Message ID | 20250131201932.449083-1-cel@kernel.org (mailing list archive) |
---|---|
Headers | show
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 20E8B482EB for <kdevops@lists.linux.dev>; Fri, 31 Jan 2025 20:19:36 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738354777; cv=none; b=UPk5O3ay3jot3PTwWODiDl0FRP4q6sAPOFzjNq38Lo1sqr+/6GacDcT0IEHkPFMYzEy9eq/saUT0ukt5EttQvXQ1aZyEYwW+eftmPJVV5VHwkrudRsaqXK1GznKlkcstD9glzztIM9io5/Xynk/WDA80gxERatldM4hzVwS6VIM= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1738354777; c=relaxed/simple; bh=8y5p6Y9JGZcYuMuAwAC8zzwz9BJYvuNCK6YwJb9TePE=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=pMrImYgY2DrpDUos+WX+syK7G+GK/OSzoihayPwLaDyUaVHshDVJfCcsHPWJteAWKg7Ijju1cZtQfcXSc46AK7KF04srn2upzkZwLdcQbBbaDsKaeskG3jSHWxFOFwNsAfmYIKCYHkSs7F7Ht6wEk0iTP9otJuSlQkr5MlZYrUU= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=YNM01LIJ; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="YNM01LIJ" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3F660C4CED1; Fri, 31 Jan 2025 20:19:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1738354776; bh=8y5p6Y9JGZcYuMuAwAC8zzwz9BJYvuNCK6YwJb9TePE=; h=From:To:Cc:Subject:Date:From; b=YNM01LIJzmBeXBJfObmBEedofNWvahFkuhFE/EwUYQV/Y/jccK583Bd3V1BX8+fVo cQzQ4NGyW3kOjQfRT/k68hLeeiiz224ETEnHO2Jn1LYrytb5dMapcBVzxm7YOeoHcO kdpL2boJMwUuY+8J7GFWsUy9WrDGVnsgId3k9F2szQf34E8+W0NXWjHWQS9xH0kxx1 5xfF583mnur2n/HLcSY4fVGM3QlMmRYa6sKP5y/FwQwdKC/TJXphi5yHJj2O0oIHZ2 1WhSl450qySFjjX5fi+XMEMN9LdtgbOw+GV54xd+eLyPqLW+8kmwzFEpNiL5DsYA9w DYJ7m/fzb0Ngw== From: cel@kernel.org To: <kdevops@lists.linux.dev> Cc: Chuck Lever <chuck.lever@oracle.com> Subject: [RFC PATCH 0/4] Replace terraform update_ssh_config module Date: Fri, 31 Jan 2025 15:19:28 -0500 Message-ID: <20250131201932.449083-1-cel@kernel.org> X-Mailer: git-send-email 2.48.1 Precedence: bulk X-Mailing-List: kdevops@lists.linux.dev List-Id: <kdevops.lists.linux.dev> List-Subscribe: <mailto:kdevops+subscribe@lists.linux.dev> List-Unsubscribe: <mailto:kdevops+unsubscribe@lists.linux.dev> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit |
Series |
Replace terraform update_ssh_config module
|
expand
|
From: Chuck Lever <chuck.lever@oracle.com> *** Request For Comment *** Luis suggested merging the way guestfs and terraform handle ssh host config. Luis, please let me know if I've grossly misunderstood your suggestion. Vagrant is deprecated, so it will not be modified by these changes. The two remaining virtualization mechanisms have the same underlying purpose: - Set up ssh to enable Ansible to have passwordless access to the target nodes - Make human ssh to the target nodes as painless as possible But they have grown apart in implementation over the years. This series is an attempt to build shared infrastructure that can be triggered by the common "bringup" and "destroy" make targets. Eventually IMO the SSH Kconfig options for terraform need to be merged with the options from kconfigs/Kconfig.ssh. This series does not attempt to do that yet. Daniel had some thoughts about how combined infrastructure might work which I haven't integrated here as the discussion doesn't seem finished yet. I have tested this series with guestfs and AWS. I have provisioned an Azure account, and a colleague of mine has an active OCI account. These should help with finalizing and testing the needed non-AWS terraform changes, which are not yet part of this series. Chuck Lever (4): guestfs: Rename the update_ssh_config_guestfs role update_ssh_config: Add always-run ssh clean-up steps terraform: Add ssh hosts to ~/.ssh/config_kdevops_{{ sha1sum }} terraform: Remove the terrraform update_ssh_config module Makefile | 1 + playbooks/add_ssh_hosts_terraform.yml | 5 + .../add_ssh_hosts_terraform/defaults/main.yml | 2 + .../add_ssh_hosts_terraform/tasks/main.yml | 57 +++++++ .../templates/ssh_config.j2 | 15 ++ .../roles/update_ssh_config/tasks/main.yml | 150 ++++++++++++++++++ .../update_ssh_config_guestfs/tasks/main.yml | 71 --------- playbooks/update_ssh_config.yml | 5 + playbooks/update_ssh_config_guestfs.yml | 4 - scripts/bringup.Makefile | 7 + scripts/destroy_guestfs.sh | 6 - scripts/guestfs.Makefile | 6 - scripts/ssh.Makefile | 13 ++ scripts/terraform.Makefile | 6 +- terraform/aws/output.tf | 30 +--- terraform/aws/update_ssh_config.tf | 1 - terraform/azure/update_ssh_config.tf | 1 - terraform/gce/update_ssh_config.tf | 1 - terraform/oci/update_ssh_config.tf | 1 - terraform/openstack/update_ssh_config.tf | 1 - terraform/update_ssh_config.tf | 17 -- 21 files changed, 266 insertions(+), 134 deletions(-) create mode 100644 playbooks/add_ssh_hosts_terraform.yml create mode 100644 playbooks/roles/add_ssh_hosts_terraform/defaults/main.yml create mode 100644 playbooks/roles/add_ssh_hosts_terraform/tasks/main.yml create mode 100644 playbooks/roles/add_ssh_hosts_terraform/templates/ssh_config.j2 create mode 100644 playbooks/roles/update_ssh_config/tasks/main.yml delete mode 100644 playbooks/roles/update_ssh_config_guestfs/tasks/main.yml create mode 100644 playbooks/update_ssh_config.yml delete mode 100644 playbooks/update_ssh_config_guestfs.yml delete mode 120000 terraform/aws/update_ssh_config.tf delete mode 120000 terraform/azure/update_ssh_config.tf delete mode 120000 terraform/gce/update_ssh_config.tf delete mode 120000 terraform/oci/update_ssh_config.tf delete mode 120000 terraform/openstack/update_ssh_config.tf delete mode 100644 terraform/update_ssh_config.tf