From b24edd31488671600ee5d93d7d86e1db5a55ae64 Mon Sep 17 00:00:00 2001 From: Watson Sato Date: Thu, 16 Jan 2025 15:20:06 -0300 Subject: [PATCH] Fix broken links in CO rules The old link pointed to a section of the compliance operator documentation before it was overhauled and reorganized. This commit updates the documentation reference in the bundle so it points to the right document, and doesn't return a 404. --- .../scansetting_has_autoapplyremediations/rule.yml | 2 +- .../risk-assessment/scansettingbinding_exists/rule.yml | 2 +- .../risk-assessment/scansettings_have_schedule/rule.yml | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/applications/openshift/risk-assessment/scansetting_has_autoapplyremediations/rule.yml b/applications/openshift/risk-assessment/scansetting_has_autoapplyremediations/rule.yml index cbcf36c1fdf..afd53a2abb6 100644 --- a/applications/openshift/risk-assessment/scansetting_has_autoapplyremediations/rule.yml +++ b/applications/openshift/risk-assessment/scansetting_has_autoapplyremediations/rule.yml @@ -3,7 +3,7 @@ documentation_complete: true title: Enable AutoApplyRemediation for at least One ScanSetting description: |- - {{{ weblink(link="https://docs.openshift.com/container-platform/latest/security/compliance_operator/compliance-operator-understanding.html#compliance-operator-understanding", + {{{ weblink(link="https://docs.openshift.com/container-platform/latest/security/compliance_operator/co-overview.html", text="The Compliance Operator") }}} scans the hosts and the platform (OCP) configurations for software flaws and improper configurations according diff --git a/applications/openshift/risk-assessment/scansettingbinding_exists/rule.yml b/applications/openshift/risk-assessment/scansettingbinding_exists/rule.yml index 1f2b34c6e04..adae09016b1 100644 --- a/applications/openshift/risk-assessment/scansettingbinding_exists/rule.yml +++ b/applications/openshift/risk-assessment/scansettingbinding_exists/rule.yml @@ -2,7 +2,7 @@ title: Ensure that Compliance Operator is scanning the cluster description: |- - {{{ weblink(link="https://docs.openshift.com/container-platform/latest/security/compliance_operator/compliance-operator-understanding.html#compliance-operator-understanding", + {{{ weblink(link="https://docs.openshift.com/container-platform/latest/security/compliance_operator/co-overview.html", text="The Compliance Operator") }}} scans the hosts and the platform (OCP) configurations for software flaws and improper configurations according diff --git a/applications/openshift/risk-assessment/scansettings_have_schedule/rule.yml b/applications/openshift/risk-assessment/scansettings_have_schedule/rule.yml index 0f9444ea424..dcf386f699f 100644 --- a/applications/openshift/risk-assessment/scansettings_have_schedule/rule.yml +++ b/applications/openshift/risk-assessment/scansettings_have_schedule/rule.yml @@ -2,7 +2,7 @@ title: Ensure that Compliance Operator scans are running periodically description: |- - {{{ weblink(link="https://docs.openshift.com/container-platform/latest/security/compliance_operator/compliance-operator-understanding.html#compliance-operator-understanding", + {{{ weblink(link="https://docs.openshift.com/container-platform/latest/security/compliance_operator/co-overview.html", text="The Compliance Operator") }}} scans the hosts and the platform (OCP) configurations for software flaws and improper configurations according