feat: bump cert-manager

This commit is contained in:
Yadunand Prem 2025-04-07 13:42:47 -04:00
parent 55a0d7ce2d
commit 7f9e7dd230
No known key found for this signature in database
12 changed files with 67 additions and 67 deletions

View File

@ -64,5 +64,5 @@ sudo su - root
KUBELET_PATH=$(mount | grep kubelet | cut -d' ' -f3);
${KUBELET_PATH:+umount $KUBELET_PATH}
rm -rf /etc/rancher/{k3s,node};
rm -rf /var/lib/{rancher/k3s,kubelet,longhorn,etcd,cni}
sudo rm -rf /etc/rancher/{k3s,node};
sudo rm -rf /var/lib/{rancher/k3s,kubelet,longhorn,etcd,cni}

View File

@ -10,11 +10,11 @@
"systems": "systems"
},
"locked": {
"lastModified": 1723293904,
"narHash": "sha256-b+uqzj+Wa6xgMS9aNbX4I+sXeb5biPDi39VgvSFqFvU=",
"lastModified": 1736955230,
"narHash": "sha256-uenf8fv2eG5bKM8C/UvFaiJMZ4IpUFaQxk9OH5t/1gA=",
"owner": "ryantm",
"repo": "agenix",
"rev": "f6291c5935fdc4e0bef208cfc0dcab7e3f7a1c41",
"rev": "e600439ec4c273cf11e06fe4d9d906fb98fa097c",
"type": "github"
},
"original": {
@ -52,11 +52,11 @@
]
},
"locked": {
"lastModified": 1731895210,
"narHash": "sha256-z76Q/OXLxO/RxMII3fIt/TG665DANiE2lVvnolK2lXk=",
"lastModified": 1740485968,
"narHash": "sha256-WK+PZHbfDjLyveXAxpnrfagiFgZWaTJglewBWniTn2Y=",
"owner": "nix-community",
"repo": "disko",
"rev": "639d1520df9417ca2761536c3072688569e83c80",
"rev": "19c1140419c4f1cdf88ad4c1cfb6605597628940",
"type": "github"
},
"original": {
@ -106,11 +106,11 @@
},
"nixlib": {
"locked": {
"lastModified": 1731805462,
"narHash": "sha256-yhEMW4MBi+IAyEJyiKbnFvY1uARyMKJpLUhkczI49wk=",
"lastModified": 1736643958,
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "b9f04e3cf71c23bea21d2768051e6b3068d44734",
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
"type": "github"
},
"original": {
@ -127,11 +127,11 @@
]
},
"locked": {
"lastModified": 1731892054,
"narHash": "sha256-BJtD9NGUWaBe4OZ1JO77w8qBP9yHDJJUjsxkG/milFc=",
"lastModified": 1740947705,
"narHash": "sha256-Co2kAD2SZalOm+5zoxmzEVZNvZ17TyafuFsD46BwSdY=",
"owner": "nix-community",
"repo": "nixos-generators",
"rev": "15a87ccb45e06d24a9fd5f99a49782efe11b23f0",
"rev": "507911df8c35939050ae324caccc7cf4ffb76565",
"type": "github"
},
"original": {
@ -142,11 +142,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1731890469,
"narHash": "sha256-D1FNZ70NmQEwNxpSSdTXCSklBH1z2isPR84J6DQrJGs=",
"lastModified": 1740916017,
"narHash": "sha256-Ze/3XCElkVljFCnBKezLldOz2ZaGp7eozxRqFzACnMI=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "5083ec887760adfe12af64830a66807423a859a7",
"rev": "b58e19b11fe72175fd7a9e014a4786a91e99da5f",
"type": "github"
},
"original": {

View File

@ -60,6 +60,7 @@
pkgs.helmfile
pkgs.fluxcd
pkgs.kustomize
pkgs.kubectl
];
};
};

View File

@ -21,7 +21,7 @@ spec:
sourceRef:
kind: HelmRepository
name: jetstack
version: v1.16.1
version: v1.17.1
interval: 1m0s
values:
crds:

View File

@ -7,4 +7,5 @@
security.sudo.wheelNeedsPassword = false;
users.users.root.openssh.authorizedKeys.keys = ["ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJXOpmWsAnl2RtOuJJMRUx+iJTwf2RWJ1iS3FqXJFzFG"];
users.users.root.hashedPassword = "$6$xa/mFg4OxIbb8XiQ$S2RVyCKcLaKHymFs48u8vj1dv.mQdxt.BQoucJsr8wfcHayXwKfD0C2NIOYY5AEPR9zgnMvFp8d8STKe6wMGR/";
}

View File

@ -10,11 +10,11 @@
"systems": "systems"
},
"locked": {
"lastModified": 1723293904,
"narHash": "sha256-b+uqzj+Wa6xgMS9aNbX4I+sXeb5biPDi39VgvSFqFvU=",
"lastModified": 1736955230,
"narHash": "sha256-uenf8fv2eG5bKM8C/UvFaiJMZ4IpUFaQxk9OH5t/1gA=",
"owner": "ryantm",
"repo": "agenix",
"rev": "f6291c5935fdc4e0bef208cfc0dcab7e3f7a1c41",
"rev": "e600439ec4c273cf11e06fe4d9d906fb98fa097c",
"type": "github"
},
"original": {
@ -52,11 +52,11 @@
]
},
"locked": {
"lastModified": 1731895210,
"narHash": "sha256-z76Q/OXLxO/RxMII3fIt/TG665DANiE2lVvnolK2lXk=",
"lastModified": 1740485968,
"narHash": "sha256-WK+PZHbfDjLyveXAxpnrfagiFgZWaTJglewBWniTn2Y=",
"owner": "nix-community",
"repo": "disko",
"rev": "639d1520df9417ca2761536c3072688569e83c80",
"rev": "19c1140419c4f1cdf88ad4c1cfb6605597628940",
"type": "github"
},
"original": {
@ -106,11 +106,11 @@
},
"nixlib": {
"locked": {
"lastModified": 1731805462,
"narHash": "sha256-yhEMW4MBi+IAyEJyiKbnFvY1uARyMKJpLUhkczI49wk=",
"lastModified": 1736643958,
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "b9f04e3cf71c23bea21d2768051e6b3068d44734",
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
"type": "github"
},
"original": {
@ -127,11 +127,11 @@
]
},
"locked": {
"lastModified": 1731892054,
"narHash": "sha256-BJtD9NGUWaBe4OZ1JO77w8qBP9yHDJJUjsxkG/milFc=",
"lastModified": 1740947705,
"narHash": "sha256-Co2kAD2SZalOm+5zoxmzEVZNvZ17TyafuFsD46BwSdY=",
"owner": "nix-community",
"repo": "nixos-generators",
"rev": "15a87ccb45e06d24a9fd5f99a49782efe11b23f0",
"rev": "507911df8c35939050ae324caccc7cf4ffb76565",
"type": "github"
},
"original": {
@ -142,11 +142,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1731890469,
"narHash": "sha256-D1FNZ70NmQEwNxpSSdTXCSklBH1z2isPR84J6DQrJGs=",
"lastModified": 1740916017,
"narHash": "sha256-Ze/3XCElkVljFCnBKezLldOz2ZaGp7eozxRqFzACnMI=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "5083ec887760adfe12af64830a66807423a859a7",
"rev": "b58e19b11fe72175fd7a9e014a4786a91e99da5f",
"type": "github"
},
"original": {

View File

@ -96,7 +96,7 @@
}
// builtins.mapAttrs (name: value: {
imports = value._module.args.modules;
deployment.targetHost = value._module.specialArgs.meta.private-ip;
deployment.targetHost = value._module.specialArgs.meta.zt-ip;
})
configs;
};

View File

@ -1,7 +1,8 @@
age-encryption.org/v1
-> ssh-ed25519 Gc/MTQ X8oK9dam/Rmh0evmGQeL+TWKKzu/Mr7OZxBGTRe9VQ8
s0oWGBhAPRfUnmrUfwoetn7COhmkgp1/Lxm73jh+yL8
-> ssh-ed25519 0ckKSg U9SUN/5v5g1Nso1QhLcJ1S28VD4TyWkJk3VkKeQdZXU
JvdhaZZ/NkxBLnRq4loFJ1e7EQuRzPq4kMcVYZU34N8
--- 7xSOSj3G41l/mOD7KgRyina+xKcz4k0sFDv9pKnDQz4
[¦è­š…<E280A6>¬WXnI:N¯D—Ûc>¾½»3=·ÌˆMfBØ"qþy& t†®<E280A0>úF6ÜII¦HF#ú"¶€üö4Þ˜µ ¯ªû¬
-> ssh-ed25519 Gc/MTQ aNiLiW2aDY4vgVOd5sG8kDGbvVS5jCJcRaPSMy8eqjQ
686oWDutxJe0gOUt5DpNfYAn1ViYNQGKC4VEBE4RwBw
-> ssh-ed25519 0ckKSg 04ku4CIbUhvvNrtxL2Qfup4M8gU9REdQZsNkLKxvUzA
5/jqYdcV5Q24KxS7exqY+mS+7+qYQKGAIeDYzHxiooY
--- QGCHRGX5LyNqU+qEAtt5s6HifSA7BfnyJqgpmmoxcDI
·j†÷ EòHêß´6k‰·m»É’´–ê;_`qÚÞ( ˜
òKHójnHñÓÏ?£®{Û|3ŸHe lNn!V

View File

@ -1,13 +1,13 @@
age-encryption.org/v1
-> ssh-ed25519 FNKzRw Wdx9RjJT0SRZAkkKtD9BEtkw1RfpUWayYvMM/0SGZFc
NYuZ8h2+PW9hKjBGFCUm2KAs02L8J8aKxafELhukDC8
-> ssh-ed25519 aAy57Q BtZu0qaTFcsgTY5RbKz67CxFn0W4kvNDhsFaTZeSYjo
kkIRdNnYD3A8q2MlzXVltCIgpGrbaEG9MZgNAWfq6mQ
-> ssh-ed25519 4UfWxw aC2IMN/bNHuIDoNIWNUt5lKePzE8KSN/NcMq/ijQGkI
Di+IWnXE36JbkQq+KQkzfvVuKp5CDr+sseeORPk6YVU
-> ssh-ed25519 Gc/MTQ Ib/kYZlmQ5KX0WMZzWGrpD2mZ6BGjuDVqx42dsnUM0E
OicysETfzBfs2FgdiLzdfmcnbdtUyQqX4/92zMIgDdk
-> ssh-ed25519 0ckKSg kCZAT8pAkBnhbfpihpUvxf4aRPexUMc6UfcZ/iPAqF8
mLCHXEBJH8GHUGQDfG33V61eca1HcBiCQrI+4X8NRD4
--- 06qWs8QTEXzGLvbg01pI1ZfyuBYXzXMN5GV6R6CDxsQ
FaäÖÛžü•œƒ Mº A¡w ¹ßü<03>ö»€KF3cò3Ü7†pƒ:pÆL²á
-> ssh-ed25519 FNKzRw 4iOwgju4RVAIuWKKPhnfQyK8XlpG1cG3Zo/w3Eon8wc
l6EKkNqRKmGzFPXhl/OoBsqyxIqO/d4h0xjLsbtHSwg
-> ssh-ed25519 aAy57Q jPg8qCY23+yHPWCjiL5MI6XCXZHuE9h31xiEJ3I+i0U
YitXRYdUNXJCLktHNx9GUQztUzTBFbPkf7/9t/CZ81o
-> ssh-ed25519 J4Rmzw ZbRJqzvmeDHG5QT1UOYOI/bvtrnsuK6g3Q3Tn0xVqkQ
pwfrcBAV3yilCXd+lfGj9BIQH7rZjjvZGYneBWLLMH0
-> ssh-ed25519 Gc/MTQ E3LfIyHUmwCwjPO+hTpj8K4qOM5/lN+NZHbAHfdwVCY
aEXZ1MgJhGdqMQxi5mZyQolvtCnjsylzpXLxcEaYr9s
-> ssh-ed25519 0ckKSg DIGhhzTBrkdIk9yL3mHGNjb4JlYE0mlOHwbSi68NLEE
OOxhQmjmj/2gEtMIwUubn9o1N2qtRMd8NNxzISf7ADc
--- qIqGF6uIvguFXWT7oasoFxbx0gFf5bFSbhG1pj3URns
mnø·ùÚë5bQ¹pm”…L³¥Éµ¤/®AuÞ=Ðß¼<C39F>ƒrw{½ýO

View File

@ -1,7 +1,8 @@
{
yadunut = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJXOpmWsAnl2RtOuJJMRUx+iJTwf2RWJ1iS3FqXJFzFG";
yadunut-mbp = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOlXV+TevruoYChk2XbqG5+yqEklRJvOx7YdTGFfXY/f yadunut@yadunut-mbp";
premhome-gc1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzyg8uBDht3d8kpIj4UbCf38nU5dma8IZrAGNwdViDp yadunut@premhome-gc1";
# premhome-gc1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHzyg8uBDht3d8kpIj4UbCf38nU5dma8IZrAGNwdViDp yadunut@premhome-gc1";
premhome-falcon-1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE8zmfmBsNlPOmSv/nUSPgsoMjrTjbgqMtAsiliaLheT yadunut@premhome-falcon-1";
premhome-eagle-1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAjNaWl6CK4YD3Y+RvC7k1uYlP+KnKa9SunTCY0Ggi0b yadunut@premhome-eagle-1";
premhome-gc1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIyKzFP+G+0jHKicqrhVjsihV4ap2p5s7U+mFZZPbbPV root@premhome-gc1";
}

Binary file not shown.

View File

@ -1,21 +1,17 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{
config,
lib,
pkgs,
modulesPath,
...
}: {
imports = [
(modulesPath + "/profiles/qemu-guest.nix")
];
{ config, lib, pkgs, modulesPath, ... }:
boot.initrd.availableKernelModules = ["ata_piix" "uhci_hcd" "virtio_pci" "sr_mod" "virtio_blk"];
boot.initrd.kernelModules = [];
boot.kernelModules = ["kvm-amd"];
boot.extraModulePackages = [];
{
imports =
[ (modulesPath + "/profiles/qemu-guest.nix")
];
boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "virtio_pci" "virtio_scsi" "ahci" "sd_mod" "sr_mod" "virtio_blk" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-amd" ];
boot.extraModulePackages = [ ];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's