mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-31 05:40:42 +00:00 
			
		
		
		
	rewrite all links to prs to k8s links
This commit is contained in:
		| @@ -64,7 +64,7 @@ To avoid running into cloud provider quota issues, when creating a cluster with | ||||
|  | ||||
| ### Addon Resources | ||||
|  | ||||
| To prevent memory leaks or other resource issues in [cluster addons](../../cluster/addons/) from consuming all the resources available on a node, Kubernetes sets resource limits on addon containers to limit the CPU and Memory resources they can consume (See PR [#10653](https://github.com/GoogleCloudPlatform/kubernetes/pull/10653/files) and [#10778](https://github.com/GoogleCloudPlatform/kubernetes/pull/10778/files)). | ||||
| To prevent memory leaks or other resource issues in [cluster addons](../../cluster/addons/) from consuming all the resources available on a node, Kubernetes sets resource limits on addon containers to limit the CPU and Memory resources they can consume (See PR [#10653](http://pr.k8s.io/10653/files) and [#10778](http://pr.k8s.io/10778/files)). | ||||
|  | ||||
| For example: | ||||
|  | ||||
|   | ||||
| @@ -113,7 +113,7 @@ This demonstrates what would have been 20 separate entries (indicating schedulin | ||||
|  * PR [#4157](http://issue.k8s.io/4157): Add "Update Event" to Kubernetes API | ||||
|  * PR [#4206](http://issue.k8s.io/4206): Modify Event struct to allow compressing multiple recurring events in to a single event | ||||
|  * PR [#4306](http://issue.k8s.io/4306): Compress recurring events in to a single event to optimize etcd storage | ||||
|  * PR [#4444](https://github.com/GoogleCloudPlatform/kubernetes/pull/4444): Switch events history to use LRU cache instead of map | ||||
|  * PR [#4444](http://pr.k8s.io/4444): Switch events history to use LRU cache instead of map | ||||
|  | ||||
|  | ||||
| <!-- BEGIN MUNGE: GENERATED_ANALYTICS --> | ||||
|   | ||||
| @@ -127,11 +127,11 @@ A pod runs in a *security context* under a *service account* that is defined by | ||||
| ### Related design discussion | ||||
|  | ||||
| * [Authorization and authentication](access.md) | ||||
| * [Secret distribution via files](https://github.com/GoogleCloudPlatform/kubernetes/pull/2030) | ||||
| * [Secret distribution via files](http://pr.k8s.io/2030) | ||||
| * [Docker secrets](https://github.com/docker/docker/pull/6697) | ||||
| * [Docker vault](https://github.com/docker/docker/issues/10310) | ||||
| * [Service Accounts:](service_accounts.md) | ||||
| * [Secret volumes](https://github.com/GoogleCloudPlatform/kubernetes/pull/4126) | ||||
| * [Secret volumes](http://pr.k8s.io/4126) | ||||
|  | ||||
| ## Specific Design Points | ||||
|  | ||||
|   | ||||
| @@ -192,7 +192,7 @@ It is up to an admission plugin to determine if the security context is acceptab | ||||
| time of writing, the admission control plugin for security contexts will only allow a context that | ||||
| has defined capabilities or privileged.  Contexts that attempt to define a UID or SELinux options | ||||
| will be denied by default.  In the future the admission plugin will base this decision upon | ||||
| configurable policies that reside within the [service account](https://github.com/GoogleCloudPlatform/kubernetes/pull/2297). | ||||
| configurable policies that reside within the [service account](http://pr.k8s.io/2297). | ||||
|  | ||||
|  | ||||
| <!-- BEGIN MUNGE: GENERATED_ANALYTICS --> | ||||
|   | ||||
| @@ -100,7 +100,7 @@ cleanbranch="${NEWBRANCHUNIQ}" | ||||
| gitamcleanup=true | ||||
| for pull in "${PULLS[@]}"; do | ||||
|   echo "+++ Downloading patch to /tmp/${pull}.patch (in case you need to do this again)" | ||||
|   curl -o "/tmp/${pull}.patch" -sSL "https://github.com/GoogleCloudPlatform/kubernetes/pull/${pull}.patch" | ||||
|   curl -o "/tmp/${pull}.patch" -sSL "http://pr.k8s.io/${pull}.patch" | ||||
|   echo | ||||
|   echo "+++ About to attempt cherry pick of PR. To reattempt:" | ||||
|   echo "  $ git am -3 /tmp/${pull}.patch" | ||||
|   | ||||
| @@ -1943,7 +1943,7 @@ func TestCreateNotFound(t *testing.T) { | ||||
| 	handler := handle(map[string]rest.Storage{ | ||||
| 		"simple": &SimpleRESTStorage{ | ||||
| 			// storage.Create can fail with not found error in theory. | ||||
| 			// See https://github.com/GoogleCloudPlatform/kubernetes/pull/486#discussion_r15037092. | ||||
| 			// See http://pr.k8s.io/486#discussion_r15037092. | ||||
| 			errors: map[string]error{"create": apierrs.NewNotFound("simple", "id")}, | ||||
| 		}, | ||||
| 	}) | ||||
|   | ||||
| @@ -40,7 +40,7 @@ const constSTDINstr string = "STDIN" | ||||
|  | ||||
| // Visitor lets clients walk a list of resources. | ||||
| // TODO: we should rethink how we handle errors in the visit loop | ||||
| // (See https://github.com/GoogleCloudPlatform/kubernetes/pull/9357#issuecomment-109600305) | ||||
| // (See http://pr.k8s.io/9357#issuecomment-109600305) | ||||
| type Visitor interface { | ||||
| 	Visit(VisitorFunc) error | ||||
| } | ||||
|   | ||||
		Reference in New Issue
	
	Block a user