys}
wrapper = $${basedirectory:services}/sshkeys_authority
wrapper = $${basedirectory:services}/
resilient_
sshkeys_authority
keygen-binary = ${openssh:location}/bin/ssh-keygen
[sshkeys-sshd]
<= sshkeys-authority
<=
resilient-
sshkeys-authority
recipe = slapos.cookbook:sshkeys_authority.request
name = sshd
type = rsa
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment