You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Nov 28, 2022. It is now read-only.
Opening an issue here for tracking on our side of the TLS issues we're hitting in Che, there isn't anything really for us to "do" for this.
Back in the fall, changes in Theia were delivered that required HTTPS for webviews to properly function (eclipse-theia/theia#6465 (comment)). Che (and Che Theia) 7.6.0 was the first version of Che to pull this change in (eclipse-che/che#15616). This means that Codewind on Che 7.6.0 (or higher) requires Che to be installed with TLS enabled, or else the webview CSS will be broken.
When Che is deployed on a cluster using publicly signed certificates (such as on IBM Cloud), this is perfectly fine, and Codewind and Che work great with TLS enabled. However, on clusters with self-signed-certificates (like on our dev OCP4 clusters on Fyre), Che by default rejects all of the ingresses/routes with self-signed certificates. To work around that, the user has to:
Run oc get routes / kubectl get ingress and manually whitelist all of the routes/ingresses installed with Che in their browser:
If the user misses a URL here, Che does not prevent them with any errors or tells them what to do
Once they've created a workspace, they have to Run oc get routes / kubectl get ingress and manually whitelist the workspace-specific routes/ingresses in their browser as well:
Again, if the user misses a URL here, they're not presented with any errors. And each user will need to repeat this step for each Che workspace they create/access.
The current alternative to all of this, is to have the user generate their own certificate, replace the OpenShift router's default certificates with that certificate, and have each user add the root CA certificate into browser's whitelist. However, that's not an option that would be possible or acceptable for many.
johnmcollier
changed the title
TLS issues in new versions of Che prevent Codewind from supporting newer versions
Self-signed-cert issues in new versions of Che prevent Codewind from supporting newer versions
Feb 13, 2020
Adding tech-topic label as a potential workaround has been identified:
Download the cluster's router certificate from your browser
Add the certificate to your system
Set the certificate's trust to Always trust
Do we want to update our docs to tell the user to do that so that we can move up to supporting newer Che versions, or do we want until the improvements in the Che operator are in so that the above steps aren't needed?
Still need to investigate Windows/Linux, but for Firefox:
Firefox 71 and up has a newer certificate view/manager and it allows you to import the ingress-operator certificate in the browser and everything works
Firefox 70 and older don't work, and do not allow you to download the ingress-operator
Opening an issue here for tracking on our side of the TLS issues we're hitting in Che, there isn't anything really for us to "do" for this.
Back in the fall, changes in Theia were delivered that required HTTPS for webviews to properly function (eclipse-theia/theia#6465 (comment)). Che (and Che Theia) 7.6.0 was the first version of Che to pull this change in (eclipse-che/che#15616). This means that Codewind on Che 7.6.0 (or higher) requires Che to be installed with TLS enabled, or else the webview CSS will be broken.
When Che is deployed on a cluster using publicly signed certificates (such as on IBM Cloud), this is perfectly fine, and Codewind and Che work great with TLS enabled. However, on clusters with self-signed-certificates (like on our dev OCP4 clusters on Fyre), Che by default rejects all of the ingresses/routes with self-signed certificates. To work around that, the user has to:
Run
oc get routes
/kubectl get ingress
and manually whitelist all of the routes/ingresses installed with Che in their browser:If the user misses a URL here, Che does not prevent them with any errors or tells them what to do
Once they've created a workspace, they have to Run
oc get routes
/kubectl get ingress
and manually whitelist the workspace-specific routes/ingresses in their browser as well:Again, if the user misses a URL here, they're not presented with any errors. And each user will need to repeat this step for each Che workspace they create/access.
The current alternative to all of this, is to have the user generate their own certificate, replace the OpenShift router's default certificates with that certificate, and have each user add the root CA certificate into browser's whitelist. However, that's not an option that would be possible or acceptable for many.
I voiced my frustration in eclipse-che/che#15658, if anyone wants more details.
Now, there is some work being done in Che to mitigate this:
But until then, we're unable to move up Che versions that Codewind supports.
The text was updated successfully, but these errors were encountered: