Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MGDAPI-6351 - custom keycloak image, add extentions #3479

Closed
wants to merge 4 commits into from

Conversation

valerymo
Copy link
Contributor

@valerymo valerymo commented Jul 16, 2024

Issue link

Jira: https://issues.redhat.com/browse/MGDAPI-6351

This is Investigation PR, not for merge

What

Investigate creation and use of our custom keycloak image

Verification steps

  • create Custom RHBK image:
make custom-rhbk 
  • create Custom CR, and define image there, as in example below:
    (please you can look sample in Jira)
  • work according to Migration doc (see Jira)
  • After RHBK Installation (pods are running)
    • Login to RHBK Admin portal using edge route UDL (+ /auth)
    • Master Realm / Provider Info / authenticator -- and see that delay-authentication is present in providers list
    • You also can login to KC pod and see that authdelay.jar is located at /opt/keycloak/providers/authdelay.jar
    • Login to 3scale - via IDP using new user, and see that Authentication delay message is present on screen

Copy link
Contributor

openshift-ci bot commented Jul 16, 2024

[APPROVALNOTIFIER] This PR is NOT APPROVED

This pull-request has been approved by:
Once this PR has been reviewed and has the lgtm label, please assign briangallagher for approval. For more information see the Kubernetes Code Review Process.

The full list of commands accepted by this bot can be found here.

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

Copy link

codecov bot commented Jul 16, 2024

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 47.87%. Comparing base (f6e6af9) to head (c691672).
Report is 2 commits behind head on master.

Additional details and impacted files

Impacted file tree graph

@@           Coverage Diff           @@
##           master    #3479   +/-   ##
=======================================
  Coverage   47.87%   47.87%           
=======================================
  Files          95       95           
  Lines       13487    13487           
=======================================
  Hits         6457     6457           
  Misses       6321     6321           
  Partials      709      709           

@valerymo valerymo changed the title [WIP] MGDAPI-6351 - custom keycloak image, authdelay added [WIP] MGDAPI-6351 - custom keycloak image, add extentions Jul 16, 2024
@valerymo valerymo changed the title [WIP] MGDAPI-6351 - custom keycloak image, add extentions MGDAPI-6351 - custom keycloak image, add extentions Jul 18, 2024
Copy link
Contributor

openshift-ci bot commented Jul 25, 2024

@valerymo: The following test failed, say /retest to rerun all failed tests or /retest-required to rerun all mandatory failed tests:

Test name Commit Details Required Rerun command
ci/prow/rhoam-e2e c691672 link false /test rhoam-e2e

Report flaky E2E tests and PROW issues in INTLY-7197 epic. Detailed instructions can be found in the description of said epic.

Full PR test history. Your PR dashboard.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@valerymo valerymo closed this Aug 1, 2024
@valerymo
Copy link
Contributor Author

valerymo commented Aug 1, 2024

Investigation Done. Close PR

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant