[sysadmin@controller-0 wad(keystone_admin)]$ kubelogin
error: error while authentication: could not create an OIDC client: could not discovery the OIDC issuer: Get https://yow-gwaines-d1.corp.ad.wrs.com:32000/dex/.well-known/openid-configuration: read tcp 10.10.10.3:52938->128.224.141.44:32000: read: connection reset by peer
[sysadmin@controller-0 wad(keystone_admin)]$
--oidc-issuer-url=https://yow-gwaines-d1.corp.ad.wrs.com:32000--oidc-client-id=kubernetes--oidc-ca-file=/etc/ssl/certs/dex-ca.pem--oidc-username-claim=email--oidc-groups-claim=group
storage:type: kubernetesconfig:inCluster: trueweb:https: 0.0.0.0:32000tlsCert: /etc/dex/tls/tls.crttlsKey: /etc/dex/tls/tls.keyconnectors:- type: ldapname: OpenLDAPid: ldapconfig:host: ad.cumulus.wrs.com:636# No TLS for this setup.insecureNoSSL: falseinsecureSkipVerify: true# This would normally be a read-only user.bindDN: cn=Administrator,cn=users,dc=corp,dc=cumulus,dc=wrs,dc=combindPW: St8rlingX*
usernamePrompt: Email AddressuserSearch:baseDN: cn=Users,dc=corp,dc=cumulus,dc=wrs,dc=comfilter: "(objectClass=person)"username: userPrincipalName# "DN" (case sensitive) is a special attribute name. It indicates that# this value should be taken from the entity's DN not an attribute on# the entity.idAttr: DNemailAttr: userPrincipalNamenameAttr: cngroupSearch:baseDN: cn=Users,dc=corp,dc=cumulus,dc=wrs,dc=comfilter: "(objectClass=group)"# A user is a member of a group when their DN matches# the value of a "member" attribute on the group entity.userAttr: DNgroupAttr: member# The group name should be the "cn" value.nameAttr: cnstaticClients:- id: kubernetesredirectURIs:name: 'Kubernetes'secret: ZXhhbXBsZS1hcHAtc2VjcmV0
kubectl config set-context oidc-ctx --cluster=kubernetes --user=testkubectl config set-credentials test \
--auth-provider=oidc \
--auth-provider-arg=idp-issuer-url=https://yow-gwaines-d1.corp.ad.wrs.com:32000/dex \
--auth-provider-arg=client-id=kubernetes \
--auth-provider-arg=client-secret=ZXhhbXBsZS1hcHAtc2VjcmV0 \
--auth-provider-arg=idp-certificate-authority-data=$(base64 -w 0 ../k8s/ssl/dex-ca.pem) \
--auth-provider-arg=extra-scopes="offline_access openid profile email groups"
connectors:- type: ldapname: OpenLDAPid: ldapconfig:
host: ad.cumulus.wrs.com:389
# No TLS for this setup.
insecureNoSSL: true
insecureSkipVerify: true# This would normally be a read-only user.
bindDN: cn=Administrator,cn=Users,dc=corp,dc=cumulus,dc=wrs,dc=com
bindPW: St8rlingX*usernamePrompt: Email AddressuserSearch:baseDN: cn=Users,dc=corp,dc=cumulus,dc=wrs,dc=com
filter: "(objectClass=user)"username: sAMAccountNameidAttr: sAMAccountNameemailAttr: sAMAccountNamenameAttr: displayName
gwaines@gwaines-VirtualBox:~/go/src/github.com/dexidp/dex$ ./bin/dex serve examples/config-wad.yamltime="2019-07-19T15:00:14Z" level=info msg="config issuer: http://127.0.0.1:5556/dex"time="2019-07-19T15:00:14Z" level=info msg="config storage: sqlite3"time="2019-07-19T15:00:14Z" level=info msg="config static client: Example App"time="2019-07-19T15:00:14Z" level=info msg="config connector: ldap"time="2019-07-19T15:00:14Z" level=info msg="listening (http) on 0.0.0.0:5556"time="2019-07-19T15:00:48Z" level=info msg="performing ldap search cn=Users,dc=corp,dc=cumulus,dc=wrs,dc=com sub (&(objectClass=user)(sAMAccountName=ka...@corp.cumulus.wrs.com))"time="2019-07-19T15:00:48Z" level=error msg="ldap: no results returned for filter: \"(&(objectClass=user)(sAMAccountName=ka...@corp.cumulus.wrs.com))\""
