-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Epic: Upload users SSH keys to Gitpod #9932
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Closing as duplicate of: #6794 |
Re-opening as #6794 looks to be about Whereas this issue was intended to be about |
@iQQBot Do you think a user can somehow make use of dot files to work around it for now? |
Couldn't agree more. This access code mechanism is a nice hack, but not so great. I expected a public key text box (e.g. https://github.com/settings/ssh/new) in some Gitpod settings pane like every other platform out there that offers SSH functionality. Would be amazing if after adding a key you could simply do: Or maybe even: (Icing on the cake would be supporting agent forwarding too: #6993) |
As @csweichel suggestion
Or
Or (this case can support dynamic valid, it will auth each time, i.e. you can upload ssh key, and it work with an opened workspace, above 2 option only work on new workspace)
Actually, I like solution 1, it looks more simple WDYT @csweichel ? |
Cross-posting a relevant discussion (internal) with some specs in case you haven't seen this @iQQBot! |
(I just thought I'd memorialize here some information jeanp413 looked up for me:) VSCode Desktop no longer, with the ssh bridge, remembers previous open editors when you open a workspace and connect. (It used to remember them properly with the desktop connector. And it should because that's part of the Gitpod experience: just pick up where you left off. jeanp413 (on Discord):
|
Q: Will the random token method be still there? Asking because it's helpful in some use cases, where you just want to grab the command and run somewhere like in an android terminal emulator(termux) without having to worry about uploading keys. |
Updating that this the first iteration of this is now announced: https://www.gitpod.io/blog/ssh-key-upload 🙏 Will measure/gather feedback then look to close this issue. |
Wanted to note that there's a separate issue (see below) here for simplifying the host name, also. Some technical constraints why we can't do it right away, but hopefully we can simplify the connection further so it's possibly even memorisable, or at least easier to work with when copying into SSH connection forms, etc. |
Marking issue as complete, see: For more details. |
Context
Local companion dynamically creates SSH keys for users, to grant SSH access, and the copy/paste SSH method for Gitpod uses an access code from within the workspace, and you can even manually inject your SSH public key using dotfiles. Whilst both of these approaches work, it would be better to allow users to upload their own SSH public keys to Gitpod to access their workspace using a more conventional SSH approach. We may also want to consider re-using existing public keys from GitHub, or other providers, for instance.
Value
In Scope
Out of scope
Related Issues
Public FAQ
Will we allow users to add SSH keys manually?
Yes.Will we keep the current owner token SSH solution in place?
Yes, as there is value in the quick copy/paste, however SSH key upload should be recommended.Will importing SSH keys from GitHub be the primary way add SSH keys?
Unlikely. Uploading custom keys would be the simplest implementation, which we could then extend with ways to fetch existing keys as a future update or refinement. We will start by setting up the Gitpod infrastructure for using SSH keys, and then look at ways to import/re-use existing keys from other providers.Can we fetch SSH keys from all other providers (GitHub, BitBucket, GitLab)?
- GitHub has an API - GitLab has an API - BitBucket needs to be investigatedCan you use an SSH Key from one provider to connect to workspaces for repositories in other providers?
Needs investigation.Internal FAQ
What happens if SSH keys get removed from a provider, can we detect that?
Needs investigationThe text was updated successfully, but these errors were encountered: