Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[TLS] Document using self-signed TLS mode in Che #15301

Closed
sleshchenko opened this issue Nov 25, 2019 · 7 comments
Closed

[TLS] Document using self-signed TLS mode in Che #15301

sleshchenko opened this issue Nov 25, 2019 · 7 comments
Assignees
Labels
area/doc Issues related to documentation area/install Issues related to installation, including offline/air gap and initial setup kind/task Internal things, technical debt, and to-do tasks to be performed. severity/P1 Has a major impact to usage or development of the system.
Milestone

Comments

@sleshchenko
Copy link
Member

Is your task related to a problem? Please describe.

From time to time users complains about issues that they faced actually because of documentation lack.
It's needed to write documentation that would contain:

  1. Basic information about self-signed certificates.
  2. Instructions how to deploy Che with self-signed TLS mode enabled:
  • K8s and helm chart
  • K8s/OS and operator as an installer
  1. How to use Che with a self-signed certificate, for example - it's needed to import CA into a browser. Sometimes for example with crc/minishift - CA cert is not known, some instructions are needed - how to retrieve such CA cert.
@sleshchenko sleshchenko added the kind/task Internal things, technical debt, and to-do tasks to be performed. label Nov 25, 2019
@che-bot che-bot added the status/need-triage An issue that needs to be prioritized by the curator responsible for the triage. See https://github. label Nov 25, 2019
@skabashnyuk skabashnyuk added area/doc Issues related to documentation team/platform and removed status/need-triage An issue that needs to be prioritized by the curator responsible for the triage. See https://github. labels Nov 25, 2019
@skabashnyuk skabashnyuk added this to the Backlog - Platform milestone Nov 25, 2019
@apupier
Copy link
Contributor

apupier commented Dec 10, 2019

To help increasing the priority of this task, TLS seems to be required to have some VS Code webviews working (the one using WebService workers such AtlasMap for instance) see #13922 (comment)

@apupier
Copy link
Contributor

apupier commented Dec 10, 2019

or we can also have TLS activated by default: #14742

@sparkoo
Copy link
Member

sparkoo commented Dec 19, 2019

I've came up with this script for minishift. It is adding generated certificate to system-wide trusted certs. It can be instead imported manually into the browser.

#!/bin/sh

set -x
set -e

DOMAIN="*.$( minishift ip ).nip.io"
PASSWORD=eclipse-che

if [ -d certs ]; then
	echo "folder certs exists"
	exit 1
fi

mkdir certs
pushd certs

# generate certs
openssl genrsa -des3 -passout pass:${PASSWORD} -out rootCA.key 4096
openssl req -x509 -new -nodes -key rootCA.key -sha256 -days 1024 -out rootCA.crt -subj "/CN=${DOMAIN}" -passin pass:${PASSWORD}
openssl genrsa -out domain.key 2048
openssl req -new -sha256 -key domain.key -subj "/C=CZ/ST=Brno/O=Red Hat/CN=${DOMAIN}" -out domain.csr
openssl x509 -req -in domain.csr -CA rootCA.crt -CAkey rootCA.key -CAcreateserial -out domain.crt -days 500 -sha256 -passin pass:${PASSWORD}

# this adds cert to system trusted
sudo trust anchor rootCA.crt

# now use the cert for minishift routes
oc login -u system:admin --insecure-skip-tls-verify=true
oc project default
oc delete secret router-certs
cat domain.crt domain.key > minishift.crt
oc create secret tls router-certs --key=domain.key --cert=minishift.crt
oc rollout latest router

popd

chectl server:start --installer=operator --platform=minishift --self-signed-cert --tls

@skabashnyuk skabashnyuk modified the milestones: 7.7.0, 7.8.0 Jan 7, 2020
@skabashnyuk skabashnyuk removed this from the 7.8.0 milestone Jan 14, 2020
@skabashnyuk skabashnyuk added area/install Issues related to installation, including offline/air gap and initial setup and removed team/platform labels Mar 4, 2020
@tolusha tolusha added the severity/P1 Has a major impact to usage or development of the system. label Mar 21, 2020
@tolusha tolusha added this to the Backlog - Deploy milestone Mar 21, 2020
@tolusha tolusha changed the title Document using self-signed TLS mode in Che [TLS] Document using self-signed TLS mode in Che May 6, 2020
@tolusha tolusha removed this from the Backlog - Deploy milestone May 7, 2020
@tolusha tolusha mentioned this issue May 22, 2020
7 tasks
@rkratky
Copy link

rkratky commented May 27, 2020

There's Installing Che in TLS mode with self-signed certificates in the docs now. AFAICS, it covers the requested install methods with the exception of Heml Chart.

The last section needs more info.

@tolusha tolusha added this to the Backlog - Deploy milestone May 28, 2020
@tolusha tolusha mentioned this issue Jun 1, 2020
34 tasks
@tolusha tolusha modified the milestones: Backlog - Deploy, 7.15 Jun 3, 2020
@rkratky
Copy link

rkratky commented Jun 3, 2020

A separate issue for Chrome on Windows at #17077

@RickJWagner
Copy link
Contributor

There is a sub-topic here that could be addressed.
Using 'self-signed certificates' with Che/OpenShift will cause Che to generate certificates rather than use the cert from the OpenShift router. Che provides the certs.
But what if the user has their own self-signed certificate? (So this is also 'self-signed certificate', but Che does not produce the certificate, the user has them.)

@tolusha
Copy link
Contributor

tolusha commented Jul 9, 2020

Fixed by eclipse-che/che-docs#1331

@tolusha tolusha closed this as completed Jul 9, 2020
@tolusha tolusha mentioned this issue Jul 13, 2020
10 tasks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/doc Issues related to documentation area/install Issues related to installation, including offline/air gap and initial setup kind/task Internal things, technical debt, and to-do tasks to be performed. severity/P1 Has a major impact to usage or development of the system.
Projects
None yet
Development

No branches or pull requests

9 participants