Skip to content

Commit 26eb50d

Browse files
committed
fix broken links
Signed-off-by: Tim Ramlot <[email protected]>
1 parent b9a5602 commit 26eb50d

File tree

14 files changed

+26
-25
lines changed

14 files changed

+26
-25
lines changed

content/docs/concepts/acme-orders-challenges.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ In order to complete these challenges, cert-manager introduces two
2020
validation can be found on the Let's Encrypt website
2121
[here](https://letsencrypt.org/how-it-works/). An order represents a single
2222
certificate request which will be created automatically once a new
23-
[`CertificateRequest`](./certificaterequest.md) resource referencing an ACME
23+
[`CertificateRequest`](../usage/certificaterequest.md) resource referencing an ACME
2424
issuer has been created. `CertificateRequest` resources are created
2525
automatically by cert-manager once a [`Certificate`](./certificate.md) resource
2626
is created, has its specification changed, or needs renewal.

content/docs/contributing/external-issuers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,13 +49,13 @@ on how to write an external issuer using Kubebuilder and controller-runtime.
4949
## Approval
5050

5151
Before signing a certificate, Issuers **must** also ensure that the `CertificateRequest` is
52-
[`Approved`](../concepts/certificaterequest.md#approval).
52+
[`Approved`](../usage/certificaterequest.md#approval).
5353

5454
If the `CertificateRequest` is not `Approved`, the issuer **must** not process it. Issuers are not
5555
responsible for approving `CertificateRequests` and should refuse to proceed if they find a certificate
5656
that is not approved.
5757

58-
If a `CertificateRequest` created for an issuance associated with a `Certificate` gets [`Denied`](../concepts/certificaterequest.md#approval), the issuance will be failed by cert-manager's issuing controller.
58+
If a `CertificateRequest` created for an issuance associated with a `Certificate` gets [`Denied`](../usage/certificaterequest.md#approval), the issuance will be failed by cert-manager's issuing controller.
5959

6060
## Conditions
6161

@@ -65,7 +65,7 @@ status of that resource to a ready state, as this is what is used to signal to h
6565
controllers - such as the `Certificate` controller - that the resource is ready to be consumed.
6666

6767
Conversely, if the `CertificateRequest` fails, it is as important to mark the resource as such, as this will
68-
also be used as a signal to higher order controllers. Valid condition states are listed under [concepts](../concepts/certificaterequest.md#conditions).
68+
also be used as a signal to higher order controllers. Valid condition states are listed under [concepts](../usage/certificaterequest.md#conditions).
6969

7070
## Implementation
7171

content/docs/projects/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,19 +8,19 @@ that extend the project's functionality, and complement the core cert-manager fe
88

99
These tools help with security, compliance and control.
1010

11-
- [istio-csr](./istio-csr.md): Secure Istio service mesh with istio-csr which is
11+
- [istio-csr](../usage/istio-csr.md): Secure Istio service mesh with istio-csr which is
1212
an agent that allows for [Istio](https://istio.io) workload and control plane
1313
components to be secured using cert-manager.
1414
- [approver-policy](./approver-policy/README.md):
1515
a cert-manager **approver** that will automatically approve or deny
1616
certificate requests based on defined policy.
17-
- [csi-driver](./csi-driver.md):
17+
- [csi-driver](../usage/csi-driver.md):
1818
a Container Storage Interface (CSI) driver plugin for Kubernetes to work along
1919
cert-manager. The goal for this plugin is to seamlessly request and mount
2020
certificate key pairs to pods. This is useful for facilitating mTLS, or
2121
otherwise securing connections of pods with guaranteed present certificates
2222
whilst having all of the features that cert-manager provides.
23-
- [csi-driver-spiffe](./csi-driver-spiffe.md):
23+
- [csi-driver-spiffe](../usage/csi-driver-spiffe.md):
2424
another CSI driver plugin to work along cert-manager. This CSI driver
2525
transparently delivers [SPIFFE](https://spiffe.io/)
2626
[SVIDs](https://spiffe.io/docs/latest/spiffe-about/spiffe-concepts/#spiffe-verifiable-identity-document-svid)

content/docs/projects/approver-policy/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ description: 'Policy plugin for cert-manager'
44
---
55

66
approver-policy is a cert-manager
7-
[approver](../../concepts/certificaterequest.md#approval)
7+
[approver](../../usage/certificaterequest.md#approval)
88
that will approve or deny CertificateRequests based on policies defined in
99
the `CertificateRequestPolicy` custom resource.
1010

1111
## Prerequisites
1212

1313
[cert-manager must be installed](../../installation/README.md), and
14-
the [the default approver in cert-manager must be disabled](../../concepts/certificaterequest.md#approver-controller).
14+
the [the default approver in cert-manager must be disabled](../../usage/certificaterequest.md#approver-controller).
1515

1616
> ⚠️ If the default approver is not disabled in cert-manager, approver-policy will
1717
> race with cert-manager and policy will be ineffective.
@@ -69,7 +69,7 @@ If you are using approver-policy with [external
6969
issuers](../../configuration/external.md), you _must_
7070
include their signer names so that approver-policy has permissions to approve
7171
and deny CertificateRequests that
72-
[reference them](../../concepts/certificaterequest.md#rbac-syntax).
72+
[reference them](../../usage/certificaterequest.md#rbac-syntax).
7373
For example, if using approver-policy for the internal issuer types, along with
7474
[google-cas-issuer](https://github.com/jetstack/google-cas-issuer), and
7575
[aws-privateca-issuer](https://github.com/cert-manager/aws-privateca-issuer),

content/docs/reference/cmctl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Use "cmctl [command] --help" for more information about a command.
7474
### Approve and Deny CertificateRequests
7575

7676
CertificateRequests can be
77-
[approved or denied](../concepts/certificaterequest.md#approval) using their
77+
[approved or denied](../usage/certificaterequest.md#approval) using their
7878
respective cmctl commands:
7979

8080
> **Note**: The internal cert-manager approver may automatically approve all

content/docs/tutorials/istio-csr/istio-csr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,7 @@ kubectl create secret generic -n cert-manager istio-root-ca --from-file=ca.pem=c
7878
## Installing istio-csr
7979

8080
istio-csr is best installed via Helm, and it should be simple and quick to install. There
81-
are a bunch of other configuration options for the helm chart, which you can check out [here](../../projects/istio-csr.md).
81+
are a bunch of other configuration options for the helm chart, which you can check out [here](../../usage/istio-csr.md).
8282

8383
```console
8484
helm repo add jetstack https://charts.jetstack.io

content/docs/usage/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ There are several use cases and methods for requesting certificates through cert
2323
pods.
2424
- [Securing Istio Gateway](https://istio.io/docs/tasks/traffic-management/ingress/ingress-certmgr/):
2525
Secure your Istio Gateway in Kubernetes using cert-manager.
26-
- [Securing Istio Service Mesh](./istio.md): Using the cert-manager
26+
- [Securing Istio Service Mesh](./istio-csr.md): Using the cert-manager
2727
[Istio](https://istio.io) integration, secure the mTLS PKI for each pod
2828
through cert-manager managed certificates.
2929
- [Policy for cert-manager certificates](./approver-policy.md): Manage

content/docs/usage/approver-policy.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,9 +3,9 @@ title: Policy for cert-manager certificates
33
description: 'cert-manager usage: approver-policy'
44
---
55

6-
cert-manager [CertificateRequests](../concepts/certificaterequest.md) can be
6+
cert-manager [CertificateRequests](../usage/certificaterequest.md) can be
77
rejected from being signed by using the [approval
8-
API](../concepts/certificaterequest.md#approval).
8+
API](../usage/certificaterequest.md#approval).
99
[approver-policy](https://github.com/cert-manager/approver-policy) is a
1010
cert-manager project that enables you to write policy to automatically manage
1111
this approval mechanism.

content/docs/usage/certificaterequest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: 'cert-manager core concepts: CertificateRequests'
44
---
55

66
The `CertificateRequest` is a namespaced resource in cert-manager that is used
7-
to request X.509 certificates from an [`Issuer`](./issuer.md). The resource
7+
to request X.509 certificates from an [`Issuer`](../concepts/issuer.md). The resource
88
contains a base64 encoded string of a PEM encoded certificate request which is
99
sent to the referenced issuer. A successful issuance will return a signed
1010
certificate, based on the certificate signing request. `CertificateRequests` are

content/docs/usage/csi-driver-spiffe.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ which is used to create and mount Pod volumes from.
4646
4747
When a Pod is created with the CSI volume configured, the
4848
driver will locally generate a private key, and create a cert-manager
49-
[CertificateRequest](../concepts/certificaterequest.md)
49+
[CertificateRequest](../usage/certificaterequest.md)
5050
in the same Namespace as the Pod.
5151
5252
The driver uses [CSI Token Request](https://kubernetes-csi.github.io/docs/token-requests.html) to both
@@ -61,7 +61,7 @@ expiry of the signed certificate.
6161
6262
#### Approver
6363
64-
A distinct [cert-manager approver](../concepts/certificaterequest.md#approval)
64+
A distinct [cert-manager approver](../usage/certificaterequest.md#approval)
6565
Deployment is responsible for managing the approval and denial condition of
6666
created CertificateRequests that target the configured SPIFFE Trust Domain
6767
signer.
@@ -78,7 +78,7 @@ The approver ensures that requests have:
7878
7979
If any of these checks do not pass, the CertificateRequest will be marked as
8080
Denied, else it will be marked as Approved. The approver will only manage
81-
CertificateRequests who request from the same [IssuerRef](../concepts/certificaterequest.md)
81+
CertificateRequests who request from the same [IssuerRef](../usage/certificaterequest.md)
8282
that has been configured.
8383
8484
## Installation
@@ -98,7 +98,7 @@ cert-manager `v1.3` or higher is also required.
9898
csi-driver-spiffe requires cert-manager to be [installed](../installation/README.md) but
9999
a default installation of cert-manager **will not work**.
100100

101-
> ⚠️ It is **vital** that the [default approver is disabled in cert-manager](../concepts/certificaterequest.md#approver-controller) ⚠️
101+
> ⚠️ It is **vital** that the [default approver is disabled in cert-manager](../usage/certificaterequest.md#approver-controller) ⚠️
102102

103103
If the default approver is not disabled, the csi-driver-spiffe approver will
104104
race with cert-manager and policy enforcement will become useless.
@@ -149,7 +149,7 @@ cmctl approve -n cert-manager \
149149

150150
Install csi-driver-spiffe into the cluster using the issuer we configured. We
151151
must also configure the issuer resource type and name of the issuer we
152-
configured so that the approver has [permissions to approve referencing CertificateRequests](../concepts/certificaterequest.md#rbac-syntax).
152+
configured so that the approver has [permissions to approve referencing CertificateRequests](../usage/certificaterequest.md#rbac-syntax).
153153

154154
Note that the `issuer.name`, `issuer.kind` and `issuer.group` will need to be changed to match
155155
the issuer you're actually using!

0 commit comments

Comments
 (0)