diff options
author | 2022-11-02 14:21:09 +0100 | |
---|---|---|
committer | 2022-11-08 14:43:48 +0100 | |
commit | f4bfac20ab2aaed86846da037db986d3d1dcb6f2 (patch) | |
tree | baa0b06f983bf9c90556dd8c5bf89147490ae828 /docs/sections | |
parent | 5a2e6a8ba83650d514a4ebb7f47ef2fc30e86c72 (diff) |
fix doc config files
Issue-ID: DOC-798
Signed-off-by: thmsdt <thomas.kulik@telekom.de>
Change-Id: I807a8795178112f3548dbfbcea986fa756a28199
Diffstat (limited to 'docs/sections')
-rw-r--r-- | docs/sections/offeredapis.rst | 25 | ||||
-rw-r--r-- | docs/sections/release-notes.rst | 10 |
2 files changed, 17 insertions, 18 deletions
diff --git a/docs/sections/offeredapis.rst b/docs/sections/offeredapis.rst index e7d9f1f..c9af97d 100644 --- a/docs/sections/offeredapis.rst +++ b/docs/sections/offeredapis.rst @@ -3,7 +3,7 @@ .. _offeredapis: Offered APIs -============================================= +============ This document describes the OSDF HAS (Homing and Allocation Service) API @@ -17,15 +17,14 @@ paste into the swagger tool here: https://editor.swagger.io "OOF OSDF HAS API", ":download:`link <../api/swagger/oof-osdf-has-api.json>`" "OOF OPTENG API", ":download:`link <../api/swagger/oof-optf-opteng-api.json>`" - -OOF OSDF HAS API -................ - -`OSDF API <osdf-api.html>`_ - - -OOF OPTENG API -.............. - -`OPTENG API <opteng-api.html>`_ - + +.. OOF OSDF HAS API +.. ................ +.. +.. `OSDF API <osdf-api.html>`_ +.. +.. +.. OOF OPTENG API +.. .............. +.. +.. `OPTENG API <opteng-api.html>`_ diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst index 62b6fe6..63ab538 100644 --- a/docs/sections/release-notes.rst +++ b/docs/sections/release-notes.rst @@ -646,12 +646,12 @@ The Dublin release for OOF delivered the following Epics. *Known Vulnerabilities in Used Modules* OPTFRA osdf code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found. -The OPTF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`_. +The OPTF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`__. Quick Links: - - `OPTFRA project page <https://wiki.onap.org/display/DW/Optimization+Framework+Project>`_ - - `Passing Badge information for OPTFRA <https://bestpractices.coreinfrastructure.org/en/projects/1720>`_ - - `Project Vulnerability Review Table for OPTF <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`_ + - `OPTFRA project page <https://wiki.onap.org/display/DW/Optimization+Framework+Project>`__ + - `Passing Badge information for OPTFRA <https://bestpractices.coreinfrastructure.org/en/projects/1720>`__ + - `Project Vulnerability Review Table for OPTF <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`__ **Upgrade Notes** @@ -739,7 +739,7 @@ The Casablanca release for OOF delivered the following Epics. **Security Notes** OPTFRA osdf code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found. -The OPTF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=43385924>`_. +The OPTF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=43385924>`__. Quick Links: - `OPTFRA project page <https://wiki.onap.org/display/DW/Optimization+Framework+Project>`_ |