diff --git a/docs/reference/configuration/Single Sign-On/Identity Providers/overview.md b/docs/reference/configuration/Single Sign-On/Identity Providers/overview.md index 583d84ce07..4b1cae7026 100644 --- a/docs/reference/configuration/Single Sign-On/Identity Providers/overview.md +++ b/docs/reference/configuration/Single Sign-On/Identity Providers/overview.md @@ -1,7 +1,7 @@ --- title: Overview sidebar: - order: 20 + order: 2 --- diff --git a/docs/reference/configuration/Single Sign-On/overview.md b/docs/reference/configuration/Single Sign-On/overview.md index 1fed24ae97..9aee6c12a8 100644 --- a/docs/reference/configuration/Single Sign-On/overview.md +++ b/docs/reference/configuration/Single Sign-On/overview.md @@ -1,7 +1,7 @@ --- title: Overview sidebar: - order: 20 + order: 3 --- UDS Core leverages [Keycloak](https://www.keycloak.org/) and [Authservice](https://github.com/istio-ecosystem/authservice) to implify authentication and authorization for applications. These tools enable seamless user authentication experiences while supporting various OAuth 2.0 and OpenID Connect (OIDC) flows. diff --git a/docs/reference/configuration/UDS operator/exemption.md b/docs/reference/configuration/UDS operator/exemption.md index c95d819bb1..43fe394b8c 100644 --- a/docs/reference/configuration/UDS operator/exemption.md +++ b/docs/reference/configuration/UDS operator/exemption.md @@ -1,7 +1,5 @@ --- title: UDS Exemption -sidebar: - order: 3 --- ![UDS Operator Exemption Flowchart](https://github.com/defenseunicorns/uds-core/blob/main/docs/.images/diagrams/uds-core-operator-uds-exemption.svg?raw=true) diff --git a/docs/reference/configuration/UDS operator/package.md b/docs/reference/configuration/UDS operator/package.md index 08e5611e09..4df924cf3f 100644 --- a/docs/reference/configuration/UDS operator/package.md +++ b/docs/reference/configuration/UDS operator/package.md @@ -1,7 +1,5 @@ --- title: UDS Package -sidebar: - order: 2 --- ![UDS Operator Package Flowchart](https://github.com/defenseunicorns/uds-core/blob/main/docs/.images/diagrams/uds-core-operator-uds-package.svg?raw=true) diff --git a/docs/reference/configuration/authorization-policies.md b/docs/reference/configuration/authorization-policies.md index 07bbd0eb5a..1eb31330ff 100644 --- a/docs/reference/configuration/authorization-policies.md +++ b/docs/reference/configuration/authorization-policies.md @@ -1,7 +1,5 @@ --- title: How Authorization Policies Protect Your Services -sidebar: - order: 3 --- In clusters running Istio Ambient Mesh, UDS‑Core enforces **ingress network security** using Istio **ALLOW** AuthorizationPolicies. These policies are automatically generated for each application package you define with a [UDS Package](https://uds.defenseunicorns.com/reference/configuration/uds-operator/package/) resource. diff --git a/docs/reference/configuration/backup and restore/vsphere-rke2-csi.md b/docs/reference/configuration/backup and restore/vsphere-rke2-csi.md index 1f493d883f..85202c7db0 100644 --- a/docs/reference/configuration/backup and restore/vsphere-rke2-csi.md +++ b/docs/reference/configuration/backup and restore/vsphere-rke2-csi.md @@ -1,5 +1,7 @@ --- title: RKE2 CSI Snapshotting on vSphere +sidebar: + order: 4 --- ## Introduction diff --git a/docs/reference/configuration/custom resources/exemptions-v1alpha1-cr.md b/docs/reference/configuration/custom resources/exemptions-v1alpha1-cr.md index 2174bda692..be16758844 100644 --- a/docs/reference/configuration/custom resources/exemptions-v1alpha1-cr.md +++ b/docs/reference/configuration/custom resources/exemptions-v1alpha1-cr.md @@ -2,6 +2,8 @@ title: Exemptions CR (v1alpha1) tableOfContents: maxHeadingLevel: 6 +sidebar: + order: 20 ---
diff --git a/docs/reference/configuration/custom resources/packages-v1alpha1-cr.md b/docs/reference/configuration/custom resources/packages-v1alpha1-cr.md index d358027b7f..985a688e2b 100644 --- a/docs/reference/configuration/custom resources/packages-v1alpha1-cr.md +++ b/docs/reference/configuration/custom resources/packages-v1alpha1-cr.md @@ -2,6 +2,8 @@ title: Packages CR (v1alpha1) tableOfContents: maxHeadingLevel: 6 +sidebar: + order: 20 ---
diff --git a/docs/reference/configuration/external dependencies/irsa-configuration.md b/docs/reference/configuration/external dependencies/irsa-configuration.md index 2c55be2cdc..d56bf65be8 100644 --- a/docs/reference/configuration/external dependencies/irsa-configuration.md +++ b/docs/reference/configuration/external dependencies/irsa-configuration.md @@ -1,5 +1,7 @@ --- title: IRSA Support +sidebar: + order: 5 --- Several applications within UDS Core can be configured to utilize resources that are external to your Kubernetes cluster, such as object storage and databases. If you are running in AWS, you can leverage [IRSA](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html) to provide applications within UDS Core with a secure means of accessing external resources. diff --git a/src/pepr/docs-gen/main.ts b/src/pepr/docs-gen/main.ts index 872acd0aab..67aa66ec9b 100644 --- a/src/pepr/docs-gen/main.ts +++ b/src/pepr/docs-gen/main.ts @@ -146,6 +146,8 @@ async function generateMarkdown(jsonSchema: JsonSchema, version: string, schemaF title: ${title} CR (${version}) tableOfContents: maxHeadingLevel: 6 +sidebar: + order: 20 --- ${generateMarkdownFromSchema(jsonSchema.properties, `${title}`, 1).trim()}`;