Message ID | 20250224191215.637818-1-cel@kernel.org (mailing list archive) |
---|---|
Headers | show
Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 9DEDA1EDA26 for <kdevops@lists.linux.dev>; Mon, 24 Feb 2025 19:12:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740424339; cv=none; b=BSzAmmYyUZ7ipZfhIuL015yCKaBg9susku9/3+j2oDXOHElT2OjjABUKvEwOB2eOktPWZl++wXNoBNZ/XjNEognFPIBUCyqzjpEGMHd0XsPSeszlhCqlhSDFVCxUqfsw6ZxXoGqqfulnwUDpFWge3L2BOlEPQgnCX8tVpCLgYJ0= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1740424339; c=relaxed/simple; bh=c/5ijmUfJP6pu2T//bLGiQ4ak6Z0M0y7NPCk0QJ4hDM=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=GxFdeh9V9EWKdAYC2Su97un0vPzq8g/cE//t1sXDfwEtJLpEJsymHsaijb1iT4RDgU8cAECPUBymcsTXSLhO0xqrizvkktGZrsny0BUesqEIE7Jn8aC7owTOEXK5+IKnPiqeyRLPR4QciVCzOTqi1aMneV0XOMXXkodcQwVb0XM= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=sTBe6fWV; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="sTBe6fWV" Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3E4D3C4CEEB; Mon, 24 Feb 2025 19:12:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1740424338; bh=c/5ijmUfJP6pu2T//bLGiQ4ak6Z0M0y7NPCk0QJ4hDM=; h=From:To:Cc:Subject:Date:From; b=sTBe6fWVBHCnLdGGPhLHAjnF1OaXRvRmtx2Nv8adTDed/+586gV30kLRif91R93kU qLNQIQAJbSfWYVzSexujUJn1O7+PzFw6DPuXkBZqQxCt+5qAg5MB++FRluxy3/E2lN 78vp9IU2kjFo5LK1mF6yU5akmAEjOu8Gnc/hFJ6XigYCzEH7vbbMrVyVqMBcM+S5oj /lOQW+Cr+TBBVoxdEd361SCg5Sm9mrI7Za8RtY122tkPv8dVS1GQO9fZyGrp7z64uo v6Qfgi8vDund0BkSE7kND+H1KMbt9Gl27iNSBcM1p9aX5zTOVI8r8cZncZTBMP4cs7 M7wxGFVBnsscg== From: cel@kernel.org To: <kdevops@lists.linux.dev> Cc: Chuck Lever <chuck.lever@oracle.com> Subject: [PATCH v3 0/6] Replace terraform update_ssh_config module Date: Mon, 24 Feb 2025 14:12:09 -0500 Message-ID: <20250224191215.637818-1-cel@kernel.org> X-Mailer: git-send-email 2.48.1 Precedence: bulk X-Mailing-List: kdevops@lists.linux.dev List-Id: <kdevops.lists.linux.dev> List-Subscribe: <mailto:kdevops+subscribe@lists.linux.dev> List-Unsubscribe: <mailto:kdevops+unsubscribe@lists.linux.dev> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit |
Series |
Replace terraform update_ssh_config module
|
expand
|
From: Chuck Lever <chuck.lever@oracle.com> Luis suggested merging the way guestfs and terraform handle ssh host config. This series is a step in that direction. guestfs provisioning is currently implemented nearly entirely by shell scripts. That makes it somewhat high risk to re-write both terraform and guestfs to use shared infrastructure at the same time. So instead of building infrastructure that guestfs and terraform can share, I'm leaving guestfs out of the equation for the moment. All this series does is make terraform ssh configuration behave more like guestfs. Subsequent work can replace the current set of guestfs scripts with Ansible playbooks, and then more common ssh infrastructure can be introduced that both provisioning methods can utilize. Change since v2: - Move terraform bringup/destroy into an Ansible playbook - Move terraform's ssh configuration into that playbook - Tested with AWS, Azure, and OCI Changes since RFC: - Split the RFC series into smaller patches for easier review - The "Include" directive now follows CONFIG_KDEVOPS_SSH_CONFIG - Various bug fixes and optimizations Chuck Lever (6): terraform: Replace scripts/*_terraform.sh with an Ansible playbook ssh.Makefile: Define a kdevops_ssh_config variable terraform: Clean up ssh configuration during "make destroy" terraform: Add ssh hosts to ~/.ssh/config_kdevops_{{ sha1sum }} terraform: "make mrproper" should remove terraform/*/.terraform terraform: Remove the terrraform update_ssh_config module Makefile | 1 + kconfigs/Kconfig.ssh | 19 +++- playbooks/roles/terraform/defaults/main.yml | 3 + playbooks/roles/terraform/tasks/main.yml | 86 +++++++++++++++++++ .../roles/terraform/templates/ssh_config.j2 | 15 ++++ playbooks/terraform.yml | 5 ++ scripts/bringup_terraform.sh | 12 --- scripts/destroy_terraform.sh | 10 --- scripts/ssh.Makefile | 10 ++- scripts/terraform.Makefile | 35 ++++++-- terraform/aws/output.tf | 30 ++----- terraform/aws/update_ssh_config.tf | 1 - terraform/aws/update_ssh_config_use.tf | 12 --- terraform/azure/output.tf | 22 ++--- terraform/azure/update_ssh_config.tf | 1 - terraform/azure/update_ssh_config_use.tf | 4 - terraform/gce/output.tf | 31 ++----- terraform/gce/update_ssh_config.tf | 1 - terraform/gce/update_ssh_config_use.tf | 4 - terraform/oci/output.tf | 9 ++ terraform/oci/update_ssh_config.tf | 1 - terraform/oci/update_ssh_config_use.tf | 8 -- terraform/openstack/output.tf | 9 ++ terraform/openstack/update_ssh_config.tf | 1 - terraform/openstack/update_ssh_config_use.tf | 4 - terraform/update_ssh_config.tf | 17 ---- 26 files changed, 198 insertions(+), 153 deletions(-) create mode 100644 playbooks/roles/terraform/defaults/main.yml create mode 100644 playbooks/roles/terraform/tasks/main.yml create mode 100644 playbooks/roles/terraform/templates/ssh_config.j2 create mode 100644 playbooks/terraform.yml delete mode 100755 scripts/bringup_terraform.sh delete mode 100755 scripts/destroy_terraform.sh delete mode 120000 terraform/aws/update_ssh_config.tf delete mode 100644 terraform/aws/update_ssh_config_use.tf delete mode 120000 terraform/azure/update_ssh_config.tf delete mode 100644 terraform/azure/update_ssh_config_use.tf delete mode 120000 terraform/gce/update_ssh_config.tf delete mode 100644 terraform/gce/update_ssh_config_use.tf create mode 100644 terraform/oci/output.tf delete mode 120000 terraform/oci/update_ssh_config.tf delete mode 100644 terraform/oci/update_ssh_config_use.tf delete mode 120000 terraform/openstack/update_ssh_config.tf delete mode 100644 terraform/openstack/update_ssh_config_use.tf delete mode 100644 terraform/update_ssh_config.tf