-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create a valid user if no one exist when deploying on OpenShift #18152
Comments
I assume we should do it while using |
For me, it's not clear why we should configure authentication/create users on the OpenShift cluster.
|
@tolusha ideally that should be done by the operator, not chectl. @sleshchenko this is one of the 2 main problems that users report when deploying Che for the first time (the other one being TLS) and that's the reason I have opened this issue. You are right about the fact that a prod installation of Che would assume a proper configuration of the users/cluster. But we need to provide a good first impression to a developer/admin/architect/pm that knows nothing about Che and just want to try it out. |
The flow is I see again and again is: the user setup an OpenShift cluster (with default values) and deploy Che on it through OLM. Installation works pretty well now but as soon as they start a workspace they get the untrusted TLS error and they figure out that the Che user is not an OpenShift user. For the letting know the password to the user: how does it work today? I mean when OpenShift OAuth is disabled how do we inform the user about Che username/password? |
I think self-registration is allowed by default and users just register a new user with keycloak. @tolusha Could you confirm or provide the right flow here? |
Raising this issue priority as I keep hearing about users confused by this. |
depends on eclipse-che/che-operator#551 |
Is your enhancement related to a problem? Please describe.
If, at the moment of installation on OpenShift, kubeadmin is the only user the operator doesn't enable OpenShift OAuth.
Describe the solution you'd like
Create a new OpenShift user through htpasswd (automatically generate password) and enable OpenShift OAuth.
The text was updated successfully, but these errors were encountered: