Configuring GitLab authentication allows users to log in to OpenShift Container Platform with their GitLab credentials.
If you use GitLab version 7.7.0 to 11.0, you connect using the OAuth integration. If you use GitLab version 11.1 or later, you can use OpenID Connect (OIDC) to connect instead of OAuth.
- You created your account roles using Terraform.
- You created your cluster using Terraform. This cluster can either have a managed OIDC configuration or an unmanaged OIDC configuration.
- Optional: You have configured your Terraform.tfvars file.
You will need a client ID/Secret of a registered GitLab OAuth application.
The application must be configured with a callback URL of https://oauth-openshift.apps.<cluster-name>.<cluster-domain>/oauth2callback/<idp-provider-name>
For example:
https://oauth-openshift.apps.openshift-cluster.example.com/oauth2callback/Gitlab
Note:
<idp-provider-name>
is case-sensitive. Name is defined here
-
You need to either create a
terraform.tfvars
file in this directory, or add the following items to your existing*.tfvars
file. You may also export these variables as environmental variables with the following commands:- This value is the generated GitLab client secret to validate your account. It can be found in the settings of your GitLab account.
export TF_VAR_gitlab_client_secret=<gitlab_client_secret>
- This value is your GitLab client ID. It can be found in the settings of your GitLab account.
export TF_VAR_gitlab_client_id=<client_id>
- This value should be your GitLab URL that was generated in the previous step.
export TF_VAR_gitlab_url='["<gitlab_url>"]'
- This variable should be your full OCM offline token that you generated in the prerequisites.
export TF_VAR_token=<ocm_offline_token>
- This value should point to your OpenShift instance.
export TF_VAR_url=<ocm_url>
- The ID of the cluster for which you are creating the identity provider. This ID can be found in the CLI with the command
rosa list cluster
.export TF_VAR_cluster_id=<cluster_id>
- This value is the generated GitLab client secret to validate your account. It can be found in the settings of your GitLab account.
-
In your local copy of the
gitlab
folder, run the following command:terraform init
Running this command accesses all the necessary provider information to apply your Terraform plan.
-
Optional: Run the
plan
command to ensure that your Terraform files build correctly without errors. This is not required to apply your Terraform plans.terraform plan -out gitlab.tfplan
-
Run the apply command to create your GitLab identity provider.
Note: If you did not run the
plan
command, you can simply justapply
without specifying a file.terraform apply <"gitlab.tfplan">
-
The Terraform applies the plan and creates your identity provider using GitLab. You will see a prompt to confirm you want to create these resources. Enter
yes
, then the process will complete with your resources.
After you are done with the resources you created, you should not delete them manually, but instead, use the destroy
command. Run the following to delete all of your created resources:
terraform destroy
After the command is complete, your resources are deleted.
NOTE: If you manually delete a resource, you create unresolvable issues within your environment.