Skip to content

Commit 690fa34

Browse files
committed
Added Chris's image topics to the map
1 parent f4f707d commit 690fa34

14 files changed

+48
-109
lines changed

_topic_map.yml

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,12 @@ Name: Images
143143
Dir: openshift_images
144144
Distros: openshift-*
145145
Topics:
146+
- Name: Understand containers, images and image streams
147+
File: images-understand
148+
- Name: Creating images
149+
File: images-create
150+
- Name: Managing image streams
151+
File: image-streams-manage
146152
- Name: Using templates
147153
File: using-templates
148154
- Name: Using Ruby on Rails

applications/operator_sdk/osdk-ansible.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,6 @@ include::modules/osdk-ansible-managing-cr-status.adoc[leveloffset=+1]
4747
== Additional resources
4848

4949
- See
50-
xref:../applications/operator_sdk/osdk-appendices.adoc#osdk-project-scaffolding-layout_operator-appendices[Appendices]
50+
xref:../../applications/operator_sdk/osdk-appendices.adoc#osdk-project-scaffolding-layout_operator-appendices[Appendices]
5151
to learn about the project directory structures created by the Operator SDK.
5252
- link:https://blog.openshift.com/reaching-for-the-stars-with-ansible-operator/[Reaching for the Stars with Ansible Operator] - Red Hat OpenShift Blog

applications/operator_sdk/osdk-getting-started.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ include::modules/managing-memcached-operator-using-olm.adoc[leveloffset=+1]
2323
== Additional resources
2424

2525
- See
26-
xref:../applications/operator_sdk/osdk-appendices.adoc#osdk-project-scaffolding-layout_operator-appendices[Appendices]
26+
xref:../../applications/operator_sdk/osdk-appendices.adoc#osdk-project-scaffolding-layout_operator-appendices[Appendices]
2727
to learn about the project directory structures created by the Operator SDK.
2828

2929
ifdef::openshift-origin[]

applications/operator_sdk/osdk-helm.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,5 +19,5 @@ include::modules/osdk-building-helm-operator.adoc[leveloffset=+1]
1919
== Additional resources
2020

2121
- See
22-
xref:../applications/operator_sdk/osdk-appendices.adoc#osdk-project-scaffolding-layout_operator-appendices[Appendices]
22+
xref:../../applications/operator_sdk/osdk-appendices.adoc#osdk-project-scaffolding-layout_operator-appendices[Appendices]
2323
to learn about the project directory structures created by the Operator SDK.

modules/image-stream-configure.adoc

Lines changed: 8 additions & 35 deletions
Original file line numberDiff line numberDiff line change
@@ -10,13 +10,6 @@ ifdef::openshift-origin,openshift-online,openshift-enterprise,openshift-dedicate
1010
An image stream object file contains the following elements.
1111
endif::openshift-origin,openshift-online,openshift-enterprise,openshift-dedicated[]
1212

13-
ifdef::openshift-origin,openshift-online,openshift-enterprise,openshift-dedicated[]
14-
[NOTE]
15-
====
16-
See the xref:../../dev_guide/managing_images.adoc#dev-guide-managing-images[Developer Guide] for details
17-
on managing images and image streams.
18-
====
19-
endif::openshift-origin,openshift-online,openshift-enterprise,openshift-dedicated[]
2013

2114
[[image-stream-object-definition]]
2215
.Image Stream Object Definition
@@ -60,13 +53,6 @@ status:
6053
<4> The SHA identifier that this image stream tag previously referenced. Can be used to rollback to an older image.
6154
<5> The image stream tag name.
6255

63-
For a sample build configuration that references an image stream, see xref:../../dev_guide/builds/index.adoc#defining-a-buildconfig[What Is a BuildConfig?]
64-
in the `Strategy` stanza of the configuration.
65-
66-
For a sample deployment configuration that references an image stream,
67-
see xref:../../dev_guide/deployments/how_deployments_work.adoc#creating-a-deployment-configuration[Creating a Deployment Configuration]
68-
in the `Strategy` stanza of the configuration.
69-
7056
[[image-stream-image]]
7157
== Using image stream images
7258

@@ -86,8 +72,7 @@ The image stream image consists of the image stream name and image ID from the r
8672
<image-stream-name>@<image-id>
8773
----
8874

89-
To refer to the image in the
90-
xref:image-stream-object-definition[image stream object example above], the image stream image looks like:
75+
To refer to the image in the image stream object example, the image stream image looks like:
9176

9277
----
9378
origin-ruby-sample@sha256:47463d94eb5c049b2d23b03a9530bf944f8f967a0fe79147dd6b9135bf7dd13d
@@ -108,7 +93,7 @@ history stack. The image previously occupying the top position will be available
10893
the second position, and so forth. This allows for easy rollbacks to make tags point to
10994
historical images again.
11095

111-
The following image stream tag is from the xref:image-stream-object-definition[image stream object example above]:
96+
The following image stream tag is from the image stream object example earlier:
11297

11398
.Image Stream Tag with Two Images in its History
11499

@@ -140,7 +125,7 @@ For example, the `latest` image stream tags that ship with {product-title} are t
140125
Tracking tags are limited to a single image stream and cannot reference other image streams.
141126
====
142127

143-
You can create your own image stream tags for your own needs. See the xref:../../dev_guide/managing_images.adoc#tag-naming[Recommended Tagging Conventions].
128+
You can create your own image stream tags for your own needs.
144129

145130
The image stream tag is composed of the name of the image stream and a tag, separated by a colon:
146131

@@ -150,7 +135,7 @@ The image stream tag is composed of the name of the image stream and a tag, sepa
150135

151136
For example, to refer to the
152137
`sha256:47463d94eb5c049b2d23b03a9530bf944f8f967a0fe79147dd6b9135bf7dd13d` image
153-
in the xref:image-stream-object-definition[image stream object example above], the image stream tag
138+
in the image stream object example earlier, the image stream tag
154139
would be:
155140

156141
----
@@ -167,14 +152,12 @@ Image stream triggers allow your Builds and Deployments to be automatically invo
167152
For example, Builds and Deployments can be automatically started when an image stream tag is modified.
168153
This is achieved by monitoring that particular image stream tag and notifying the Build or Deployment when a change is detected.
169154

170-
include::dev_guide/deployments/basic_deployment_operations.adoc[tag=image-change-trig]
171155

172156
[[image-stream-mappings]]
173157
== Using image stream mappings
174158

175-
When the
176-
xref:../../architecture/infrastructure_components/image_registry.adoc#integrated-openshift-registry[integrated
177-
registry] receives a new image, it creates and sends an image stream mapping
159+
When the integrated
160+
registry receives a new image, it creates and sends an image stream mapping
178161
to {product-title}, providing the image's project, name,
179162
tag, and image metadata.
180163

@@ -189,14 +172,6 @@ metadata about each image, such as commands, entry point, and environment
189172
variables. Images in {product-title} are immutable and the maximum name length
190173
is 63 characters.
191174

192-
ifdef::openshift-origin,openshift-online,openshift-enterprise,openshift-dedicated[]
193-
[NOTE]
194-
====
195-
See the xref:../../dev_guide/managing_images.adoc#dev-guide-managing-images[Developer Guide] for details
196-
on manually tagging images.
197-
====
198-
endif::openshift-origin,openshift-online,openshift-enterprise,openshift-dedicated[]
199-
200175
The following image stream mapping example results in an image being tagged as
201176
*test/origin-ruby-sample:latest*:
202177

@@ -316,8 +291,7 @@ image:
316291
[[image-stream-mappings-working]]
317292
= Working with image streams
318293

319-
The following sections describe how to use image streams and image stream tags. For more information on working with
320-
image streams, see xref:../../dev_guide/managing_images.adoc#dev-guide-managing-images[Managing Images].
294+
The following sections describe how to use image streams and image stream tags.
321295

322296
[[image-stream-mappings-working-getting]]
323297
== Getting information about image streams
@@ -445,7 +419,6 @@ Tag python:3.6 set to docker.io/python:3.6.0.
445419
----
446420

447421
If the external image is secured, you will need to create a secret with credentials for accessing that registry.
448-
See xref:../../dev_guide/managing_images.adoc#private-registries[Importing Images from Private Registries] for more details.
449422

450423
[[image-stream-mappings-working-updating]]
451424
== Updating an image stream tag
@@ -498,7 +471,7 @@ Tag python:3.6 set to import docker.io/python:3.6.0 periodically.
498471
----
499472

500473
This command causes {product-title} to periodically update this particular image stream tag. This period is a
501-
xref:../../install_config/master_node_configuration.adoc#master-config-image-config[cluster-wide setting] set to 15 minutes by default.
474+
cluster-wide setting set to 15 minutes by default.
502475

503476
To remove the periodic check, re-run above command but omit the `--scheduled` flag. This will reset its behavior to default.
504477

modules/image-stream-use.adoc

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -5,15 +5,14 @@
55

66
= Using image streams
77

8-
An image stream and its associated tags provide an abstraction for referencing
9-
xref:../../architecture/core_concepts/containers_and_images.adoc#docker-images[container images] from within {product-title}.
8+
An image stream and its associated tags provide an abstraction for referencing container images from within {product-title}.
109
The image stream and its tags allow you to see what images are available
1110
and ensure that you are using the specific image you need even if the image in the repository changes.
1211

1312
Image streams do not contain actual image data, but present a single virtual view of related images, similar to an image repository.
1413

15-
You can configure xref:../../dev_guide/builds/triggering_builds.adoc#image-change-triggers[Builds] and
16-
xref:../../dev_guide/deployments/basic_deployment_operations.adoc#image-change-trigger[Deployments] to watch an image stream
14+
You can configure Builds and
15+
Deployments to watch an image stream
1716
for notifications when new images are added and react by performing a Build or Deployment, respectively.
1817

1918
For example, if a Deployment is using a certain image and a new version of that image is created,
@@ -24,8 +23,7 @@ then even if the container image in the container image registry is updated, the
2423

2524
The source images can be stored in any of the following:
2625

27-
* {product-title}'s xref:../../architecture/infrastructure_components/image_registry.adoc#integrated-openshift-registry[integrated
28-
registry]
26+
* {product-title}'s integrated registry
2927
* An external registry, for example `registry.redhat.io` or `hub.docker.com`
3028
* Other image streams in the {product-title} cluster
3129

@@ -69,14 +67,14 @@ Using image streams has several significant benefits:
6967
* You can trigger Builds and Deployments when a new image is pushed to the registry. Also,
7068
{product-title} has generic triggers for other resources (such as Kubernetes objects).
7169

72-
* You can xref:../../dev_guide/managing_images.adoc#importing-tag-and-image-metadata[mark a tag for periodic re-import].
70+
* You can mark a tag for periodic re-import.
7371
If the source image has changed, that change is picked up and reflected in the image stream, which triggers the Build and/or Deployment flow, depending upon the Build or Deployment configuration.
7472

7573
* You can share images using fine-grained access control and quickly distribute images across your teams.
7674

7775
* If the source image changes, the image stream tag will still point to a known-good version of the image, ensuring that your application will not break unexpectedly.
7876

79-
* You can xref:../../admin_guide/manage_rbac.adoc#admin-guide-manage-rbac[configure security] around who can view and use the images through permissions on the image stream objects.
77+
* You can configure security around who can view and use the images through permissions on the image stream objects.
8078

8179
* Users that lack permission to read or list images on the cluster level can still retrieve the images tagged in a project using image streams.
8280

modules/images-create-guide-general.adoc

Lines changed: 2 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -174,9 +174,7 @@ advertising a path on the system that could be used by another process, such as
174174
It is best to avoid setting default passwords. Many people will extend the image
175175
and forget to remove or change the default password. This can lead to security
176176
issues if a user in production is assigned a well-known password. Passwords
177-
should be configurable using an environment variable instead. See the
178-
xref:use-env-vars[Using Environment Variables for Configuration] topic for more
179-
information.
177+
should be configurable using an environment variable instead.
180178

181179
If you do choose to set a default password, ensure that an appropriate warning
182180
message is displayed when the container is started. The message should inform
@@ -188,10 +186,7 @@ as what environment variable to set.
188186

189187
It is best to avoid running *sshd* in your image. You can use the `podman exec` or `docker exec`
190188
command to access containers that are running on the local host. Alternatively,
191-
you can use the
192-
xref:../dev_guide/executing_remote_commands.adoc#dev-guide-executing-remote-commands[`oc
193-
exec`] command or the
194-
xref:../dev_guide/ssh_environment.adoc#dev-guide-ssh-environment[`oc rsh` ]
189+
you can use the `oc exec` command or the `oc rsh`
195190
command to access containers that are running on the {product-title} cluster.
196191
Installing and running *sshd* in your image opens up additional vectors for
197192
attack and requirements for security patching.

modules/images-create-guide-openshift.adoc

Lines changed: 10 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,6 @@ application as output.
3434
For example, this https://github.com/sclorg/s2i-python-container[Python image]
3535
defines S2I scripts for building various versions of Python applications.
3636

37-
For more details about how to write S2I scripts for your image, see the
38-
xref:s2i.adoc#creating-images-s2i[S2I Requirements] topic.
39-
4037
[discrete]
4138
[[use-uid]]
4239
== Support arbitrary user ids
@@ -102,14 +99,7 @@ Lastly, the final *USER* declaration in the `Dockerfile` should specify the user
10299
ID (numeric value) and not the user name. This allows {product-title} to
103100
validate the authority the image is attempting to run with and prevent running
104101
images that are trying to run as root, because running containers as a
105-
privileged user exposes
106-
ifdef::openshift-enterprise,openshift-origin[]
107-
xref:../install/prerequisites.adoc#security-warning[potential
108-
security holes].
109-
endif::[]
110-
ifdef::openshift-dedicated[]
111-
potential security holes.
112-
endif::[]
102+
privileged user exposes potential security holes.
113103
If the image does not specify a *USER*, it inherits the *USER*
114104
from the parent image.
115105

@@ -118,13 +108,11 @@ ifdef::openshift-enterprise,openshift-origin[]
118108
====
119109
If your S2I image does not include a *USER* declaration with a numeric user,
120110
your builds will fail by default. In order to allow images that use either named
121-
users or the root (*0*) user to build in {product-title}, you can
122-
xref:../admin_guide/manage_scc.adoc#grant-access-to-the-privileged-scc[add the
123-
project's builder service account]
111+
users or the root (*0*) user to build in {product-title}, you can add the
112+
project's builder service account
124113
(*system:serviceaccount:<your-project>:builder*) to the *privileged* security
125114
context constraint (SCC). Alternatively, you can allow all images to
126-
xref:../admin_guide/manage_scc.adoc#enable-images-to-run-with-user-in-the-dockerfile[run
127-
as any user].
115+
run as any user.
128116
====
129117
endif::[]
130118

@@ -135,7 +123,7 @@ endif::[]
135123
For cases where your image needs to communicate with a service provided by
136124
another image, such as a web front end image that needs to access a database
137125
image to store and retrieve data, your image should consume an {product-title}
138-
xref:../architecture/core_concepts/pods_and_services.adoc#services[service].
126+
service.
139127
Services provide a static endpoint for access which does not change as
140128
containers are stopped, started, or moved. In addition, services provide load
141129
balancing for requests.
@@ -186,8 +174,8 @@ volumes that would be mounted into the container at runtime. However, if you
186174
elect to do it this way you must ensure that your image provides clear error
187175
messages on startup when the necessary volume or configuration is not present.
188176

189-
This topic is related to the xref:use-services[Using Services for Inter-image
190-
Communication] topic in that configuration like datasources should be defined in
177+
This topic is related to the Using Services for Inter-image
178+
Communication topic in that configuration like datasources should be defined in
191179
terms of environment variables that provide the service endpoint information.
192180
This allows an application to dynamically consume a datasource service that is
193181
defined in the {product-title} environment without modifying the application
@@ -214,9 +202,6 @@ allowing {product-title} to create a better experience for developers using your
214202
image. For example, you can add metadata to provide helpful descriptions of your
215203
image, or offer suggestions on other images that may also be needed.
216204

217-
See the xref:metadata.adoc#creating-images-metadata[Image Metadata] topic for more information on
218-
supported metadata and how to define them.
219-
220205
[discrete]
221206
== Clustering
222207

@@ -245,21 +230,18 @@ running container and retrieve or view the log file.
245230
[discrete]
246231
== Liveness and readiness probes
247232

248-
Document example
249-
xref:../dev_guide/application_health.adoc#container-health-checks-using-probes[liveness
250-
and readiness probes] that can be used with your image. These probes will allow
233+
Document example liveness and readiness probes that can be used with your image. These probes will allow
251234
users to deploy your image with confidence that traffic will not be routed to
252235
the container until it is prepared to handle it, and that the container will be
253236
restarted if the process gets into an unhealthy state.
254237

255238
[discrete]
256239
== Templates
257240

258-
Consider providing an example xref:../dev_guide/templates.adoc#dev-guide-templates[template] with
241+
Consider providing an example template with
259242
your image. A template will give users an easy way to quickly get your image
260243
deployed with a working configuration. Your template should include the
261-
xref:../dev_guide/application_health.adoc#container-health-checks-using-probes[liveness
262-
and readiness probes] you documented with the image, for completeness.
244+
liveness and readiness probes you documented with the image, for completeness.
263245

264246

265247
.Additional resources

modules/images-create-s2i-scripts.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ executable inside the builder image. S2I supports multiple options providing
1111
`assemble`/`run`/`save-artifacts` scripts. All of these locations are checked on
1212
each build in the following order:
1313

14-
. A script xref:../dev_guide/builds/build_strategies.adoc#override-builder-image-scripts[specified in the BuildConfig]
14+
. A script specified in the BuildConfig
1515
. A script found in the application source `.s2i/bin` directory
1616
. A script found at the default image URL (`io.openshift.s2i.scripts-url` label)
1717

@@ -70,8 +70,6 @@ image is working correctly. The proposed flow of that process is:
7070
. Run `s2i build` again to verify the *_save-artifacts_* and *_assemble_* scripts save and restore artifacts functionality. (optional)
7171
. Run the image to verify the test application is working.
7272

73-
See the xref:s2i_testing.adoc#creating-images-s2i-testing[Testing S2I Images] topic for more information.
74-
7573
NOTE: The suggested location to put the test application built by your
7674
*_test/run_* script is the *_test/test-app_* directory in your image repository.
7775
See the https://github.com/openshift/source-to-image/blob/master/docs/cli.md#sti-create[S2I documentation]

modules/images-create-s2i.adoc

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,13 +7,12 @@
77
[id="images-create-s2i_{context}"]
88

99
= Creating images from source code with s2i
10-
xref:../architecture/core_concepts/builds_and_image_streams.adoc#source-build[Source-to-Image
11-
(S2I)] is a framework that makes it easy to write images that take application
10+
Source-to-Image
11+
(S2I) is a framework that makes it easy to write images that take application
1212
source code as an input and produce a new image that runs the assembled
1313
application as output.
1414

1515
The main advantage of using S2I for building reproducible container images is the
1616
ease of use for developers. As a builder image author, you must understand two
1717
basic concepts in order for your images to provide the best possible S2I performance:
18-
xref:build-process[the build process] and xref:s2i-scripts[S2I scripts].
19-
18+
the build process and S2I scripts.

0 commit comments

Comments
 (0)