Skip to content

Commit 810039e

Browse files
authored
Merge branch 'main' into RHIDP-5409-consistent-titles-subtitles
2 parents c2aa087 + 4293411 commit 810039e

20 files changed

+193
-25
lines changed

artifacts/attributes.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@
2727
:my-product-database-certificates-secrets: my-rhdh-database-certificates-secrets
2828
:my-product-database-secrets: my-rhdh-database-secrets
2929
:my-product-url: https://__<my_developer_hub_url>__
30+
:my-extra-file-configmap: my-project-configmap
3031

3132
// Red Hat Platforms
3233
:ocp-brand-name: Red Hat OpenShift Container Platform
Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
[id="installing-configuring-jfrog-artifactory_{context}"]
2+
= Installing and configuring the JFrog Artifactory plugin
3+
4+
JFrog Artifactory is a front-end plugin that displays the information about your container images stored in the JFrog Artifactory repository. The JFrog Artifactory plugin is preinstalled with {product-short} and disabled by default. To use it, you need to enable and configure it first.
5+
6+
[IMPORTANT]
7+
====
8+
The JFrog Artifactory plugin is a Technology Preview feature only.
9+
10+
Technology Preview features are not supported with Red Hat production service level agreements (SLAs), might not be functionally complete, and Red Hat does not recommend using them for production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
11+
12+
For more information on Red Hat Technology Preview features, see https://access.redhat.com/support/offerings/techpreview/[Technology Preview Features Scope].
13+
14+
Additional detail on how Red Hat provides support for bundled community dynamic plugins is available on the https://access.redhat.com/policy/developerhub-support-policy[Red Hat Developer Support Policy] page.
15+
====
16+
17+
== Installation
18+
The JFrog Artifactory plugin is preinstalled in {product-short} with basic configuration properties. To enable it, set the disabled property to `false` as follows:
19+
20+
[source,yaml]
21+
----
22+
global:
23+
dynamic:
24+
includes:
25+
- dynamic-plugins.default.yaml
26+
plugins:
27+
- package: ./dynamic-plugins/dist/backstage-community-plugin-jfrog-artifactory
28+
disabled: false
29+
----
30+
31+
== Configuration
32+
. Set the proxy to the desired JFrog Artifactory server in the `app-config.yaml` file as follows:
33+
+
34+
[source,yaml]
35+
----
36+
proxy:
37+
endpoints:
38+
‘/jfrog-artifactory/api’:
39+
target: http://<hostname>:8082 # or https://<customer>.jfrog.io
40+
headers:
41+
# Authorization: 'Bearer <YOUR TOKEN>'
42+
# Change to "false" in case of using a self-hosted Artifactory instance with a self-signed certificate
43+
secure: true
44+
----
45+
46+
. Add the following annotation to the entity’s `catalog-info.yaml` file to enable the JFrog Artifactory plugin features in RHDH components:
47+
+
48+
[source,yaml]
49+
----
50+
metadata:
51+
annotations:
52+
'jfrog-artifactory/image-name': '<IMAGE-NAME>'
53+
----
Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
[id="using-jfrog-artifactory_{context}"]
2+
= Using the JFrog Artifactory plugin
3+
4+
The JFrog Artifactory plugin displays information about your container images within the Jfrog Artifactory registry.
5+
6+
[IMPORTANT]
7+
====
8+
The JFrog Artifactory plugin is a Technology Preview feature only.
9+
10+
Technology Preview features are not supported with Red Hat production service level agreements (SLAs), might not be functionally complete, and Red Hat does not recommend using them for production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
11+
12+
For more information on Red Hat Technology Preview features, see https://access.redhat.com/support/offerings/techpreview/[Technology Preview Features Scope].
13+
14+
Additional detail on how Red Hat provides support for bundled community dynamic plugins is available on the https://access.redhat.com/policy/developerhub-support-policy[Red Hat Developer Support Policy] page.
15+
====
16+
17+
.Prerequisites
18+
19+
* Your {product-short} application is installed and running.
20+
* You have enabled the JFrog Artifactory plugin.
21+
22+
.Procedure
23+
24+
. Open your {product-short} application and select a component from the *Catalog* page.
25+
. Go to the *Image Registry* tab.
26+
27+
+
28+
The *Image Registry* tab contains a list of container images within your Jfrog Artifactory repository and related information, such as *Version*, *Repositories*, *Manifest*, *Modified*, and *Size*.
29+
30+
+
31+
image::rhdh-plugins-reference/jfrog-artifactory.png[image-registry-tab-jfrog-artifactory]

assemblies/assembly-provisioning-a-custom-configuration.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ include::modules/configuring/proc-provisioning-your-custom-configuration.adoc[le
2222

2323
include::modules/configuring/proc-using-the-operator-to-run-rhdh-with-your-custom-configuration.adoc[leveloffset=+1]
2424

25+
include::modules/configuring/proc-mounting-additional-files-in-your-custom-configuration-using-rhdh-operator.adoc[leveloffset=+2]
2526

2627
include::modules/configuring/proc-using-the-helm-chart-to-run-rhdh-with-your-custom-configuration.adoc[leveloffset=+1]
2728

assemblies/dynamic-plugins/assembly-configuring-rhdh-plugins.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,9 @@ include::../modules/dynamic-plugins/con-ansible-plugin-admin.adoc[leveloffset=+1
77
// Argo CD
88
include::../../artifacts/rhdh-plugins-reference/argocd/argocd-plugin-admin.adoc[leveloffset=+1]
99

10+
//JFrog Artifactory
11+
include::../../artifacts/rhdh-plugins-reference/jfrog-artifactory/jfrog-artifactory-plugin-admin.adoc[leveloffset=+1]
12+
1013
// Keycloak
1114
include::../../artifacts/rhdh-plugins-reference/keycloak/keycloak-plugin-admin.adoc[leveloffset=+1]
1215

assemblies/dynamic-plugins/assembly-using-rhdh-plugins.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,9 @@ include::../modules/dynamic-plugins/con-ansible-plugin-user.adoc[leveloffset=+1]
77
// Argo CD
88
include::../../artifacts/rhdh-plugins-reference/argocd/argocd-plugin-user.adoc[leveloffset=+1]
99

10+
//JFrog Artifactory
11+
include::../../artifacts/rhdh-plugins-reference/jfrog-artifactory/jfrog-artifactory-plugin-user.adoc[leveloffset=+1]
12+
1013
// Keycloak
1114
include::../../artifacts/rhdh-plugins-reference/keycloak/keycloak-plugin-user.adoc[leveloffset=+1]
1215

66.5 KB
Loading

modules/authorization/proc-defining-authorizations-in-external-files-by-using-helm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ $ oc create configmap rbac-policies \
8181

8282
.. Select *Add Backstage container additional volume mounts* and add the following values:
8383

84-
mountPath:: `/opt/app-root/src`
84+
mountPath:: `/opt/app-root/src/rbac`
8585
Name:: `rbac-policies`
8686

8787
.. Add the RBAC policy to the *Backstage container additional volumes* in the {product-short} Helm Chart:
Lines changed: 77 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,77 @@
1+
[id="mounting-additional-files-in-your-custom-configuration-using-rhdh-operator"]
2+
= Mounting additional files in your custom configuration using the {product} Operator
3+
4+
You can use the {product-short} Operator to mount extra files, such as a ConfigMap or Secret, to the container in a preferred location.
5+
6+
The `mountPath` field specifies the location where a ConfigMap or Secret is mounted. The behavior of the mount, whether it includes or excludes a `subPath`, depends on the specification of the `key` or `mountPath` fields.
7+
8+
* If `key` and `mountPath` are not specified: Each key or value is mounted as a `filename` or content with a `subPath`.
9+
* If `key` is specified with or without `mountPath`: The specified key or value is mounted with a `subPath`.
10+
* If only `mountPath` is specified: A directory containing all the keys or values is mounted without a `subPath`.
11+
12+
[NOTE]
13+
====
14+
* {ocp-short} does not automatically update a volume mounted with `subPath`. By default, the {product-very-short} operator monitors these ConfigMaps or Secrets and refreshes the {product-very-short} Pod when changes occur.
15+
* For security purposes, {product} does not give the Operator Service Account read access to Secrets. As a result, mounting files from Secrets without specifying both mountPath and key is not supported.
16+
====
17+
18+
19+
.Prerequisites
20+
* You have developer permissions to access the {ocp-short} cluster containing your {product-short} instance using the {openshift-cli}.
21+
* link:{installing-on-ocp-book-url}[Your {ocp-short} administrator has installed the {product} Operator in {ocp-short}].
22+
23+
.Procedure
24+
25+
. In {ocp-short}, create your ConfigMap or Secret with the following YAML codes:
26+
+
27+
.Minimal `{my-extra-file-configmap}` ConfigMap example
28+
====
29+
[source,yaml,subs="+attributes,+quotes"]
30+
----
31+
apiVersion: v1
32+
kind: ConfigMap
33+
metadata:
34+
name: {my-extra-file-configmap}
35+
data:
36+
file11.txt: |
37+
My file11 content
38+
file 12.txt: |
39+
My file12 content
40+
----
41+
====
42+
+
43+
.Minimal `{my-product-secrets}` Secret example
44+
====
45+
[source,yaml,subs="+attributes,+quotes"]
46+
----
47+
apiVersion: v1
48+
kind: Secret
49+
metadata:
50+
name: {my-product-secrets}
51+
StringData:
52+
secret11.txt: |
53+
secret-content
54+
----
55+
====
56+
For more information, see xref:provisioning-your-custom-configuration[Provisioning and using your custom {product} configuration].
57+
58+
. Set the value of the `configMaps name` to the name of the ConfigMap or `secrets name` to the name of the Secret in your `{product-custom-resource-type}` CR. For example:
59+
+
60+
====
61+
[source,yaml,subs="+attributes,+quotes"]
62+
----
63+
spec:
64+
application:
65+
extraFiles:
66+
mountPath: /my/path
67+
configMaps:
68+
- name: {my-extra-file-configmap}
69+
key: file12.txt
70+
mountPath: /my/my-rhdh-config-map/path
71+
secrets:
72+
- name: {my-product-secrets}
73+
key: secret11.txt
74+
mountPath: /my/my-rhdh-secret/path
75+
76+
----
77+
====

modules/installation/proc-install-operator.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -20,15 +20,15 @@ Containers are available for the following CPU architectures:
2020
.Prerequisites
2121

2222
* You are logged in as an administrator on the {ocp-short} web console.
23-
* You have configured the appropriate roles and permissions within your project to create or access an application. For more information, see the link:https://docs.openshift.com/container-platform/{ocp-version}/applications/index.html[{ocp-brand-name} documentation on Building applications].
23+
* You have configured the appropriate roles and permissions within your project to create or access an application. For more information, see the link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/building_applications/index#building-applications-overview[{ocp-brand-name} documentation on Building applications].
2424
2525
[IMPORTANT]
2626
====
2727
For enhanced security, better control over the Operator lifecycle, and preventing potential privilege escalation, install the {product} Operator in a dedicated default `rhdh-operator` namespace. You can restrict other users' access to the Operator resources through role bindings or cluster role bindings.
2828
29-
You can also install the Operator in another namespace by creating the necessary resources, such as an Operator group. For more information, see link:https://docs.openshift.com/container-platform/latest/operators/admin/olm-adding-operators-to-cluster.html#olm-installing-global-namespaces_olm-adding-operators-to-a-cluster[Installing global Operators in custom namespaces].
29+
You can also install the Operator in another namespace by creating the necessary resources, such as an Operator group. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/operators/index#olm-installing-global-namespaces_olm-adding-operators-to-a-cluster[Installing global Operators in custom namespaces].
3030
31-
However, if the {product} Operator shares a namespace with other Operators, then it shares the same update policy as well, preventing the customization of the update policy. For example, if one Operator is set to manual updates, the {product} Operator update policy is also set to manual. For more information, see link:https://docs.openshift.com/container-platform/latest/operators/understanding/olm/olm-colocation.html#olm-colocation-namespaces_olm-colocation[Colocation of Operators in a namespace].
31+
However, if the {product} Operator shares a namespace with other Operators, then it shares the same update policy as well, preventing the customization of the update policy. For example, if one Operator is set to manual updates, the {product} Operator update policy is also set to manual. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/operators/index#olm-colocation-namespaces_olm-colocation[Colocation of Operators in a namespace].
3232
3333
====
3434

@@ -62,4 +62,4 @@ The `fast` channel includes all of the updates available for a particular versio
6262
.Additional resources
6363

6464
* xref:proc-install-rhdh-ocp-operator_{context}[Deploying {product} on {ocp-short} with the Operator]
65-
* link:https://docs.openshift.com/container-platform/{ocp-version}/operators/admin/olm-adding-operators-to-cluster.html#olm-installing-from-operatorhub-using-web-console_olm-adding-operators-to-a-cluster[Installing from OperatorHub using the web console]
65+
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/operators/index#olm-installing-from-operatorhub-using-web-console_olm-adding-operators-to-a-cluster[Installing from OperatorHub by using the web console]

0 commit comments

Comments
 (0)