Skip to content

Commit 1d090f5

Browse files
jmagakGitHub Actions
and
GitHub Actions
authored
Fix inconsistencies with referencing my-rhdh-secrets (redhat-developer#918)
Co-authored-by: GitHub Actions <[email protected]>
1 parent 8f31023 commit 1d090f5

4 files changed

+10
-10
lines changed

modules/dynamic-plugins/proc-config-dynamic-plugins-rhdh-operator.adoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ You can store the configuration for dynamic plugins in a `ConfigMap` object that
1010

1111
[NOTE]
1212
====
13-
If the `pluginConfig` field references environment variables, you must define the variables in your `my-rhdh-secrets` secret.
13+
If the `pluginConfig` field references environment variables, you must define the variables in your {my-product-secrets} secret.
1414
====
1515

1616
.Procedure

modules/installation/proc-configuring-an-rhdh-instance-with-tls-in-kubernetes.adoc

+2-2
Original file line numberDiff line numberDiff line change
@@ -119,8 +119,8 @@ data:
119119
<1> The base URL to the Kubernetes control plane. You can run the `kubectl cluster-info` command to get the base URL.
120120
<2> Set the value of this parameter to `false` to enable the verification of the TLS certificate.
121121
<3> Optional: The link to the Kubernetes dashboard managing the ARO cluster.
122-
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you can define in your `my-rhdh-secrets` secret.
123-
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you can define in your `my-rhdh-secrets` secret.
122+
<4> Optional: Pass the service account token using a `K8S_SERVICE_ACCOUNT_TOKEN` environment variable that you can define in your {my-product-secrets} secret.
123+
<5> Pass the CA data using a `K8S_CONFIG_CA_DATA` environment variable that you can define in your {my-product-secrets} secret.
124124

125125
. Save the configuration changes.
126126

modules/installation/proc-deploy-rhdh-instance-gke.adoc

+4-4
Original file line numberDiff line numberDiff line change
@@ -45,16 +45,16 @@ data:
4545
----
4646
--
4747

48-
. Create a Secret named `my-rhdh-secrets` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
48+
. Create a Secret named {my-product-secret} and add a key named `BACKEND_SECRET` with a `Base64-encoded` string as value:
4949
+
5050
--
51-
.`my-rhdh-secrets` fragment
51+
.{my-product-secrets} fragment
5252
[source,yaml]
5353
----
5454
apiVersion: v1
5555
kind: Secret
5656
metadata:
57-
name: my-rhdh-secrets
57+
name: {my-product-secret}
5858
stringData:
5959
# TODO: See https://backstage.io/docs/auth/service-to-service-auth/#setup
6060
BACKEND_SECRET: "xxx"
@@ -106,7 +106,7 @@ spec:
106106
- name: "app-config-rhdh"
107107
extraEnvs:
108108
secrets:
109-
- name: "my-rhdh-secrets"
109+
- name: {my-product-secret}
110110
----
111111
--
112112

modules/installation/proc-rhdh-deploy-aks-operator.adoc

+3-3
Original file line numberDiff line numberDiff line change
@@ -114,15 +114,15 @@ data:
114114
----
115115
--
116116

117-
. Create a Secret named `my-rhdh-secrets` and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
117+
. Create a Secret named {my-product-secrets} and add a key named `BACKEND_SECRET` with a `Base64-encoded` string value as shown in the following example:
118118
+
119119
--
120120
[source,yaml]
121121
----
122122
apiVersion: v1
123123
kind: Secret
124124
metadata:
125-
name: my-rhdh-secrets
125+
name: {my-product-secret}
126126
stringData:
127127
BACKEND_SECRET: "xxx"
128128
----
@@ -146,7 +146,7 @@ spec:
146146
- name: "app-config-rhdh"
147147
extraEnvs:
148148
secrets:
149-
- name: "my-rhdh-secrets"
149+
- name: {my-product-secret}
150150
----
151151
--
152152

0 commit comments

Comments
 (0)