Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

che-operator points to invalid cacerts path on RHEL8 based RH SSO #17058

Closed
4 of 15 tasks
nickboldt opened this issue Jun 1, 2020 · 2 comments
Closed
4 of 15 tasks

che-operator points to invalid cacerts path on RHEL8 based RH SSO #17058

nickboldt opened this issue Jun 1, 2020 · 2 comments
Assignees
Labels
kind/bug Outline of a bug - must adhere to the bug report template. severity/P1 Has a major impact to usage or development of the system.
Milestone

Comments

@nickboldt
Copy link
Contributor

nickboldt commented Jun 1, 2020

Describe the bug

As investigated in https://issues.redhat.com/browse/CRW-933 the che-operator points to a hardcoded path to the cacerts file, which may not exist on newer platforms.

Result is this failure to start the SSO container:

keytool error: java.io.FileNotFoundException: 
/usr/lib/jvm/java-11/jre/lib/security/cacerts (No such file or directory)

Solution is to check more than one path exists, and pick the first valid one.

Some paths to check:

  • /etc/pki/java/cacerts
  • /usr/lib/jvm/java*/lib/security/cacerts
  • /etc/java/java*/*/lib/security/cacerts
  • $JAVA_HOME/jre/lib/security/cacerts

Che version

  • master
  • 7.13.x

Steps to reproduce

See CRW-933

Expected behavior

SSO container should be able to start inside a CRW deployment.

Runtime

  • kubernetes (include output of kubectl version)
  • Openshift (include output of oc version)
  • minikube (include output of minikube version and kubectl version)
  • minishift (include output of minishift version and oc version)
  • docker-desktop + K8S (include output of docker version and kubectl version)
  • other: (please specify)

Screenshots

image

image

Installation method

  • chectl
    • provide a full command that was used to deploy Eclipse Che (including the output)
    • provide an output of chectl version command
  • OperatorHub
  • I don't know
crwctl server:start --self-signed-cert --che-operator-image=quay.io/crw/operator-rhel8:latest --listr-renderer=verbose -n nboldt-crw220b
@nickboldt nickboldt added kind/bug Outline of a bug - must adhere to the bug report template. severity/P1 Has a major impact to usage or development of the system. team/deploy labels Jun 1, 2020
@nickboldt nickboldt added this to the 7.14 milestone Jun 1, 2020
@tolusha tolusha mentioned this issue Jun 2, 2020
34 tasks
@tolusha
Copy link
Contributor

tolusha commented Jun 2, 2020

We will start working on it asap

@tolusha
Copy link
Contributor

tolusha commented Jun 2, 2020

It is enough to import /etc/pki/ca-trust/extracted/java/cacerts
All other files are simlink to that one

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Outline of a bug - must adhere to the bug report template. severity/P1 Has a major impact to usage or development of the system.
Projects
None yet
Development

No branches or pull requests

2 participants