Skip to content

Commit

Permalink
rewrite all links to prs to k8s links
Browse files Browse the repository at this point in the history
  • Loading branch information
mikedanese committed Aug 6, 2015
1 parent fe6b15b commit 8326697
Show file tree
Hide file tree
Showing 7 changed files with 8 additions and 8 deletions.
2 changes: 1 addition & 1 deletion docs/admin/cluster-large.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ To avoid running into cloud provider quota issues, when creating a cluster with

### Addon Resources

To prevent memory leaks or other resource issues in [cluster addons](../../cluster/addons/) from consuming all the resources available on a node, Kubernetes sets resource limits on addon containers to limit the CPU and Memory resources they can consume (See PR [#10653](https://github.com/GoogleCloudPlatform/kubernetes/pull/10653/files) and [#10778](https://github.com/GoogleCloudPlatform/kubernetes/pull/10778/files)).
To prevent memory leaks or other resource issues in [cluster addons](../../cluster/addons/) from consuming all the resources available on a node, Kubernetes sets resource limits on addon containers to limit the CPU and Memory resources they can consume (See PR [#10653](http://pr.k8s.io/10653/files) and [#10778](http://pr.k8s.io/10778/files)).

For example:

Expand Down
2 changes: 1 addition & 1 deletion docs/design/event_compression.md
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ This demonstrates what would have been 20 separate entries (indicating schedulin
* PR [#4157](http://issue.k8s.io/4157): Add "Update Event" to Kubernetes API
* PR [#4206](http://issue.k8s.io/4206): Modify Event struct to allow compressing multiple recurring events in to a single event
* PR [#4306](http://issue.k8s.io/4306): Compress recurring events in to a single event to optimize etcd storage
* PR [#4444](https://github.com/GoogleCloudPlatform/kubernetes/pull/4444): Switch events history to use LRU cache instead of map
* PR [#4444](http://pr.k8s.io/4444): Switch events history to use LRU cache instead of map


<!-- BEGIN MUNGE: GENERATED_ANALYTICS -->
Expand Down
4 changes: 2 additions & 2 deletions docs/design/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -127,11 +127,11 @@ A pod runs in a *security context* under a *service account* that is defined by
### Related design discussion

* [Authorization and authentication](access.md)
* [Secret distribution via files](https://github.com/GoogleCloudPlatform/kubernetes/pull/2030)
* [Secret distribution via files](http://pr.k8s.io/2030)
* [Docker secrets](https://github.com/docker/docker/pull/6697)
* [Docker vault](https://github.com/docker/docker/issues/10310)
* [Service Accounts:](service_accounts.md)
* [Secret volumes](https://github.com/GoogleCloudPlatform/kubernetes/pull/4126)
* [Secret volumes](http://pr.k8s.io/4126)

## Specific Design Points

Expand Down
2 changes: 1 addition & 1 deletion docs/design/security_context.md
Original file line number Diff line number Diff line change
Expand Up @@ -192,7 +192,7 @@ It is up to an admission plugin to determine if the security context is acceptab
time of writing, the admission control plugin for security contexts will only allow a context that
has defined capabilities or privileged. Contexts that attempt to define a UID or SELinux options
will be denied by default. In the future the admission plugin will base this decision upon
configurable policies that reside within the [service account](https://github.com/GoogleCloudPlatform/kubernetes/pull/2297).
configurable policies that reside within the [service account](http://pr.k8s.io/2297).


<!-- BEGIN MUNGE: GENERATED_ANALYTICS -->
Expand Down
2 changes: 1 addition & 1 deletion hack/cherry_pick_pull.sh
Original file line number Diff line number Diff line change
Expand Up @@ -100,7 +100,7 @@ cleanbranch="${NEWBRANCHUNIQ}"
gitamcleanup=true
for pull in "${PULLS[@]}"; do
echo "+++ Downloading patch to /tmp/${pull}.patch (in case you need to do this again)"
curl -o "/tmp/${pull}.patch" -sSL "https://github.com/GoogleCloudPlatform/kubernetes/pull/${pull}.patch"
curl -o "/tmp/${pull}.patch" -sSL "http://pr.k8s.io/${pull}.patch"
echo
echo "+++ About to attempt cherry pick of PR. To reattempt:"
echo " $ git am -3 /tmp/${pull}.patch"
Expand Down
2 changes: 1 addition & 1 deletion pkg/apiserver/apiserver_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1943,7 +1943,7 @@ func TestCreateNotFound(t *testing.T) {
handler := handle(map[string]rest.Storage{
"simple": &SimpleRESTStorage{
// storage.Create can fail with not found error in theory.
// See https://github.com/GoogleCloudPlatform/kubernetes/pull/486#discussion_r15037092.
// See http://pr.k8s.io/486#discussion_r15037092.
errors: map[string]error{"create": apierrs.NewNotFound("simple", "id")},
},
})
Expand Down
2 changes: 1 addition & 1 deletion pkg/kubectl/resource/visitor.go
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ const constSTDINstr string = "STDIN"

// Visitor lets clients walk a list of resources.
// TODO: we should rethink how we handle errors in the visit loop
// (See https://github.com/GoogleCloudPlatform/kubernetes/pull/9357#issuecomment-109600305)
// (See http://pr.k8s.io/9357#issuecomment-109600305)
type Visitor interface {
Visit(VisitorFunc) error
}
Expand Down

0 comments on commit 8326697

Please sign in to comment.