The authentication operator is an
OpenShift ClusterOperator.
It installs and maintains the Authentication Custom Resource in a cluster and can be viewed with:
oc get clusteroperator authentication -o yaml
The Custom Resource Definition
authentications.operator.openshift.io
can be viewed in a cluster with:
$ oc get crd authentications.operator.openshift.io -o yaml
Many OpenShift ClusterOperators share common build, test, deployment, and update methods.
For more information about how to build, deploy, test, update, and develop OpenShift ClusterOperators, see
OpenShift ClusterOperator and Operand Developer Document
This section explains how to deploy OpenShift with your test cluster-authentication-operator image:
Testing a ClusterOperator/Operand image in a cluster
The most common identity provider for demoing and testing is the HTPasswd IdP.
To set it up, take the following steps:
$ htpasswd -bBc /tmp/htpasswd testuser testpasswd
$ htpasswd -bB /tmp/htpasswd testuser2 differentpassword
openshift-config
namespace
oc create secret generic myhtpasswdidp-secret -n openshift-config --from-file=/tmp/htpasswd
apiVersion: config.openshift.io/v1
kind: OAuth
metadata:
name: cluster
spec:
identityProviders:
- name: htpassidp
type: HTPasswd
htpasswd:
fileData:
name: myhtpasswdidp-secret
oc get clusteroperator authentication
), you should be able to log in:
oc login -u testuser -p testpasswd