Skip to content

Latest commit

 

History

History
100 lines (80 loc) · 2.49 KB

LOGIN.md

File metadata and controls

100 lines (80 loc) · 2.49 KB

Identity Management

GitHub Authentication

If your cluster domain has changed you will need to update the Oauth callback URL.

  1. Go to: Enterprise Neurosystem Apps, OCP Login
  2. Update the Authorization callback URL 'https://oauth-openshift.apps.[cluster name].[domain name]/oauth2callback/Enterprise-Neurosystem'
  3. Click Update Application

Add a login to htpasswd

Extract / Create htpasswd

oc -n openshift-config \
  extract \
  secret/htpasswd-secret \
  --to=- > scratch/htpasswd

# edit htpasswd
# vi scratch/htpasswd

# create new secret from htpasswd
oc -n openshift-config \
  create secret generic \
  htpasswd-secret \
  --from-file scratch/htpasswd \
  --dry-run=client -o yaml \
  > scratch/htpasswd-secret.yaml

# create sealed secret for htpasswd
cat scratch/htpasswd-secret.yaml | \
  kubeseal \
    -o yaml \
    --controller-namespace sealed-secrets \
      | sed '/: null/d; $d' > scratch/htpasswd-secret-ss.yaml

Create GitHub Secret

oc -n openshift-config \
  extract \
  secret/github-secret \
  --to=- > scratch/clientSecret

# create new secret from clientSecret
oc -n openshift-config \
  create secret generic \
  github-secret \
  --from-file scratch/clientSecret \
  --dry-run=client -o yaml \
  > scratch/github-secret.yaml

# create sealed secret for htpasswd
cat scratch/github-secret.yaml | \
  kubeseal \
    -o yaml \
    --controller-namespace sealed-secrets \
      | sed '/: null/d; $d' > scratch/github-secret-ss.yaml
cat << YAML | > scratch/htpasswd-secret.yaml
kind: Secret
apiVersion: v1
metadata:
  name: htpasswd-secret
  namespace: openshift-config
  annotations:
    managed-by: argocd.argoproj.io
stringData:
  htpasswd: |
    # managed by argocd
    #
    # add a password with the following
    # NOTE: the leading extra space so you do not leave a password in shell history
    #  PASSWORD=alongsecret
    # echo -n "$PASSWORD" | htpasswd -inB opentlc-mgr

    opentlc-mgr:asecrethashwillgohere
YAML

  PASSWORD=alongsecret
echo -n "$PASSWORD" | htpasswd -inB username >> scratch/htpasswd-secret.yaml

Turn your secret into a sealed secret for git

cat scratch/htpasswd-secret | \
  kubeseal \
    -o yaml \
    --controller-namespace sealed-secrets > scratch/htpasswd-secret-ss.yaml

Links