@@ -83,17 +83,6 @@ $appCreationResult = az ad app create --display-name $adAppName --web-home-page-
83
83
$appId = $appCreationResult | Select-Object - ExpandProperty appId
84
84
Write-Host " Created Azure AD application with appId: $appId "
85
85
86
- # Retrieve the object ID of the created application
87
- $appInfo = az ad app show -- id $appId - o json | ConvertFrom-Json
88
- $objectId = $appInfo | Select-Object - ExpandProperty id
89
- Write-Host " Retrieved object ID: $objectId "
90
-
91
- # Update the application to disable the first OAuth2Permission
92
- # Write-Host "Disabling the first OAuth2Permission"
93
- # az ad app update --id $appId --set oauth2Permissions[0].isEnabled=false
94
- # Clear the OAuth2Permissions array
95
- # az ad app update --id $appId --set oauth2Permissions=[]
96
-
97
86
# Reset credentials for the Azure AD application to generate a new password
98
87
Write-Host " Resetting credentials for the Azure AD application"
99
88
$credentialResetResult = az ad app credential reset -- id $appId - o json | ConvertFrom-Json
@@ -131,11 +120,9 @@ kubectl get pods -n cert-manager
131
120
# Deploy the issuer config to the cluster
132
121
kubectl apply -f ./ easyauth/ cluster- issuer.yaml
133
122
134
- $clientId = $appId
135
-
136
123
# ---------------------
137
124
# Deploy Easy Auth Proxy
138
- helm install -- set azureAd.tenantId= $azureTenantId -- set azureAd.clientId= $clientId -- set secret.name= easyauth- proxy- $adAppName - secret -- set secret.azureclientsecret= $clientSecret -- set appHostName= $appHostName -- set tlsSecretName= $tlsSecretName easyauth- proxy ./ easyauth/ easyauth- proxy
125
+ helm install -- set azureAd.tenantId= $azureTenantId -- set azureAd.clientId= $appId -- set secret.name= easyauth- proxy- $adAppName - secret -- set secret.azureclientsecret= $clientSecret -- set appHostName= $appHostName -- set tlsSecretName= $tlsSecretName easyauth- proxy ./ easyauth/ easyauth- proxy
139
126
140
127
# ---------------------
141
128
# Apply proxy ingress rules
0 commit comments