diff --git a/README.md b/README.md index 65ba3e6..32b562e 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -[![Build, test, push to multiple registries and e2e test](https://github.com/Azure/EasyAuthForK8s/actions/workflows/ci.yml/badge.svg)](https://github.com/Azure/EasyAuthForK8s/actions/workflows/ci.yml) +[![Build, test, push to multiple registries and e2e test](https://github.com/Azure/EasyAuthForK8s/actions/workflows/E2E.yml/badge.svg)](https://github.com/Azure/EasyAuthForK8s/actions/workflows/E2E.yml) # EasyAuth for Kubernetes diff --git a/charts/easyauth-proxy/templates/statefulset.yaml b/charts/easyauth-proxy/templates/statefulset.yaml index b8114b0..252d8b0 100644 --- a/charts/easyauth-proxy/templates/statefulset.yaml +++ b/charts/easyauth-proxy/templates/statefulset.yaml @@ -63,7 +63,7 @@ spec: value: "{{ .Values.easyAuthForK8s.allowBearerToken }}" - name: EasyAuthForK8s__DefaultRedirectAfterSignin value: "{{ .Values.easyAuthForK8s.defaultRedirectAfterSignin }}" - name: EasyAuthForK8s__CompressCookieClaims + - name: EasyAuthForK8s__CompressCookieClaims value: "{{ .Values.easyAuthForK8s.compressCookieClaims }}" - name: EasyAuthForK8s__ResponseHeaderPrefix value: "{{ .Values.easyAuthForK8s.responseHeaderPrefix }}" diff --git a/docs/deploy-to-existing-cluster.md b/docs/deploy-to-existing-cluster.md index 24af372..9c7631d 100644 --- a/docs/deploy-to-existing-cluster.md +++ b/docs/deploy-to-existing-cluster.md @@ -18,6 +18,10 @@ This project has been validated to work on the following: Review these very carefully and modify. + # Set your AKS cluster name and resource group + CLUSTER_NAME=easy-auth-proxy-aks + CLUSTER_RG=easy-auth-proxy-rg + # Set your backend service variables SERVICE= SERVICE_PORT= @@ -97,10 +101,10 @@ EOF cat manifest.json # Create the Azure AD SP for our application and save the Client ID to a variable -CLIENT_ID=$(az ad app create --display-name $AD_APP_NAME --homepage $HOMEPAGE --reply-urls $REPLY_URLS --required-resource-accesses @manifest.json -o json | jq -r '.appId') +CLIENT_ID=$(az ad app create --display-name $AD_APP_NAME --web-home-page-url $HOMEPAGE --web-redirect-uris $REPLY_URLS --required-resource-accesses @manifest.json -o json | jq -r '.appId') echo $CLIENT_ID -OBJECT_ID=$(az ad app show --id $CLIENT_ID -o json | jq '.objectId' -r) +OBJECT_ID=$(az ad app show --id $CLIENT_ID -o json | jq '.id' -r) echo $OBJECT_ID az ad app update --id $OBJECT_ID --set oauth2Permissions[0].isEnabled=false @@ -236,4 +240,4 @@ NOTE: Wait 5 minutes for the easy auth proxy and Azure AD to get up and running. Open your homepage in the browser. You now have Easy Auth applied to your application! -To apply more advanced scenarios to your existing cluster (RBAC, Graph Query, Anonymous, etc), please see sample-ingress.yaml in root > sample > templates > sample-ingress.yaml for examples \ No newline at end of file +To apply more advanced scenarios to your existing cluster (RBAC, Graph Query, Anonymous, etc), please see sample-ingress.yaml in root > sample > templates > sample-ingress.yaml for examples