Skip to content

Commit 5313c52

Browse files
authored
Merge pull request #47705 from rh-tokeefe/OSSMDOC-627
OSSMDOC-627: Remove duplicate ID
2 parents 71e2674 + 627e261 commit 5313c52

File tree

4 files changed

+9
-12
lines changed

4 files changed

+9
-12
lines changed

modules/ossm-security-cert-manage-1x.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
// * service_mesh/v1x/ossm-security.adoc
44

55

6-
[id="ossm-cert-manage_{context}"]
6+
[id="ossm-cert-manage-1x_{context}"]
77
= Adding an external certificate authority key and certificate
88

99
By default, {SMProductName} generates self-signed root certificate and key, and uses them to sign the workload certificates. You can also use the user-defined certificate and key to sign workload certificates, with user-defined root certificate. This task demonstrates an example to plug certificates and key into {SMProductShortName}.
@@ -14,7 +14,7 @@ By default, {SMProductName} generates self-signed root certificate and key, and
1414
* This example uses the certificates from the link:https://github.com/maistra/istio/tree/maistra-2.0/samples/certs[Maistra repository]. For production, use your own certificates from your certificate authority.
1515
* You must deploy the Bookinfo sample application to verify the results with these instructions.
1616

17-
[id="ossm-cert-manage-add-cert-key_{context}"]
17+
[id="ossm-cert-manage-add-cert-key-1x_{context}"]
1818
== Adding an existing certificate and key
1919

2020
To use an existing signing (CA) certificate and key, you must create a chain of trust file that includes the CA certificate, key, and root certificate. You must use the following exact file names for each of the corresponding certificates. The CA certificate is called `ca-cert.pem`, the key is `ca-key.pem`, and the root certificate, which signs `ca-cert.pem`, is called `root-cert.pem`. If your workload uses intermediate certificates, you must specify them in a `cert-chain.pem` file.
@@ -52,7 +52,7 @@ spec:
5252
$ oc delete secret istio.default
5353
----
5454

55-
[id="ossm-cert-manage-verify-cert_{context}"]
55+
[id="ossm-cert-manage-verify-cert-1x_{context}"]
5656
== Verifying your certificates
5757

5858
Use the Bookinfo sample application to verify your certificates are mounted correctly. First, retrieve the mounted certificates. Then, verify the certificates mounted on the pod.
@@ -141,7 +141,7 @@ $ openssl verify -CAfile <(cat <path>/ca-cert.pem <path>/root-cert.pem) /tmp/pod
141141
/tmp/pod-cert-chain-workload.pem: OK
142142
----
143143

144-
[id="ossm-cert-cleanup_{context}"]
144+
[id="ossm-cert-cleanup-1x_{context}"]
145145
== Removing the certificates
146146

147147
To remove the certificates you added, follow these steps.

modules/ossm-security-cert-manage.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ spec:
5252
+
5353
[source,terminal]
5454
----
55-
$ $ oc -n istio-system delete pods -l 'app in (istiod,istio-ingressgateway, istio-egressgateway)'
55+
$ oc -n istio-system delete pods -l 'app in (istiod,istio-ingressgateway, istio-egressgateway)'
5656
----
5757
+
5858
The Operator will automatically recreate the pods after they have been deleted.

modules/ossm-security-mtls-1x.adoc

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -70,14 +70,11 @@ If your environment has specific requirements for encrypted traffic in your serv
7070

7171
[source,yaml]
7272
----
73-
apiVersion: maistra.io/v2
73+
apiVersion: maistra.io/v1
7474
kind: ServiceMeshControlPlane
75-
metadata:
76-
name: basic-install
77-
namespace: istio-system
7875
spec:
79-
security:
80-
controlPlane:
76+
istio:
77+
global:
8178
tls:
8279
minProtocolVersion: TLSv1_2
8380
maxProtocolVersion: TLSv1_3

service_mesh/v1x/ossm-security.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,4 +14,4 @@ include::modules/ossm-security-mtls-1x.adoc[leveloffset=+1]
1414

1515
include::modules/ossm-security-cipher-1x.adoc[leveloffset=+1]
1616

17-
include::modules/ossm-security-cert-manage.adoc[leveloffset=+1]
17+
include::modules/ossm-security-cert-manage-1x.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)