add .gitignore, fix headscale CLI to use numeric user IDs
- Add .gitignore for nix build result symlinks - Fix all headscale CLI commands: --user now requires numeric ID, not username (changed in newer headscale versions) - Add 'headscale users list' step to docs where preauth keys are created
This commit is contained in:
parent
4c560abffd
commit
dbf98e2f22
6 changed files with 36 additions and 19 deletions
|
|
@ -204,8 +204,8 @@ Diese Secrets koennen erst nach Schritt 4 erstellt werden. **Jetzt noch nicht ei
|
|||
|
||||
| Secret | Befehl | Voraussetzung |
|
||||
|--------|--------|---------------|
|
||||
| `tailscale/auth-key` | `sudo headscale preauthkeys create --expiration 99y --reusable --user default` | Headscale laeuft |
|
||||
| `headplane/agent_pre_authkey` | `sudo headscale users create headplane-agent && sudo headscale preauthkeys create --expiration 99y --user headplane-agent` | Headscale laeuft |
|
||||
| `tailscale/auth-key` | Siehe Schritt 4.1-4.2 | Headscale laeuft |
|
||||
| `headplane/agent_pre_authkey` | Siehe Schritt 4.1-4.2 | Headscale laeuft |
|
||||
| `forgejo-runner/token` | Forgejo Admin Panel > Actions > Runners > Create Runner | Forgejo laeuft |
|
||||
|
||||
#### Beispiel secrets.yaml (Klartext vor Verschluesselung)
|
||||
|
|
@ -276,20 +276,28 @@ Nachdem der Server mit Headscale und Forgejo laeuft:
|
|||
sudo headscale users create headplane-agent
|
||||
```
|
||||
|
||||
2. **Preauth-Keys generieren**:
|
||||
2. **User-IDs ermitteln** (wird fuer die Preauth-Keys benoetigt):
|
||||
|
||||
```bash
|
||||
# Fuer Tailscale
|
||||
sudo headscale preauthkeys create --expiration 99y --reusable --user default
|
||||
|
||||
# Fuer Headplane Agent
|
||||
sudo headscale preauthkeys create --expiration 99y --user headplane-agent
|
||||
sudo headscale users list
|
||||
```
|
||||
|
||||
3. **Forgejo-Runner-Token** ueber das Forgejo Admin Panel erstellen:
|
||||
Die Ausgabe zeigt die numerischen IDs (z.B. `1` fuer default, `2` fuer headplane-agent).
|
||||
|
||||
3. **Preauth-Keys generieren** (mit den IDs aus Schritt 2):
|
||||
|
||||
```bash
|
||||
# Fuer Tailscale (User-ID von "default" einsetzen)
|
||||
sudo headscale preauthkeys create --expiration 99y --reusable --user <ID>
|
||||
|
||||
# Fuer Headplane Agent (User-ID von "headplane-agent" einsetzen)
|
||||
sudo headscale preauthkeys create --expiration 99y --user <ID>
|
||||
```
|
||||
|
||||
4. **Forgejo-Runner-Token** ueber das Forgejo Admin Panel erstellen:
|
||||
Administration > Actions > Runners > Create new Runner
|
||||
|
||||
4. **Secrets ergaenzen**:
|
||||
5. **Secrets ergaenzen**:
|
||||
|
||||
```bash
|
||||
sops hosts/<hostname>/secrets.yaml
|
||||
|
|
@ -306,7 +314,7 @@ Nachdem der Server mit Headscale und Forgejo laeuft:
|
|||
agent_pre_authkey: "..."
|
||||
```
|
||||
|
||||
5. **Stufe-2-Services aktivieren** in `hosts/<hostname>/services/default.nix`:
|
||||
6. **Stufe-2-Services aktivieren** in `hosts/<hostname>/services/default.nix`:
|
||||
|
||||
```nix
|
||||
{
|
||||
|
|
|
|||
|
|
@ -36,7 +36,10 @@ Diese Anleitung beschreibt das Hinzufügen eines **neuen Raspberry Pi Clients**
|
|||
**Auf cryodev-main** (per SSH):
|
||||
|
||||
```bash
|
||||
sudo headscale preauthkeys create --expiration 99y --reusable --user default
|
||||
# User-ID ermitteln
|
||||
sudo headscale users list
|
||||
# Preauth-Key erstellen (User-ID von "default" einsetzen)
|
||||
sudo headscale preauthkeys create --expiration 99y --reusable --user <ID>
|
||||
```
|
||||
|
||||
**Ausgabe notieren!** (z.B. `tskey-preauth-abc123...`)
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue