Jump To Close Expand all Collapse all Table of contents Builds 1. Understanding image builds Expand section "1. Understanding image builds" Collapse section "1. Understanding image builds" 1.1. Builds Expand section "1.1. Builds" Collapse section "1.1. Builds" 1.1.1. Docker build 1.1.2. Source-to-image build 1.1.3. Custom build 1.1.4. Pipeline build 2. Understanding build configurations Expand section "2. Understanding build configurations" Collapse section "2. Understanding build configurations" 2.1. BuildConfigs 3. Creating build inputs Expand section "3. Creating build inputs" Collapse section "3. Creating build inputs" 3.1. Build inputs 3.2. Dockerfile source 3.3. Image source 3.4. Git source Expand section "3.4. Git source" Collapse section "3.4. Git source" 3.4.1. Using a proxy 3.4.2. Source Clone Secrets Expand section "3.4.2. Source Clone Secrets" Collapse section "3.4.2. Source Clone Secrets" 3.4.2.1. Automatically adding a source clone secret to a build configuration 3.4.2.2. Manually adding a source clone secret 3.4.2.3. Creating a secret from a .gitconfig file 3.4.2.4. Creating a secret from a .gitconfig file for secured Git 3.4.2.5. Creating a secret from source code basic authentication 3.4.2.6. Creating a secret from source code SSH key authentication 3.4.2.7. Creating a secret from source code trusted certificate authorities 3.4.2.8. Source secret combinations Expand section "3.4.2.8. Source secret combinations" Collapse section "3.4.2.8. Source secret combinations" 3.4.2.8.1. Creating a SSH-based authentication secret with a .gitconfig file 3.4.2.8.2. Creating a secret that combines a .gitconfig file and CA certificate 3.4.2.8.3. Creating a basic authentication secret with a CA certificate 3.4.2.8.4. Creating a basic authentication secret with a .gitconfig file 3.4.2.8.5. Creating a basic authentication secret with a .gitconfig file and CA certificate 3.5. Binary (local) source 3.6. Input secrets and config maps Expand section "3.6. Input secrets and config maps" Collapse section "3.6. Input secrets and config maps" 3.6.1. Adding input secrets and config maps 3.6.2. Source-to-image strategy 3.6.3. Docker strategy 3.6.4. Custom strategy 3.7. External artifacts 3.8. Using docker credentials for private registries 3.9. Build environments Expand section "3.9. Build environments" Collapse section "3.9. Build environments" 3.9.1. Using build fields as environment variables 3.9.2. Using secrets as environment variables 3.10. What is a secret? Expand section "3.10. What is a secret?" Collapse section "3.10. What is a secret?" 3.10.1. Properties of secrets 3.10.2. Types of Secrets 3.10.3. Updates to secrets 3.10.4. Creating secrets Expand section "3.10.4. Creating secrets" Collapse section "3.10.4. Creating secrets" 3.10.4.1. Using secrets 3.11. Service serving certificate secrets 3.12. Secrets restrictions 4. Managing build output Expand section "4. Managing build output" Collapse section "4. Managing build output" 4.1. Build output 4.2. Output image environment variables 4.3. Output image labels 5. Using build strategies Expand section "5. Using build strategies" Collapse section "5. Using build strategies" 5.1. Docker build Expand section "5.1. Docker build" Collapse section "5.1. Docker build" 5.1.1. Replacing Dockerfile FROM image 5.1.2. Using Dockerfile path 5.1.3. Using docker environment variables 5.1.4. Adding docker build arguments 5.1.5. Squash layers with docker builds 5.2. Source-to-image build Expand section "5.2. Source-to-image build" Collapse section "5.2. Source-to-image build" 5.2.1. Performing source-to-image incremental builds 5.2.2. Overriding source-to-image builder image scripts 5.2.3. Source-to-image environment variables Expand section "5.2.3. Source-to-image environment variables" Collapse section "5.2.3. Source-to-image environment variables" 5.2.3.1. Using source-to-image environment files 5.2.3.2. Using source-to-image build configuration environment 5.2.4. Ignoring source-to-image source files 5.2.5. Creating images from source code with source-to-image Expand section "5.2.5. Creating images from source code with source-to-image" Collapse section "5.2.5. Creating images from source code with source-to-image" 5.2.5.1. Understanding the source-to-image build process 5.2.5.2. How to write source-to-image scripts 5.3. Custom build Expand section "5.3. Custom build" Collapse section "5.3. Custom build" 5.3.1. Using FROM image for custom builds 5.3.2. Using secrets in custom builds 5.3.3. Using environment variables for custom builds 5.3.4. Using custom builder images Expand section "5.3.4. Using custom builder images" Collapse section "5.3.4. Using custom builder images" 5.3.4.1. Custom builder image 5.3.4.2. Custom builder workflow 5.4. Pipeline build Expand section "5.4. Pipeline build" Collapse section "5.4. Pipeline build" 5.4.1. Understanding OpenShift Container Platform pipelines 5.4.2. Providing the Jenkins file for pipeline builds 5.4.3. Using environment variables for pipeline builds Expand section "5.4.3. Using environment variables for pipeline builds" Collapse section "5.4.3. Using environment variables for pipeline builds" 5.4.3.1. Mapping between BuildConfig environment variables and Jenkins job parameters 5.4.4. Pipeline build tutorial 5.5. Adding secrets with web console 5.6. Enabling pulling and pushing 6. Custom image builds with Buildah Expand section "6. Custom image builds with Buildah" Collapse section "6. Custom image builds with Buildah" 6.1. Prerequisites 6.2. Creating custom build artifacts 6.3. Build custom builder image 6.4. Use custom builder image 7. Performing basic builds Expand section "7. Performing basic builds" Collapse section "7. Performing basic builds" 7.1. Starting a build Expand section "7.1. Starting a build" Collapse section "7.1. Starting a build" 7.1.1. Re-running a build 7.1.2. Streaming build logs 7.1.3. Setting environment variables when starting a build 7.1.4. Starting a build with source 7.2. Canceling a build Expand section "7.2. Canceling a build" Collapse section "7.2. Canceling a build" 7.2.1. Canceling multiple builds 7.2.2. Canceling all builds 7.2.3. Canceling all builds in a given state 7.3. Deleting a BuildConfig 7.4. Viewing build details 7.5. Accessing build logs Expand section "7.5. Accessing build logs" Collapse section "7.5. Accessing build logs" 7.5.1. Accessing BuildConfig logs 7.5.2. Accessing BuildConfig logs for a given version build 7.5.3. Enabling log verbosity 8. Triggering and modifying builds Expand section "8. Triggering and modifying builds" Collapse section "8. Triggering and modifying builds" 8.1. Build triggers Expand section "8.1. Build triggers" Collapse section "8.1. Build triggers" 8.1.1. Webhook triggers Expand section "8.1.1. Webhook triggers" Collapse section "8.1.1. Webhook triggers" 8.1.1.1. Using GitHub webhooks 8.1.1.2. Using GitLab webhooks 8.1.1.3. Using Bitbucket webhooks 8.1.1.4. Using generic webhooks 8.1.1.5. Displaying webhook URLs 8.1.2. Using image change triggers 8.1.3. Configuration change triggers Expand section "8.1.3. Configuration change triggers" Collapse section "8.1.3. Configuration change triggers" 8.1.3.1. Setting triggers manually 8.2. Build hooks Expand section "8.2. Build hooks" Collapse section "8.2. Build hooks" 8.2.1. Configuring post commit build hooks 8.2.2. Using the CLI to set post commit build hooks 9. Performing advanced builds Expand section "9. Performing advanced builds" Collapse section "9. Performing advanced builds" 9.1. Setting build resources 9.2. Setting maximum duration 9.3. Assigning builds to specific nodes 9.4. Chained builds 9.5. Pruning builds 9.6. Build run policy 10. Using Red Hat subscriptions in builds Expand section "10. Using Red Hat subscriptions in builds" Collapse section "10. Using Red Hat subscriptions in builds" 10.1. Creating an image stream tag for the Red Hat Universal Base Image 10.2. Adding subscription entitlements as a build secret 10.3. Running builds with Subscription Manager Expand section "10.3. Running builds with Subscription Manager" Collapse section "10.3. Running builds with Subscription Manager" 10.3.1. Docker builds using Subscription Manager 10.4. Running builds with Red Hat Satellite subscriptions Expand section "10.4. Running builds with Red Hat Satellite subscriptions" Collapse section "10.4. Running builds with Red Hat Satellite subscriptions" 10.4.1. Adding Red Hat Satellite configurations to builds 10.4.2. Docker builds using Red Hat Satellite subscriptions 10.5. Squash layers with docker builds 10.6. Additional resources 11. Securing builds by strategy Expand section "11. Securing builds by strategy" Collapse section "11. Securing builds by strategy" 11.1. Disabling access to a build strategy globally 11.2. Restricting build strategies to users globally 11.3. Restricting build strategies to a user within a project 12. Build configuration resources Expand section "12. Build configuration resources" Collapse section "12. Build configuration resources" 12.1. Build controller configuration parameters 12.2. Configuring build settings 13. Troubleshooting builds Expand section "13. Troubleshooting builds" Collapse section "13. Troubleshooting builds" 13.1. Resolving denial for access to resources 13.2. Service certificate generation failure 14. Setting up additional trusted certificate authorities for builds Expand section "14. Setting up additional trusted certificate authorities for builds" Collapse section "14. Setting up additional trusted certificate authorities for builds" 14.1. Adding certificate authorities to the cluster 14.2. Additional resources 法律通告 Settings Close Language: 日本語 简体中文 English Language: 日本語 简体中文 English Format: Multi-page Single-page Format: Multi-page Single-page Language and Page Formatting Options Language: 日本語 简体中文 English Language: 日本語 简体中文 English Format: Multi-page Single-page Format: Multi-page Single-page 14.2. Additional resources Create a ConfigMap Secrets and ConfigMaps Configuring a custom PKI Previous Next