1818# getByKey, getByNameSpace, stopWorkspaces, and getResourcesInformation.
1919# These are not given to admins by default and these permissions allow
2020# admins gain visibility to any workspace along with naming themselves
21- # with admin privileges to those workspaces.
21+ # with administrator privileges to those workspaces.
2222che.system.super_privileged_mode =false
2323
24- # Grant system permission for ' che.admin.name' user. If the user already exists it'll happen on
24+ # Grant system permission for ` che.admin.name` user. If the user already exists it'll happen on
2525# component startup, if not - during the first login when user is persisted in the database.
2626che.system.admin_name =admin
2727
@@ -36,13 +36,13 @@ che.limits.workspace.env.ram=16gb
3636# The length of time in milliseconds that a user is idle with their workspace when the system will
3737# suspend the workspace and then stopping it. Idleness is the
3838# length of time that the user has not interacted with the workspace, meaning that
39- # one of our agents has not received interaction. Leaving a browser window open
39+ # one of the agents has not received interaction. Leaving a browser window open
4040# counts toward idleness.
4141che.limits.workspace.idle.timeout =1800000
4242
4343# The length of time in milliseconds that a workspace will run, regardless of activity, before
44- # the system will suspend it. Set this property if you want to automatically stop
45- # workspaces after a period of time. The default is zero, meaning that there is no
44+ # the system will suspend it. Set this property if you want to automatically stop
45+ # workspaces after a period of time. The default is zero, meaning that there is no
4646# run timeout.
4747che.limits.workspace.run.timeout =0
4848
@@ -85,13 +85,12 @@ che.limits.organization.workspaces.run.count=-1
8585
8686# ## Multi-user-specific OpenShift infrastructure configuration
8787
88- # Alias of the Openshift identity provider registered in Keycloak,
88+ # Alias of the OpenShift identity provider registered in Keycloak,
8989# that should be used to create workspace OpenShift resources in
90- # Openshift namespaces owned by the current Che user.
90+ # OpenShift namespaces owned by the current Che user.
9191# Should be set to NULL if `che.infra.openshift.project`
9292# is set to a non-empty value.
93- # For more information see the following documentation:
94- # https://www.keycloak.org/docs/3.3/server_admin/topics/identity-broker/social/openshift.html
93+ # See: link:https://www.keycloak.org/docs/latest/server_admin/#openshift-4[OpenShift identity provider]
9594che.infra.openshift.oauth_identity_provider =NULL
9695
9796# ## Keycloak configuration
@@ -109,22 +108,22 @@ che.keycloak.auth_internal_server_url=NULL
109108# is used
110109che.keycloak.realm =che
111110
112- # Keycloak client id in che.keycloak.realm that is used by dashboard, ide and cli to authenticate users
111+ # Keycloak client identifier in ` che.keycloak.realm` to authenticate users in the dashboard, the IDE, and the CLI.
113112che.keycloak.client_id =che-public
114113
115- # URL to access OSO oauth tokens
114+ # URL to access OSO OAuth tokens
116115che.keycloak.oso.endpoint =NULL
117116
118- # URL to access Github oauth tokens
117+ # URL to access Github OAuth tokens
119118che.keycloak.github.endpoint =NULL
120119
121- # The number of seconds to tolerate for clock skew when verifying exp or nbf claims.
120+ # The number of seconds to tolerate for clock skew when verifying ` exp` or ` nbf` claims.
122121che.keycloak.allowed_clock_skew_sec =3
123122
124123# Use the OIDC optional `nonce` feature to increase security.
125124che.keycloak.use_nonce =true
126125
127- # URL to the Keycloak Javascript adapter we want to use.
126+ # URL to the Keycloak Javascript adapter to use.
128127# if set to NULL, then the default used value is
129128# `${che.keycloak.auth_server_url}/js/keycloak.js`,
130129# or `<che-server>/api/keycloak/OIDCKeycloak.js`
@@ -133,7 +132,7 @@ che.keycloak.js_adapter_url=NULL
133132
134133# Base URL of an alternate OIDC provider that provides
135134# a discovery endpoint as detailed in the following specification
136- # https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig
135+ # link: https://openid.net/specs/openid-connect-discovery-1_0.html#ProviderConfig[Obtaining OpenID Provider Configuration Information]
137136che.keycloak.oidc_provider =NULL
138137
139138# Set to true when using an alternate OIDC provider that
@@ -149,27 +148,27 @@ che.keycloak.username_claim=NULL
149148# Configuration of OAuth Authentication Service that can be used in "embedded" or "delegated" mode.
150149# If set to "embedded", then the service work as a wrapper to Che's OAuthAuthenticator ( as in Single User mode).
151150# If set to "delegated", then the service will use Keycloak IdentityProvider mechanism.
152- # Runtime Exception wii be thrown, in case if this property is not set properly.
151+ # Runtime Exception ` wii` be thrown, in case if this property is not set properly.
153152che.oauth.service_mode =delegated
154153
155154# Configuration for enabling removing user from Keycloak server on removing user from Che database.
156155# By default it's disabled. Can be enabled in some special cases when deleting a user in Che database
157156# should execute removing related-user from Keycloak.
158- # For correct work need to set admin username ${che.keycloak.admin_username} and password
157+ # For correct work need to set administrator username ${che.keycloak.admin_username} and password
159158# ${che.keycloak.admin_password}.
160159che.keycloak.cascade_user_removal_enabled =false
161160
162- # Keycloak admin username. Will be used for deleting user from Keycloak on removing user
161+ # Keycloak administrator username. Will be used for deleting user from Keycloak on removing user
163162# from Che database. Make sense only in case ${che.keycloak.cascade_user_removal_enabled}
164163# set to 'true'
165164che.keycloak.admin_username =NULL
166165
167- # Keycloak admin password. Will be used for deleting user from Keycloak on removing user
166+ # Keycloak administrator password. Will be used for deleting user from Keycloak on removing user
168167# from Che database. Make sense only in case ${che.keycloak.cascade_user_removal_enabled}
169168# set to 'true'
170169che.keycloak.admin_password =NULL
171170
172- # User name adjustment configuration. Che needs to use the usernames as part of K8s object names and labels and
171+ # User name adjustment configuration. Che needs to use the usernames as part of Kubernetes object names and labels and
173172# therefore has stricter requirements on their format than the identity providers usually
174173# allow (it needs them to be DNS-compliant). The adjustment is represented by comma-separated key-value pairs.
175174# These are sequentially used as arguments to the String.replaceAll function on the original username.
0 commit comments