Skip to content

Instantly share code, notes, and snippets.

@chuckersjp
Created April 27, 2020 18:20
Show Gist options
  • Save chuckersjp/e124b09d54c162b4cd8b9a7e709a6c08 to your computer and use it in GitHub Desktop.
Save chuckersjp/e124b09d54c162b4cd8b9a7e709a6c08 to your computer and use it in GitHub Desktop.
Create multiple user login registry for OpenShift 4
- name: Create htpass-secret secret in openshift-config name space for backdoor htpasswd user registry
k8s:
kubeconfig: kubeconfig
state: present
definition:
apiVersion: v1
data:
htpasswd: "{{ htpasswdtoken }}"
kind: Secret
metadata:
name: htpass-secret
namespace: openshift-config
type: Opaque
- name: Create Azure secret in openshift-config name space for Azure user registry
k8s:
kubeconfig: kubeconfig
state: present
definition:
apiVersion: v1
data:
clientSecret: "{{ openshift_master_oauth_client_secret | b64encode }}"
kind: Secret
metadata:
name: azure-secret
namespace: openshift-config
type: Opaque
- name: Update OAuth to apply htpasswd user registry and azure user registry config
k8s:
kubeconfig: kubeconfig
state: present
definition:
apiVersion: config.openshift.io/v1
kind: OAuth
metadata:
name: cluster
spec:
identityProviders:
- htpasswd:
fileData:
name: htpass-secret
mappingMethod: claim
name: users_htpasswd_provider
type: HTPasswd
- mappingMethod: claim
name: aad
openID:
claims:
email:
- upn
name:
- upn
preferredUsername:
- upn
clientID: "{{ openshift_master_oauth_client_id }}"
clientSecret:
name: azure-secret
extraScopes: []
issuer: https://login.microsoftonline.com/"<token>"
type: OpenID
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment