Skip to content

Commit 2b29a34

Browse files
authored
Merge pull request #40425 from craigbox/cel-blog-links
"Kubernetes Validating Admission Policies: A Practical Example" blog: make links relative
2 parents 4f8be8d + a0bc775 commit 2b29a34

File tree

1 file changed

+3
-3
lines changed

1 file changed

+3
-3
lines changed

content/en/blog/_posts/2023-03-30-kubescape-validating-admission-policy-library.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ features depending on the ability to approve or change an API object as it is su
1212
server. It is also useful for an administrator to be able to define business logic, or policies,
1313
regarding what objects can be admitted into a cluster. To better support that use case, [Kubernetes
1414
introduced external admission control in
15-
v1.7](https://kubernetes.io/blog/2017/06/kubernetes-1-7-security-hardening-stateful-application-extensibility-updates/).
15+
v1.7](/blog/2017/06/kubernetes-1-7-security-hardening-stateful-application-extensibility-updates/).
1616

1717
In addition to countless custom, internal implementations, many open source projects and commercial
1818
solutions implement admission controllers with user-specified policy, including
@@ -36,7 +36,7 @@ Language](https://github.com/google/cel-spec) (CEL) to declare validation rules.
3636
CEL was developed by Google for security and policy use cases, based on learnings from the Firebase
3737
real-time database. Its design allows it to be safely embedded into applications and executed in
3838
microseconds, with limited compute and memory impact. [Validation rules for
39-
CRDs](https://kubernetes.io/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#validation-rules)
39+
CRDs](/docs/tasks/extend-kubernetes/custom-resources/custom-resource-definitions/#validation-rules)
4040
introduced CEL to the Kubernetes ecosystem in v1.23, and at the time it was noted that the language
4141
would suit a more generic implementation of validation by admission control.
4242

@@ -115,7 +115,7 @@ version. {{< /note >}}
115115

116116
The `validations` include the CEL rules for the objects. There are three different expressions,
117117
catering for the fact that a Pod `spec` can be at the root of the object (a [naked
118-
pod](https://kubernetes.io/docs/concepts/configuration/overview/#naked-pods-vs-replicasets-deployments-and-jobs)),
118+
pod](/docs/concepts/configuration/overview/#naked-pods-vs-replicasets-deployments-and-jobs)),
119119
under `template` (a workload controller or a Job), or under `jobTemplate` (a CronJob).
120120

121121
In the event that any `spec` does not have `readOnlyRootFilesystem` set to true, the object will not

0 commit comments

Comments
 (0)