Skip to content

Commit 2cabc04

Browse files
soltyshahardin-rh
authored andcommitted
[enterprise-3.9] Use oc create secret instead of deprecated oc secrets subcommands
(cherry picked from commit dd90773) xref:openshift#7262
1 parent 914f296 commit 2cabc04

File tree

3 files changed

+64
-45
lines changed

3 files changed

+64
-45
lines changed

dev_guide/builds/build_inputs.adoc

+41-30
Original file line numberDiff line numberDiff line change
@@ -434,7 +434,7 @@ it to the builder service account, and then your `BuildConfig`.
434434
To create a secret from a *_.gitconfig_* file:
435435

436436
----
437-
$ oc secrets new mysecret .gitconfig=path/to/.gitconfig
437+
$ oc create secret generic <secret_name> --from-file=<path/to/.gitconfig>
438438
----
439439

440440
[NOTE]
@@ -458,16 +458,19 @@ Create the `secret` first before using the user name and password to access the
458458
private repository:
459459

460460
----
461-
$ oc secrets new-basicauth <secret_name> \
462-
--username=<user_name> \
463-
--password=<password>
461+
$ oc create secret generic <secret_name> \
462+
--from-literal=username=<user_name> \
463+
--from-literal=password=<password> \
464+
--type=kubernetes.io/basic-auth
464465
----
465466

466467
To create a basic authentication secret with a token:
467468

468469
----
469-
$ oc secrets new-basicauth <secret_name> \
470-
--password=<token>
470+
$ oc create secret generic <secret_name> \
471+
--from-literal=password=<token> \
472+
--type=kubernetes.io/basic-auth
473+
471474
----
472475

473476
[[source-secrets-ssh-key-authentication]]
@@ -498,8 +501,9 @@ Before using the SSH key to access the private repository, create the secret
498501
first:
499502

500503
----
501-
$ oc secrets new-sshauth sshsecret \
502-
--ssh-privatekey=$HOME/.ssh/id_rsa
504+
$ oc create secret generic <secret_name> \
505+
--from-file=ssh-privatekey=<path/to/ssh/private/key> \
506+
--type=kubernetes.io/ssh-auth
503507
----
504508

505509
[[source-secrets-trusted-certificate-authorities]]
@@ -519,7 +523,7 @@ significantly more secure than disabling Git's SSL verification, which accepts
519523
any TLS certificate that is presented.
520524
+
521525
----
522-
$ oc secrets new mycert ca.crt=</path/to/file> <1>
526+
$ oc create secret generic mycert --from-file=ca.crt=</path/to/file> <1>
523527
----
524528
<1> The key name *_ca.crt_* must be used.
525529

@@ -540,45 +544,49 @@ creating source clone secrets for your specific needs.
540544
.. To create an SSH-based authentication secret with a *_.gitconfig_* file:
541545
+
542546
----
543-
$ oc secrets new-sshauth sshsecret \
544-
--ssh-privatekey=$HOME/.ssh/id_rsa \
545-
--gitconfig=</path/to/file>
547+
$ oc create secret generic <secret_name> \
548+
--from-file=ssh-privatekey=<path/to/ssh/private/key> \
549+
--from-file=<path/to/.gitconfig> \
550+
--type=kubernetes.io/ssh-auth
546551
----
547552

548553
.. To create a secret that combines a *_.gitconfig_* file and CA certificate:
549554
+
550555
----
551-
$ oc secrets new mysecret \
552-
ca.crt=path/to/certificate \
553-
.gitconfig=path/to/.gitconfig
556+
$ oc create secret generic <secret_name> \
557+
--from-file=ca.crt=<path/to/certificate> \
558+
--from-file=<path/to/.gitconfig>
554559
----
555560

556561
.. To create a basic authentication secret with a CA certificate file:
557562
+
558563
----
559-
$ oc secrets new-basicauth <secret_name> \
560-
--username=<user_name> \
561-
--password=<password> \
562-
--ca-cert=</path/to/file>
564+
$ oc create secret generic <secret_name> \
565+
--from-literal=username=<user_name> \
566+
--from-literal=password=<password> \
567+
--from-file=ca-cert=</path/to/file> \
568+
--type=kubernetes.io/basic-auth
563569
----
564570

565571
.. To create a basic authentication secret with a *_.gitconfig_* file:
566572
+
567573
----
568-
$ oc secrets new-basicauth <secret_name> \
569-
--username=<user_name> \
570-
--password=<password> \
571-
--gitconfig=</path/to/file>
574+
$ oc create secret generic <secret_name> \
575+
--from-literal=username=<user_name> \
576+
--from-literal=password=<password> \
577+
--from-file=</path/to/.gitconfig> \
578+
--type=kubernetes.io/basic-auth
572579
----
573580

574581
.. To create a basic authentication secret with a *_.gitconfig_* file and CA certificate file:
575582
+
576583
----
577-
$ oc secrets new-basicauth <secret_name> \
578-
--username=<user_name> \
579-
--password=<password> \
580-
--gitconfig=</path/to/file> \
581-
--ca-cert=</path/to/file>
584+
$ oc create secret generic <secret_name> \
585+
--from-literal=username=<user_name> \
586+
--from-literal=password=<password> \
587+
--from-file=</path/to/.gitconfig> \
588+
--from-file=ca-cert=</path/to/file> \
589+
--type=kubernetes.io/basic-auth
582590
----
583591

584592

@@ -681,7 +689,8 @@ To add an input secret to an existing `BuildConfig`:
681689
. Create the secret, if it does not exist:
682690
+
683691
----
684-
$ oc secrets new secret-npmrc .npmrc=~/.npmrc
692+
$ oc create secret generic secret-npmrc \
693+
--from-file=.npmrc=<path/to/.npmrc>
685694
----
686695
+
687696
This creates a new secret named *_secret-npmrc_*, which contains the base64
@@ -929,7 +938,9 @@ be used to store configuration and passwords.
929938
. Create the secret from your local *_.docker/config.json_* file:
930939
+
931940
----
932-
$ oc secrets new dockerhub ~/.docker/config.json
941+
$ oc create secret generic dockerhub \
942+
--from-file=.dockerconfigjson=<path/to/.docker/config.json> \
943+
--type=kubernetes.io/dockerconfigjson
933944
----
934945
+
935946
This generates a JSON specification of the secret named `dockerhub` and

dev_guide/managing_images.adoc

+19-13
Original file line numberDiff line numberDiff line change
@@ -605,22 +605,28 @@ If you already have a *_.dockercfg_* file for
605605
the secured registry, you can create a secret from that file by running:
606606

607607
----
608-
$ oc secrets new <pull_secret_name> .dockercfg=<path/to/.dockercfg>
608+
$ oc create secret generic <pull_secret_name> \
609+
--from-file=.dockercfg=<path/to/.dockercfg> \
610+
--type=kubernetes.io/dockercfg
609611
----
610612

611613
Or if you have a *_$HOME/.docker/config.json_* file:
612614

613615
----
614-
$ oc secrets new <pull_secret_name> .dockerconfigjson=<path/to/.docker/config.json>
616+
$ oc create secret generic <pull_secret_name> \
617+
--from-file=.dockerconfigjson=<path/to/.docker/config.json> \
618+
--type=kubernetes.io/dockerconfigjson
615619
----
616620

617621
If you do not already have a Docker credentials file for the secured registry,
618622
you can create a secret by running:
619623

620624
----
621-
$ oc secrets new-dockercfg <pull_secret_name> \
622-
--docker-server=<registry_server> --docker-username=<user_name> \
623-
--docker-password=<password> --docker-email=<email>
625+
$ oc create secret docker-registry <pull_secret_name> \
626+
--docker-server=<registry_server> \
627+
--docker-username=<user_name> \
628+
--docker-password=<password> \
629+
--docker-email=<email>
624630
----
625631

626632
To use a secret for pulling images for pods, you must add the secret to your
@@ -658,7 +664,7 @@ applies.
658664
. Create a secret for the delegated authentication server:
659665
+
660666
----
661-
$ oc secret new-dockercfg \
667+
$ oc create secret docker-registry \
662668
--docker-server=sso.redhat.com \
663669
664670
--docker-password=******** \
@@ -671,7 +677,7 @@ secret/redhat-connect-sso
671677
. Create a secret for the private registry:
672678
+
673679
----
674-
$ oc secret new-dockercfg \
680+
$ oc create secret docker-registry \
675681
--docker-server=privateregistry.example.com \
676682
677683
--docker-password=******** \
@@ -695,7 +701,7 @@ $ docker login registry.connect.redhat.com --username [email protected]
695701
Password: *************
696702
Login Succeeded
697703
698-
$ oc secret new redhat-connect .dockerconfigjson=/root/.docker/config.json
704+
$ oc create secret generic redhat-connect --from-file=.dockerconfigjson=.docker/config.json
699705
700706
$ oc secrets link default redhat-connect --for=pull
701707
----
@@ -969,7 +975,7 @@ which is used to store your credentials.
969975
Create the secret first, before importing the image from the private repository:
970976

971977
----
972-
$ oc secrets new-dockercfg <secret_name> \
978+
$ oc create secret docker-registry <secret_name> \
973979
--docker-server=<docker_registry_server> \
974980
--docker-username=<docker_user> \
975981
--docker-password=<docker_password> \
@@ -979,7 +985,7 @@ $ oc secrets new-dockercfg <secret_name> \
979985
For more options, see:
980986

981987
----
982-
$ oc secrets new-dockercfg --help
988+
$ oc create secret docker-registry --help
983989
----
984990

985991
After the secret is configured, proceed with creating the new image stream or
@@ -1053,15 +1059,15 @@ Before performing this procedure, the following must be satisfied:
10531059

10541060
- The destination project you push to must already exist.
10551061
- The user must be authorized to `{get, update} "imagestream/layers"` in that
1056-
project. In addition, since the image stream does not already exist, the user
1057-
must be authorized to `{create} "imagestream"` in that project. If you are a project
1062+
project. In addition, since the image stream does not already exist, the user
1063+
must be authorized to `{create} "imagestream"` in that project. If you are a project
10581064
administrator, then you would have these permissions.
10591065

10601066
[NOTE]
10611067
====
10621068
The *system:image-pusher* role does not grant permission to create new image streams,
10631069
only to push images to existing image streams, so it cannot be used to push images
1064-
to image streams that do not yet exist unless additional permissions are also granted to
1070+
to image streams that do not yet exist unless additional permissions are also granted to
10651071
the user.
10661072
====
10671073

dev_guide/service_accounts.adoc

+4-2
Original file line numberDiff line numberDiff line change
@@ -101,10 +101,12 @@ This example creates and adds secrets to a service account:
101101

102102
====
103103
----
104-
$ oc secrets new secret-plans plan1.txt plan2.txt
104+
$ oc create secret generic secret-plans \
105+
--from-file=plan1.txt \
106+
--from-file=plan2.txt
105107
secret/secret-plans
106108
107-
$ oc secrets new-dockercfg my-pull-secret \
109+
$ oc create secret docker-registry my-pull-secret \
108110
--docker-username=mastermind \
109111
--docker-password=12345 \
110112

0 commit comments

Comments
 (0)