Skip to content

Commit 6f2462a

Browse files
Merge pull request #298 from clcollins/doc_updates
Improve documentation about disabling features
2 parents 87a4ba7 + 2ace43e commit 6f2462a

File tree

1 file changed

+15
-11
lines changed

1 file changed

+15
-11
lines changed

README.md

+15-11
Original file line numberDiff line numberDiff line change
@@ -144,35 +144,39 @@ Sensitive values are set to REDACTED by default, and can be viewed by adding `--
144144

145145
All of the ocm-container feature sets are enabled by default, but some may require some additional configuration information passed (via CLI, ENV or configuration file, as show above) to actually do anything.
146146

147-
Every feature can be disabled by adding `--no-FEATURENAME` or setting `no_featurename: true` in the configuration file, etc.
147+
Every feature can be disabled, either with `OCMC_NO_FEATURENAME: true` environment variables, the `--no-FEATURENAME` flag on the CLI or setting `no-featurename: true` in the configuration file (~/.config/ocm-container/ocm-container.yaml), substituting "FEATURENAME" for the feature you wish to disable, eg:
148+
149+
* Env Var: `OCMC_NO_JIRA: true`
150+
* CLI Flag: `ocm-contianer --no-jira`
151+
* Config file entry: `no-jira: true`
148152

149153
### AWS configuration and credential mounting from your host
150154

151155
Mounts your ~/.aws/credentials and ~/.aws/config files read-only into ocm-container for use with the AWS CLI.
152156

153157
* No additional configuration required
154-
* Can be disabled with `no_aws: true`
158+
* Can be disabled with `no-aws: true` (set in the ocm-container.yaml file)
155159

156160
### Mount Certificate Authorities from your host
157161

158162
Mounts additional certificate authority trust bundles from a directory on your host and adds it to the bundle in ocm-container at /etc/pki/ca-trust/source/anchors, read-only.
159163

160164
* Requires `ca_source_anchors: PATH_TO_YOUR_CA_ANCHORS_DIRECTORY` to be set
161-
* Can be disabled with `no_certificate_authorities: true`
165+
* Can be disabled with `no-certificate-authorities: true` (set in the ocm-container.yaml file)
162166

163167
### Google Cloud configuration and credential mounting from you host
164168

165169
Mounts Google Cloud configuration and credentials from ~/.config/gcloud on your host inside ocm-container, read only.
166170

167171
* No additional configuration required
168-
* Can be disabled with `no_gcloud: true`
172+
* Can be disabled with `no-gcloud: true` (set in the ocm-container.yaml file)
169173

170174
### JIRA CLI token and configuration
171175

172176
Mounts your JIRA token and config directory from ~/.config/.jira/token.json on your host read-only into ocm-container, and sets the `JIRA_API_TOKEN` and `JIRA_AUTH_TYPE=bearer` environment variables to be used with the JIRA CLI tool.
173177

174178
* No additional configuration required, other than on first-run (see below):
175-
* Can be disabled with `no_jira: true`
179+
* Can be disabled with `no-jira: true` (set in the ocm-container.yaml file)
176180

177181
Generate a Personal Access Token by logging into JIRA and clicking your user icon in the top right of the screen, and selecting "Profile". Then Navigate to "Personal Access Tokens" in the left sidebar, and generate a token.
178182

@@ -186,21 +190,21 @@ Red Hat SREs can mount the OPS Utils utilities into ocm-container, and can speci
186190

187191
* Requires `ops_utils_dir: PATH_TO_YOUR_OPS_UTILS_DIRECTORY` to be set
188192
* Optionally accepts `ops_utils_dir_rw: true` to enable read-write access in the mount
189-
* Can be disabled with `no_ops_utils: true`
193+
* Can be disabled with `no-ops-utils: true` (set in the ocm-container.yaml file)
190194

191195
### OSDCTL configuration mounting
192196

193197
Mounts the [osdctl](https://github.com/openshift/osdctl) configuration directory (~/.config/osdctl) read-only into the container.
194198

195199
* No additional configuration required
196-
* Can be disabled with `no_osdctl: true`
200+
* Can be disabled with `no-osdctl: true` (set in the ocm-container.yaml file)
197201

198202
### PagerDuty token and configuration
199203

200204
Mounts the ~/.config/pagerduty-cli/config.json token file into the container.
201205

202206
* No additional configuration required, other than on first-run (see below)
203-
* Can be disabled with `no_pagerduty: true`
207+
* Can be disabled with `no-pagerduty: true` (set in the ocm-container.yaml file)
204208

205209
In order to set up the Pagerduty CLI the first time, ensure that the config file exists first with `mkdir -p ~/.config/pagerduty-cli && touch ~/.config/pagerduty-cli/config.json`. You'll also need to mount the Pagerduty config file as writeable by setting the `pagerduty_dir_rw: true` configuration (or `export OCMC_PAGERDUTY_DIR_RW: true`) the first time. Once you've logged in to ocm-container, run `pd login` to do the initial setup.
206210

@@ -212,23 +216,23 @@ Stores cluster terminal history persistently in directories in your ~/.config/oc
212216

213217
* Requires `enable_persistent_histories: true`; but this is toggle deprecated and will be removed in the future
214218
* Otherwise no additional configuration required
215-
* Can be disabled with `no_persistent_histories: true`
219+
* Can be disabled with `no-persistent-histories: true` (set in the ocm-container.yaml file)
216220

217221
### ~/.bashrc personalization (or other)
218222

219223
Mounts a directory or a file (eg: ~/.bashrc or ~/.bashrc.d/, etc) from your host to ~/.config/personalizations.d (or ...personalizations.sh for a file) in the container. You may specify if it is read-only or read-write.
220224

221225
* Requires `personalization_file: PATH_TO_FILE_OR_DIRECTORY_TO_MOUNT`
222226
* Optionally, `personalization_dir_rw: true` can be set to make the mount read-write
223-
* Can be disabled with `no_personalization: true`
227+
* Can be disabled with `no-personalization: true` (set in the ocm-container.yaml file)
224228

225229
### Scratch directory mounting
226230

227231
Mounts an arbitrary directory from your host to ~/scratch. You may specific if it is read-only or read-write.
228232

229233
* Requires `scratch_dir: PATH_TO_YOUR_SCRATCH_DIR`
230234
* Optionally, `scratch_dir_rw: true` can be set to make the mount read-write
231-
* Can be disabled with `no_scratch: true`
235+
* Can be disabled with `no-scratch: true` (set in the ocm-container.yaml file)
232236

233237

234238
## Personalize Your ocm-container

0 commit comments

Comments
 (0)