Custom Tekton Hub instance
Installing a custom instance of Tekton Hub
Abstract
Chapter 1. Using Tekton Hub with OpenShift Pipelines Copy linkLink copied to clipboard!
Tekton Hub is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
Tekton Hub helps you discover, search, and share reusable tasks and pipelines for your CI/CD workflows. A public instance of Tekton Hub is available at hub.tekton.dev. Cluster administrators can also install and deploy a custom instance of Tekton Hub by modifying the configurations in the TektonHub
custom resource (CR).
1.1. Installing and deploying Tekton Hub on a OpenShift Container Platform cluster Copy linkLink copied to clipboard!
Tekton Hub is an optional component; cluster administrators cannot install it using the TektonConfig
custom resource (CR). To install and manage Tekton Hub, use the TektonHub
CR.
You can install Tekton Hub on your cluster using two modes:
- Without login authorization and ratings for Tekton Hub artifacts
- with login authorization and ratings for Tekton Hub artifacts
If you are using Github Enterprise or Gitlab Enterprise, install and deploy Tekton Hub in the same network as the enterprise server. For example, if the enterprise server is running behind a VPN, deploy Tekton Hub on a cluster that is also behind the VPN.
1.1.1. Installing Tekton Hub without login and rating Copy linkLink copied to clipboard!
You can install Tekton Hub on your cluster automatically with default configuration. When using the default configuration, Tekton Hub does not support login with authorization and ratings for Tekton Hub artifacts.
Prerequisites
-
Ensure that the Red Hat OpenShift Pipelines Operator is installed in the default
openshift-pipelines
namespace on the cluster.
Procedure
Create a
TektonHub
CR similar to the following example.Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteIf you don’t provide custom values for the optional fields in the
TektonHub
CR, the default values configured in the Tekton Hub API config map is used.Apply the
TektonHub
CR.oc apply -f <tekton-hub-cr>.yaml
$ oc apply -f <tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check the status of the installation. The
TektonHub
CR might take some time to attain steady state.oc get tektonhub.operator.tekton.dev
$ oc get tektonhub.operator.tekton.dev
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.1.2. Installing Tekton Hub with login and rating Copy linkLink copied to clipboard!
You can install Tekton Hub on your cluster with custom configuration that supports login with authorization and ratings for Tekton Hub artifacts.
Prerequisites
-
Ensure that the Red Hat OpenShift Pipelines Operator is installed in the default
openshift-pipelines
namespace on the cluster.
Procedure
Create an OAuth application with your Git repository hosting provider, and note the Client ID and Client Secret. The supported providers are GitHub, GitLab, and BitBucket.
-
For a GitHub OAuth application, set the Homepage URL and the Authorization callback URL as
<auth-route>
. -
For a GitLab OAuth application, set the
REDIRECT_URI
as<auth-route>/auth/gitlab/callback
. -
For a BitBucket OAuth application, set the
Callback URL
as<auth-route>
.
-
For a GitHub OAuth application, set the Homepage URL and the Authorization callback URL as
Edit the
<tekton_hub_root>/config/02-api/20-api-secret.yaml
file to include the Tekton Hub API secrets. For example:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The Client ID from the GitHub OAuth application.
- 2
- The Client Secret from the GitHub OAuth application.
- 3
- The Client ID from the GitLab OAuth application.
- 4
- The Client Secret from the GitLab OAuth application.
- 5
- The Client ID from the BitBucket OAuth application.
- 6
- The Client Secret from the BitBucket OAuth application.
- 7
- A long, random string used to sign the JSON Web Token (JWT) created for users.
- 8
- Add the time limit after which the access token expires. For example,
1m
, where m denotes minutes. The supported units of time are seconds (s
), minutes (m
), hours (h
), days (d
), and weeks (w
). - 9
- Add the time limit after which the refresh token expires. For example,
1m
, wherem
denotes minutes. The supported units of time are seconds (s
), minutes (m
), hours (h
), days (d
), and weeks (w
). Ensure that the expiry time set for token refresh is greater than the expiry time set for token access. - 10
- Route URL for the OAuth application.
- 11
- GitHub Enterprise URL, if you are authenticating using GitHub Enterprise. Do not provide the URL to the catalog as a value for this field.
- 12
- GitLab Enterprise URL, if you are authenticating using GitLab Enterprise. Do not provide the URL to the catalog as a value for this field.
NoteYou can delete the unused fields for the Git repository hosting service providers that are irrelevant to your deployment.
Create a
TektonHub
CR similar to the following example.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The namespace in which Tekton Hub must be installed; default is
openshift-pipelines
. - 2
- Optional: Custom database, such as a Crunchy Postgres database.
- 3
- The name of the database secret must be
tekton-hub-db
. - 4
- Optional: Customized categories for tasks and pipelines in Tekton Hub.
- 5
- Optional: Customized catalogs for Tekton Hub.
- 6
- Optional: Additional users. You can metion multiple users, such as
[<username_1>, <username_2>, <username_3>]
. - 7
- Optional: Customized default scopes.
- 8
- The time interval after which the catalog refreshes automatically. The supported units of time are seconds (
s
), minutes (m
), hours (h
), days (d
), and weeks (w
). The default interval is 30 minutes.
NoteIf you don’t provide custom values for the optional fields in the
TektonHub
CR, the default values configured in the Tekton Hub API config map is used.Apply the
TektonHub
CR.oc apply -f <tekton-hub-cr>.yaml
$ oc apply -f <tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check the status of the installation. The
TektonHub
CR might take some time to attain steady state.oc get tektonhub.operator.tekton.dev
$ oc get tektonhub.operator.tekton.dev
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2. Optional: Using a custom database in Tekton Hub Copy linkLink copied to clipboard!
Cluster administrators can use a custom database with Tekton Hub, instead of the default PostgreSQL database installed by the Operator. You can associate a custom database at the time of installation, and use it with the db-migration
, api
, and ui
interfaces provided by Tekton Hub. Alternatively, you can associate a custom database with Tekton Hub even after the installation with the default database is complete.
Procedure
Create a secret named
tekton-hub-db
in the target namespace with the following keys:-
POSTGRES_HOST
-
POSTGRES_DB
-
POSTGRES_USER
-
POSTGRES_PASSWORD
POSTGRES_PORT
Example: Custom database secrets
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe default target namespace is
openshift-pipelines
.
-
In the
TektonHub
CR, set the value of the database secret attribute totekton-hub-db
.Example: Adding custom database secret
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the updated
TektonHub
CR to associate the custom database with Tekton Hub.If you are associating the custom database at the time of installing Tekton Hub on your cluster, apply the updated
TektonHub
CR.oc apply -f <tekton-hub-cr>.yaml
$ oc apply -f <tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Alternatively, if you are associating the custom database after the installation of Tekton Hub is complete, replace the existing
TektonHub
CR with the updatedTektonHub
CR.oc replace -f <tekton-hub-cr>.yaml
$ oc replace -f <tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Check the status of the installation. The
TektonHub
CR might take some time to attain steady state.oc get tektonhub.operator.tekton.dev
$ oc get tektonhub.operator.tekton.dev
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2.1. Optional: Installing Crunchy Postgres database and Tekton Hub Copy linkLink copied to clipboard!
Cluster administrators can install the Crunchy Postgres database and configure Tekton Hub to use it instead of the default database.
Prerequisites
- Install the Crunchy Postgres Operator from the Operator Hub.
- Create a Postgres instance that initiates a Crunchy Postgres database.
Procedure
Get into the Crunchy Postgres pod.
Example: Getting into the
test-instance1-m7hh-0
podCopy to Clipboard Copied! Toggle word wrap Toggle overflow Find the
pg_hba.conf
file.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Exit from the database.
Check if the
pg_hba.conf
file has the entryhost all all 0.0.0.0/0 md5
, required to access all incoming connections. In addition, add the entry at the end of thepg_hba.conf
file.Example:
pg_hba.conf
fileCopy to Clipboard Copied! Toggle word wrap Toggle overflow Save the
pg_hba.conf
file and reload the database.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Exit the database.
Decode the secret value of the Crunchy Postgres host.
Example: Decode the secret value of a Crunchy Postgres host
echo 'aGlwcG8tcHJpbWFyeS5vcGVuc2hpZnQtb3BlcmF0b3JzLnN2YyA=' | base64 --decode
$ echo 'aGlwcG8tcHJpbWFyeS5vcGVuc2hpZnQtb3BlcmF0b3JzLnN2YyA=' | base64 --decode test-primary.openshift-operators.svc
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Create a secret named
tekton-hub-db
in the target namespace with the following keys:-
POSTGRES_HOST
-
POSTGRES_DB
-
POSTGRES_USER
-
POSTGRES_PASSWORD
POSTGRES_PORT
Example: Custom database secrets
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
NoteThe default target namespace is
openshift-pipelines
.-
In the
TektonHub
CR, set the value of the database secret attribute totekton-hub-db
.Example: Adding custom database secret
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Use the updated
TektonHub
CR to associate the custom database with Tekton Hub.oc apply -f <tekton-hub-cr>.yaml
$ oc apply -f <tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check the status of the installation. The
TektonHub
CR might take some time to attain a steady state.oc get tektonhub.operator.tekton.dev
$ oc get tektonhub.operator.tekton.dev
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2.2. Optional: Migrating Tekton Hub data to an existing Crunchy Postgres database Copy linkLink copied to clipboard!
Tekton Hub supports the use of Crunchy Postgres as a custom database. For a pre-installed Tekton Hub with default database, cluster administrators can use Crunchy Postgres as a custom database after migrating the Tekton Hub data from the internal or default database to the external Crunchy Postgres database.
Procedure
Dump the existing data from the internal or default database into a file in the pod.
Example: Dump data
pg_dump -Ft -h localhost -U postgres hub -f /tmp/hub.dump
$ pg_dump -Ft -h localhost -U postgres hub -f /tmp/hub.dump
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy the file containing the data dump to your local system.
Command format
oc cp -n <namespace> <podName>:<path-to-hub.dump> <path-to-local-system>
$ oc cp -n <namespace> <podName>:<path-to-hub.dump> <path-to-local-system>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example
oc cp -n openshift-pipelines tekton-hub-db-7d6d888c67-p7mdr:/tmp/hub.dump /home/test_user/Downloads/hub.dump
$ oc cp -n openshift-pipelines tekton-hub-db-7d6d888c67-p7mdr:/tmp/hub.dump /home/test_user/Downloads/hub.dump
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Copy the file that contains the data dump from the local system to the pod running the external Crunchy Postgres database.
Command format
oc cp -n <namespace> <path-to-local-system> <podName>:<path-to-hub.dump>
$ oc cp -n <namespace> <path-to-local-system> <podName>:<path-to-hub.dump>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example
oc cp -n openshift-operators /home/test_user/Downloads/hub.dump test-instance1-spnz-0:/tmp/hub.dump
$ oc cp -n openshift-operators /home/test_user/Downloads/hub.dump test-instance1-spnz-0:/tmp/hub.dump
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Restore the data in the Crunchy Postgres database.
Command format
pg_restore -d <database-name> -h localhost -U postgres <path-where-file-is-copied>
$ pg_restore -d <database-name> -h localhost -U postgres <path-where-file-is-copied>
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Example
pg_restore -d test -h localhost -U postgres /tmp/hub.dump
$ pg_restore -d test -h localhost -U postgres /tmp/hub.dump
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Get into the Crunchy Postgres pod. .Example: Get into the
test-instance1-m7hh-0
podCopy to Clipboard Copied! Toggle word wrap Toggle overflow Find the
pg_hba.conf
file.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Exit from the database.
Check if the
pg_hba.conf
file has the entryhost all all 0.0.0.0/0 md5
, which is necessary for accessing all incoming connections. If necessary, add the entry at the end of thepg_hba.conf
file.Example:
pg_hba.conf
fileCopy to Clipboard Copied! Toggle word wrap Toggle overflow Save the
pg_hba.conf
file and reload the database.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Exit the database.
Verify that a secret named
tekton-hub-db
in the target namespace has the following keys:-
POSTGRES_HOST
-
POSTGRES_DB
-
POSTGRES_USER
-
POSTGRES_PASSWORD
POSTGRES_PORT
Example: Custom database secrets
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteThe value of the
POSTGRES_HOST
field is encoded as a secret. You can decode the value of the Crunchy Postgres host by using the following example.Example: Decode the secret value of a Crunchy Postgres host
echo 'aGlwcG8tcHJpbWFyeS5vcGVuc2hpZnQtb3BlcmF0b3JzLnN2YyA=' | base64 --decode
$ echo 'aGlwcG8tcHJpbWFyeS5vcGVuc2hpZnQtb3BlcmF0b3JzLnN2YyA=' | base64 --decode test-primary.openshift-operators.svc
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
-
Verify that in the
TektonHub
CR, the value of the database secret attribute istekton-hub-db
.Example: TektonHub CR with the name of the database secret
Copy to Clipboard Copied! Toggle word wrap Toggle overflow To associate the external Crunchy Postgres database with Tekton Hub, replace any existing
TektonHub
CR with the updatedTektonHub
CR.oc replace -f <updated-tekton-hub-cr>.yaml
$ oc replace -f <updated-tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check the status of the Tekton Hub. The updated
TektonHub
CR might take some time to attain a steady state.oc get tektonhub.operator.tekton.dev
$ oc get tektonhub.operator.tekton.dev
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.3. Updating Tekton Hub with custom categories and catalogs Copy linkLink copied to clipboard!
Cluster administrators can update Tekton Hub with custom categories, catalogs, scopes, and default scopes that reflect the context of their organization.
Procedure
Optional: Edit the
categories
,catalogs
,scopes
, anddefault:scopes
fields in the Tekton Hub CR.NoteThe default information for categories, catalog, scopes, and default scopes are pulled from the Tekton Hub API config map. If you provide custom values in the
TektonHub
CR, it overrides the default values.Apply the Tekton Hub CR.
oc apply -f <tekton-hub-cr>.yaml
$ oc apply -f <tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Observe the Tekton Hub status.
oc get tektonhub.operator.tekton.dev
$ oc get tektonhub.operator.tekton.dev
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url https://ui.route.url
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url https://ui.route.url
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.4. Modifying the catalog refresh interval of Tekton Hub Copy linkLink copied to clipboard!
The default catalog refresh interval for Tekton Hub is 30 minutes. Cluster administrators can modify the automatic catalog refresh interval by modifying the value of the catalogRefreshInterval
field in the TektonHub
CR.
Procedure
Modify the value of the
catalogRefreshInterval
field in theTektonHub
CR.Copy to Clipboard Copied! Toggle word wrap Toggle overflow Apply the
TektonHub
CR.oc apply -f <tekton-hub-cr>.yaml
$ oc apply -f <tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check the status of the installation. The
TektonHub
CR might take some time to attain steady state.oc get tektonhub.operator.tekton.dev
$ oc get tektonhub.operator.tekton.dev
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.5. Adding new users in Tekton Hub configuration Copy linkLink copied to clipboard!
Cluster administrators can add new users to Tekton Hub with different scopes.
Procedure
Modify the
TektonHub
CR to add new users with different scopes.Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The usernames registered with the Git repository hosting service provider.
NoteA new user signing in to Tekton Hub for the first time will have only the default scope. To activate additional scopes, ensure the user’s username is added in the
scopes
field of theTektonHub
CR.Apply the updated
TektonHub
CR.oc apply -f <tekton-hub-cr>.yaml
$ oc apply -f <tekton-hub-cr>.yaml
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Check the status of the Tekton Hub. The updated
TektonHub
CR might take some time to attain a steady state.oc get tektonhub.operator.tekton.dev
$ oc get tektonhub.operator.tekton.dev
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
NAME VERSION READY REASON APIURL UIURL hub v1.9.0 True https://api.route.url/ https://ui.route.url/
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Refresh the configuration.
curl -X POST -H "Authorization: <access-token>" \ --header "Content-Type: application/json" \ --data '{"force": true} \ <api-route>/system/config/refresh
$ curl -X POST -H "Authorization: <access-token>" \
1 --header "Content-Type: application/json" \ --data '{"force": true} \ <api-route>/system/config/refresh
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The JWT token.
1.6. Disabling Tekton Hub authorization after upgrading the Red Hat OpenShift Pipelines Operator from 1.7 to 1.8 Copy linkLink copied to clipboard!
When you install Tekton Hub with Red Hat OpenShift Pipelines Operator 1.8, the login authorization and ratings for the Tekton Hub artifacts are disabled for the default installation. However, when you upgrade the Operator from 1.7 to 1.8, the instance of the Tekton Hub on your cluster does not automatically disable the login authorization and ratings.
To disable login authorization and ratings for Tekton Hub after upgrading the Operator from 1.7 to 1.8, perform the steps in the following procedure.
Prerequisites
-
Ensure that the Red Hat OpenShift Pipelines Operator is installed in the default
openshift-pipelines
namespace on the cluster.
Procedure
Delete the existing Tekton Hub API secret that you created while manually installing Tekton Hub for Operator 1.7.
oc delete secret tekton-hub-api -n <targetNamespace>
$ oc delete secret tekton-hub-api -n <targetNamespace>
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The common namespace for the Tekton Hub API secret and the Tekton Hub CR. By default, the target namespace is
openshift-pipelines
.
Delete the
TektonInstallerSet
object for the Tekton Hub API.oc get tektoninstallerset -o name | grep tekton-hub-api | xargs oc delete
$ oc get tektoninstallerset -o name | grep tekton-hub-api | xargs oc delete
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteAfter deletion, the Operator automatically creates a new Tekton Hub API installer set.
Wait and check the status of the Tekton Hub. Proceed to the next steps when the
READY
column displaysTrue
.oc get tektonhub hub
$ oc get tektonhub hub
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub 1.8.0 True https://tekton-hub-api-openshift-pipelines.apps.example.com https://tekton-hub-ui-openshift-pipelines.apps.example.com
NAME VERSION READY REASON APIURL UIURL hub 1.8.0 True https://tekton-hub-api-openshift-pipelines.apps.example.com https://tekton-hub-ui-openshift-pipelines.apps.example.com
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Delete the
ConfigMap
object for the Tekton Hub UI.oc delete configmap tekton-hub-ui -n <targetNamespace>
$ oc delete configmap tekton-hub-ui -n <targetNamespace>
1 Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- The common namespace for the Tekton Hub UI and the Tekton Hub CR. By default, the target namespace is
openshift-pipelines
.
Delete the
TektonInstallerSet
object for the Tekton Hub UI.oc get tektoninstallerset -o name | grep tekton-hub-ui | xargs oc delete
$ oc get tektoninstallerset -o name | grep tekton-hub-ui | xargs oc delete
Copy to Clipboard Copied! Toggle word wrap Toggle overflow NoteAfter deletion, the Operator automatically creates a new Tekton Hub UI installer set.
Wait and check the status of the Tekton Hub. Proceed to the next steps when the
READY
column displaysTrue
.oc get tektonhub hub
$ oc get tektonhub hub
Copy to Clipboard Copied! Toggle word wrap Toggle overflow Sample output
NAME VERSION READY REASON APIURL UIURL hub 1.8.0 True https://tekton-hub-api-openshift-pipelines.apps.example.com https://tekton-hub-ui-openshift-pipelines.apps.example.com
NAME VERSION READY REASON APIURL UIURL hub 1.8.0 True https://tekton-hub-api-openshift-pipelines.apps.example.com https://tekton-hub-ui-openshift-pipelines.apps.example.com
Copy to Clipboard Copied! Toggle word wrap Toggle overflow