Skip to content

Commit

Permalink
Merge pull request #172 from eisraeli/minor_fixes
Browse files Browse the repository at this point in the history
Minor documentation fixes
  • Loading branch information
arewm authored Nov 18, 2024
2 parents 06e8026 + 5dbe717 commit c7d71f9
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
4 changes: 2 additions & 2 deletions docs/modules/ROOT/pages/getting-started/cli.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -18,9 +18,9 @@

. **Obtain the Template kubeconfig:** Once the PE has configured cluster access and created the template file, you'll receive a copy from your PE or IT team.

. *Personalize Your kubeconfig:** Make a copy of the template file and personalize it with your unique user context information. This might involve setting environment variables or editing the file directly as provided by the PE.
. *Personalize Your kubeconfig:* Make a copy of the template file and personalize it with your unique user context information. This might involve setting environment variables or editing the file directly as provided by the PE.

. *Use kubectl:** With your personalized `kubeconfig` in place, you can use the kubectl command-line tool to interact with your {ProductName} cluster.
. *Use kubectl:* With your personalized `kubeconfig` in place, you can use the kubectl command-line tool to interact with your {ProductName} cluster.

Whether you need to enable CLI access, or to gain access once it is available, refer to the relevant procedures below.

Expand Down
4 changes: 2 additions & 2 deletions docs/modules/ROOT/pages/index.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ Safeguard sensitive data with {ProductName}'s stringent access controls and gove

=== Supply-chain Levels for Software Artifacts (SLSA)

Supply-chain Levels for Software Artifacts (SLSA) is a security framework produced through industry collaboration. We use this framework as a guide for reinforcing the build process we use for your applications, to better secure your software supply chain.
link:https://slsa.dev[Supply-chain Levels for Software Artifacts (SLSA)] is a security framework produced through industry collaboration. We use this framework as a guide for reinforcing the build process we use for your applications, to better secure your software supply chain.

The SLSA Build (v1.0) specification assigns two primary responsibilities to build platforms like {ProductName}:

Expand Down Expand Up @@ -94,7 +94,7 @@ According to the SLSA framework, our other primary responsibility is to guarante

If builds run on an individual’s workstation, they become inconsistent. This inconsistency can cause mundane technical issues, but it also introduces security risks. What if undetected malware is lurking on that person’s machine?

To shrink the attack plane, SLSA dicates that builds should execute “using a hosted build platform on shared or dedicated infrastructure, not on an individual’s workstation.” By using an environment that comes from a known, auditable state, build platforms can largely ensure that they generate artifacts in the same way every time.
To shrink the attack plane, SLSA dictates that builds should execute “using a hosted build platform on shared or dedicated infrastructure, not on an individual’s workstation.” By using an environment that comes from a known, auditable state, build platforms can largely ensure that they generate artifacts in the same way every time.

{ProductName} is a hosted build platform. We execute builds on Amazon Web Services (AWS) through Red Hat OpenShift Service on AWS (ROSA).

Expand Down

0 comments on commit c7d71f9

Please sign in to comment.