From 71e79b1c3668cf4bbb5b327ec805686a02fb6340 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?L=C3=A9o=20Rolland?= Date: Mon, 17 Apr 2023 13:58:20 +0000 Subject: [PATCH] doc: update ovh.com/blog links MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Actual links are broken, this update now uses blog.ovhcloud.com Signed-off-by: Léo Rolland --- DESIGN.md | 4 ++-- doc/sphinx/faq.rst | 2 +- doc/sphinx/presentation/principles.rst | 8 ++++---- doc/sphinx/using/basics/access_management.rst | 2 +- 4 files changed, 8 insertions(+), 8 deletions(-) diff --git a/DESIGN.md b/DESIGN.md index 16d26c2..e10f442 100644 --- a/DESIGN.md +++ b/DESIGN.md @@ -21,7 +21,7 @@ system user, and same goes for the group private keys. This way, even if the code is tricked to allow access when it shouldn't have (flawed logic or bug), then the OS will still deny reading the key file. -This concept has been explained in the [Blog Post #3 - Security at the Core](https://www.ovh.com/blog/the-bastion-part-3-security-at-the-core/). +This concept has been explained in the [Blog Post #3 - Security at the Core](https://blog.ovhcloud.com/the-bastion-part-3-security-at-the-core/). ## Zero trust between portions of code running at different permission levels @@ -37,4 +37,4 @@ run under perl tainted mode. Helpers communicate back their result using JSON, which is then read from the plugin (the unprivileged portion of code), and parsed. -This concept has been explained in the [Blog Post #3 - Security at the Core](https://www.ovh.com/blog/the-bastion-part-3-security-at-the-core/). +This concept has been explained in the [Blog Post #3 - Security at the Core](https://blog.ovhcloud.com/the-bastion-part-3-security-at-the-core/). diff --git a/doc/sphinx/faq.rst b/doc/sphinx/faq.rst index 6baf973..5c72012 100644 --- a/doc/sphinx/faq.rst +++ b/doc/sphinx/faq.rst @@ -42,7 +42,7 @@ It can be a highly successful if done very carefully, with a lot of security and certificates delivery workflows. Managing a CA correctly is no joke and can bite you quite hard if done improperly. This also happens to be a somewhat recent addition to OpenSSH, and if you have a lot of heterogeneous systems to handle, this might be a no-go. -You can read more about this topic here: https://www.ovh.com/blog/the-ovhcloud-bastion-part-1/ +You can read more about this topic here: https://blog.ovhcloud.com/the-ovhcloud-bastion-part-1/ What does `osh` mean in ``--osh``? ================================== diff --git a/doc/sphinx/presentation/principles.rst b/doc/sphinx/presentation/principles.rst index 441fcde..c2a6e5a 100644 --- a/doc/sphinx/presentation/principles.rst +++ b/doc/sphinx/presentation/principles.rst @@ -6,7 +6,7 @@ Principles Most of the principles of The Bastion are well explained in the **Part 2** of the blog post that announced the release. The links are below. -- `Part 1 - Genesis `_ -- `Part 2 - Delegation Dizziness `_ -- `Part 3 - Security at the Core `_ -- `Part 4 - A new era `_ +- `Part 1 - Genesis `_ +- `Part 2 - Delegation Dizziness `_ +- `Part 3 - Security at the Core `_ +- `Part 4 - A new era `_ diff --git a/doc/sphinx/using/basics/access_management.rst b/doc/sphinx/using/basics/access_management.rst index 4950224..9953f83 100644 --- a/doc/sphinx/using/basics/access_management.rst +++ b/doc/sphinx/using/basics/access_management.rst @@ -7,7 +7,7 @@ to understand those two ways because they're complementary. .. note:: This section is largely inspired from the `blog post about the subject - `_ + `_ The main idea is that delegation is at the core of the system: everybody has their own set of responsibilities, and potential actions, without having to ask the bastion admin.