-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fallback to native Keycloak users if using OpenShift OAuth is not possible #16836
Comments
@davidfestal |
@tolusha I assume it's related to the sub-issue: #16837 Mainly OpenShift OAuth should be disabled if the list of identity providers returned by the following ╰─ oc get oauth/cluster -o jsonpath="{.spec.identityProviders}" Of course in the controller logic you would probably get this using the API and the non-cached client. |
Hello @l0rd @tolusha . We implemented check identity providers using oAuth, but it works only for Openshift 4. For openshift 3 'oauth' object was encapsulated in the configuration file https://docs.openshift.com/container-platform/3.11/install_config/master_node_configuration.html#master-node-config-manual and we don't have access to this object.
|
@AndrienkoAleksandr ok from my side but I guess that this is a question related to #16837 rather then this issue right? In both cases, OCP 4 and OCP 3.11, you will fallback to native Keycloak users if you are not able to find a valid OAuth identity provider or user (this issue). |
@l0rd @AndrienkoAleksandr |
Pr's merged, so close this an issue. |
Is your enhancement related to a problem? Please describe.
When a user deploys Che on OpenShift using the operator and specifying to use OpenShift OAuth:
the deployment faisl if it's not possible to use OpenShift OAuth (e.g. kubeadmin is the only user).
Describe the solution you'd like
If using OpenShift OAuth is not possible we should NOT fail and instead:
openShiftoAuth: false
The text was updated successfully, but these errors were encountered: