-
Bug
-
Resolution: Unresolved
-
Undefined
-
None
-
premerge
-
None
-
Important
-
No
-
False
-
Description of problem:
Launched HCP clusters with image containing code in prs: https://github.com/openshift/console/pull/13530 https://github.com/openshift/console-operator/pull/840 Configure external oidc with azure entra id, after patch oidc configuration to hosted cluster, the oidc configuration is not copy to hosted cluster's authentication.
Version-Release number of selected component (if applicable):
https://github.com/openshift/console/pull/13530 https://github.com/openshift/console-operator/pull/840
How reproducible:
Always
Steps to Reproduce:
1.Launched HCP clusters with image containing code in prs: https://github.com/openshift/console/pull/13530 https://github.com/openshift/console-operator/pull/840 2.Configure external oidc with azure entra id(refer to case[OCP-71561|https://polarion.engineering.redhat.com/polarion/redirect/project/OSE/workitem?id=OCP-71561]), after patch oidc configure to hosted cluster with command: {code:java} $ oc patch hc $HC_NAME -n clusters --kubeconfig $MGMT_KUBECONFIG --type=merge -p=" spec: configuration: authentication: oidcProviders: - claimMappings: groups: claim: groups prefix: 'oidc-groups-test:' username: claim: email prefixPolicy: Prefix prefix: prefixString: 'oidc-user-test:' issuer: audiences: - $AUDIENCE_1 - $AUDIENCE_2 issuerURL: $ISSUER_URL name: microsoft-entra-id oidcClients: - clientID: $CONSOLE_CLIENT_ID clientSecret: name: $CONSOLE_CLIENT_SECRET_NAME componentName: console componentNamespace: openshift-console type: OIDC "
Check hosted cluster's authentication:
$ oc get authentication cluster -o yaml
3.
Actual results:{code:none} 2. The configuration in hc cluster is not copied to hosted cluster's authentication: oc get hc $HC_NAME -n clusters --kubeconfig mgmt_kubeconfig -ojsonpath={.spec.configuration.authentication} {"oidcProviders":[{"claimMappings":{"groups":{"claim":"groups","prefix":"oidc-groups-test:"},"username":{"claim":"email","prefix":{"prefixString":"oidc-user-test:"},"prefixPolicy":"Prefix"}},"issuer":{"audiences":["d1abb76d-bf4d-4c22-8f0d-c1a6db1eab13","2586d4b4-e81f-4bc0-9166-7f76e7a9cf53"],"issuerURL":"https://login.microsoftonline.com/64dc69e4-d083-49fc-9569-ebece1dd1408/v2.0"},"name":"microsoft-entra-id","oidcClients":[{"clientID":"d1abb76d-bf4d-4c22-8f0d-c1a6db1eab13","clientSecret":{"name":"console-secret"},"componentName":"console","componentNamespace":"openshift-console"}]}],"type":"OIDC"} $ oc get authentication cluster --kubeconfig hosted_kubeconfig -oyaml apiVersion: config.openshift.io/v1 kind: Authentication metadata: annotations: include.release.openshift.io/ibm-cloud-managed: "true" include.release.openshift.io/self-managed-high-availability: "true" release.openshift.io/create-only: "true" creationTimestamp: "2024-04-15T13:04:54Z" generation: 2 name: cluster ownerReferences: - apiVersion: config.openshift.io/v1 kind: ClusterVersion name: version uid: d580eb2f-7bfd-4382-9bc6-bb1f0d6f4c68 resourceVersion: "1478" uid: c83b2447-a780-417f-a4bf-32d11ad98568 spec: oauthMetadata: name: "" serviceAccountIssuer: https://aos-hypershift-ci-oidc-276725.s3.us-east-2.amazonaws.com/hypershift-ci-276725 type: ""
Expected results:
2. There should be external oidc configuration in hosted cluster authentication. $ oc get authentication cluster --kubeconfig hosted_kubeconfig -oyaml
Additional info:
- account is impacted by
-
CONSOLE-3902 Provide login command for console users
- Closed