Skip to content

Commit 2c97a29

Browse files
authored
Merge branch 'main' into release-notes-script-enhancements-for-main
2 parents 0767f06 + e5e3b62 commit 2c97a29

File tree

5 files changed

+35
-128
lines changed

5 files changed

+35
-128
lines changed

artifacts/attributes.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -37,6 +37,7 @@
3737
:rhsso: RHSSO
3838
:rhbk-brand-name: Red Hat Build of Keycloak
3939
:rhbk: RHBK
40+
:keycloak-version: 24.0
4041

4142
// Partner Platforms
4243
:aws-brand-name: Amazon Web Services

artifacts/rhdh-plugins-reference/keycloak/keycloak-plugin-admin.adoc

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,22 @@ The Keycloak backend plugin, which integrates Keycloak into {product-short}, has
66
* Synchronization of Keycloak users in a realm.
77
* Synchronization of Keycloak groups and their users in a realm.
88

9+
[NOTE]
10+
====
11+
The supported Keycloak version is `{keycloak-version}`.
12+
====
13+
914
== Installation
1015

1116
The Keycloak plugin is pre-loaded in {product-short} with basic configuration properties. To enable it, set the `disabled` property to `false` as follows:
1217

1318
[source,yaml]
1419
----
15-
global:
16-
dynamic:
17-
includes:
20+
global:
21+
dynamic:
22+
includes:
1823
- dynamic-plugins.default.yaml
19-
plugins:
24+
plugins:
2025
- package: ./dynamic-plugins/dist/janus-idp-backstage-plugin-keycloak-backend-dynamic
2126
disabled: false
2227
----
@@ -87,7 +92,7 @@ The following table describes the parameters that you can configure to enable th
8792
| Name | Description | Default Value | Required
8893

8994
| `baseUrl`
90-
| Location of the Keycloak server, such as `pass:c[https://localhost:8443/auth]`. Note that the newer versions of Keycloak omit the `/auth` context path.
95+
| Location of the Keycloak server, such as `pass:c[https://localhost:8443/auth]`.
9196
| ""
9297
| Yes
9398

assemblies/assembly-audit-log.adoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,5 +44,3 @@ include::modules/observe/ref-audit-log-fields.adoc[leveloffset=+2]
4444
include::modules/observe/ref-audit-log-scaffolder-events.adoc[leveloffset=+2]
4545

4646
include::modules/observe/ref-audit-log-catalog-events.adoc[leveloffset=+2]
47-
48-
include::modules/observe/ref-audit-log-file-rotation-overview.adoc[]

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -46,42 +46,42 @@ Catalog permissions::
4646
|`catalog.entity.read`
4747
|`catalog-entity`
4848
|`read`
49-
|Allows user or role to read from the catalog
49+
|Allows a user or role to read from the catalog
5050

5151
|`catalog.entity.create`
5252
|
5353
|`create`
54-
|Allows user or role to create catalog entities, including registering an existing component in the catalog
54+
|Allows a user or role to create catalog entities, including registering an existing component in the catalog
5555

5656
|`catalog.entity.refresh`
5757
|`catalog-entity`
5858
|`update`
59-
|Allows user or role to refresh a single or multiple entities from the catalog
59+
|Allows a user or role to refresh a single or multiple entities from the catalog
6060

6161
|`catalog.entity.delete`
6262
|`catalog-entity`
6363
|`delete`
64-
|Allows user or role to delete a single or multiple entities from the catalog
64+
|Allows a user or role to delete a single or multiple entities from the catalog
6565

6666
|`catalog.location.read`
6767
|
6868
|`read`
69-
|Allows user or role to read a single or multiple locations from the catalog
69+
|Allows a user or role to read a single or multiple locations from the catalog
7070

7171
|`catalog.location.create`
7272
|
7373
|`create`
74-
|Allows user or role to create locations within the catalog
74+
|Allows a user or role to create locations within the catalog
7575

7676
|`catalog.location.delete`
7777
|
7878
|`delete`
79-
|Allows user or role to delete locations from the catalog
79+
|Allows a user or role to delete locations from the catalog
8080
|===
8181

82-
Bulk import permissions::
82+
Bulk import permission::
8383

84-
.Bulk import permissions
84+
.Bulk import permission
8585
[cols="15%,25%,15%,45%", frame="all", options="header"]
8686
|===
8787
|Name
@@ -92,7 +92,7 @@ Bulk import permissions::
9292
|`bulk.import`
9393
|`bulk-import`
9494
|`use`
95-
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests.
95+
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests
9696

9797
|===
9898

@@ -114,27 +114,27 @@ Scaffolder permissions::
114114
|`scaffolder.template.parameter.read`
115115
|`scaffolder-template`
116116
|`read`
117-
|Allows user or role to read a single or multiple one parameters from a template
117+
|Allows a user or role to read a single or multiple one parameters from a template
118118

119119
|`scaffolder.template.step.read`
120120
|`scaffolder-template`
121121
|`read`
122-
|Allows user or role to read a single or multiple steps from a template
122+
|Allows a user or role to read a single or multiple steps from a template
123123

124124
|`scaffolder.task.create`
125125
|
126126
|`create`
127-
|Allows the user or role to trigger software templates which create new scaffolder tasks
127+
|Allows a user or role to trigger software templates which create new scaffolder tasks
128128

129129
|`scaffolder.task.cancel`
130130
|
131131
|`use`
132-
|Allows the user or role to cancel currently running scaffolder tasks
132+
|Allows a user or role to cancel currently running scaffolder tasks
133133

134134
|`scaffolder.task.read`
135135
|
136136
|`read`
137-
|Allows user or role to read all scaffolder tasks and their associated events and logs
137+
|Allows a user or role to read all scaffolder tasks and their associated events and logs
138138
|===
139139

140140
RBAC permissions::
@@ -150,22 +150,22 @@ RBAC permissions::
150150
|`policy.entity.read`
151151
|`policy-entity`
152152
|`read`
153-
|Allows user or role to read permission policies and roles
153+
|Allows a user or role to read permission policies and roles
154154

155155
|`policy.entity.create`
156156
|`policy-entity`
157157
|`create`
158-
|Allows user or role to create a single or multiple permission policies and roles
158+
|Allows a user or role to create a single or multiple permission policies and roles
159159

160160
|`policy.entity.update`
161161
|`policy-entity`
162162
|`update`
163-
|Allows user or role to update a single or multiple permission policies and roles
163+
|Allows a user or role to update a single or multiple permission policies and roles
164164

165165
|`policy.entity.delete`
166166
|`policy-entity`
167167
|`delete`
168-
|Allows user or role to delete a single or multiple permission policies and roles
168+
|Allows a user or role to delete a single or multiple permission policies and roles
169169
|===
170170

171171
Kubernetes permissions::
@@ -181,7 +181,7 @@ Kubernetes permissions::
181181
|`kubernetes.proxy`
182182
|
183183
|`use`
184-
|Allows user or role to access the proxy endpoint
184+
|Allows a user or role to access the proxy endpoint
185185
|===
186186

187187
OCM permissions::
@@ -218,12 +218,12 @@ conditions:
218218
|`ocm.entity.read`
219219
|
220220
|`read`
221-
|Allows user or role to read from the OCM plugin
221+
|Allows a user or role to read from the OCM plugin
222222

223223
|`ocm.cluster.read`
224224
|
225225
|`read`
226-
|Allows user or role to read the cluster information in the OCM plugin
226+
|Allows a user or role to read the cluster information in the OCM plugin
227227
|===
228228

229229
Topology permissions::
@@ -239,10 +239,10 @@ Topology permissions::
239239
|`topology.view.read`
240240
|
241241
|`read`
242-
|Allows user or role to view the topology plugin
242+
|Allows a user or role to view the topology plugin
243243

244244
|`kubernetes.proxy`
245245
|
246246
|`use`
247-
|Allows user or role to access the proxy endpoint, allowing them to read pod logs and events within {product-very-short}
247+
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
248248
|===

modules/observe/ref-audit-log-file-rotation-overview.adoc

Lines changed: 0 additions & 97 deletions
This file was deleted.

0 commit comments

Comments
 (0)