-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verify if kubeadmin can be a regular OAuth user with latest Keycloak and OpenShift #16835
Comments
I justed tested on a 4.3.9 OpenShift cluster, and the JSON profile returned for the ╰─ curl -k -H "Authorization: Bearer xxxxxxxxx" "https://api.test-ocp43.codereadyqe.com:6443/apis/user.openshift.io/v1/users/~"
{
"kind": "User",
"apiVersion": "user.openshift.io/v1",
"metadata": {
"name": "kube:admin",
"selfLink": "/apis/user.openshift.io/v1/users/kube%3Aadmin",
"creationTimestamp": null
},
"identities": null,
"groups": [
"system:authenticated",
"system:cluster-admins"
]
} Note that there is no "identity", since the As a comparison, here is the profile of a user created with the ╰─ curl -k -H "Authorization: Bearer xxxxxxx" "https://api.test-ocp43.codereadyqe.com:6443/apis/user.openshift.io/v1/users/~"
{
"kind": "User",
"apiVersion": "user.openshift.io/v1",
"metadata": {
"name": "user",
"selfLink": "/apis/user.openshift.io/v1/users/user",
"uid": "e01e78aa-50d9-482e-8bb4-3442a5247313",
"resourceVersion": "5462325",
"creationTimestamp": "2020-04-17T09:47:59Z"
},
"identities": [
"htpasswd:user"
],
"groups": [
"system:authenticated",
"system:authenticated:oauth"
]
} Now here is why the limitation is still there in the latest Keycloak: The
In the case of the user
To summarize: For now the cc @slaskawi |
On the Openshift side, I created the following issue: openshift/origin#24950 |
Issues go stale after Mark the issue as fresh with If this issue is safe to close now please do so. Moderators: Add |
Closing this issue since the verification has been done. |
Just to update here ... This is now posible. |
@iam-veeramalla this is possible since Che v7.42. If you are testing on CRW it will be possible starting with CRW 2.16. |
I am not using CRW. I was waiting for Keycloak to support this feature, I saw previously that you were also waiting for this feature like me. I just thought of updating that it's possible now but looks like you guys already knew it :) |
Oh sorry, I didn't know about Keycloak. What we did is that we removed it as a Che dependency: on OpenShift we use the embedded OAuth service. |
Is your enhancement related to a problem? Please describe.
We currently do not support using OpenShift OAuth when
kubeadmin
is the only user of the cluster. That's because we assume that Keycloak doesn't support it. But that's something we verfied 1 year ago. And things may have changed.Describe the solution you'd like
Verify if latest versions of Keycloak and OpenShift allow to use kubeadmin as a valid OAuth identity.
The text was updated successfully, but these errors were encountered: