File tree Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Expand file tree Collapse file tree 1 file changed +2
-2
lines changed Original file line number Diff line number Diff line change @@ -127,7 +127,7 @@ paired with system groups to grant access to all pods run in the namespace:
127
127
` ` `
128
128
129
129
For more examples of RBAC bindings, see [Role Binding
130
- Examples](docs/admin/authorization/rbac/#role-binding-examples). For a complete
130
+ Examples](/ docs/admin/authorization/rbac/#role-binding-examples). For a complete
131
131
example of authorizing a PodSecurityPolicy, see
132
132
[below](#example).
133
133
@@ -140,7 +140,7 @@ have superuser permissions. Otherwise requests would bypass authentication and
140
140
authorization modules, all PodSecurityPolicy objects would be allowed, and users
141
141
would be able to create privileged containers. For more details on configuring
142
142
Controller Manager authorization, see [Controller
143
- Roles](docs/admin/authorization/rbac/#controller-roles).
143
+ Roles](/ docs/admin/authorization/rbac/#controller-roles).
144
144
145
145
# # Policy Order
146
146
You can’t perform that action at this time.
0 commit comments