Skip to content

Commit 222ae64

Browse files
committed
Fixup
Signed-off-by: Anatolii Bazko <abazko@redhat.com>
1 parent db06e09 commit 222ae64

4 files changed

+44
-7
lines changed

modules/administration-guide/pages/installing-che-on-amazon-elastic-kubernetes-service.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,4 +32,6 @@ include::partial$proc_creating-lets-encrypt-certificate-for-che-on-amazon-elasti
3232

3333
include::partial$proc_installing-keycloak-on-amazon-elastic-kubernetes-service.adoc[leveloffset=+1]
3434

35+
include::partial$proc_associate-keycloak-as-oidc-identity-provider-on-amazon-elastic-kubernetes-service.adoc[leveloffset=+1]
36+
3537
include::partial$proc_installing-che-on-amazon-elastic-kubernetes-service.adoc[leveloffset=+1]
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
// Module included in the following assemblies:
2+
//
3+
// installing-{prod-id-short}-on-amazon-elastic-kubernetes-service
4+
5+
[id="associate-keycloak-as-oidc-identity-provider-on-amazon-elastic-kubernetes-service"]
6+
= Associate keycloak as OIDC identity provider on {eks-short}
7+
8+
Follow these instructions to associate Keycloak an OIDC identity provider on {eks-short}.
9+
10+
.Procedure
11+
12+
. Associate an identity provider using `eksctl`:
13+
+
14+
[source,shell,subs="attributes+"]
15+
----
16+
eksctl associate identityprovider \
17+
--cluster $CHE_EKS_CLUSTER_NAME \
18+
--region $CHE_EKS_CLUSTER_REGION \
19+
--wait \
20+
--config-file - << EOF
21+
---
22+
apiVersion: eksctl.io/v1alpha5
23+
kind: ClusterConfig
24+
identityProviders:
25+
- name: my-provider
26+
type: oidc
27+
issuerUrl: https://$KEYCLOAK_DOMAIN/realms/che
28+
clientId: k8s-client
29+
usernameClaim: email
30+
EOF
31+
----
32+
33+
.Additional resources
34+
35+
* link:https://docs.aws.amazon.com/eks/latest/userguide/authenticate-oidc-identity-provider.html[Grant users access to {kubernetes} with an external OIDC provider]

modules/administration-guide/partials/proc_installing-che-on-amazon-elastic-kubernetes-service.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -19,15 +19,15 @@ spec:
1919
auth:
2020
oAuthClientName: k8s-client
2121
oAuthSecret: eclipse-che
22-
identityProviderURL: "https://$KEYCLOAK_HOST/realms/che"
22+
identityProviderURL: "https://$KEYCLOAK_DOMAIN/realms/che"
2323
gateway:
2424
oAuthProxy:
2525
cookieExpireSeconds: 300
2626
deployment:
2727
containers:
2828
- env:
2929
- name: OAUTH2_PROXY_BACKEND_LOGOUT_URL
30-
value: "http://$KEYCLOAK_HOST/realms/che/protocol/openid-connect/logout?id_token_hint=\{id_token}"
30+
value: "http://$KEYCLOAK_DOMAIN/realms/che/protocol/openid-connect/logout?id_token_hint=\{id_token}"
3131
name: oauth-proxy
3232
components:
3333
cheServer:

modules/administration-guide/partials/proc_installing-keycloak-on-amazon-elastic-kubernetes-service.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ Learn how to install https://www.keycloak.org/[Keycloak] as the OpenID Connect (
99
+
1010
[source,subs="+attributes"]
1111
----
12-
KEYCLOAK_HOST=keycloak.$DOMAIN_NAME
12+
KEYCLOAK_DOMAIN=keycloak.$DOMAIN_NAME
1313
----
1414

1515
. Install Keycloak:
@@ -37,9 +37,9 @@ spec:
3737
issuerRef:
3838
name: che-letsencrypt
3939
kind: ClusterIssuer
40-
commonName: '$KEYCLOAK_HOST'
40+
commonName: '$KEYCLOAK_DOMAIN'
4141
dnsNames:
42-
- '$KEYCLOAK_HOST'
42+
- '$KEYCLOAK_DOMAIN'
4343
usages:
4444
- server auth
4545
- digital signature
@@ -112,10 +112,10 @@ spec:
112112
ingressClassName: nginx
113113
tls:
114114
- hosts:
115-
- $KEYCLOAK_HOST
115+
- $KEYCLOAK_DOMAIN
116116
secretName: keycloak.tls
117117
rules:
118-
- host: $KEYCLOAK_HOST
118+
- host: $KEYCLOAK_DOMAIN
119119
http:
120120
paths:
121121
- path: /

0 commit comments

Comments
 (0)