-
Notifications
You must be signed in to change notification settings - Fork 14
/
Copy pathlab5-oauth.yaml
33 lines (33 loc) · 1.22 KB
/
lab5-oauth.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
apiVersion: config.openshift.io/v1
kind: OAuth
metadata:
annotations:
include.release.openshift.io/ibm-cloud-managed: "true"
include.release.openshift.io/self-managed-high-availability: "true"
include.release.openshift.io/single-node-developer: "true"
kubectl.kubernetes.io/last-applied-configuration: |
{"apiVersion":"config.openshift.io/v1","kind":"OAuth","metadata":{"annotations":{},"name":"cluster"},"spec":{"identityProviders":[{"htpasswd":{"fileData":{"name":"htpass-secret"}},"mappingMethod":"claim","name":"developer","type":"HTPasswd"}],"templates":{"login":{"name":"login-template"}},"tokenConfig":{"accessTokenMaxAgeSeconds":0}}}
release.openshift.io/create-only: "true"
creationTimestamp: "2022-06-01T03:49:20Z"
generation: 2
name: cluster
ownerReferences:
- apiVersion: config.openshift.io/v1
kind: ClusterVersion
name: version
uid: 107960b8-b9d6-4996-b773-4805b921abd9
resourceVersion: "20433"
uid: 41ad9e9c-de12-43d4-a275-af6c64c37368
spec:
identityProviders:
- htpasswd:
fileData:
name: localusers
mappingMethod: claim
name: developer
type: HTPasswd
templates:
login:
name: login-template
tokenConfig:
accessTokenMaxAgeSeconds: 0