mbox series

[RFC,00/31] Simplify OCI configuration menu

Message ID 20250401010000.764234-1-cel@kernel.org (mailing list archive)
Headers show
Series Simplify OCI configuration menu | expand

Message

Chuck Lever April 1, 2025, 12:59 a.m. UTC
From: Chuck Lever <chuck.lever@oracle.com>

Over the past month or two I've had to set up kdevops with all
four major public cloud providers in order to test the new
volume_group role on each of them. There are a lot of similarities
amongst the providers, and one of them is that set-up is probably
much more complicated than necessary for all of them.

I've come up with some simplifications that can apply to all of
the providers, but I'd like to start with OCI because it looks to me
like it's the one that has the most users currently. Let's figure
out what OCI configuration needs to look like (ie, what changes its
users will tolerate!) and make the other providers work the same
way.

This series features a number of changes:

- The configuration is split into several submenus, just like
  the cloud console, to help humans navigate the complexity

- A number of internal simplifications will help us keep up
  with changes and new features in the provider. In particular,
  splitting things into smaller files will make it simpler to
  add scripts to poll provider feature changes and adjust the
  kdevops menus accordingly

- Free-form strings and "copy this OCID from the console" are
  replaced with "choose from this menu of known-working options".
  This includes selection of region, availability domain, shape,
  and source image

- I've added an option to provision a VCN instead of assuming
  a pre-existing one, similar to how the other providers work

Some of this stuff will make immediate sense, and some might be
controversial. All comments are welcome.

https://github.com/chucklever/kdevops   branch => terraform-oci

Chuck Lever (31):
  terraform/OCI: Remove terraform_oci_instance_display_name
  terraform/OCI: One default value to rule them
  terraform/OCI: Add an "Identity & Access" submenu
  terraform/OCI: Add a "Resource location" submenu
  terraform/OCI: Add a "Compute" Kconfig submenu
  terraform/OCI: Add a "Storage" Kconfig submenu
  terraform/OCI: Add a "Networking" Kconfig submenu
  terraform/OCI: Use "output yaml" for the tenancy OCID
  terraform/OCI: Use "output yaml" for the user OCID
  terraform/OCI: Use "output yaml" for the signing key
  terraform/OCI: Use "output yaml" for the fingerprint
  terraform/OCI: Add a Region selector
  terraform/OCI: Add an availability domain selector
  terraform/OCI: Select your compartment by name instead of by OCID
  terraform/OCI: Use "output yaml" for the instance shape setting
  terraform/OCI: Add a shape selector for Flex shapes
  terraform/OCI: Use "output yaml" for the OCPUs setting
  terraform/OCI: Use "output yaml" for the memory_in_gbs setting
  terraform/OCI: Add a shape family selector
  terraform/OCI: Add a bare metal shape selector
  terraform/OCI: Use "output yaml" for the source image setting
  terraform/OCI: Simplify image selection
  terraform/OCI: Remove TERRAFORM_OCI_VOLUMES_ENABLE_EXTRA
  terraform/OCI: Use "output yaml" for the assign_public_ip" setting
  terraform/OCI: Use "output yaml" for the subnet_ocid setting
  terraform/OCI: Add a default VCN
  terraform/OCI: Add a Kconfig switch to create a VCN on the fly
  terraform/OCI: Run "terraform fmt" on provider.tf
  terraform/OCI: Run "terraform fmt" on main.tf
  terraform/OCI: Nit: alphabetize vars.tf
  terraform/OCI: Update the OCI section of docs/kdevops-terraform.md

 docs/kdevops-terraform.md                     | 117 +++----
 playbooks/roles/gen_tfvars/defaults/main.yml  |  20 +-
 .../templates/oci/terraform.tfvars.j2         |  20 +-
 scripts/terraform.Makefile                    |  31 --
 terraform/oci/Kconfig                         | 289 +-----------------
 terraform/oci/kconfigs/Kconfig.compute        |  72 +++++
 terraform/oci/kconfigs/Kconfig.identity       |  35 +++
 terraform/oci/kconfigs/Kconfig.location       |  52 ++++
 terraform/oci/kconfigs/Kconfig.network        |  39 +++
 terraform/oci/kconfigs/Kconfig.storage        | 137 +++++++++
 .../oci/kconfigs/images/Kconfig.OracleLinux   | 237 ++++++++++++++
 terraform/oci/kconfigs/images/Kconfig.Ubuntu  | 162 ++++++++++
 terraform/oci/kconfigs/images/Kconfig.custom  |  20 ++
 .../kconfigs/regions/Kconfig.ap-hyderabad-1   |  28 ++
 .../oci/kconfigs/regions/Kconfig.ap-mumbai-1  |  27 ++
 .../kconfigs/regions/Kconfig.ca-montreal-1    |  28 ++
 .../oci/kconfigs/regions/Kconfig.ca-toronto-1 |  28 ++
 .../oci/kconfigs/regions/Kconfig.us-ashburn-1 |  36 +++
 .../oci/kconfigs/regions/Kconfig.us-chicago-1 |  36 +++
 .../oci/kconfigs/regions/Kconfig.us-phoenix-1 |  36 +++
 .../oci/kconfigs/regions/Kconfig.us-sanjose-1 |  28 ++
 terraform/oci/kconfigs/shapes/Kconfig.bm      |  83 +++++
 terraform/oci/kconfigs/shapes/Kconfig.flex    | 104 +++++++
 terraform/oci/main.tf                         | 195 +++++++++---
 terraform/oci/provider.tf                     |  10 +-
 terraform/oci/vars.tf                         | 158 +++++-----
 26 files changed, 1472 insertions(+), 556 deletions(-)
 create mode 100644 terraform/oci/kconfigs/Kconfig.compute
 create mode 100644 terraform/oci/kconfigs/Kconfig.identity
 create mode 100644 terraform/oci/kconfigs/Kconfig.location
 create mode 100644 terraform/oci/kconfigs/Kconfig.network
 create mode 100644 terraform/oci/kconfigs/Kconfig.storage
 create mode 100644 terraform/oci/kconfigs/images/Kconfig.OracleLinux
 create mode 100644 terraform/oci/kconfigs/images/Kconfig.Ubuntu
 create mode 100644 terraform/oci/kconfigs/images/Kconfig.custom
 create mode 100644 terraform/oci/kconfigs/regions/Kconfig.ap-hyderabad-1
 create mode 100644 terraform/oci/kconfigs/regions/Kconfig.ap-mumbai-1
 create mode 100644 terraform/oci/kconfigs/regions/Kconfig.ca-montreal-1
 create mode 100644 terraform/oci/kconfigs/regions/Kconfig.ca-toronto-1
 create mode 100644 terraform/oci/kconfigs/regions/Kconfig.us-ashburn-1
 create mode 100644 terraform/oci/kconfigs/regions/Kconfig.us-chicago-1
 create mode 100644 terraform/oci/kconfigs/regions/Kconfig.us-phoenix-1
 create mode 100644 terraform/oci/kconfigs/regions/Kconfig.us-sanjose-1
 create mode 100644 terraform/oci/kconfigs/shapes/Kconfig.bm
 create mode 100644 terraform/oci/kconfigs/shapes/Kconfig.flex

Comments

Luis Chamberlain April 2, 2025, 7:21 p.m. UTC | #1
On Mon, Mar 31, 2025 at 08:59:29PM -0400, cel@kernel.org wrote:
> From: Chuck Lever <chuck.lever@oracle.com>
> I've come up with some simplifications that can apply to all of
> the providers, but I'd like to start with OCI because 

Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>

>  26 files changed, 1472 insertions(+), 556 deletions(-)

That's huge, for all this! I know AWS supports a simple .aws/credentials
and I think OCI might too support something similar. If so that might beg
the question if eventually we should transition to just that to help
simplify things on bring up even further. That should enable users to quickly
"fly" on enablement.
                                                                                
Other than that, any chance you might be up to add yourself as the
cloud / terraform maintainer under MAINTAINERS ?

  Luis
Luis Chamberlain April 2, 2025, 7:24 p.m. UTC | #2
On Wed, Apr 02, 2025 at 12:21:06PM -0700, Luis Chamberlain wrote:
> On Mon, Mar 31, 2025 at 08:59:29PM -0400, cel@kernel.org wrote:
> > From: Chuck Lever <chuck.lever@oracle.com>
> > I've come up with some simplifications that can apply to all of
> > the providers, but I'd like to start with OCI because 
> 
> Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
> 
> >  26 files changed, 1472 insertions(+), 556 deletions(-)
> 
> That's huge, for all this!

I meant:  thanks for all this!

  Luis
Chuck Lever April 2, 2025, 7:38 p.m. UTC | #3
On 4/2/25 3:21 PM, Luis Chamberlain wrote:
> On Mon, Mar 31, 2025 at 08:59:29PM -0400, cel@kernel.org wrote:
>> From: Chuck Lever <chuck.lever@oracle.com>
>> I've come up with some simplifications that can apply to all of
>> the providers, but I'd like to start with OCI because 
> 
> Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>

Thanks for taking a look!

I guess my basic concern here is that I'm changing the name of some
Kconfig variables, which would break backwards compatibility.

If you and Chandan feel that is not a roadblock, then I will start
committing these and the similar patches I have for the other three
major providers.


>>  26 files changed, 1472 insertions(+), 556 deletions(-)
> 
> That's huge, for all this! I know AWS supports a simple .aws/credentials
> and I think OCI might too support something similar. If so that might beg
> the question if eventually we should transition to just that to help
> simplify things on bring up even further. That should enable users to quickly
> "fly" on enablement.

The varying way that the providers handle authentication is one of
the triggers that started me down this road. I would like something
that is easy to bring up and matches the authentication that each
provider's CLI tool does.

I'm still on the fence about whether keeping the secrets in the
kdevops .config or in environment variables or in a ~/.{aws,oci,azure}
profile is the better approach. I was thinking of enabling all these
possibilities and let users choose which one suits their security
requirements...

The values of environment variables, I will note, are leaked into the
Buildbot log. The best answer might therefore be ~/.oci/profile etc.


> Other than that, any chance you might be up to add yourself as the
> cloud / terraform maintainer under MAINTAINERS ?

I can do that.

I promise I will hang out for a beer next time we meet f2f!
Luis Chamberlain April 2, 2025, 8:08 p.m. UTC | #4
On Wed, Apr 02, 2025 at 03:38:04PM -0400, Chuck Lever wrote:
> On 4/2/25 3:21 PM, Luis Chamberlain wrote:
> > On Mon, Mar 31, 2025 at 08:59:29PM -0400, cel@kernel.org wrote:
> >> From: Chuck Lever <chuck.lever@oracle.com>
> >> I've come up with some simplifications that can apply to all of
> >> the providers, but I'd like to start with OCI because 
> > 
> > Reviewed-by: Luis Chamberlain <mcgrof@kernel.org>
> 
> Thanks for taking a look!
> 
> I guess my basic concern here is that I'm changing the name of some
> Kconfig variables, which would break backwards compatibility.

I've addressed concerns like that befored by adding a respective kconfig
value and mapping the old one to the new shiny one with an XXX to
annotate we should remove the older one later. But if for cloud I
suspect most users might stick to that version of kdevops and have no
need to upgrade too, and so I am not sure if its needed as much as
the guest / virtualization use case.

> If you and Chandan feel that is not a roadblock, then I will start
> committing these and the similar patches I have for the other three
> major providers.

My use cases of cloud are all completely ephemeral and stuck to one
version of kdevops in particular because of the cost, and so I am
careful to always 'make destroy' as soon as I'm done otheriwse you
can economically bleed. And so I think economics drives kdevops
cloud instances to be super ephemeral.

So for *me*, I say go for it.

But I am not sure if other folks are using kdevops for the cloud
in other ways, but certainly Chandan would have good sensing on that.

> The varying way that the providers handle authentication is one of
> the triggers that started me down this road. I would like something
> that is easy to bring up and matches the authentication that each
> provider's CLI tool does.

Definitely.

> I'm still on the fence about whether keeping the secrets in the
> kdevops .config

Secrets don't have to be part of an output .config, they should not.
The reasin being that we want to support using cloud for CI too and
in doing so we don't want any secrets leaked out on .config as we
automatically upload to kdevops-results-archive the .config used
so to enable reproducible CI builds / testing. If you look at
kdevops-results-archive the .configs are never sensitive to the
environment or host. Its just generic info.

We support some secrets for enterprise releases like SUSE, but I forget
what was done for RHEL. At least for SUSE the expectations is that you
fill in a yaml optional secret file readin for extra vars. Even if we
had a new "output private_yaml" that kconfig symbol would still be part
of .config, and so if we wantd to add a "output private_yaml" we'd have
to negate the entry being put on .config but not sure if that may mess
with Kconfig's dep mechanisms.

> or in environment variables or in a ~/.{aws,oci,azure}

The nice thing about ~/.{aws,oci,azure} is its out of the way and
we just infer you have it, we never have any of that added to .config.

> profile is the better approach. I was thinking of enabling all these
> possibilities and let users choose which one suits their security
> requirements...

Makes sense. We know AWS supports it, OCI I have heard does too, but
not sure about azure.

> The values of environment variables, I will note, are leaked into the
> Buildbot log.

Oh no.

> The best answer might therefore be ~/.oci/profile etc.

I think that's a clean simple solution to the problem, if we can
support it.

> > Other than that, any chance you might be up to add yourself as the
> > cloud / terraform maintainer under MAINTAINERS ?
> 
> I can do that.
> 
> I promise I will hang out for a beer next time we meet f2f!

Great!

  Luis