Skip to content

Commit 1563f94

Browse files
author
cfsdocs
committed
Build 2025
1 parent c64f0b6 commit 1563f94

File tree

9 files changed

+121
-53
lines changed

9 files changed

+121
-53
lines changed

add-registry.md

Lines changed: 24 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
copyright:
44
years: 2020, 2024
5-
lastupdated: "2024-01-11"
5+
lastupdated: "2024-01-19"
66

77
keywords: registries, container registry, image registry, apikey, API key, access token, images, registry access, registry secret, service id,registry secret, registry access secret
88

@@ -186,20 +186,31 @@ To set up access to an {{site.data.keyword.registryfull_notm}} in a different {{
186186

187187
To add {{site.data.keyword.registryfull_notm}} or Docker Hub access with the console,
188188

189-
1. Go to the [{{site.data.keyword.codeengineshort}} dashboard](https://cloud.ibm.com/codeengine/overview).
190-
2. Select a project (or [create one](/docs/codeengine?topic=codeengine-manage-project#create-a-project)).
191-
3. From the project page, click **Registry access**.
192-
4. Click **Create**.
193-
5. Select **Docker Hub** or **Custom**.
194-
6. Enter a name for your registry access.
195-
7. Enter a server name for your registry. For {{site.data.keyword.registryshort}}, the server name is `<region>.icr.io`. For example, `us.icr.io`. For [Docker Hub](https://hub.docker.com/), the server name is `https://index.docker.io/v1/`.
196-
8. Enter a username. For {{site.data.keyword.registryfull_notm}}, it is `iamapikey`. For Docker Hub, it is your Docker ID.
197-
9. Enter the password. For {{site.data.keyword.registryfull_notm}}, the password is your API key. For Docker Hub, you can use your Docker Hub password or an [access token](#access-private-docker-hub).
198-
10. Click **Create**.
199-
200-
You can add access to a container registry when you create an application or job, or when you build an image. Click **Configure image** and specify the container image to run, including the registry where the image is stored and the [registry access](/docs/codeengine?topic=codeengine-add-registry#types-registryaccesssecrets) to use to retrieve the image. Follow previous steps 5-9.
189+
190+
191+
**REVIEW**
192+
193+
Before you begin, [create a project](/docs/codeengine?topic=codeengine-manage-project).
194+
195+
1. After your project is in **Active** status, click the name of your project on the [{{site.data.keyword.codeengineshort}} Projects page](https://cloud.ibm.com/codeengine/projects){: external}.
196+
2. From the Components page, click **Secrets and configmaps**.
197+
3. From the Secrets and configmaps page, click **Create** to create your secret.
198+
4. From the Create secret or configmap page, complete the following steps:
199+
1. Select **Registry secret**, and click **Next**.
200+
2. Provide a name; for example, `mysecret-registry`.
201+
3. Specify the target registry for this secret, such as {{site.data.keyword.registrylong_notm}} or Docker Hub.
202+
4. Specify the location of the registry.
203+
5. Specify a username. If this secret is for {{site.data.keyword.registrylong_notm}}, the username is `iamapikey`. If this secret is for Docker Hub, it is your Docker ID.
204+
6. Enter the credentials for the username. For {{site.data.keyword.registryfull_notm}}, use your IAM API key. For Docker Hub, you can use your Docker Hub password or an [access token](#access-private-docker-hub). For other target registries, specify the password or API key for the username.
205+
7. Click **Create** to create the secret.
206+
207+
Now that your secret is created from the console, go to the Secrets and configmaps page to view a list of defined secrets and configmaps. You can apply filters to customize the list to meet your needs.
208+
209+
You can add access to a container registry when you create an application or job, or when you build an image. Click **Configure image** and specify the container image to run, including the registry where the image is stored and the [registry access](/docs/codeengine?topic=codeengine-add-registry#types-registryaccesssecrets) to use to retrieve the image.
201210
{: tip}
202211

212+
**/REVIEW**
213+
203214
### Adding registry access with the CLI
204215
{: #add-registry-access-ce-cli}
205216

build-private.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
copyright:
44
years: 2020, 2024
5-
lastupdated: "2024-01-11"
5+
lastupdated: "2024-01-19"
66

77
keywords: builds for code engine, builds, building, source code, build run, application image builds for code engine, job image builds for code engine, container image builds with code engine, registry secret, registry access secret
88

@@ -31,7 +31,7 @@ You can choose to ignore certain file patterns from within your source code by u
3131
3. From the project page, click **Image builds**.
3232
4. From the **Image build** tab, click **Create**. The **Specify build details** side panel opens where you enter the details of your build.
3333
5. In the **Source** section, enter a name for your build, the URL of your source repository, and your code repo access.
34-
- If your code is in a private repo, use an SSH URL for the code repository URL and either select the name of an existing code repo access or [create a code repo access](/docs/codeengine?topic=codeengine-code-repositories). An example of an SSH URL is `[email protected]:IBM/CodeEngine.git`.
34+
- If your code is in a private repo, use an SSH URL for the code repository URL and either select the name of an existing SSH secret or [create an SSH secret](/docs/codeengine?topic=codeengine-code-repositories). An example of an SSH URL is `[email protected]:IBM/CodeEngine.git`.
3535
- Optionally, select a source branch name. If you do not provide a branch name and you leave the field empty, {{site.data.keyword.codeengineshort}} automatically uses the default branch of the specified repository. You can enter any other branch name, tag, or commit ID.
3636

3737
Click **Next** to continue.

configmap.md

Lines changed: 6 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,8 @@
11
---
22

33
copyright:
4-
years: 2020, 2023
5-
lastupdated: "2023-12-19"
4+
years: 2020, 2024
5+
lastupdated: "2024-01-19"
66

77
keywords: configmaps with code engine, key references with code engine, key-value pair with code engine, setting up configmaps with code engine, configmaps, environment variables
88

@@ -53,12 +53,13 @@ Before you begin, [create a project](/docs/codeengine?topic=codeengine-manage-pr
5353
1. After your project is in **Active** status, click the name of your project on the [{{site.data.keyword.codeengineshort}} Projects page](https://cloud.ibm.com/codeengine/projects){: external}.
5454
2. From the Overview page, click **Secrets and configmaps**.
5555
3. From the Secrets and configmaps page, click **Create** to create your configmap.
56-
4. From the Create config page, complete the following steps.
57-
1. Select the **Configmap** option.
56+
4. From the Create secret or configmap page, complete the following steps:
57+
1. Click **Configmap**, and click **Next**.
5858
2. Provide a name; for example, `myconfigmap`.
5959
3. Click **Add key-value pair**. Specify one or more key-value pairs for this configmap. For example, specify one key as `key1` with the value of `value1` and specify another key as `key2` with the value of `value2`. Notice that you can specify values on one or more lines. The name that you choose for your key does not need to be the same as the name of your environment variable.
6060
4. Click **Create** to create the configmap.
61-
5. Now that your configmap is created from the console, go to the Secrets and configmaps page to view a listing of defined secrets and configmaps.
61+
62+
Now that your configmap is created from the console, go to the Secrets and configmaps page to view a list of defined secrets and configmaps. You can apply filters to customize the list to meet your needs.
6263

6364
### Create a configmap with the CLI
6465
{: #configmap-create-cli}

landing.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"title": "Code Engine",
3-
"lastupdated": "2024-01-17",
3+
"lastupdated": "2024-01-19",
44
"introduction": "Find out how you can use Code Engine to run your containerized workloads",
55
"section_devtools": {
66
"api": "/apidocs/codeengine/v2",

plan-repo.md

Lines changed: 13 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
copyright:
44
years: 2024
5-
lastupdated: "2024-01-12"
5+
lastupdated: "2024-01-19"
66

77
keywords: repository access for code engine, source code access for code engine, access to source code in code engine, access keys in code engine, ssh key access in code engine, github repo access in code engine, gitlab repo access in code engine, code repository access for code engine, code repositories, Git repository access secret, code repository, private git repository, private repository, SSH secret
88

@@ -23,7 +23,7 @@ After you create access to your private code repository, you can pull code from
2323
## Create code repository access
2424
{: #create-code-repo}
2525

26-
When you create access to a private code repository, you are saving credentials in {{site.data.keyword.codeengineshort}}. In the console, these credentials are called *Code repo access*. In the CLI, these credentials are called *SSH secrets*.
26+
When you create access to a private code repository, you are saving credentials in {{site.data.keyword.codeengineshort}}. These credentials are called *SSH secrets*.
2727

2828
Before you begin
2929

@@ -54,13 +54,18 @@ Do not create your SSH key file with a secure passphrase as this action causes y
5454
### Adding private repository access from the console
5555
{: #add-repo-access-ce-console}
5656

57-
To add private repository access from the console,
57+
Before you begin, [create a project](/docs/codeengine?topic=codeengine-manage-project).
5858

59-
1. Go to the [{{site.data.keyword.codeengineshort}} dashboard](https://cloud.ibm.com/codeengine/overview).
60-
2. Select a project (or [create one](/docs/codeengine?topic=codeengine-manage-project#create-a-project)).
61-
3. From the project page, click **Code repo access**.
62-
4. Click **Create**.
63-
5. Specify a name, Code repo server, and the [SSH key](#choose-ssh-key).
59+
1. After your project is in **Active** status, click the name of your project on the [{{site.data.keyword.codeengineshort}} Projects page](https://cloud.ibm.com/codeengine/projects){: external}.
60+
2. From the Components page, click **Secrets and configmaps**.
61+
3. From the Secrets and configmaps page, click **Create** to create your secret.
62+
4. From the Create secret or configmap page, complete the following steps:
63+
1. Select **SSH secret**, and click **Next**.
64+
2. Provide a name; for example, `mysecret-ssh`.
65+
3. Add the SSH private key for this secret.
66+
4. Click **Create** to create the secret.
67+
68+
Now that your secret is created from the console, go to the Secrets and configmaps page to view a list of defined secrets and configmaps. You can apply filters to customize the list to meet your needs.
6469

6570
You can create access when you build an image.
6671
{: tip}

release-notes.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
copyright:
44
years: 2020, 2024
5-
lastupdated: "2024-01-17"
5+
lastupdated: "2024-01-19"
66

77
keywords: release notes for code engine, updates in code engine, what's new in code engine, document changes in code engine, updates, release notes
88

@@ -30,11 +30,11 @@ Review the release notes for January 2024.
3030
{: #codeengine-janxx24}
3131
{: release-note}
3232

33-
**REVIEW**
34-
35-
[Update]{: tag-magenta} Updated the user experience for making configuration changes to apps and jobs in the console.
36-
: {{site.data.keyword.codeengineshort}} has enhanced the user experience to simplify deploying configuration changes for applications and jobs. When you work in the {{site.data.keyword.codeengineshort}} console, instead of specifically entering an edit mode before you can make configuration changes, you can make changes to your configuration settings and deploy to make your changes effective. You can also redeploy your application without changes to configuration settings, if needed. See [update your application](/docs/codeengine?topic=codeengine-update-app).
33+
[Update]{: tag-magenta} Updated the user experience for making configuration changes to apps in the console.
34+
: {{site.data.keyword.codeengineshort}} has enhanced the user experience to simplify deploying configuration changes for applications. When you work in the {{site.data.keyword.codeengineshort}} console, instead of specifically entering an edit mode before you can make configuration changes, you can make changes to your configuration settings and deploy to make your changes effective. You can also redeploy your application without changes to configuration settings, if needed. See [Update your application](/docs/codeengine?topic=codeengine-update-app).
3735

36+
[Update]{: tag-magenta} Updated the user experience for creating secrets and configmaps in the console.
37+
: {{site.data.keyword.codeengineshort}} has enhanced the user experience to simplify creating and working with secrets and configmaps in the console. See [Working with secrets](/docs/codeengine?topic=codeengine-secret) and [Working with configmaps](/docs/codeengine?topic=codeengine-configmap).
3838

3939

4040
### 12 January 2024

0 commit comments

Comments
 (0)