You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/getting-started.adoc
+10-3Lines changed: 10 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,11 +51,18 @@ For more details, see link:https://konflux-ci.dev/docs/building/creating/#with-t
51
51
52
52
After you create a component, {KonfluxName} automatically:
53
53
54
-
. **Sends a pull request** to your Git repository. This PR adds a build pipeline definition (`.tekton/` directory) that triggers on pull request and push events targeting the onboarded branch.
54
+
. **Sends a pull request** to your Git repository. This PR adds Tekton pipeline definitions (`.tekton/` directory) that trigger on pull request and push events targeting the onboarded branch. Those pipelines control the lifecycle of changes submitted to the repository.
55
55
56
-
. **Configures a default integration test pipeline.** This pipeline runs automatically after each build to evaluate the artifacts against the configured policy. The integration test definition is stored as a Custom Resource in OpenShift and is not visible in your Git repository.
56
+
. **Configures a default integration test pipeline.** This pipeline runs automatically after each build to evaluate the artifacts against the configured policy. The integration test definition is stored as a Custom Resource in {OCPShortName} and is not visible in your Git repository.
57
+
+
58
+
To view the integration test Custom Resource:
59
+
+
60
+
[source,bash]
61
+
----
62
+
oc get integrationtestscenarios -n <tenant-namespace>
63
+
----
57
64
58
-
. **Creates CI checks** on the pull request (GitHub checks or GitLab webhooks, depending on your Git provider). Two checks appear:
65
+
. **Creates CI checks** on the pull request. {KonfluxName} creates checks for both GitHub and GitLab. The difference is how the integration with {KonfluxName} is managed: for GitHub, a GitHub App is created ahead of time during installation; for GitLab, the webhook is created when the repository is onboarded. Two checks appear:
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/installing.adoc
+13-6Lines changed: 13 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,7 +21,7 @@ Start the {TSFShortName} installer container using Podman. The installer runs in
21
21
----
22
22
podman run -it --rm --env-file tsf.env \
23
23
--entrypoint bash -p 8228:8228 --pull always \
24
-
{TSFInstallerImage} --login
24
+
quay.io/redhat-ads/tsf-cli:unstable --login
25
25
----
26
26
+
27
27
This command pulls the latest installer image and opens an interactive shell session inside the container. The `--login` flag sources the shell profile, and port 8228 is exposed for the GitHub App creation workflow.
@@ -93,6 +93,8 @@ products:
93
93
94
94
NOTE: The {TSFShortName} installer assumes a fresh cluster. If other {TSFShortName}-managed operators are already installed (such as Red Hat OpenShift Pipelines or {RHTASName}), set `manageSubscription: false` for each pre-installed component to prevent conflicts.
95
95
96
+
The `tsf-config` ConfigMap in the `tsf` namespace controls which components are installed. Each component has an `enabled` flag and a `manageSubscription` property. Set `manageSubscription` to `false` for any component that is already installed on the cluster.
97
+
96
98
=== Verification
97
99
98
100
Verify that the ConfigMap was created:
@@ -104,6 +106,13 @@ oc get configmap tsf-config -n tsf
104
106
105
107
The output shows the `tsf-config` ConfigMap in the `tsf` namespace.
106
108
109
+
To view the complete ConfigMap structure:
110
+
111
+
[source,bash]
112
+
----
113
+
oc get configmap tsf-config -n tsf -o yaml
114
+
----
115
+
107
116
== Configure the GitHub integration
108
117
109
118
Create and install a GitHub App that enables {TSFShortName} to interact with your GitHub repositories. The GitHub App provides webhooks for triggering builds and access to repository contents.
@@ -175,11 +184,11 @@ If you are using GitLab instead of GitHub, configure the GitLab integration. Cre
175
184
----
176
185
oc create secret generic gitlab-auth-secret \
177
186
-n <tenant-namespace> \
178
-
--from-literal=password=<project-access-token> \
187
+
--from-literal=password="$GITLAB__TOKEN" \
179
188
--type=kubernetes.io/basic-auth
180
189
----
181
190
+
182
-
Replace `<tenant-namespace>` with your tenant namespace and `<project-access-token>` with the token you copied.
191
+
The default tenantnamespace is `default-tenant`. If multiple namespaces are used, the secret must be created in each namespace where you onboard components. For more information about tenant namespaces, see link:https://konflux-ci.dev/docs/advanced-how-tos/managing/environments/[Managing environments] in the {KonfluxName} documentation.
183
192
184
193
. Label the secret so that {KonfluxName} can discover it:
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/preparing-to-install.adoc
+43-4Lines changed: 43 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -50,18 +50,20 @@ Create a Quay organization and generate an OAuth token. The {TSFShortName} insta
50
50
51
51
Follow the Quay documentation to complete these steps:
52
52
53
-
. link:https://docs.quay.io/guides/create-org.html[Create an organization] in your Quay registry.
54
-
. link:https://docs.quay.io/api/[Create an OAuth application] within the organization and generate an access token with all permission scopes.
53
+
. link:https://docs.quay.io/glossary/organizations.html[Create an organization] in your Quay registry.
54
+
. link:https://docs.quay.io/glossary/access-token.html[Create an OAuth access token] within the organization and generate an access token with all permission scopes.
55
55
56
56
Copy the access token and save it securely. Use this token in the next step when preparing the environment file.
57
57
58
58
== Prepare the environment file
59
59
60
-
Create an environment file that contains the credentials and configuration for your {OCPShortName} cluster, GitHub organization, and Quay registry. The {TSFShortName} installer reads this file to configure all integrations.
60
+
Create an environment file that contains the credentials and configuration for your {OCPShortName} cluster, Git provider, and Quay registry. The {TSFShortName} installer reads this file to configure all integrations.
61
61
62
62
=== Steps
63
63
64
-
. Create a file named `tsf.env` in your working directory with the following content:
64
+
. Create a file named `tsf.env` in your working directory. Include the variables for your Git provider (GitHub or GitLab), along with the {OCPShortName} and Quay variables.
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/verifying-and-accessing.adoc
-9Lines changed: 0 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -90,15 +90,6 @@ The installer also creates the following supporting namespaces:
90
90
* `rhbk-operator`
91
91
* `rhtpa-operator`
92
92
93
-
The `tsf-config` ConfigMap in the `tsf` namespace controls which components are installed. Each component has an `enabled` flag and a `manageSubscription` property. Set `manageSubscription` to `false` for any component that is already installed on the cluster.
94
-
95
-
To view the complete ConfigMap structure:
96
-
97
-
[source,bash]
98
-
----
99
-
oc get configmap tsf-config -n tsf -o yaml
100
-
----
101
-
102
93
== Next step
103
94
104
95
Proceed to xref:getting-started.adoc[Getting started with {TSFShortName}] to onboard your first application.
0 commit comments