Skip to content

Commit 3b31dce

Browse files
authored
Merge pull request #27486 from bergerhoffer/term-updates-security-2
Terminology style updates for the rest of the security book
2 parents 7ccd951 + ad4eb8e commit 3b31dce

32 files changed

+119
-118
lines changed

modules/about-etcd-encryption.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ By default, etcd data is not encrypted in {product-title}. You can enable etcd e
1111
When you enable etcd encryption, the following OpenShift API server and Kubernetes API server resources are encrypted:
1212

1313
* Secrets
14-
* ConfigMaps
14+
* Config maps
1515
* Routes
1616
* OAuth access tokens
1717
* OAuth authorize tokens

modules/auth-allowing-javascript-access-api-server.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ to allow.
1717

1818
.Procedure
1919

20-
. Edit the API servers resource:
20+
. Edit the `APIServer` resource:
2121
+
2222
[source,terminal]
2323
----

modules/builds-adding-input-secrets-configmaps.adoc

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,25 +3,25 @@
33
// * builds/creating-build-inputs.adoc
44

55
[id="builds-adding-input-secrets-configmaps_{context}"]
6-
= Adding input secrets and ConfigMaps
6+
= Adding input secrets and config maps
77

8-
In some scenarios, build operations require credentials or other configuration data to access dependent resources, but it is undesirable for that information to be placed in source control. You can define input secrets and input ConfigMaps for this purpose.
8+
In some scenarios, build operations require credentials or other configuration data to access dependent resources, but it is undesirable for that information to be placed in source control. You can define input secrets and input config maps for this purpose.
99

1010
.Procedure
1111

12-
To add an input secret, ConfigMap, or both to an existing `BuildConfig`:
12+
To add an input secret, config maps, or both to an existing `BuildConfig` object:
1313

14-
. Create the ConfigMap, if it does not exist:
14+
. Create the `ConfigMap` object, if it does not exist:
1515
+
1616
[source,terminal]
1717
----
1818
$ oc create configmap settings-mvn \
1919
--from-file=settings.xml=<path/to/settings.xml>
2020
----
2121
+
22-
This creates a new ConfigMap named `settings-mvn`, which contains the plain text content of the `settings.xml` file.
22+
This creates a new config map named `settings-mvn`, which contains the plain text content of the `settings.xml` file.
2323

24-
. Create the secret, if it does not exist:
24+
. Create the `Secret` object, if it does not exist:
2525
+
2626
[source,terminal]
2727
----
@@ -31,8 +31,8 @@ $ oc create secret generic secret-mvn \
3131
+
3232
This creates a new secret named `secret-mvn`, which contains the base64 encoded content of the `id_rsa` private key.
3333

34-
. Add the ConfigMap and secret to the `source` section in the existing
35-
`BuildConfig`:
34+
. Add the config map and secret to the `source` section in the existing
35+
`BuildConfig` object:
3636
+
3737
[source,yaml]
3838
----
@@ -48,7 +48,7 @@ source:
4848
name: secret-mvn
4949
----
5050

51-
To include the secret and ConfigMap in a new `BuildConfig`, run the following
51+
To include the secret and config map in a new `BuildConfig` object, run the following
5252
command:
5353

5454
[source,terminal]
@@ -77,7 +77,7 @@ source:
7777
destinationDir: ".ssh"
7878
----
7979

80-
You can also specify the destination directory when creating a new `BuildConfig`:
80+
You can also specify the destination directory when creating a new `BuildConfig` object:
8181

8282
[source,terminal]
8383
----

modules/builds-input-secrets-configmaps.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@
33
// * builds/creating-build-inputs.adoc
44

55
[id="builds-input-secrets-configmaps_{context}"]
6-
= Input Secrets and ConfigMaps
6+
= Input secrets and config maps
77

8-
In some scenarios, build operations require credentials or other configuration data to access dependent resources, but it is undesirable for that information to be placed in source control. You can define input secrets and input ConfigMaps for this purpose.
8+
In some scenarios, build operations require credentials or other configuration data to access dependent resources, but it is undesirable for that information to be placed in source control. You can define input secrets and input config maps for this purpose.
99

1010
For example, when building a Java application with Maven, you can set up a private mirror of Maven Central or JCenter that is accessed by private keys. To download libraries from that private mirror, you have to supply the
1111
following:

modules/customize-certificates-add-service-serving-apiservice.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,33 +3,33 @@
33
// * security/certificates/service-serving-certificate.adoc
44

55
[id="add-service-certificate-apiservice_{context}"]
6-
= Add the service CA bundle to an APIService
6+
= Add the service CA bundle to an API service
77

8-
You can annotate an APIService with `service.beta.openshift.io/inject-cabundle=true` to have its `spec.caBundle` field populated with the service CA bundle. This allows the Kubernetes API server to validate the service CA certificate used to secure the targeted endpoint.
8+
You can annotate an `APIService` object with `service.beta.openshift.io/inject-cabundle=true` to have its `spec.caBundle` field populated with the service CA bundle. This allows the Kubernetes API server to validate the service CA certificate used to secure the targeted endpoint.
99

1010
.Procedure
1111

12-
. Annotate the APIService with `service.beta.openshift.io/inject-cabundle=true`:
12+
. Annotate the API service with `service.beta.openshift.io/inject-cabundle=true`:
1313
+
1414
[source,terminal]
1515
----
16-
$ oc annotate apiservice <apiservice-name> \//<1>
16+
$ oc annotate apiservice <api_service_name> \//<1>
1717
service.beta.openshift.io/inject-cabundle=true
1818
----
19-
<1> Replace `<apiservice-name>` with the name of the APIService to annotate.
19+
<1> Replace `<api_service_name>` with the name of the API service to annotate.
2020
+
21-
For example, use the following command to annotate the APIService `foo`:
21+
For example, use the following command to annotate the API service `test1`:
2222
+
2323
[source,terminal]
2424
----
25-
$ oc annotate apiservice foo service.beta.openshift.io/inject-cabundle=true
25+
$ oc annotate apiservice test1 service.beta.openshift.io/inject-cabundle=true
2626
----
2727

28-
. View the APIService to ensure that the service CA bundle has been injected:
28+
. View the API service to ensure that the service CA bundle has been injected:
2929
+
3030
[source,terminal]
3131
----
32-
$ oc get apiservice <apiservice-name> -o yaml
32+
$ oc get apiservice <api_service_name> -o yaml
3333
----
3434
+
3535
The CA bundle is displayed in the `spec.caBundle` field in the YAML output:

modules/customize-certificates-add-service-serving-configmap.adoc

Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -3,51 +3,51 @@
33
// * security/certificates/service-serving-certificate.adoc
44

55
[id="add-service-certificate-configmap_{context}"]
6-
= Add the service CA bundle to a ConfigMap
6+
= Add the service CA bundle to a config map
77

8-
A Pod can access the service CA certificate by mounting a ConfigMap that
8+
A Pod can access the service CA certificate by mounting a `ConfigMap` object that
99
is annotated with `service.beta.openshift.io/inject-cabundle=true`.
1010
Once annotated, the cluster automatically injects the service CA
11-
certificate into the `service-ca.crt` key on the ConfigMap. Access to
11+
certificate into the `service-ca.crt` key on the config map. Access to
1212
this CA certificate allows TLS clients to verify connections to
1313
services using service serving certificates.
1414

1515
[IMPORTANT]
1616
====
17-
After adding this annotation to a ConfigMap all existing data in it is
18-
deleted. It is recommended to use a separate ConfigMap to contain the
19-
`service-ca.crt`, instead of using the same ConfigMap that stores your
20-
Pod's configuration.
17+
After adding this annotation to a config map all existing data in it is
18+
deleted. It is recommended to use a separate config map to contain the
19+
`service-ca.crt`, instead of using the same config map that stores your
20+
pod configuration.
2121
====
2222

2323
.Procedure
2424

25-
. Annotate the ConfigMap with `service.beta.openshift.io/inject-cabundle=true`:
25+
. Annotate the config map with `service.beta.openshift.io/inject-cabundle=true`:
2626
+
2727
[source,terminal]
2828
----
29-
$ oc annotate configmap <configmap-name> \//<1>
29+
$ oc annotate configmap <config_map_name> \//<1>
3030
service.beta.openshift.io/inject-cabundle=true
3131
----
32-
<1> Replace `<configmap-name>` with the name of the ConfigMap to annotate.
32+
<1> Replace `<config_map_name>` with the name of the config map to annotate.
3333
+
3434
[NOTE]
3535
====
36-
Explicitly referencing the `service-ca.crt` key in a volumeMount will prevent a Pod from starting until the ConfigMap has been injected with the CA bundle. This behavior can be overridden by setting the `optional` field to `true` for the volume's serving certificate configuration.
36+
Explicitly referencing the `service-ca.crt` key in a volume mount will prevent a pod from starting until the config map has been injected with the CA bundle. This behavior can be overridden by setting the `optional` field to `true` for the volume's serving certificate configuration.
3737
====
3838
+
39-
For example, use the following command to annotate the ConfigMap `foo`:
39+
For example, use the following command to annotate the config map `test1`:
4040
+
4141
[source,terminal]
4242
----
43-
$ oc annotate configmap foo service.beta.openshift.io/inject-cabundle=true
43+
$ oc annotate configmap test1 service.beta.openshift.io/inject-cabundle=true
4444
----
4545

46-
. View the ConfigMap to ensure that the service CA bundle has been injected:
46+
. View the config map to ensure that the service CA bundle has been injected:
4747
+
4848
[source,terminal]
4949
----
50-
$ oc get configmap <configmap-name> -o yaml
50+
$ oc get configmap <config_map_name> -o yaml
5151
----
5252
+
5353
The CA bundle is displayed as the value of the `service-ca.crt` key in the YAML output:

modules/customize-certificates-add-service-serving-crd.adoc

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@
33
// * security/certificates/service-serving-certificate.adoc
44

55
[id="add-service-certificate-crd_{context}"]
6-
= Add the service CA bundle to a Custom Resource Definition
6+
= Add the service CA bundle to a custom resource definition
77

8-
You can annotate a Custom Resource Definition (CRD) with `service.beta.openshift.io/inject-cabundle=true` to have its `spec.conversion.webhook.clientConfig.caBundle` field populated with the service CA bundle. This allows the Kubernetes API server to validate the service CA certificate used to secure the targeted endpoint.
8+
You can annotate a `CustomResourceDefinition` (CRD) object with `service.beta.openshift.io/inject-cabundle=true` to have its `spec.conversion.webhook.clientConfig.caBundle` field populated with the service CA bundle. This allows the Kubernetes API server to validate the service CA certificate used to secure the targeted endpoint.
99

1010
[NOTE]
1111
====
@@ -18,23 +18,23 @@ The service CA bundle will only be injected into the CRD if the CRD is configure
1818
+
1919
[source,terminal]
2020
----
21-
$ oc annotate crd <crd-name> \//<1>
21+
$ oc annotate crd <crd_name> \//<1>
2222
service.beta.openshift.io/inject-cabundle=true
2323
----
24-
<1> Replace `<crd-name>` with the name of the CRD to annotate.
24+
<1> Replace `<crd_name>` with the name of the CRD to annotate.
2525
+
26-
For example, use the following command to annotate the CRD `foo`:
26+
For example, use the following command to annotate the CRD `test1`:
2727
+
2828
[source,terminal]
2929
----
30-
$ oc annotate crd foo service.beta.openshift.io/inject-cabundle=true
30+
$ oc annotate crd test1 service.beta.openshift.io/inject-cabundle=true
3131
----
3232

3333
. View the CRD to ensure that the service CA bundle has been injected:
3434
+
3535
[source,terminal]
3636
----
37-
$ oc get crd <crd-name> -o yaml
37+
$ oc get crd <crd_name> -o yaml
3838
----
3939
+
4040
The CA bundle is displayed in the `spec.conversion.webhook.clientConfig.caBundle` field in the YAML output:

modules/customize-certificates-add-service-serving-mutating-webhook.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@
33
// * security/certificates/service-serving-certificate.adoc
44

55
[id="add-service-certificate-mutating-webhook_{context}"]
6-
= Add the service CA bundle to a MutatingWebhookConfiguration
6+
= Add the service CA bundle to a mutating webhook configuration
77

8-
You can annotate a MutatingWebhookConfiguration with `service.beta.openshift.io/inject-cabundle=true` to have the `clientConfig.caBundle` field of each webhook populated with the service CA bundle. This allows the Kubernetes API server to validate the service CA certificate used to secure the targeted endpoint.
8+
You can annotate a `MutatingWebhookConfiguration` object with `service.beta.openshift.io/inject-cabundle=true` to have the `clientConfig.caBundle` field of each webhook populated with the service CA bundle. This allows the Kubernetes API server to validate the service CA certificate used to secure the targeted endpoint.
99

1010
[NOTE]
1111
====
@@ -14,27 +14,27 @@ Do not set this annotation for admission webhook configurations that need to spe
1414

1515
.Procedure
1616

17-
. Annotate the MutatingWebhookConfiguration with `service.beta.openshift.io/inject-cabundle=true`:
17+
. Annotate the mutating webhook configuration with `service.beta.openshift.io/inject-cabundle=true`:
1818
+
1919
[source,terminal]
2020
----
21-
$ oc annotate mutatingwebhookconfigurations <mutatingwebhook-name> \//<1>
21+
$ oc annotate mutatingwebhookconfigurations <mutating_webhook_name> \//<1>
2222
service.beta.openshift.io/inject-cabundle=true
2323
----
24-
<1> Replace `<mutatingwebhook-name>` with the name of the MutatingWebhookConfiguration to annotate.
24+
<1> Replace `<mutating_webhook_name>` with the name of the mutating webhook configuration to annotate.
2525
+
26-
For example, use the following command to annotate the MutatingWebhookConfiguration `foo`:
26+
For example, use the following command to annotate the mutating webhook configuration `test1`:
2727
+
2828
[source,terminal]
2929
----
30-
$ oc annotate mutatingwebhookconfigurations foo service.beta.openshift.io/inject-cabundle=true
30+
$ oc annotate mutatingwebhookconfigurations test1 service.beta.openshift.io/inject-cabundle=true
3131
----
3232

33-
. View the MutatingWebhookConfiguration to ensure that the service CA bundle has been injected:
33+
. View the mutating webhook configuration to ensure that the service CA bundle has been injected:
3434
+
3535
[source,terminal]
3636
----
37-
$ oc get mutatingwebhookconfigurations <mutatingwebhook-name> -o yaml
37+
$ oc get mutatingwebhookconfigurations <mutating_webhook_name> -o yaml
3838
----
3939
+
4040
The CA bundle is displayed in the `clientConfig.caBundle` field of all webhooks in the YAML output:

modules/customize-certificates-add-service-serving-validating-webhook.adoc

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@
33
// * security/certificates/service-serving-certificate.adoc
44

55
[id="add-service-certificate-validating-webhook_{context}"]
6-
= Add the service CA bundle to a ValidatingWebhookConfiguration
6+
= Add the service CA bundle to a validating webhook configuration
77

8-
You can annotate a ValidatingWebhookConfiguration with `service.beta.openshift.io/inject-cabundle=true` to have the `clientConfig.caBundle` field of each webhook populated with the service CA bundle. This allows the Kubernetes API server to validate the service CA certificate used to secure the targeted endpoint.
8+
You can annotate a `ValidatingWebhookConfiguration` object with `service.beta.openshift.io/inject-cabundle=true` to have the `clientConfig.caBundle` field of each webhook populated with the service CA bundle. This allows the Kubernetes API server to validate the service CA certificate used to secure the targeted endpoint.
99

1010
[NOTE]
1111
====
@@ -14,27 +14,27 @@ Do not set this annotation for admission webhook configurations that need to spe
1414

1515
.Procedure
1616

17-
. Annotate the ValidatingWebhookConfiguration with `service.beta.openshift.io/inject-cabundle=true`:
17+
. Annotate the validating webhook configuration with `service.beta.openshift.io/inject-cabundle=true`:
1818
+
1919
[source,terminal]
2020
----
21-
$ oc annotate validatingwebhookconfigurations <validatingwebhook-name> \//<1>
21+
$ oc annotate validatingwebhookconfigurations <validating_webhook_name> \//<1>
2222
service.beta.openshift.io/inject-cabundle=true
2323
----
24-
<1> Replace `<validatingwebhook-name>` with the name of the ValidatingWebhookConfiguration to annotate.
24+
<1> Replace `<validating_webhook_name>` with the name of the validating webhook configuration to annotate.
2525
+
26-
For example, use the following command to annotate the ValidatingWebhookConfiguration `foo`:
26+
For example, use the following command to annotate the validating webhook configuration `test1`:
2727
+
2828
[source,terminal]
2929
----
30-
$ oc annotate validatingwebhookconfigurations foo service.beta.openshift.io/inject-cabundle=true
30+
$ oc annotate validatingwebhookconfigurations test1 service.beta.openshift.io/inject-cabundle=true
3131
----
3232

33-
. View the ValidatingWebhookConfiguration to ensure that the service CA bundle has been injected:
33+
. View the validating webhook configuration to ensure that the service CA bundle has been injected:
3434
+
3535
[source,terminal]
3636
----
37-
$ oc get validatingwebhookconfigurations <validatingwebhook-name> -o yaml
37+
$ oc get validatingwebhookconfigurations <validating_webhook_name> -o yaml
3838
----
3939
+
4040
The CA bundle is displayed in the `clientConfig.caBundle` field of all webhooks in the YAML output:

modules/customize-certificates-add-service-serving.adoc

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -26,36 +26,36 @@ internal communications.
2626
+
2727
[source,terminal]
2828
----
29-
$ oc annotate service <service-name> \//<1>
30-
service.beta.openshift.io/serving-cert-secret-name=<secret-name> //<2>
29+
$ oc annotate service <service_name> \//<1>
30+
service.beta.openshift.io/serving-cert-secret-name=<secret_name> //<2>
3131
----
32-
<1> Replace `<service-name>` with the name of the service to secure.
33-
<2> `<secret-name>` will be the name of the generated secret containing the
32+
<1> Replace `<service_name>` with the name of the service to secure.
33+
<2> `<secret_name>` will be the name of the generated secret containing the
3434
certificate and key pair. For convenience, it is recommended that this
35-
be the same as `<service-name>`.
35+
be the same as `<service_name>`.
3636
+
37-
For example, use the following command to annotate the service `foo`:
37+
For example, use the following command to annotate the service `test1`:
3838
+
3939
[source,terminal]
4040
----
41-
$ oc annotate service foo service.beta.openshift.io/serving-cert-secret-name=foo
41+
$ oc annotate service test1 service.beta.openshift.io/serving-cert-secret-name=test1
4242
----
4343

4444
. Examine the service to confirm that the annotations are present:
4545
+
4646
[source,terminal]
4747
----
48-
$ oc describe service <service-name>
48+
$ oc describe service <service_name>
4949
----
5050
+
5151
.Example output
5252
[source,terminal]
5353
----
5454
...
55-
Annotations: service.beta.openshift.io/serving-cert-secret-name: <service-name>
55+
Annotations: service.beta.openshift.io/serving-cert-secret-name: <service_name>
5656
service.beta.openshift.io/serving-cert-signed-by: openshift-service-serving-signer@1556850837
5757
...
5858
----
5959

60-
. After the cluster generates a secret for your service, your PodSpec can
61-
mount it, and the Pod will run after it becomes available.
60+
. After the cluster generates a secret for your service, your `Pod` spec can
61+
mount it, and the pod will run after it becomes available.

0 commit comments

Comments
 (0)