Skip to content

Commit 9f610fc

Browse files
authored
Merge pull request #72069 from kalexand-rh/OSDOCS-9616
OSDOCS#9616: adding link to Software Supply Chain Security doc
2 parents 26959a4 + 247f617 commit 9f610fc

File tree

1 file changed

+3
-5
lines changed

1 file changed

+3
-5
lines changed

welcome/index.adoc

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -206,9 +206,7 @@ xref:../operators/operator_sdk/helm/osdk-helm-support.adoc#osdk-helm-support[Hel
206206
- **Reference the xref:../rest_api/index.adoc#api-index[REST API index]**: Learn about {product-title} application programming interface endpoints.
207207

208208
// Need to provide a link closer to 4.15 GA
209-
- **Software Supply Chain Security enhancements**: The PipelineRun *details* page in the *Developer* or *Administrator* perspective of the web console provides a visual representation of identified vulnerabilities, which are categorized by severity. Additionally, these enhancements provide an option to download or view Software Bill of Materials (SBOMs) for enhanced transparency and control within your supply chain. Learn about setting up OpenShift Pipelines in the web console to view Software Supply Chain Security elements.
210-
211-
//When doc available, add a link to /openshift-pipelines/latest/secure/setting-up-openshift-pipelines-to-view-software-supply-chain-security-elements[Setting up OpenShift Pipelines in the web console to view Software Supply Chain Security elements]
209+
- **Software Supply Chain Security enhancements**: The PipelineRun *details* page in the *Developer* or *Administrator* perspective of the web console provides a visual representation of identified vulnerabilities, which are categorized by severity. Additionally, these enhancements provide an option to download or view Software Bill of Materials (SBOMs) for enhanced transparency and control within your supply chain. Learn about link:https://docs.openshift.com/pipelines/1.13/secure/setting-up-openshift-pipelines-to-view-software-supply-chain-security-elements.html[setting up OpenShift Pipelines in the web console to view Software Supply Chain Security elements].
212210

213211
endif::openshift-enterprise,openshift-webscale,openshift-origin[]
214212
endif::openshift-rosa,openshift-dedicated,openshift-dpu,microshift[]
@@ -339,8 +337,8 @@ ifdef::openshift-enterprise[]
339337
** link:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.9/html/clusters/cluster_mce_overview#hosting-service-cluster-configure-aws[Configuring the hosting cluster on AWS (Technology Preview)]
340338
** link:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.9/html/clusters/cluster_mce_overview#config-hosted-service-ibmpower[Configuring the hosting cluster on a 64-bit x86 {product-title} cluster to create hosted control planes for {ibm-power-name} compute nodes (Technology Preview)]
341339
** link:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.9/html/clusters/cluster_mce_overview#configuring-hosting-service-cluster-ibmz[Configuring the hosted cluster on 64-bit x86 bare metal for {ibm-z-name} compute nodes (Technology Preview)]
342-
// CHECK IN WITH SERVESHA CLOSER TO 4.15 GA ON THE FOLLOWING FEATURE:
343-
// ** Using the Agent-based Installer to provision non-bare-metal machines.
340+
// CHECK IN WITH SERVESHA CLOSER TO 4.15 GA ON THE FOLLOWING FEATURE:
341+
// ** Using the Agent-based Installer to provision non-bare-metal machines.
344342

345343
* **link:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.9/html/clusters/cluster_mce_overview#enable-or-disable-hosted-control-planes[Enabling or disabling the hosted control planes feature]**: The hosted control planes feature is now enabled by default.
346344
endif::openshift-enterprise[]

0 commit comments

Comments
 (0)