update to new doc links structure

Signed-off-by: Daniel Holbach <daniel@weave.works>
This commit is contained in:
Daniel Holbach 2022-08-30 15:26:51 +02:00
parent 11f0378151
commit ed1ac6877d
4 changed files with 4 additions and 4 deletions

View File

@ -1478,7 +1478,7 @@ using the [notification.fluxcd.io API](https://github.com/fluxcd/notification-co
**Release date:** 2020-06-24
This is the first prerelease ready for public testing. To get started
testing, see the [GitOps Toolkit guide](https://fluxcd.io/docs/get-started/).
testing, see the [GitOps Toolkit guide](https://fluxcd.io/flux/get-started/).
## 0.0.1-beta.2

View File

@ -1,6 +1,6 @@
# Development
> **Note:** Please take a look at <https://fluxcd.io/docs/contributing/flux/>
> **Note:** Please take a look at <https://fluxcd.io/contributing/flux/>
> to find out about how to contribute to Flux and how to interact with the
> Flux Development team.

View File

@ -32,7 +32,7 @@ Specifications:
## Usage
The kustomize-controller is part of a composable [GitOps toolkit](https://fluxcd.io/docs/components/)
The kustomize-controller is part of a composable [GitOps toolkit](https://fluxcd.io/flux/components/)
and depends on [source-controller](https://github.com/fluxcd/source-controller)
to acquire the Kubernetes manifests from Git repositories and S3 compatible storage buckets.

View File

@ -1125,7 +1125,7 @@ on your EKS cluster, you can create an IAM Role and Service Account with access
to AWS KMS (using at least `kms:Decrypt` and `kms:DescribeKey`). Once these are
created, you can annotate the kustomize-controller Service Account with the
Role ARN, granting the controller permissions to decrypt the Secrets. Please refer
to the [SOPS guide](https://fluxcd.io/docs/guides/mozilla-sops/#aws) for detailed steps.
to the [SOPS guide](https://fluxcd.io/flux/guides/mozilla-sops/#aws) for detailed steps.
```sh
kubectl -n flux-system annotate serviceaccount kustomize-controller \