Skip to content

Commit b5ccea8

Browse files
[1.2.x] RHIDP 3484 Fix Syntax Highlighting (#483)
* Fixes syntax highlighting * Fixes syntax highlighting * change syntax highlighting * updates syntax highlighting --------- Co-authored-by: jmagak <jmagak@redhat.com>
1 parent 44458a1 commit b5ccea8

13 files changed

+20
-17
lines changed

artifacts/rhdh-plugins-reference/argocd/argocd-plugin-readme.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ You can use the Argo CD plugin to visualize the Continuous Delivery (CD) workflo
1111
* Add Argo CD instance information to your `app-config.yaml` configmap as shown in the following example:
1212

1313
+
14-
[source,typescript]
14+
[source,yaml]
1515
----
1616
argocd:
1717
appLocatorMethods:

assemblies/assembly-add-custom-app-file-openshift.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33

44
To access the {product}, you must add a custom application configuration file to {ocp-brand-name}. In {ocp-short}, you can use the following content as a base template to create a ConfigMap named `app-config-rhdh`:
55

6-
[source]
6+
[source,yaml]
77
----
88
kind: ConfigMap
99
apiVersion: v1

modules/admin/proc-configuring-postgresql-instance-using-helm.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ By default, {product-short} uses a database for each plugin and automatically cr
2424

2525
. Optional: Create a certificate secret to configure your PostgreSQL instance with a TLS connection:
2626
+
27-
[source,yaml]
27+
[source,terminal]
2828
----
2929
cat <<EOF | oc -n <your-namespace> create -f -
3030
apiVersion: v1
@@ -52,7 +52,7 @@ EOF
5252

5353
. Create a credential secret to connect with the PostgreSQL instance:
5454
+
55-
[source,yaml]
55+
[source,terminal]
5656
----
5757
cat <<EOF | oc -n <your-namespace> create -f -
5858
apiVersion: v1

modules/admin/proc-configuring-postgresql-instance-using-operator.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ EOF
7676

7777
. Create a `Backstage` custom resource (CR):
7878
+
79-
[source,yaml]
79+
[source,terminal]
8080
----
8181
cat <<EOF | oc -n <your-namespace> create -f -
8282
apiVersion: rhdh.redhat.com/v1alpha1

modules/admin/proc-migrating-databases-to-an-external-server.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,7 @@ oc port-forward -n developer-hub backstage-psql-developer-hub-0 15432:5432
3535

3636
. Make a copy of the following `db_copy.sh` script and edit the details based on your configuration:
3737
+
38-
[source,script]
38+
[source,bash]
3939
----
4040
#!/bin/bash
4141

modules/dynamic-plugins/proc-rhdh-example-external-dynamic-plugins.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@ The NPM registry contains external dynamic plugins that you can use for demonstr
99

1010
To install the Notifications and Kubernetes actions plugins, include them in the Helm chart values in the `global.dynamic.plugins` list as shown in the following example:
1111

12+
[source,yaml]
1213
----
1314
global:
1415
dynamic:

modules/dynamic-plugins/proc-using-custom-npm-registry.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,8 @@ You can install external plugins in an air-gapped environment by setting up a cu
1010
You can configure the NPM registry URL and authentication information for dynamic plugin packages using a Helm chart. For dynamic plugin packages obtained through `npm pack`, you can use a `.npmrc` file.
1111

1212
Using the Helm chart, add the `.npmrc` file to the NPM registry by creating a secret named `dynamic-plugins-npmrc` with the following content:
13+
14+
[source,yaml]
1315
----
1416
apiVersion: v1
1517
kind: Secret

modules/dynamic-plugins/ref-example-dynamic-plugin-helm-installations.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
The following examples demonstrate how to configure the Helm chart for specific types of dynamic plugin installations.
66

77
.Configuring a local plugin and an external plugin when the external plugin requires a specific app-config
8-
[source,java]
8+
[source,yaml]
99
----
1010
global:
1111
dynamic:
@@ -17,7 +17,7 @@ global:
1717
----
1818

1919
.Disabling a plugin from an included file
20-
[source,java]
20+
[source,yaml]
2121
----
2222
global:
2323
dynamic:
@@ -29,7 +29,7 @@ global:
2929
----
3030

3131
.Enabling a plugin from an included file
32-
[source,java]
32+
[source,yaml]
3333
----
3434
global:
3535
dynamic:
@@ -41,7 +41,7 @@ global:
4141
----
4242

4343
.Enabling a plugin that is disabled in an included file
44-
[source,java]
44+
[source,yaml]
4545
----
4646
global:
4747
dynamic:

modules/getting-started/proc-add-source-control-rhdh-catalog.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ The configuration of GitHub authentication is required to enable the GitHub OAut
6060
. Modify your `app-config-rhdh` ConfigMap to include the GitHub authentication configuration as follows:
6161
+
6262
--
63-
[source]
63+
[source,yaml]
6464
----
6565
kind: ConfigMap
6666
apiVersion: v1
@@ -172,7 +172,7 @@ The configuration of GitHub is required to enable the GitHub plugins in {product
172172
. Modify your `app-config-rhdh` ConfigMap to include the GitHub integration configuration as follows:
173173
+
174174
--
175-
[source]
175+
[source,yaml]
176176
----
177177
kind: ConfigMap
178178
apiVersion: v1

modules/getting-started/proc-customize-rhdh-homepage.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,7 @@ If the request call fails or is not configured, the {product-short} instance fal
146146

147147
* If the images or icons do not load, then allowlist them by adding your image or icon host URLs to the content security policy’s (csp) `img-src` in your custom ConfigMap as follows:
148148

149-
[source]
149+
[source,yaml]
150150
----
151151
kind: ConfigMap
152152
apiVersion: v1

0 commit comments

Comments
 (0)