question-mark
Stuck on an issue?

Lightrun Answers was designed to reduce the constant googling that comes with debugging 3rd party libraries. It collects links to all the places you might be looking at while hunting down a tough bug.

And, if you’re still stuck at the end, we’re happy to hop on a call to see how we can help out.

Deprecate `--self-signed-cert` flag

See original GitHub issue

Is your task related to a problem? Please describe.

The goal of this task is to deprecate using --self-signed-cert since it causes a lot of failed deployments of Eclipse Che in case if use forgot to set it to true

Issue Analytics

  • State:closed
  • Created 3 years ago
  • Reactions:1
  • Comments:10 (8 by maintainers)

github_iconTop GitHub Comments

1reaction
mmorhuncommented, Jun 3, 2020

Hello @sneely333

please let me know if this should be posted on a separate thread or location

Probably yes as this ticket is for new feature (which is in progress and any implementation discussion should happen here), so posting installation issue here mixes two different topics.

Can eclipse che use a wildcard cert for che-tls?

By default it is a requirement, because Che has its components on subdomains. Moreover, any user created endpoint (a server within a workspace for example) will create a new ingress/route (depending on your infrastructure) which, by default, creates new subdomain. However, there is a possibility to use single-host strategy installation which is under active development now. You may try it as well.

Does eclipse che require any ports originating from the internet in order to complete the installation?

Eclipse Che uses external route to reach Keycloak, so it could be the reason of your installation failure (and looking at the error from the provided log I see that Che server failed to query Keycloak). P.S. You may try to use external Keycloak, though. Please refer docs. But it is easier to set up network for Che to be able to reach default Keycloak.

Does eclipse che need to be able to modify the dns of a domain in order to run?

No it doesn’t need to chanage DNS records, but Eclipse Che creates new ingresses/routes for its endpoints. So all subdomains should point to the cluster (unless single host mode is used).

1reaction
mmorhuncommented, May 25, 2020

It would be good to autodetect whether self-signed certificate is used. However, because we use different approaches for Kubernetes and Openshift, solutions have to be different too.

  • Openshift. We use router certificate to secure endpoints. So using or not self-signed certificate completely depends on the certificate type with which Openshift cluster is provisioned. Che admin just cannot control it with current approach. As Openshift clusters are often provisioned with self-signed certificates, it makes sense to turn the option by default. With such approach, in case of real certificate, we’ll be adding a CA which is already trusted. It shouldn’t do any harm.
  • Kubernetes. For Kubernetes platform it is required to provide TLS certificate for Che. It is proposed to use the following algorithm:
    • If there is no che-tls and no self-signed-certificate secrets, treat it as self-signed certificate case and generate the secrets.
    • If both secrets present, consider the case as self-signed certificate option.
    • If che-tls present but self-signed-certificate missing, treat it as a real certificate use case.
    • If che-tls missing but self-signed-certificate present, treat it as invalid state, delete existing self-signed-certificate and generate the pair.
Read more comments on GitHub >

github_iconTop Results From Across the Web

SHA-1 deprecation and self-signed certificates
Browsers have always flagged self-signed certificates because the certificate has not been digitally signed by a trusted Certificate Authority. Starting in June ...
Read more >
Ignore invalid self-signed ssl certificate in node.js with https ...
After some digging, I started using NODE_EXTRA_CA_CERTS=A_FILE_IN_OUR_PROJECT that has a PEM format of our self signed cert and all my scripts are working ......
Read more >
I get "Certificate is not trusted because it is self-signed" error ...
If the certificate is self-signed, it will contain your company name/your web hosting provider company name/your server name, etc (see fig. 2). You...
Read more >
Self-signed certificates or custom Certification Authorities
Supported options for self-signed certificates targeting the GitLab server ... Specify a custom certificate file: GitLab Runner exposes the tls-ca-file ...
Read more >
Changing the certificate provided by the IBM MQ Console to ...
Doing this removes the self-signed certificate warning presented by a web browser ... This shows you the concept but does not remove the...
Read more >

github_iconTop Related Medium Post

No results found

github_iconTop Related StackOverflow Question

No results found

github_iconTroubleshoot Live Code

Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free

github_iconTop Related Reddit Thread

No results found

github_iconTop Related Hackernoon Post

No results found

github_iconTop Related Tweet

No results found

github_iconTop Related Dev.to Post

No results found

github_iconTop Related Hashnode Post

No results found