From 8326697055cd7de7317a62c0fded34e2c81a7d05 Mon Sep 17 00:00:00 2001 From: Mike Danese Date: Wed, 5 Aug 2015 18:09:50 -0700 Subject: [PATCH] rewrite all links to prs to k8s links --- docs/admin/cluster-large.md | 2 +- docs/design/event_compression.md | 2 +- docs/design/security.md | 4 ++-- docs/design/security_context.md | 2 +- hack/cherry_pick_pull.sh | 2 +- pkg/apiserver/apiserver_test.go | 2 +- pkg/kubectl/resource/visitor.go | 2 +- 7 files changed, 8 insertions(+), 8 deletions(-) diff --git a/docs/admin/cluster-large.md b/docs/admin/cluster-large.md index a7cfcf6a209..28b83e5bbb1 100644 --- a/docs/admin/cluster-large.md +++ b/docs/admin/cluster-large.md @@ -64,7 +64,7 @@ To avoid running into cloud provider quota issues, when creating a cluster with ### Addon Resources -To prevent memory leaks or other resource issues in [cluster addons](../../cluster/addons/) from consuming all the resources available on a node, Kubernetes sets resource limits on addon containers to limit the CPU and Memory resources they can consume (See PR [#10653](https://github.com/GoogleCloudPlatform/kubernetes/pull/10653/files) and [#10778](https://github.com/GoogleCloudPlatform/kubernetes/pull/10778/files)). +To prevent memory leaks or other resource issues in [cluster addons](../../cluster/addons/) from consuming all the resources available on a node, Kubernetes sets resource limits on addon containers to limit the CPU and Memory resources they can consume (See PR [#10653](http://pr.k8s.io/10653/files) and [#10778](http://pr.k8s.io/10778/files)). For example: diff --git a/docs/design/event_compression.md b/docs/design/event_compression.md index b14d5206100..1187edb6c92 100644 --- a/docs/design/event_compression.md +++ b/docs/design/event_compression.md @@ -113,7 +113,7 @@ This demonstrates what would have been 20 separate entries (indicating schedulin * PR [#4157](http://issue.k8s.io/4157): Add "Update Event" to Kubernetes API * PR [#4206](http://issue.k8s.io/4206): Modify Event struct to allow compressing multiple recurring events in to a single event * PR [#4306](http://issue.k8s.io/4306): Compress recurring events in to a single event to optimize etcd storage - * PR [#4444](https://github.com/GoogleCloudPlatform/kubernetes/pull/4444): Switch events history to use LRU cache instead of map + * PR [#4444](http://pr.k8s.io/4444): Switch events history to use LRU cache instead of map diff --git a/docs/design/security.md b/docs/design/security.md index 1d73a5293f4..5c187d698cf 100644 --- a/docs/design/security.md +++ b/docs/design/security.md @@ -127,11 +127,11 @@ A pod runs in a *security context* under a *service account* that is defined by ### Related design discussion * [Authorization and authentication](access.md) -* [Secret distribution via files](https://github.com/GoogleCloudPlatform/kubernetes/pull/2030) +* [Secret distribution via files](http://pr.k8s.io/2030) * [Docker secrets](https://github.com/docker/docker/pull/6697) * [Docker vault](https://github.com/docker/docker/issues/10310) * [Service Accounts:](service_accounts.md) -* [Secret volumes](https://github.com/GoogleCloudPlatform/kubernetes/pull/4126) +* [Secret volumes](http://pr.k8s.io/4126) ## Specific Design Points diff --git a/docs/design/security_context.md b/docs/design/security_context.md index 4704caab299..1d2b4f71682 100644 --- a/docs/design/security_context.md +++ b/docs/design/security_context.md @@ -192,7 +192,7 @@ It is up to an admission plugin to determine if the security context is acceptab time of writing, the admission control plugin for security contexts will only allow a context that has defined capabilities or privileged. Contexts that attempt to define a UID or SELinux options will be denied by default. In the future the admission plugin will base this decision upon -configurable policies that reside within the [service account](https://github.com/GoogleCloudPlatform/kubernetes/pull/2297). +configurable policies that reside within the [service account](http://pr.k8s.io/2297). diff --git a/hack/cherry_pick_pull.sh b/hack/cherry_pick_pull.sh index b5e67e5a3a8..bc4755b5301 100755 --- a/hack/cherry_pick_pull.sh +++ b/hack/cherry_pick_pull.sh @@ -100,7 +100,7 @@ cleanbranch="${NEWBRANCHUNIQ}" gitamcleanup=true for pull in "${PULLS[@]}"; do echo "+++ Downloading patch to /tmp/${pull}.patch (in case you need to do this again)" - curl -o "/tmp/${pull}.patch" -sSL "https://github.com/GoogleCloudPlatform/kubernetes/pull/${pull}.patch" + curl -o "/tmp/${pull}.patch" -sSL "http://pr.k8s.io/${pull}.patch" echo echo "+++ About to attempt cherry pick of PR. To reattempt:" echo " $ git am -3 /tmp/${pull}.patch" diff --git a/pkg/apiserver/apiserver_test.go b/pkg/apiserver/apiserver_test.go index f26e109fec0..9274c7f9732 100644 --- a/pkg/apiserver/apiserver_test.go +++ b/pkg/apiserver/apiserver_test.go @@ -1943,7 +1943,7 @@ func TestCreateNotFound(t *testing.T) { handler := handle(map[string]rest.Storage{ "simple": &SimpleRESTStorage{ // storage.Create can fail with not found error in theory. - // See https://github.com/GoogleCloudPlatform/kubernetes/pull/486#discussion_r15037092. + // See http://pr.k8s.io/486#discussion_r15037092. errors: map[string]error{"create": apierrs.NewNotFound("simple", "id")}, }, }) diff --git a/pkg/kubectl/resource/visitor.go b/pkg/kubectl/resource/visitor.go index 6dd82c24d77..51e8ecc8524 100644 --- a/pkg/kubectl/resource/visitor.go +++ b/pkg/kubectl/resource/visitor.go @@ -40,7 +40,7 @@ const constSTDINstr string = "STDIN" // Visitor lets clients walk a list of resources. // TODO: we should rethink how we handle errors in the visit loop -// (See https://github.com/GoogleCloudPlatform/kubernetes/pull/9357#issuecomment-109600305) +// (See http://pr.k8s.io/9357#issuecomment-109600305) type Visitor interface { Visit(VisitorFunc) error }