1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

HCIDOCS-441: Update sandboxed containers attributes

Removed unused OpenShift sandboxed containers attributes.

Updated remaining attribute to align with OSC docs attributes.
This commit is contained in:
Avital Pinnick
2024-08-13 15:45:31 +03:00
committed by openshift-cherrypick-robot
parent b43b58a520
commit 4616cf5120
4 changed files with 4 additions and 15 deletions

View File

@@ -47,11 +47,7 @@ endif::[]
:rh-rhacm-first: Red Hat Advanced Cluster Management (RHACM)
:rh-rhacm: RHACM
:rh-rhacm-version: 2.11
:sandboxed-containers-first: OpenShift sandboxed containers
:sandboxed-containers-operator: OpenShift sandboxed containers Operator
:sandboxed-containers-version: 1.5
:sandboxed-containers-version-z: 1.5.0
:sandboxed-containers-legacy-version: 1.4.1
:osc: OpenShift sandboxed containers
:cert-manager-operator: cert-manager Operator for Red Hat OpenShift
:secondary-scheduler-operator-full: Secondary Scheduler Operator for Red Hat OpenShift
:secondary-scheduler-operator: Secondary Scheduler Operator

View File

@@ -1,18 +1,11 @@
// Module included in the following assemblies:
//
// * security/container_security/security-compliance.adoc
// * understanding-sandboxed-containers.adoc
:_mod-docs-content-type: CONCEPT
[id="security-compliance-nist_{context}"]
= Understanding compliance and risk management
ifeval::["{context}" == "understanding-sandboxed-containers"]
{sandboxed-containers-first} can be used on FIPS enabled clusters.
When running in FIPS mode, {sandboxed-containers-first} components, VMs, and VM images are adapted to comply with FIPS.
endif::[]
ifndef::openshift-origin[]
FIPS compliance is one of the most critical components required in
highly secure environments, to ensure that only supported cryptographic

View File

@@ -4,4 +4,4 @@
include::_attributes/common-attributes.adoc[]
:context: sandboxed-containers-moved
The {sandboxed-containers-first} user guide and release notes have moved to a new link:https://access.redhat.com/documentation/en-us/openshift_sandboxed_containers/[location].
The {osc} user guide and release notes have moved to a new link:https://access.redhat.com/documentation/en-us/openshift_sandboxed_containers/[location].

View File

@@ -215,8 +215,8 @@ derived from the istio.io open source project, is not supported in {oke}. Also,
the Kourier Ingress Controller found in OpenShift Serverless is not supported
on {oke}.
=== {sandboxed-containers-first}
{oke} does not include {sandboxed-containers-first}. Use {product-title} for this support.
=== {osc}
{oke} does not include {osc}. Use {product-title} for this support.
=== Developer experience
With {oke}, the following capabilities are not supported: