Skip to content

Commit 77ac3c0

Browse files
authored
Merge pull request #119 from DataDog/docs-broken-links
Fix docs broken links
2 parents b3d93f8 + d5f8cc2 commit 77ac3c0

8 files changed

+8
-8
lines changed

docs/reference/attacks/CE_MODULE_LOAD.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Container isolation mechanisms are restricted to user-space execution. If an att
2525

2626
Execution within a container process with the `CAP_SYS_MODULE` capability enabled.
2727

28-
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setuptest-cluster/attacks/CE_MODULE_LOAD.yaml).
28+
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setup/test-cluster/attacks/CE_MODULE_LOAD.yaml).
2929

3030
## Checks
3131

docs/reference/attacks/CE_NSENTER.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ When both `hostPID: true` and `privileged: true` are set, the pod can see all of
2525

2626
Execution within a container process created with `--privileged` AND the `--pid=host` enabled.
2727

28-
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setuptest-cluster/attacks/CE_NSENTER.yaml).
28+
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setup/test-cluster/attacks/CE_NSENTER.yaml).
2929

3030
## Checks
3131

docs/reference/attacks/CE_PRIV_MOUNT.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ A container running with `privileged: true` disables almost all the container is
2525

2626
Execution within a privileged container process.
2727

28-
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setuptest-cluster/attacks/CE_PRIV_MOUNT.yaml).
28+
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setup/test-cluster/attacks/CE_PRIV_MOUNT.yaml).
2929

3030
## Checks
3131

docs/reference/attacks/EXPLOIT_CONTAINERD_SOCK.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ docker run -v /var/run/docker.sock:/var/run/docker.sock:ro --rm -it alpine sh
4242
docker ps
4343
```
4444

45-
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setuptest-cluster/attacks/EXPLOIT_CONTAINERD_SOCK.yaml).
45+
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setup/test-cluster/attacks/EXPLOIT_CONTAINERD_SOCK.yaml).
4646

4747
## Checks
4848

docs/reference/attacks/EXPLOIT_HOST_READ.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ If a sensitive host directory is exposed to a container, even as readonly, it ca
2525

2626
Execution within a container with a sensitive host path mounted as readonly.
2727

28-
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setuptest-cluster/attacks/EXPLOIT_HOST_READ_TRAVERSE.yaml).
28+
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setup/test-cluster/attacks/EXPLOIT_HOST_READ_TRAVERSE.yaml).
2929

3030
## Checks
3131

docs/reference/attacks/EXPLOIT_HOST_WRITE.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ If a sensitive host directory is mounted in a container with write permissions t
2525

2626
Execution within a container with a sensitive host directory mounted with write permissions.
2727

28-
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setuptest-cluster/attacks/EXPLOIT_HOST_WRITE.yaml).
28+
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setup/test-cluster/attacks/EXPLOIT_HOST_WRITE.yaml).
2929

3030
## Checks
3131

docs/reference/attacks/SHARE_PS_NAMESPACE.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Pods represent one or more containers with shared storage and network resources.
2525

2626
Access to a container within a pod running other containers with shared process namespaces
2727

28-
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setuptest-cluster/attacks/SHARE_PS_NAMESPACE.yaml).
28+
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setup/test-cluster/attacks/SHARE_PS_NAMESPACE.yaml).
2929

3030
## Checks
3131

docs/reference/attacks/TOKEN_VAR_LOG_SYMLINK.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ A pod running as root and with a mount point to the node’s `/var/log` director
2525

2626
Execution as root within a container process with the host `/var/log/` (or any parent directory) mounted inside the container.
2727

28-
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setuptest-cluster/attacks/TOKEN_VAR_LOG_SYMLINK.yaml).
28+
See the [example pod spec](https://github.com/DataDog/KubeHound/tree/main/test/setup/test-cluster/attacks/TOKEN_VAR_LOG_SYMLINK.yaml).
2929

3030
## Checks
3131

0 commit comments

Comments
 (0)