This procedure describes how to configure Che to be able to perform HTTP requests to unrecognized resources.

Procedure
  1. Save the public certificate(s) that you want to apply.

  2. Create a new configMap with the certificate(s):

    $ kubectl create configmap <config-map name> --from-file=<certificate file path> -n=che

    To apply more then one certificate, add --from-file=<certificate file path> key to the command.

  3. Define the certificates config-map name.

    If Che is deployed using a Helm Chart
    1. Clone the che project

    2. Go to deploy/kubernetes/helm/che directory

    3. Set the global.tls.serverTrustStoreConfigMapName property to previously created config-map name. To do that, add the following option to the helm upgrade command:

      $ helm upgrade che -n che --set global.tls.serverTrustStoreConfigMapName=<config-map name> --set global.ingressDomain=<kubernetes-cluster-domain> .

      <kubernetes-cluster-domain> On Minikube, use $(minikube ip).nip.io

    If Che is deployed using Operators

    Set the serverTrustStoreConfigMapName property to previously created config-map name. To do that, execute:

    $ kubectl patch checluster eclipse-che -n che --type=json -p '[{"op": "replace", "path": "/spec/server/serverTrustStoreConfigMapName", "value": "<config-map name>"}]'
Tags: