Skip to content

Commit 37b1766

Browse files
authored
Merge pull request #87951 from mramendi/RHDEVDOCS-6363
RHDEVDOCS 6363 fix broken links - Pipelines
2 parents ab7dee0 + 03bc776 commit 37b1766

10 files changed

+24
-19
lines changed

create/creating-applications-with-cicd-pipelines.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ include::modules/op-mirroring-images-to-run-pipelines-in-restricted-environment.
4747

4848
* link:https://docs.openshift.com/container-platform/latest/openshift_images/configuring-samples-operator.html#samples-operator-restricted-network-install[Configuring Samples Operator for a restricted cluster]
4949

50-
* link:https://docs.openshift.com/container-platform/latest/installing/disconnected_install/installing-mirroring-installation-images.html#installation-about-mirror-registry_installing-mirroring-installation-images[Creating a cluster with a mirrored registry]
50+
* link:https://docs.openshift.com/container-platform/4.17/disconnected/mirroring/index.html[About disconnected installation mirroring]
5151

5252
include::modules/op-running-a-pipeline.adoc[leveloffset=+1]
5353

@@ -72,7 +72,7 @@ include::modules/op-enabling-monitoring-of-event-listeners-for-triggers-for-user
7272
[id="additional-resources-enabling-monitoring_{context}"]
7373
.Additional resources
7474

75-
* link:https://docs.openshift.com/container-platform/latest/monitoring/enabling-monitoring-for-user-defined-projects.html[Enabling monitoring for user-defined projects]
75+
* link:https://docs.openshift.com/container-platform/latest/observability/monitoring/enabling-monitoring-for-user-defined-projects.html[Enabling monitoring for user-defined projects]
7676

7777
include::modules/op-configuring-pull-request-capabilities-in-GitHub-interceptor.adoc[leveloffset=+1]
7878

install_config/installing-pipelines.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ This guide walks cluster administrators through the process of installing the {p
1616
* You have access to an {OCP} cluster using an account with `cluster-admin` permissions.
1717
* You have installed `oc` CLI.
1818
* You have installed xref:../tkn_cli/installing-tkn.adoc#installing-tkn[{pipelines-shortname} (`tkn`) CLI] on your local system.
19-
* Your cluster has the link:https://docs.openshift.com/container-platform/latest/installing/cluster-capabilities.html#marketplace-operator_cluster-capabilities[Marketplace capability] enabled or the Red Hat Operator catalog source configured manually.
19+
* Your cluster has the link:https://docs.openshift.com/container-platform/latest/installing/overview/cluster-capabilities.html#marketplace-operator_cluster-capabilities[Marketplace capability] enabled or the Red{nbsp}Hat Operator catalog source configured manually.
2020

2121
[NOTE]
2222
====
@@ -50,4 +50,4 @@ include::modules/op-pipelines-operator-in-restricted-environment.adoc[leveloffse
5050

5151
** link:https://docs.openshift.com/container-platform/latest/openshift_images/configuring-samples-operator.html#samples-operator-restricted-network-install[Configuring Samples Operator for a restricted cluster]
5252

53-
** link:https://docs.openshift.com/container-platform/latest/installing/disconnected_install/installing-mirroring-installation-images.html#installation-about-mirror-registry_installing-mirroring-installation-images[Creating a cluster with a mirrored registry]
53+
** link:https://docs.openshift.com/container-platform/4.17/disconnected/mirroring/index.html[About disconnected installation mirroring]

modules/op-chains-signing-secrets-cosign.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ You can use the `cosign` signing scheme with {tekton-chains} using the `cosign`
1010

1111
.Prerequisites
1212

13-
* You installed the link:https://docs.sigstore.dev/cosign/installation/[cosign] tool.
13+
* You installed the Cosign tool. For information about installing the Cosign tool, see the link:https://docs.sigstore.dev/cosign/system_config/installation/[Sigstore documentation for Cosign].
1414

1515
.Procedure
1616

modules/op-creating-and-verifying-task-run-signatures-without-any-additional-authentication.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ Ensure that the following components are installed on the cluster:
1919

2020
* {pipelines-title} Operator
2121
* {tekton-chains}
22-
* link:https://docs.sigstore.dev/cosign/installation/[Cosign]
22+
* link:https://docs.sigstore.dev/cosign/system_config/installation/[Cosign]
2323
2424
.Procedure
2525

modules/op-creating-repository-cr.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ EOF
2121
----
2222
<1> `my-pipeline-ci` is the target namespace.
2323

24-
Whenever there is an event coming from the URL such as `https://github.com/<repository>/<project>`, {pac} matches it and then starts checking out the content of the `<repository>/<project>` repository for pipeline run to match the content in the `.tekton/` directory.
24+
Whenever there is an event coming from the URL such as `\https://github.com/<repository>/<project>`, {pac} matches it and then starts checking out the content of the `<repository>/<project>` repository for the pipeline run to match the content in the `.tekton/` directory.
2525

2626
[NOTE]
2727
====

modules/op-setting-up-openshift-pipelines-to-download-or-view-sboms.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -72,8 +72,8 @@ spec:
7272
...
7373
spec:
7474
tasks:
75-
- name: sbom-task
76-
taskRef:
75+
- name: sbom-task
76+
taskRef:
7777
name: sbom-task # <1>
7878
results:
7979
- name: IMAGE_URL # <2>
@@ -109,7 +109,7 @@ spec:
109109

110110
.Prerequisites
111111

112-
* You have installed the link:https://redhat-appstudio.github.io/docs.appstudio.io/Documentation/main/how-to-guides/Secure-your-supply-chain/proc_inspect_sbom/[Cosign] CLI tool.
112+
* You have installed the Cosign CLI tool. For information about installing the Cosign tool, see the link:https://docs.sigstore.dev/cosign/system_config/installation/[Sigstore documentation for Cosign].
113113

114114
* You have set up {pipelines-shortname} to download or view SBOMs.
115115

@@ -182,4 +182,4 @@ This information helps you verify that individual libraries are safely-sourced,
182182
"name": "syft:package:foundBy",
183183
"value": "python-package-cataloger"
184184
...
185-
----
185+
----

modules/op-supported-parameters-tekton-chains-configuration.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -109,7 +109,7 @@ Cluster administrators can use various supported parameter keys and values to co
109109

110110
| `signers.kms.kmsref`
111111
| The URI reference to a KMS service to use in `kms` signers.
112-
| Supported schemes: `gcpkms://`, `awskms://`, `azurekms://`, `hashivault://`. See link:https://docs.sigstore.dev/cosign/kms_support[KMS Support] in the Sigstore documentation for more details.
112+
| Supported schemes: `gcpkms://`, `awskms://`, `azurekms://`, `hashivault://`. See link:https://docs.sigstore.dev/cosign/key_management/overview/#providers[Providers] in the Sigstore documentation for more details.
113113
|
114114
|===
115115

@@ -139,8 +139,8 @@ Cluster administrators can use various supported parameter keys and values to co
139139

140140
| `builddefinition.buildtype`
141141
| The build type for in-toto attestation. When this parameter is `\https://tekton.dev/chains/v2/slsa`, {tekton-chains} records in-toto attestations in strict conformance with the SLSA v1.0 specification. When this parameter is `\https://tekton.dev/chains/v2/slsa-tekton`, {tekton-chains} records in-toto attestations with additional information, such as the labels and annotations in each `TaskRun` and `PipelineRun` object, and also adds each task in a `PipelineRun` object under `resolvedDependencies`.
142-
| `https://tekton.dev/chains/v2/slsa`,`https://tekton.dev/chains/v2/slsa-tekton`
143-
| `https://tekton.dev/chains/v2/slsa`
142+
| `\https://tekton.dev/chains/v2/slsa`,`\https://tekton.dev/chains/v2/slsa-tekton`
143+
| `\https://tekton.dev/chains/v2/slsa`
144144

145145

146146
|===

modules/op-using-remote-task-annotations-with-pipelines-as-code.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -76,9 +76,9 @@ To include remote tasks, refer to the following examples of annotation:
7676
====
7777
* If you use GitHub and the remote task URL uses the same host as the `Repository` custom resource definition (CRD), {pac} uses the GitHub token and fetches the URL using the GitHub API.
7878
+
79-
For example, if you have a repository URL similar to `https://github.com/<organization>/<repository>` and the remote HTTP URL references a GitHub blob similar to `https://github.com/<organization>/<repository>/blob/<mainbranch>/<path>/<file>`, {pac} fetches the task definition files from that private repository with the GitHub App token.
79+
For example, if you have a repository URL similar to `\https://github.com/<organization>/<repository>` and the remote HTTP URL references a GitHub blob similar to `\https://github.com/<organization>/<repository>/blob/<mainbranch>/<path>/<file>`, {pac} fetches the task definition files from that private repository with the GitHub App token.
8080
+
81-
When you work on a public GitHub repository, {pac} acts similarly for a GitHub raw URL such as `https://raw.githubusercontent.com/<organization>/<repository>/<mainbranch>/<path>/<file>`.
81+
When you work on a public GitHub repository, {pac} acts similarly for a GitHub raw URL such as `\https://raw.githubusercontent.com/<organization>/<repository>/<mainbranch>/<path>/<file>`.
8282
8383
8484
* GitHub App tokens are scoped to the owner or organization where the repository is located. When you use the GitHub webhook method, you can fetch any private or public repository on any organization where the personal token is allowed.

modules/op-using-tekton-chains-to-sign-and-verify-image-and-provenance.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,12 +15,12 @@ Cluster administrators can use {tekton-chains} to sign and verify images and pro
1515
* Verify the signed image and the signed provenance.
1616
1717
.Prerequisites
18-
Ensure that the following are installed on the cluster:
18+
Ensure that the following tools are installed on the cluster:
1919

2020
* {pipelines-title} Operator
2121
* {tekton-chains}
22-
* link:https://docs.sigstore.dev/cosign/installation/[Cosign]
23-
* link:https://docs.sigstore.dev/rekor/installation/[Rekor]
22+
* link:https://docs.sigstore.dev/cosign/system_config/installation/[Cosign]
23+
* link:https://docs.sigstore.dev/logging/installation/[Rekor]
2424
* link:https://stedolan.github.io/jq/[jq]
2525
2626
.Procedure

records/viewing-pipeline-logs-using-the-openshift-logging-operator.adoc

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,10 +23,15 @@ Before trying to view pipeline logs in a Kibana dashboard, ensure the following:
2323

2424
include::modules/op-viewing-pipeline-logs-in-kibana.adoc[leveloffset=+1]
2525

26+
////
27+
COMMENTED OUT BECAUSE THE LINKS ARE INVALID FOR NOW
28+
2629
[role="_additional-resources"]
2730
[id="additional-resources_viewing-pipeline-logs-using-the-openshift-logging-operator"]
2831
== Additional resources
2932
3033
* link:https://docs.openshift.com/container-platform/latest/logging/cluster-logging-deploying.html[Installing OpenShift Logging]
3134
* link:https://docs.openshift.com/container-platform/latest/logging/viewing-resource-logs.html[Viewing logs for a resource]
3235
* link:https://docs.openshift.com/container-platform/latest/logging/cluster-logging-visualizer.html[Viewing cluster logs by using Kibana]
36+
37+
////

0 commit comments

Comments
 (0)