Skip to content

Commit 3ff1a92

Browse files
committed
fix broken links
Signed-off-by: Tim Ramlot <[email protected]>
1 parent 2d96583 commit 3ff1a92

File tree

9 files changed

+18
-18
lines changed

9 files changed

+18
-18
lines changed

content/docs/concepts/acme-orders-challenges.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ In order to complete these challenges, cert-manager introduces two
2020
validation can be found on the Let's Encrypt website
2121
[here](https://letsencrypt.org/how-it-works/). An order represents a single
2222
certificate request which will be created automatically once a new
23-
[`CertificateRequest`](./certificaterequest.md) resource referencing an ACME
23+
[`CertificateRequest`](../usage/certificaterequest.md) resource referencing an ACME
2424
issuer has been created. `CertificateRequest` resources are created
2525
automatically by cert-manager once a [`Certificate`](./certificate.md) resource
2626
is created, has its specification changed, or needs renewal.

content/docs/contributing/external-issuers.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,13 +49,13 @@ on how to write an external issuer using Kubebuilder and controller-runtime.
4949
## Approval
5050

5151
Before signing a certificate, Issuers **must** also ensure that the `CertificateRequest` is
52-
[`Approved`](../concepts/certificaterequest.md#approval).
52+
[`Approved`](../usage/certificaterequest.md#approval).
5353

5454
If the `CertificateRequest` is not `Approved`, the issuer **must** not process it. Issuers are not
5555
responsible for approving `CertificateRequests` and should refuse to proceed if they find a certificate
5656
that is not approved.
5757

58-
If a `CertificateRequest` created for an issuance associated with a `Certificate` gets [`Denied`](../concepts/certificaterequest.md#approval), the issuance will be failed by cert-manager's issuing controller.
58+
If a `CertificateRequest` created for an issuance associated with a `Certificate` gets [`Denied`](../usage/certificaterequest.md#approval), the issuance will be failed by cert-manager's issuing controller.
5959

6060
## Conditions
6161

@@ -65,7 +65,7 @@ status of that resource to a ready state, as this is what is used to signal to h
6565
controllers - such as the `Certificate` controller - that the resource is ready to be consumed.
6666

6767
Conversely, if the `CertificateRequest` fails, it is as important to mark the resource as such, as this will
68-
also be used as a signal to higher order controllers. Valid condition states are listed under [concepts](../concepts/certificaterequest.md#conditions).
68+
also be used as a signal to higher order controllers. Valid condition states are listed under [concepts](../usage/certificaterequest.md#conditions).
6969

7070
## Implementation
7171

content/docs/policy/approval/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,10 +13,10 @@ that rejects the request.
1313

1414
## Rejecting requests before sending the X.509 Certificate Signing Request (CSR) to the issuer
1515

16-
cert-manager requires that a [CertificateRequest](../../concepts/certificaterequest.md)
16+
cert-manager requires that a [CertificateRequest](../../usage/certificaterequest.md)
1717
is approved before it is sent to the issuer. Also, CertificateSigningRequests must
1818
be approved before they are sent to the issuer. This approval is done by adding an
19-
[approval condition](../../concepts/certificaterequest.md#approval) to the resource.
19+
[approval condition](../../usage/certificaterequest.md#approval) to the resource.
2020

2121
In a default installation, cert-manager automatically approves all CertificateRequests
2222
and CertificateSigningRequests that use any of its built-in issuers. This is done to

content/docs/policy/approval/approver-policy/README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,14 +4,14 @@ description: 'Policy plugin for cert-manager'
44
---
55

66
approver-policy is a cert-manager
7-
[approver](../../../concepts/certificaterequest.md#approval)
7+
[approver](../../../usage/certificaterequest.md#approval)
88
that will approve or deny CertificateRequests based on policies defined in
99
the `CertificateRequestPolicy` custom resource.
1010

1111
## Prerequisites
1212

1313
[cert-manager must be installed](../../../installation/README.md), and
14-
the [the default approver in cert-manager must be disabled](../../../concepts/certificaterequest.md#approver-controller).
14+
the [the default approver in cert-manager must be disabled](../../../usage/certificaterequest.md#approver-controller).
1515

1616
> ⚠️ If the default approver is not disabled in cert-manager, approver-policy will
1717
> race with cert-manager and policy will be ineffective.
@@ -69,7 +69,7 @@ If you are using approver-policy with [external
6969
issuers](../../../configuration/external.md), you _must_
7070
include their signer names so that approver-policy has permissions to approve
7171
and deny CertificateRequests that
72-
[reference them](../../../concepts/certificaterequest.md#rbac-syntax).
72+
[reference them](../../../usage/certificaterequest.md#rbac-syntax).
7373
For example, if using approver-policy for the internal issuer types, along with
7474
[google-cas-issuer](https://github.com/jetstack/google-cas-issuer), and
7575
[aws-privateca-issuer](https://github.com/cert-manager/aws-privateca-issuer),

content/docs/reference/cmctl.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ Use "cmctl [command] --help" for more information about a command.
7474
### Approve and Deny CertificateRequests
7575

7676
CertificateRequests can be
77-
[approved or denied](../concepts/certificaterequest.md#approval) using their
77+
[approved or denied](../usage/certificaterequest.md#approval) using their
7878
respective cmctl commands:
7979

8080
> **Note**: The internal cert-manager approver may automatically approve all

content/docs/usage/certificaterequest.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ description: 'cert-manager core concepts: CertificateRequests'
44
---
55

66
The `CertificateRequest` is a namespaced resource in cert-manager that is used
7-
to request X.509 certificates from an [`Issuer`](./issuer.md). The resource
7+
to request X.509 certificates from an [`Issuer`](../concepts/issuer.md). The resource
88
contains a base64 encoded string of a PEM encoded certificate request which is
99
sent to the referenced issuer. A successful issuance will return a signed
1010
certificate, based on the certificate signing request. `CertificateRequests` are

content/docs/usage/csi-driver-spiffe.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ which is used to create and mount Pod volumes from.
4646
4747
When a Pod is created with the CSI volume configured, the
4848
driver will locally generate a private key, and create a cert-manager
49-
[CertificateRequest](../concepts/certificaterequest.md)
49+
[CertificateRequest](../usage/certificaterequest.md)
5050
in the same Namespace as the Pod.
5151
5252
The driver uses [CSI Token Request](https://kubernetes-csi.github.io/docs/token-requests.html) to both
@@ -61,7 +61,7 @@ expiry of the signed certificate.
6161
6262
#### Approver
6363
64-
A distinct [cert-manager approver](../concepts/certificaterequest.md#approval)
64+
A distinct [cert-manager approver](../usage/certificaterequest.md#approval)
6565
Deployment is responsible for managing the approval and denial condition of
6666
created CertificateRequests that target the configured SPIFFE Trust Domain
6767
signer.
@@ -78,7 +78,7 @@ The approver ensures that requests have:
7878
7979
If any of these checks do not pass, the CertificateRequest will be marked as
8080
Denied, else it will be marked as Approved. The approver will only manage
81-
CertificateRequests who request from the same [IssuerRef](../concepts/certificaterequest.md)
81+
CertificateRequests who request from the same [IssuerRef](../usage/certificaterequest.md)
8282
that has been configured.
8383
8484
## Installation
@@ -98,7 +98,7 @@ cert-manager `v1.3` or higher is also required.
9898
csi-driver-spiffe requires cert-manager to be [installed](../installation/README.md) but
9999
a default installation of cert-manager **will not work**.
100100

101-
> ⚠️ It is **vital** that the [default approver is disabled in cert-manager](../concepts/certificaterequest.md#approver-controller) ⚠️
101+
> ⚠️ It is **vital** that the [default approver is disabled in cert-manager](../usage/certificaterequest.md#approver-controller) ⚠️
102102

103103
If the default approver is not disabled, the csi-driver-spiffe approver will
104104
race with cert-manager and policy enforcement will become useless.
@@ -149,7 +149,7 @@ cmctl approve -n cert-manager \
149149

150150
Install csi-driver-spiffe into the cluster using the issuer we configured. We
151151
must also configure the issuer resource type and name of the issuer we
152-
configured so that the approver has [permissions to approve referencing CertificateRequests](../concepts/certificaterequest.md#rbac-syntax).
152+
configured so that the approver has [permissions to approve referencing CertificateRequests](../usage/certificaterequest.md#rbac-syntax).
153153

154154
Note that the `issuer.name`, `issuer.kind` and `issuer.group` will need to be changed to match
155155
the issuer you're actually using!

content/docs/usage/csi-driver.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -182,7 +182,7 @@ volumeAttributes:
182182
## Requesting Certificates using the mounting Pod's ServiceAccount
183183

184184
If the flag `--use-token-request` is enabled on the csi-driver DaemonSet, the
185-
[CertificateRequest](../concepts/certificaterequest.md) resource will be created
185+
[CertificateRequest](../usage/certificaterequest.md) resource will be created
186186
by the mounting Pod's ServiceAccount. This can be paired with
187187
[approver-policy](../policy/approval/approver-policy/README.md) to enable advanced policy control
188188
on a per-ServiceAccount basis.

content/docs/usage/kube-csr.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ description: 'cert-manager usage: Kubernetes CertificateSigningRequest resources
66
Kubernetes has an in-built
77
[CertificateSigningRequest](https://kubernetes.io/docs/reference/access-authn-authz/certificate-signing-requests/)
88
resource. This resource is similar to the cert-manager
9-
[CertificateRequest](../concepts/certificaterequest.md) in that it is used to
9+
[CertificateRequest](../usage/certificaterequest.md) in that it is used to
1010
request an X.509 signed certificate from a referenced Certificate Authority
1111
(CA).
1212

0 commit comments

Comments
 (0)