-
-
Notifications
You must be signed in to change notification settings - Fork 322
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
null_resource.copy-worker Still creating... with Fedora CoreOS #915
Comments
* For Fedora CoreOS, users should not be using sha-rsa public keys anymore, so make sure the docs examples reflect this * #915
* For Fedora CoreOS, users should not be using sha-rsa public keys anymore, so make sure the docs examples reflect this * poseidon#915
* For Fedora CoreOS, users should not be using sha-rsa public keys anymore, so make sure the docs examples reflect this * poseidon#915
Terraform is still tracking this hashicorp/terraform#30134 |
Before opening a new issue, I am wondering if this is why the SSH connection does not even try using a key?
To be sure, I've configured my local client to be able to automatically just log in, but that seem to be ignored in this case. |
Terraform cannot (specifically golang/go#49952) produce a valid fingerprint for RSA SHA-2 keys to be seen as valid to the SSH server, so it will not be a valid method to use. I generated and use ed25519 keys in the meantime. |
Go addressed this issue in the crypto library and Terraform v1.2+ releases have the fix. RSA SHA2 keys can be used with Fedora CoreOS again, which removes the need for a workaround (esp on Azure where ed25519 isn't allowed) in my testing. hashicorp/terraform#30134 |
Fedora CoreOS 33 has stronger crypto defaults (faq) while the Go language (and therefore Terraform plugins) hasn't yet added support for RSA SHA-2 (see golang/go#37278).
Short/medium term, follow the Fedora CoreOS guidance. You can either use a non-RSA key (except Azure) or apply the workaround recommended by Fedora CoreOS as a snippet.
This issue is not tracking any planned action on Typhoon's part. But rather anticipating users not seeing the CHANGELOG.
Symptom
You'll notice that provisioning clusters with Fedora CoreOS 33 hangs when trying to us an RSA key, because of the now stronger policies in Fedora.
Bear in mind, if you are a new user, there are plenty of other reasons your SSH connections to bootstrap machines might not be working (e.g. ssh-agent, see docs).
Related: coreos/fedora-coreos-tracker#699
The text was updated successfully, but these errors were encountered: