Skip to content

Commit f8951c7

Browse files
authored
Merge pull request #80397 from apinnick/sandboxed-containers-attribute-cleanup
HCIDOCS-441: Update sandboxed containers attributes
2 parents be70b97 + 17ebe05 commit f8951c7

File tree

4 files changed

+4
-15
lines changed

4 files changed

+4
-15
lines changed

_attributes/common-attributes.adoc

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -47,11 +47,7 @@ endif::[]
4747
:rh-rhacm-first: Red Hat Advanced Cluster Management (RHACM)
4848
:rh-rhacm: RHACM
4949
:rh-rhacm-version: 2.11
50-
:sandboxed-containers-first: OpenShift sandboxed containers
51-
:sandboxed-containers-operator: OpenShift sandboxed containers Operator
52-
:sandboxed-containers-version: 1.5
53-
:sandboxed-containers-version-z: 1.5.0
54-
:sandboxed-containers-legacy-version: 1.4.1
50+
:osc: OpenShift sandboxed containers
5551
:cert-manager-operator: cert-manager Operator for Red Hat OpenShift
5652
:secondary-scheduler-operator-full: Secondary Scheduler Operator for Red Hat OpenShift
5753
:secondary-scheduler-operator: Secondary Scheduler Operator

modules/security-compliance-nist.adoc

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,18 +1,11 @@
11
// Module included in the following assemblies:
22
//
33
// * security/container_security/security-compliance.adoc
4-
// * understanding-sandboxed-containers.adoc
54

65
:_mod-docs-content-type: CONCEPT
76
[id="security-compliance-nist_{context}"]
87
= Understanding compliance and risk management
98

10-
ifeval::["{context}" == "understanding-sandboxed-containers"]
11-
{sandboxed-containers-first} can be used on FIPS enabled clusters.
12-
13-
When running in FIPS mode, {sandboxed-containers-first} components, VMs, and VM images are adapted to comply with FIPS.
14-
endif::[]
15-
169
ifndef::openshift-origin[]
1710
FIPS compliance is one of the most critical components required in
1811
highly secure environments, to ensure that only supported cryptographic

sandboxed_containers/sandboxed-containers-moved.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,4 +4,4 @@
44
include::_attributes/common-attributes.adoc[]
55
:context: sandboxed-containers-moved
66

7-
The {sandboxed-containers-first} user guide and release notes have moved to a new link:https://access.redhat.com/documentation/en-us/openshift_sandboxed_containers/[location].
7+
The {osc} user guide and release notes have moved to a new link:https://access.redhat.com/documentation/en-us/openshift_sandboxed_containers/[location].

welcome/oke_about.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -215,8 +215,8 @@ derived from the istio.io open source project, is not supported in {oke}. Also,
215215
the Kourier Ingress Controller found in OpenShift Serverless is not supported
216216
on {oke}.
217217

218-
=== {sandboxed-containers-first}
219-
{oke} does not include {sandboxed-containers-first}. Use {product-title} for this support.
218+
=== {osc}
219+
{oke} does not include {osc}. Use {product-title} for this support.
220220

221221
=== Developer experience
222222
With {oke}, the following capabilities are not supported:

0 commit comments

Comments
 (0)