summaryrefslogtreecommitdiffstats
path: root/roles/openshift_master/templates/v1_partials/oauthConfig.j2
blob: 8a4f5a7463370c358fd6c29b1437a87e80e05e24 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
{% macro identity_provider_config(identity_provider) %}
      apiVersion: v1
      kind: {{ identity_provider.kind }}
{% if identity_provider.kind == 'HTPasswdPasswordIdentityProvider' %}
      file: {{ identity_provider.filename }}
{% elif identity_provider.kind == 'BasicAuthPasswordIdentityProvider' %}
      url: {{ identity_provider.url }}
{% for key in ('ca', 'certFile', 'keyFile') %}
{% if key in identity_provider %}
      {{ key }}: "{{ identity_provider[key] }}"
{% endif %}
{% endfor %}
{% elif identity_provider.kind == 'LDAPPasswordIdentityProvider' %}
      attributes:
{% for attribute_key in identity_provider.attributes %}
        {{ attribute_key }}:
{% for attribute_value in identity_provider.attributes[attribute_key] %}
        - {{ attribute_value }}
{% endfor %}
{% endfor %}
{% for key in ('bindDN', 'bindPassword', 'ca') %}
      {{ key }}: "{{ identity_provider[key] }}"
{% endfor %}
{% for key in ('insecure', 'url') %}
      {{ key }}: {{ identity_provider[key] }}
{% endfor %}
{% elif identity_provider.kind == 'RequestHeaderIdentityProvider' %}
      headers: {{ identity_provider.headers }}
{% if 'clientCA' in identity_provider %}
      clientCA: {{ identity_provider.clientCA }}
{% endif %}
{% elif identity_provider.kind == 'GitHubIdentityProvider' %}
      clientID: {{ identity_provider.clientID }}
      clientSecret: {{ identity_provider.clientSecret }}
{% elif identity_provider.kind == 'GoogleIdentityProvider' %}
      clientID: {{ identity_provider.clientID }}
      clientSecret: {{ identity_provider.clientSecret }}
{% if 'hostedDomain' in identity_provider %}
      hostedDomain: {{ identity_provider.hostedDomain }}
{% endif %}
{% elif identity_provider.kind == 'OpenIDIdentityProvider' %}
      clientID: {{ identity_provider.clientID }}
      clientSecret: {{ identity_provider.clientSecret }}
      claims:
        id: identity_provider.claims.id
{% for claim_key in ('preferredUsername', 'name', 'email') %}
{% if claim_key in identity_provider.claims %}
        {{ claim_key }}: {{ identity_provider.claims[claim_key] }}
{% endif %}
{% endfor %}
      urls:
        authorize: {{ identity_provider.urls.authorize }}
        token: {{ identity_provider.urls.token }}
{% if 'userInfo' in identity_provider.urls %}
        userInfo: {{ identity_provider.userInfo }}
{% endif %}
{% if 'extraScopes' in identity_provider %}
      extraScopes:
{% for scope in identity_provider.extraScopes %}
      - {{ scope }}
{% endfor %}
{% endif %}
{% if 'extraAuthorizeParameters' in identity_provider %}
      extraAuthorizeParameters:
{% for param_key, param_value in identity_provider.extraAuthorizeParameters.iteritems() %}
        {{ param_key }}: {{ param_value }}
{% endfor %}
{% endif %}
{% endif %}
{% endmacro %}
oauthConfig:
  assetPublicURL: {{ openshift.master.public_console_url }}/
  grantConfig:
    method: {{ openshift.master.oauth_grant_method }}
  identityProviders:
{% for identity_provider in openshift.master.identity_providers %}
  - name: {{ identity_provider.name }}
    challenge: {{ identity_provider.challenge }}
    login: {{ identity_provider.login }}
    provider:
{{ identity_provider_config(identity_provider) }}
{%- endfor %}
  masterCA: ca.crt
  masterPublicURL: {{ openshift.master.public_api_url }}
  masterURL: {{ openshift.master.api_url }}
  sessionConfig:
    sessionMaxAgeSeconds: {{ openshift.master.session_max_seconds }}
    sessionName: {{ openshift.master.session_name }}
    sessionSecretsFile: {{ openshift.master.session_secrets_file }}
  tokenConfig:
    accessTokenMaxAgeSeconds: {{ openshift.master.access_token_max_seconds }}
    authorizeTokenMaxAgeSeconds: {{ openshift.master.auth_token_max_seconds }}
{# Comment to preserve newline after authorizeTokenMaxAgeSeconds #}