-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
There is no need to add the self signed CA in single host mode #18082
Comments
Is it the case that single host mode removes the requirement to add the cert to the browser? I'm interested in this issue as I'm trying to configure with a self-signed cert however due to client restrictions we can't add the certificate to the browser. Does this mean we're forced to create a trusted certificate? |
@PirateBread correct |
@PirateBread to be precise you will still have a warning and you have to agree to accept the risk of accessing a website that uses an untrusted certificate but you don't need to perform actions that need admin rights (download the certificate and configure your browser/host sot that the certificate authority is added among the trusted ones). |
Thanks for confirming. I don't think this is documented anywhere? I'm trying to access Eclipse using single host mode but can't get past this client side SSL check. Your post was the only thing I found on this topic. The config map has the following: I'm not using chectl, but deploying with Helm, so wondering what the difference is between your install which doesn't need it. |
@PirateBread here you can find docs about it https://www.eclipse.org/che/docs/che-7/installation-guide/configuring-workspace-exposure-strategies/ |
@sleshchenko Thanks for the comment. I have seen that particular documentation but not relating to the client SSL validation. This is the only resource I've seen which suggests that the adding the certificate to the browser is not required when deploying in single-host mode. To clarify: my issue is deploying Che in single-host mode with an internal generated certificate which is not trusted by the end user devices. I am being blocked accessing the dashboard by the "self-signed" SSL check which is asking me to trust the certificate in the browser, which we can't do due to restrictions on the end user devices. |
|
In general, it is still better to add the certificate as trusted in case if clients aren't in the trusted network. Otherwise, it might be unsafe. |
@mmorhun asking users to add an untrusted CA certificate to their local truststore is not safe and it's worse than accepting one exception. |
Disagree on this. When users add self-signed certificate into their trust store it is possible to check its origin (he cert was given by admin or generated by Che installer). In case of just trusting unknown untrusted thing in is not possible to check at all. |
A couple of updates here:
|
Describe the bug
When I deploy Che with
chectl
in single-host mode and I am warned to add a certificate:But that's not needed. Che workspaces work fine in my browser even if I do not import the certificate.
Che version
nightly
Steps to reproduce
On minikube deploy Che using chectl:
Expected behavior
No warning, no message to add the CA cert into a browser.
Runtime
Screenshots
Environment
macOS
The text was updated successfully, but these errors were encountered: