Skip to content

Commit 1a27617

Browse files
authored
Fix images and markup (#11)
1 parent 925118f commit 1a27617

File tree

4 files changed

+16
-18
lines changed

4 files changed

+16
-18
lines changed

src/content/docs/aws/pro/enterprise-image.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ This offline functionality is enabled by:
2727
- After the image is pushed to the customer-specific ECR repository, the customer can pull and push it to their internal Docker registry.
2828
- Developers within the customer’s network can then pull the image from this registry.
2929
- To use the image from the command line interface (CLI), set the `IMAGE_NAME` configuration to the name of the Enterprise image, typically using the command:
30-
{{< command >}}
30+
31+
```bash
3132
$ IMAGE_NAME=localstack-enterprise localstack start
32-
{{< / command >}}
33+
```

src/content/docs/aws/pro/enterprise-support.md

Lines changed: 2 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,7 @@ Currently, the **customer portal** is only **available to Enterprise customers**
2828

2929
You can find the customer portal here: [https://support.localstack.cloud/portal](https://support.localstack.cloud/portal)
3030

31-
<p>
32-
{{< img src="customer-portal.png" alt="Customer portal for enterprise support" class="img-fluid shadow rounded" width="800px" >}}
33-
</p>
31+
![Customer portal for enterprise support](/images/aws/customer-portal.png)
3432

3533
## Signing up for Enterprise Support
3634

@@ -45,9 +43,7 @@ Once you do so, you will be able to log in and start using the customer portal t
4543
You can open a new ticket with LocalStack support by going to the **Create a Support Ticket** link.
4644
You will be redirected to a form where you will have to provide certain information to file a new support ticket.
4745

48-
<p>
49-
{{< img src="file-a-support-ticket.png" alt="Filing a support ticket" class="img-fluid shadow rounded" width="800px" >}}
50-
</p>
46+
![Filing a support ticket](/images/aws/file-a-support-ticket.png)
5147

5248
The form consists of two parts.
5349
One is basic information, which is mandatory to fill out, and additional information, which adds more context to your issue but is not mandatory.

src/content/docs/aws/pro/k8s-operator.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -15,10 +15,10 @@ The operator is designed to simplify the deployment and management of LocalStack
1515

1616
To install the K8s operator, run the following commands:
1717

18-
{{< command >}}
19-
$ kubectl apply -f https://raw.githubusercontent.com/localstack/localstack-k8s-operator/v0.2.0/release/crds.yaml
20-
$ kubectl apply -f https://raw.githubusercontent.com/localstack/localstack-k8s-operator/v0.2.0/release/controller.yaml
21-
{{< / command >}}
18+
```bash
19+
kubectl apply -f https://raw.githubusercontent.com/localstack/localstack-k8s-operator/v0.2.0/release/crds.yaml
20+
kubectl apply -f https://raw.githubusercontent.com/localstack/localstack-k8s-operator/v0.2.0/release/controller.yaml
21+
```
2222

2323
You can then deploy a LocalStack instance by storing the following file content as `localstack.yml` and applying it against the cluster via `kubectl apply -f localstack.yml`.
2424

src/content/docs/aws/pro/sso.md

Lines changed: 7 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Custom Single-Sign On (SSO) Identity providers, can be enabled to facilitate the
1111
In order to configure SSO access, first sign in to the LocalStack Web application under [app.localstack.cloud](https://app.localstack.cloud/).
1212
In your profile settings, navigate to the Single Sign-on tab which will list existing SSO Identity Providers (if any exist).
1313

14-
<img src="localstack-setting-sso.png" width="800px" alt="Adding SSO Identity providers in LocalStack Settings">
14+
![Adding SSO Identity providers in LocalStack Settings](/images/aws/localstack-setting-sso.png)
1515

1616
Next, click the button to create a new identity provider (IdP), where you can choose between the two leading industry standards:
1717

@@ -26,7 +26,7 @@ In the form illustrated below, you can then enter the main information for the n
2626
- Client ID, Client Secret, Attributes request method, OIDC issues, Authorize scopes, and more.
2727
- You should be able to find these attributes in your OIDC IdP configuration.
2828

29-
<img src="oidc-sso.png" width="600px" alt="Configuring SSO using OpenID Connect (OIDC)">
29+
![Configuring SSO using OpenID Connect (OIDC)](/images/aws/oidc-sso.png)
3030

3131
## Configuring SSO using SAML
3232

@@ -35,7 +35,7 @@ The SAML metadata file can be specified either via URL or via a file upload.
3535

3636
Select **Enable IdP sign out flow** if you want your users to be logged out from our app and your SAML IdP when they log out from your our Web Application.
3737

38-
<img src="saml-sso.png" width="600px" alt="Configuring SSO using SAML">
38+
![Configuring SSO using SAML](/images/aws/saml-sso.png)
3939

4040
## Attribute mapping
4141

@@ -49,7 +49,7 @@ The following user attribute mappings can currently be configured:
4949

5050
The Email should be configured to ensure correct functionality.
5151

52-
<img src="attribute-mapping.png" width="600px" alt="Attribute Mapping">
52+
![Attribute Mapping](/images/aws/attribute-mapping.png)
5353

5454
## Callback URL, Sign Up Portal URL and Identifier (Entity Id)
5555

@@ -60,7 +60,7 @@ After configuring the base details for your Identity Provider (IdP), the followi
6060
- **Sign Up Portal URL**: This is the URL that can be shared with your users to start the SSO signup flow for the LocalStack Web Application.
6161
The format of this endpoint is `https://app.localstack.cloud/auth/sso/<organizationId>/<ssoName>`
6262

63-
<img src="additional-information-page.png" width="600px" alt="Callback URL, Sign Up Portal URL, and Identifier (Entity Id)">
63+
![Callback URL, Sign Up Portal URL, and Identifier (Entity Id)](/images/aws/additional-information-page.png)
6464

6565
## User Roles and Permissions
6666

@@ -70,4 +70,5 @@ For each new member that joins your org, you can specify user roles and permissi
7070
- **Default User Permissions**: Use this to define which permissions should be assigned to users of your organization signing up via SSO.
7171
- Tip: In order to enable self-serve licences (i.e., allowing your users to allocate themselves their own license), make sure to select the **Allow member to issue a license for themselves (or a legacy API key)** permission.
7272

73-
<img src="roles-permissions.png" width="600px" alt="User Roles and Permissions">
73+
74+
![User Roles and Permissions](/images/aws/roles-permissions.png)

0 commit comments

Comments
 (0)