-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Multi-user Che with IBM Cloud Private's OIDC server failing due to self-signed certs #12863
Comments
Looks like #12634 is the issue for supporting self-signed tls certs |
@johnmcollier you need to add self signed cert to workspace master. It looks like there's no such an in k8s helm charts, but here's OpenShift template: https://github.com/eclipse/che/blob/master/deploy/openshift/templates/che-server-template.yaml#L158 So, you need to create a secret called self-signed-certificate and ca.crt needs to contain cert, as well as env to Che deployment. Che server entrypoint script will add it to Java trust store on start up https://github.com/eclipse/che/blob/master/dockerfiles/che/entrypoint.sh#L293 Hope that helps! |
@eivantsov Thanks a ton! I'll give that a try |
@eivantsov Thanks! Your suggestion worked and the self-signed cert can now be used. I'm now running into a separate issue when I try to access the Che dashboard (having made sure to register the OIDC endpoint before installing):
The URL shown in my browser is: It seems to be complaining about the redirect URI specifically? I set Edit: What's interesting is that if I change the URL to: I can access the OIDC login page just fine. The redirect afterward still fails, as it's using the previous URL. It seems like the OIDC server doesn't like something to do with the redirect_uri's encoding? |
As a follow up, I ended up needing to set I now get stuck in some kind of redirect loop after logging in. But that seems to be a separate problem. It looks like it's appending |
@johnmcollier with Keycloak we set the following redirect uri in client settings (my local example):
What is |
@eivantsov Turns out the issue was with the server running the OIDC OP on my cluster. There was a bug preventing it from parsing redirect_uri's with parameters attached to it. As a temporary workaround, using a regexp matching for the redirect_uri worked for me. Closing this issue as my issues with the self-signed certs, and redirect_uris have been resolved. However, I'm still unable to get multi-user working, but it now appears to be a separate issue with how the client script is interacting with my cluster's OIDC OP (related to what my colleague @tetchel highlighted in #12881). So we're looking at modifying OIDCKeycloak.js instead. Anyways, thanks for your help! Much appreciated! |
@johnmcollier I've just tried to setup Gitlab as an OpenID connect provider for Che. I'm also seeing the same thing with ?code being added to the URL and an infinite redirect loop. Do I need wildcard support to be implemented to fix this do you think? https://gitlab.com/gitlab-org/gitlab-ce/issues/48707 |
@davidwindell I believe so, that's what I ended up needing to use to get it working. |
Description
I'm trying to get multi-user Che running on IBM Cloud Private (ICP) 3.1.2, using ICP's own OIDC server as the OIDC provider. The server is running at
https://<master-ip>:8443/oidc/endpoint/OP
. I've made sure to set the following values in the Che helm chart:However, when I install Che, the following errors are shown in the Che pod's logs:
The last error makes it seem like its failing on the self-signed cert that ICP uses for OIDC. So I guess I have two questions:
I'm wondering if I need to update the che-tls secret? Maybe have it contain the self-signed certs? I'm not sure.
The text was updated successfully, but these errors were encountered: