summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLouis Taylor <louis@kragniz.eu>2017-03-22 12:09:04 +0000
committerGitHub <noreply@github.com>2017-03-22 12:09:04 +0000
commitd7feede71bfd273d4c905cbdcbe89759883e909a (patch)
treeba68440e5b9366c2fb954a4e084b10448a4e6bec
parent5856258d6b9cd408dd5691fbbdb755efd531289b (diff)
parenta1e13a6fa86983ea71158827a7b8b2fe8f8aa0ce (diff)
Merge pull request #471 from caiyixiang/modify_link
modify link
-rw-r--r--contributors/design-proposals/apparmor.md10
1 files changed, 5 insertions, 5 deletions
diff --git a/contributors/design-proposals/apparmor.md b/contributors/design-proposals/apparmor.md
index d7051567..0a4f620a 100644
--- a/contributors/design-proposals/apparmor.md
+++ b/contributors/design-proposals/apparmor.md
@@ -47,13 +47,13 @@ AppArmor can enable users to run a more secure deployment, and / or provide bett
monitoring of their systems. Although it is not the only solution, we should enable AppArmor for
users that want a simpler alternative to SELinux, or are already maintaining a set of AppArmor
profiles. We have heard from multiple Kubernetes users already that AppArmor support is important to
-them. The [seccomp proposal](../../docs/design/seccomp.md#use-cases) details several use cases that
+them. The [seccomp proposal](seccomp.md#use-cases) details several use cases that
also apply to AppArmor.
## Related work
Much of this design is drawn from the work already done to support seccomp profiles in Kubernetes,
-which is outlined in the [seccomp design doc](../../docs/design/seccomp.md). The designs should be
+which is outlined in the [seccomp design doc](seccomp.md). The designs should be
kept close to apply lessons learned, and reduce cognitive and maintenance overhead.
Docker has supported AppArmor profiles since version 1.3, and maintains a default profile which is
@@ -67,7 +67,7 @@ and is supported on several
# Alpha Design
This section describes the proposed design for
-[alpha-level](../../docs/devel/api_changes.md#alpha-beta-and-stable-versions) support, although
+[alpha-level](../devel/api_changes.md#alpha-beta-and-stable-versions) support, although
additional features are described in [future work](#future-work). For AppArmor alpha support
(targeted for Kubernetes 1.4) we will enable:
@@ -122,7 +122,7 @@ is a key matching the container, and a profile name value:
container.apparmor.security.alpha.kubernetes.io/<container_name>=<profile_name>
```
-The profiles can be specified in the following formats (following the convention used by [seccomp](../../docs/design/seccomp.md#api-changes)):
+The profiles can be specified in the following formats (following the convention used by [seccomp](seccomp.md#api-changes)):
1. `runtime/default` - Applies the default profile for the runtime. For docker, the profile is
generated from a template
@@ -292,7 +292,7 @@ documentation for following this process in a Kubernetes environment.
# Appendix
- [What is AppArmor](https://askubuntu.com/questions/236381/what-is-apparmor)
-- [Debugging AppArmor on Docker](https://github.com/docker/docker/blob/master/docs/security/apparmor.md#debug-apparmor)
+- [Debugging AppArmor on Docker](https://github.com/docker/labs/blob/master/security/apparmor/README.md)
- Load an AppArmor profile with `apparmor_parser` (required by Docker so it should be available):
```