Skip to content

Commit 6b00c14

Browse files
author
Michael Burke
committed
OCP content port to ROSA and OSD: Images
1 parent b6ee25a commit 6b00c14

25 files changed

+282
-13
lines changed

_topic_maps/_topic_map_osd.yml

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -331,6 +331,59 @@ Topics:
331331
File: setting-up-trusted-ca
332332
Distros: openshift-dedicated
333333
---
334+
Name: Images
335+
Dir: openshift_images
336+
Distros: openshift-dedicated
337+
Topics:
338+
- Name: Overview of images
339+
File: index
340+
# replaced Configuring the Cluster Samples Operator name, cannot configure the operator
341+
- Name: Overview of the Cluster Samples Operator
342+
File: configuring-samples-operator
343+
Distros: openshift-dedicated
344+
- Name: Using the Cluster Samples Operator with an alternate registry
345+
File: samples-operator-alt-registry
346+
Distros: openshift-dedicated
347+
- Name: Creating images
348+
File: create-images
349+
- Name: Managing images
350+
Dir: managing_images
351+
Topics:
352+
- Name: Managing images overview
353+
File: managing-images-overview
354+
- Name: Tagging images
355+
File: tagging-images
356+
- Name: Image pull policy
357+
File: image-pull-policy
358+
- Name: Using image pull secrets
359+
File: using-image-pull-secrets
360+
- Name: Managing image streams
361+
File: image-streams-manage
362+
Distros: openshift-dedicated
363+
- Name: Using image streams with Kubernetes resources
364+
File: using-imagestreams-with-kube-resources
365+
Distros: openshift-dedicated
366+
- Name: Triggering updates on image stream changes
367+
File: triggering-updates-on-imagestream-changes
368+
Distros: openshift-dedicated
369+
- Name: Image configuration resources
370+
File: image-configuration
371+
Distros: openshift-dedicated
372+
- Name: Using templates
373+
File: using-templates
374+
- Name: Using Ruby on Rails
375+
File: templates-using-ruby-on-rails
376+
- Name: Using images
377+
Dir: using_images
378+
Distros: openshift-dedicated
379+
Topics:
380+
- Name: Using images overview
381+
File: using-images-overview
382+
- Name: Source-to-image
383+
File: using-s21-images
384+
- Name: Customizing source-to-image images
385+
File: customizing-s2i-images
386+
---
334387
Name: Add-on services
335388
Dir: adding_service_cluster
336389
Distros: openshift-dedicated

_topic_maps/_topic_map_rosa.yml

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -484,6 +484,59 @@ Topics:
484484
- Name: Setting up additional trusted certificate authorities for builds
485485
File: setting-up-trusted-ca
486486
Distros: openshift-rosa
487+
---
488+
Name: Images
489+
Dir: openshift_images
490+
Distros: openshift-rosa
491+
Topics:
492+
- Name: Overview of images
493+
File: index
494+
# replaced Configuring the Cluster Samples Operator name, cannot configure the operator
495+
- Name: Overview of the Cluster Samples Operator
496+
File: configuring-samples-operator
497+
Distros: openshift-rosa
498+
- Name: Using the Cluster Samples Operator with an alternate registry
499+
File: samples-operator-alt-registry
500+
Distros: openshift-rosa
501+
- Name: Creating images
502+
File: create-images
503+
- Name: Managing images
504+
Dir: managing_images
505+
Topics:
506+
- Name: Managing images overview
507+
File: managing-images-overview
508+
- Name: Tagging images
509+
File: tagging-images
510+
- Name: Image pull policy
511+
File: image-pull-policy
512+
- Name: Using image pull secrets
513+
File: using-image-pull-secrets
514+
- Name: Managing image streams
515+
File: image-streams-manage
516+
Distros: openshift-rosa
517+
- Name: Using image streams with Kubernetes resources
518+
File: using-imagestreams-with-kube-resources
519+
Distros: openshift-rosa
520+
- Name: Triggering updates on image stream changes
521+
File: triggering-updates-on-imagestream-changes
522+
Distros: openshift-rosa
523+
- Name: Image configuration resources
524+
File: image-configuration
525+
Distros: openshift-rosa
526+
- Name: Using templates
527+
File: using-templates
528+
- Name: Using Ruby on Rails
529+
File: templates-using-ruby-on-rails
530+
- Name: Using images
531+
Dir: using_images
532+
Distros: openshift-rosa
533+
Topics:
534+
- Name: Using images overview
535+
File: using-images-overview
536+
- Name: Source-to-image
537+
File: using-s21-images
538+
- Name: Customizing source-to-image images
539+
File: customizing-s2i-images
487540
---
488541
Name: Add-on services
489542
Dir: adding_service_cluster

modules/images-configuration-allowed.adoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,12 @@ When the `allowedRegistries` parameter is defined, all registries, including the
1818

1919
.Procedure
2020

21-
. Edit the `image.config.openshift.io/cluster` CR:
21+
ifndef::openshift-rosa,openshift-dedicated[]
22+
. Edit the `image.config.openshift.io/cluster` custom resource:
23+
endif::openshift-rosa,openshift-dedicated[]
24+
ifdef::openshift-rosa,openshift-dedicated[]
25+
* Edit the `image.config.openshift.io/cluster` custom resource:
26+
endif::openshift-rosa,openshift-dedicated[]
2227
+
2328
[source,terminal]
2429
----
@@ -61,7 +66,9 @@ Either the `allowedRegistries` parameter or the `blockedRegistries` parameter ca
6166
+
6267
The Machine Config Operator (MCO) watches the `image.config.openshift.io/cluster` resource for any changes to the registries. When the MCO detects a change, it drains the nodes, applies the change, and uncordons the nodes. After the nodes return to the `Ready` state, the allowed registries list is used to update the image signature policy in the `/host/etc/containers/policy.json` file on each node.
6368

69+
ifndef::openshift-rosa,openshift-dedicated[]
6470
. To check that the registries have been added to the policy file, use the following command on a node:
71+
// cannot create resource "namespaces"
6572
+
6673
[source,terminal]
6774
----
@@ -157,6 +164,7 @@ The following policy indicates that only images from the example.com, quay.io, a
157164
}
158165
----
159166
====
167+
endif::openshift-rosa,openshift-dedicated[]
160168
161169
[NOTE]
162170
====

modules/images-configuration-blocked.adoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,12 @@ To prevent pod failure, do not add the `registry.redhat.io` and `quay.io` regist
1818

1919
.Procedure
2020

21-
. Edit the `image.config.openshift.io/cluster` CR:
21+
ifndef::openshift-rosa,openshift-dedicated[]
22+
. Edit the `image.config.openshift.io/cluster` custom resource:
23+
endif::openshift-rosa,openshift-dedicated[]
24+
ifdef::openshift-rosa,openshift-dedicated[]
25+
* Edit the `image.config.openshift.io/cluster` custom resource:
26+
endif::openshift-rosa,openshift-dedicated[]
2227
+
2328
[source,terminal]
2429
----
@@ -58,7 +63,9 @@ Either the `blockedRegistries` registry or the `allowedRegistries` registry can
5863
+
5964
The Machine Config Operator (MCO) watches the `image.config.openshift.io/cluster` resource for any changes to the registries. When the MCO detects a change, it drains the nodes, applies the change, and uncordons the nodes. After the nodes return to the `Ready` state, changes to the blocked registries appear in the `/etc/containers/registries.conf` file on each node.
6065

66+
ifndef::openshift-rosa,openshift-dedicated[]
6167
. To check that the registries have been added to the policy file, use the following command on a node:
68+
// cannot create resource "namespaces"
6269
+
6370
[source,terminal]
6471
----
@@ -77,3 +84,4 @@ unqualified-search-registries = ["registry.access.redhat.com", "docker.io"]
7784
location = "untrusted.com"
7885
blocked = true
7986
----
87+
endif::openshift-rosa,openshift-dedicated[]

modules/images-configuration-cas.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ data:
4040

4141
You can configure additional CAs with the following procedure.
4242

43-
. To configure an additional CA:
43+
* To configure an additional CA:
4444
+
4545
[source,terminal]
4646
----

modules/images-configuration-insecure.adoc

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,12 @@ Insecure external registries should be avoided to reduce possible security risks
1818

1919
.Procedure
2020

21-
. Edit the `image.config.openshift.io/cluster` CR:
21+
ifndef::openshift-rosa,openshift-dedicated[]
22+
. Edit the `image.config.openshift.io/cluster` custom resource:
23+
endif::openshift-rosa,openshift-dedicated[]
24+
ifdef::openshift-rosa,openshift-dedicated[]
25+
* Edit the `image.config.openshift.io/cluster` custom resource:
26+
endif::openshift-rosa,openshift-dedicated[]
2227
+
2328
[source,terminal]
2429
----
@@ -66,7 +71,9 @@ When the `allowedRegistries` parameter is defined, all registries, including the
6671
+
6772
The Machine Config Operator (MCO) watches the `image.config.openshift.io/cluster` CR for any changes to the registries, then drains and uncordons the nodes when it detects changes. After the nodes return to the `Ready` state, changes to the insecure and blocked registries appear in the `/etc/containers/registries.conf` file on each node.
6873

74+
ifndef::openshift-rosa,openshift-dedicated[]
6975
. To check that the registries have been added to the policy file, use the following command on a node:
76+
// cannot create resource "namespaces"
7077
+
7178
[source,terminal]
7279
----
@@ -85,3 +92,4 @@ unqualified-search-registries = ["registry.access.redhat.com", "docker.io"]
8592
location = "insecure.com"
8693
insecure = true
8794
----
95+
endif::openshift-rosa,openshift-dedicated[]

modules/images-configuration-registry-mirror-convert.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,12 @@ For more information about `ImageDigestMirrorSet` or `ImageTagMirrorSet` objects
1616

1717
.Prerequisites
1818

19-
* Ensure that you have access to the cluster as a user with the `cluster-admin` role.
19+
ifndef::openshift-rosa,openshift-dedicated[]
20+
* Access to the cluster as a user with the `cluster-admin` role.
21+
endif::openshift-rosa,openshift-dedicated[]
22+
ifdef::openshift-rosa,openshift-dedicated[]
23+
* Access to the cluster as a user with the `dedicated-admin` role.
24+
endif::openshift-rosa,openshift-dedicated[]
2025

2126
* Ensure that you have `ImageContentSourcePolicy` objects on your cluster.
2227

modules/images-configuration-registry-mirror.adoc

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,12 @@ If your cluster uses an `ImageDigestMirrorSet` or `ImageTagMirrorSet` object to
5757
The following procedure creates a postinstallation mirror configuration, where you create an `ImageDigestMirrorSet` object.
5858

5959
.Prerequisites
60-
* Ensure that you have access to the cluster as a user with the `cluster-admin` role.
60+
ifndef::openshift-rosa,openshift-dedicated[]
61+
* Access to the cluster as a user with the `cluster-admin` role.
62+
endif::openshift-rosa,openshift-dedicated[]
63+
ifdef::openshift-rosa,openshift-dedicated[]
64+
* Access to the cluster as a user with the `dedicated-admin` role.
65+
endif::openshift-rosa,openshift-dedicated[]
6166

6267
* Ensure that there are no `ImageContentSourcePolicy` objects on your cluster. For example, you can use the following command:
6368
+

modules/images-configuration-shortname.adoc

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,12 @@ The `containerRuntimeSearchRegistries` parameter works only with the Podman and
3737

3838
.Procedure
3939

40+
ifndef::openshift-rosa,openshift-dedicated[]
4041
. Edit the `image.config.openshift.io/cluster` custom resource:
42+
endif::openshift-rosa,openshift-dedicated[]
43+
ifdef::openshift-rosa,openshift-dedicated[]
44+
* Edit the `image.config.openshift.io/cluster` custom resource:
45+
endif::openshift-rosa,openshift-dedicated[]
4146
+
4247
[source,terminal]
4348
----
@@ -90,6 +95,7 @@ status:
9095
When the `allowedRegistries` parameter is defined, all registries, including the `registry.redhat.io` and `quay.io` registries and the default {product-registry}, are blocked unless explicitly listed. If you use this parameter, to prevent pod failure, add all registries including the `registry.redhat.io` and `quay.io` registries and the `internalRegistryHostname` to the `allowedRegistries` list, as they are required by payload images within your environment. For disconnected clusters, mirror registries should also be added.
9196
====
9297

98+
ifndef::openshift-rosa,openshift-dedicated[]
9399
. To check that the registries have been added, when a node returns to the `Ready` state, use the following command on the node:
94100
+
95101
[source,terminal]
@@ -102,4 +108,4 @@ $ cat /host/etc/containers/registries.conf.d/01-image-searchRegistries.conf
102108
----
103109
unqualified-search-registries = ['reg1.io', 'reg2.io', 'reg3.io']
104110
----
105-
111+
endif::openshift-rosa,openshift-dedicated[]

modules/images-samples-operator-deprecated-image-stream.adoc

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
// Module included in the following assemblies:
22
//
33
// * openshift_images/configuring-samples-operator.adoc
4+
// * openshift_images/configuring-samples-operator.adoc
45

56

67
:_mod-docs-content-type: PROCEDURE

0 commit comments

Comments
 (0)