rewrite all links to prs to k8s links

This commit is contained in:
Mike Danese
2015-08-05 18:09:50 -07:00
parent fe6b15ba2f
commit 8326697055
7 changed files with 8 additions and 8 deletions

View File

@@ -113,7 +113,7 @@ This demonstrates what would have been 20 separate entries (indicating schedulin
* PR [#4157](http://issue.k8s.io/4157): Add "Update Event" to Kubernetes API
* PR [#4206](http://issue.k8s.io/4206): Modify Event struct to allow compressing multiple recurring events in to a single event
* PR [#4306](http://issue.k8s.io/4306): Compress recurring events in to a single event to optimize etcd storage
* PR [#4444](https://github.com/GoogleCloudPlatform/kubernetes/pull/4444): Switch events history to use LRU cache instead of map
* PR [#4444](http://pr.k8s.io/4444): Switch events history to use LRU cache instead of map
<!-- BEGIN MUNGE: GENERATED_ANALYTICS -->

View File

@@ -127,11 +127,11 @@ A pod runs in a *security context* under a *service account* that is defined by
### Related design discussion
* [Authorization and authentication](access.md)
* [Secret distribution via files](https://github.com/GoogleCloudPlatform/kubernetes/pull/2030)
* [Secret distribution via files](http://pr.k8s.io/2030)
* [Docker secrets](https://github.com/docker/docker/pull/6697)
* [Docker vault](https://github.com/docker/docker/issues/10310)
* [Service Accounts:](service_accounts.md)
* [Secret volumes](https://github.com/GoogleCloudPlatform/kubernetes/pull/4126)
* [Secret volumes](http://pr.k8s.io/4126)
## Specific Design Points

View File

@@ -192,7 +192,7 @@ It is up to an admission plugin to determine if the security context is acceptab
time of writing, the admission control plugin for security contexts will only allow a context that
has defined capabilities or privileged. Contexts that attempt to define a UID or SELinux options
will be denied by default. In the future the admission plugin will base this decision upon
configurable policies that reside within the [service account](https://github.com/GoogleCloudPlatform/kubernetes/pull/2297).
configurable policies that reside within the [service account](http://pr.k8s.io/2297).
<!-- BEGIN MUNGE: GENERATED_ANALYTICS -->