Commit Graph

222 Commits (main)

Author SHA1 Message Date
che-bot 9bbb5eab8e
[release] Bump to 7.16.0-SNAPSHOT in master (#17249)
Signed-off-by: Mykhailo Kuznietsov <mkuznets@redhat.com>

Co-authored-by: Mykhailo Kuznietsov <mkuznets@redhat.com>
2020-06-26 18:10:09 +03:00
che-bot 5c580b1875
[release] Bump to 7.15.0-SNAPSHOT in master (#17085)
Signed-off-by: Mykhailo Kuznietsov <mkuznets@redhat.com>
2020-06-04 13:24:48 +03:00
che-bot 0419084717
[release] Bump to 7.14.0-SNAPSHOT in master (#16931)
Signed-off-by: Mykhailo Kuznietsov <mkuznets@redhat.com>

Co-authored-by: Mykhailo Kuznietsov <mkuznets@redhat.com>
2020-05-18 12:41:27 +03:00
Sergii Kabashniuk 93ba5ef2f3
Rebalancing maven module execution order (#16497)
Signed-off-by: Sergii Kabashniuk <skabashniuk@redhat.com>
2020-05-06 14:54:38 +02:00
Mykhailo Kuznietsov fa9f6d5eba
[release] bump master to 7.13.0-SNAPSHOT (#16739)
Signed-off-by: Mykhailo Kuznietsov <mkuznets@redhat.com>
2020-04-24 14:40:41 +03:00
Mykhailo Kuznietsov 07eafb32a3
[release] Bump to 7.12.0-SNAPSHOT in master (#16562)
Signed-off-by: Mykhailo Kuznietsov <mkuznets@redhat.com>
2020-04-08 13:13:48 +03:00
Vitalii Parfonov 55ac5964dd
Set next development version (#16309)
Signed-off-by: Vitalii Parfonov <vparfono@redhat.com>
2020-03-13 21:34:45 +02:00
Mykhailo Kuznietsov c3f09baac0
[release] Bump to 7.10.0-SNAPSHOT in master branch (#16081)
Signed-off-by: Mykhailo Kuznietsov <mkuznets@redhat.com>
2020-02-20 12:28:58 +02:00
Vitalii Parfonov 987e484c06
Set new development version in master branch (#15880) 2020-01-30 15:38:59 +02:00
Vitalii Parfonov dcf2e1ee5f
RELEASE: Set next development version (#15632) 2020-01-09 13:51:20 +02:00
Vitalii Parfonov fce1fe9e2c
RELEASE: Set next development version (#15528) 2019-12-19 11:07:35 +02:00
Max Shaposhnik ce64b1966e
Restructurize auth modules and remove reduntant one 2019-12-11 11:19:54 +02:00
Vitalii Parfonov 6cabdeff4d
RELEASE: Set next development version (#15360) 2019-11-29 10:27:33 +02:00
Max Shaposhnik 11bbcf0c10
Use cached sessions behind any of the login filters 2019-11-09 09:50:54 +02:00
Vitalii Parfonov e5d31ff913
RELEASE: Set next development version (#15141) 2019-11-07 17:14:27 +02:00
Vitalii Parfonov 41d48bf2de
RELEASE: Set next development version (#14904) 2019-10-17 15:45:06 +03:00
Vitalii Parfonov 4e1492b08f
RELEASE: Set next development version (#14690) 2019-09-27 22:52:26 +03:00
Roman Iuvshyn 87056fe29e RELEASE: Set next development version 2019-09-05 14:54:52 +02:00
Vitalii Parfonov ae8fedc411
RELEASE: Set next development version (#14238) 2019-08-14 19:32:18 +03:00
Vitalii Parfonov 03da1e24e4
RELEASE: Set next development version (#14026) 2019-07-25 15:43:30 +03:00
Sergii Kabashniuk 79c6ec0703
Initial cleanup of che6 legacy code (#13788)
cleanup of che6 legacy code

Signed-off-by: Sergii Kabashniuk <skabashniuk@redhat.com>

* Remove/disable GWT-related code in Java selenium E2E tests (#13829)

Signed-off-by: Dmytro Nochevnov <dnochevn@redhat.com>
2019-07-23 15:12:27 +02:00
Fabrice Flore-Thébault 939dfbe016 fix #13660 - Replace mentions of 'oAuth', by more accurate 'OAuth'. (See https://oauth.net/) (#13664)
Signed-off-by: Fabrice Flore-Thébault <ffloreth@redhat.com>
2019-07-10 11:31:09 +02:00
Vitalii Parfonov ccc8e38823
RELEASE: Set next development version (#13711) 2019-07-05 13:08:59 +03:00
Vitalii Parfonov 385c21284d
Set version 7.0.0-rc-3.0-SNAPSHOT (rc in lowercase) (#13655)
Signed-off-by: Vitalii Parfonov <vparfono@redhat.com>
2019-07-01 17:40:14 +03:00
Vitalii Parfonov 65bb7943a0
Set new version 7.0.0-RC-3.0-SNAPSHOT (#13651)
Signed-off-by: Vitalii Parfonov <vparfono@redhat.com>
2019-07-01 14:02:19 +03:00
Vitalii Parfonov 70c3e5b091
RELEASE: Set next development version (#13564) 2019-06-19 12:55:16 +03:00
Vitalii Parfonov 64129a8d44
RELEASE: Set next development version (#13460) 2019-06-03 16:28:42 +03:00
Roman I dd1d9b5a58
switch to RC version scheme (#13424) 2019-05-28 13:52:49 +03:00
Max Shaposhnik c90a52941a
Restore account linking on newest keycloak versions
Signed-off-by: Max Shaposhnik <mshaposh@redhat.com>
2019-05-23 10:32:57 +03:00
Roman I ffb8a3e013
RELEASE: Set next development version (#13377) 2019-05-22 09:52:28 +03:00
Roman Iuvshyn 53cb2c53fa
RELEASE: Set next development version (#13264) 2019-05-05 12:24:42 -04:00
Roman Iuvshyn e60598bdaf
RELEASE: Set next development version (#13102) 2019-04-10 17:13:01 +03:00
Sergii Kabashniuk f95947ad5d
Move master related code out of plugins (#13004)
* Move master related code out of plugins

Signed-off-by: Sergii Kabashniuk <skabashniuk@redhat.com>
2019-03-29 14:05:31 +02:00
Roman Iuvshyn 0abdc77ea0
RELEASE: Set next development version (#12922) 2019-03-19 15:56:30 +02:00
Sergii Kabashniuk 315767ea5d
NopTracer is used if tracing is not enabled (#12897)
* NopTracer is used in tracing is not enabled

Signed-off-by: Sergii Kabashniuk <skabashniuk@redhat.com>
2019-03-19 09:44:49 +02:00
Roman Iuvshyn 0881493644
RELEASE: Set next development version (#12777) 2019-02-27 16:02:33 +02:00
Roman Iuvshyn 3778f01220
RELEASE: Set next development version (#12768) 2019-02-27 11:50:40 +02:00
Mykhailo Kuznietsov 3bef71020f
Adding tracing tags to workspace related operations (#12652)
Signed-off-by: Mykhailo Kuznietsov <mkuznets@redhat.com>
2019-02-25 12:11:25 +02:00
Roman Iuvshyn a694c4f971
RELEASE: Set next development version (#12596) 2019-02-06 18:22:35 +02:00
Roman Iuvshyn 4ad10f2218
RELEASE: Set next development version (#12441) 2019-01-16 11:51:02 +02:00
Roman Iuvshyn b872b317cb
RELEASE: Set next development version (#12277) 2018-12-26 13:04:51 +02:00
Roman Iuvshyn 45490d2a3b
RELEASE: Set next development version (#12115) 2018-12-05 18:33:02 +02:00
Roman Iuvshyn 99afaef87f
RELEASE: Set next development version (#11930) 2018-11-14 12:29:03 +02:00
Roman Iuvshyn 365d25f275
RELEASE: Set next development version (#11710) 2018-10-24 16:38:03 +03:00
David Festal 534a961e84
Provide better compatibility with alternate OIDC providers (#11090)
Currently in Che there are still a number of requirements in upstream that are not required by the OIDC specification, so that Che still cannot be used with a number of OIDC compliant providers.
For example, in order to have Che working with the [`node-oidc-provider`](https://github.com/panva/node-oidc-provider), the following changes were necessary:

- Remove the requirement to have the email as a claim in the JWT access
token: this is not required the specification and is not supported by a
number of OIDC providers. Normally, the Id token contains such claims.

  So now if the email is not in the JWT token the first time the user connects to Che, ten the email is retrieved from the OIDC provider through its `user-profile` endpoint.

- Explicitely specify the the `openid email profile` scope when requesting the access token. Because OIDC providers, when answering to the `userInfo` endpoint, are expected to return claims that corresponds to the scopes of the access token. So if an access token has the `openid` scope only, the `userinfo` might return no claim at all (according to the specification).

  Until now it was working since keycloak allows adding claims to the returned tokens anyway.

- Allow supporting fixed redirect Uris: most OIDC providers support having a list of redirect URIs to come back to after the authorization step.  But these authorized Uris don't necessarily support wildcards or prefix. Che doesn't support this currently, and these changes introduce 2 fixed callback HTML pages that redirect to the Dashboard / IDE URL of the final page we want to come back to after authentication. This makes Che compatible with more OIDC providers

  We introduced a new boolean property to enable / disable fixed redirect URLs:
  `che.keycloak.use_fixed_redirect_urls` 
  whose default value is `false`

- The previous points required some light changes in the Keycloak Javascript adapter file, that we will submit as a PR to the Keycloak project. I, the meantime the `OIDCKeycloak.js` file is still used, but has been updated to be now based on the `keycloak.js` file of the last `4.5.0-final` Keycloak release. This will make this Keycloak PR easier to get accepted.

  Please keep in mind that this version upgrade only impacts the alternate OIDC provider case: when using a real Keycloak server, Che *always uses the `keycloak.js` file provided by the Keycloak server*. 


Signed-off-by: David Festal <dfestal@redhat.com>
2018-10-10 20:52:35 +02:00
Sergii Kabashniuk 65bd65e23b Upgrade to new dependency mockito-testng (#10647) 2018-10-10 13:58:33 +03:00
Roman Iuvshyn 63b389c2fe
RELEASE: Set next development version (#11434)
* RELEASE: Set next development version
2018-10-04 18:25:39 +03:00
Max Shaposhnik f838ea5a60
Add extra workspace existence check before creating keypair 2018-09-19 16:59:22 +03:00
Roman Iuvshyn ea410c3340
RELEASE: Set next development version (#11169) 2018-09-12 11:53:42 +03:00
Sergii Leshchenko 6a55994f07 Fix scope of test dependencies
It allows to build a project without tests compiling
2018-09-04 11:07:00 +03:00
Sergii Leshchenko 2c7bfd4ff9 Move exclude of OIDCKeycloak.js to mapping instead of Filter class 2018-08-30 10:16:43 +03:00
Max Shaposhnik 409c389eb4
Show meaningful message when we cannot authenticate user (due to absend email or other error) (#10889) 2018-08-24 08:39:35 +03:00
Roman Iuvshyn d99b2ed73d
RELEASE: Set next development version (#10867)
* RELEASE: Set next development version
2018-08-22 12:06:38 +03:00
Max Shaposhnik 47b8ed328b
Make machine token signing key per-workspace & renew them after each ws restart 2018-08-20 09:51:04 +03:00
Victor V. Rubezhny 57c43ac8cd Update fmt plugin to latest to enable skipping check #10554 (#10667)
The files are reformatted in order to suit the requirements of coveo maven fmt plug-in of v.2.5.1

Signed-off-by: Victor Rubezhny <vrubezhny@redhat.com>
2018-08-08 07:20:05 +00:00
Sergii Leshchenko 5ca81b7592 Fix binding of UnavailableResourceInMultiUserFilter for ProfileService's methods
Previously, it banned only update profile attributes of the specified user
(PUT /profile/{USER_ID}/attributes) but methods related to current user
were still available (DELETE /profile/attributes and PUT
/profile/attributes)
2018-08-07 09:02:28 +03:00
Sergii Leshchenko a69162da89 CHE-10620 Add an ability to remove user when third-party user management service is configured 2018-08-07 09:02:28 +03:00
Roman Iuvshyn 60da580c92
RELEASE: Set next development version (#10603) 2018-08-02 12:38:48 +03:00
Mykhailo Kuznietsov 07263f1e30
Fix license header text (#10629) 2018-08-02 11:18:04 +03:00
Mykhailo Kuznietsov 15d23edc91
Update license to EPL 2.0 (#10531) 2018-07-31 11:24:36 +03:00
Roman Iuvshyn 985d368f2d
RELEASE: Set next development version (#10345)
* RELEASE: Set next development version
2018-07-10 15:56:52 +03:00
Sergii Leshchenko fef7cc44e6
Fix scope of test dependencies (#10254) 2018-07-04 11:23:20 +03:00
Roman Iuvshyn d7e1c73cf8
RELEASE: Set next development version (#10110) 2018-06-19 17:24:50 +03:00
i300543 34e6ab326f Improve wsmaster OpenIdConnect configurability, and helm deployment scripts (#9826)
* Improve wsmaster OpenIdConnect configurability, and helm deployment scripts
- Make username claim configurable  in cases
  Oidc provider does not support the default claim (default is "preferred_user")
- Introduce fallback for username (issuer+subject) if the username claim is not present
  in the token
- Extend helm scripts to take customOidcProvider and customOidcUsernameClaim
  parameters into account when deploying che master.
- Introduce cheDedicatedKeycloak global param, conditioning if dedicated che
  keycloak server should be deployed, and waited on by the master.
- default value for cheDedicatedKeycloak (if not defined) is true
  if the cheDedicatedKeycloak parameter is defined and is false,
  customOidcProvicer must be supplied, when using multiuser mode.

Signed-off-by: Sergey Kuperman <sergey.kuperman@sap.com>

* Code review fixes

Remove the extra if condition in configmap.yaml
Remove extra line in requirements.yaml
fix typo in deployment.yaml

* Add che.keycloak.username_claim property as NULL into multiuser.properties

* Simplify helm conditions, when deploying che master with or without keycloak

if multiuser = true, and .Values.customOidcProvider was supplied, assumption is that
we work with no keycloak (no waiting in deployment)

global.cheDedicatedKeycloak is still needed as separate variable for requirements.yaml to determine whether keycloak chart should be installed

so for keycloak deployment, no parameters need to be passed beside global.multiuser=true,
for custom OIDC :
.Values.customOidcProvider=http://url, and global.cheDedicatedKeycloak=false
both need to be set
2018-06-06 10:35:04 +03:00
Roman Iuvshyn 7231585f4b
RELEASE: Set next development version (#9862) 2018-05-30 12:01:54 +03:00
David Festal e0890235fa
Allow creating OpenShift objects under the current user account on OCP (#9577)
* Support identity provider token retrieval in both JSON or URL formats.

That's required because some identity providers (such a `openshift-v3`)
correctly return the token information in JSON, as expected. So
switching to the url-based syntax should only used when the returned
json is invalid.

Signed-off-by: David Festal <dfestal@redhat.com>

* Introduce an `OpenShiftClientConfigFactory` to allow customizing the OpenShift config returned according to the current context (workspace ID, current user)

Signed-off-by: David Festal <dfestal@redhat.com>

* Openshift Infra + Multi-user => allow using OpenShift identity provider to connect to openshift with the OS oauth token of the current Che user.

This introduces a new property:

`che.infra.openshift.oauth_identity_provider`

Signed-off-by: David Festal <dfestal@redhat.com>

* Notify the user when a workspace cannot be started from the nav bar.

Signed-off-by: David Festal <dfestal@redhat.com>

* Add the ability to install the Openshift certificate into Keycloak

Signed-off-by: David Festal <dfestal@redhat.com>

* Add a yaml file to provide the openshift certificate as a secret,

in case it has to be installed into the dedicated Keycloak server.

Then the commands to install Che multiuser on Minishift with this
certificate are:

```
oc new-project che

oc process -f multi/openshift-certificate-secret.yaml -p
CERTIFICATE="$(minishift ssh docker exec origin /bin/cat
./openshift.local.config/master/ca.crt)" | oc apply -f -; \
oc new-app -f multi/postgres-template.yaml; \
oc new-app -f multi/keycloak-template.yaml -p ROUTING_SUFFIX=$(minishift
ip).nip.io; \
oc apply -f pvc/che-server-pvc.yaml; \
oc new-app -f che-server-template.yaml -p ROUTING_SUFFIX=$(minishift
ip).nip.io -p CHE_MULTIUSER=true -p
CHE_INFRA_OPENSHIFT_OAUTH__IDENTITY__PROVIDER=openshift-v3; \
oc set volume dc/che --add -m /data --name=che-data-volume
--claim-name=che-data-volume
```

Of course it's still needed to register the `openshift-v3` identity
provider in the Keycloak server, as well as, add the corresponding
`OAuthClient` object in Minihshift.

Signed-off-by: David Festal <dfestal@redhat.com>
2018-05-28 11:39:44 +02:00
Mykhailo Kuznietsov cd99cf4e6c
Add ability to configure OAuth type in Multi User Che (#9640) 2018-05-14 17:37:14 +03:00
Roman Iuvshyn 6677e27a6b
RELEASE: Set next development version (#9669) 2018-05-11 10:27:31 +03:00
Sergii Leshchenko da69099743
Add processing of runtime exceptions during JWT tokens validation (#9557)
* Add processing of runtime exceptions during JWT tokens validation

It is needed to set correct 403 response code instead of 500.
Also added response message to notify a client about error reason.
2018-05-02 15:18:34 +03:00
David Festal c66d349728
Skip authentication for the `OIDCKeycloak.js` file (Fix regression) (#9505)
Skip authentication for the `OIDCKeycloak.js` file

Signed-off-by: David Festal <dfestal@redhat.com>
2018-04-23 10:23:17 +02:00
Roman Iuvshyn edb0e15e6f
RELEASE: Set next development version (#9473) 2018-04-18 08:31:24 +02:00
Anton Korneta 38ff5c084b Change machine token to JWT and rewrite auth mechanism 2018-04-11 10:30:32 +03:00
Mykhailo Kuznietsov ee54a220f4
Fix recreation of user in Che DB, when it has been recreated on Keycloak (#9280) 2018-04-03 12:10:20 +00:00
Mykhailo Kuznietsov db0644505c
Set correct response for non-working services in Multi User Che (#9237) 2018-03-30 06:45:55 +00:00
Roman Iuvshyn e006334aad
RELEASE: Set next development version (#9268) 2018-03-28 10:58:30 +03:00
David Festal ff3459d2d3
Support alternate OIDC providers, to prepare for the switch from Keycloak to `fabric8_auth` (#8650)
Allow switching to an alternate OIDC provider (provided that it emits access tokens as JWT tokens).

This is the implementation required in upstream Che, for issues
redhat-developer/rh-che#502 and
redhat-developer/rh-che#525

Signed-off-by: David Festal <dfestal@redhat.com>
2018-03-23 14:44:23 +01:00
Mykhailo Kuznietsov cc25126d24
Add authentication for ws connections (#9043) 2018-03-14 09:47:17 +02:00
Roman Iuvshyn dbdac2a604
RELEASE: Set next development version (#9038) 2018-03-07 17:53:03 +07:00
Max Shaposhnik d2fcdb772a
Improve functionality of identity provider token retrieval 2018-02-23 10:33:45 +02:00
Roman Iuvshyn e2762411b3
RELEASE: Set next development version (#8773) 2018-02-14 15:00:52 +02:00
Roman Iuvshyn f50c2ebbf5
RELEASE: Set next development version (#8496) 2018-01-31 17:53:10 +02:00
Vitaliy Guliy 9abfec7c5f
CHE-7581 Improved keycloak initialization (#8425)
* Initialize keycloak before loading the IDE javascript

* Fix formatting

* Add explanation in error message
2018-01-26 12:35:42 +02:00
Mykhailo Kuznietsov 2c2bd6637c
Set new year in license headers (#8244) 2018-01-11 16:04:49 +02:00
Sun Tan ec77e22046 Adding identity_id from keycloak to the logs through MDC Context
Signed-off-by: Sun Tan <sutan@redhat.com>
2018-01-05 13:46:28 +01:00
Roman Iuvshyn 71704ab3a7
RELEASE: Set next development version (#8135) 2018-01-03 14:13:25 +02:00
Max Shaposhnik 8ff1be36f5
Added support of Idenvity brokering mechanism of Keycloak for Multi-user Che 2017-12-21 17:50:03 +02:00
Max Shaposhnik db9b1667d4
Reflect changing user email on Keycloak to the Che database (#7895)
* Add check for user email if tokens does not match
* Add tests
2017-12-15 15:21:25 +02:00
Roman Iuvshyn 5a6d3910b2
RELEASE: set next dev version (#7882) 2017-12-14 15:51:34 +02:00
Roman Iuvshyn 506210325a
RELEASE: set next dev version (#7523) 2017-11-23 12:50:56 +02:00
Artem Zatsarynnyi 1e4a702724
Make it possible to tell IDE to use a different "wsagent" server (#7392)
* Make it possible to tell IDE to use a different "wsagent" server passing server's ref prefix through query parameter

Signed-off-by: Artem Zatsarynnyi <azatsary@redhat.com>
2017-11-17 10:27:30 +02:00
Max Shaposhnik ea7e071b3a
Use same assembly for single- and multiuser Che 2017-11-07 12:27:02 +02:00
Roman Iuvshyn 19f5fd1f5a
RELEASE: Set next development version (#7112) 2017-10-31 16:46:30 +02:00
Artem Zatsarynnyi f15fbf1cb1
IDE agnostic way to launch GWT Super DevMode (#7084)
Adapted modules to gwt-lib/gwt-app lifecycle;
shared libs have been cleaned up from the GWT related stuff;
enabled launching Super DevMode with a reactor goal gwt:codeserver;
enabled launching Super DevMode inside a dev-machine (for Che in Che development);
separate compiling IDE GWT app from packaging IDE Web app.

Signed-off-by: Artem Zatsarynnyi <azatsary@redhat.com>
2017-10-31 15:27:22 +02:00
Max Shaposhnik 57aa4400e4 Make /system/status service public to allow liveness checks by it 2017-10-25 12:53:43 +03:00
Florent BENOIT 6a95b6d74a Apply google format v1.4 https://github.com/google/google-java-format/releases/tag/google-java-format-1.4
Change-Id: I5df30c23165df1fd39eef4c57893bebd1d681c1d
Signed-off-by: Florent BENOIT <fbenoit@redhat.com>
2017-10-19 22:23:04 +02:00
Sergii Kabashniuk f4cc97acce Set next version 6.0.0-M1-SNAPSHOT 2017-10-19 13:53:40 +03:00
Sergii Kabashniuk e321ab00b1 Merge with master 2017-10-15 14:33:47 +03:00
Roman Iuvshyn abe3271908 RELEASE: Set next development version (#6692)
* RELEASE: Set next development version
2017-10-14 20:17:04 +03:00
Sergii Kabashniuk 70ac13c008 Merge remote-tracking branch 'origin/master' into che6 2017-10-12 16:14:51 +03:00
Sergii Kabashniuk 14061f5a2e Fixed concurrent user registration (#6703)
Signed-off-by: Sergii Kabashniuk <skabashniuk@redhat.com>
2017-10-12 15:57:46 +03:00
Artem Zatsarynnyi 5041b59e6e Merge branch 'master' into spi 2017-10-12 11:54:46 +03:00
Sergii Kabashniuk 1bea871d0a Fixed possible constraint violation with an existed organization. (#6674)
* Fixed possible constraint violation with an existed organization.

Usecase is following:
If we have already an organization with name, let's say "org"  and the new user also has name "org" then we will have constraint violation.
 In this case, we will try to create the user with name "org"+random string.
2017-10-11 16:21:59 +03:00
Sergii Kabashniuk ee01b2998f Multi-user Eclipse Che (#6441)
Multi-user Eclipse Che (#6441)
#### How to run it.
```docker run -it -e CHE_MULTIUSER=true -e CHE_HOST=<your ip> -e CHE_KEYCLOAK_AUTH-SERVER-URL=http://<your ip>:5050/auth -v /var/run/docker.sock:/var/run/docker.sock -v ~/.che-multiuser:/data eclipse/che:nightly start --skip:pull --skip:nightly```
#### How to manage it
 - Keycloak configured with two realms. ```Master``` and ```che```. Also we have one user admin/admin in both realm. Admin user in master realm is  - super admin. 
-  Eclipse Che configured for che realm
- We enabled user registration in ```Che``` realm
#### Known limitation
 - swagger would not work. We need to upgrade a version. to support openid authentification https://github.com/eclipse/che/issues/6015
- It's working on local docker. We are going to provide scalable version based on OpenShift on next versions.
- Invitation of non-existent users to Eclipse Che organization https://github.com/eclipse/che/issues/6335
#### How to run it when it is in a branch


To run an multiuser Che version, the following steps are required after building the branch:
 - Rebuild init, cli and che images (in the given sequence). To do that, proceed to folder _dockerfiles/<image_name>_ and run _build.sh_
 - Run Che in a  usual way using cli, with additional parameters:  `-e CHE_MULTIUSER=true` and `--skip:pull --skip:nightly`  
   Full command example:
   `docker run -it --rm -v /var/run/docker.sock:/var/run/docker.sock -v /home/user/.che:/data -e CHE_MULTIUSER=true eclipse/che-cli:nightly start --skip:pull --skip:nightly`
 - MacOS users may need to edit _che.env_ file in the data folder, changing `CHE_HOST` and `CHE_KEYCLOAK_AUTH__SERVER__URL` values to their specific IP.
 
When start is succeeded, the following docker containers should be created:  
 - che, exposing 8080 port;
 - che_keycloak, exposing 5050 port;  
 - che_postgres, exposing 5432 port;
2017-10-06 17:27:27 +03:00
Artem Zatsarynnyi 4bc18519db Merge branch 'che-multiuser' into spi 2017-10-05 16:30:22 +03:00
Sergii Leshchenko 7924910ee0 CHE-6565 Add ability to configure `allowedClockSkewSeconds` for JWT parser (#6568) 2017-10-04 13:49:46 +03:00
Anton Korneta 32c02883b6 Remove '/ws' and '/websocket' parts from KeycloakAuthenticationFilter binding 2017-10-03 14:42:27 +03:00
Artem Zatsarynnyi 8de6dbe5fb Merge branch 'che-multiuser' into spi 2017-10-03 13:04:39 +03:00
Oleksandr Garagatyi 49f80dad17 CHE-5893: Map system state API to login filter
It is needed since it is secured by permissions system which requires
an authenticated user.
Also, use base API endpoint for checking Che in OpenShift deploy
script since system state API which was used before is secured now.
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2017-10-03 09:45:58 +03:00
Anna Shumilova f1e09ced81 Fix activity checker fails
Signed-off-by: Anna Shumilova <ashumilo@redhat.com>
2017-10-02 15:26:38 +03:00
Artem Zatsarynnyi 81bce959ce Merge branch 'che-multiuser' into spi 2017-10-02 14:59:55 +03:00
Sergii Kabashniuk 2df0a54923 Fixing wrong code formatting 2017-10-02 14:04:04 +03:00
Anton Korneta 09f062370c Fix selenium-tests.sh add keycloak token endpoint to settings 2017-10-02 11:14:45 +03:00
Anton Korneta 9559f7ce7e Adapt selenium tests to che multiuser 2017-09-29 18:03:08 +03:00
Sergii Leshchenko 146636b03e Clean KeycloakConfigurationService up 2017-09-29 12:11:55 +03:00
Sergii Leshchenko d490e7c19f Parse object with GSON instead of jackson 2017-09-29 12:11:55 +03:00
Sergii Leshchenko 198522cd2d Remove dependency on keycloak-core artifact 2017-09-29 12:11:55 +03:00
Sergii Leshchenko 861f4eccbb CHE-6463 Remove machine auth code that is outdated in spi 2017-09-28 13:06:50 +03:00
Sergii Kabashniuk de52d5f04b Code cleanup 2017-09-27 11:29:54 +03:00
Oleksii Kurinnyi bd2ea09b1a CHE-5802: transplantation of Codenvy dashboard stuff to Che dashboard (#6381)
* code clean-up

Signed-off-by: Oleksii Kurinnyi <okurinny@redhat.com>

* move user-management and its related components

Signed-off-by: Oleksii Kurinnyi <okurinnyi@codenvy.com>

* move organizations and its related components

Signed-off-by: Oleksii Kurinnyi <okurinnyi@codenvy.com>

* add Keycloak authorization

Signed-off-by: Oleksii Kurinnyi <okurinnyi@codenvy.com>

* move teams and its related components

Signed-off-by: Oleksii Kurinnyi <okurinnyi@codenvy.com>

* move share-workspace and its related components

Signed-off-by: Oleksii Kurinnyi <okurinnyi@codenvy.com>

* update assembly

* fixup! update assembly
2017-09-22 10:03:17 +03:00
Sergii Kabashniuk 546ba4e4ea Merge with master 2017-09-20 11:34:18 +03:00
Sergii Kabashniuk d4f03cbc4a Ability to authenticate Oauth flow (#6326)
* Add keycloak token to oauth authenticate call

* fixup! Add keycloak token to oauth authenticate call

* fixup! Add keycloak token to oauth authenticate call

* Fix dashboard build

* fixup! Add keycloak token to oauth authenticate call

* fixup! Add keycloak token to oauth authenticate call

* Add security token for websocket url  (#6319)

* Add security token for websocket url

Signed-off-by: Vitalii Parfonov <vparfonov@redhat.com>

* Fix failed test (#6325)

Signed-off-by: Vitalii Parfonov <vparfonov@redhat.com>
2017-09-18 18:42:49 +03:00
Max Shaposhnik d2bfa4f7f4 Move permissions and authorization into separate module; 2017-09-14 17:03:43 +03:00