-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deprecate --self-signed-cert
flag
#16764
Comments
--self-signed-cert flag
is needed--self-signed-cert flag
is needed
It would be good to autodetect whether self-signed certificate is used.
|
--self-signed-cert flag
is needed--self-signed-cert
flag
Hi @mmorhun, For Kubernetes deployment, you mentioned it is a proposed algorithm, so that means currently it is required to provide TLS certificate with the self-signed-cert option. Because, we tried option 3
by providing a real wildcard certificate, but that did not work. The only way we were able to make the deployment work was providing a self signed certificate and importing that into our browsers, which is not ideal for production. cc @sneely333 |
Hello @sujen1412, chectl server:start -n <namespace> --domain=<your-public-domain> --platform=k8s --installer=operator |
We tried to use approach described above, but it doesn't work correctly for Openshift infrastructure. Despite deployment process finishes ok, some components doesn't work properly if commonly trusted certificate is given as self-signed one. Actually router TLS certificate chain could be:
We can determine whether router TLS certificate is self-signed by analyzing the chain. But it is much harder if chain has reference to parent CA which is not included. To my mind, reasonable algorithm should be: check if we are dealing with self-signed one. If so, just propagate it to Che components as we usually do. If it is not the case, consider that the certificate is commonly trusted. I believe that such approach will cover most of the use cases. In case if Openshift cluster is configured with CA certificate which is signed by some self-signed one (or chain), administrator should take care about that and add the parent certificate into additional certificates to trust (actually add it into config map). |
@mmorhun thank you for your help. Working with @sujen1412, I have tried your suggestion but eclipse che fails to install. So my question to you or anyone else is:
My failure messages are below: Thanks and please let me know if this should be posted on a separate thread or location. events.log ends with: che.log has a significant amount of java exceptions all starting with: keycloak.log does not contain errors but does include this warning: |
Hello @sneely333
Probably yes as this ticket is for new feature (which is in progress and any implementation discussion should happen here), so posting installation issue here mixes two different topics.
By default it is a requirement, because Che has its components on subdomains. Moreover, any user created endpoint (a server within a workspace for example) will create a new ingress/route (depending on your infrastructure) which, by default, creates new subdomain.
Eclipse Che uses external route to reach Keycloak, so it could be the reason of your installation failure (and looking at the error from the provided log I see that Che server failed to query Keycloak).
No it doesn't need to chanage DNS records, but Eclipse Che creates new ingresses/routes for its endpoints. So all subdomains should point to the cluster (unless single host mode is used). |
is this being backported to 7.14.x (CRW 2.2), or only to be fixed in 7.15? |
I think we should backport this feature into Che 7.14.x branch. |
@mmorhun yes please |
Done |
Is your task related to a problem? Please describe.
The goal of this task is to deprecate using
--self-signed-cert
since it causes a lot of failed deployments of Eclipse Che in case if use forgot to set it totrue
The text was updated successfully, but these errors were encountered: