You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
One of the niceties coming with clab (for srlinux) is auto-enabled pass-less ssh login.
It is enabled with containerlab gleaning public keys from ~/.ssh/*.pub and reading keys from SSH agent. Then this is all fed to srlinux via config as part of the postdeploy stage.
In clabernetes this can be handled by clabverter (or any other c9s runner in the future).
The same logic can apply when clabverter creates config maps with public key material gleaned from pub files and agent (re-using clab code) and creating config maps that are mapped to ~/.ssh/authorized_keys file on launcher pod.
That way clab running in launcher could read keys from ~/.ssh/authorized_keys and provision them for srlinux enabling pass-less access.
The text was updated successfully, but these errors were encountered:
hellt
changed the title
clabverter to create config maps with public keys from user's host
clabverter to create config maps with public keys from user's host to enable pass-less ssh access
Sep 19, 2023
Copy the pubkey code or import from clab?
Tried importing, which gave me strange ignite runtime compile erorrs. Can try fixing them if importing is the preferred way.
One of the niceties coming with clab (for srlinux) is auto-enabled pass-less ssh login.
It is enabled with containerlab gleaning public keys from
~/.ssh/*.pub
and reading keys from SSH agent. Then this is all fed to srlinux via config as part of the postdeploy stage.In clabernetes this can be handled by clabverter (or any other c9s runner in the future).
The same logic can apply when clabverter creates config maps with public key material gleaned from pub files and agent (re-using clab code) and creating config maps that are mapped to
~/.ssh/authorized_keys
file on launcher pod.That way clab running in launcher could read keys from
~/.ssh/authorized_keys
and provision them for srlinux enabling pass-less access.The text was updated successfully, but these errors were encountered: