Skip to content

Commit 856db3a

Browse files
authored
RHIDP-3206: Added missing attribute declaration in the source code (#945)
* Added missing attribute declaration in the source code * Updated env variables
1 parent dbea563 commit 856db3a

File tree

4 files changed

+10
-11
lines changed

4 files changed

+10
-11
lines changed

modules/configuring-external-databases/proc-configuring-postgresql-instance-using-helm.adoc

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,11 @@ You can configure an external PostgreSQL instance by using the Helm Chart. By de
1919
By default, {product-short} uses a database for each plugin and automatically creates it if none is found. You might need the `Create Database` privilege in addition to `PSQL Database` privileges for configuring an external PostgreSQL instance.
2020
====
2121

22-
2322
.Procedure
2423

2524
. Optional: Create a certificate secret to configure your PostgreSQL instance with a TLS connection:
2625
+
27-
[source,terminal]
26+
[source,terminal,subs="+attributes"]
2827
----
2928
cat <<EOF | oc -n <your-namespace> create -f -
3029
apiVersion: v1
@@ -52,7 +51,7 @@ EOF
5251

5352
. Create a credential secret to connect with the PostgreSQL instance:
5453
+
55-
[source,terminal]
54+
[source,terminal,subs="+attributes"]
5655
----
5756
cat <<EOF | oc -n <your-namespace> create -f -
5857
apiVersion: v1
@@ -76,7 +75,7 @@ EOF
7675

7776
. Configure your PostgreSQL instance in the Helm configuration file named `values.yaml`:
7877
+
79-
[source,yaml]
78+
[source,yaml,subs="+attributes"]
8079
----
8180
# ...
8281
upstream:
@@ -89,10 +88,10 @@ upstream:
8988
backend:
9089
database:
9190
connection: # configure Backstage DB connection parameters
92-
host: ${POSTGRES_HOST}
93-
port: ${POSTGRES_PORT}
94-
user: ${POSTGRES_USER}
95-
password: ${POSTGRES_PASSWORD}
91+
host: $\{POSTGRES_HOST}
92+
port: $\{POSTGRES_PORT}
93+
user: $\{POSTGRES_USER}
94+
password: $\{POSTGRES_PASSWORD}
9695
ssl:
9796
rejectUnauthorized: true,
9897
ca:

modules/configuring-external-databases/proc-migrating-databases-to-an-external-server.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ You can stop port forwarding when the copying of the data is complete. For more
8181
. Reconfigure your `{product-custom-resource-type}` custom resource (CR). For more information, see link:{configuring-book-url}#proc-configuring-postgresql-instance-using-operator_configuring-external-postgresql-databases[Configuring an external PostgreSQL instance using the Operator].
8282
. Check that the following code is present at the end of your `Backstage` CR after reconfiguration:
8383
+
84-
[source,yaml]
84+
[source,yaml,subs="+attributes"]
8585
----
8686
# ...
8787
spec:

modules/dynamic-plugins/proc-create-plugin-tgz-file.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ npm pack --pack-destination ~/test/dynamic-plugins-root/
4848
To create a plugin registry using HTTP server on {ocp-short}, run the following commands:
4949
5050
.Example commands to build and deploy an HTTP server in {ocp-short}
51-
[source,terminal]
51+
[source,terminal, subs="+attributes"]
5252
----
5353
oc project {my-product-namespace}
5454
oc new-build httpd --name=plugin-registry --binary

modules/installation/proc-install-rhdh-airgapped-environment-ocp-helm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,7 +92,7 @@ If an x509 error occurs, verify that you have link:https://access.redhat.com/sol
9292

9393
. Use the following command to verify that both images are present in the internal {ocp-short} registry:
9494
+
95-
[source,terminal]
95+
[source,terminal, subs="+attributes"]
9696
----
9797
oc get imagestream -n {my-product-namespace}
9898
----

0 commit comments

Comments
 (0)