Skip to content

Commit d468400

Browse files
authored
Merge branch 'main' into HACDOCS-1157
2 parents 3d5f93b + fa54f2e commit d468400

File tree

61 files changed

+1010
-602
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

61 files changed

+1010
-602
lines changed

.asciidoctorconfig

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@ include::{asciidoctorconfigdir}/artifacts/attributes.adoc[]
99
:chapter-signifier: Chapter
1010
:docinfo: shared
1111
:docinfodir: {asciidoctorconfigdir}/.asciidoctor
12-
:doctype: book
1312
:sectnumlevels: 5
1413
:sectnums:
1514
:source-highlighter: coderay

artifacts/attributes.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -88,9 +88,15 @@
8888
:authorization-book-url: https://docs.redhat.com/documentation/en-us/red_hat_developer_hub/{product-version}/html-single/authorization/index
8989
:authorization-book-title: Authorization
9090

91+
:installing-on-osd-on-gcp-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_red_hat_developer_hub_on_openshift_dedicated_on_google_cloud_platform/index
92+
:installing-on-osd-on-gcp-book-title: Installing {product} on {gcp-brand-name} on {gcp-brand-name}
93+
9194
:installing-on-ocp-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_red_hat_developer_hub_on_openshift_container_platform/index
9295
:installing-on-ocp-book-title: Installing {product} on {ocp-short}
9396

97+
:installing-on-gke-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_red_hat_developer_hub_on_google_kubernetes_engine/index
98+
:installing-on-gke-book-title: Installing {product} on {gke-brand-name}
99+
94100
:installing-on-eks-book-url: https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_red_hat_developer_hub_on_amazon_elastic_kubernetes_service/index
95101
:installing-on-eks-book-title: Installing {product} on {eks-brand-name}
96102

assemblies/assembly-about-rhdh.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,3 +20,6 @@ Use {product} to simplify decision-making through a selection of internally appr
2020

2121

2222
include::modules/about/con-benefits-of-rhdh.adoc[leveloffset=+1]
23+
include::modules/about/ref-supported-platforms.adoc[leveloffset=+1]
24+
include::modules/about/ref-rhdh-sizing.adoc[leveloffset=+1]
25+
include::modules/about/ref-customer-support-info.adoc[leveloffset=+1]

assemblies/assembly-audit-log.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,4 +45,4 @@ include::modules/observe/ref-audit-log-scaffolder-events.adoc[leveloffset=+2]
4545

4646
include::modules/observe/ref-audit-log-catalog-events.adoc[leveloffset=+2]
4747

48-
include::modules/observe/ref-audit-log-file-rotation-overview.adoc[]
48+
include::modules/observe/ref-audit-log-file-rotation-overview.adoc[]

assemblies/assembly-configuring-authorization-in-rhdh.adoc

Lines changed: 11 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -16,37 +16,32 @@ the {product-short} RBAC feature allows you
1616
to define policies in a declarative fashion using a simple CSV based format.
1717
You can define the policies by using {product-short} web interface or REST API, rather than editing the CSV directly.
1818

19-
To apply RBAC in {product-short}:
19+
To define authorizations in {product-short}:
2020

21-
. The {product-short} administrator sets up the RBAC feature:
22-
.. Enable the RBAC feature
23-
.. Configure Policy Administrators
21+
. The {product-short} administrator enables and gives access to the RBAC feature.
2422

25-
. The {product-short} policy administrator configures your RBAC policies:
26-
.. Define roles with specific permissions
27-
.. Assign the roles to users and groups
23+
. You define your roles and policies by combining the following methods:
2824

25+
* The {product-short} policy administrator uses the {product-short} web interface or REST API.
26+
* The {product-short} administrator edits the main {product-short} configuration file.
27+
* The {product-short} administrator edits external files.
2928

3029
include::modules/authorization/proc-enabling-the-rbac-plugin.adoc[leveloffset=+1]
3130

3231

33-
include::assembly-managing-authorizations-by-using-the-rhdh-web-ui.adoc[leveloffset=+1]
34-
32+
include::modules/authorization/proc-determining-permission-policy-and-role-configuration-source.adoc[leveloffset=+1]
3533

36-
include::assembly-managing-authorizations-by-using-the-rest-api.adoc[leveloffset=+1]
3734

38-
39-
include::modules/authorization/ref-rbac-permission-policies.adoc[leveloffset=+1]
35+
include::assembly-managing-authorizations-by-using-the-rhdh-web-ui.adoc[leveloffset=+1]
4036

4137

42-
include::modules/authorization/con-rbac-config-permission-policies.adoc[leveloffset=+2]
38+
include::assembly-managing-authorizations-by-using-the-rest-api.adoc[leveloffset=+1]
4339

4440

45-
include::modules/authorization/con-rbac-config-permission-policies-external-file.adoc[leveloffset=+3]
41+
include::assembly-managing-authorizations-by-using-external-files.adoc[leveloffset=+1]
4642

47-
include::modules/authorization/proc-mounting-the-policy-csv-file-using-the-operator.adoc[leveloffset=+4]
4843

49-
include::modules/authorization/proc-mounting-the-policy-csv-file-using-helm.adoc[leveloffset=+4]
44+
include::modules/authorization/ref-rbac-permission-policies.adoc[leveloffset=+1]
5045

5146

5247
include::modules/authorization/con-rbac-conditional-policies-rhdh.adoc[leveloffset=+1]
@@ -55,9 +50,6 @@ include::modules/authorization/con-rbac-conditional-policies-rhdh.adoc[leveloffs
5550
include::modules/authorization/ref-rbac-conditional-policy-definition.adoc[leveloffset=+2]
5651

5752

58-
include::modules/authorization/proc-rbac-config-conditional-policy-file.adoc[leveloffset=+2]
59-
60-
6153
include::modules/authorization/con-user-stats-rhdh.adoc[leveloffset=+1]
6254

6355

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,10 @@
1+
[id='managing-authorizations-by-using-external-files']
2+
= Managing authorizations by using external files
3+
4+
To automate {product} maintenance, you can configure permissions and roles in external files, before starting {product-short}.
5+
6+
7+
include::modules/authorization/proc-defining-authorizations-in-external-files-by-using-the-operator.adoc[leveloffset=+1]
8+
9+
include::modules/authorization/proc-defining-authorizations-in-external-files-by-using-helm.adoc[leveloffset=+1]
10+

assemblies/assembly-managing-authorizations-by-using-the-rhdh-web-ui.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
[id='proc-rbac-ui-manage-roles_{context}']
1+
[id='managing-authorizations-by-using-the-web-ui']
22
= Managing role-based access controls (RBAC) using the {product} Web UI
33

44
Policy administrators can use the {product-short} web interface (Web UI) to allocate specific roles and permissions to individual users or groups. Allocating roles ensures that access to resources and functionalities is regulated across the {product-short}.

assemblies/assembly-rhdh-integration-aks.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,4 +13,4 @@ This integration requires the deployment of {product-short} on {aks-short} using
1313
* The Helm chart
1414
* The {product} Operator
1515
16-
//include::modules/admin/proc-rhdh-monitoring-logging-aks.adoc[leveloffset=+1] // moving observe category related content to new titles: RHIDP-4814
16+
//include::modules/admin/proc-rhdh-monitoring-logging-aks.adoc[leveloffset=+1] // moving observe category related content to new titles: RHIDP-4814

assemblies/assembly-running-rhdh-behind-a-proxy.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,9 @@ You can run the {product-very-short} application behind a corporate proxy by set
66
* `HTTP_PROXY`: Denotes the proxy to use for HTTP requests.
77
* `HTTPS_PROXY`: Denotes the proxy to use for HTTPS requests.
88

9-
Additionally, you can set the `NO_PROXY` environment variable to exclude certain domains from proxying. The variable value is a comma-separated list of hostnames that do not require a proxy to get reached, even if one is specified.
9+
Additionally, set the `NO_PROXY` environment variable to bypass the proxy for certain domains. The variable value is a comma-separated list of hostnames or IP addresses that can be accessed without the proxy, even if one is specified.
1010

11+
include::modules/admin/procedure-understanding-no-proxy.adoc[leveloffset=+1]
1112

1213
include::modules/admin/proc-configuring-proxy-in-helm-deployment.adoc[leveloffset=+1]
1314
include::modules/admin/proc-configuring-proxy-in-operator-deployment.adoc[leveloffset=+1]

build/scripts/build-ccutil.sh

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ for t in $(find titles -name master.adoc | sort -uV | grep -E -v "${EXCLUDED_TIT
3636
CMD="podman run --interactive --rm --tty \
3737
--volume "$(pwd)":/docs:Z \
3838
--workdir "/docs/$d" \
39-
quay.io/ivanhorvath/ccutil:amazing ccutil compile --format html-single --lang en-US";
39+
quay.io/ivanhorvath/ccutil:amazing ccutil compile --format html-single --lang en-US --doctype article";
4040
echo -e -n "\nBuilding $t into $dest ...\n ";
4141
echo "${CMD}" | sed -r -e "s/\ +/ \\\\\n /g"
4242
$CMD

0 commit comments

Comments
 (0)