Skip to content
This repository has been archived by the owner on Jun 17, 2024. It is now read-only.

Updates to documentation and scripts #107

Open
wants to merge 4 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
[![Build, test, push to multiple registries and e2e test](https://github.com/Azure/EasyAuthForK8s/actions/workflows/ci.yml/badge.svg)](https://github.com/Azure/EasyAuthForK8s/actions/workflows/ci.yml)
[![Build, test, push to multiple registries and e2e test](https://github.com/Azure/EasyAuthForK8s/actions/workflows/E2E.yml/badge.svg)](https://github.com/Azure/EasyAuthForK8s/actions/workflows/E2E.yml)

# EasyAuth for Kubernetes

Expand Down
2 changes: 1 addition & 1 deletion charts/easyauth-proxy/templates/statefulset.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,7 @@ spec:
value: "{{ .Values.easyAuthForK8s.allowBearerToken }}"
- name: EasyAuthForK8s__DefaultRedirectAfterSignin
value: "{{ .Values.easyAuthForK8s.defaultRedirectAfterSignin }}"
name: EasyAuthForK8s__CompressCookieClaims
- name: EasyAuthForK8s__CompressCookieClaims
value: "{{ .Values.easyAuthForK8s.compressCookieClaims }}"
- name: EasyAuthForK8s__ResponseHeaderPrefix
value: "{{ .Values.easyAuthForK8s.responseHeaderPrefix }}"
Expand Down
10 changes: 7 additions & 3 deletions docs/deploy-to-existing-cluster.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,10 @@ This project has been validated to work on the following:

Review these very carefully and modify.

# Set your AKS cluster name and resource group
CLUSTER_NAME=easy-auth-proxy-aks
CLUSTER_RG=easy-auth-proxy-rg

# Set your backend service variables
SERVICE=<insert name of K8s service you want to redirect to after login>
SERVICE_PORT=<insert service port of the K8s service you want to redirect to after login>
Expand Down Expand Up @@ -97,10 +101,10 @@ EOF
cat manifest.json

# Create the Azure AD SP for our application and save the Client ID to a variable
CLIENT_ID=$(az ad app create --display-name $AD_APP_NAME --homepage $HOMEPAGE --reply-urls $REPLY_URLS --required-resource-accesses @manifest.json -o json | jq -r '.appId')
CLIENT_ID=$(az ad app create --display-name $AD_APP_NAME --web-home-page-url $HOMEPAGE --web-redirect-uris $REPLY_URLS --required-resource-accesses @manifest.json -o json | jq -r '.appId')
echo $CLIENT_ID

OBJECT_ID=$(az ad app show --id $CLIENT_ID -o json | jq '.objectId' -r)
OBJECT_ID=$(az ad app show --id $CLIENT_ID -o json | jq '.id' -r)
echo $OBJECT_ID

az ad app update --id $OBJECT_ID --set oauth2Permissions[0].isEnabled=false
Expand Down Expand Up @@ -236,4 +240,4 @@ NOTE: Wait 5 minutes for the easy auth proxy and Azure AD to get up and running.

Open your homepage in the browser. You now have Easy Auth applied to your application!

To apply more advanced scenarios to your existing cluster (RBAC, Graph Query, Anonymous, etc), please see sample-ingress.yaml in root > sample > templates > sample-ingress.yaml for examples
To apply more advanced scenarios to your existing cluster (RBAC, Graph Query, Anonymous, etc), please see sample-ingress.yaml in root > sample > templates > sample-ingress.yaml for examples