[openstack-dev] [TripleO] os-cloud-config ssh access to cloud
Jiří Stránský
jistr at redhat.com
Wed Mar 12 16:03:46 UTC 2014
On 11.3.2014 15:50, Adam Young wrote:
> On 03/11/2014 05:25 AM, Dmitry Mescheryakov wrote:
>> For what it's worth in Sahara (former Savanna) we inject the second
>> key by userdata. I.e. we add
>> echo "${public_key}" >> ${user_home}/.ssh/authorized_keys
>>
>> to the other stuff we do in userdata.
>>
>> Dmitry
>>
>> 2014-03-10 17:10 GMT+04:00 Jiří Stránský <jistr at redhat.com>:
>>> On 7.3.2014 14:50, Imre Farkas wrote:
>>>> On 03/07/2014 10:30 AM, Jiří Stránský wrote:
>>>>> Hi,
>>>>>
>>>>> there's one step in cloud initialization that is performed over SSH --
>>>>> calling "keystone-manage pki_setup". Here's the relevant code in
>>>>> keystone-init [1], here's a review for moving the functionality to
>>>>> os-cloud-config [2].
>
> You really should not be doing this. I should never have written
> pki_setup: it is a developers tool: user a real CA and a real certificate.
Thanks for all the replies everyone :)
I'm leaning towards going the way Robert suggested on the review [1] -
upload pre-created signing cert, signing key and CA cert to controller
nodes using Heat. This seems like a much cleaner approach to
initializing overcloud than having to SSH into it, and it will solve
both problems i outlined in the initial e-mail.
It creates another problem though - for simple (think PoC) deployments
without external CA we'll need to create the keys/certs
somehow/somewhere anyway :) It shouldn't be hard because it's already
implemented in keystone-manage pki_setup but we should figure out a way
to avoid copy-pasting the world. Maybe Tuskar calling pki_setup locally
and passing a parameter to pki_setup to override default location where
new keys/certs will be generated?
Thanks
Jirka
[1] https://review.openstack.org/#/c/78148/
More information about the OpenStack-dev
mailing list