-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update how bad SSH keys are handled in the UI #706
Comments
The back-end is updated now to support the old way and the new way. The front end needs to now show bad keys, and not worry about which host noticed first. That is to say, pull the host with the changed key from In any case, when the user requests a bad key to be deleted, create a job for each host with the When the front end is ready, there is legacy code to remove from the back end before this issue closes. |
Additional notes:
|
Refer to #703 for previous records of this issue. |
* Removed old code now that issue #706 is closed. * Enabled some striker replacement logging Signed-off-by: Madison Kelly <[email protected]>
* Removed old code now that issue #706 is closed. * Enabled some striker replacement logging Signed-off-by: Madison Kelly <[email protected]>
The old way was to look up
state_uuid
s that contained thebad_file=X,bad_line=Y
. This needs to be updated so that thejob_data
is justbad_key=X
.We need to coordinate this so that we update
Remote.pm
calls that record the bad key directly, instead of the file/line.The text was updated successfully, but these errors were encountered: