You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: builds/advanced-build-operations.adoc
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,8 +8,6 @@ The following sections provide instructions for advanced build operations includ
8
8
setting build resources and maximum duration, assigning builds to nodes, chaining
9
9
builds, build pruning, and build run policies.
10
10
11
-
// The following include statements pull in the module files that comprise the assembly. Include any combination of concept, procedure, or reference modules required to cover the user story. You can also include other assemblies.
The following sections provide instructions for basic build operations including
8
-
starting and canceling builds, deleting BuildConfigs, viewing build details, and
9
-
accessing build logs.
10
-
11
-
// The following include statements pull in the module files that comprise the assembly. Include any combination of concept, procedure, or reference modules required to cover the user story. You can also include other assemblies.
7
+
The following sections provide instructions for basic build operations including starting and canceling builds, deleting BuildConfigs, viewing build details, and accessing build logs.
Builds in {product-title} are run in privileged containers. Depending on the
8
-
build strategy used, this allows a user who can run builds to escalate their
9
-
permissions on the cluster and host nodes. As a security measure, limit who can
10
-
run builds and the strategy that is used for those builds. Custom builds are
11
-
inherently less safe than Source builds, because they can execute any code
12
-
within a privileged container, and are disabled by default. Grant Docker build
13
-
permissions with caution, because a vulnerability in the Dockerfile processing
14
-
logic could result in a privileges being granted on the host node.
15
-
16
-
By default, all users that can create builds are granted permission to use the
17
-
Docker and Source-to-Image (S2I) build strategies. Users with *cluster-admin*
18
-
privileges can enable the Custom build strategy, as referenced in the
19
-
restricting build strategies to a user globally section.
20
-
21
-
You can control who can build and which build strategies they can use by using
22
-
an authorization policy. Each build strategy has a corresponding build
23
-
subresource. A user must have permission to create a build _and_ permission to
24
-
create on the build strategy subresource in order to create builds using that
25
-
strategy. Default roles are provided which grant the *create* permission on the
26
-
build strategy subresource.
7
+
Builds in {product-title} are run in privileged containers. Depending on the build strategy used, if you have privileges, you can run builds to escalate their permissions on the cluster and host nodes. And as a security measure, it limits who can run builds and the strategy that is used for those builds. Custom builds are inherently less safe than source builds, because they can execute any code within a privileged container, and are disabled by default. Grant docker build permissions with caution, because a vulnerability in the Dockerfile processing logic could result in a privileges being granted on the host node.
8
+
9
+
By default, all users that can create builds are granted permission to use the docker and Source-to-image (S2I) build strategies. Users with cluster administrator privileges can enable the custom build strategy, as referenced in the restricting build strategies to a user globally section.
10
+
11
+
You can control who can build and which build strategies they can use by using an authorization policy. Each build strategy has a corresponding build subresource. A user must have permission to create a build and permission to create on the build strategy subresource to create builds using that strategy. Default roles are provided that grant the create permission on the build strategy subresource.
Use the following sections to set up additional certificate authorities (CA) to be trusted by builds when pulling images
9
-
from an image registry.
8
+
Use the following sections to set up additional certificate authorities (CA) to be trusted by builds when pulling images from an image registry.
10
9
11
-
The procedure requires a cluster administrator to create a ConfigMap and add additional CAs as keys in the ConfigMap.
10
+
The procedure requires a cluster administrator to create a `ConfigMap` and add additional CAs as keys in the `ConfigMap`.
12
11
13
-
* The ConfigMap must be created in the `openshift-config` namespace.
14
-
* `domain` is the key in the ConfigMap; `value` is the PEM-encoded certificate.
12
+
* The `ConfigMap` must be created in the `openshift-config` namespace.
13
+
* `domain` is the key in the `ConfigMap` and `value` is the PEM-encoded certificate.
15
14
** Each CA must be associated with a domain. The domain format is `hostname[..port]`.
16
-
* The ConfigMap name must be set in the `image.config.openshift.io/cluster` cluster scoped configuration resource's `spec.additionalTrustedCA` field.
15
+
* The `ConfigMap` name must be set in the `image.config.openshift.io/cluster` cluster scoped configuration resource's `spec.additionalTrustedCA` field.
* link:https://kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/#create-a-configmap[Create a ConfigMap]
24
-
* link:https://kubectl.docs.kubernetes.io/pages/app_management/secrets_and_configmaps.html[Secrets and ConfigMaps]
22
+
* link:https://kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/#create-a-configmap[Create a `ConfigMap`]
23
+
* link:https://kubectl.docs.kubernetes.io/guides/config_management/secrets_configmaps/[Secrets and `ConfigMaps`]
25
24
* xref:../networking/configuring-a-custom-pki.adoc#configuring-a-custom-pki[Configuring a custom PKI]
26
25
endif::[]
26
+
27
+
27
28
ifdef::openshift-dedicated[]
28
-
Use the following sections to set up additional certificate authorities (CA) to be trusted by builds when pulling images
29
-
from an image registry.
29
+
Use the following sections to set up additional certificate authorities (CA) to be trusted by builds when pulling images from an image registry.
30
30
31
-
The procedure requires a Dedicated administrator to create a ConfigMap and add additional CAs as keys in the ConfigMap.
31
+
The procedure requires a Dedicated administrator to create a `ConfigMap` and add additional CAs as keys in the `ConfigMap`.
32
32
33
-
* The ConfigMap must be created in the `openshift-config` namespace.
34
-
* `domain` is the key in the ConfigMap; `value` is the PEM-encoded certificate.
33
+
* The `ConfigMap` must be created in the `openshift-config` namespace.
34
+
* `domain` is the key in the `ConfigMap` and `value` is the PEM-encoded certificate.
35
35
** Each CA must be associated with a domain. The domain format is `hostname[..port]`.
36
-
* The ConfigMap name must be set in the `image.config.openshift.io/cluster` cluster scoped configuration resource's `spec.additionalTrustedCA` field.
36
+
* The `ConfigMap` name must be set in the `image.config.openshift.io/cluster` cluster scoped configuration resource's `spec.additionalTrustedCA` field.
37
37
//* No longer needs single PEM bundle
38
38
39
39
[NOTE]
40
40
====
41
-
{product-title} administrators are required to use the `registry-cas` ConfigMap.
41
+
{product-title} administrators are required to use the `registry-cas` `ConfigMap`.
The following sections outline how to trigger builds and modify builds using
8
-
build hooks.
9
-
10
-
// The following include statements pull in the module files that comprise the assembly. Include any combination of concept, procedure, or reference modules required to cover the user story. You can also include other assemblies.
7
+
The following sections outline how to trigger builds and modify builds using build hooks.
0 commit comments