diff --git a/.tekton/controller-rhel9-operator-on-pull-request-1-4.yaml b/.tekton/controller-rhel9-operator-on-pull-request-1-4.yaml index b6bd210d..107a616d 100644 --- a/.tekton/controller-rhel9-operator-on-pull-request-1-4.yaml +++ b/.tekton/controller-rhel9-operator-on-pull-request-1-4.yaml @@ -2,7 +2,7 @@ apiVersion: tekton.dev/v1 kind: PipelineRun metadata: annotations: - build.appstudio.openshift.io/repo: https://github.com/parodos-dev/orchestrator-helm-operator?rev={{revision}} + build.appstudio.openshift.io/repo: https://github.com/rhdhorchestrator/orchestrator-helm-operator?rev={{revision}} build.appstudio.redhat.com/commit_sha: '{{revision}}' build.appstudio.redhat.com/pull_request_number: '{{pull_request_number}}' build.appstudio.redhat.com/target_branch: '{{target_branch}}' diff --git a/.tekton/controller-rhel9-operator-on-push-1-4.yaml b/.tekton/controller-rhel9-operator-on-push-1-4.yaml index 66cd1147..ffb78c49 100644 --- a/.tekton/controller-rhel9-operator-on-push-1-4.yaml +++ b/.tekton/controller-rhel9-operator-on-push-1-4.yaml @@ -2,7 +2,7 @@ apiVersion: tekton.dev/v1 kind: PipelineRun metadata: annotations: - build.appstudio.openshift.io/repo: https://github.com/parodos-dev/orchestrator-helm-operator?rev={{revision}} + build.appstudio.openshift.io/repo: https://github.com/rhdhorchestrator/orchestrator-helm-operator?rev={{revision}} build.appstudio.redhat.com/commit_sha: '{{revision}}' build.appstudio.redhat.com/target_branch: '{{target_branch}}' pipelinesascode.tekton.dev/max-keep-runs: "3" diff --git a/.tekton/orchestrator-operator-bundle-on-pull-request-1-4.yaml b/.tekton/orchestrator-operator-bundle-on-pull-request-1-4.yaml index e1d7020b..1e86aff0 100644 --- a/.tekton/orchestrator-operator-bundle-on-pull-request-1-4.yaml +++ b/.tekton/orchestrator-operator-bundle-on-pull-request-1-4.yaml @@ -2,7 +2,7 @@ apiVersion: tekton.dev/v1 kind: PipelineRun metadata: annotations: - build.appstudio.openshift.io/repo: https://github.com/parodos-dev/orchestrator-helm-operator?rev={{revision}} + build.appstudio.openshift.io/repo: https://github.com/rhdhorchestrator/orchestrator-helm-operator?rev={{revision}} build.appstudio.redhat.com/commit_sha: '{{revision}}' build.appstudio.redhat.com/pull_request_number: '{{pull_request_number}}' build.appstudio.redhat.com/target_branch: '{{target_branch}}' diff --git a/.tekton/orchestrator-operator-bundle-on-push-1-4.yaml b/.tekton/orchestrator-operator-bundle-on-push-1-4.yaml index 21590195..6bf5b0a9 100644 --- a/.tekton/orchestrator-operator-bundle-on-push-1-4.yaml +++ b/.tekton/orchestrator-operator-bundle-on-push-1-4.yaml @@ -2,7 +2,7 @@ apiVersion: tekton.dev/v1 kind: PipelineRun metadata: annotations: - build.appstudio.openshift.io/repo: https://github.com/parodos-dev/orchestrator-helm-operator?rev={{revision}} + build.appstudio.openshift.io/repo: https://github.com/rhdhorchestrator/orchestrator-helm-operator?rev={{revision}} build.appstudio.redhat.com/commit_sha: '{{revision}}' build.appstudio.redhat.com/target_branch: '{{target_branch}}' pipelinesascode.tekton.dev/max-keep-runs: "3" diff --git a/Dockerfile b/Dockerfile index 5d5475f1..dc30223b 100644 --- a/Dockerfile +++ b/Dockerfile @@ -8,7 +8,7 @@ LABEL name="rhdh-orchestrator-helm-operator-bundle" LABEL release="1.3.0" LABEL version="1.3.0" LABEL maintainer="Red Hat jgil@redhat.com" -LABEL url="https://github.com/parodos-dev/orchestrator-helm-operator" +LABEL url="https://github.com/rhdhorchestrator/orchestrator-helm-operator" LABEL vendor="Red Hat, Inc." LABEL description="RHDH Orchestrator introduces serverless asynchronous workflows to Backstage, \ with a focus on facilitating the transition of applications to the cloud, \ diff --git a/README.md b/README.md index 98ab9fdf..6c5e2789 100644 --- a/README.md +++ b/README.md @@ -2,7 +2,7 @@ Meta Operator for deploying the Orchestrator helm charts # Installing the operator -Please visit the [README.md](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/README.md) page and follow the guide to install the operator in your cluster. +Please visit the [README.md](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/README.md) page and follow the guide to install the operator in your cluster. ## Releasing the operator @@ -12,7 +12,7 @@ Follow these steps to release a new version of the operator: 1. Pull a fresh copy of the repository. Alternatively pull the latest from main on your existing repository and ensure that the HEAD matches the upstream's HEAD commit hash. 1. Create a new branch, example `release/1.2.0-rc7`. -1. Update the Makefile to increment the z-stream value by 1 and commit the change to the Makefile as `Release 1.2.0-rc8"`. Example commit: https://github.com/parodos-dev/orchestrator-helm-operator/commit/0bcedf59d03dd0ace380c342ebdb0187d82ad8d6 +1. Update the Makefile to increment the z-stream value by 1 and commit the change to the Makefile as `Release 1.2.0-rc8"`. Example commit: https://github.com/rhdhorchestrator/orchestrator-helm-operator/commit/0bcedf59d03dd0ace380c342ebdb0187d82ad8d6 1. Push the commit. 1. Create a new PR against main, unless the changes are targeting a specific release. 1. Get the PR reviewed by the owner of the changes to the chart or by another team member. Two more pair of eyes are always welcome for these kind of things. diff --git a/bundle.konflux.Dockerfile b/bundle.konflux.Dockerfile index 80ec8715..349bf4fe 100644 --- a/bundle.konflux.Dockerfile +++ b/bundle.konflux.Dockerfile @@ -21,7 +21,7 @@ LABEL name="rhdh-orchestrator-helm-operator-bundle" LABEL release="1.3.0" LABEL version="1.3.0" LABEL maintainer="Red Hat jgil@redhat.com" -LABEL url="https://github.com/parodos-dev/orchestrator-helm-operator" +LABEL url="https://github.com/rhdhorchestrator/orchestrator-helm-operator" LABEL vendor="Red Hat, Inc." LABEL description="RHDH Orchestrator introduces serverless asynchronous workflows to Backstage, \ with a focus on facilitating the transition of applications to the cloud, \ diff --git a/bundle/manifests/orchestrator-operator.clusterserviceversion.yaml b/bundle/manifests/orchestrator-operator.clusterserviceversion.yaml index c52524b1..43decd12 100644 --- a/bundle/manifests/orchestrator-operator.clusterserviceversion.yaml +++ b/bundle/manifests/orchestrator-operator.clusterserviceversion.yaml @@ -163,7 +163,7 @@ metadata: operators.openshift.io/valid-subscription: '["Red Hat Developer Hub"]' operators.operatorframework.io/builder: operator-sdk-v1.35.0 operators.operatorframework.io/project_layout: helm.sdk.operatorframework.io/v1 - repository: https://github.com/parodos-dev/orchestrator-helm-operator + repository: https://github.com/rhdhorchestrator/orchestrator-helm-operator labels: operatorframework.io/arch.amd64: supported operatorframework.io/arch.arm64: unsupported @@ -176,7 +176,7 @@ spec: apiservicedefinitions: {} customresourcedefinitions: owned: - - description: Parodos introduces serverless asynchronous workflows to Backstage, + - description: RHDH Orchestrator introduces serverless asynchronous workflows to Backstage, with a focus on facilitating the transition of applications to the cloud, onboarding developers, and enabling users to create workflows for backstage actions or external systems. @@ -190,7 +190,7 @@ spec: ## More Information * [Red Hat Developer Hub Product Page](https://www.redhat.com/en/technologies/cloud-computing/developer-hub) - * [Product Documentation](https://parodos.dev) + * [Product Documentation](https://rhdhorchestrator.io) displayName: Orchestrator Operator icon: - base64data: <?xml version="1.0" encoding="UTF-8"?><svg id="uuid-a0af9d88-570b-4d47-89d8-8cae4ba927a2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 38 38"><title>orchestrator icon</title>
<desc>Cloud</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-07-08T20:57:59.865Z</xmp:rhcc-effective-on>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA879805d8-3dfb-4e38-9755-c5ce9672298f</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-07-08T20:57:59.865Z</xmp:CreateDate>
         <xmp:rhcc-derivative-id>DER879805d8-3dfb-4e38-9755-c5ce9672298f</xmp:rhcc-derivative-id>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-08T20:58:09.938Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-developer-hub</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-07-08T20:59:22.889Z</dc:modified>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud</rdf:li>
            </rdf:Alt>
         </dc:description>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">orchestrator icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
               
<?xpacket end="w"?></metadata>
<defs><style>.uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f{fill:#e0e0e0;}.uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f,.uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689,.uuid-d738c91c-91b5-4858-81da-12f062cd5904,.uuid-02ece680-d95c-45cd-b847-1f40dfea8911{stroke-width:0px;}.uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689{fill:#000;}.uuid-d738c91c-91b5-4858-81da-12f062cd5904{fill:#e00;}.uuid-02ece680-d95c-45cd-b847-1f40dfea8911{fill:#fff;}</style></defs><rect class="uuid-02ece680-d95c-45cd-b847-1f40dfea8911" x="1" y="1" width="36" height="36" rx="9" ry="9"/><path class="uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f" d="M28,2.25c4.2734,0,7.75,3.4766,7.75,7.75v18c0,4.2734-3.4766,7.75-7.75,7.75H10c-4.2734,0-7.75-3.4766-7.75-7.75V10c0-4.2734,3.4766-7.75,7.75-7.75h18M28,1H10C5.0294,1,1,5.0294,1,10v18c0,4.9706,4.0294,9,9,9h18c4.9706,0,9-4.0294,9-9V10c0-4.9706-4.0294-9-9-9h0Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M14,9.375h-4c-.3447,0-.625.2798-.625.625v4c0,.3452.2803.625.625.625h4c.3447,0,.625-.2798.625-.625v-4c0-.3452-.2803-.625-.625-.625ZM13.375,13.375h-2.75v-2.75h2.75v2.75Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M27,22.6196c.1699,0,.3301-.0596.4395-.1797.1201-.1104.1904-.2803.1904-.4399,0-.0801-.0205-.1602-.0498-.2402-.0303-.0698-.0801-.1401-.1406-.1997-.2295-.2305-.6494-.2305-.8799,0-.1201.1099-.1797.2695-.1797.4399,0,.1699.0596.3296.1797.4399.1201.1201.2803.1797.4404.1797Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M25,22.6196c.1699,0,.3301-.0596.4395-.1797.1201-.1104.1904-.2803.1904-.4399,0-.0801-.0205-.1602-.0498-.2402-.0303-.0698-.0801-.1401-.1406-.1997-.0498-.0601-.1299-.1104-.1992-.1401-.2305-.0903-.5107-.04-.6807.1401-.0596.0596-.1094.1299-.1396.1997-.0303.0801-.0498.1602-.0498.2402,0,.1597.0693.3296.1895.4399.1104.1201.2803.1797.4404.1797Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M29,19.375h-8c-.3447,0-.625.2798-.625.625v8c0,.3452.2803.625.625.625h8c.3447,0,.625-.2798.625-.625v-8c0-.3452-.2803-.625-.625-.625ZM28.375,27.375h-6.75v-6.75h6.75v6.75Z"/><path class="uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689" d="M21.5,11.375h-5.5c-.3447,0-.625.2798-.625.625s.2803.625.625.625h5.5c1.0342,0,1.875.8413,1.875,1.875s-.8408,1.875-1.875,1.875h-2.875v-.375c0-.2529-.1523-.4805-.3857-.5776-.2314-.0952-.502-.0439-.6816.1357l-1,1c-.0129.0129-.0175.03-.0289.0438-.0412.0488-.0806.0994-.1054.1592-.0276.067-.039.1382-.0424.2096-.0005.0103-.0059.0189-.0059.0293,0,.0104.0055.0192.006.0295.0034.0713.0147.1423.0423.2094.0249.0601.0644.111.1058.16.0114.0135.0158.0304.0285.0431l1,1c.1201.1196.2803.1831.4424.1831.0811,0,.1621-.0156.2393-.0474.2334-.0972.3857-.3247.3857-.5776v-.375h2.875c1.7227,0,3.125-1.4019,3.125-3.125s-1.4023-3.125-3.125-3.125Z"/><path class="uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689" d="M17.4424,20.5581c-.2441-.2441-.6406-.2441-.8848,0-.2432.2441-.2432.6396,0,.8838l.9334.9331h-3.491c-1.3096,0-2.375-1.0654-2.375-2.375s1.0654-2.375,2.375-2.375h1c.3447,0,.625-.2798.625-.625s-.2803-.625-.625-.625h-1c-1.999,0-3.625,1.626-3.625,3.625s1.626,3.625,3.625,3.625h3.491l-.9334.9331c-.2432.2441-.2432.6396,0,.8838.1221.1221.2822.1831.4424.1831s.3203-.061.4424-.1831l2-2c.2432-.2441.2432-.6396,0-.8838l-2-2Z"/></svg> @@ -555,7 +555,7 @@ spec: - Backstage links: - name: Orchestrator Operator - url: https://github.com/parodos-dev/orchestrator-helm-operator + url: https://github.com/rhdhorchestrator/orchestrator-helm-operator maintainers: - email: jgil@redhat.com name: Red Hat diff --git a/config/manifests/bases/orchestrator-operator.clusterserviceversion.yaml b/config/manifests/bases/orchestrator-operator.clusterserviceversion.yaml index 062438b4..634c8bb8 100644 --- a/config/manifests/bases/orchestrator-operator.clusterserviceversion.yaml +++ b/config/manifests/bases/orchestrator-operator.clusterserviceversion.yaml @@ -20,7 +20,7 @@ metadata: managed resources (operands). To prevent data loss or disruption, you'll need to manually delete them. operators.openshift.io/valid-subscription: '["Red Hat Developer Hub"]' - repository: https://github.com/parodos-dev/orchestrator-helm-operator + repository: https://github.com/rhdhorchestrator/orchestrator-helm-operator labels: operatorframework.io/arch.amd64: supported operatorframework.io/arch.arm64: unsupported @@ -33,7 +33,7 @@ spec: apiservicedefinitions: {} customresourcedefinitions: owned: - - description: Parodos introduces serverless asynchronous workflows to Backstage, + - description: RHDH Orchestrator introduces serverless asynchronous workflows to Backstage, with a focus on facilitating the transition of applications to the cloud, onboarding developers, and enabling users to create workflows for backstage actions or external systems. @@ -47,7 +47,7 @@ spec: ## More Information * [Red Hat Developer Hub Product Page](https://www.redhat.com/en/technologies/cloud-computing/developer-hub) - * [Product Documentation](https://parodos.dev) + * [Product Documentation](https://rhdhorchestrator.io) displayName: Orchestrator Operator icon: - base64data: <?xml version="1.0" encoding="UTF-8"?><svg id="uuid-a0af9d88-570b-4d47-89d8-8cae4ba927a2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 38 38"><title>orchestrator icon</title>
<desc>Cloud</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-07-08T20:57:59.865Z</xmp:rhcc-effective-on>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA879805d8-3dfb-4e38-9755-c5ce9672298f</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-07-08T20:57:59.865Z</xmp:CreateDate>
         <xmp:rhcc-derivative-id>DER879805d8-3dfb-4e38-9755-c5ce9672298f</xmp:rhcc-derivative-id>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-08T20:58:09.938Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-developer-hub</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-07-08T20:59:22.889Z</dc:modified>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud</rdf:li>
            </rdf:Alt>
         </dc:description>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">orchestrator icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
               
<?xpacket end="w"?></metadata>
<defs><style>.uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f{fill:#e0e0e0;}.uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f,.uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689,.uuid-d738c91c-91b5-4858-81da-12f062cd5904,.uuid-02ece680-d95c-45cd-b847-1f40dfea8911{stroke-width:0px;}.uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689{fill:#000;}.uuid-d738c91c-91b5-4858-81da-12f062cd5904{fill:#e00;}.uuid-02ece680-d95c-45cd-b847-1f40dfea8911{fill:#fff;}</style></defs><rect class="uuid-02ece680-d95c-45cd-b847-1f40dfea8911" x="1" y="1" width="36" height="36" rx="9" ry="9"/><path class="uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f" d="M28,2.25c4.2734,0,7.75,3.4766,7.75,7.75v18c0,4.2734-3.4766,7.75-7.75,7.75H10c-4.2734,0-7.75-3.4766-7.75-7.75V10c0-4.2734,3.4766-7.75,7.75-7.75h18M28,1H10C5.0294,1,1,5.0294,1,10v18c0,4.9706,4.0294,9,9,9h18c4.9706,0,9-4.0294,9-9V10c0-4.9706-4.0294-9-9-9h0Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M14,9.375h-4c-.3447,0-.625.2798-.625.625v4c0,.3452.2803.625.625.625h4c.3447,0,.625-.2798.625-.625v-4c0-.3452-.2803-.625-.625-.625ZM13.375,13.375h-2.75v-2.75h2.75v2.75Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M27,22.6196c.1699,0,.3301-.0596.4395-.1797.1201-.1104.1904-.2803.1904-.4399,0-.0801-.0205-.1602-.0498-.2402-.0303-.0698-.0801-.1401-.1406-.1997-.2295-.2305-.6494-.2305-.8799,0-.1201.1099-.1797.2695-.1797.4399,0,.1699.0596.3296.1797.4399.1201.1201.2803.1797.4404.1797Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M25,22.6196c.1699,0,.3301-.0596.4395-.1797.1201-.1104.1904-.2803.1904-.4399,0-.0801-.0205-.1602-.0498-.2402-.0303-.0698-.0801-.1401-.1406-.1997-.0498-.0601-.1299-.1104-.1992-.1401-.2305-.0903-.5107-.04-.6807.1401-.0596.0596-.1094.1299-.1396.1997-.0303.0801-.0498.1602-.0498.2402,0,.1597.0693.3296.1895.4399.1104.1201.2803.1797.4404.1797Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M29,19.375h-8c-.3447,0-.625.2798-.625.625v8c0,.3452.2803.625.625.625h8c.3447,0,.625-.2798.625-.625v-8c0-.3452-.2803-.625-.625-.625ZM28.375,27.375h-6.75v-6.75h6.75v6.75Z"/><path class="uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689" d="M21.5,11.375h-5.5c-.3447,0-.625.2798-.625.625s.2803.625.625.625h5.5c1.0342,0,1.875.8413,1.875,1.875s-.8408,1.875-1.875,1.875h-2.875v-.375c0-.2529-.1523-.4805-.3857-.5776-.2314-.0952-.502-.0439-.6816.1357l-1,1c-.0129.0129-.0175.03-.0289.0438-.0412.0488-.0806.0994-.1054.1592-.0276.067-.039.1382-.0424.2096-.0005.0103-.0059.0189-.0059.0293,0,.0104.0055.0192.006.0295.0034.0713.0147.1423.0423.2094.0249.0601.0644.111.1058.16.0114.0135.0158.0304.0285.0431l1,1c.1201.1196.2803.1831.4424.1831.0811,0,.1621-.0156.2393-.0474.2334-.0972.3857-.3247.3857-.5776v-.375h2.875c1.7227,0,3.125-1.4019,3.125-3.125s-1.4023-3.125-3.125-3.125Z"/><path class="uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689" d="M17.4424,20.5581c-.2441-.2441-.6406-.2441-.8848,0-.2432.2441-.2432.6396,0,.8838l.9334.9331h-3.491c-1.3096,0-2.375-1.0654-2.375-2.375s1.0654-2.375,2.375-2.375h1c.3447,0,.625-.2798.625-.625s-.2803-.625-.625-.625h-1c-1.999,0-3.625,1.626-3.625,3.625s1.626,3.625,3.625,3.625h3.491l-.9334.9331c-.2432.2441-.2432.6396,0,.8838.1221.1221.2822.1831.4424.1831s.3203-.061.4424-.1831l2-2c.2432-.2441.2432-.6396,0-.8838l-2-2Z"/></svg> @@ -71,7 +71,7 @@ spec: - Backstage links: - name: Orchestrator Operator - url: https://github.com/parodos-dev/orchestrator-helm-operator + url: https://github.com/rhdhorchestrator/orchestrator-helm-operator maintainers: - email: jgil@redhat.com name: Red Hat diff --git a/docs/README.md b/docs/README.md index f6c9c508..8d5e5a97 100644 --- a/docs/README.md +++ b/docs/README.md @@ -1,6 +1,6 @@ # Orchestrator Operator Documentation -Welcome to the **Orchestrator Operator Documentation**. This folder contains supplemental information and resources related to the Orchestrator operator project. For the complete and official documentation, please visit the [Orchestrator Documentation](https://www.parodos.dev/). +Welcome to the **Orchestrator Operator Documentation**. This folder contains supplemental information and resources related to the Orchestrator operator project. For the complete and official documentation, please visit the [Orchestrator Documentation](https://www.rhdhorchestrator.io/). ## Overview @@ -20,5 +20,5 @@ The **Orchestrator** project facilitates the automation of complex workflows acr ## Additional Resources -- For the official and comprehensive documentation, please refer to the [Orchestrator Official Documentation](https://www.parodos.dev/). -- If you encounter any issues or need further assistance, please open an issue on our [GitHub Issues](https://github.com/parodos-dev/orchestrator-helm-operator/issues) page. +- For the official and comprehensive documentation, please refer to the [Orchestrator Official Documentation](https://www.rhdhorchestrator.io/). +- If you encounter any issues or need further assistance, please open an issue on our [GitHub Issues](https://github.com/rhdhorchestrator/orchestrator-helm-operator/issues) page. diff --git a/docs/gitops/README.md b/docs/gitops/README.md index 90e743e7..bbd39608 100644 --- a/docs/gitops/README.md +++ b/docs/gitops/README.md @@ -61,7 +61,7 @@ To install the OpenShift GitOps Operator with custom configuration: ```bash oc new-project orchestrator-gitops - oc apply -f https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/main/docs/gitops/resources/argocd-example.yaml + oc apply -f https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/main/docs/gitops/resources/argocd-example.yaml ``` Alternatively, if creating a default ArgoCD instance, ensure to exclude Tekton resources from its specification: @@ -92,7 +92,7 @@ There is a need to create a single K8s secret combined with the following secret 1. A secret for Quay.io organization to push the images built by the pipeline: - Create or edit a [Robot account](https://access.redhat.com/documentation/en-us/red_hat_quay/3.3/html/use_red_hat_quay/use-quay-manage-repo) and grant it `Write` permissions to the newly created repository - Download the credentials as Kubernetes secret. -2. A secret for _registry.redhat.io_. To build workflow images, the pipeline uses the [builder image](https://github.com/parodos-dev/serverless-workflows/blob/main/pipeline/workflow-builder.Dockerfile) from [registry.redhat.io](https://registry.redhat.io). +2. A secret for _registry.redhat.io_. To build workflow images, the pipeline uses the [builder image](https://github.com/rhdhorchestrator/serverless-workflows/blob/main/pipeline/workflow-builder.Dockerfile) from [registry.redhat.io](https://registry.redhat.io). - Generate a token [here](https://access.redhat.com/terms-based-registry/create), and download it as OCP secret. Those two K8s secrets should be merged into a single secret named `docker-credentials` in `orchestrator-gitops` namespace in the cluster that runs the pipelines. diff --git a/docs/konflux/release_operator_with_konflux.md b/docs/konflux/release_operator_with_konflux.md index 3f954e7c..0903e267 100644 --- a/docs/konflux/release_operator_with_konflux.md +++ b/docs/konflux/release_operator_with_konflux.md @@ -23,7 +23,7 @@ This document is aimed for those who need to release a new version of the Orches For further reading on Konflux, visit their [documentation website](https://konflux-ci.dev/docs/advanced-how-tos/releasing/) to get acquainted with it and understand the release process as described in it. ## Prerequisites: -To be able to release the operator, you will need first to have access to the orchestrator-releng workspace in konflux via the [Red Hat Console](https://console.redhat.com/application-pipeline/workspaces/orchestrator-releng/applications). If you don't, please reach out to @jordigilh, @masayag, @rgolangh or @pkliczewski to request access. You'll also need to be able to create PRs to the [orchestrator-helm-operator](https://github.com/parodos-dev/orchestrator-helm-operator) and [orchestrator-fbc](https://github.com/parodos-dev/orchestrator-fbc) repositories. +To be able to release the operator, you will need first to have access to the orchestrator-releng workspace in konflux via the [Red Hat Console](https://console.redhat.com/application-pipeline/workspaces/orchestrator-releng/applications). If you don't, please reach out to @jordigilh, @masayag, @rgolangh or @pkliczewski to request access. You'll also need to be able to create PRs to the [orchestrator-helm-operator](https://github.com/rhdhorchestrator/orchestrator-helm-operator) and [orchestrator-fbc](https://github.com/rhdhorchestrator/orchestrator-fbc) repositories. Accessing the Konflux cluster via oc CLI requires an auth token from the OCP. Once you've been added to the `orchestrator-releng` workspace, head to [this URL](https://oauth-openshift.apps.stone-prd-rh01.pg1f.p1.openshiftapps.com/oauth/token/request) to obtain a new token and login to the Konflux cluster. @@ -50,26 +50,26 @@ oc get snapshots --sort-by .metadata.creationTimestamp -l pac.test.appstudio.ope Example: ```console -helm-operator-v2wsd False Merge pull request #170 from parodos-dev/appstudio-orchestrator-operator-bundle +helm-operator-v2wsd False Merge pull request #170 from rhdhorchestrator/appstudio-orchestrator-operator-bundle helm-operator-hds86 False Merge pull request #173 from jordigilh/migrate/doc_from_helm_charts -helm-operator-gsbw7 False Merge pull request #176 from parodos-dev/konflux-purge-operator-controller -helm-operator-2t79j False Merge pull request #177 from parodos-dev/konflux-purge-operator-bundle -helm-operator-rtrjw False Merge pull request #183 from parodos-dev/appstudio-controller-rhel9-operator -helm-operator-kbzh5 False Merge pull request #182 from parodos-dev/appstudio-orchestrator-operator-bundle +helm-operator-gsbw7 False Merge pull request #176 from rhdhorchestrator/konflux-purge-operator-controller +helm-operator-2t79j False Merge pull request #177 from rhdhorchestrator/konflux-purge-operator-bundle +helm-operator-rtrjw False Merge pull request #183 from rhdhorchestrator/appstudio-controller-rhel9-operator +helm-operator-kbzh5 False Merge pull request #182 from rhdhorchestrator/appstudio-orchestrator-operator-bundle helm-operator-kr8xs False Merge pull request #178 from jordigilh/konflux/use_comet_image_names_in_tekton -helm-operator-kpxfn False Merge pull request #184 from parodos-dev/konflux/references/main -helm-operator-pddv7 False Merge pull request #191 from parodos-dev/appstudio-controller-rhel9-operator -helm-operator-lbsdg False Merge pull request #189 from parodos-dev/appstudio-orchestrator-operator-bundle +helm-operator-kpxfn False Merge pull request #184 from rhdhorchestrator/konflux/references/main +helm-operator-pddv7 False Merge pull request #191 from rhdhorchestrator/appstudio-controller-rhel9-operator +helm-operator-lbsdg False Merge pull request #189 from rhdhorchestrator/appstudio-orchestrator-operator-bundle helm-operator-m4bkb False Merge pull request #187 from jordigilh/konflux/fix_build_attestation helm-operator-z26kc True Merge pull request #194 from jordigilh/release/1.2.0-rc11 -helm-operator-6mhqg True Merge pull request #195 from parodos-dev/konflux/component-updates/controller-rhel9-operator -helm-operator-f949l True Merge pull request #196 from parodos-dev/konflux/references/main +helm-operator-6mhqg True Merge pull request #195 from rhdhorchestrator/konflux/component-updates/controller-rhel9-operator +helm-operator-f949l True Merge pull request #196 from rhdhorchestrator/konflux/references/main helm-operator-zpds7 True Merge pull request #197 from jordigilh/konflux/add_label_controller_pullspec_to_bundle_dockerfile ``` -If you're releasing from a controller's update nudge, which is the most probable case, check the last snapshot that has passed the integration tests and has a remote branch that looks like this `parodos-dev/konflux/component-updates/controller-rhel9-operator`, like this entry: +If you're releasing from a controller's update nudge, which is the most probable case, check the last snapshot that has passed the integration tests and has a remote branch that looks like this `rhdhorchestrator/konflux/component-updates/controller-rhel9-operator`, like this entry: ```console -helm-operator-6mhqg True Merge pull request #195 from parodos-dev/konflux/component-updates/controller-rhel9-operator +helm-operator-6mhqg True Merge pull request #195 from rhdhorchestrator/konflux/component-updates/controller-rhel9-operator ``` * Ensure that the bundle's controller pullspec matches the one in the snapshot. @@ -129,11 +129,11 @@ Note, if you haven't yet released the operator in production, you'll need to fol * Clone the orchestrator-fbc repository: ```console -git clone https://github.com/parodos-dev/orchestrator-fbc.git +git clone https://github.com/rhdhorchestrator/orchestrator-fbc.git ``` * Update the `graph.stage.yaml` file for the OCP version following the FBC documentation to ensure that each each version published has an upgrade path. Check [this page](https://docs.openshift.com/container-platform/4.17/extensions/catalogs/fbc.html#olm-channel-schema_fbc) to understand the different options when updating the fragment. - The most common case is when updating the [z-stream version](https://github.com/parodos-dev/orchestrator-fbc/pull/92), in which case you will have to amend the original fragment (graph.stage.yaml) and define the linkage between releases, so that the newest one is marked as a replacement to the previous one, and so on. So if we wanted to add the new release as `1.2.0-rc11` to the current graph.stage.yaml, we'd be adding a value in the `entries:` section, and another pair for the `image` and `schema` with the pullspec of the bundle. Note that you should have the digest of the bundle image in `$bundlePullSpec`. + The most common case is when updating the [z-stream version](https://github.com/rhdhorchestrator/orchestrator-fbc/pull/92), in which case you will have to amend the original fragment (graph.stage.yaml) and define the linkage between releases, so that the newest one is marked as a replacement to the previous one, and so on. So if we wanted to add the new release as `1.2.0-rc11` to the current graph.stage.yaml, we'd be adding a value in the `entries:` section, and another pair for the `image` and `schema` with the pullspec of the bundle. Note that you should have the digest of the bundle image in `$bundlePullSpec`. ```console --- @@ -190,10 +190,10 @@ schema: olm.bundle ... ... fbc-v4-14-5p7m9 True Merge pull request #81 from jordigilh/release/1.2.0-rc6 - fbc-v4-14-jv6f8 True Merge pull request #83 from parodos-dev/konflux/references/main - fbc-v4-14-dhxqb True Merge pull request #82 from parodos-dev/konflux/component-updates/operator-bundle - fbc-v4-14-bdx8p True Merge pull request #85 from parodos-dev/konflux/component-updates/operator-bundle - fbc-v4-14-hftq5 True Merge pull request #84 from parodos-dev/konflux/references/main + fbc-v4-14-jv6f8 True Merge pull request #83 from rhdhorchestrator/konflux/references/main + fbc-v4-14-dhxqb True Merge pull request #82 from rhdhorchestrator/konflux/component-updates/operator-bundle + fbc-v4-14-bdx8p True Merge pull request #85 from rhdhorchestrator/konflux/component-updates/operator-bundle + fbc-v4-14-hftq5 True Merge pull request #84 from rhdhorchestrator/konflux/references/main fbc-v4-14-g6b2z True Merge pull request #86 from jordigilh/release/1.2.0-rc9 fbc-v4-14-kttjb True Merge pull request #87 from jordigilh/release/ocp_4.14_rc9 fbc-v4-14-mcncx True Merge pull request #88 from jordigilh/release/orchestrator-rc9_ocp_prod @@ -396,10 +396,10 @@ schema: olm.bundle ... ... fbc-v4-14-5p7m9 True Merge pull request #81 from jordigilh/release/1.2.0-rc6 - fbc-v4-14-jv6f8 True Merge pull request #83 from parodos-dev/konflux/references/main - fbc-v4-14-dhxqb True Merge pull request #82 from parodos-dev/konflux/component-updates/operator-bundle - fbc-v4-14-bdx8p True Merge pull request #85 from parodos-dev/konflux/component-updates/operator-bundle - fbc-v4-14-hftq5 True Merge pull request #84 from parodos-dev/konflux/references/main + fbc-v4-14-jv6f8 True Merge pull request #83 from rhdhorchestrator/konflux/references/main + fbc-v4-14-dhxqb True Merge pull request #82 from rhdhorchestrator/konflux/component-updates/operator-bundle + fbc-v4-14-bdx8p True Merge pull request #85 from rhdhorchestrator/konflux/component-updates/operator-bundle + fbc-v4-14-hftq5 True Merge pull request #84 from rhdhorchestrator/konflux/references/main fbc-v4-14-g6b2z True Merge pull request #86 from jordigilh/release/1.2.0-rc9 fbc-v4-14-kttjb True Merge pull request #87 from jordigilh/release/ocp_4.14_rc9 fbc-v4-14-mcncx True Merge pull request #88 from jordigilh/release/orchestrator-rc9_ocp_prod @@ -501,7 +501,7 @@ Results: ### Unable to pull images from staging environment -The images have a default pullspec [reference](https://github.com/parodos-dev/orchestrator-helm-operator/blob/9e2371748bfbe899f945e9a5655622483504e660/bundle.konflux.Dockerfile#L12) that points to the production registry. When deploying from the staging IIB catalog, the cluster will try to pull the images from the production registry as defined in the spec and fail. To fix this issue, the cluster has to be configured so that it is aware of registry mirrors for specific image pullspecs. Configure your cluster by deploying this [manifest](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/konflux/imagedigestmirrorset.yaml) that will instruct the cluster to fallback to the staging registry when the images are not in production. +The images have a default pullspec [reference](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/9e2371748bfbe899f945e9a5655622483504e660/bundle.konflux.Dockerfile#L12) that points to the production registry. When deploying from the staging IIB catalog, the cluster will try to pull the images from the production registry as defined in the spec and fail. To fix this issue, the cluster has to be configured so that it is aware of registry mirrors for specific image pullspecs. Configure your cluster by deploying this [manifest](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/konflux/imagedigestmirrorset.yaml) that will instruct the cluster to fallback to the staging registry when the images are not in production. ## Command tips diff --git a/docs/main/README.md b/docs/main/README.md index 1b4d2ea6..1f4a36b0 100644 --- a/docs/main/README.md +++ b/docs/main/README.md @@ -1,6 +1,6 @@ # Orchestrator Documentation -For comprehensive documentation on the Orchestrator, please visit [https://www.parodos.dev](https://www.parodos.dev). +For comprehensive documentation on the Orchestrator, please visit [https://www.rhdhorchestrator.io](https://www.rhdhorchestrator.io). ## Installing the Orchestrator Helm Operator @@ -39,25 +39,25 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL ### Deployment with GitOps - If you plan to deploy in a GitOps environment, make sure you have installed the `ArgoCD/Red Hat OpenShift GitOps` and the `Tekton/Red Hat Openshift Pipelines Install` operators following these [instructions](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/gitops/README.md). + If you plan to deploy in a GitOps environment, make sure you have installed the `ArgoCD/Red Hat OpenShift GitOps` and the `Tekton/Red Hat Openshift Pipelines Install` operators following these [instructions](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/gitops/README.md). The Orchestrator installs RHDH and imports software templates designed for bootstrapping workflow development. These templates are crafted to ease the development lifecycle, including a Tekton pipeline to build workflow images and generate workflow K8s custom resources. Furthermore, ArgoCD is utilized to monitor any changes made to the workflow repository and to automatically trigger the Tekton pipelines as needed. - `ArgoCD/OpenShift GitOps` operator - - Ensure at least one instance of `ArgoCD` exists in the designated namespace (referenced by `ARGOCD_NAMESPACE` environment variable). Example [here](https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/main/docs/gitops/resources/argocd-example.yaml) + - Ensure at least one instance of `ArgoCD` exists in the designated namespace (referenced by `ARGOCD_NAMESPACE` environment variable). Example [here](https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/main/docs/gitops/resources/argocd-example.yaml) - Validated API is `argoproj.io/v1alpha1/AppProject` - `Tekton/OpenShift Pipelines` operator - Validated APIs are `tekton.dev/v1beta1/Task` and `tekton.dev/v1/Pipeline` - Requires ArgoCD installed since the manifests are deployed in the same namespace as the ArgoCD instance. - Remember to enable [argocd](https://github.com/parodos-dev/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L451) and [tekton](https://github.com/parodos-dev/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L443) in your CR instance. + Remember to enable [argocd](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L451) and [tekton](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L443) in your CR instance. ## Detailed Installation Guide ### From OperatorHub 1. Deploying PostgreSQL reference implementation - **If you do not have a PostgreSQL instance in your cluster** \ - you can deploy the PostgreSQL reference implementation by following the steps [here](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/postgresql/README.md). + you can deploy the PostgreSQL reference implementation by following the steps [here](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/postgresql/README.md). - **If you already have PostgreSQL running in your cluster** \ - ensure that the default settings in the [PostgreSQL values](https://github.com/parodos-dev/orchestrator-helm-chart/blob/main/postgresql/values.yaml) file match those provided in the [Orchestrator values](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/helm-charts/orchestrator/values.yaml) file. + ensure that the default settings in the [PostgreSQL values](https://github.com/rhdhorchestrator/orchestrator-helm-chart/blob/main/postgresql/values.yaml) file match those provided in the [Orchestrator values](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/helm-charts/orchestrator/values.yaml) file. 1. Install Orchestrator operator 1. Go to OperatorHub in your OpenShift Console. 1. Search for and install the Orchestrator Operator. @@ -81,10 +81,10 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL oc get networkpolicy -n sonataflow-infra ``` 1. Copy and execute each command from the output in your terminal. These commands ensure that all necessary services and resources in your OpenShift environment are available and running correctly. - 1. If any service does not become available, verify the logs for that service or consult [troubleshooting steps](https://www.parodos.dev/main/docs/serverless-workflows/troubleshooting/). + 1. If any service does not become available, verify the logs for that service or consult [troubleshooting steps](https://www.rhdhorchestrator.io/main/docs/serverless-workflows/troubleshooting/). ### Manual Install -1. Deploy the PostgreSQL reference implementation for persistence support in SonataFlow following these [instructions](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/postgresql/README.md) +1. Deploy the PostgreSQL reference implementation for persistence support in SonataFlow following these [instructions](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/postgresql/README.md) 1. Create a namespace for the Orchestrator solution: @@ -101,7 +101,7 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL 1. Download the setup script from the github repository and run it to create the RHDH secret and label the GitOps namespaces: ```console - wget https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/main/hack/setup.sh -O /tmp/setup.sh && chmod u+x /tmp/setup.sh + wget https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/main/hack/setup.sh -O /tmp/setup.sh && chmod u+x /tmp/setup.sh ``` Run the script: @@ -164,7 +164,7 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL 1. Run the following commands to determine when the installation is completed: ```console - wget https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/main/hack/wait_for_operator_installed.sh -O /tmp/wait_for_operator_installed.sh && chmod u+x /tmp/wait_for_operator_installed.sh && /tmp/wait_for_operator_installed.sh + wget https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/main/hack/wait_for_operator_installed.sh -O /tmp/wait_for_operator_installed.sh && chmod u+x /tmp/wait_for_operator_installed.sh && /tmp/wait_for_operator_installed.sh ``` During the installation process, Kubernetes cronjobs are created by the operator to monitor the lifecycle of the CRs managed by the operator: RHDH operator, OpenShift Serverless operator and OpenShift Serverless Logic operator. When deleting one of the previously mentioned CRs, a job is triggered that ensures the CR is removed before the operator is. @@ -173,9 +173,9 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL > **Note:** that every minute on the clock a job is triggered to reconcile the CRs with the orchestrator resource values. These cronjobs are deleted when their respective features (e.g. `rhdhOperator.enabled=false`) are removed or when the orchestrator resource is removed. This is required because the CRs are not managed by helm due to the CRD dependency pre availability to the deployment of the CR. 1. Apply the Orchestrator custom resource (CR) on the cluster to create an instance of RHDH and resources of OpenShift Serverless Operator and OpenShift Serverless Operator Logic. - Make any changes to the [CR](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/config/samples/_v1alpha1_orchestrator.yaml) before applying it, or test the default Orchestrator CR: + Make any changes to the [CR](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/config/samples/_v1alpha1_orchestrator.yaml) before applying it, or test the default Orchestrator CR: ```console - oc apply -n orchestrator -f https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/refs/heads/main/config/samples/_v1alpha1_orchestrator.yaml + oc apply -n orchestrator -f https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/refs/heads/main/config/samples/_v1alpha1_orchestrator.yaml ``` ## Additional information @@ -207,7 +207,7 @@ When deploying a workflow in a namespace different from where Sonataflow service Store the namespace value in SONATAFLOW_PLATFORM_NAMESPACE. 4. **Set Up a Network Policy:** - Configure a network policy to allow traffic only between RHDH, Sonataflow services, and the workflows. The policy can be derived from [here](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/helm-charts/orchestrator/templates/network-policies.yaml) + Configure a network policy to allow traffic only between RHDH, Sonataflow services, and the workflows. The policy can be derived from [here](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/helm-charts/orchestrator/templates/network-policies.yaml) ```console oc create -f < Note: `${BACKEND_SECRET}` and `${RHDH_ROUTE}` variables are not by default accessible by Backstage, so the values should be used directly in the ConfigMap or made accessible to Backstage. +> Note: `${BACKEND_SECRET}` and `${RHDH_ROUTE}` variables are not by default accessible by Backstage, so the values should be used directly in the ConfigMap or made accessible to Backstage. The `${POSTGRES_*}` variables *are* accessible by default, so they can be left in variable form. ### Import Orchestrator's software templates @@ -285,9 +285,9 @@ Orchestrator software templates rely on the following tools: To import the Orchestrator software templates into the catalog via the Backstage UI, follow the instructions outlined in this [document](https://backstage.io/docs/features/software-templates/adding-templates). Register new templates into the catalog from the -- [Workflow resources (group and system)](https://github.com/parodos-dev/workflow-software-templates/blob/v1.3.x/entities/workflow-resources.yaml) (optional) -- [Basic template](https://github.com/parodos-dev/workflow-software-templates/blob/v1.3.x/scaffolder-templates/basic-workflow/template.yaml) -- [Complex template - workflow with custom Java code](https://github.com/parodos-dev/workflow-software-templates/blob/v1.3.x/scaffolder-templates/complex-assessment-workflow/template.yaml) +- [Workflow resources (group and system)](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.3.x/entities/workflow-resources.yaml) (optional) +- [Basic template](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.3.x/scaffolder-templates/basic-workflow/template.yaml) +- [Complex template - workflow with custom Java code](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.3.x/scaffolder-templates/complex-assessment-workflow/template.yaml) ## Plugin Versions diff --git a/docs/postgresql/README.md b/docs/postgresql/README.md index 539b1bac..1a5df0db 100644 --- a/docs/postgresql/README.md +++ b/docs/postgresql/README.md @@ -12,14 +12,14 @@ Note: replace the password of the `sonataflow-psql-postgresql` secret below in t oc new-project sonataflow-infra oc create secret generic sonataflow-psql-postgresql --from-literal=postgres-username=postgres --from-literal=postgres-password=postgres -git clone git@github.com:parodos-dev/orchestrator-helm-chart.git +git clone git@github.com:rhdhorchestrator/orchestrator-helm-chart.git cd orchestrator-helm-chart/postgresql helm repo add bitnami https://charts.bitnami.com/bitnami helm install sonataflow-psql bitnami/postgresql --version 12.x.x -f ./values.yaml ``` -Note: the default settings provided in [PostgreSQL values](https://github.com/parodos-dev/orchestrator-helm-chart/blob/main/postgresql/values.yaml) match the defaults provided in the -[Orchestrator values](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/helm-charts/orchestrator/values.yaml). +Note: the default settings provided in [PostgreSQL values](https://github.com/rhdhorchestrator/orchestrator-helm-chart/blob/main/postgresql/values.yaml) match the defaults provided in the +[Orchestrator values](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/helm-charts/orchestrator/values.yaml). Any changes to the first configuration must also be reported in the latter. For OpenShift-related configuration in the chart visit [here](https://github.com/bitnami/charts/blob/main/bitnami/postgresql/README.md#differences-between-bitnami-postgresql-image-and-docker-official-image). diff --git a/docs/release-1.2/README.md b/docs/release-1.2/README.md index 0a72bc1c..750fb80f 100644 --- a/docs/release-1.2/README.md +++ b/docs/release-1.2/README.md @@ -1,6 +1,6 @@ # Orchestrator Documentation -For comprehensive documentation on the Orchestrator, please visit [https://www.parodos.dev](https://www.parodos.dev). +For comprehensive documentation on the Orchestrator, please visit [https://www.rhdhorchestrator.io](https://www.rhdhorchestrator.io). ## Installing the Orchestrator Helm Operator @@ -37,21 +37,21 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL ### Deployment with GitOps - If you plan to deploy in a GitOps environment, make sure you have installed the `ArgoCD/Red Hat OpenShift GitOps` and the `Tekton/Red Hat Openshift Pipelines Install` operators following these [instructions](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/gitops/README.md). + If you plan to deploy in a GitOps environment, make sure you have installed the `ArgoCD/Red Hat OpenShift GitOps` and the `Tekton/Red Hat Openshift Pipelines Install` operators following these [instructions](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/gitops/README.md). The Orchestrator installs RHDH and imports software templates designed for bootstrapping workflow development. These templates are crafted to ease the development lifecycle, including a Tekton pipeline to build workflow images and generate workflow K8s custom resources. Furthermore, ArgoCD is utilized to monitor any changes made to the workflow repository and to automatically trigger the Tekton pipelines as needed. - `ArgoCD/OpenShift GitOps` operator - - Ensure at least one instance of `ArgoCD` exists in the designated namespace (referenced by `ARGOCD_NAMESPACE` environment variable). Example [here](https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/main/docs/gitops/resources/argocd-example.yaml) + - Ensure at least one instance of `ArgoCD` exists in the designated namespace (referenced by `ARGOCD_NAMESPACE` environment variable). Example [here](https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/main/docs/gitops/resources/argocd-example.yaml) - Validated API is `argoproj.io/v1alpha1/AppProject` - `Tekton/OpenShift Pipelines` operator - Validated APIs are `tekton.dev/v1beta1/Task` and `tekton.dev/v1/Pipeline` - Requires ArgoCD installed since the manifests are deployed in the same namespace as the ArgoCD instance. - Remember to enable [argocd](https://github.com/parodos-dev/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L451) and [tekton](https://github.com/parodos-dev/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L443) in your CR instance. + Remember to enable [argocd](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L451) and [tekton](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L443) in your CR instance. ## Installation -1. Deploy the PostgreSQL reference implementation for persistence support in SonataFlow following these [instructions](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/postgresql/README.md) +1. Deploy the PostgreSQL reference implementation for persistence support in SonataFlow following these [instructions](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/postgresql/README.md) 1. Create a namespace for the Orchestrator solution: @@ -68,7 +68,7 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL 1. Download the setup script from the github repository and run it to create the RHDH secret and label the GitOps namespaces: ```console - wget https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/release-1.2/hack/setup.sh -O /tmp/setup.sh && chmod u+x /tmp/setup.sh + wget https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/release-1.2/hack/setup.sh -O /tmp/setup.sh && chmod u+x /tmp/setup.sh ``` Run the script: @@ -131,7 +131,7 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL 1. Run the following commands to determine when the installation is completed: ```console - wget https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/release-1.2/hack/wait_for_operator_installed.sh -O /tmp/wait_for_operator_installed.sh && chmod u+x /tmp/wait_for_operator_installed.sh && /tmp/wait_for_operator_installed.sh + wget https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/release-1.2/hack/wait_for_operator_installed.sh -O /tmp/wait_for_operator_installed.sh && chmod u+x /tmp/wait_for_operator_installed.sh && /tmp/wait_for_operator_installed.sh ``` During the installation process, Kubernetes cronjobs are created by the operator to monitor the lifecycle of the CRs managed by the operator: RHDH operator, OpenShift Serverless operator and OpenShift Serverless Logic operator. When deleting one of the previously mentioned CRs, a job is triggered that ensures the CR is removed before the operator is. @@ -140,9 +140,9 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL > **Note:** that every minute on the clock a job is triggered to reconcile the CRs with the orchestrator resource values. These cronjobs are deleted when their respective features (e.g. `rhdhOperator.enabled=false`) are removed or when the orchestrator resource is removed. This is required because the CRs are not managed by helm due to the CRD dependency pre availability to the deployment of the CR. 1. Apply the Orchestrator custom resource (CR) on the cluster to create an instance of RHDH and resources of OpenShift Serverless Operator and OpenShift Serverless Operator Logic. - Make any changes to the [CR](https://github.com/parodos-dev/orchestrator-helm-operator/blob/release-1.2/config/samples/_v1alpha1_orchestrator.yaml) before applying it, or test the default Orchestrator CR: + Make any changes to the [CR](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/release-1.2/config/samples/_v1alpha1_orchestrator.yaml) before applying it, or test the default Orchestrator CR: ```console - oc apply -n orchestrator -f https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/refs/heads/release-1.2/config/samples/_v1alpha1_orchestrator.yaml + oc apply -n orchestrator -f https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/refs/heads/release-1.2/config/samples/_v1alpha1_orchestrator.yaml ``` ## Additional information @@ -174,7 +174,7 @@ When deploying a workflow in a namespace different from where Sonataflow service Store the namespace value in SONATAFLOW_PLATFORM_NAMESPACE. 4. **Set Up a Network Policy:** - Configure a network policy to allow traffic only between RHDH, Sonataflow services, and the workflows. The policy can be derived from [here](https://github.com/parodos-dev/orchestrator-helm-operator/blob/release-1.2/helm-charts/orchestrator/templates/network-policies.yaml) + Configure a network policy to allow traffic only between RHDH, Sonataflow services, and the workflows. The policy can be derived from [here](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/release-1.2/helm-charts/orchestrator/templates/network-policies.yaml) ```console oc create -f < Note: `${BACKEND_SECRET}` and `${RHDH_ROUTE}` variables are not by default accessible by Backstage, so the values should be used directly in the ConfigMap or made accessible to Backstage. +> Note: `${BACKEND_SECRET}` and `${RHDH_ROUTE}` variables are not by default accessible by Backstage, so the values should be used directly in the ConfigMap or made accessible to Backstage. The `${POSTGRES_*}` variables *are* accessible by default, so they can be left in variable form. ### Import Orchestrator's software templates @@ -301,9 +301,9 @@ Orchestrator software templates rely on the following tools: To import the Orchestrator software templates into the catalog via the Backstage UI, follow the instructions outlined in this [document](https://backstage.io/docs/features/software-templates/adding-templates). Register new templates into the catalog from the -- [Workflow resources (group and system)](https://github.com/parodos-dev/workflow-software-templates/blob/v1.2.x/entities/workflow-resources.yaml) (optional) -- [Basic template](https://github.com/parodos-dev/workflow-software-templates/blob/v1.2.x/scaffolder-templates/basic-workflow/template.yaml) -- [Complex template - workflow with custom Java code](https://github.com/parodos-dev/workflow-software-templates/blob/v1.2.x/scaffolder-templates/complex-assessment-workflow/template.yaml) +- [Workflow resources (group and system)](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.2.x/entities/workflow-resources.yaml) (optional) +- [Basic template](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.2.x/scaffolder-templates/basic-workflow/template.yaml) +- [Complex template - workflow with custom Java code](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.2.x/scaffolder-templates/complex-assessment-workflow/template.yaml) ## Plugin Versions diff --git a/docs/release-1.3/README.md b/docs/release-1.3/README.md index c130c758..9965edf8 100644 --- a/docs/release-1.3/README.md +++ b/docs/release-1.3/README.md @@ -39,25 +39,25 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL ### Deployment with GitOps - If you plan to deploy in a GitOps environment, make sure you have installed the `ArgoCD/Red Hat OpenShift GitOps` and the `Tekton/Red Hat Openshift Pipelines Install` operators following these [instructions](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/gitops/README.md). + If you plan to deploy in a GitOps environment, make sure you have installed the `ArgoCD/Red Hat OpenShift GitOps` and the `Tekton/Red Hat Openshift Pipelines Install` operators following these [instructions](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/gitops/README.md). The Orchestrator installs RHDH and imports software templates designed for bootstrapping workflow development. These templates are crafted to ease the development lifecycle, including a Tekton pipeline to build workflow images and generate workflow K8s custom resources. Furthermore, ArgoCD is utilized to monitor any changes made to the workflow repository and to automatically trigger the Tekton pipelines as needed. - `ArgoCD/OpenShift GitOps` operator - - Ensure at least one instance of `ArgoCD` exists in the designated namespace (referenced by `ARGOCD_NAMESPACE` environment variable). Example [here](https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/main/docs/gitops/resources/argocd-example.yaml) + - Ensure at least one instance of `ArgoCD` exists in the designated namespace (referenced by `ARGOCD_NAMESPACE` environment variable). Example [here](https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/main/docs/gitops/resources/argocd-example.yaml) - Validated API is `argoproj.io/v1alpha1/AppProject` - `Tekton/OpenShift Pipelines` operator - Validated APIs are `tekton.dev/v1beta1/Task` and `tekton.dev/v1/Pipeline` - Requires ArgoCD installed since the manifests are deployed in the same namespace as the ArgoCD instance. - Remember to enable [argocd](https://github.com/parodos-dev/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L451) and [tekton](https://github.com/parodos-dev/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L443) in your CR instance. + Remember to enable [argocd](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L451) and [tekton](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/c577e95e063e2bf8119b2b23890df04792f9424c/config/crd/bases/rhdh.redhat.com_orchestrators.yaml#L443) in your CR instance. ## Detailed Installation Guide ### From OperatorHub 1. Deploying PostgreSQL reference implementation - **If you do not have a PostgreSQL instance in your cluster** \ - you can deploy the PostgreSQL reference implementation by following the steps [here](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/postgresql/README.md). + you can deploy the PostgreSQL reference implementation by following the steps [here](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/postgresql/README.md). - **If you already have PostgreSQL running in your cluster** \ - ensure that the default settings in the [PostgreSQL values](https://github.com/parodos-dev/orchestrator-helm-chart/blob/main/postgresql/values.yaml) file match those provided in the [Orchestrator values](https://github.com/parodos-dev/orchestrator-helm-operator/blob/release-1.3/helm-charts/orchestrator/values.yaml) file. + ensure that the default settings in the [PostgreSQL values](https://github.com/rhdhorchestrator/orchestrator-helm-chart/blob/main/postgresql/values.yaml) file match those provided in the [Orchestrator values](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/release-1.3/helm-charts/orchestrator/values.yaml) file. 1. Install Orchestrator operator 1. Go to OperatorHub in your OpenShift Console. 1. Search for and install the Orchestrator Operator. @@ -81,10 +81,10 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL oc get networkpolicy -n sonataflow-infra ``` 1. Copy and execute each command from the output in your terminal. These commands ensure that all necessary services and resources in your OpenShift environment are available and running correctly. - 1. If any service does not become available, verify the logs for that service or consult [troubleshooting steps](https://www.parodos.dev/1.3/docs/serverless-workflows/troubleshooting/). + 1. If any service does not become available, verify the logs for that service or consult [troubleshooting steps](https://www.rhdhorchestrator.io/1.3/docs/serverless-workflows/troubleshooting/). ### Manual Install -1. Deploy the PostgreSQL reference implementation for persistence support in SonataFlow following these [instructions](https://github.com/parodos-dev/orchestrator-helm-operator/blob/main/docs/postgresql/README.md) +1. Deploy the PostgreSQL reference implementation for persistence support in SonataFlow following these [instructions](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/main/docs/postgresql/README.md) 1. Create a namespace for the Orchestrator solution: @@ -101,7 +101,7 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL 1. Download the setup script from the github repository and run it to create the RHDH secret and label the GitOps namespaces: ```console - wget https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/release-1.3/hack/setup.sh -O /tmp/setup.sh && chmod u+x /tmp/setup.sh + wget https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/release-1.3/hack/setup.sh -O /tmp/setup.sh && chmod u+x /tmp/setup.sh ``` Run the script: @@ -164,7 +164,7 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL 1. Run the following commands to determine when the installation is completed: ```console - wget https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/release-1.3/hack/wait_for_operator_installed.sh -O /tmp/wait_for_operator_installed.sh && chmod u+x /tmp/wait_for_operator_installed.sh && /tmp/wait_for_operator_installed.sh + wget https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/release-1.3/hack/wait_for_operator_installed.sh -O /tmp/wait_for_operator_installed.sh && chmod u+x /tmp/wait_for_operator_installed.sh && /tmp/wait_for_operator_installed.sh ``` During the installation process, Kubernetes cronjobs are created by the operator to monitor the lifecycle of the CRs managed by the operator: RHDH operator, OpenShift Serverless operator and OpenShift Serverless Logic operator. When deleting one of the previously mentioned CRs, a job is triggered that ensures the CR is removed before the operator is. @@ -173,9 +173,9 @@ Note that as of November 6, 2023, OpenShift Serverless Operator is based on RHEL > **Note:** that every minute on the clock a job is triggered to reconcile the CRs with the orchestrator resource values. These cronjobs are deleted when their respective features (e.g. `rhdhOperator.enabled=false`) are removed or when the orchestrator resource is removed. This is required because the CRs are not managed by helm due to the CRD dependency pre availability to the deployment of the CR. 1. Apply the Orchestrator custom resource (CR) on the cluster to create an instance of RHDH and resources of OpenShift Serverless Operator and OpenShift Serverless Operator Logic. - Make any changes to the [CR](https://github.com/parodos-dev/orchestrator-helm-operator/blob/release-1.3/config/samples/_v1alpha1_orchestrator.yaml) before applying it, or test the default Orchestrator CR: + Make any changes to the [CR](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/release-1.3/config/samples/_v1alpha1_orchestrator.yaml) before applying it, or test the default Orchestrator CR: ```console - oc apply -n orchestrator -f https://raw.githubusercontent.com/parodos-dev/orchestrator-helm-operator/refs/heads/release-1.3/config/samples/_v1alpha1_orchestrator.yaml + oc apply -n orchestrator -f https://raw.githubusercontent.com/rhdhorchestrator/orchestrator-helm-operator/refs/heads/release-1.3/config/samples/_v1alpha1_orchestrator.yaml ``` ## Additional information @@ -207,7 +207,7 @@ When deploying a workflow in a namespace different from where Sonataflow service Store the namespace value in SONATAFLOW_PLATFORM_NAMESPACE. 4. **Set Up a Network Policy:** - Configure a network policy to allow traffic only between RHDH, Sonataflow services, and the workflows. The policy can be derived from [here](https://github.com/parodos-dev/orchestrator-helm-operator/blob/release-1.3/helm-charts/orchestrator/templates/network-policies.yaml) + Configure a network policy to allow traffic only between RHDH, Sonataflow services, and the workflows. The policy can be derived from [here](https://github.com/rhdhorchestrator/orchestrator-helm-operator/blob/release-1.3/helm-charts/orchestrator/templates/network-policies.yaml) ```console oc create -f < Note: `${BACKEND_SECRET}` and `${RHDH_ROUTE}` variables are not by default accessible by Backstage, so the values should be used directly in the ConfigMap or made accessible to Backstage. +> Note: `${BACKEND_SECRET}` and `${RHDH_ROUTE}` variables are not by default accessible by Backstage, so the values should be used directly in the ConfigMap or made accessible to Backstage. The `${POSTGRES_*}` variables *are* accessible by default, so they can be left in variable form. ### Import Orchestrator's software templates @@ -285,9 +285,9 @@ Orchestrator software templates rely on the following tools: To import the Orchestrator software templates into the catalog via the Backstage UI, follow the instructions outlined in this [document](https://backstage.io/docs/features/software-templates/adding-templates). Register new templates into the catalog from the -- [Workflow resources (group and system)](https://github.com/parodos-dev/workflow-software-templates/blob/v1.3.x/entities/workflow-resources.yaml) (optional) -- [Basic template](https://github.com/parodos-dev/workflow-software-templates/blob/v1.3.x/scaffolder-templates/basic-workflow/template.yaml) -- [Complex template - workflow with custom Java code](https://github.com/parodos-dev/workflow-software-templates/blob/v1.3.x/scaffolder-templates/complex-assessment-workflow/template.yaml) +- [Workflow resources (group and system)](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.3.x/entities/workflow-resources.yaml) (optional) +- [Basic template](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.3.x/scaffolder-templates/basic-workflow/template.yaml) +- [Complex template - workflow with custom Java code](https://github.com/rhdhorchestrator/workflow-software-templates/blob/v1.3.x/scaffolder-templates/complex-assessment-workflow/template.yaml) ## Plugin Versions diff --git a/hack/merge_secrets.sh b/hack/merge_secrets.sh index 055583fa..cf370d9d 100755 --- a/hack/merge_secrets.sh +++ b/hack/merge_secrets.sh @@ -2,7 +2,7 @@ # The script merges two given K8s secrets in yaml format into a single secret named 'docker-credentials' in 'orchestrator-gitops' namespace. # This script is required to simplify the instruction of -# https://github.com/parodos-dev/orchestrator-helm-operator/tree/main/docs/gitops#installing-docker-credentials +# https://github.com/rhdhorchestrator/orchestrator-helm-operator/tree/main/docs/gitops#installing-docker-credentials # Check if the correct number of arguments is provided if [ $# -ne 2 ]; then diff --git a/helm-charts/orchestrator/Chart.yaml b/helm-charts/orchestrator/Chart.yaml index 11644f2b..337dedb7 100644 --- a/helm-charts/orchestrator/Chart.yaml +++ b/helm-charts/orchestrator/Chart.yaml @@ -23,6 +23,6 @@ version: 1.3.0 # It is recommended to use it with quotes. appVersion: "0.0.1" -# This is an icon to Parodos project. In the future we might design a dedicated logo for the Orchestrator. -# However, since the entire development is done under the Parodos organization, we'll use it. +# This is an icon to The Orchestrator project. In the future we might design a dedicated logo for the Orchestrator. +# However, since the entire development is done under the Orchestrator organization, we'll use it. icon: data:image/svg+xml;base64,<?xml version="1.0" encoding="UTF-8"?><svg id="uuid-a0af9d88-570b-4d47-89d8-8cae4ba927a2" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 38 38"><title>orchestrator icon</title>
<desc>Cloud</desc>
<metadata><?xpacket begin="﻿" id="W5M0MpCehiHzreSzNTczkc9d"?>
<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 8.0-c001 1.000000, 0000/00/00-00:00:00        ">
   <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
      <rdf:Description rdf:about=""
            xmlns:xmp="http://ns.adobe.com/xap/1.0/"
            xmlns:tiff="http://ns.adobe.com/tiff/1.0/"
            xmlns:dc="http://purl.org/dc/elements/1.1/"
            xmlns:xmpRights="http://ns.adobe.com/xap/1.0/rights/">
         <xmp:rhcc-effective-on>2024-07-08T20:57:59.865Z</xmp:rhcc-effective-on>
         <xmp:rhcc-rights-restricted>no</xmp:rhcc-rights-restricted>
         <xmp:brand-content-subtype>Technology icon</xmp:brand-content-subtype>
         <xmp:rhcc-metadata-complete-moderator>pending</xmp:rhcc-metadata-complete-moderator>
         <xmp:rhcc-translation-id>TRA879805d8-3dfb-4e38-9755-c5ce9672298f</xmp:rhcc-translation-id>
         <xmp:brand-content-type>Icon</xmp:brand-content-type>
         <xmp:CreateDate>2024-07-08T20:57:59.865Z</xmp:CreateDate>
         <xmp:rhcc-derivative-id>DER879805d8-3dfb-4e38-9755-c5ce9672298f</xmp:rhcc-derivative-id>
         <xmp:rhcc-effective-on-set-on-upload>true</xmp:rhcc-effective-on-set-on-upload>
         <xmp:brand-logo-color>Standard</xmp:brand-logo-color>
         <xmp:rhcc-metadata-complete-uploader>pending</xmp:rhcc-metadata-complete-uploader>
         <xmp:rhcc-file-last-modified>2024-07-08T20:58:09.938Z</xmp:rhcc-file-last-modified>
         <xmp:rhcc-audience>rhcc-audience:internal</xmp:rhcc-audience>
         <xmp:rhcc-notify-portal-subscribers-on-change>yes</xmp:rhcc-notify-portal-subscribers-on-change>
         <xmp:rhcc-product>
            <rdf:Bag>
               <rdf:li>rhcc-product:red-hat-developer-hub</rdf:li>
            </rdf:Bag>
         </xmp:rhcc-product>
         <tiff:ImageLength>38</tiff:ImageLength>
         <tiff:ImageWidth>38</tiff:ImageWidth>
         <dc:format>image/svg+xml</dc:format>
         <dc:modified>2024-07-08T20:59:22.889Z</dc:modified>
         <dc:description>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Cloud</rdf:li>
            </rdf:Alt>
         </dc:description>
         <dc:title>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">orchestrator icon</rdf:li>
            </rdf:Alt>
         </dc:title>
         <xmpRights:UsageTerms>
            <rdf:Alt>
               <rdf:li xml:lang="x-default">Use technology icons to represent Red Hat products and components. Do not remove the icon from the bounding shape.</rdf:li>
            </rdf:Alt>
         </xmpRights:UsageTerms>
      </rdf:Description>
   </rdf:RDF>
</x:xmpmeta>
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
                                                                                                    
               
<?xpacket end="w"?></metadata>
<defs><style>.uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f{fill:#e0e0e0;}.uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f,.uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689,.uuid-d738c91c-91b5-4858-81da-12f062cd5904,.uuid-02ece680-d95c-45cd-b847-1f40dfea8911{stroke-width:0px;}.uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689{fill:#000;}.uuid-d738c91c-91b5-4858-81da-12f062cd5904{fill:#e00;}.uuid-02ece680-d95c-45cd-b847-1f40dfea8911{fill:#fff;}</style></defs><rect class="uuid-02ece680-d95c-45cd-b847-1f40dfea8911" x="1" y="1" width="36" height="36" rx="9" ry="9"/><path class="uuid-c193e854-d958-4adf-b3be-7fea23c6fb1f" d="M28,2.25c4.2734,0,7.75,3.4766,7.75,7.75v18c0,4.2734-3.4766,7.75-7.75,7.75H10c-4.2734,0-7.75-3.4766-7.75-7.75V10c0-4.2734,3.4766-7.75,7.75-7.75h18M28,1H10C5.0294,1,1,5.0294,1,10v18c0,4.9706,4.0294,9,9,9h18c4.9706,0,9-4.0294,9-9V10c0-4.9706-4.0294-9-9-9h0Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M14,9.375h-4c-.3447,0-.625.2798-.625.625v4c0,.3452.2803.625.625.625h4c.3447,0,.625-.2798.625-.625v-4c0-.3452-.2803-.625-.625-.625ZM13.375,13.375h-2.75v-2.75h2.75v2.75Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M27,22.6196c.1699,0,.3301-.0596.4395-.1797.1201-.1104.1904-.2803.1904-.4399,0-.0801-.0205-.1602-.0498-.2402-.0303-.0698-.0801-.1401-.1406-.1997-.2295-.2305-.6494-.2305-.8799,0-.1201.1099-.1797.2695-.1797.4399,0,.1699.0596.3296.1797.4399.1201.1201.2803.1797.4404.1797Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M25,22.6196c.1699,0,.3301-.0596.4395-.1797.1201-.1104.1904-.2803.1904-.4399,0-.0801-.0205-.1602-.0498-.2402-.0303-.0698-.0801-.1401-.1406-.1997-.0498-.0601-.1299-.1104-.1992-.1401-.2305-.0903-.5107-.04-.6807.1401-.0596.0596-.1094.1299-.1396.1997-.0303.0801-.0498.1602-.0498.2402,0,.1597.0693.3296.1895.4399.1104.1201.2803.1797.4404.1797Z"/><path class="uuid-d738c91c-91b5-4858-81da-12f062cd5904" d="M29,19.375h-8c-.3447,0-.625.2798-.625.625v8c0,.3452.2803.625.625.625h8c.3447,0,.625-.2798.625-.625v-8c0-.3452-.2803-.625-.625-.625ZM28.375,27.375h-6.75v-6.75h6.75v6.75Z"/><path class="uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689" d="M21.5,11.375h-5.5c-.3447,0-.625.2798-.625.625s.2803.625.625.625h5.5c1.0342,0,1.875.8413,1.875,1.875s-.8408,1.875-1.875,1.875h-2.875v-.375c0-.2529-.1523-.4805-.3857-.5776-.2314-.0952-.502-.0439-.6816.1357l-1,1c-.0129.0129-.0175.03-.0289.0438-.0412.0488-.0806.0994-.1054.1592-.0276.067-.039.1382-.0424.2096-.0005.0103-.0059.0189-.0059.0293,0,.0104.0055.0192.006.0295.0034.0713.0147.1423.0423.2094.0249.0601.0644.111.1058.16.0114.0135.0158.0304.0285.0431l1,1c.1201.1196.2803.1831.4424.1831.0811,0,.1621-.0156.2393-.0474.2334-.0972.3857-.3247.3857-.5776v-.375h2.875c1.7227,0,3.125-1.4019,3.125-3.125s-1.4023-3.125-3.125-3.125Z"/><path class="uuid-35825e81-17b3-4ad5-8ae5-8f18588b3689" d="M17.4424,20.5581c-.2441-.2441-.6406-.2441-.8848,0-.2432.2441-.2432.6396,0,.8838l.9334.9331h-3.491c-1.3096,0-2.375-1.0654-2.375-2.375s1.0654-2.375,2.375-2.375h1c.3447,0,.625-.2798.625-.625s-.2803-.625-.625-.625h-1c-1.999,0-3.625,1.626-3.625,3.625s1.626,3.625,3.625,3.625h3.491l-.9334.9331c-.2432.2441-.2432.6396,0,.8838.1221.1221.2822.1831.4424.1831s.3203-.061.4424-.1831l2-2c.2432-.2441.2432-.6396,0-.8838l-2-2Z"/></svg> diff --git a/helm-charts/orchestrator/README.md b/helm-charts/orchestrator/README.md index e96c9145..dc9ee3f2 100644 --- a/helm-charts/orchestrator/README.md +++ b/helm-charts/orchestrator/README.md @@ -29,7 +29,7 @@ The following table lists the configurable parameters of the Orchestrator chart | `rhdhOperator.isReleaseCandidate` | Indicates RC builds should be used by the chart to install RHDH | `false` | | `rhdhOperator.enabled` | whether the operator should be deployed by the chart | `true` | | `rhdhOperator.enableGuestProvider` | whether to enable guest provider | `false` | -| `rhdhOperator.catalogBranch` | The branch for https://github.com/parodos-dev/workflow-software-templates used to import software templates resources | `"v1.3.x"` | +| `rhdhOperator.catalogBranch` | The branch for https://github.com/rhdhorchestrator/workflow-software-templates used to import software templates resources | `"v1.3.x"` | | `rhdhOperator.secretRef.name` | name of the secret that contains the credentials for the plugin to establish a communication channel with the Kubernetes API, ArgoCD, GitHub servers and SMTP mail server. | `"backstage-backend-auth-secret"` | | `rhdhOperator.secretRef.backstage.backendSecret` | Key in the secret with name defined in the 'name' field that contains the value of the Backstage backend secret. Defaults to 'BACKEND_SECRET'. It's required. | `"BACKEND_SECRET"` | | `rhdhOperator.secretRef.github.token` | Key in the secret with name defined in the 'name' field that contains the value of the authentication token as expected by GitHub. Required for importing resource to the catalog, launching software templates and more. Defaults to 'GITHUB_TOKEN', empty for not available. | `"GITHUB_TOKEN"` | diff --git a/helm-charts/orchestrator/templates/_cr_lifecycle_helper.tpl b/helm-charts/orchestrator/templates/_cr_lifecycle_helper.tpl index 8904a6fc..ed9d3fc9 100644 --- a/helm-charts/orchestrator/templates/_cr_lifecycle_helper.tpl +++ b/helm-charts/orchestrator/templates/_cr_lifecycle_helper.tpl @@ -56,7 +56,7 @@ roleRef: apiVersion: batch/v1 kind: CronJob metadata: - name: {{ trunc -52 (printf "%s-reconcile" $releaseNameKind | trimPrefix "-" | trimPrefix "_" ) }} # Fixes https://github.com/parodos-dev/orchestrator-helm-chart/issues/160 + name: {{ trunc -52 (printf "%s-reconcile" $releaseNameKind | trimPrefix "-" | trimPrefix "_" ) }} # Fixes https://github.com/rhdhorchestrator/orchestrator-helm-chart/issues/160 # job name is used in the spec.template.metadata.labels, and labels cannot be more than 63 characters https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ namespace: {{ .release.Namespace }} labels: @@ -107,7 +107,7 @@ spec: apiVersion: batch/v1 kind: Job metadata: - name: {{ trunc -57 (printf "%s-delete" $releaseNameKind) | trimPrefix "-" | trimPrefix "_" }} # Fixes https://github.com/parodos-dev/orchestrator-helm-chart/issues/160 + name: {{ trunc -57 (printf "%s-delete" $releaseNameKind) | trimPrefix "-" | trimPrefix "_" }} # Fixes https://github.com/rhdhorchestrator/orchestrator-helm-chart/issues/160 # job name is used in the spec.template.metadata.labels, and labels cannot be more than 63 characters https://kubernetes.io/docs/concepts/overview/working-with-objects/labels/ namespace: {{ .release.Namespace }} annotations: diff --git a/helm-charts/orchestrator/templates/tekton-pipeline.yaml b/helm-charts/orchestrator/templates/tekton-pipeline.yaml index 20f34dde..f68d5434 100644 --- a/helm-charts/orchestrator/templates/tekton-pipeline.yaml +++ b/helm-charts/orchestrator/templates/tekton-pipeline.yaml @@ -45,9 +45,9 @@ spec: workspace: ssh-creds params: - name: GIT_USER_NAME - value: Parodos Tekton Pipeline + value: The Orchestrator Tekton Pipeline - name: GIT_USER_EMAIL - value: parodos@redhat.com + value: rhdhorchestrator@redhat.com - name: USER_HOME value: /home/git - name: GIT_SCRIPT @@ -66,9 +66,9 @@ spec: workspace: ssh-creds params: - name: GIT_USER_NAME - value: Parodos Tekton Pipeline + value: The Orchestrator Tekton Pipeline - name: GIT_USER_EMAIL - value: parodos@redhat.com + value: rhdhorchestrator@redhat.com - name: USER_HOME value: /home/git - name: GIT_SCRIPT @@ -142,9 +142,9 @@ spec: workspace: ssh-creds params: - name: GIT_USER_NAME - value: Parodos Tekton Pipeline + value: The Orchestrator Tekton Pipeline - name: GIT_USER_EMAIL - value: parodos@redhat.com + value: rhdhorchestrator@redhat.com - name: USER_HOME value: /home/git - name: GIT_SCRIPT diff --git a/helm-charts/orchestrator/templates/tekton-tasks.yaml b/helm-charts/orchestrator/templates/tekton-tasks.yaml index 76c8e36a..dd636582 100644 --- a/helm-charts/orchestrator/templates/tekton-tasks.yaml +++ b/helm-charts/orchestrator/templates/tekton-tasks.yaml @@ -194,8 +194,8 @@ spec: fi ls flat/$(params.workflowId) - - curl -L https://raw.githubusercontent.com/parodos-dev/serverless-workflows/v1.3.x/pipeline/workflow-builder.Dockerfile -o flat/workflow-builder.Dockerfile + + curl -L https://raw.githubusercontent.com/rhdhorchestrator/serverless-workflows/v1.3.x/pipeline/workflow-builder.Dockerfile -o flat/workflow-builder.Dockerfile --- apiVersion: tekton.dev/v1 kind: Task diff --git a/helm-charts/orchestrator/values.schema.json b/helm-charts/orchestrator/values.schema.json index 8bab2d4e..d8753a01 100644 --- a/helm-charts/orchestrator/values.schema.json +++ b/helm-charts/orchestrator/values.schema.json @@ -642,7 +642,7 @@ "orchestrator": { "type": "object", "default": {}, - "title": "The orchestrator Schema", + "title": "The Orchestrator Schema", "required": [ "package", "integrity" @@ -673,7 +673,7 @@ "orchestratorBackend": { "type": "object", "default": {}, - "title": "The orchestratorBackend Schema", + "title": "The OrchestratorBackend Schema", "required": [ "package", "integrity" @@ -1025,7 +1025,7 @@ "orchestrator": { "type": "object", "default": {}, - "title": "The orchestrator Schema", + "title": "The Orchestrator Schema", "required": [ "namespace", "sonataflowPlatform" diff --git a/helm-charts/orchestrator/values.yaml b/helm-charts/orchestrator/values.yaml index d5ffa1fd..ad58eca7 100644 --- a/helm-charts/orchestrator/values.yaml +++ b/helm-charts/orchestrator/values.yaml @@ -22,7 +22,7 @@ rhdhOperator: isReleaseCandidate: false # Indicates RC builds should be used by the chart to install RHDH enabled: true # whether the operator should be deployed by the chart enableGuestProvider: false # whether to enable guest provider - catalogBranch: v1.3.x # The branch for https://github.com/parodos-dev/workflow-software-templates used to import software templates resources + catalogBranch: v1.3.x # The branch for https://github.com/rhdhorchestrator/workflow-software-templates used to import software templates resources secretRef: name: backstage-backend-auth-secret # name of the secret that contains the credentials for the plugin to establish a communication channel with the Kubernetes API, ArgoCD, GitHub servers and SMTP mail server. backstage: