- OpenShift 4.18+
- OpenShift Command Line installed and authenticated to target Cluster
- Git
- Helm
I hereby claim:
- I am sabre1041 on github.
- I am sabre1041 (https://keybase.io/sabre1041) on keybase.
- I have a public key whose fingerprint is 2CE5 F1FB 9E8C 59B8 7BBD 5F2B 02DF E631 AEF3 5EBC
To claim this, I am signing this object:
This walkthrough provides the steps for integrating Red Hat Advanced Cluster Security (ACS) with OpenShift Authentication with dex
- OpenShift Cluster
- OpenShift CLI
- Helm CLI
- Existing Installation of Red Hat Advanced Cluster Security (ACS)
| package main | |
| import ( | |
| "bytes" | |
| "context" | |
| "crypto/tls" | |
| "flag" | |
| "fmt" | |
| "os" | |
| "strconv" |
| #!/usr/bin/env python | |
| import json, subprocess, time, copy, sys, os, yaml, tempfile, shutil, math, urllib2 | |
| from datetime import datetime | |
| from clusterloaderstorage import * | |
| from multiprocessing import Process | |
| from flask import Flask, request | |
| globalvars = {} |
Your privacy is important to us. This privacy statement provides information about the personal information that the Alexa OpenShift Online Developer Preview Skill collects, and the ways in which we uses that personal information.
The services provided by this applications are to be utilized as an integration with the OpenShift Online Developer Preview environment where is the ultimate source of truth and contains any and all personal information. Please refer to the official policy statement for additional details.
The Alexa OpenShift Online Developer Preview Skill collects the following kinds of personal information:
| export SECRET_VALUE=openshiftsecretvalue |
| #!/usr/bin/groovy | |
| String ocpApiServer = env.OCP_API_SERVER ? "${env.OCP_API_SERVER}" : "https://openshift.default.svc.cluster.local" | |
| node('maven') { | |
| def artifactory = Artifactory.server(env.ARTIFACTORY_SERVER) | |
| def artifactoryMaven = Artifactory.newMavenBuild() | |
| def buildInfo = Artifactory.newBuildInfo() | |
| def scannerHome = tool env.SONARQUBE_TOOL | |
| def namespace = readFile('/var/run/secrets/kubernetes.io/serviceaccount/namespace').trim() |
| --- | |
| - hosts: openshift | |
| force_handlers: True | |
| vars: | |
| openshift_master_url: localhost | |
| openshift_login_insecure_flag: --insecure-skip-tls-verify=true | |
| openshift_login_insecure: False | |
| openshift_prune_builds_complete: 5 | |
| openshift_prune_builds_failed: 1 |
One of the core components of this demonstration is to utilize the principles and tools emphasized by continuous integration and continuous delivery. This document explains how these tools and concepts are achieved.
The Jenkins Continuous Integration Server is being used to orchestrate the building, deploying and promoting of applications to OpenShift. It builds upon the official [Jenkins xPaaS image] (https://docs.openshift.com/enterprise/latest/using_images/other_images/jenkins.html) by adding essential plugins and configurations to enable continuous integration and delivery functionality and behavior driven development.