Compare commits
2 Commits
a4c8178bf2
...
df2fa3319b
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
df2fa3319b | ||
|
|
142f2a28e7 |
@@ -10,9 +10,7 @@ jobs:
|
|||||||
GITEA_BASE_URL: https://code.bim-it.pl
|
GITEA_BASE_URL: https://code.bim-it.pl
|
||||||
OWNER: mz
|
OWNER: mz
|
||||||
REPO: DiunaBI
|
REPO: DiunaBI
|
||||||
# Comma-separated artifact names that must exist
|
|
||||||
REQUIRED_ARTIFACTS: frontend,webapi
|
REQUIRED_ARTIFACTS: frontend,webapi
|
||||||
# How many recent successful runs to scan
|
|
||||||
SCAN_LIMIT: "100"
|
SCAN_LIMIT: "100"
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
@@ -64,7 +62,6 @@ jobs:
|
|||||||
ls -laR artifacts/webapi || true
|
ls -laR artifacts/webapi || true
|
||||||
echo "::endgroup::"
|
echo "::endgroup::"
|
||||||
|
|
||||||
# 3) Package artifacts as ZIPs for transfer
|
|
||||||
- name: Package artifacts as ZIPs
|
- name: Package artifacts as ZIPs
|
||||||
run: |
|
run: |
|
||||||
mkdir -p build
|
mkdir -p build
|
||||||
@@ -73,7 +70,7 @@ jobs:
|
|||||||
ls -la build
|
ls -la build
|
||||||
- name: Debug SSH key
|
- name: Debug SSH key
|
||||||
env:
|
env:
|
||||||
SSH_PRIVATE_KEY: ${{ secrets.BIMIT_SSH_KEY }}
|
SSH_PRIVATE_KEY: ${{ secrets.GITEARUNNER_SSH_KEY }}
|
||||||
run: |
|
run: |
|
||||||
echo "== Początek klucza =="
|
echo "== Początek klucza =="
|
||||||
echo "$SSH_PRIVATE_KEY" | head -n 5
|
echo "$SSH_PRIVATE_KEY" | head -n 5
|
||||||
@@ -84,31 +81,25 @@ jobs:
|
|||||||
echo "== ssh-keygen sprawdzenie formatu =="
|
echo "== ssh-keygen sprawdzenie formatu =="
|
||||||
printf "%s" "$SSH_PRIVATE_KEY" > private_key
|
printf "%s" "$SSH_PRIVATE_KEY" > private_key
|
||||||
ssh-keygen -lf private_key || true
|
ssh-keygen -lf private_key || true
|
||||||
# 4) Upload ZIPs to remote server via SSH (using secret key)
|
|
||||||
- name: Upload artifacts to remote server
|
- name: Upload artifacts to remote server
|
||||||
env:
|
env:
|
||||||
SSH_PRIVATE_KEY: ${{ secrets.BIMIT_SSH_KEY }}
|
SSH_PRIVATE_KEY: ${{ secrets.GITEARUNNER_SSH_KEY }}
|
||||||
SSH_USER: mz
|
SSH_USER: mz
|
||||||
SSH_HOST: bim-it.pl
|
SSH_HOST: bim-it.pl
|
||||||
REMOTE_DIR: deployment
|
REMOTE_DIR: deployment
|
||||||
run: |
|
run: |
|
||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
|
|
||||||
# Prepare key
|
|
||||||
umask 077
|
umask 077
|
||||||
echo "$SSH_PRIVATE_KEY" > private_key
|
echo "$SSH_PRIVATE_KEY" > private_key
|
||||||
chmod 600 private_key
|
chmod 600 private_key
|
||||||
|
|
||||||
# Preload known_hosts (safer than StrictHostKeyChecking=no)
|
|
||||||
mkdir -p ~/.ssh
|
mkdir -p ~/.ssh
|
||||||
ssh-keyscan -H "$SSH_HOST" >> ~/.ssh/known_hosts
|
ssh-keyscan -H "$SSH_HOST" >> ~/.ssh/known_hosts
|
||||||
|
|
||||||
# Ensure remote dir exists
|
|
||||||
ssh -i private_key "$SSH_USER@$SSH_HOST" "mkdir -p ~/$REMOTE_DIR"
|
ssh -i private_key "$SSH_USER@$SSH_HOST" "mkdir -p ~/$REMOTE_DIR"
|
||||||
|
|
||||||
# Upload files
|
|
||||||
scp -i private_key build/DiunaBI-Morska-Frontend.zip "$SSH_USER@$SSH_HOST:~/$REMOTE_DIR/"
|
scp -i private_key build/DiunaBI-Morska-Frontend.zip "$SSH_USER@$SSH_HOST:~/$REMOTE_DIR/"
|
||||||
scp -i private_key build/DiunaBI-Morska-WebApi.zip "$SSH_USER@$SSH_HOST:~/$REMOTE_DIR/"
|
scp -i private_key build/DiunaBI-Morska-WebApi.zip "$SSH_USER@$SSH_HOST:~/$REMOTE_DIR/"
|
||||||
|
|
||||||
# Cleanup
|
|
||||||
shred -u private_key
|
shred -u private_key
|
||||||
Reference in New Issue
Block a user