-
Notifications
You must be signed in to change notification settings - Fork 88
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Always propogate router certificate into trust store #285
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
OK with that if it has been deeply tested with running workspaces in various combinations:
- TLS on a cluster with self-signed routes
- TLS on a cluster with a valid certificate in the router.
I somehow remember that, long ago, enabling selfsignedcerts
(=> adding the self-signed certificate chain extract from a dummy route) when it was not necessary (valid cluster router CA) was leading to problems as well.
@@ -65,6 +65,7 @@ replace ( | |||
) | |||
|
|||
require ( | |||
github.com/PuerkitoBio/purell v1.1.1 // indirect |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think these unused dependencies spawns older go. We have similar discussion eclipse-che/che-machine-exec#83 (comment) I think you should use a bit newer go to avoid this.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
With newer go: go mod tidy
and you will see that newer go will remove these deps from go go.mod
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This changes is come when I build operator image in docker.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good. Only one minor comment.
@davidfestal do you remember what kind of problems causes an attempt to add commonly trusted certificate into trust store? |
Operator updates test passed |
Rebased |
…icate into trust store. Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Rebased |
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Operator updates test passed |
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
Operator updates test passed |
Closing this in favour of #301 because propagation of router certificate all the time leads to malfunction of some components in case of commonly trusted certificate. |
Signed-off-by: Mykola Morhun mmorhun@redhat.com
What this PR does
Deprecates
selfSignedCert
option. CR value is present but actually has no effect.In case of Openshift router certificate will always be propagated to Che trust store.
In case of Kubernetes certificate is generated and propagated into Che trust store unless use provides single TLS secret (no self signed one): then we consider certificate commonly trusted.
Related issues:
eclipse-che/che#16764
Tests
Tested on the following infrastructures with self-signed certificates: