Skip to content

Commit

Permalink
Move notes to better place
Browse files Browse the repository at this point in the history
  • Loading branch information
azgabur committed May 22, 2024
1 parent a9db0d0 commit e7956c8
Showing 1 changed file with 6 additions and 5 deletions.
11 changes: 6 additions & 5 deletions doc/generate-kuadrant-auth-policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -232,6 +232,9 @@ kubectl apply -n petstore -f examples/petstore/petstore.yaml

<details>

> Replace `${KEYCLOAK_ISSUER}` with your SSO instance issuer endpoint for your `petstore` realm.
> Otherwise remove the oidc from `components.securitySchemas` and `/dog`, `/snake` paths

```yaml
cat <<EOF >petstore-openapi.yaml
---
Expand Down Expand Up @@ -315,9 +318,6 @@ EOF

</details>

> Replace `${KEYCLOAK_ISSUER}` with your SSO instance issuer endpoint for your `petstore` realm.
> Otherwise remove the oidc from `components.securitySchemas` and `/dog`, `/snake` paths

* Create `istio-ingressgateway` Gateway object

```yaml
Expand Down Expand Up @@ -474,6 +474,9 @@ We will be authenticating as `bob` user with `p` password.
We previously created `bob` user in Keycloak in the `petstore` realm.
We will use Command-line JSON processor `jq` to extract the access token into `ACCESS_TOKEN` variable:


> Replace `${KEYCLOAK_TOKEN_ENDPOINT}` with your SSO instance token endpoint for your `petstore` realm.
```bash
export ACCESS_TOKEN=$(curl -k -H "Content-Type: application/x-www-form-urlencoded" \
-d 'grant_type=password' \
Expand All @@ -484,8 +487,6 @@ export ACCESS_TOKEN=$(curl -k -H "Content-Type: application/x-www-form-urlencode
"${KEYCLOAK_TOKEN_ENDPOINT}" | jq -r '.access_token')
```

> Replace `${KEYCLOAK_TOKEN_ENDPOINT}` with your SSO instance token endpoint for your `petstore` realm.
With the access token in place, let's try to get those puppies

```bash
Expand Down

0 comments on commit e7956c8

Please sign in to comment.