Che Server http sessions leak #14599
Labels
kind/bug
Outline of a bug - must adhere to the bug report template.
severity/P1
Has a major impact to usage or development of the system.
Milestone
Describe the bug
During my test #13034
![64536243-0bf8ab00-d319-11e9-9a3f-ae83bac5001f](https://user-images.githubusercontent.com/1614429/65244994-6b627200-daf4-11e9-8ea8-18400d18550a.png)
I've noticed that if we are not using browser client as we do for brockers, chectl, etc we
create an individual http session on tomcat side that may because of memory leak.
The goal of this task is to use a single http session after we identified the actual user. We can reuse parts of Codenvy SSO code to do that.
Che version
Steps to reproduce
multiple requests like
curl http://localhost/api/user
with keycloak token.Expected behavior
Tomcat will use the same http session for all request processing.
Runtime
kubectl version
)oc version
)minikube version
andkubectl version
)minishift version
andoc version
)docker version
andkubectl version
)Installation method
Environment
Additional context
The text was updated successfully, but these errors were encountered: