File tree Expand file tree Collapse file tree 2 files changed +6
-4
lines changed
Expand file tree Collapse file tree 2 files changed +6
-4
lines changed Original file line number Diff line number Diff line change @@ -23,7 +23,7 @@ certificate:
2323
2424.PHONY : k8s-secret
2525k8s-secret :
26- oc create secret generic oc-gate-jwt-secret --from-file=test/cert.pem
26+ oc create -n oc-gate secret generic oc-gate-jwt-secret --from-file=test/cert.pem --from-file=test/key .pem
2727
2828.PHONY : k8s-oauth-client
2929k8s-oauth-client :
Original file line number Diff line number Diff line change @@ -19,7 +19,7 @@ Create a secret holding a public key for verification of JWT tokens
1919
2020``` bash
2121# We can use the same key as the server, or create a new pair just for JWT tokens.
22- kubectl create secret generic oc-gate-jwt-secret --from-file=test/cert.pem
22+ oc create -n oc-gate secret generic oc-gate-jwt-secret --from-file=test/cert.pem --from-file=test/key .pem
2323```
2424
2525For interactive type of deploy create an oauthclient k8s object
@@ -46,10 +46,12 @@ oc create -f deploy/oc-gate-template.yaml
4646# for example: ROUTE_URL=test-proxy.apps.ostest.test.metalkube.org
4747# Note: routes are OKD thing too, OKD install a default proxy / loadbalancer
4848# that route outside requests to k8s services.
49- oc process -p ROUTE_URL=< the HOST of your oc-gate> oc-gate | oc create -f -
49+ export ROUTE_URL=< the HOST of your oc-gate>
50+ oc process -p ROUTE_URL=${ROUTE_URL} oc-gate | oc create -f -
5051
5152# For interactive deploy using OKD OAuth2 default server, use bearer token pass through.
52- oc process -p ROUTE_URL=< the HOST of your oc-gate> oc-gate -p TOKEN_PASSTHROUGH=true | oc create -f -
53+ export ROUTE_URL=< the HOST of your oc-gate>
54+ oc process -p ROUTE_URL=${ROUTE_URL} oc-gate -p TOKEN_PASSTHROUGH=true | oc create -f -
5355
5456# The template will create a route to the oc-get server, get the route path using:
5557oc get route
You can’t perform that action at this time.
0 commit comments