From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 14C27374 for ; Fri, 8 Mar 2024 00:04:01 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=198.137.202.133 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709856243; cv=none; b=m9/BQTvdDSAb4sPURMFMHZ786kohmMJLL4Pq54cqg1Snv4Kjb7rJsYyFqRWHi9m4xKTEOApsj30T0Ov6QTzTejKIkj2ZgyK6yjwqyzyg8qVfxnDVWH4QlDWuPj+xKgc+rNmad7Sif8fE79L20Vyt1bVVAT1bFnd0TOR6tcBibTI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709856243; c=relaxed/simple; bh=NEZ9NS6IOxoZk8eCpTQe2omcfcaRgqkcExX2y/idWpY=; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References: MIME-Version; b=KnbfIZetXX3U4iXhHbgCSZau4ieqVfAOdvJltvCI/Zgi0hk4bIs4Rcdu/bZy8mZdOlhkNoh8JEglvMuua+/QK1Evo+sQi2pwnJX+u4Nlu/+O8j14+Q24101UT1lM6iXbV/jAYgA0OHTnRWSMiR8p7C5vt2niK1WRvVxdHGQWjm4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org; spf=none smtp.mailfrom=infradead.org; dkim=pass (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b=lXY5z9pN; arc=none smtp.client-ip=198.137.202.133 Authentication-Results: smtp.subspace.kernel.org; dmarc=fail (p=none dis=none) header.from=kernel.org Authentication-Results: smtp.subspace.kernel.org; spf=none smtp.mailfrom=infradead.org Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=infradead.org header.i=@infradead.org header.b="lXY5z9pN" DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Sender:Content-Transfer-Encoding: MIME-Version:References:In-Reply-To:Message-ID:Date:Subject:Cc:To:From: Reply-To:Content-Type:Content-ID:Content-Description; bh=y0OWIFEOq5KUW6VVgSURpDCuZ8Y+8NsueQZ3oGk3Uu8=; b=lXY5z9pNVxfLAbBchBcG3ZA9LY WljYVwIVLuajGJGkE14DQ8yACBQlFy9KUpIxMvKLquw3/0ll1Y48pay5h1H3BV5+8g27xctkojNJb Do5zSfXnzMRA+LRzZGZsEaYt0gtTCP6w5DO5VGkGEAzV7yqA64bYtALJZ+ngKKIpLdcrr6wXvkWVf 3aURmb/Vl/gUWC5/UDTWhxYISqJcovVhV0PO1WvChFQLx6yz1L17tPtjdrgHbQYpLv0Ob5xwmcAfm xGACiM+Bhr2X/I0WzRjtilZn3V8KzjFPFA+q8oX9gSsufuYu8fbI2HfJgiXlyMTwAbH1MqYrajWOc iET91vIg==; Received: from mcgrof by bombadil.infradead.org with local (Exim 4.97.1 #2 (Red Hat Linux)) id 1riNiT-00000006uQj-1ehQ; Fri, 08 Mar 2024 00:04:01 +0000 From: Luis Chamberlain To: kdevops@lists.linux.dev Cc: Luis Chamberlain Subject: [PATCH 7/8] destroy_guestfs.sh: remove known ssh key Date: Thu, 7 Mar 2024 16:03:58 -0800 Message-ID: <20240308000400.1646823-8-mcgrof@kernel.org> X-Mailer: git-send-email 2.44.0 In-Reply-To: <20240308000400.1646823-1-mcgrof@kernel.org> References: <20240308000400.1646823-1-mcgrof@kernel.org> Precedence: bulk X-Mailing-List: kdevops@lists.linux.dev List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: Luis Chamberlain When destroying a guest we should remove the known key so that if we re-create the guest we won't be asked about a new key. Without this the ssh-injection will fail on a guest if an old key was already used in the bringup proces with: virt-sysprep -a $ROOTIMG --hostname $name --ssh-inject <...> Fix this. Signed-off-by: Luis Chamberlain --- scripts/destroy_guestfs.sh | 1 + 1 file changed, 1 insertion(+) diff --git a/scripts/destroy_guestfs.sh b/scripts/destroy_guestfs.sh index 9c627f23..3cdd21a8 100755 --- a/scripts/destroy_guestfs.sh +++ b/scripts/destroy_guestfs.sh @@ -23,6 +23,7 @@ if [ -f "$GUESTFSDIR/kdevops_nodes.yaml" ]; then fi rm -rf "$GUESTFSDIR/$name" rm -rf "$STORAGEDIR/$name" + ssh-keygen -q -f ~/.ssh/known_hosts -R $name 1> /dev/null 2>&1 done fi -- 2.43.0