-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Simplify setup and pull secret flow with Red Hat SSO extension #200
Milestone
Comments
@jeffmaury I published @redhat-developer/rhaccm-client simplify it. The implementation for this feature should:
const authSession: extensionApi.AuthenticationSession | undefined> = await extensionApi.authentication.getSession(
'redhat.authentication-provider',
['api.iam.registry_service_accounts', //scope that gives access to hydra service accounts API
'api.console', // scope that gives access to console.redhat.com APIs
'id.username'], // adds claim to accessToken that used to render account label
{createIfNone: true} // will request to login in browser if session does not exists
);
import { AccountManagementClient } from '@redhat-developer/rhaccm-client';
const client = new AccountManagementClient({
BASE: 'https://api.openshift.com/api/accounts_mgmt/v1',
TOKEN: authSession.access_token,
});
const accessTokenCfg = await client.default.postApiAccountsMgmtV1AccessToken();
const pull_secret:string = JSON.stringify(accessTokenCfg); |
Implemented and merged to main. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Goals
Thanks to the work done on the Red Hat SSO extension, we now would like to automate the process of getting the pull secret to start openshift local.
Sub-tasks
The text was updated successfully, but these errors were encountered: