From 086f174463a2a91d5320ad6f4266052492917119 Mon Sep 17 00:00:00 2001 From: Daniel Holbach Date: Tue, 4 May 2021 17:04:44 +0200 Subject: [PATCH] Update more toolkit.fluxcd.io redirects Following up on #1380 some more docs links which now live under fluxcd.io itself. Signed-off-by: Daniel Holbach --- .goreleaser.yml | 2 +- CONTRIBUTING.md | 2 +- .../_cronjobs/aws/config-patches.yaml | 4 ++-- .../registry-credentials-sync/aws/config-patches.yaml | 4 ++-- 4 files changed, 6 insertions(+), 6 deletions(-) diff --git a/.goreleaser.yml b/.goreleaser.yml index 3a7c7876..09ee2e00 100644 --- a/.goreleaser.yml +++ b/.goreleaser.yml @@ -47,7 +47,7 @@ brews: name: homebrew-tap token: "{{ .Env.HOMEBREW_TAP_GITHUB_TOKEN }}" folder: Formula - homepage: "https://toolkit.fluxcd.io/" + homepage: "https://fluxcd.io/" description: "Flux CLI" dependencies: - name: kubectl diff --git a/CONTRIBUTING.md b/CONTRIBUTING.md index 6dd1e277..1de0d23a 100644 --- a/CONTRIBUTING.md +++ b/CONTRIBUTING.md @@ -59,7 +59,7 @@ This project is composed of: ### Understanding the code To get started with developing controllers, you might want to review -[our guide](https://toolkit.fluxcd.io/dev-guides/source-watcher/) which +[our guide](https://fluxcd.io/docs/gitops-toolkit/source-watcher/) which walks you through writing a short and concise controller that watches out for source changes. diff --git a/manifests/integrations/registry-credentials-sync/_cronjobs/aws/config-patches.yaml b/manifests/integrations/registry-credentials-sync/_cronjobs/aws/config-patches.yaml index fabaead4..3c849225 100644 --- a/manifests/integrations/registry-credentials-sync/_cronjobs/aws/config-patches.yaml +++ b/manifests/integrations/registry-credentials-sync/_cronjobs/aws/config-patches.yaml @@ -34,8 +34,8 @@ spec: ## If not using IRSA, set the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables ## Store these values in a Secret and load them in the container using envFrom. ## For managing this secret via GitOps, consider using SOPS or SealedSecrets and add that manifest in a resource file for this kustomize build. -## https://toolkit.fluxcd.io/guides/mozilla-sops/ -## https://toolkit.fluxcd.io/guides/sealed-secrets/ +## https://fluxcd.io/docs/guides/mozilla-sops/ +## https://fluxcd.io/docs/guides/sealed-secrets/ # --- # apiVersion: apps/v1 # kind: Deployment diff --git a/manifests/integrations/registry-credentials-sync/aws/config-patches.yaml b/manifests/integrations/registry-credentials-sync/aws/config-patches.yaml index 69f12363..b99001a6 100644 --- a/manifests/integrations/registry-credentials-sync/aws/config-patches.yaml +++ b/manifests/integrations/registry-credentials-sync/aws/config-patches.yaml @@ -24,8 +24,8 @@ metadata: ## If not using IRSA, set the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables ## Store these values in a Secret and load them in the container using envFrom. ## For managing this secret via GitOps, consider using SOPS or SealedSecrets and add that manifest in a resource file for this kustomize build. -## https://toolkit.fluxcd.io/guides/mozilla-sops/ -## https://toolkit.fluxcd.io/guides/sealed-secrets/ +## https://fluxcd.io/docs/guides/mozilla-sops/ +## https://fluxcd.io/docs/guides/sealed-secrets/ # --- # apiVersion: apps/v1 # kind: Deployment