You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+15-11
Original file line number
Diff line number
Diff line change
@@ -144,35 +144,39 @@ Sensitive values are set to REDACTED by default, and can be viewed by adding `--
144
144
145
145
All of the ocm-container feature sets are enabled by default, but some may require some additional configuration information passed (via CLI, ENV or configuration file, as show above) to actually do anything.
146
146
147
-
Every feature can be disabled by adding `--no-FEATURENAME` or setting `no_featurename: true` in the configuration file, etc.
147
+
Every feature can be disabled, either with `OCMC_NO_FEATURENAME: true` environment variables, the `--no-FEATURENAME` flag on the CLI or setting `no-featurename: true` in the configuration file (~/.config/ocm-container/ocm-container.yaml), substituting "FEATURENAME" for the feature you wish to disable, eg:
148
+
149
+
* Env Var: `OCMC_NO_JIRA: true`
150
+
* CLI Flag: `ocm-contianer --no-jira`
151
+
* Config file entry: `no-jira: true`
148
152
149
153
### AWS configuration and credential mounting from your host
150
154
151
155
Mounts your ~/.aws/credentials and ~/.aws/config files read-only into ocm-container for use with the AWS CLI.
152
156
153
157
* No additional configuration required
154
-
* Can be disabled with `no_aws: true`
158
+
* Can be disabled with `no-aws: true` (set in the ocm-container.yaml file)
155
159
156
160
### Mount Certificate Authorities from your host
157
161
158
162
Mounts additional certificate authority trust bundles from a directory on your host and adds it to the bundle in ocm-container at /etc/pki/ca-trust/source/anchors, read-only.
159
163
160
164
* Requires `ca_source_anchors: PATH_TO_YOUR_CA_ANCHORS_DIRECTORY` to be set
161
-
* Can be disabled with `no_certificate_authorities: true`
165
+
* Can be disabled with `no-certificate-authorities: true` (set in the ocm-container.yaml file)
162
166
163
167
### Google Cloud configuration and credential mounting from you host
164
168
165
169
Mounts Google Cloud configuration and credentials from ~/.config/gcloud on your host inside ocm-container, read only.
166
170
167
171
* No additional configuration required
168
-
* Can be disabled with `no_gcloud: true`
172
+
* Can be disabled with `no-gcloud: true` (set in the ocm-container.yaml file)
169
173
170
174
### JIRA CLI token and configuration
171
175
172
176
Mounts your JIRA token and config directory from ~/.config/.jira/token.json on your host read-only into ocm-container, and sets the `JIRA_API_TOKEN` and `JIRA_AUTH_TYPE=bearer` environment variables to be used with the JIRA CLI tool.
173
177
174
178
* No additional configuration required, other than on first-run (see below):
175
-
* Can be disabled with `no_jira: true`
179
+
* Can be disabled with `no-jira: true` (set in the ocm-container.yaml file)
176
180
177
181
Generate a Personal Access Token by logging into JIRA and clicking your user icon in the top right of the screen, and selecting "Profile". Then Navigate to "Personal Access Tokens" in the left sidebar, and generate a token.
178
182
@@ -186,21 +190,21 @@ Red Hat SREs can mount the OPS Utils utilities into ocm-container, and can speci
186
190
187
191
* Requires `ops_utils_dir: PATH_TO_YOUR_OPS_UTILS_DIRECTORY` to be set
188
192
* Optionally accepts `ops_utils_dir_rw: true` to enable read-write access in the mount
189
-
* Can be disabled with `no_ops_utils: true`
193
+
* Can be disabled with `no-ops-utils: true` (set in the ocm-container.yaml file)
190
194
191
195
### OSDCTL configuration mounting
192
196
193
197
Mounts the [osdctl](https://github.com/openshift/osdctl) configuration directory (~/.config/osdctl) read-only into the container.
194
198
195
199
* No additional configuration required
196
-
* Can be disabled with `no_osdctl: true`
200
+
* Can be disabled with `no-osdctl: true` (set in the ocm-container.yaml file)
197
201
198
202
### PagerDuty token and configuration
199
203
200
204
Mounts the ~/.config/pagerduty-cli/config.json token file into the container.
201
205
202
206
* No additional configuration required, other than on first-run (see below)
203
-
* Can be disabled with `no_pagerduty: true`
207
+
* Can be disabled with `no-pagerduty: true` (set in the ocm-container.yaml file)
204
208
205
209
In order to set up the Pagerduty CLI the first time, ensure that the config file exists first with `mkdir -p ~/.config/pagerduty-cli && touch ~/.config/pagerduty-cli/config.json`. You'll also need to mount the Pagerduty config file as writeable by setting the `pagerduty_dir_rw: true` configuration (or `export OCMC_PAGERDUTY_DIR_RW: true`) the first time. Once you've logged in to ocm-container, run `pd login` to do the initial setup.
206
210
@@ -212,23 +216,23 @@ Stores cluster terminal history persistently in directories in your ~/.config/oc
212
216
213
217
* Requires `enable_persistent_histories: true`; but this is toggle deprecated and will be removed in the future
214
218
* Otherwise no additional configuration required
215
-
* Can be disabled with `no_persistent_histories: true`
219
+
* Can be disabled with `no-persistent-histories: true` (set in the ocm-container.yaml file)
216
220
217
221
### ~/.bashrc personalization (or other)
218
222
219
223
Mounts a directory or a file (eg: ~/.bashrc or ~/.bashrc.d/, etc) from your host to ~/.config/personalizations.d (or ...personalizations.sh for a file) in the container. You may specify if it is read-only or read-write.
0 commit comments