-
Epic
-
Resolution: Done
-
Normal
-
None
-
None
-
autorized-ssh-key-managment
-
Product / Portfolio Work
-
-
Green
-
To Do
-
VIRTSTRAT-402 - UI user customization
-
0% To Do, 0% In Progress, 100% Done
-
dev-ready, doc-ready, po-ready, qe-ready, ux-ready
-
Goal
The default configuration of RHEL does not allow password authorization during logging in via ssh.
For this reason, it is required to set a ssh key to login.
The same user, might want to use her ssh key to log into multiple VMs.
For this reason, it would be convenient if the user could manage her ssh-keys in the UI.
CNV-19111 already enabled the user to pick up an ssh key from a secret.
It would be nice if the UI would provide a way to mark a secret containing an ssh-key as not owned by the VM, so that the user could use the key for multiple VMs.
In the future, an existing ssh-key secret could be injected dynamically ( CNV-6036 ) into a VM to ssh into a VM from the web ui, e.g. via OpenShift Web Terminal (CNV-18480).
User Stories
- As a Developer, I like to manage a public key to login via ssh via UI, so that I can create multiple VMs in the UI without managing the secrets manually.
Non-Requirements
- List of things not included in this epic, to alleviate any doubt raised during the grooming process.
Notes
- Any additional details or decisions made/needed
Done Checklist
Who | What | Reference |
---|---|---|
DEV | Upstream roadmap issue (or individual upstream PRs) | https://github.com/kubevirt-ui/kubevirt-plugin/pull/1358 https://github.com/kubevirt-ui/kubevirt-plugin/pull/1359 |
DEV | Upstream documentation merged | N/A |
DEV | gap doc updated | N/A |
DEV | Upgrade consideration | N/A |
DEV | CEE/PX summary presentation | N/A |
QE | Test plans in Polarion | Authorized SSH Key Management |
QE | Automated tests merged | PR merged |
DOC | Downstream documentation merged | https://github.com/openshift/openshift-docs/pull/63313 |