Skip to content

Commit 8b5ca7b

Browse files
authored
Merge pull request #44817 from rolfedh/RHDEVDOCS-3995
RHDEVDOCS-3995 Remove `[role="_abstract"]` and other cruft
2 parents e10aa66 + b5e8379 commit 8b5ca7b

File tree

3 files changed

+1
-15
lines changed

3 files changed

+1
-15
lines changed

modules/builds-adding-input-secrets-configmaps.adoc

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,15 +1,7 @@
1-
// Module included in the following assemblies:
2-
//
3-
// * cicd/builds/creating-build-inputs.adoc
4-
// * cicd/builds/builds-using-build-volumes.adoc
5-
6-
:_module-type: PROCEDURE
7-
81
:_content-type: PROCEDURE
92
[id="builds-adding-input-secrets-configmaps_{context}"]
103
= Adding input secrets and config maps
114

12-
[role="_abstract"]
135
To provide credentials and other configuration data to a build without placing them in source control, you can define input secrets and input config maps.
146

157
In some scenarios, build operations require credentials or other configuration data to access dependent resources. To make that information available without placing it in source control, you can define input secrets and input config maps.

modules/builds-running-entitled-builds-with-sharedsecret-objects.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
1-
// Used in cicd/builds/running-entitled-builds.adoc
2-
1+
:_content-type: PROCEDURE
32
[id="builds-running-entitled-builds-with-sharedsecret-objects_{context}"]
43
= Running entitled builds using SharedSecret objects
54

6-
[role="_abstract"]
75
You can configure and perform a build in one namespace that securely uses RHEL entitlements from a `Secret` object in another namespace.
86

97
You can still access RHEL entitlements from OpenShift Builds by creating a `Secret` object with your subscription credentials in the same namespace as your `Build` object. However, now, in {product-title} 4.10 and later, you can access your credentials and certificates from a `Secret` object in one of the {product-title} system namespaces. You run entitled builds with a CSI volume mount of a `SharedSecret` custom resource (CR) instance that references the `Secret` object.

modules/builds-using-build-volumes.adoc

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,14 @@
1-
:_module-type: PROCEDURE
2-
31
ifeval::["{context}" == "build-strategies-docker"]
42
:dockerstrategy:
53
endif::[]
64
ifeval::["{context}" == "build-strategies-s2i"]
75
:sourcestrategy:
86
endif::[]
97

10-
118
:_content-type: PROCEDURE
129
[id="builds-using-build-volumes_{context}"]
1310
= Using build volumes
1411

15-
[role="_abstract"]
1612
You can mount build volumes to give running builds access to information that you don't want to persist in the output container image.
1713

1814
Build volumes provide sensitive information, such as repository credentials, that the build environment or configuration only needs at build time. Build volumes are different from xref:../../cicd/builds/creating-build-inputs.adoc#builds-define-build-inputs_creating-build-inputs[build inputs], whose data can persist in the output container image.

0 commit comments

Comments
 (0)