Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Also copy the content of the truststore config map to the workspace namespace (port from 7.20.x) #18280

Merged
merged 1 commit into from
Nov 5, 2020

Conversation

mshaposhnik
Copy link
Contributor

@mshaposhnik mshaposhnik commented Nov 4, 2020

What does this PR do?

This PR allows correctly propagating up to the workspace, the content of the trusted CA bundle configured

Screenshot/screencast of this PR

What issues does this PR fix or reference?

How to test this PR?

  • Install Che
  • Create a my-ca-certs config map with 1 key name my.crt and an untrusted certificate as value
  • Set the spec.server.ServerTrustStoreConfigMapName of the CheCluster custom resource to the name of the my-ca-certs config map
  • Wait for the Che server restart
  • Start a workspace
  • Check that the namespace of the workspace contains a ca-certs config map that contains a ca-bundle.crt key (with OpenShift-injected certificates) and the my.crt key with your untrusted certificate as a value.

PR Checklist

As the author of this Pull Request I made sure that:

Reviewers

Reviewers, please comment how you tested the PR when approving it.

…amespace (#18264)

* Allow copying also the content of the config map
* Use the `CheServerKubernetesClientFactory` to have the permission to read the config map from the Che server namespace 
* Move constructor parameters as requested by @mshaposhnik
* Additional change requested by @mshaposhnik

Signed-off-by: David Festal <dfestal@redhat.com>
@che-bot che-bot added the status/code-review This issue has a pull request posted for it and is awaiting code review completion by the community. label Nov 4, 2020
@che-bot
Copy link
Contributor

che-bot commented Nov 4, 2020

✅ E2E Happy path tests succeed 🎉

See Details

Tested with Eclipse Che Multiuser User on K8S (minikube v1.1.1)

  • Use comment "[crw-ci-test]" to rerun happy path E2E test.
  • Use comment "[crw-ci-test --rebuild]" to re-build the images and rerun happy path E2E test.

@mshaposhnik mshaposhnik merged commit 6c03073 into eclipse-che:master Nov 5, 2020
@mshaposhnik mshaposhnik deleted the port_ca_certs branch November 5, 2020 09:12
@che-bot che-bot removed the status/code-review This issue has a pull request posted for it and is awaiting code review completion by the community. label Nov 5, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

5 participants