-
Notifications
You must be signed in to change notification settings - Fork 172
i1957 public certificates - Rewriting the Adding custom public SSL certificates to Che trust-store #1298
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Merged
MichalMaler
merged 13 commits into
eclipse-che:master
from
MichalMaler:i1957-public-certificates
Jun 8, 2020
Merged
i1957 public certificates - Rewriting the Adding custom public SSL certificates to Che trust-store #1298
Changes from all commits
Commits
Show all changes
13 commits
Select commit
Hold shift + click to select a range
629cab2
Rewriting the procedure
MichalMaler 5afd6b3
renaming the base .adoc file
MichalMaler 55c2b1c
Rewriting the procedure
MichalMaler f126e9b
Deleteing the original file(copy of the current one, but with the old…
MichalMaler 153df09
Rewording to a better style
MichalMaler ae44c5b
Rewording+Better markup
MichalMaler dae0ee6
Better intro
MichalMaler 5c229ca
Better ountro
MichalMaler 26c0d75
Applying Yana's suggestions
MichalMaler 857b903
atribute fix
MichalMaler 7fc28f0
Apply suggestions from code review
MichalMaler af7a45a
Removing attribute, uncommenting fixed section
MichalMaler df22509
Adding attribute for a proper synergy with downstream
MichalMaler File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
49 changes: 0 additions & 49 deletions
49
...es/che-7/installation-guide/proc_adding-custom-certificates-to-trust-store.adoc
This file was deleted.
Oops, something went wrong.
79 changes: 79 additions & 0 deletions
79
...s/che-7/installation-guide/proc_adding-self-signed-ssl-certificates-to-che.adoc
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,79 @@ | ||
--- | ||
title: Adding self-signed SSL certificates to Che | ||
keywords: | ||
tags: [] | ||
sidebar: che_7_docs | ||
permalink: che-7/adding-self-signed-SSL-certificates-to-che/ | ||
folder: che-7/installation-guide | ||
summary: | ||
--- | ||
:page-liquid: | ||
|
||
[id="adding-self-signed-SSL-certificates-to-che_{context}"] | ||
= Adding self-signed SSL certificates to {prod-short} | ||
|
||
When a {prod-short} user attempts to authenticate with {identity-provider} that is using OpenShift OAuth, the authentication fails if the {identity-provider} does not know the certificates needed for authorization. | ||
|
||
To fix this problem, configure {prod-short} to authorize HTTPS communication with various components, such as identity and Git servers, by adding information about the self-signed SSL certificates to the {prod-short} configuration. | ||
|
||
.Prerequisites | ||
|
||
* The OpenShift command-line tool, `oc` | ||
ifeval::["{project-context}" == "che"] | ||
or the Kubernetes command-line tool, `kubectl`, | ||
endif::[] | ||
is installed. | ||
|
||
.Procedure | ||
|
||
. Save the desired self-signed certificates to a local file system. | ||
|
||
. Create a new configMap with the required self-signed SSL certificates: | ||
+ | ||
[subs="+attributes,+quotes"] | ||
---- | ||
$ {orch-cli} create configmap __<configMap-name>__ --from-file=__<certificate-file-path>__ -n=__<che-namespace-name>__ | ||
---- | ||
+ | ||
To apply more than one certificate, add another `--from-file=_<certificate-file-path>_` option to the above command. | ||
|
||
. Define a name for the newly created configMap. | ||
+ | ||
NOTE: Use these steps with existing instances of {prod-short}. To install a new instance of {prod-short} with self-signed SSL certificates, create a new Che Custom Resource or Helm Chart property, based on the installation method selected, instead of updating the existing configuration. | ||
+ | ||
==== | ||
** For a {prod-short} link:https://docs.openshift.com/container-platform/latest/operators/olm-what-operators-are.html[Operators] deployment: | ||
|
||
* Define a name for the newly created configMap by editing the `spec.server.ServerTrustStoreConfigMapName` Che Custom Resource property to match the previously created configMap: | ||
+ | ||
[subs="+attributes,+quotes",options="nowrap",role=white-space-pre] | ||
---- | ||
$ {orch-cli} patch checluster eclipse-che -n che --type=json -p '[{"op": "replace", "path": "/spec/server/serverTrustStoreConfigMapName", "value": "__<config-map-name>__"}]' | ||
---- | ||
==== | ||
+ | ||
ifeval::["{project-context}" == "che"] | ||
==== | ||
** For a {prod-short} link:https://helm.sh/[Helm Chart] deployment: | ||
+ | ||
. Clone the https://github.com/eclipse/che[che] project. | ||
. Go to the `deploy/kubernetes/helm/che` directory. | ||
. Define a name for the newly created configMap by editing the `global.tls.serverTrustStoreConfigMapName` Helm Chart property to match the previously created configMap: | ||
+ | ||
[subs="+quotes",options="nowrap",role=white-space-pre] | ||
---- | ||
$ helm upgrade che -n che --set global.tls.serverTrustStoreConfigMapName=__<config-map name>__ \ | ||
--set global.ingressDomain=__<kubernetes-cluster-domain>__ . | ||
---- | ||
+ | ||
When using Minikube to run {prod-short}, substitute _<kubernetes-cluster-domain>_ with `$(minikube ip).nip.io`. | ||
==== | ||
endif::[] | ||
|
||
.Verification | ||
|
||
If the certificates have been added correctly, the {prod-short} server starts and obtains {identity-provider} configuration over HTTPS with a self-signed SSL certificate, allowing user to: | ||
|
||
* Access the {prod-short} server. | ||
* Log in using OpenShift OAuth. | ||
* Clone from a Git repository that has a custom self-signed SSL certificate over HTTPS. |
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Uh oh!
There was an error while loading. Please reload this page.