diff options
| author | Mike Danese <mikedanese@gmail.com> | 2015-08-05 18:09:50 -0700 |
|---|---|---|
| committer | Mike Danese <mikedanese@gmail.com> | 2015-08-05 21:11:11 -0700 |
| commit | 09d971bc58179999aea2545bd2b922a6f170a3ef (patch) | |
| tree | 8c24c246444d4132300267f0d5cd7b527eb9cc1e | |
| parent | a74ffb6a381cf9a7bd8282c8d9806bae41680f3d (diff) | |
rewrite all links to prs to k8s links
| -rw-r--r-- | event_compression.md | 2 | ||||
| -rw-r--r-- | security.md | 4 | ||||
| -rw-r--r-- | security_context.md | 2 |
3 files changed, 4 insertions, 4 deletions
diff --git a/event_compression.md b/event_compression.md index b14d5206..1187edb6 100644 --- a/event_compression.md +++ b/event_compression.md @@ -113,7 +113,7 @@ This demonstrates what would have been 20 separate entries (indicating schedulin * PR [#4157](http://issue.k8s.io/4157): Add "Update Event" to Kubernetes API * PR [#4206](http://issue.k8s.io/4206): Modify Event struct to allow compressing multiple recurring events in to a single event * PR [#4306](http://issue.k8s.io/4306): Compress recurring events in to a single event to optimize etcd storage - * PR [#4444](https://github.com/GoogleCloudPlatform/kubernetes/pull/4444): Switch events history to use LRU cache instead of map + * PR [#4444](http://pr.k8s.io/4444): Switch events history to use LRU cache instead of map <!-- BEGIN MUNGE: GENERATED_ANALYTICS --> diff --git a/security.md b/security.md index 1d73a529..5c187d69 100644 --- a/security.md +++ b/security.md @@ -127,11 +127,11 @@ A pod runs in a *security context* under a *service account* that is defined by ### Related design discussion * [Authorization and authentication](access.md) -* [Secret distribution via files](https://github.com/GoogleCloudPlatform/kubernetes/pull/2030) +* [Secret distribution via files](http://pr.k8s.io/2030) * [Docker secrets](https://github.com/docker/docker/pull/6697) * [Docker vault](https://github.com/docker/docker/issues/10310) * [Service Accounts:](service_accounts.md) -* [Secret volumes](https://github.com/GoogleCloudPlatform/kubernetes/pull/4126) +* [Secret volumes](http://pr.k8s.io/4126) ## Specific Design Points diff --git a/security_context.md b/security_context.md index 4704caab..1d2b4f71 100644 --- a/security_context.md +++ b/security_context.md @@ -192,7 +192,7 @@ It is up to an admission plugin to determine if the security context is acceptab time of writing, the admission control plugin for security contexts will only allow a context that has defined capabilities or privileged. Contexts that attempt to define a UID or SELinux options will be denied by default. In the future the admission plugin will base this decision upon -configurable policies that reside within the [service account](https://github.com/GoogleCloudPlatform/kubernetes/pull/2297). +configurable policies that reside within the [service account](http://pr.k8s.io/2297). <!-- BEGIN MUNGE: GENERATED_ANALYTICS --> |
