-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement autodetetion for self-signed certificate flag #301
Conversation
Latest version of Eclipse installed and tested successfully on minikube. |
deploy/crds/org_v1_che_crd.yaml
Outdated
required when activating the `tlsSupport` field on demo OpenShift | ||
clusters that have not been setup with a valid certificate for | ||
the routes. This is disabled by default. | ||
description: Obsolete. The value of this flag is ignored. Che operator |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Obsolete - Deprecated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Make changes in che_types and update olm files
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Well done
return nil, err | ||
} | ||
|
||
for i := range peerCertificates { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You can avoid using index of element and simple get element from range: for _, peerCertificate := range peerCertificates {
Latest version of Eclipse installed and tested successfully on minikube. |
2 similar comments
Latest version of Eclipse installed and tested successfully on minikube. |
Latest version of Eclipse installed and tested successfully on minikube. |
will this fix be backported to the 7.14.x branch? Seems like a great UX improvement for CRW 2.2 too |
Latest version of Eclipse installed and tested successfully on minikube. |
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Latest version of Eclipse installed and tested successfully on minikube. |
Rebased and updated OLM files |
Implement autodecetion for self-signed certificate flag Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Signed-off-by: Mykola Morhun mmorhun@redhat.com
What this PR does
Deprecates
selfSignedCert
option. CR value is present, but actually has no effect.In case of Kubernetes,
self-signed-certificate
secret is checked for presence. If it exists, then it will be propagated to Che components. Also, if no secrets are precreated, they will be generated and treated as self-signed.In case of Openshift, router certificate is examined for self-signed certificate presence. If so, then
self-signed-certificate
secret will be created and propagated to Che trust store. Otherwise, it is considered that commonly trusted certificate is used.Related issues:
eclipse-che/che#16764
Tests
Tested on: