From 37aa902cef1c46beb8b3af03dabf36ba8e5eb38c Mon Sep 17 00:00:00 2001 From: Michael Date: Wed, 25 Jul 2018 17:58:02 +0200 Subject: [PATCH] Docs verify failed only on 4XX --- docs/user-guide/kubernetes.md | 2 +- script/docs-verify-docker-image/validate.sh | 1 + 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/docs/user-guide/kubernetes.md b/docs/user-guide/kubernetes.md index f2ff8d853..d6f0eb42f 100644 --- a/docs/user-guide/kubernetes.md +++ b/docs/user-guide/kubernetes.md @@ -17,7 +17,7 @@ The config files used in this guide can be found in the [examples directory](htt ### Role Based Access Control configuration (Kubernetes 1.6+ only) -Kubernetes introduces [Role Based Access Control (RBAC)](https://kubernetes.io/docs/admin/authorization/rbac/) in 1.6+ to allow fine-grained control of Kubernetes resources and API. +Kubernetes introduces [Role Based Access Control (RBAC)](https://kubernetes.io/docs/reference/access-authn-authz/rbac/) in 1.6+ to allow fine-grained control of Kubernetes resources and API. If your cluster is configured with RBAC, you will need to authorize Træfik to use the Kubernetes API. There are two ways to set up the proper permission: Via namespace-specific RoleBindings or a single, global ClusterRoleBinding. diff --git a/script/docs-verify-docker-image/validate.sh b/script/docs-verify-docker-image/validate.sh index 17563a0d3..aaf3da0ec 100644 --- a/script/docs-verify-docker-image/validate.sh +++ b/script/docs-verify-docker-image/validate.sh @@ -18,6 +18,7 @@ find "${PATH_TO_SITE}" -type f -not -path "/app/site/theme/*" \ | xargs -0 -r -P "${NUMBER_OF_CPUS}" -I '{}' \ htmlproofer \ --check-html \ + --only_4xx \ --alt_ignore="/traefik.logo.png/" \ --url-ignore "/localhost:/,/127.0.0.1:/,/fonts.gstatic.com/,/.minikube/,/github.com\/containous\/traefik\/*edit*/,/github.com\/containous\/traefik\/$/" \ '{}'