Commit Graph

717 Commits (fc2f76bc5c8a6146cdaca34eb2bb60ca8e30aaee)

Author SHA1 Message Date
Valeriy Svydenko a10f8194e1 use jdt.ls extension in java test-plugin (#7429)
Signed-off-by: Valeriy Svydenko <vsvydenk@redhat.com>
2018-10-17 15:05:02 +02:00
Valeriy Svydenko db11bd3e30 use extension of jdt.ls
Signed-off-by: Valerii Svydenko <vsvydenk@redhat.com>
2018-10-17 15:05:02 +02:00
Thomas Mäder 8b5d67d063 Clean up install script & added launcher plugin
Signed-off-by: Thomas Mäder <tmader@redhat.com>
2018-10-17 15:05:02 +02:00
Vitalii Parfonov 355535dc56
Cleanup code afre removing test LangServer (#11613)
Signed-off-by: Vitalii Parfonov <vparfonov@redhat.com>
2018-10-17 08:48:54 +03:00
Sergii Kabashniuk 8cc8a3e8f2
Add workspace name and namespace as environment variable (#11623)
Add workspace name and namespace as an environment variable (#11623)
2018-10-16 17:19:07 +03:00
Oleksandr Garagatyi 0797d09343 Change dockerimage location to my personal account
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-10-15 13:07:12 +03:00
Oleksandr Garagatyi caa36ae58c Add workspaceEnv to plugin, populate it on sidecar resolving
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-10-11 15:01:58 +03:00
David Festal 534a961e84
Provide better compatibility with alternate OIDC providers (#11090)
Currently in Che there are still a number of requirements in upstream that are not required by the OIDC specification, so that Che still cannot be used with a number of OIDC compliant providers.
For example, in order to have Che working with the [`node-oidc-provider`](https://github.com/panva/node-oidc-provider), the following changes were necessary:

- Remove the requirement to have the email as a claim in the JWT access
token: this is not required the specification and is not supported by a
number of OIDC providers. Normally, the Id token contains such claims.

  So now if the email is not in the JWT token the first time the user connects to Che, ten the email is retrieved from the OIDC provider through its `user-profile` endpoint.

- Explicitely specify the the `openid email profile` scope when requesting the access token. Because OIDC providers, when answering to the `userInfo` endpoint, are expected to return claims that corresponds to the scopes of the access token. So if an access token has the `openid` scope only, the `userinfo` might return no claim at all (according to the specification).

  Until now it was working since keycloak allows adding claims to the returned tokens anyway.

- Allow supporting fixed redirect Uris: most OIDC providers support having a list of redirect URIs to come back to after the authorization step.  But these authorized Uris don't necessarily support wildcards or prefix. Che doesn't support this currently, and these changes introduce 2 fixed callback HTML pages that redirect to the Dashboard / IDE URL of the final page we want to come back to after authentication. This makes Che compatible with more OIDC providers

  We introduced a new boolean property to enable / disable fixed redirect URLs:
  `che.keycloak.use_fixed_redirect_urls` 
  whose default value is `false`

- The previous points required some light changes in the Keycloak Javascript adapter file, that we will submit as a PR to the Keycloak project. I, the meantime the `OIDCKeycloak.js` file is still used, but has been updated to be now based on the `keycloak.js` file of the last `4.5.0-final` Keycloak release. This will make this Keycloak PR easier to get accepted.

  Please keep in mind that this version upgrade only impacts the alternate OIDC provider case: when using a real Keycloak server, Che *always uses the `keycloak.js` file provided by the Keycloak server*. 


Signed-off-by: David Festal <dfestal@redhat.com>
2018-10-10 20:52:35 +02:00
Sergii Kabashniuk 65bd65e23b Upgrade to new dependency mockito-testng (#10647) 2018-10-10 13:58:33 +03:00
Max Shaposhnik 127c433d8a
Define image pulling strategy for sidecars via configuration 2018-10-09 14:20:06 +03:00
Sergii Kabashniuk ad8fd5e8df
Limit pool size used to process Json/rpc requests (#11456)
Limit pool size used to process Json/RPC requests (#11456)
2018-10-05 16:56:39 +03:00
Sergii Leshchenko ef41077252 Adapt GWT IDE to RuntimeLogEvent changes 2018-10-04 21:12:36 +03:00
Sergii Leshchenko a222971865 Replace MachineLogEvent with more abstract RuntimeLogEvent 2018-10-04 21:12:36 +03:00
Roman Iuvshyn 63b389c2fe
RELEASE: Set next development version (#11434)
* RELEASE: Set next development version
2018-10-04 18:25:39 +03:00
Sergii Leshchenko 969f1d4d15 Configure liveness probe for server (PR #11454) 2018-10-04 12:28:39 +03:00
Sergii Leshchenko ff8902da79 Add an ability to configure liveness probes for servers (PR #11454) 2018-10-04 12:28:39 +03:00
Sergii Leshchenko 71ddbc4996 Move provisioning of CHE_MACHINE_NAME in a separate provisioner
Since new machines may be added from Che Plugins description it is needed
to move provision CHE_MACHINE_NAME environment variable to provisioning phase
instead of creating of environment
2018-10-02 17:15:50 +03:00
Sergii Leshchenko 616c700b35
Make Che Server depending on plugin broker image tag instead of latest version (#11422) 2018-10-02 17:06:02 +03:00
Max Shaposhnik 89041db8d1
Provide support for MySQL & add integration tests 2018-10-01 18:08:02 +03:00
Sergii Leshchenko b5b187e182
Merge pull request #11367 from sleshchenko/smallFixes
Add different small improvements
2018-09-27 17:49:15 +03:00
Max Shaposhnik ce31146629
Add possibility to configure timeout for plugin broker 2018-09-27 09:52:24 +03:00
Sergii Leshchenko e77f545d6a Fix mistake in an error message in ApiAccessRejectionFilter 2018-09-26 15:54:59 +03:00
Sergii Kabashniuk e53b34b2b1
Setup default value for CHE_WORKSPACE_PLUGIN__REGISTRY__URL (#11354)
Setup default value for CHE_WORKSPACE_PLUGIN__REGISTRY__URL
2018-09-26 14:01:02 +03:00
Oleksandr Garagatyi a0a722f650 Change default sidecar memory limit to 128MB
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-09-26 13:56:17 +03:00
Oleksandr Garagatyi 42e0993e49 Add an ability to configure Pull policy for broker
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-09-24 13:08:38 +03:00
Sergii Leshchenko 41b14c71b6
Make OpenShift infrastructure to create workspace service account if needed (#11199) 2018-09-21 08:50:25 +03:00
Oleksandr Garagatyi dff4c8a1cd Change default sidecar memory limit to 512MB to let Theia work properly OOTB
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-09-20 11:26:45 +03:00
Oleksandr Garagatyi 036f044155 Add a property for default sidecar mem limit
Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-09-17 14:01:34 +03:00
Sergii Leshchenko f22fbe15c5 CHE-10991 Add provisioning of service account into workspaces pods 2018-09-13 11:03:09 +03:00
Roman Iuvshyn ea410c3340
RELEASE: Set next development version (#11169) 2018-09-12 11:53:42 +03:00
Sergii Leshchenko 6a6c7f7e79
CHE-11080 Add authorization checks for BrokerService's JSON RPC methods (#11092) 2018-09-07 07:06:16 +03:00
Kuperman Sergey 70f25dbebc Make Resource memory request configurable for k8s and OpenShift (#10673)
- Make Resource memory request configurable for k8s and OpenShift.
- Add alias for backwards compatibility to che.workspace.default_memory_limit_mb.
- set memory request to 512Mb.
- document CHE_WORKSPACE_DEFAULT__MEMORY__REQUEST__MB in che.env.
- Configure helm scripts to allow memory attributes on deployment.
Signed-off-by: Sergey Kuperman <sergey.kuperman@sap.com>
2018-09-06 13:02:42 +03:00
Sergii Kabashniuk e9b2878ce6
Remove duplicated properties (#11066) 2018-09-05 22:38:13 +03:00
Sergii Leshchenko dfb5852da8 CHE-10861 Add permissions check for system related remote subscriptions 2018-09-04 11:07:00 +03:00
Sergii Kabashniuk 77a00179db
Add che.workspace.plugin_registry_url information to workspace/settings Rest method (#11015)
Add che.workspace.plugin_registry_url information to workspace/settings Rest method
2018-09-04 10:09:20 +03:00
Oleksandr Garagatyi 27bed82d5c
CHE-10561: Rework WS.NEXT flow to latest concept of plugin broker (#10740)
* Move wsnext flow in Kubernetes infra implementation

Now we need to start a broker and pass meta.yaml files to it.
Starting a broker is infra-specific stuff, so it has to be done
on the infra implementation side because we don't have a part
in the infra SPI that would allow us to start a broker.
Passing Meta files using InternalEnvironment object is more
invasive than passing only attributes. So, this commit applies
less invasive scheme.

* CHE-10202,10561: Add fetching of Che editor, plugins meta from the registry

Add fetching of Che editor ID from workspace attributes.
Add fetching of Che plugins IDs from workspace attributes.
Use colon sign for separating editor/plugin ID and version
instead of the slash.
Remove old Workspace.Next model objects.

* CHE-10561: Share WS.NEXT between k8s and OS infras

Use WS.NEXT in both k8s and OS infrastructure implementations.

* CHE-10561: fix fetching meta.yaml files from che-plugin-registry

* CHE-10561: Fix sidecar model serialization

Fixes the fact that some fields in workspace sidecar tooling model
POJOs were incorrectly named or required custom serialization of
fields.

* CHE-10561: Add listening of che-plugin-broker

Add code that allows listening for events from Che plugin broker.
An event might contain workspace tooling config as a result if the broker
finished successfully or error otherwise.

* CHE-10561: Add PluginBrokerManager to control broker lifecycle

Adds PluginBrokerManager that configures/starts/waits Che plugin
broker.

Remove unused code.
Remove notion of Workspace next.

* Align plugin registry property between different components

* Fix extra  path in che plugin registry URL

Signed-off-by: Oleksandr Garagatyi <ogaragat@redhat.com>
2018-09-03 08:57:32 +03:00
Sergii Leshchenko 2c755f2b1d CHE-10861 Fix mapping of MachineLoginFilter to filter websocket endpoints 2018-08-30 10:16:43 +03:00
Roman Iuvshyn d99b2ed73d
RELEASE: Set next development version (#10867)
* RELEASE: Set next development version
2018-08-22 12:06:38 +03:00
Mykhailo Kuznietsov dcb00c53d0
Fix remaining files with licenses (#10746) 2018-08-21 10:25:45 +03:00
Sergii Leshchenko c2f90b80bb
Added an ability to configure JwtProxy container and memory limit for it (#10737)
* Add an ability to configure jwtproxy container and memory limit for it

* Change default jwtproxy image to eclipse/che-jwtproxy:latest
2018-08-13 10:51:31 +03:00
Max Shaposhnik eccc673d24
Make possible to configure some jwtproxy values via properties (#10685) 2018-08-08 14:13:45 +03:00
Angel Misevski 44588aa775 Remove unnecessary properties from kubernetes/OS infrastructure
Removes properties

- che.infra.kubernetes.username : can change, requiring reconfiguration
- che.infra.kubernetes.password : can change, requiring reconfiguration
- che.infra.kubernetes.oauth_token : expires

as they complicate setup and all represent suboptimal running scenarios.
Use che serviceaccount instead.

Signed-off-by: Angel Misevski <amisevsk@redhat.com>
2018-08-07 10:11:12 -04:00
Roman Iuvshyn 60da580c92
RELEASE: Set next development version (#10603) 2018-08-02 12:38:48 +03:00
Mykhailo Kuznietsov 07263f1e30
Fix license header text (#10629) 2018-08-02 11:18:04 +03:00
Mykhailo Kuznietsov 15d23edc91
Update license to EPL 2.0 (#10531) 2018-07-31 11:24:36 +03:00
Sergii Leshchenko 798c4f496c
Fix binding of jwt proxy secure servers for Che on K8s/OS (#10407) 2018-07-13 09:10:34 +03:00
Sergii Leshchenko d6a913bb5d Add JWTProxy based implementation for SecureServerExposer 2018-07-12 14:51:29 +03:00
Sergii Leshchenko efaef7e0d1 Introduce secure servers and add SecureServerExposer 2018-07-12 14:50:56 +03:00
Roman Iuvshyn 985d368f2d
RELEASE: Set next development version (#10345)
* RELEASE: Set next development version
2018-07-10 15:56:52 +03:00
Ilya Buziuk f80c1867fc che #9946: Better handling of unrecoverable events for k8s & openshift infra (processing both 'container' and 'pod' events)
Signed-off-by: Ilya Buziuk <ibuziuk@redhat.com>
2018-06-25 18:55:33 +02:00