-
Notifications
You must be signed in to change notification settings - Fork 267
Update documentation about dynamic SSH key injection #870
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|
@@ -161,21 +161,24 @@ This allows for dynamic injection of SSH public keys at runtime by updating the | |||||||||||||||
|
|
||||||||||||||||
| Please note that new Secrets cannot be attached to a running VM: You must restart the VM to attach the new Secret. | ||||||||||||||||
|
|
||||||||||||||||
| > Note: This requires the qemu-guest-agent to be installed within the guest. | ||||||||||||||||
| > | ||||||||||||||||
| > Note: When using qemuGuestAgent propagation, | ||||||||||||||||
| > the `/home/$USER/.ssh/authorized_keys` file will be owned by the guest agent. | ||||||||||||||||
| > **Requirement:** The qemu-guest-agent must be installed within the guest. | ||||||||||||||||
|
|
||||||||||||||||
| > **Deprecation Notice:** The implementation supporting qemu-guest-agent versions older than 5.2 is deprecated | ||||||||||||||||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
https://squidfunk.github.io/mkdocs-material/reference/admonitions/#changing-the-title |
||||||||||||||||
| > and will stop working in a future release. | ||||||||||||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
Comment on lines
+166
to
+167
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
|
||||||||||||||||
|
|
||||||||||||||||
| > **Important:** When using `qemuGuestAgent` propagation, | ||||||||||||||||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
You'd need to replace the subsequent '>' characters and add the 4 spaces (as here) to keep it in the same admonition. |
||||||||||||||||
| > the `/home/$USER/.ssh/authorized_keys` file is owned by the guest agent. | ||||||||||||||||
| > Changes to the file not made by the guest agent will be lost. | ||||||||||||||||
| > | ||||||||||||||||
| > Note: More information about the motivation behind the access credentials API | ||||||||||||||||
|
|
||||||||||||||||
| > **Further Reading:** More information about the motivation behind the access credentials API | ||||||||||||||||
| > can be found in the | ||||||||||||||||
| > [pull request description](https://github.com/kubevirt/kubevirt/pull/4195) | ||||||||||||||||
| > that introduced the API. | ||||||||||||||||
|
Comment on lines
+173
to
176
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Suggested change
I would also move this above the requirements heading, and in to the opening text. (iiuc) |
||||||||||||||||
|
|
||||||||||||||||
| In the example below the `Secret` containing the SSH public key is | ||||||||||||||||
| In the example below, the `Secret` containing the SSH public key is | ||||||||||||||||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. And then we can add an example heading here to distinguish it from the preceding section.
Suggested change
|
||||||||||||||||
| attached to the virtual machine via the access credentials API with the | ||||||||||||||||
| `qemuGuestAgent` propagation method. This allows updating the contents of | ||||||||||||||||
| the `Secret` at any time, which will result in the changes getting applied | ||||||||||||||||
| the `Secret` at any time, which will result in the changes being applied | ||||||||||||||||
| to the running virtual machine immediately. The `Secret` may also contain | ||||||||||||||||
| multiple SSH public keys. | ||||||||||||||||
|
|
||||||||||||||||
|
|
||||||||||||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These 4 different admonition types are unfortunately rendered indistinguishable grey here.
I suggest we break this into two headings and then use the admonition markdown. So I'd make this: