souschef
Health Warn
- License — License: MIT
- Description — Repository has a description
- Active repo — Last push 0 days ago
- Low visibility — Only 6 GitHub stars
Code Fail
- rm -rf — Recursive force deletion command in .devcontainer/post-create.sh
Permissions Pass
- Permissions — No dangerous permissions requested
This MCP server acts as an AI-powered bridge for migrating legacy infrastructure automation (like Chef, SaltStack, and Puppet) into Ansible playbooks, while also facilitating Ansible version upgrades. It provides a massive suite of tools to handle code translation, CI/CD pipelines, and compatibility validation.
Security Assessment
Overall Risk: Medium. The tool inherently processes your infrastructure code, which could include sensitive configurations. It operates without requiring explicitly dangerous permissions. However, the automated code audit flagged a recursive force deletion command (`rm -rf`) inside a development container setup script. While this is unlikely to affect production execution, it indicates a lack of strict input sanitization in helper scripts. Additionally, the author explicitly warns that much of the application relies on mocked enterprise APIs rather than live environments, meaning untested edge cases could potentially mishandle proprietary data or make unexpected network requests during translation tasks.
Quality Assessment
Quality is a mixed bag. The project is highly active (last updated today), utilizes the permissive MIT license, and claims an impressive 91% test coverage with strict code formatting. It is thoroughly documented and transparent, with the author explicitly stating the codebase was heavily AI-generated over a very short period. Consequently, community trust is currently minimal, evidenced by only 6 GitHub stars. While the author actively tests the tool, the rapid AI generation combined with low community adoption means hidden bugs and architectural inconsistencies are highly likely.
Verdict
Use with caution: The tool is highly active and transparent about its AI-generated nature, but low community adoption and a flagged deletion command in its setup scripts warrant careful review before integrating into enterprise workflows.
AI-powered MCP server for Chef-to-Ansible migration & Ansible upgrades: 48 tools for cookbook/Habitat conversion, InSpec to Testinfra, data bags to Vault, AWX/AAP workflows, CI/CD pipelines, upgrade planning & compatibility matrix validation. Model-agnostic. Web UI included.
SousChef: Multi-Platform to Ansible Migration + Ansible Upgrade Planning
Transform Chef, SaltStack, Puppet, PowerShell, and Bash automation to Ansible, and plan Ansible version upgrades. Works with any AI assistant via MCP (Model Context Protocol)—Claude, GPT-4, GitHub Copilot, Red Hat AI, local models, and more.
Quick Facts: MIT License | Python 3.10+ | 95 MCP Tools | 91% Test Coverage
Warning
I did not hand craft 100k lines of code in two days while doing my actual day job (which, for the record, isn’t this). A lot of this is AI generated. Architected, hand edited, and personally sworn at yes, but the heavy hand of AI is all over this repo.
I’ve pushed it to include a lot of tests, and I run it through its paces before pushing, but some things may break, or may have always been broken. If you find something, raise it and I’ll fix it.
A fair bit of this relies on mocked Chef/AWX/AAP APIs because shockingly I don’t have a fleet of enterprise grade installs with enterprise grade data sitting around to test against. Buyer beware (doubly so, since you didn’t actually buy anything).
What It Does
Chef-to-Ansible Migration — Convert cookbooks, recipes, custom resources, data bags, and Habitat plans to Ansible playbooks, roles, and containers. Supports infrastructure, applications, and day-2 operations.
SaltStack-to-Ansible Migration — Convert Salt states, pillars, and top.sls targeting to Ansible roles, variable files, Ansible Vault, and INI inventory. Assess complexity, generate phased migration plans, and produce executive reports.
Puppet to Ansible Migration — Convert Puppet manifests and module directories to Ansible playbooks using idiomatic ansible.builtin modules. Recognises 14 Puppet resource types; maps 10 to Ansible modules with AI-assisted conversion for complex constructs.
PowerShell to Ansible Migration — Convert Windows PowerShell provisioning scripts to idiomatic ansible.windows playbooks, roles, WinRM inventories, and AWX/AAP job templates.
Bash Script Migration — Convert provisioning Bash scripts to Ansible playbooks and roles with quality scoring, sensitive data detection, and AAP readiness hints.
Ansible Upgrade Planning — Assess compatibility, plan version upgrades, validate collections, identify breaking changes, and generate testing strategies.
Installation & Setup
# Install from PyPI
pip install mcp-souschef
# Configure your MCP client (Claude Desktop example)
cp config/claude-desktop.json ~/Library/Application\ Support/Claude/claude_desktop_config.json
# Restart your AI assistant and start using
# Ask: "What migration tools are available?"
Other MCP clients: See config/CONFIGURATION.md for VS Code Copilot, custom setups, and Docker deployment.
Key Features
- 95 MCP tools for Chef migration, SaltStack migration, Puppet migration, PowerShell migration, Bash script migration, and Ansible upgrades
- Web UI with interactive migration planner and visualisation (including Salt, Puppet, PowerShell, and Bash tabs)
- CLI for automation and CI/CD integration
- Production-ready with 91% test coverage and comprehensive validation
- Model-agnostic — works with any AI assistant supporting MCP
- Chef Server ingestion with dependency closure and offline bundle export
Common Use Cases
Chef Migration:
- Convert cookbooks to Ansible playbooks and roles
- Migrate Chef Habitat apps to Docker containers
- Transform data bags to Ansible Vault
- Generate AWX/AAP job templates and workflows
- Convert InSpec tests to Ansible validation tasks
- Fetch cookbooks from Chef Server with run_list or policy selection
SaltStack Migration:
- Parse SLS state files and extract states, pillars, and grain references
- Convert Salt states to Ansible playbooks and role task files
- Migrate pillar data to Ansible
group_vars/and Ansible Vault - Generate Ansible inventory from
top.slstargeting rules - Batch-convert a full Salt state tree to an Ansible roles structure
- Assess migration complexity and generate phased migration plans
Puppet Migration:
- Convert Puppet manifests (
.pp) and module directories to Ansible playbooks - Recognise 14 Puppet resource types; map 10 to idiomatic
ansible.builtinmodules (package,service,file,user,group,exec,cron,host,mount,ssh_authorized_key) - Warn about unsupported constructs (Hiera lookups, exported resources,
create_resources) with manual-review guidance - AI-assisted conversion for complex Puppet DSL that cannot be mapped automatically
- Convert individual Puppet resource declarations to standalone Ansible tasks
PowerShell Migration:
- Convert Windows PowerShell provisioning scripts to idiomatic Ansible playbooks
- Generate full Ansible roles with WinRM inventory and
group_vars - Map 28+ PowerShell patterns to
ansible.windows.*,community.windows.*,chocolatey.chocolatey.* - Generate AWX/AAP Windows job templates with WinRM credentials
- Analyse migration fidelity (0–100 %) with actionable recommendations
- Create complete
requirements.ymlfor required Windows collections
Bash Script Migration:
- Convert provisioning Bash scripts to idiomatic Ansible playbooks
- Generate full Ansible roles from Bash scripts (tasks, handlers, defaults, meta)
- Detect and flag hardcoded secrets with ansible-vault guidance
- Identify CM escape calls (Salt, Puppet, Chef) embedded in Bash
- Get AAP-ready job template hints with Execution Environment recommendations
- Score migration quality (A–F) with ranked improvement suggestions
Ansible Upgrades:
- Assess Python and Ansible version compatibility
- Plan upgrades with breaking change analysis
- Validate collection compatibility
- Generate testing strategies
- Track end-of-life dates
Both Infrastructure & Applications:
- Infrastructure provisioning and configuration
- Application deployment automation
- Day-2 operations (backups, scaling, updates)
- CI/CD pipeline migration
- Multi-cloud automation
Command-Line Examples
# Chef migration
souschef-cli recipe /path/to/recipe.rb
souschef-cli template /path/to/template.erb
souschef-cli convert package nginx --action install
# SaltStack migration
souschef-cli salt assess /srv/salt/states/
souschef-cli salt convert /srv/salt/states/webserver/init.sls
souschef-cli salt inventory /srv/salt/top.sls
souschef-cli salt batch-convert /srv/salt/states/ --output-dir ./ansible-roles/
# PowerShell migration
souschef-cli powershell-parse scripts/setup.ps1
souschef-cli powershell-convert scripts/setup.ps1 --output playbook.yml
souschef-cli powershell-role scripts/setup.ps1 --output-dir ./ansible-role
# Puppet migration
souschef-cli puppet parse manifests/site.pp
souschef-cli puppet convert manifests/site.pp --output playbook.yml
souschef-cli puppet convert-module modules/myapp --output-dir ./ansible-role
# Bash script migration
souschef bash parse scripts/bootstrap.sh
souschef bash convert scripts/deploy.sh --output playbook.yml
souschef bash role scripts/setup.sh --role-name myapp --output-dir ./roles
# Ansible upgrades
souschef ansible assess --environment-path /path/to/ansible
souschef ansible plan --current 2.9 --target 2.17
souschef ansible validate-collections --requirements-file requirements.yml
# Web UI
souschef ui # Launch interactive dashboard
Documentation
Start Here
- Quick Start Guide — Get running in 5 minutes
- Production Safety — Validate migrations before deploying ⚠️
- User Guide — All 95 tools explained with examples
- Chef Migration Guide — Step-by-step Chef-to-Ansible migration process
- Salt Migration Guide — Step-by-step SaltStack-to-Ansible migration process
- Bash Migration Guide — Step-by-step Bash provisioning script migration process
- Puppet Migration Guide — Puppet to Ansible conversion
- PowerShell Migration Guide — PowerShell to Windows Ansible conversion
- Ansible Upgrades — Version upgrade planning workflows
Reference
- API Documentation — Complete technical reference
- Architecture Guide — Code structure and design decisions
- Contributing Guide — Development standards and workflow
- Security Policy — Vulnerability reporting and security features
- Changelog — Complete release history
Recent Updates
v7.0.0 — First-class multi-platform migration documentation for SaltStack, Bash, PowerShell, and Puppet
v6.0.0 — v2 core foundation with enhanced migration capabilities
v5.1.4 — Modular architecture, 91% test coverage, full type safety, production-ready
v5.0.0 — Complete Ansible upgrade planning with version matrices and EOL tracking
Contributing
# Development setup
git clone https://github.com/kpeacocke/souschef.git && cd souschef
poetry install
poetry run pytest # Run tests
poetry run ruff check . # Lint
poetry run mypy souschef # Type check
# If you change terraform-provider/
cd terraform-provider
go test ./... # Run Go tests
Standards: Zero warnings policy, type hints required, 90%+ test coverage, Australian English spelling.
See CONTRIBUTING.md for complete guidelines.
Support
- Issues: GitHub Issues
- Discussions: GitHub Discussions
- Security: See SECURITY.md
License
MIT License — see LICENSE for details.
Reviews (0)
Sign in to leave a review.
Leave a reviewNo results found