feat: S304046 FE Changes - ISO Management, Favorites, and SSH Multi-keys#1
Open
feat: S304046 FE Changes - ISO Management, Favorites, and SSH Multi-keys#1
Conversation
Collaborator
Collaborator
Author
|
done! |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.


Description
This PR updates the Frontend UI to support the advanced provisioning features introduced in the v2 architecture. It includes new input fields for dynamic image management, improved SSH key handling, and refined webhook secret displays.
Key Changes & Features
Advanced Provisioning UI: Added dedicated fields for imageUrl, checksumUrl, and imageFormat (supporting ISO, QCOW2, and RAW) within the server reservation flow.
Multi-key SSH Management: Users can now provide a list of multiple SSH public keys. The UI validates and sends these as an array to the backend.
Webhook Management Updates: Refactored the Webhook creation/editing interface to align with the new resource types (Server and NodePort).
Pre-deployment Best Practice: Image Verification
[!TIP]
Always verify image accessibility before starting a deployment.
Before entering an imageUrl in the Frontend, ensure the infrastructure can reach and download the asset. Use a curl -I command to verify a 200 OK response.
Verified Example (Production):
Bash
curl -I http://192.168.11.23/images/noble-ubuntu-server-nvidia.qcow2
Result: HTTP/1.1 200 OK
CRITICAL: Webhook Secrets Management
[!IMPORTANT]
When creating or recreating a Webhook for Server or NodePort resources:
Save the Generated Secret immediately: The UI will display a unique secret upon creation.
Manual Infrastructure Update: This secret must be manually copied into the secret.yaml manifest of the corresponding Webhook Client (Server or NodePort).
Validation: Without this manual update, the client will reject all incoming events.