##// END OF EJS Templates
comments: extend API data with references to commit_id or pull_request_id for audit-logs.
comments: extend API data with references to commit_id or pull_request_id for audit-logs.

File last commit:

r4238:3d7adf6c stable
r4304:a588c9e6 default
Show More
user_edit_ssh_keys_generate.mako
63 lines | 2.4 KiB | application/x-mako | MakoHtmlLexer
/ rhodecode / templates / admin / users / user_edit_ssh_keys_generate.mako
users/user-groups: added context of what we're editing....
r4232 <%namespace name="base" file="/base/base.mako"/>
users: added SSH key management for user admin pages
r1993 <div class="panel panel-default">
<div class="panel-heading">
users/user-groups: added context of what we're editing....
r4232 <h3 class="panel-title">
${base.gravatar_with_user(c.user.username, 16, tooltip=False, _class='pull-left')}
&nbsp;- ${_('New SSH Key generation')}
</h3>
users: added SSH key management for user admin pages
r1993 </div>
<div class="panel-body">
Issue #5536 - ability to disable server-side SSH key generation...
r3478 %if c.ssh_enabled and c.ssh_key_generator_enabled:
<p>
ssh-keys: allow generation of legacy keys for older systems and windows.
r4238 ${_('Below is a 2048 bit generated SSH RSA key.')}<br/>${_('If you use older systems please try to generate a')} <a href="${h.current_route_path(request, private_format='legacy')}">${_('legacy format')}</a> ssh key.<br/>
Issue #5536 - ability to disable server-side SSH key generation...
r3478 ${_('If You wish to use it to access RhodeCode via the SSH please save the private key and click `Use this generated key` at the bottom.')}
</p>
<h4>${_('Private key')}</h4>
<pre>
ssh(sec): fix newline problem on key saving that would allow bypassing command sandbox.
r2748 # Save the below content as
# Windows: /Users/{username}/.ssh/id_rsa_rhodecode_access_priv.key
# macOS: /Users/{yourname}/.ssh/id_rsa_rhodecode_access_priv.key
# Linux: /home/{username}/.ssh/id_rsa_rhodecode_access_priv.key
ssh: update docs based on feedback.
r2478
# Change permissions to 0600 to make it secure, and usable.
ssh(sec): fix newline problem on key saving that would allow bypassing command sandbox.
r2748 e.g chmod 0600 /home/{username}/.ssh/id_rsa_rhodecode_access_priv.key
Issue #5536 - ability to disable server-side SSH key generation...
r3478 </pre>
users: added SSH key management for user admin pages
r1993
Issue #5536 - ability to disable server-side SSH key generation...
r3478 <div>
<textarea style="height: 300px">${c.private}</textarea>
</div>
<br/>
users: added SSH key management for user admin pages
r1993
Issue #5536 - ability to disable server-side SSH key generation...
r3478 <h4>${_('Public key')}</h4>
<pre>
ssh(sec): fix newline problem on key saving that would allow bypassing command sandbox.
r2748 # Save the below content as
# Windows: /Users/{username}/.ssh/id_rsa_rhodecode_access_pub.key
# macOS: /Users/{yourname}/.ssh/id_rsa_rhodecode_access_pub.key
# Linux: /home/{username}/.ssh/id_rsa_rhodecode_access_pub.key
Issue #5536 - ability to disable server-side SSH key generation...
r3478 </pre>
users: added SSH key management for user admin pages
r1993
Issue #5536 - ability to disable server-side SSH key generation...
r3478 <input type="text" value="${c.public}" class="large text" size="100"/>
<p>
% if hasattr(c, 'target_form_url'):
<a href="${c.target_form_url}">${_('Use this generated key')}.</a>
% else:
<a href="${h.route_path('edit_user_ssh_keys', user_id=c.user.user_id, _query=dict(default_key=c.public))}">${_('Use this generated key')}.</a>
% endif
${_('Confirmation required on the next screen')}.
</p>
% else:
<h2>
${_('SSH key generator has been disabled.')}
</h2>
% endif
users: added SSH key management for user admin pages
r1993 </div>
</div>
<script>
$(document).ready(function(){
});
</script>