-
Notifications
You must be signed in to change notification settings - Fork 7
Azure implementation #465
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Azure implementation #465
Conversation
* AWS initil implementation * more work on getting aws working from scratch * refactor awsSpecification commands * More work on gettting AWS working * cluster create and machine create commands fixes * checks if clustering is enabled for the authenticated user * remove debug logs * Small nits from Coder Rabbit * cleanup
|
Important Review skippedAuto reviews are disabled on base/target branches other than the default branch. Please check the settings in the CodeRabbit UI or the You can disable this status message by setting the ✨ Finishing touches🧪 Generate unit tests (beta)
Comment |
| `echo '{ENCRYPTION_PRIVATE_KEY}' | base64 -d | openssl ec -inform DER -outform PEM > /tmp/agentuity-key.pem`, | ||
| `aws --region {AWS_REGION} secretsmanager create-secret --name '{AWS_SECRET_NAME}' --description 'Agentuity Cluster Private Key' --secret-string file:///tmp/agentuity-key.pem`, | ||
| `rm -f /tmp/agentuity-key.pem`, | ||
| `aws --region {AWS_REGION} secretsmanager create-secret --name '{AWS_SECRET_NAME}' --description 'Agentuity Cluster Private Key' --secret-string {ENCRYPTION_PRIVATE_KEY}`, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
its the org private key not cluster
|
|
||
| // Always use the cluster region first, fall back to detected/default only if not specified | ||
| region = cluster.Region | ||
| fmt.Println("Region: ", region) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
remove
|
|
||
| func azure_checkSSHKey() string { | ||
| cmd := []string{ | ||
| `if [ ! -f ~/.ssh/id_rsa.pub ]; then echo "SSH key not found, generating new key pair..."; ssh-keygen -t rsa -b 4096 -f ~/.ssh/id_rsa -N "" -q; echo "SSH key generated at ~/.ssh/id_rsa"; else echo "SSH key found at ~/.ssh/id_rsa.pub"; fi`, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
need to support newer edrsa keys probably too
No description provided.