Skip to content

Commit f0258e9

Browse files
authored
Merge pull request #39070 from bmcelvee/osdocs-2869-removing-residual-osd-ifdefs-main-bmcelvee
OSDOCS-2869: Removing some of the residual OSD conditionals froom builds, templates, and contributing
2 parents 4ec42ec + 9ab8ffd commit f0258e9

13 files changed

+15
-40
lines changed

cicd/builds/creating-build-inputs.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -61,7 +61,7 @@ include::modules/builds-adding-input-secrets-configmaps.adoc[leveloffset=+2]
6161

6262
include::modules/builds-source-to-image.adoc[leveloffset=+2]
6363

64-
ifdef::openshift-enterprise,openshift-webscale,openshift-origin,openshift-dedicated[]
64+
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
6565

6666
include::modules/builds-docker-strategy.adoc[leveloffset=+2]
6767

@@ -80,7 +80,7 @@ include::modules/builds-using-secrets-as-environment-variables.adoc[leveloffset=
8080

8181
.Additional resources
8282

83-
* xref:../../cicd/builds/creating-build-inputs.adoc#builds-input-secrets-configmaps_creating-build-inputs[Input secrets and config maps]
83+
* xref:../../cicd/builds/creating-build-inputs.adoc#builds-input-secrets-configmaps_creating-build-inputs[Input secrets and config maps]
8484

8585
include::modules/builds-service-serving-certificate-secrets.adoc[leveloffset=+1]
8686

cicd/builds/setting-up-trusted-ca.adoc

Lines changed: 0 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -24,28 +24,3 @@ include::modules/configmap-adding-ca.adoc[leveloffset=+1]
2424
* link:https://kubectl.docs.kubernetes.io/guides/config_management/secrets_configmaps/[Secrets and `ConfigMaps`]
2525
* xref:../../networking/configuring-a-custom-pki.adoc#configuring-a-custom-pki[Configuring a custom PKI]
2626
endif::[]
27-
28-
29-
ifdef::openshift-dedicated[]
30-
Use the following sections to set up additional certificate authorities (CA) to be trusted by builds when pulling images from an image registry.
31-
32-
The procedure requires a Dedicated administrator to create a `ConfigMap` and add additional CAs as keys in the `ConfigMap`.
33-
34-
* The `ConfigMap` must be created in the `openshift-config` namespace.
35-
* `domain` is the key in the `ConfigMap` and `value` is the PEM-encoded certificate.
36-
** Each CA must be associated with a domain. The domain format is `hostname[..port]`.
37-
* The `ConfigMap` name must be set in the `image.config.openshift.io/cluster` cluster scoped configuration resource's `spec.additionalTrustedCA` field.
38-
//* No longer needs single PEM bundle
39-
40-
[NOTE]
41-
====
42-
{product-title} administrators are required to use the `registry-cas` `ConfigMap`.
43-
====
44-
45-
include::modules/configmap-adding-ca.adoc[leveloffset=+1]
46-
47-
== Additional resources
48-
49-
* link:https://kubernetes.io/docs/tasks/configure-pod-container/configure-pod-configmap/#create-a-configmap[Create a ConfigMap]
50-
* link:https://kubectl.docs.kubernetes.io/guides/config_management/secrets_configmaps/[Secrets and ConfigMaps]
51-
endif::[]

modules/builds-about.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ A build is the process of transforming input parameters into a resulting object.
1212

1313
Build objects share common characteristics including inputs for a build, the requirement to complete a build process, logging the build process, publishing resources from successful builds, and publishing the final status of the build. Builds take advantage of resource restrictions, specifying limitations on resources such as CPU usage, memory usage, and build or pod execution time.
1414

15-
ifdef::openshift-origin,openshift-enterprise,openshift-dedicated[]
15+
ifdef::openshift-origin,openshift-enterprise[]
1616
The {product-title} build system provides extensible support for build strategies that are based on selectable types specified in the build API. There are three primary build strategies available:
1717

1818
* Docker build

modules/builds-basic-access-build-verbosity.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
= Enabling log verbosity
77

88
You can enable a more verbose output by passing the `BUILD_LOGLEVEL` environment variable as part of the `sourceStrategy`
9-
ifdef::openshift-origin,openshift-enterprise,openshift-dedicated[]
9+
ifdef::openshift-origin,openshift-enterprise[]
1010
or `dockerStrategy`
1111
endif::[]
1212
in a `BuildConfig`.

modules/builds-basic-start-source.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
= Starting a build with source
66

77
Rather than relying on a Git source pull
8-
ifdef::openshift-origin,openshift-enterprise,openshift-dedicated[]
8+
ifdef::openshift-origin,openshift-enterprise[]
99
or a Dockerfile
1010
endif::[]
1111
for a build, you can also start a build by directly pushing your source, which could be the contents of a Git or SVN working directory, a set of pre-built binary artifacts you want to deploy, or a single file. This can be done by specifying one of the following options for the `start-build` command:
@@ -34,7 +34,7 @@ Builds triggered from binary input will not preserve the source on the server, s
3434
.Procedure
3535

3636
* Start a build from a source using the following command to send the contents of a local Git repository as an archive from the tag `v2`:
37-
+
37+
+
3838
[source,terminal]
3939
----
4040
$ oc start-build hello-world --from-repo=../hello-world --commit=v2

modules/builds-basic-view-build-details.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This displays information including:
1515
* How the build was created.
1616

1717
If the build uses the
18-
ifdef::openshift-origin,openshift-enterprise,openshift-dedicated[]
18+
ifdef::openshift-origin,openshift-enterprise[]
1919
`Docker` or
2020
endif::[]
2121
`Source` strategy, the `oc describe` output also includes information about the source revision used for the build, including the commit ID, author, committer, and message.

modules/builds-chaining-builds.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ For compiled languages such as Go, C, C++, and Java, including the dependencies
99

1010
To avoid these problems, two builds can be chained together. One build that produces the compiled artifact, and a second build that places that artifact in a separate image that runs the artifact.
1111

12-
ifdef::openshift-enterprise,openshift-webscale,openshift-origin,openshift-dedicated[]
12+
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
1313
In the following example, a source-to-image (S2I) build is combined with a docker build to compile an artifact that is then placed in a separate runtime image.
1414

1515
[NOTE]

modules/builds-docker-source-build-output.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
= Build output
77

88
Builds that use the
9-
ifdef::openshift-enterprise,openshift-webscale,openshift-origin,openshift-dedicated[]
9+
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
1010
docker or
1111
endif::[]
1212
source-to-image (S2I) strategy result in the creation of a new container image. The image is then pushed to the container image registry specified in the `output` section of the `Build` specification.

modules/builds-output-image-environment-variables.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
[id="builds-output-image-environment-variables_{context}"]
66
= Output image environment variables
77

8-
ifdef::openshift-enterprise,openshift-webscale,openshift-origin,openshift-dedicated[]
8+
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
99
docker and
1010
endif::[]
1111
source-to-image (S2I) strategy builds set the following environment variables on output images:
@@ -33,7 +33,7 @@ source-to-image (S2I) strategy builds set the following environment variables on
3333

3434
Additionally, any user-defined environment variable, for example those configured with
3535
S2I]
36-
ifdef::openshift-enterprise,openshift-webscale,openshift-origin,openshift-dedicated[]
36+
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
3737
or docker
3838
endif::[]
3939
strategy options, will also be part of the output image environment variable list.

modules/builds-output-image-labels.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@
55
[id="builds-output-image-labels_{context}"]
66
= Output image labels
77

8-
ifdef::openshift-enterprise,openshift-webscale,openshift-origin,openshift-dedicated[]
8+
ifdef::openshift-enterprise,openshift-webscale,openshift-origin[]
99
docker and
1010
endif::[]
1111
source-to-image (S2I)` builds set the following labels on output images:

0 commit comments

Comments
 (0)