Skip to content

Commit 92146ab

Browse files
GitHub Actionsjmagak
authored andcommitted
Fix inconsistencies with referencing my-rhdh-secrets
1 parent fc7f261 commit 92146ab

9 files changed

+15
-15
lines changed

modules/configuring/proc-mounting-additional-files-in-your-custom-configuration-using-rhdh-operator.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ data:
4747
apiVersion: v1
4848
kind: Secret
4949
metadata:
50-
name: {my-product-secrets}
50+
name: `{my-product-secrets}`
5151
StringData:
5252
secret11.txt: |
5353
secret-content
@@ -69,7 +69,7 @@ spec:
6969
key: file12.txt
7070
mountPath: /my/my-rhdh-config-map/path
7171
secrets:
72-
- name: {my-product-secrets}
72+
- name: `{my-product-secrets}`
7373
key: secret11.txt
7474
mountPath: /my/my-rhdh-secret/path
7575

modules/configuring/proc-provisioning-your-custom-configuration.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -75,7 +75,7 @@ Alternatively, link:https://docs.redhat.com/en/documentation/openshift_container
7575
+
7676
[source,terminal,subs="+attributes,+quotes"]
7777
----
78-
$ oc create secret generic {my-product-secrets} --from-file={my-product-secrets}.txt --namespace={my-product-namespace}
78+
$ oc create secret generic `{my-product-secrets}` --from-file=`{my-product-secrets}.txt` --namespace={my-product-namespace}
7979
----
8080
+
8181
Alternatively,

modules/configuring/proc-using-the-operator-to-run-rhdh-with-your-custom-configuration.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ spec:
3131
- name: {my-app-config-config-map}
3232
extraEnvs:
3333
secrets:
34-
- name: {my-product-secrets}
34+
- name: `{my-product-secrets}`
3535
extraFiles:
3636
mountPath: /opt/app-root/src
3737
replicas: 1
@@ -60,7 +60,7 @@ spec:
6060
dynamicPluginsConfigMapName: dynamic-plugins-rhdh
6161
extraEnvs:
6262
secrets:
63-
- name: {my-product-secrets}
63+
- name: `{my-product-secrets}`
6464
- name: {my-product-database-secrets}
6565
extraFiles:
6666
mountPath: /opt/app-root/src
@@ -144,7 +144,7 @@ spec:
144144
application:
145145
extraEnvs:
146146
secrets:
147-
- name: {my-product-secrets}
147+
- name: `{my-product-secrets}`
148148
----
149149
====
150150
+
@@ -156,7 +156,7 @@ spec:
156156
application:
157157
extraEnvs:
158158
secrets:
159-
- name: {my-product-secrets}
159+
- name: `{my-product-secrets}`
160160
- name: {my-product-database-secrets}
161161
----
162162
====

modules/customizing/proc-customizing-the-backend-secret.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Use a unique value for each {product-short} instance.
1616
+
1717
[source,terminal,subs="+attributes"]
1818
----
19-
$ echo > {my-product-secrets}.txt "BACKEND_SECRET=$(node -p 'require("crypto").randomBytes(24).toString("base64")')"
19+
$ echo > `{my-product-secrets}.txt` "BACKEND_SECRET=$(node -p 'require("crypto").randomBytes(24).toString("base64")')"
2020
----
2121
+
2222
.`{my-product-secrets}.txt` example

modules/dynamic-plugins/proc-config-dynamic-plugins-rhdh-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ You can store the configuration for dynamic plugins in a `ConfigMap` object that
1010

1111
[NOTE]
1212
====
13-
If the `pluginConfig` field references environment variables, you must define the variables in your {my-product-secrets} secret.
13+
If the `pluginConfig` field references environment variables, you must define the variables in your `{my-product-secrets}` secret.
1414
====
1515

1616
.Procedure

modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,8 +119,8 @@ data:
119119
<1> The base URL to the Kubernetes control plane. You can run the `kubectl cluster-info` command to get the base URL.
120120
<2> Set the value of this parameter to `false` to enable the verification of the TLS certificate.
121121
<3> Optional: The link to the Kubernetes dashboard managing the ARO cluster.
122-
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you can define in your {my-product-secrets} secret.
123-
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you can define in your {my-product-secrets} secret.
122+
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you can define in your `{my-product-secrets}` secret.
123+
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you can define in your `{my-product-secrets}` secret.
124124

125125
. Save the configuration changes.
126126

modules/installation/proc-deploy-rhdh-instance-eks.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ data:
5252
apiVersion: v1
5353
kind: Secret
5454
metadata:
55-
name: {my-product-secrets}
55+
name: `{my-product-secrets}`
5656
stringData:
5757
# TODO: See https://backstage.io/docs/auth/service-to-service-auth/#setup
5858
BACKEND_SECRET: "xxx"
@@ -103,7 +103,7 @@ spec:
103103
- name: "app-config-rhdh"
104104
extraEnvs:
105105
secrets:
106-
- name: {my-product-secrets}
106+
- name: `{my-product-secrets}`
107107
----
108108
--
109109

modules/installation/proc-deploy-rhdh-instance-gke.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ data:
4848
. Create a Secret named {my-product-secret} and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
4949
+
5050
--
51-
.{my-product-secrets} fragment
51+
.`{my-product-secrets}` fragment
5252
[source,yaml]
5353
----
5454
apiVersion: v1

modules/installation/proc-rhdh-deploy-aks-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -114,7 +114,7 @@ data:
114114
----
115115
--
116116

117-
. Create a Secret named {my-product-secrets} and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
117+
. Create a Secret named `{my-product-secrets}` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
118118
+
119119
--
120120
[source,yaml]

0 commit comments

Comments
 (0)