Skip to content

Commit

Permalink
Better luks help
Browse files Browse the repository at this point in the history
Signed-off-by: yaacov <[email protected]>
  • Loading branch information
yaacov committed Jun 16, 2024
1 parent 1f7364e commit 23696b4
Show file tree
Hide file tree
Showing 3 changed files with 21 additions and 4 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -420,7 +420,7 @@
"Source Only": "Source Only",
"Source provider": "Source provider",
"Specifies the duration for retaining 'must gather' reports before they are automatically deleted. The default value is -1, which implies automatic cleanup is disabled.": "Specifies the duration for retaining 'must gather' reports before they are automatically deleted. The default value is -1, which implies automatic cleanup is disabled.",
"Specify a list of keys for LUKS encrypted devices in order to convert the VM.": "Specify a list of keys for LUKS encrypted devices in order to convert the VM.",
"Specify a list of keys for Linux Unified Key Setup (LUKS) encrypted devices in order to convert the VM.": "Specify a list of keys for Linux Unified Key Setup (LUKS) encrypted devices in order to convert the VM.",
"Specify the type of source provider. Allowed values are ova, ovirt, vsphere,\n openshift, and openstack. This label is needed to verify the credentials are correct when the remote system is accessible and, for RHV, to retrieve the Manager CA certificate when\n a third-party certificate is specified.": "Specify the type of source provider. Allowed values are ova, ovirt, vsphere,\n openshift, and openstack. This label is needed to verify the credentials are correct when the remote system is accessible and, for RHV, to retrieve the Manager CA certificate when\n a third-party certificate is specified.",
"Staging": "Staging",
"Start": "Start",
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ export const SetLUKSEncryptionPasswordsDetailsItem: React.FC<PlanDetailsItemProp
const luks = resource?.spec?.vms?.[0].luks;

const defaultHelpContent = t(
`Specify a list of keys for LUKS encrypted devices in order to convert the VM.`,
'Specify a list of keys for Linux Unified Key Setup (LUKS) encrypted devices in order to convert the VM.',
);

return (
Expand All @@ -39,6 +39,7 @@ export const SetLUKSEncryptionPasswordsDetailsItem: React.FC<PlanDetailsItemProp
)
}
helpContent={helpContent ?? defaultHelpContent}
moreInfoLink={'https://libguestfs.org/virt-v2v.1.html'}
crumbs={['spec', 'vms', 'luks']}
onEdit={
canPatch &&
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6,8 +6,9 @@ import {
EditModalProps,
ModalInputComponentType,
} from 'src/modules/Providers/modals';
import { useForkliftTranslation } from 'src/utils/i18n';
import { ForkliftTrans, useForkliftTranslation } from 'src/utils/i18n';

import { ExternalLink } from '@kubev2v/common';
import {
IoK8sApiCoreV1Secret,
Modify,
Expand Down Expand Up @@ -84,7 +85,22 @@ export const EditLUKSEncryptionPasswords: React.FC<EditLUKSEncryptionPasswordsPr
onConfirmHook={onLUKSEncryptionPasswordsConfirm}
body={
<>
{t(`Specify a list of keys for LUKS encrypted devices in order to convert the VM.`)}
<ForkliftTrans>
<p>
Specify a list of keys for Linux Unified Key Setup (LUKS) encrypted devices in order
to convert the VM.
</p>
<br />
<p>
If you use more then one passphrase, you can add more then one passphrase, migration
toolkit for virtualization (MTV) will try each passphrase until one will unlock the
device,{' '}
<ExternalLink isInline href="https://libguestfs.org/virt-v2v.1.htm">
learn more
</ExternalLink>
.
</p>
</ForkliftTrans>
{!allVMsHasMatchingLuks && (
<AlertMessageForModals
variant="warning"
Expand Down

0 comments on commit 23696b4

Please sign in to comment.