Skip to content

Commit a40de7f

Browse files
author
GitHub Actions
committed
Fix inconsistencies with referencing my-rhdh-secrets
1 parent 40c1839 commit a40de7f

8 files changed

+42
-24
lines changed

modules/configuring/proc-mounting-additional-files-in-your-custom-configuration-using-rhdh-operator.adoc

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ data:
4040
----
4141
====
4242
+
43-
.Minimal `{my-product-secrets}` Secret example
43+
.Minimal `_<my-product-secrets>_` Secret example
4444
====
4545
[source,yaml,subs="+attributes,+quotes"]
4646
----
4747
apiVersion: v1
4848
kind: Secret
4949
metadata:
50-
name: `{my-product-secrets}`
50+
name: `_<my-product-secrets>_`
5151
StringData:
5252
secret11.txt: |
5353
secret-content
@@ -69,9 +69,14 @@ spec:
6969
key: file12.txt
7070
mountPath: /my/my-rhdh-config-map/path
7171
secrets:
72-
- name: `{my-product-secrets}`
72+
- name: `_<my-product-secrets>_`
7373
key: secret11.txt
7474
mountPath: /my/my-rhdh-secret/path
7575
7676
----
7777
====
78+
79+
[NOTE]
80+
====
81+
Replace `<my-product-secrets>` with your {product-short} secret name.
82+
====

modules/configuring/proc-provisioning-your-custom-configuration.adoc

Lines changed: 8 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Your changes on this configuration might get reverted on {product-short} restart
1313
* By using the link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/cli_tools/index#cli-about-cli_cli-developer-commands[{openshift-cli}], you have access, with developer permissions, to the {ocp-short} cluster aimed at containing your {product-short} instance.
1414

1515
.Procedure
16-
. Author your custom `{my-product-secrets}.txt` file to provision your secrets as environment variables values in an {ocp-short} secret, rather than in clear text in your configuration files.
16+
. Author your custom `_<my-product-secrets>_.txt` file to provision your secrets as environment variables values in an {ocp-short} secret, rather than in clear text in your configuration files.
1717
It contains one secret per line in `KEY=value` form.
1818
+
1919
* link:{authentication-book-url}[Enter your authentication secrets].
@@ -71,16 +71,21 @@ $ oc create configmap {my-app-config-config-map} --from-file={my-app-config-file
7171
+
7272
Alternatively, link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/nodes/index#nnodes-pods-configmap-create-from-console_configmaps[create the config map by using the web console].
7373

74-
.. Provision your `{my-product-secrets}.txt` file to the `{my-product-secrets}` secret in the _<{my-product-namespace}>_ project.
74+
.. Provision your `_<my-product-secrets>_.txt` file to the `<my-product-secrets>` secret in the _<{my-product-namespace}>_ project.
7575
+
7676
[source,terminal,subs="+attributes,+quotes"]
7777
----
78-
$ oc create secret generic `{my-product-secrets}` --from-file=`{my-product-secrets}.txt` --namespace={my-product-namespace}
78+
$ oc create secret generic `<my-product-secrets>` --from-file=`_<my-product-secrets>_.txt` --namespace={my-product-namespace}
7979
----
8080
+
8181
Alternatively,
8282
link:https://docs.redhat.com/en/documentation/openshift_container_platform/{ocp-version}/html-single/nodes/index#nodes-pods-secrets-creating-web-console-secrets_nodes-pods-secrets[create the secret by using the web console].
8383

84+
[NOTE]
85+
====
86+
`<my-product-secrets>` is your preferred {product-short} secret name.
87+
====
88+
8489
.Next steps
8590
Consider provisioning additional config maps and secrets:
8691

modules/configuring/proc-using-the-operator-to-run-rhdh-with-your-custom-configuration.adoc

Lines changed: 11 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ spec:
3131
- name: {my-app-config-config-map}
3232
extraEnvs:
3333
secrets:
34-
- name: `{my-product-secrets}`
34+
- name: `<my-product-secrets>`
3535
extraFiles:
3636
mountPath: /opt/app-root/src
3737
replicas: 1
@@ -60,7 +60,7 @@ spec:
6060
dynamicPluginsConfigMapName: dynamic-plugins-rhdh
6161
extraEnvs:
6262
secrets:
63-
- name: `{my-product-secrets}`
63+
- name: `<my-product-secrets>`
6464
- name: {my-product-database-secrets}
6565
extraFiles:
6666
mountPath: /opt/app-root/src
@@ -136,31 +136,36 @@ spec:
136136
`spec.application.extraEnvs.secrets`:::
137137
Enter your environment variables secret name list.
138138
+
139-
.Inject the environment variables in your `{my-product-secrets}` secret
139+
.Inject the environment variables in your `<my-product-secrets>` secret
140140
====
141141
[source,yaml,subs="+attributes,+quotes"]
142142
----
143143
spec:
144144
application:
145145
extraEnvs:
146146
secrets:
147-
- name: `{my-product-secrets}`
147+
- name: `<my-product-secrets>`
148148
----
149149
====
150150
+
151-
.Inject the environment variables in the `{my-product-secrets}` and `{my-product-database-secrets}` secrets
151+
.Inject the environment variables in the `<my-product-secrets>` and `{my-product-database-secrets}` secrets
152152
====
153153
[source,yaml,subs="+attributes,+quotes"]
154154
----
155155
spec:
156156
application:
157157
extraEnvs:
158158
secrets:
159-
- name: `{my-product-secrets}`
159+
- name: `<my-product-secrets>`
160160
- name: {my-product-database-secrets}
161161
----
162162
====
163163

164+
[NOTE]
165+
====
166+
Replace `<my-product-secrets>` with your {product-short} secret name.
167+
====
168+
164169
`spec.application.extraFiles.secrets`:::
165170
Enter your certificates files secret name and files list.
166171
+

modules/customizing/proc-customizing-the-backend-secret.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -11,15 +11,15 @@ You can define your custom {product-short} backend secret.
1111
.Procedure
1212

1313
. To define the {product-short} backend secret,
14-
add to your custom `{my-product-secrets}.txt` file the `BACKEND_SECRET` environment variable with a base64 encoded string.
15-
Use a unique value for each {product-short} instance.
14+
add to your custom `_<my-product-secrets>_.txt` file the `BACKEND_SECRET` environment variable with a base64 encoded string.
15+
Use a unique value for each {product-short} instance. _<release_name>_
1616
+
1717
[source,yaml,subs="+quotes,+attributes"]
1818
----
19-
$ echo > `{my-product-secrets}.txt` "BACKEND_SECRET=$(node -p 'require("crypto").randomBytes(24).toString("base64")')"
19+
$ echo > `_<my-product-secrets>_.txt` "BACKEND_SECRET=$(node -p 'require("crypto").randomBytes(24).toString("base64")')"
2020
----
2121
+
22-
.`{my-product-secrets}.txt` example
22+
.`_<my-product-secrets>_.txt` example
2323
----
2424
BACKEND_SECRET=3E2/rIPuZNFCtYHoxVP8wjriffnN1q/z
2525
----

modules/dynamic-plugins/proc-config-dynamic-plugins-rhdh-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ You can store the configuration for dynamic plugins in a `ConfigMap` object that
1010

1111
[NOTE]
1212
====
13-
If the `pluginConfig` field references environment variables, you must define the variables in your `{my-product-secrets}` secret.
13+
If the `pluginConfig` field references environment variables, you must define the variables in your `_<my-product-secrets>_` secret.
1414
====
1515

1616
.Procedure

modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -119,8 +119,8 @@ data:
119119
<1> The base URL to the Kubernetes control plane. You can run the `kubectl cluster-info` command to get the base URL.
120120
<2> Set the value of this parameter to `false` to enable the verification of the TLS certificate.
121121
<3> Optional: The link to the Kubernetes dashboard managing the ARO cluster.
122-
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you define in your `{my-product-secrets}` secret.
123-
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you define in your `{my-product-secrets}` secret.
122+
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you define in your `_<my-product-secrets>_` secret.
123+
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you define in your `_<my-product-secrets>_` secret.
124124

125125
. Save the configuration changes.
126126

modules/installation/proc-deploy-rhdh-instance-eks.adoc

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -44,19 +44,20 @@ data:
4444
----
4545
--
4646

47-
. Create a Secret named `{my-product-secrets}` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
47+
. Create a `_<my-product-secrets>_` secret and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
4848
+
4949
--
5050
[source,yaml,subs="+attributes,+quotes"]
5151
----
5252
apiVersion: v1
5353
kind: Secret
5454
metadata:
55-
name: `{my-product-secrets}`
55+
name: `_<my-product-secrets>_` # <1>
5656
stringData:
5757
# TODO: See https://backstage.io/docs/auth/service-to-service-auth/#setup
5858
BACKEND_SECRET: "xxx"
5959
----
60+
<1> Replace `<my-product-secrets>` with a unique identifier for your secret configuration.
6061

6162
[IMPORTANT]
6263
====
@@ -103,8 +104,9 @@ spec:
103104
- name: "app-config-rhdh"
104105
extraEnvs:
105106
secrets:
106-
- name: `{my-product-secrets}`
107+
- name: `<my-product-secrets>` # <1>
107108
----
109+
<1> Replace `<my-product-secrets>` with a unique identifier for your secret configuration.
108110
--
109111

110112
. Create an Ingress resource using the following template, ensuring to customize the names as needed:

modules/installation/proc-rhdh-deploy-aks-operator.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -114,18 +114,19 @@ data:
114114
----
115115
--
116116

117-
. Create a secret named `{my-product-secrets}` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
117+
. Create a `_<my-product-secrets>_` secret and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
118118
+
119119
--
120120
[source,yaml,subs="+quotes,+attributes"]
121121
----
122122
apiVersion: v1
123123
kind: Secret
124124
metadata:
125-
name: `{my-product-secret}`
125+
name: `_<my-product-secrets>_` # <1>
126126
stringData:
127127
BACKEND_SECRET: "xxx"
128128
----
129+
<1> Replace `<my-product-secrets>` with a unique identifier for your secret configuration.
129130
--
130131

131132
. Create your `{product-custom-resource-type}` custom resource (CR) manifest file named `rhdh.yaml` and include the previously created `rhdh-pull-secret` as follows:

0 commit comments

Comments
 (0)