Commit Graph

259 Commits (4e3e7c3cb5fabfa9f5bd150f54b6eba1d2cd2f29)

Author SHA1 Message Date
Mykola Morhun f76cc4dae7
Increase Keycloak idle session timeout (#12801) 2019-03-04 10:44:57 +02:00
Dmytro Nochevnov c85ef9e2ad
Remove redundant Eclipse Che 'user' role (#12279)
* Don't bind 'user' role to test user

Signed-off-by: Dmytro Nochevnov <dnochevn@redhat.com>

* Remove role 'user' from keycloak

Signed-off-by: Dmytro Nochevnov <dnochevn@redhat.com>
2018-12-28 14:35:31 +01:00
Valeriy Svydenko 90b5bdef23
Remove maven server (#12235)
Signed-off-by: Valeriy Svydenko <vsvydenk@redhat.com>
2018-12-21 17:16:28 +02:00
Vitaliy Gulyy 21318aeec8
build.sh become working on Ubuntu / Linux Mint (#12004)
* Use bash instead sh

* Revert .gitignore
2018-11-21 12:37:27 +02:00
David Festal 534a961e84
Provide better compatibility with alternate OIDC providers (#11090)
Currently in Che there are still a number of requirements in upstream that are not required by the OIDC specification, so that Che still cannot be used with a number of OIDC compliant providers.
For example, in order to have Che working with the [`node-oidc-provider`](https://github.com/panva/node-oidc-provider), the following changes were necessary:

- Remove the requirement to have the email as a claim in the JWT access
token: this is not required the specification and is not supported by a
number of OIDC providers. Normally, the Id token contains such claims.

  So now if the email is not in the JWT token the first time the user connects to Che, ten the email is retrieved from the OIDC provider through its `user-profile` endpoint.

- Explicitely specify the the `openid email profile` scope when requesting the access token. Because OIDC providers, when answering to the `userInfo` endpoint, are expected to return claims that corresponds to the scopes of the access token. So if an access token has the `openid` scope only, the `userinfo` might return no claim at all (according to the specification).

  Until now it was working since keycloak allows adding claims to the returned tokens anyway.

- Allow supporting fixed redirect Uris: most OIDC providers support having a list of redirect URIs to come back to after the authorization step.  But these authorized Uris don't necessarily support wildcards or prefix. Che doesn't support this currently, and these changes introduce 2 fixed callback HTML pages that redirect to the Dashboard / IDE URL of the final page we want to come back to after authentication. This makes Che compatible with more OIDC providers

  We introduced a new boolean property to enable / disable fixed redirect URLs:
  `che.keycloak.use_fixed_redirect_urls` 
  whose default value is `false`

- The previous points required some light changes in the Keycloak Javascript adapter file, that we will submit as a PR to the Keycloak project. I, the meantime the `OIDCKeycloak.js` file is still used, but has been updated to be now based on the `keycloak.js` file of the last `4.5.0-final` Keycloak release. This will make this Keycloak PR easier to get accepted.

  Please keep in mind that this version upgrade only impacts the alternate OIDC provider case: when using a real Keycloak server, Che *always uses the `keycloak.js` file provided by the Keycloak server*. 


Signed-off-by: David Festal <dfestal@redhat.com>
2018-10-10 20:52:35 +02:00
Kuperman Sergey 70f25dbebc Make Resource memory request configurable for k8s and OpenShift (#10673)
- Make Resource memory request configurable for k8s and OpenShift.
- Add alias for backwards compatibility to che.workspace.default_memory_limit_mb.
- set memory request to 512Mb.
- document CHE_WORKSPACE_DEFAULT__MEMORY__REQUEST__MB in che.env.
- Configure helm scripts to allow memory attributes on deployment.
Signed-off-by: Sergey Kuperman <sergey.kuperman@sap.com>
2018-09-06 13:02:42 +03:00
Mykhailo Kuznietsov dcb00c53d0
Fix remaining files with licenses (#10746) 2018-08-21 10:25:45 +03:00
Angel Misevski 44588aa775 Remove unnecessary properties from kubernetes/OS infrastructure
Removes properties

- che.infra.kubernetes.username : can change, requiring reconfiguration
- che.infra.kubernetes.password : can change, requiring reconfiguration
- che.infra.kubernetes.oauth_token : expires

as they complicate setup and all represent suboptimal running scenarios.
Use che serviceaccount instead.

Signed-off-by: Angel Misevski <amisevsk@redhat.com>
2018-08-07 10:11:12 -04:00
Sergii Leshchenko 43277283de
Add doc for CHE_LOGGER_CONFIG in che.env file (#10245) 2018-07-03 10:50:41 +03:00
Mykhailo Kuznietsov 80f857bbc6
Update Keycloak to 3.4.3.Final version (#10165) 2018-07-02 09:49:54 +03:00
Mykola Morhun 79ab9c3c84
CHE-7371: Add support for custom identity providers in Che keycloak theme (#9911)
Signed-off-by: Mykola Morhun <mmorhun@redhat.com>
2018-06-04 10:33:00 +03:00
Mykhailo Kuznietsov b14ec230cb
Add internal and external API URL environment variables for workspaces (#9475) 2018-04-27 10:51:25 +03:00
Mykhailo Kuznietsov 013d485914
Use workspace limit idle timeout value in WorkspaceActivityManager (#9395) 2018-04-13 14:11:42 +00:00
Mykhailo Kuznietsov f6a3e10625
Revert "Use workspace limit idle timeout value in WorkspaceActivityManager (#9342)" (#9377)
This reverts commit f85c0a299b.
2018-04-11 13:22:24 +00:00
Mykhailo Kuznietsov f85c0a299b
Use workspace limit idle timeout value in WorkspaceActivityManager (#9342) 2018-04-11 07:08:53 +00:00
Guy Daich a48d4b42c8 k8s-infra: routing, TLS (rebased) (#9329)
Introduce an External Server Exposer Strategy, 
responsible for exposing service ports associated with external servers,
making them accessible from outside the cluster.
Move server exposure to shared k8s infra level:
- multi-host: unique hostname for each component, like Che Openshift infrastructure.
- single-host: single hostname for all components. Can be used in conjunction with TLS.
- default-host: default ingress hostname. Can be used for local development without dynamic DNS (based on ingress IP).
Add basic TLS support.
Signed-off-by: Guy Daich <guy.daich@sap.com>
2018-04-10 09:53:23 +03:00
Oleksandr Garagatyi 131ae27612 CHE-9275: Add setting of an env var to configure master logs encoding
Add setting of env var CHE_LOGS_APPENDERS_IMPL that sets Che master
logs producing configuration to deployments for:
- docker (che.env)
- kubernetes (kubectl)
- kubernetes (helm)
- openshift (scripts)
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>

Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-04-06 09:16:49 +03:00
Hanno Kolvenbach 3d841d5a2e Enable single-level DNS domains (*.domain.tld) in SINGLE_PORT mode to simplify HTTPS setup (#8983)
Enable single-level DNS domains (*.domain.tld) in SINGLE_PORT mode to simplify HTTPS setup.
Use whole folder for traefik conf to inject SSL certificates and custom configuration.
CHE_SINGLEPORT_WILDCARD__DOMAIN_IPLESS to che.env.
Signed-off-by: Hanno Kolvenbach <kolvenbach@silexica.com>
2018-04-03 13:50:58 +03:00
Anton Korneta fbedb89e58 Add ability to configure docker image build timeout 2018-03-28 17:01:57 +03:00
Anton Korneta e1df4ead64 Remove backup of 'CHE_HOME/lib' folder 2018-03-28 11:17:20 +03:00
Roman Iuvshyn 48ccf8ac83
Fix deployment che-multi on docker (#9222) 2018-03-24 10:55:47 +02:00
David Festal ff3459d2d3
Support alternate OIDC providers, to prepare for the switch from Keycloak to `fabric8_auth` (#8650)
Allow switching to an alternate OIDC provider (provided that it emits access tokens as JWT tokens).

This is the implementation required in upstream Che, for issues
redhat-developer/rh-che#502 and
redhat-developer/rh-che#525

Signed-off-by: David Festal <dfestal@redhat.com>
2018-03-23 14:44:23 +01:00
Tatsuyuki Ishi f4fb9465e8 Expose postgres for development 2018-03-21 14:50:32 +02:00
Tatsuyuki Ishi 1591aa2839 docker-compose: stop exposing postgres to external 2018-03-21 14:50:32 +02:00
Oleksandr Garagatyi d047863484 Move deployment files out of dockerfiles folder
Move openshift/k8s deployment files from dockerfiles/init folder
to deploy folder with a better structure because they are not
related to init dockerfile.
Add readme files in each deployment target folder with links to
Che docs where the process of deployment is described.
Remove delivery of deployment files by init image which is
useless.
Remove empty docs files from the repo and init image.
Fix some minor typos and trailing spaces.
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-03-20 22:13:24 +02:00
Roman Iuvshyn d17b089310
remove outdated s2i from init image (#9089)
* remove s2i from init image
2018-03-14 21:41:18 +07:00
Oleksandr Garagatyi 248dd50dc4 Allow to use NULL in JDBC env vars
Allows to use NULL as a value of JDBC config to simplify usage of
environment variables for JDBC settings in k8s/Openshift
deployment files. NULL is treated as unset variable.
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-03-12 10:56:34 +02:00
Guy Daich 8c7ebc6751 K8s multiuser helm (#8973)
Signed-off-by: Guy Daich <guy.daich@sap.com>
2018-03-08 10:36:32 +01:00
Mykhailo Kuznietsov e96a2c320c
Rename docker connector configuration properties (#8948) 2018-02-28 16:55:47 +02:00
Mykhailo Kuznietsov 779b5cea0f
Cleanup unused variables in che.env (#8872) 2018-02-28 16:26:58 +02:00
Roman Iuvshyn 4bec4734d7
replace duplicate env var with check if it's defined (#8912)
since `IMAGE_KEYCLOAK` var was moved to `deploy_che.sh` that was a duplicate
2018-02-26 14:49:50 +02:00
Eugene Ivantsov 761f66bc77
Remove unsupported ls on Mac (#8908) 2018-02-26 14:14:21 +02:00
Roman Iuvshyn 55a2588d56
eliminate kc-util image (#8896)
* eliminate kc-util image
2018-02-23 15:44:47 +02:00
Eugene Ivantsov 06df5be97d
Replace s2i based deployment approach with pure deployments (#8819)
* Experimenting with deployment config based approach to Che multi user on OCP

* Service pod

* Remove s2i

* Remove s2i

* EOF

* Cleanup

* Cleanup

* Cleanup

* Cleanup

* Make Keycloak util image configurable

* Update webdriver.sh
2018-02-23 13:47:49 +02:00
Roman Iuvshyn cc7e7772dc
fix CLI no-proxy configuration (#8834) 2018-02-19 16:24:35 +02:00
Vladyslav Zhukovskyi 270fdd546d Set up default file encoding to utf8
Signed-off-by: Vladyslav Zhukovskyi <vzhukovs@redhat.com>
2018-02-19 11:54:36 +02:00
perspectivus1 177e7a0f18 Initial support for deploying Che to Kubernetes using Helm charts (#8715)
Signed-off-by: Eyal Barlev <perspectivus@gmail.com>
2018-02-16 13:13:28 +01:00
Sergii Leshchenko 0b6242a09c
Disable pre-creating of PVC subpaths on minikube (#8726)
Since workspaces pods are configured to run under root user
there is no any need to pre-create PVC subpaths.
2018-02-12 14:15:36 +02:00
Grant Shipley 839c8b1c98 Increase postgres claim for OpenShift to be 1gb (#8709)
* Increase postgres and keycloak PVC for OpenShift to be 1gb

For compatibility and portability between OSO, OSD, and OCP this needs to be 1Gi as anything under that is not allowed in Online environments.  Having it set to 100Mi results in errors and the deployment fails.
2018-02-10 20:01:37 +02:00
Sergii Leshchenko 10ac41f7f8 CHE-5908 Update ingress annotations for Nginx 0.9.0 2018-02-08 10:08:52 +02:00
Sergii Leshchenko 9c88f336e5 CHE-5908 Add warning when ingress annotations are absent in configuration 2018-02-08 10:08:52 +02:00
Sergii Leshchenko 4ee894ec45 CHE-5908 Add CHE_INFRA_KUBERNETES_NAMESPACE into yml file 2018-02-08 10:08:52 +02:00
Oleksandr Garagatyi cb43481e54 CHE-5908 Allow to customize ingress controller specific annotations for ingresses
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-02-08 10:08:52 +02:00
Sergii Leshchenko ac1c5160b8 CHE-5908 Add an ability to configure security context for pods 2018-02-08 10:08:51 +02:00
Oleksandr Garagatyi 9f350af06f CHE-5908: add config to deploy Che on k8s
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-02-08 10:08:51 +02:00
Sergii Leshchenko 242f56a8fd CHE-5908 Add Kubernetes infrastructure 2018-02-08 10:08:51 +02:00
Guy Daich 7e571b6eff CHE-5908 Change Server Exposure, Resolving, Project & Infra to support ingress-based routes
Signed-off-by: Guy Daich <guy.daich@sap.com>
2018-02-08 10:08:51 +02:00
Guy Daich 50c2bd5a59 CHE-5908 Begin k8s infra poc
Signed-off-by: Guy Daich <guy.daich@sap.com>
2018-02-08 10:08:51 +02:00
Max Shaposhnik dcf80c3c4e
Fix singleport mode in multiuser 2018-02-06 14:15:35 +02:00
Max Shaposhnik 8e0deaedb1
Add permissions for default admin to manage his profile; (#8630) 2018-02-06 14:15:13 +02:00