Skip to content

Commit 3f3ab22

Browse files
authored
Merge branch 'release-1.3' into release-notes-script-fixes
2 parents 8bc7e69 + 5b3104a commit 3f3ab22

File tree

3 files changed

+35
-30
lines changed

3 files changed

+35
-30
lines changed

artifacts/rhdh-plugins-reference/keycloak/keycloak-plugin-admin.adoc

Lines changed: 10 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -6,17 +6,22 @@ The Keycloak backend plugin, which integrates Keycloak into {product-short}, has
66
* Synchronization of Keycloak users in a realm.
77
* Synchronization of Keycloak groups and their users in a realm.
88

9+
[NOTE]
10+
====
11+
The supported Keycloak version is `18.x`.
12+
====
13+
914
== Installation
1015

1116
The Keycloak plugin is pre-loaded in {product-short} with basic configuration properties. To enable it, set the `disabled` property to `false` as follows:
1217

1318
[source,yaml]
1419
----
15-
global:
16-
dynamic:
17-
includes:
20+
global:
21+
dynamic:
22+
includes:
1823
- dynamic-plugins.default.yaml
19-
plugins:
24+
plugins:
2025
- package: ./dynamic-plugins/dist/janus-idp-backstage-plugin-keycloak-backend-dynamic
2126
disabled: false
2227
----
@@ -87,7 +92,7 @@ The following table describes the parameters that you can configure to enable th
8792
| Name | Description | Default Value | Required
8893

8994
| `baseUrl`
90-
| Location of the Keycloak server, such as `pass:c[https://localhost:8443/auth]`. Note that the newer versions of Keycloak omit the `/auth` context path.
95+
| Location of the Keycloak server, such as `pass:c[https://localhost:8443/auth]`.
9196
| ""
9297
| Yes
9398

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -46,42 +46,42 @@ Catalog permissions::
4646
|`catalog.entity.read`
4747
|`catalog-entity`
4848
|`read`
49-
|Allows user or role to read from the catalog
49+
|Allows a user or role to read from the catalog
5050

5151
|`catalog.entity.create`
5252
|
5353
|`create`
54-
|Allows user or role to create catalog entities, including registering an existing component in the catalog
54+
|Allows a user or role to create catalog entities, including registering an existing component in the catalog
5555

5656
|`catalog.entity.refresh`
5757
|`catalog-entity`
5858
|`update`
59-
|Allows user or role to refresh a single or multiple entities from the catalog
59+
|Allows a user or role to refresh a single or multiple entities from the catalog
6060

6161
|`catalog.entity.delete`
6262
|`catalog-entity`
6363
|`delete`
64-
|Allows user or role to delete a single or multiple entities from the catalog
64+
|Allows a user or role to delete a single or multiple entities from the catalog
6565

6666
|`catalog.location.read`
6767
|
6868
|`read`
69-
|Allows user or role to read a single or multiple locations from the catalog
69+
|Allows a user or role to read a single or multiple locations from the catalog
7070

7171
|`catalog.location.create`
7272
|
7373
|`create`
74-
|Allows user or role to create locations within the catalog
74+
|Allows a user or role to create locations within the catalog
7575

7676
|`catalog.location.delete`
7777
|
7878
|`delete`
79-
|Allows user or role to delete locations from the catalog
79+
|Allows a user or role to delete locations from the catalog
8080
|===
8181

82-
Bulk import permissions::
82+
Bulk import permission::
8383

84-
.Bulk import permissions
84+
.Bulk import permission
8585
[cols="15%,25%,15%,45%", frame="all", options="header"]
8686
|===
8787
|Name
@@ -92,7 +92,7 @@ Bulk import permissions::
9292
|`bulk.import`
9393
|`bulk-import`
9494
|`use`
95-
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests.
95+
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests
9696

9797
|===
9898

@@ -114,27 +114,27 @@ Scaffolder permissions::
114114
|`scaffolder.template.parameter.read`
115115
|`scaffolder-template`
116116
|`read`
117-
|Allows user or role to read a single or multiple one parameters from a template
117+
|Allows a user or role to read a single or multiple one parameters from a template
118118

119119
|`scaffolder.template.step.read`
120120
|`scaffolder-template`
121121
|`read`
122-
|Allows user or role to read a single or multiple steps from a template
122+
|Allows a user or role to read a single or multiple steps from a template
123123

124124
|`scaffolder.task.create`
125125
|
126126
|`create`
127-
|Allows the user or role to trigger software templates which create new scaffolder tasks
127+
|Allows a user or role to trigger software templates which create new scaffolder tasks
128128

129129
|`scaffolder.task.cancel`
130130
|
131131
|`use`
132-
|Allows the user or role to cancel currently running scaffolder tasks
132+
|Allows a user or role to cancel currently running scaffolder tasks
133133

134134
|`scaffolder.task.read`
135135
|
136136
|`read`
137-
|Allows user or role to read all scaffolder tasks and their associated events and logs
137+
|Allows a user or role to read all scaffolder tasks and their associated events and logs
138138
|===
139139

140140
RBAC permissions::
@@ -150,22 +150,22 @@ RBAC permissions::
150150
|`policy.entity.read`
151151
|`policy-entity`
152152
|`read`
153-
|Allows user or role to read permission policies and roles
153+
|Allows a user or role to read permission policies and roles
154154

155155
|`policy.entity.create`
156156
|`policy-entity`
157157
|`create`
158-
|Allows user or role to create a single or multiple permission policies and roles
158+
|Allows a user or role to create a single or multiple permission policies and roles
159159

160160
|`policy.entity.update`
161161
|`policy-entity`
162162
|`update`
163-
|Allows user or role to update a single or multiple permission policies and roles
163+
|Allows a user or role to update a single or multiple permission policies and roles
164164

165165
|`policy.entity.delete`
166166
|`policy-entity`
167167
|`delete`
168-
|Allows user or role to delete a single or multiple permission policies and roles
168+
|Allows a user or role to delete a single or multiple permission policies and roles
169169
|===
170170

171171
Kubernetes permissions::
@@ -181,7 +181,7 @@ Kubernetes permissions::
181181
|`kubernetes.proxy`
182182
|
183183
|`use`
184-
|Allows user or role to access the proxy endpoint
184+
|Allows a user or role to access the proxy endpoint
185185
|===
186186

187187
OCM permissions::
@@ -196,12 +196,12 @@ OCM permissions::
196196
|`ocm.entity.read`
197197
|
198198
|`read`
199-
|Allows user or role to read from the OCM plugin
199+
|Allows a user or role to read from the OCM plugin
200200

201201
|`ocm.cluster.read`
202202
|
203203
|`read`
204-
|Allows user or role to read the cluster information in the OCM plugin
204+
|Allows a user or role to read the cluster information in the OCM plugin
205205
|===
206206

207207
Topology permissions::
@@ -217,10 +217,10 @@ Topology permissions::
217217
|`topology.view.read`
218218
|
219219
|`read`
220-
|Allows user or role to view the topology plugin
220+
|Allows a user or role to view the topology plugin
221221

222222
|`kubernetes.proxy`
223223
|
224224
|`use`
225-
|Allows user or role to access the proxy endpoint, allowing them to read pod logs and events within {product-very-short}
225+
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
226226
|===

modules/installation/proc-install-rhdh-airgapped-environment-ocp-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ The internal {ocp-short} cluster image registry cannot be used as a target mirro
4141
** The `htpasswd` command is available. For {rhel}, the `htpasswd` command is available by installing the `httpd-tools` package.
4242
4343
.Procedure
44-
. Download and run the mirroring script to install a custom Operator catalog and mirror the related images: `prepare-restricted-environment.sh` (link:https://github.com/redhat-developer/rhdh-operator/blob/{product-version}.x/.rhdh/scripts/prepare-restricted-environment.sh[source]).
44+
. Download and run the mirroring script to install a custom Operator catalog and mirror the related images: `prepare-restricted-environment.sh` (link:https://github.com/redhat-developer/rhdh-operator/blob/release-{product-version}/.rhdh/scripts/prepare-restricted-environment.sh[source]).
4545
+
4646
[source,yaml,subs="attributes+"]
4747
----

0 commit comments

Comments
 (0)