Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: Update che-operator description #1283

Merged
merged 1 commit into from
Jan 11, 2022
Merged

chore: Update che-operator description #1283

merged 1 commit into from
Jan 11, 2022

Conversation

tolusha
Copy link
Contributor

@tolusha tolusha commented Jan 10, 2022

Signed-off-by: Anatolii Bazko abazko@redhat.com

What does this PR do?

Update che-operator description

Screenshot/screencast of this PR

    A collaborative Kubernetes-native development solution that delivers OpenShift workspaces and in-browser IDE for rapid cloud application development.
    This operator installs PostgreSQL, Plugin and Devfile registries, Dashboard, Gateway and the Eclipse Che server, as well as configures all these services.
    OpenShift OAuth is used directly for authentication. TLS mode is on.

    ## How to Install
    Press the **Install** button, choose the channel and the upgrade strategy, and wait for the **Installed** Operator status.
    When the operator is installed, create a new Custom Resource (CR) of Kind CheCluster (click the **Create New** button).
    The CR spec contains all defaults. You can start using Eclipse Che when the CR status is set to **Available**, and you see a URL to Eclipse Che.

    ## Defaults
    By default, the operator deploys Eclipse Che with:
    * 10Gi storage
    * Auto-generated passwords
    * Bundled PostgreSQL
    * Bundled Plugin and Devfile registries

    Use `oc edit checluster/eclipse-che -n eclipse-che` to update Eclipse Che default installation options.
    See more in the [Installation guide](https://www.eclipse.org/che/docs/che-7/installation-guide/configuring-the-che-installation/).

    ### Certificates
    Operator uses a default router certificate to secure Eclipse Che routes.
    Follow the [guide](https://www.eclipse.org/che/docs/che-7/installation-guide/importing-untrusted-tls-certificates/)
    to import certificates into Eclipse Che.

What issues does this PR fix or reference?

eclipse-che/che#20981

How to test this PR?

N/A

PR Checklist

As the author of this Pull Request I made sure that:

Reviewers

Reviewers, please comment how you tested the PR when approving it.

Signed-off-by: Anatolii Bazko <abazko@redhat.com>
@codecov
Copy link

codecov bot commented Jan 10, 2022

Codecov Report

Merging #1283 (b1a187e) into main (bb3c53c) will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##             main    #1283   +/-   ##
=======================================
  Coverage   56.97%   56.97%           
=======================================
  Files          84       84           
  Lines        8760     8760           
=======================================
  Hits         4991     4991           
  Misses       3273     3273           
  Partials      496      496           

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update bb3c53c...b1a187e. Read the comment docs.

@@ -375,36 +375,23 @@ spec:
version: v1
description: |
A collaborative Kubernetes-native development solution that delivers OpenShift workspaces and in-browser IDE for rapid cloud application development.
This operator installs PostgreSQL, Keycloak, Plugin registry, Devfile registry and the Eclipse Che server, as well as configures all three services.
This operator installs PostgreSQL, Plugin and Devfile registries, Dashboard, Gateway and the Eclipse Che server, as well as configures all these services.
OpenShift OAuth is used directly for authentication. TLS mode is on.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

TLS mode is on

Do we still support non TLS mode? If no, maybe just drop the phrase or say that it just uses HTTPS for external routes.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't support non TLS mode. I've added this phrase just to emphasize

@openshift-ci
Copy link

openshift-ci bot commented Jan 11, 2022

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by: AndrienkoAleksandr, mmorhun, tolusha

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@tolusha tolusha merged commit a1d0d2d into main Jan 11, 2022
@tolusha tolusha deleted the updatedesc branch January 11, 2022 10:36
@che-bot che-bot added this to the 7.42 milestone Jan 11, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants