Skip to content

Commit 15041ab

Browse files
authored
Merge branch 'release-1.4' into RHIDP-5070-Compatibility-Matrix-in-RHDH-1.4
2 parents 78f4af0 + 6d85087 commit 15041ab

22 files changed

+94
-83
lines changed

artifacts/rhdh-plugins-reference/tekton/tekton-plugin-admin.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ You can use the Tekton plugin to visualize the results of CI/CD pipeline runs on
66
[[installing-tekton-plugin]]
77
== Installation
88

9-
.Prerequsites
9+
.Prerequisites
1010
* You have installed and configured the `@backstage/plugin-kubernetes` and `@backstage/plugin-kubernetes-backend` dynamic plugins.
1111
//For more information about installing dynamic plugins, see xref:rhdh-installing-dynamic-plugins[].
1212
//Cannot xref across titles. Convert xref to a link.
@@ -140,4 +140,4 @@ global:
140140
- package: ./dynamic-plugins/dist/backstage-community-plugin-tekton
141141
disabled: false
142142
----
143-
--
143+
--

artifacts/rhdh-plugins-reference/tekton/tekton-plugin-readme.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ You can use the Tekton plugin to visualize the results of CI/CD pipeline runs on
88
[[installing-tekton-plugin]]
99
=== Installation
1010

11-
.Prerequsites
11+
.Prerequisites
1212
* You have installed and configured the `@backstage/plugin-kubernetes` and `@backstage/plugin-kubernetes-backend` dynamic plugins.
1313
//For more information about installing dynamic plugins, see xref:rhdh-installing-dynamic-plugins[].
1414
//Cannot xref across titles. Convert xref to a link.

artifacts/rhdh-plugins-reference/topology/topology-plugin-readme.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -191,7 +191,7 @@ You can use the https://raw.githubusercontent.com/backstage/community-plugins/ma
191191
====
192192
--
193193

194-
* The following annotation is added to the entity's `catalog-info.yaml` file to identify whether an entitiy contains the Kubernetes resources:
194+
* The following annotation is added to the entity's `catalog-info.yaml` file to identify whether an entity contains the Kubernetes resources:
195195
+
196196
--
197197
[source,yaml]

modules/authentication/proc-enabling-authentication-with-rhbk.adoc

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,11 +23,6 @@ Save the value for the next step:
2323
* **Client ID**
2424
* **Client Secret**
2525

26-
.. Configure your {rhbk} realm for performance and security:
27-
... Navigate to the **Configure** > **Realm Settings**.
28-
... Set the **Access Token Lifespan** to a value greater than five minutes (preferably 10 or 15 minutes) to prevent performance issues from frequent refresh token requests for every API call.
29-
... Enable the **Revoke Refresh Token** option to improve security by enabling the refresh token rotation strategy.
30-
3126
.. To prepare for the verification steps, in the same realm, get the credential information for an existing user or link:https://docs.redhat.com/en/documentation/red_hat_build_of_keycloak/24.0/html-single/getting_started_guide/index#getting-started-zip-create-a-user[create a user]. Save the user credential information for the verification steps.
3227

3328
. To add your {rhsso} credentials to your {product-short}, add the following key/value pairs to link:{plugins-configure-book-url}#provisioning-your-custom-configuration[your {product-short} secrets]:
@@ -182,6 +177,13 @@ auth:
182177

183178
--
184179

180+
.Security consideration
181+
If multiple valid refresh tokens are issued due to frequent refresh token requests, older tokens will remain valid until they expire. To enhance security and prevent potential misuse of older tokens, enable a refresh token rotation strategy in your {rhbk} realm.
182+
183+
. From the *Configure* section of the navigation menu, click *Realm Settings*.
184+
. From the *Realm Settings* page, click the *Tokens* tab.
185+
. From the *Refresh tokens* section of the *Tokens* tab, toggle the *Revoke Refresh Token* to the *Enabled* position.
186+
185187
.Verification
186188
. Go to the {product-short} login page.
187189
. Your {product-short} sign-in page displays *Sign in using OIDC* and the Guest user sign-in is disabled.

modules/configuring/proc-mounting-additional-files-in-your-custom-configuration-using-rhdh-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
[id="mounting-additional-files-in-your-custom-configuration-using-rhdh-operator"]
2-
= Mounting additional files in your custom configuration using the {product} operator
2+
= Mounting additional files in your custom configuration using the {product} Operator
33

44
You can use the {product-short} Operator to mount extra files, such as a ConfigMap or Secret, to the container in a preferred location.
55

modules/configuring/proc-using-the-operator-to-run-rhdh-with-your-custom-configuration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -148,7 +148,7 @@ spec:
148148
----
149149
====
150150
+
151-
.Inject the envvironment variables in the `{my-product-secrets}` and `{my-product-database-secrets}` secrets
151+
.Inject the environment variables in the `{my-product-secrets}` and `{my-product-database-secrets}` secrets
152152
====
153153
[source,yaml,subs="+attributes,+quotes"]
154154
----

modules/customizing-techdocs/proc-techdocs-using-odf-storage.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ spec:
2828
+
2929
[NOTE]
3030
====
31-
Creating the {product-short} `ObjectBucketClaim` CR automatically creates both the {product-short} `ObjectBucketClaim` config map and secret. The config map and secret have the same name as the `ObjetBucketClaim` CR.
31+
Creating the {product-short} `ObjectBucketClaim` CR automatically creates both the {product-short} `ObjectBucketClaim` config map and secret. The config map and secret have the same name as the `ObjectBucketClaim` CR.
3232
====
3333
3434
After you create the `ObjectBucketClaim` CR, you can use the information stored in the config map and secret to make the information accessible to the {product-short} container as environment variables. Depending on the method that you used to install {product-short}, you add the access information to either the {product} Helm chart or Operator configuration.

modules/customizing-the-appearance/proc-customize-rhdh-sidebar-menuitems.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -113,7 +113,7 @@ dynamicPlugins:
113113
----
114114

115115

116-
<1> The `default.` prefix identifes an item as a main menu item. You can add the `default.` prefix to both individual menu items or parent menu group configuration, such as `default.<menu_group_parent_item_name>` in the previous example.
116+
<1> The `default.` prefix identifies an item as a main menu item. You can add the `default.` prefix to both individual menu items or parent menu group configuration, such as `default.<menu_group_parent_item_name>` in the previous example.
117117

118118
[NOTE]
119119
====

modules/dynamic-plugins/proc-create-plugin-tgz-file.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ To create a plugin registry using HTTP server on {ocp-short}, run the following
5050
.Example commands to build and deploy an HTTP server in {ocp-short}
5151
[source,terminal]
5252
----
53-
oc project rhdh
53+
oc project {my-product-namespace}
5454
oc new-build httpd --name=plugin-registry --binary
5555
oc start-build plugin-registry --from-dir=dynamic-plugins-root --wait
5656
oc new-app --image-stream=plugin-registry

modules/installation/proc-install-rhdh-airgapped-environment-ocp-helm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ If an x509 error occurs, verify that you have link:https://access.redhat.com/sol
9494
+
9595
[source,terminal]
9696
----
97-
oc get imagestream -n <project_name>
97+
oc get imagestream -n {my-product-namespace}
9898
----
9999

100100
. Enable local image lookup for both images by running the following commands:

0 commit comments

Comments
 (0)