Skip to content

Commit 337bbe5

Browse files
committed
fix typos.
1 parent 1b7b351 commit 337bbe5

File tree

2 files changed

+9
-12
lines changed

2 files changed

+9
-12
lines changed

Documentation/connectors/kubelogin-activedirectory.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -40,10 +40,10 @@ subjectAltName = @alt_names
4040
DNS.1 = dex.example.com
4141
```
4242

43-
Please replace dex.example.com to your favorit hostname.
43+
Please replace dex.example.com to your favorite hostname.
4444
Generate certificate and private key by following command.
4545

46-
```
46+
```console
4747
$ openssl req -new -x509 -sha256 -days 3650 -newkey rsa:4096 -extensions v3_req -out openid-ca.pem -keyout openid-key.pem -config req.cnf -subj "/CN=kube-ca" -nodes
4848
$ ls openid*
4949
openid-ca.pem openid-key.pem
@@ -53,7 +53,7 @@ openid-ca.pem openid-key.pem
5353

5454
Modify following host, bindDN and bindPW in examples/config-ad-kubelogin.yaml.
5555

56-
```
56+
```yaml
5757
connectors:
5858
- type: ldap
5959
name: OpenLDAP
@@ -99,27 +99,27 @@ See https://kubernetes.io/docs/reference/access-authn-authz/authentication/ for
9999

100100
Create context for dex authentication:
101101

102-
```
102+
```console
103103
$ kubectl config set-context oidc-ctx --cluster=cluster.local --user=test
104-
$ kubectl config set-credentials test
104+
$ kubectl config set-credentials test \
105105
--auth-provider=oidc \
106106
--auth-provider-arg=idp-issuer-url=https://dex.example.com:32000/dex \
107107
--auth-provider-arg=client-id=kubernetes \
108108
--auth-provider-arg=client-secret=ZXhhbXBsZS1hcHAtc2VjcmV0 \
109109
--auth-provider-arg=idp-certificate-authority-data=$(base64 -w 0 openid-ca.pem) \
110-
"--auth-provider-arg=extra-scopes=offline_access openid profile email group"
110+
--auth-provider-arg=extra-scopes="offline_access openid profile email group"
111111
$ kubectl config use-context oidc-ctx
112112
```
113113

114-
Please confirm idp-issuer-url, cleint-id, client-secret and idp-certificate-authority-data value is same as config-ad-kubelogin.yaml's value.
114+
Please confirm idp-issuer-url, client-id, client-secret and idp-certificate-authority-data value is same as config-ad-kubelogin.yaml's value.
115115

116116
Then run kubelogin:
117117

118-
```
118+
```console
119119
$ kubelogin
120120
```
121121

122-
Access http://localhost:8000 by web browser and login with your AD account(eg. [email protected]) and password.
122+
Access http://localhost:8000 by web browser and login with your AD account (eg. [email protected]) and password.
123123
After login and grant, you have following token in ~/.kube/config:
124124

125125
```

Documentation/connectors/ldap.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,6 @@ groupSearch:
253253
The following configuration will allow the LDAP connector to search a FreeIPA directory using an LDAP filter.
254254

255255
```yaml
256-
257256
connectors:
258257
- type: ldap
259258
id: ldap
@@ -290,7 +289,6 @@ If the search finds an entry, it will attempt to use the provided password to bi
290289
The following configuration will allow the LDAP connector to search a Active Directory using an LDAP filter.
291290
292291
```yaml
293-
294292
connectors:
295293
- type: ldap
296294
name: ActiveDirectory
@@ -320,6 +318,5 @@ connectors:
320318
userAttr: DN
321319
groupAttr: member
322320
nameAttr: cn
323-
324321
```
325322

0 commit comments

Comments
 (0)