aboutsummaryrefslogtreecommitdiffstats
path: root/docs/sections
diff options
context:
space:
mode:
authorthmsdt <thomas.kulik@telekom.de>2022-11-02 14:21:09 +0100
committerthmsdt <thomas.kulik@telekom.de>2022-11-08 14:43:48 +0100
commitf4bfac20ab2aaed86846da037db986d3d1dcb6f2 (patch)
treebaa0b06f983bf9c90556dd8c5bf89147490ae828 /docs/sections
parent5a2e6a8ba83650d514a4ebb7f47ef2fc30e86c72 (diff)
fix doc config files
Issue-ID: DOC-798 Signed-off-by: thmsdt <thomas.kulik@telekom.de> Change-Id: I807a8795178112f3548dbfbcea986fa756a28199
Diffstat (limited to 'docs/sections')
-rw-r--r--docs/sections/offeredapis.rst25
-rw-r--r--docs/sections/release-notes.rst10
2 files changed, 17 insertions, 18 deletions
diff --git a/docs/sections/offeredapis.rst b/docs/sections/offeredapis.rst
index e7d9f1f..c9af97d 100644
--- a/docs/sections/offeredapis.rst
+++ b/docs/sections/offeredapis.rst
@@ -3,7 +3,7 @@
.. _offeredapis:
Offered APIs
-=============================================
+============
This document describes the OSDF HAS (Homing and Allocation Service) API
@@ -17,15 +17,14 @@ paste into the swagger tool here: https://editor.swagger.io
"OOF OSDF HAS API", ":download:`link <../api/swagger/oof-osdf-has-api.json>`"
"OOF OPTENG API", ":download:`link <../api/swagger/oof-optf-opteng-api.json>`"
-
-OOF OSDF HAS API
-................
-
-`OSDF API <osdf-api.html>`_
-
-
-OOF OPTENG API
-..............
-
-`OPTENG API <opteng-api.html>`_
-
+
+.. OOF OSDF HAS API
+.. ................
+..
+.. `OSDF API <osdf-api.html>`_
+..
+..
+.. OOF OPTENG API
+.. ..............
+..
+.. `OPTENG API <opteng-api.html>`_
diff --git a/docs/sections/release-notes.rst b/docs/sections/release-notes.rst
index 62b6fe6..63ab538 100644
--- a/docs/sections/release-notes.rst
+++ b/docs/sections/release-notes.rst
@@ -646,12 +646,12 @@ The Dublin release for OOF delivered the following Epics.
*Known Vulnerabilities in Used Modules*
OPTFRA osdf code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found.
-The OPTF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`_.
+The OPTF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`__.
Quick Links:
- - `OPTFRA project page <https://wiki.onap.org/display/DW/Optimization+Framework+Project>`_
- - `Passing Badge information for OPTFRA <https://bestpractices.coreinfrastructure.org/en/projects/1720>`_
- - `Project Vulnerability Review Table for OPTF <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`_
+ - `OPTFRA project page <https://wiki.onap.org/display/DW/Optimization+Framework+Project>`__
+ - `Passing Badge information for OPTFRA <https://bestpractices.coreinfrastructure.org/en/projects/1720>`__
+ - `Project Vulnerability Review Table for OPTF <https://wiki.onap.org/pages/viewpage.action?pageId=64005463>`__
**Upgrade Notes**
@@ -739,7 +739,7 @@ The Casablanca release for OOF delivered the following Epics.
**Security Notes**
OPTFRA osdf code has been formally scanned during build time using NexusIQ and no Critical vulnerability was found.
-The OPTF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=43385924>`_.
+The OPTF open Critical security vulnerabilities and their risk assessment have been documented as part of the `project <https://wiki.onap.org/pages/viewpage.action?pageId=43385924>`__.
Quick Links:
- `OPTFRA project page <https://wiki.onap.org/display/DW/Optimization+Framework+Project>`_