From e39df1f297dfd30723d584d0ce427eccd773d8ef Mon Sep 17 00:00:00 2001 From: Conan Scott Date: Wed, 14 Jan 2026 20:21:59 +1100 Subject: [PATCH] updated --- 01-claude-ocp/.gemini/settings.json | 8 +++++++ 01-claude-ocp/presentation.md | 35 ++++++++++++++++++++++++++--- 01-claude-ocp/vault-rbac.yaml | 27 ---------------------- 01-claude-ocp/vault-scc.yaml | 25 --------------------- 4 files changed, 40 insertions(+), 55 deletions(-) create mode 100644 01-claude-ocp/.gemini/settings.json delete mode 100644 01-claude-ocp/vault-rbac.yaml delete mode 100644 01-claude-ocp/vault-scc.yaml diff --git a/01-claude-ocp/.gemini/settings.json b/01-claude-ocp/.gemini/settings.json new file mode 100644 index 0000000..af8ebb9 --- /dev/null +++ b/01-claude-ocp/.gemini/settings.json @@ -0,0 +1,8 @@ +{ + "mcpServers": { + "mcp-ocp": { + "command": "npx -y supergateway --streamableHttp http://192.168.0.244:8080/mcp", + "args": [] + } + } +} \ No newline at end of file diff --git a/01-claude-ocp/presentation.md b/01-claude-ocp/presentation.md index c966936..91ed86a 100644 --- a/01-claude-ocp/presentation.md +++ b/01-claude-ocp/presentation.md @@ -1,12 +1,41 @@ +--- +title: "Model Context Protocol in Practice" +sub_title: MCP In Action +--- + + - - -MCP Demo + +What is MCP? === + + + + + + + +![image](robot.png) + + + + +* Open Standard + +* Created by Anthropic (The Claude folks) in 2024 + +* Allows LLMs to connect to data and systems + +* Enables _agentic_ workflows + +* Gives tools to AI + + + diff --git a/01-claude-ocp/vault-rbac.yaml b/01-claude-ocp/vault-rbac.yaml deleted file mode 100644 index 842bff3..0000000 --- a/01-claude-ocp/vault-rbac.yaml +++ /dev/null @@ -1,27 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: vault-restricted-scc-role -rules: -- apiGroups: - - security.openshift.io - resources: - - securitycontextconstraints - resourceNames: - - vault-restricted - verbs: - - use ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: RoleBinding -metadata: - name: vault-restricted-scc-binding - namespace: vault -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: vault-restricted-scc-role -subjects: -- kind: ServiceAccount - name: vault - namespace: vault diff --git a/01-claude-ocp/vault-scc.yaml b/01-claude-ocp/vault-scc.yaml deleted file mode 100644 index 838adf9..0000000 --- a/01-claude-ocp/vault-scc.yaml +++ /dev/null @@ -1,25 +0,0 @@ -kind: SecurityContextConstraints -apiVersion: security.openshift.io/v1 -metadata: - name: vault-restricted -priority: 20 -allowPrivilegedContainer: false -allowHostDirVolumePlugin: false -allowHostIPC: false -allowHostNetwork: false -allowHostPID: false -allowHostPorts: false -runAsUser: - type: MustRunAs - uid: 100 -seLinuxContext: - type: MustRunAs -fsGroup: - type: MustRunAs -supplementalGroups: - type: RunAsAny -defaultAddCapabilities: [] -requiredDropCapabilities: -- ALL -users: [] -groups: []