►
From YouTube: Che Community Meeting - August 30, 2021
Description
1. Che-docs publishing now content from release branch. The main branch can accept content for the next release.
(Publication still executed from the master branch, but using content from the release branch) #2022 - Fabrice (5 min)
2. SSH key creation from dashboard vs from Che Theia plugin - Sergii Kabashniuk (7min)
3.New and noteworthy section to the community meeting - Sun (5 min)
A
The
che
community
meeting
for
those
who
are
coming
for
the
first
time
this
is
the
weekly
meeting.
So
every
monday
we
discuss
about
its
project,
development
and
so
discussion.
Topics
of
the
meeting
can
be
added
that
could
be
added
to
this
document.
So
let
me
show
my
screen.
I
forgot
to
do
that.
B
A
Can
see
it
okay,
cool,
so
topics,
topics
to
discuss?
I
can
be
added
to
these
dots
so
feel
free
to
to
add
any
topics
for
discussions.
This
is
very
open,
so
anyone
can
can
add
a
topic.
So
don't
be,
don't
be
shy.
A
I've
shared
the
links
to
the
doc
in
the
chat,
and
so
so
today
we
are
the
30th
of
august
2021
and,
as
usual,
I
usually
start
with
the
latest
releases.
A
We
have
a
metamorph
channel
that
shows
the
other
the
latest
releases,
and
I
just
checked
two
minutes
before
at
the
meeting
came
on
first
day
we
released
7
35
that
one,
so
you
can
give
a
try
with
jctl
by
upgrading
to
ctrl
or
instead
of
following
the
documentation
to
inspection
and
about
sorry
upcoming
events
looks
like
we
don't
have
any.
A
So,
let's
go
straight
to
the
topics
so
fabrice.
The
first
topics
is
for
you,
so
you
can
start.
C
Hello
yeah,
so
that's
a
feature
waited,
so
you
know
that
previously
we
could
merge
to
the
main
master
branch
only
after
a
release
and
sometimes
the
sample
were
queued
for
a
while
and
it
was
not
satisfactory
and
we
had
to
explain
it
every
now
and
again
to
everybody
and
now
it's
fixed,
so
we
can
merge
directly
in
the
master
branch
for
the
next
release,
not
for
the
next
next,
but
so
master
branch
is
for
the
next
release
and
the
publication
process
is
using
the
content
that
is
in
the
release
branch.
C
C
We
can
so
it
was
never
requested.
So
if
I
hear
you,
that's
that's
the
first
time
we
request
it,
that's
good.
C
You
have
to
check
that,
but
else
it's
quite
it's
right.
It's
quite
easy
to
do.
C
It's
that
now
we
have
shea
dogs,
end
user
guide,
etc.
If
you
want
to
produce
several
several
versions,
then
you
will
have
j
dogs
version
and
then
the
end
user
guide
or
if
we
do
that
we
have
to.
We
have
to
manage
all
the
relic
direction
from
the
previous
url
and
be
sure
we
don't
create
for
four
errors,
because
all
the
four
or
four
errors
are
managed
by
eclipse
server
and
we
we
don't
have
the
hands
on
it.
So
we
have
to
do
all
the
directions
correctly.
So
that's
my
only
little
concern
is.
C
We
cannot
do
one
big
regex
to
redirect
everything,
because
it's
it's
locked.
D
So
where
are
these
not
good.
B
No,
it's
just
that
like,
for
example,
when
you,
when
I
test
locally
right
I've,
it's
not
I'm
not
so
the
links
work
on
my
local
instance.
So
just
so,
I'm
not
sure
understand
why
that
would
not
work.
Yeah.
C
D
C
C
So
I've
not
tested
that,
so
I
I
can
look
at
it,
but
I
believe
that
will
be
the
the
tricky
part
is
how
to
be
sure
we
don't.
It
doesn't
lead
us
to
to
a
completely
different
set
of
urls,
and
then
we
have
problems
with
the
directions,
because
we
have
had
already
that
problem
before.
B
B
C
Is
completely
hard
coded
and
arbitrary
hardcoded,
but
we
so
that's
some
that's
something
to
do,
but
we're
so
for
this
kind
of
change.
We
are
really
have
to
think
about
the
redirection
issue,
because
it's
a
it's
a
it's
it's
a
big
deal
because
we
don't
have
the
ants
on
the
hd
access
on
the
on
the
server.
So
we
cannot
put
a
hashtag
access
with
with
a
with
a
red
crackscroll.
It
doesn't
work
the
the
server
that
doesn't
allow
that.
C
So
we
have
to
be
very
picture
perfect
for
that,
and
then
we
have
maybe
to
prioritize
between
moving
to
the
master
bra
or
to
them
to
a
main
branch,
and
that
so
can
maybe
do
only
one
for
sprint.
C
But
I
I
I
hear
the
request
and
I
will
create
a
ticket
as
soon
as
possible
for
that
yeah.
B
C
Yeah,
because
that's
that's
not,
and
we
have,
we
have
the
bills
for
every
pull
request,
or
so
I
don't
know,
I
don't
know
if
it
would
be
helpful
for
yeah.
So
so
we
already
did
that
so
for
the
contributors,
we
already
have
the
the
the
build
in
the
pull
request,
and
I
don't
know
if,
for
the
users
it
makes
sense
to
see
the
next
version
the
next
build
correctly
but
yeah.
That's
a
good.
That's
a
good
request.
A
Questions
where
are
the
are
they
published
is
there?
Is
that
available
on
the
website?.
A
Let
me
let
me
give
a
try
like
like
how
do
we
access
to
the
to
this
published.
C
C
Yeah,
instead
of
investing,
we
have
to
enter
our
playbook.
We
have
one
for
development,
which
is
looking
at
the
at
the
current
branch
as
the
head,
where,
where
you
are
located
that
was
previously,
we
had
only
one
entire
playbook.
It
was
looking
at
head,
so
we
are,
we
had
only
one
development
playbook
and
we
used
it
for
publication.
C
D
Master
and
now
I
thought
we
could
access
to
yeah,
I
thought
we
could
access
to
like
the
previous
releases,
like.
C
C
C
B
I'm
not
exactly
so
it's
just
that.
I
don't
have
a
sort
of
a
good
experience
with
other
documentation
site
that
do
that
use
the
version
in
the
url
like
openshift,
for
example,
that
when
you
look
at
something
that
then
you
you
you
search
on
google
and
then
you
find
older
version
because
they
are
still
there.
The
old
links
with
the
old
versions,
so
yeah
and
yeah
and
code
ready
workspaces
as
well
so
on.
For
upstream.
C
C
But
yeah
this
this
change,
it's
a
it's
a
little
change
for
the
users,
but
in
terms
of
making
nick
working
it
was
a
lot
of
sweat
because
we
have
a
documentation
that
is
so
now
when
we,
when
we
release
a
branch,
we
must
also
generate
the
dogs.
C
You
know
the
dogs
that
are
generated
from
cod.
We
must
make
sure
that
this
dog
is
published
is
pushed
to
the
repository,
because
we
cannot
do
it
during
publication.
So
it's
it
must
be
in
the
code.
So
that's
that
was
also
the
big.
The
big
change
is
to
make
sure
that
when
we,
when
we
do
the
release,
we
we
changed
the
version
number
which
which
we
changed,
the
the
release
range
we
are,
we
are
searching
for
and
also
we
update
this
generated
dock
and
we
make
sure
it's
up
to
date
and
we
push
it.
C
A
I
guess
then
we
can.
We
can
switch
to
the
next
topic,
so
ssh
key
creation,
dashboard
versus
tier
editor
from
sergey.
E
E
E
That's
potentially
might
be
not
the
ideal
back
end
for
for
a
persistent
those
kind
of
data,
and
there
is
intention
to
deprecate
it
eventually
and
reason
for
that.
There
is
already
a
functionality
which
allows
to
mount
a
secret
as
a
file
and-
and
so
there
is
already
alternative
for
users
not
to
use
the
service.
We
store
in
a
database
but
use
the
kubernetes
secrets
to
store
the
ssh.
E
And
here
it
comes
to
the
more
ux
ui
question.
Whatever
we
would
like
to
keep
the
creating
ssh
keys
from
thea,
that
means
we
need
to
to
provide
necessary
permissions
to
a
workspace
service,
account
to
create
and
read
those
kinds
of
secrets
which
has
some,
I
don't
know,
might
be
difficulties
or
security
concerns
or
in
other
ways
to
put
that
responsibility
to
services
like
dashboards
which
and
give
him
each
a
necessary
permission
to
create
secrets
in
users.
Namespaces
any
that's
the
question
about
opinion.
E
B
Sorry,
what's
yeah
sergi
why
it
cannot
be
on
the
continue
to
be
on
the
chase
server
side,
but
not
stored
in
the
in
the
database,
but
stored
as
a
secret.
E
Just
that
do
you
mean
yeah,
so
let
me
think
about
so
you
wanna.
B
You
have
you
have
an
api,
so
the
chat
server
exposes
an
api
to
create
retrieve,
create
the
create
the
the
ssh
key
pair
right
and
he
doesn't
know
how
to
create.
So
he
already
has
that
implemented.
B
Okay,
the
problem
is
that
the
the
back
on
the
back
end.
We
don't
want
to
so
the
problem.
We
don't
want
to
store
it
in
the
database.
Yes,
and
we
we
need
to
change
that.
So,
yes,.
C
E
E
For
instance,
it
can
be
useful
to
set
up
a
maven
setting,
xml
or
another
secret
which
can
be
consumed
by
another
tool.
And
that's
that's
the
problem
right
now.
There
is
a
plugin
in
thea
which
can
create
an
edit
a
secret,
but
it
has
a
predefined
name
and
we
can't
use
it
to
store
ssh
keys
or
marvin
credential
or
other
tools,
which
requires
some
some
sensitive
data.
B
But
okay,
but
can
we
can
we
say
like
so?
What
about
like?
The
generation
happen
on
the
chase
server
side,
but
then
the
plugin
that
is
asked
on
the
chat
server
api
to
generate
the
key
pair.
Then
we
get
back
to
key
pair
and
is
responsible
for
persisting
it
in
a
secret.
E
Again,
I,
as
I
say,
we
can
redo
that
and
change
the
storage
from
database
and
store
it
as
us
to
grant
a
secret.
That's
we'll
close
this
issue
completely.
E
However,
again
I
I
will
next
question
would
be
how
the
user
can
create
a
settings
xml
with
the
the
credentials
to
maven,
and
it
comes
to
the
same
question:
how
how
to
create
how
user
from
ui
create
can
create
the
secrets,
in
case
kubernetes
name
space,
and
we
can't
answer
with
this
ssh
service
for
the
from
the
maiden
question.
E
A
Son
yeah,
my
opinion,
is
that
we
should
so
the
user
should
be
able
to
create
any
kind
of
files
and
store
it
as
a
secret
and
has
to
be
done
from
from
the
editor
like
when,
if
you
editing
a
settings
xml
file,
you
would
do
it
from
your
editor
right
and
same
thing.
If
you
want
to
generate
an
ssh
key,
you
would
do
it
from
either
from
the
command
line
or
from
the
editor.
So
I
don't
think
this
is
something
that
we
should
try
to
make
it
something
different
that
what
already
exists.
A
We
only
there's
already
some
tools
and
editors
that
can
generate
such
keys.
So
why
not
using
these
tools
and
then
what
the?
What
we
have
to
do
on
our
site
is
make
sure
that
it
is
stored
as
a
secret
and
having
the
right
user
interface
to
say.
Okay,
this
is
has
to
be
stored
as
a
secret
in
that
volume
on
the
mount
in
that
building.
A
So
this
is
what
we
have
to
do,
but
the
generation
part
to
me
has
to
be
done
from
the
editor
or
the
clio,
but
not
it
is
not
something
that
we
have
to
do
ourselves.
It's
not
our
the
thing
that
we
we
we
have
to
to
deal
with
right.
E
E
Another
comment
that,
what's
how
powerful
we
would
like
to
see
the
the
service,
our
space
service
account,
which
can
read
secrets
so
that
will
be
allowed
to
list
all
the
secrets,
because
recently
I
think
igor
created
in
pr
to
allow
that.
But
eventually
there
was
a
discussion
to
not
allow
to
read
all
the
secrets.
A
I
I
don't
know,
but
if
you,
if
you
go
to
github
there-
and
you
want
to
create
a
search
key
for
that,
but
access
to
that
it's
they
give
you
like
a
set
of
commands
to
do
that,
and
so
the
I
think,
the
user
that
don't
expect
you
to
do
this
or
for
them
and
people
they
want
to
create
the
ssh
by
themselves,
as
it
is
described
in
github
or
or
any
other
git
tools.
A
So
then,
whatever
the
way
we're
doing
it
has
to
be
starts
as
a
secret,
eventually
or
but
yeah.
I
think
it
has
to
be
done
from
created
by
the
user,
using
either
a
tr
plugin
or
could
be
with
on
this
under
the
cli.
The
terminal
be
able
to
do
that.
A
We
should
buy
the
so
it
should
be
straightforward
for
the
user
to
go
to
the
terminal
to
generate
sh
key
and
then
having
that
be
mounted
in
every
work
species
like
so
we
should
have
a
way
to
do
that
and
has
to
be
has
a
has
to
be
a
straightforward.
F
I
have
a
comment
on
the
question.
The
comment
is
about
multiple
editors
and
everybody
us
having
to
re-implement
in
everyone
that
the
same
is
kind
of
true.
If
we
have
contexts
in
which
we
do
not
have
a
a
dashboard
right
thinking
of
factory
link
or
something
like
that
or
we
open
a
repository,
it
has
a
dev
file
in
it.
Where
you
don't
have
a
dashboard,
then
you
have
the
same
problem.
The
second
thing
is,
the
question
is:
why
would
the
the
dashboard
be
more
secure
inherently
than
the
editor?
G
F
What
I
mean
is
this:
you
have
a
browser
and
you
run
code
right
and
you
can
manipulate
that
code
any
kind
any
way
you
want
really
right
the
front
end.
So
if
you
actually
have
a
correct,
login,
etc,
you
can
you
can
on
the
other
side,
nobody
can
tell
it's
a
browser
it
might.
It
might
be
some
heck
of
a
thing
that
does
whatever
that
presents
to
be
a
browser,
but
it's
something
else.
You
could
open
the
debugger
and
change
variables,
etc.
F
F
A
What's
wrong
with
that,
I
mean
it's
it's
their
workspace,
so
at
least
if,
if
they,
if
they
can
do
that,
it
is
a
good
fit
a
nice
feature
if
they
cannot
do
if,
at
least,
if
we
we,
what
we
should
avoid
is
people
having
access
to
other
users,
our
namespaces
and
but
for
their
own
namespace.
A
I
think
this
is
very
really
fine
to
give
a
disability.
E
That's
quite
dynamic
environment
with
the
plugins,
with
running
processes
with
the
user
in
terminal
which
potentially
provide
the
risk.
F
I
doubt
we
can
really
find
a
something
that
we
all
feel
comfortable
with
within
the
context
of
this
call,
but
it's
something
to
to
think
about.
I
think.
E
Right,
I
can
do
a
summary
for
this
topic
with
the
main
thread
and
put
something
back
at
this
point.
I
have
two
ideas
that
the
juan
morris
is
just
to
change.
The
fitbit
backhand
from
database
to
to
kubernetes
and
stance
feedback
is
to
just
allow
flying
jt
plugins
to
draw
any
kind
of
secret
door,
edit
all
necessary
operation.
A
So
what
I
would
like
to
do
is
is
having
a
new
section
in
that.
A
A
A
Yeah,
okay
and
could
be
something
like.
Let's
say
that
we
have
released,
we
have
released
in
the
latest
version
and
and
there's
a
new
feature.
A
A
She
could
add
that
to
the
to
the
to
the
meeting,
notes
and
present
it
to
the
to
the
people
to
to
you
to
me
and
then,
and
also
it
can
also
be
a
could
also
have
a
demo.
A
And
so
this
is
would
be
a
way
to
have
something
different
different
that
what
we
are
using,
what
we
are
doing
today.
So
today
we
are
just
talking
about
problems
and
topics
related
to
chad,
development,
and
that
would
be
something
which
would
be
more
about
sharing
the
new
thing
that
we
are
adding
to
che.
A
So
the
new
features
that
are
very
cool
and
that
that
you
want
to
show
to
anyone-
and
this
would
be
like
yes,
so
the
the
person
who
has
made
that
development
would
yes,
I
present
it,
and
this
is
really
optional
like.
If
you
don't
want
to
do
it,
you
don't
need.
But
if
you
want
to
show
that
you're
very
welcome
to
to
add
that
to
that
the
dutch
and
to
present
that
to
to
everyone
from
the
community,
how
does
it
sound.
B
For
that
as
well,
and
mainly
because
we
build
that
list
with
flouron,
we
review
the
feature
that
have
been
introduced
and
we
we
flagged
those
as
a
new
ad,
not
worthy.
B
So
if
we
flag
the
one
that
we
think
are
new
and
not
worthy
so
that
at
least
it's
it's
a
list
that
we
already
have
and
then
we
we
can
ask
the
person
that
has
worked
on
the
pr
to
present
that
if,
if
available
and
if
you
want
to
but
yeah
that
comes
mainly
for
for
free,
because
we
already
do
that-
and
I
don't
know
if,
for
example,
we
we
add
added
the
change
to
the
cheddar
in
the
in
the
new
and
not
worthy.
B
If
it
has
been
merged
last
week,
I
think
we
yeah
we
we
do
that
on
on
tuesday,
so
we
for
for
last
week.
We
need
to
still
to
do
that.
But
if
you
have
merged
that
before
we
probably
have
missed
that.
A
Okay,
so
if
there's
no
more
concern,
I
will
update
the
template
like
that
and
we'll
try
next
week.
A
There's
no
more
topics
we
can.
I
think
we
can
close
this
this
meeting,
so
so
thank
you,
everyone
for
attending
and
for
the
discussions,
and
I
will
publish
the
the
recording
soon
in
our
youtube
channel
and
have
a
very
good
week
and
see
you
next
week.
Goodbye
bye.