-
Bug
-
Resolution: Done
-
Critical
-
CRW 2.4.0
-
devex docs #192 Oct 29-Nov 19, devex docs #193 Nov 19-Dec 10, devex docs #194 Dec 7-Jan 4, devex docs #195 Jan 4-Jan 21
-
5
-
Undefined
-
---
-
---
Is your enhancement related to a problem? Please describe.
The documentation "Using artifact repositories in a restricted environment" describes how to use artifact repositories that use TLS certificates signed by untrusted certificate authorities. The procedure is:
- Obtain the untrusted certificate
- Upload the certificate in a folder under `/projects/` of the workspace pod
- Patch a devfile with the instructions to make the certificates trusted
This procedure can be simplified if the untrusted certificates are provided to Che operator using a ConfigMap referenced in CheCluster server.serverTrustStoreConfigMapName or, on OpenShift, included in the system trusted CA bundle. In those cases the certificates are automatically mounted in the workspace containers under /public-certs.
Describe the solution you'd like
We should reference the documentation that explains how to import untrusted SSL certificates (currently being reworked here) and describe the extra steps required so that the TLS certificates under /public-certs are trusted by the dependency managers (maven, gradle etc...).
Steps "Obtain the untrusted certificate", "Upload the certificate in a folder under /projects of the workspace pod" should be removed.
Describe alternatives you've considered
The extra steps required so that the TLS certificates under public-certs are trusted by the dependency managers (maven, gradle etc...) can be automated too. We will create a separate issue for that.