Deprecate `--self-signed-cert` flag
See original GitHub issueIs your task related to a problem? Please describe.
The goal of this task is to deprecate using --self-signed-cert
since it causes a lot of failed deployments of Eclipse Che in case if use forgot to set it to true
Issue Analytics
- State:
- Created 3 years ago
- Reactions:1
- Comments:10 (8 by maintainers)
Top Results From Across the Web
SHA-1 deprecation and self-signed certificates
Browsers have always flagged self-signed certificates because the certificate has not been digitally signed by a trusted Certificate Authority. Starting in June ...
Read more >Ignore invalid self-signed ssl certificate in node.js with https ...
After some digging, I started using NODE_EXTRA_CA_CERTS=A_FILE_IN_OUR_PROJECT that has a PEM format of our self signed cert and all my scripts are working ......
Read more >I get "Certificate is not trusted because it is self-signed" error ...
If the certificate is self-signed, it will contain your company name/your web hosting provider company name/your server name, etc (see fig. 2). You...
Read more >Self-signed certificates or custom Certification Authorities
Supported options for self-signed certificates targeting the GitLab server ... Specify a custom certificate file: GitLab Runner exposes the tls-ca-file ...
Read more >Changing the certificate provided by the IBM MQ Console to ...
Doing this removes the self-signed certificate warning presented by a web browser ... This shows you the concept but does not remove the...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
Hello @sneely333
Probably yes as this ticket is for new feature (which is in progress and any implementation discussion should happen here), so posting installation issue here mixes two different topics.
By default it is a requirement, because Che has its components on subdomains. Moreover, any user created endpoint (a server within a workspace for example) will create a new ingress/route (depending on your infrastructure) which, by default, creates new subdomain. However, there is a possibility to use single-host strategy installation which is under active development now. You may try it as well.
Eclipse Che uses external route to reach Keycloak, so it could be the reason of your installation failure (and looking at the error from the provided log I see that Che server failed to query Keycloak). P.S. You may try to use external Keycloak, though. Please refer docs. But it is easier to set up network for Che to be able to reach default Keycloak.
No it doesn’t need to chanage DNS records, but Eclipse Che creates new ingresses/routes for its endpoints. So all subdomains should point to the cluster (unless single host mode is used).
It would be good to autodetect whether self-signed certificate is used. However, because we use different approaches for Kubernetes and Openshift, solutions have to be different too.
che-tls
and noself-signed-certificate
secrets, treat it as self-signed certificate case and generate the secrets.che-tls
present butself-signed-certificate
missing, treat it as a real certificate use case.che-tls
missing butself-signed-certificate
present, treat it as invalid state, delete existingself-signed-certificate
and generate the pair.