-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
How are TLS certificates propagated? #19318
Comments
1. In what folder of the workspace containers are those certificates mounted?When a new workspace is started the following happens:
|
4. What's the self-signed-cert secret for?For OpenShift
For KubernetesSee #19318 (comment) It is mounted as:
[1] https://github.com/eclipse/che/blob/master/dockerfiles/che/entrypoint.sh#L325-L329 |
@l0rd @azatsarynnyy |
3. How a che-theia plugin or a che editor can trust those certs?Che-Theia reads those certificates from a known location ( [1] https://github.com/eclipse/che-theia/blob/abb6768e3bab88047dd5629fb7546ec9274cd470/extensions/eclipse-che-theia-remote-impl-k8s/src/node/k8s-certificate-service-impl.ts#L29 |
@tolusha question n.2 is about what happens if an admin sets
|
2. How do we specify TLS key and certificate to be used by Che ingress/routes (and to be trusted too)?
|
I know nothing about the severity of this issue so I'll just set P1 so that the reporter or SMEs can comment and set the prio appropriately. Yaya round robin by nonSMEs! |
@mmorhun thank you for the detailed explanation. This is useful. You mentioned that when an administrator specifies |
Referenced in https://issues.redhat.com/browse/RHDEVDOCS-2841 |
@l0rd |
Issues go stale after Mark the issue as fresh with If this issue is safe to close now please do so. Moderators: Add |
Summary
This is actually a clarification that replaces this issue. It may end up or not in a doc article.
Relevant information
In this doc article it's explained how to import custom TLS certificates in Che so that those are trusted: an admin needs to create configmaps from the CA public certs files and add the following labels:
app.kubernetes.io/part-of=che.eclipse.org
app.kubernetes.io/component=ca-bundle
but then it's not clear how Che propagates the certificates in the workspace pod.
The text was updated successfully, but these errors were encountered: