Skip to content
This repository has been archived by the owner on May 17, 2024. It is now read-only.

Commit

Permalink
Merge pull request #107 from JoshVanL/yaml-demo-deploy
Browse files Browse the repository at this point in the history
Move static manifests from demo to deploy
  • Loading branch information
jetstack-bot authored Jan 8, 2020
2 parents 13c9f28 + 22edf03 commit 52ceb13
Show file tree
Hide file tree
Showing 4 changed files with 5 additions and 5 deletions.
8 changes: 4 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ Directions on how to deploy OIDC authentication with multi-cluster can be found

### Quickstart

Deployment yamls can be found in `./demo/yaml` and will require configuration to
Deployment yamls can be found in `./deploy/yaml` and will require configuration to
an exiting OIDC issuer.

This quickstart demo will assume you have a Kubernetes cluster without OIDC
Expand All @@ -54,7 +54,7 @@ This will create it's Deployment, Service Account and required permissions into
the newly created `kube-oidc-proxy` Namespace.

```
$ kubectl apply -f ./demo/yaml/kube-oidc-proxy.yaml
$ kubectl apply -f ./deploy/yaml/kube-oidc-proxy.yaml
$ kubectl get all --namespace kube-oidc-proxy
```

Expand All @@ -73,7 +73,7 @@ certificates can be generated through `cert-manager`, more information about
this project found [here](https://github.com/jetstack/cert-manager).

Next, populate the OIDC authenticator Secret using the secrets given to you
by your OIDC provider in `./demo/yaml/secrets.yaml`. The OIDC provider CA will be
by your OIDC provider in `./deploy/yaml/secrets.yaml`. The OIDC provider CA will be
different depending on which provider you are using. The easiest way to obtain
the correct certificate bundle is often by opening the providers URL into a
browser and fetching them there (typically output by clicking the lock icon on
Expand All @@ -85,7 +85,7 @@ your address bar). Google's OIDC provider for example requires CAs from both
Apply the secret manifests.

```
kubectl apply -f ./demo/yaml/secrets.yaml
kubectl apply -f ./deploy/yaml/secrets.yaml
```

You can restart the `kube-oidc-proxy` pod to use these new secrets
Expand Down
2 changes: 1 addition & 1 deletion deploy/charts/kube-oidc-proxy/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ This helm chart cannot be installed out of the box without providing own
configuration.

This helm chart is based on example configuration provided in `kube-oidc-proxy`
[repository](https://github.com/jetstack/kube-oidc-proxy/blob/182fa79a7854bd33f3827d89e222e10c57c4aed5/demo/yaml/kube-oidc-proxy.yaml).
[repository](https://github.com/jetstack/kube-oidc-proxy/blob/master/deploy/yaml/kube-oidc-proxy.yaml).

Minimal required configuration is `oidc` section of `value.yaml` file.

Expand Down
File renamed without changes.
File renamed without changes.

0 comments on commit 52ceb13

Please sign in to comment.