A simplified web application for OpenShift administration with a focus on security and networking.
- Create new namespaces
- List and manage existing namespaces
- Delete namespaces
- Assign labels and descriptions
- Create new users
- Assign roles to users
- Manage user status (Active/Inactive)
- Delete users
- Create custom roles
- Define resources and verbs
- Create ClusterRoles and Roles
- Delete roles
- Create network policies (Allow/Deny)
- Configure pod selectors
- Manage ingress/egress
- Delete policies
- Assign egress IPs
- Associate with specific nodes
- Manage egress pools
- Delete egress IPs
- HTML5: Semantic structure
- CSS3: Responsive design with CSS variables
- JavaScript (ES6+): Interactive functionality
- Font Awesome: Iconography
- Google Fonts (Inter): Typography
- Open
index.htmlin your browser - The application works offline
cd openshift-frontend
python3 -m http.server 8000
# Open: http://localhost:8000Edit api-integration.js:
this.baseURL = 'https://your-openshift-cluster.com:6443';The application supports token authentication:
openshiftAPI.setToken('your-token-here');# From OpenShift web console
oc whoami -t- Namespaces:
/api/v1/namespaces - Users:
/apis/user.openshift.io/v1/users - Roles:
/apis/rbac.authorization.k8s.io/v1/clusterroles - Network Policies:
/apis/networking.k8s.io/v1/networkpolicies - Egress IPs:
/apis/network.openshift.io/v1/hostsubnets
openshift-frontend/
├── index.html # Main interface
├── styles.css # Styles
├── app.js # JavaScript logic
├── api-integration.js # API integration
├── README.md # Documentation
└── screenshots/ # ScreenshotsThe application includes simulated data for testing. To connect to a real cluster, configure authentication in api-integration.js.
- HTTPS required for OpenShift connections
- Secure tokens: Use Service Account tokens
- RBAC: Configure minimum required permissions
- CORS: Configure appropriately for local development
MIT

