-
Notifications
You must be signed in to change notification settings - Fork 70
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added namespace configurator for existing user SSH keys #192
Conversation
Signed-off-by: Max Shaposhnik <mshaposh@redhat.com>
Signed-off-by: Max Shaposhnik <mshaposh@redhat.com>
✅ E2E Happy path tests succeed 🎉 See Details
Test product:
Eclipse Che QE channel: https://mattermost.eclipse.org/eclipse/channels/eclipse-che-qe |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM from a DWO perspective.
...ipse/che/workspace/infrastructure/kubernetes/namespace/configurator/SshKeysConfigurator.java
Outdated
Show resolved
Hide resolved
...ipse/che/workspace/infrastructure/kubernetes/namespace/configurator/SshKeysConfigurator.java
Outdated
Show resolved
Hide resolved
Signed-off-by: Max Shaposhnik <mshaposh@redhat.com>
❌ E2E Happy path tests failed ❗ See Details
Test product:
Eclipse Che QE channel: https://mattermost.eclipse.org/eclipse/channels/eclipse-che-qe |
@amisevsk @JPinkney can you confirm that the path of ssh key should be Line 86 in fb8735b
|
throws InfrastructureException { | ||
|
||
var client = clientFactory.create(); | ||
List<SshPairImpl> vcsSshPairs = getVcsSshPairs(namespaceResolutionContext); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@amisevsk wondering if we need to process the internal ssh keys for async-storage. I'm not sure how the DevWorkspace handles the key management for it
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Line 204 in 98b66ff
sshPairs = sshManager.getPairs(userId, "internal"); |
Signed-off-by: Max Shaposhnik <mshaposh@redhat.com>
Yes, correct path should be |
|
Maybe separate secret with different mount path-s for them ? (but ssh_config file should remain the same IMHO....) |
I think DWO needs to isolate the async-storage sidecar from automount, etc. It only has a single responsibility (communicate with async server) and so should not be impacted by anything else. I've created devfile/devworkspace-operator#707 to track this issue. |
[crw-ci-test --rebuild] |
@skabashnyuk Yes that's why devfile/devworkspace-operator#707 created AFAIU |
✅ E2E Happy path tests succeed 🎉 See Details
Test product:
Eclipse Che QE channel: https://mattermost.eclipse.org/eclipse/channels/eclipse-che-qe |
To clarify, DWO currently creates the keypair for the async storage usecase, so no intervention from Che Server is needed to make that happen (Che should not have to do anything for the async storage case). The issue is that currently the keypair provisioned by DWO will collide with an automount to that directory, which is what's described in devfile/devworkspace-operator#707. |
Signed-off-by: Max Shaposhnik mshaposh@redhat.com
What does this PR do?
Added namespace configurator for mounting existing user SSH keys into namespace during provision
Screenshot/screencast of this PR
Generated secret data will looks like:
What issues does this PR fix or reference?
eclipse-che/che#20832
How to test this PR?
PR Checklist
As the author of this Pull Request I made sure that:
What issues does this PR fix or reference
andHow to test this PR
completedReviewers
Reviewers, please comment how you tested the PR when approving it.