From e02030119ef5a34ee1bf306ec38d39bc7ecfa822 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= Date: Sun, 25 Sep 2016 01:25:34 +0200 Subject: [PATCH 1/2] Fix internal links --- basics_user/user-faq.md | 6 +++--- building/development-workflow.md | 2 +- common-tasks/backup-restore.md | 2 +- common-tasks/copying-files.md | 2 +- hardware/system-requirements.md | 2 +- installing/live-usb.md | 2 +- installing/upgrade/upgrade-to-r2.md | 2 +- managing-os/templates.md | 2 +- managing-os/templates/archlinux.md | 2 +- managing-os/templates/fedora-minimal.md | 2 +- releases/3.1/release-notes.md | 2 +- releases/3.1/schedule.md | 2 +- releases/3.2/schedule.md | 2 +- security/anti-evil-maid.md | 2 +- security/security-guidelines.md | 4 ++-- security/split-gpg.md | 4 ++-- 16 files changed, 20 insertions(+), 20 deletions(-) diff --git a/basics_user/user-faq.md b/basics_user/user-faq.md index 0ed37bcf..457b24d9 100644 --- a/basics_user/user-faq.md +++ b/basics_user/user-faq.md @@ -30,7 +30,7 @@ Qubes Users' FAQ * [Is Qubes a multi-user system?](#is-qubes-a-multi-user-system) * [Why passwordless sudo?](#why-passwordless-sudo) * [How should I report documentation issues?](#how-should-i-report-documentation-issues) - * [Will Qubes seek to get certified on the GNU Free System Distribution Guidelines (GNU FSDG)?](#will-qubes-seek-gnu-fsdg) + * [Will Qubes seek to get certified on the GNU Free System Distribution Guidelines (GNU FSDG)?](#will-qubes-seek-to-get-certified-under-the-gnu-free-system-distribution-guidelines-gnu-fsdg) [Installation & Hardware Compatibility](#installation--hardware-compatibility) ------------------------------------------------------------------------------ @@ -51,8 +51,8 @@ Qubes Users' FAQ * [My dom0 and/or TemplateVM update stalls when attempting to update via …](#my-dom0-andor-templatevm-update-stalls-when-attempting-to-update-via-the-gui-tool-what-should-i-do) * [How do I run a Windows HVM in non-seamless mode (i.e., as a single window)?](#how-do-i-run-a-windows-hvm-in-non-seamless-mode-ie-as-a-single-window) * [I created a usbVM and assigned usb controllers to it. Now the usbVM wont boot.](#i-created-a-usbvm-and-assigned-usb-controllers-to-it-now-the-usbvm-wont-boot) - * [I assigned a PCI device to a qube, then unassigned it/shut down the …](#i-assigned-a-pci-device-to-a-qube-then-unassigned-itshut-down-the-qube`-why-isnt-the-device-available-in-dom0) - * [How do I install Flash in a Debian qube?](#how-do-i-install-flash-in-a Debian-qube) + * [I assigned a PCI device to a qube, then unassigned it/shut down the …](#i-assigned-a-pci-device-to-a-qube-then-unassigned-itshut-down-the-qube-why-isnt-the-device-available-in-dom0) + * [How do I install Flash in a Debian qube?](#how-do-i-install-flash-in-a-debian-qube) ----------------- diff --git a/building/development-workflow.md b/building/development-workflow.md index f9e8cea9..c413b217 100644 --- a/building/development-workflow.md +++ b/building/development-workflow.md @@ -541,6 +541,6 @@ Usage: add this line to `/etc/apt/sources.list` on test machine (adjust host and deb http://local-test.lan/linux-deb/r3.1 jessie-unstable main ~~~ -[port-forwarding]: /doc/qubes-firewall/#tocAnchor-1-1-5 +[port-forwarding]: /doc/qubes-firewall/#port-forwarding-to-a-vm-from-the-outside-world [linux-yum]: https://github.com/QubesOS/qubes-linux-yum [linux-deb]: https://github.com/QubesOS/qubes-linux-deb diff --git a/common-tasks/backup-restore.md b/common-tasks/backup-restore.md index fa48ffec..78e320fa 100644 --- a/common-tasks/backup-restore.md +++ b/common-tasks/backup-restore.md @@ -87,7 +87,7 @@ For emergency restore of backup created on Qubes R2 or newer take a look [here]( Migrating Between Two Physical Machines --------------------------------------- -In order to migrate your Qubes system from one physical machine to another, simply follow the backup procedure on the old machine, [install Qubes](/doc/downloads/) on the new machine, and follow the restoration procedure on the new machine. All of your settings and data will be preserved! +In order to migrate your Qubes system from one physical machine to another, simply follow the backup procedure on the old machine, [install Qubes](/downloads/) on the new machine, and follow the restoration procedure on the new machine. All of your settings and data will be preserved! Notes diff --git a/common-tasks/copying-files.md b/common-tasks/copying-files.md index 2fcb9980..6b9eb277 100644 --- a/common-tasks/copying-files.md +++ b/common-tasks/copying-files.md @@ -43,4 +43,4 @@ However, one should keep in mind that performing a data transfer from *less trus See also [this article](http://theinvisiblethings.blogspot.com/2011/03/partitioning-my-digital-life-into.html) for more information on this topic, and some ideas of how we might solve this problem in some future version of Qubes. -You may also want to read how to [revoke "Yes to All" authorization](/doc/Qrexec/#revoking-yes-to-all-authorization) +You may also want to read how to [revoke "Yes to All" authorization](/doc/qrexec3/#revoking-yes-to-all-authorization) diff --git a/hardware/system-requirements.md b/hardware/system-requirements.md index 5b1bf3d7..4bbde4e3 100644 --- a/hardware/system-requirements.md +++ b/hardware/system-requirements.md @@ -97,7 +97,7 @@ redirect_from: [Hardware Certification]: /hardware-certification/ [Hardware Compatibility List]: /hcl/ [hcl-doc]: /doc/hcl/ -[hcl-report]: /doc/HCL/#generating-and-submitting-new-reports +[hcl-report]: /doc/hcl/#generating-and-submitting-new-reports [Anti Evil Maid]: /doc/anti-evil-maid/ [Qubes-certified laptop]: /doc/certified-laptops/ [live USB]: /doc/live-usb/ diff --git a/installing/live-usb.md b/installing/live-usb.md index c3b25227..b3912180 100644 --- a/installing/live-usb.md +++ b/installing/live-usb.md @@ -100,7 +100,7 @@ Downloading and burning ----------------------- 1. Download the ISO (and its signature for verification) from the - [downloads page](/downloads/#qubes-live-usb-alpha/). + [downloads page](/downloads/#qubes-live-usb-alpha). 2. "Burn" (copy) the ISO onto a USB drive (replace `/dev/sdX` with your USB drive device): diff --git a/installing/upgrade/upgrade-to-r2.md b/installing/upgrade/upgrade-to-r2.md index 613dbfc7..a572d1eb 100644 --- a/installing/upgrade/upgrade-to-r2.md +++ b/installing/upgrade/upgrade-to-r2.md @@ -19,7 +19,7 @@ Current Qubes R2 Beta 3 (R2B3) systems can be upgraded in-place to the latest R2 Upgrade Template and Standalone VM(s) ------------------------------------- -- Qubes R2 comes with new template based on Fedora 20. You can upgrade existing template according to procedure described [here](/doc/FedoraTemplateUpgrade/). +- Qubes R2 comes with new template based on Fedora 20. You can upgrade existing template according to procedure described [here](/doc/fedora-template-upgrade-20/). - **It also possible to download a new Fedora 20-based template from our repositories**. To do this please first upgrade the Dom0 distro as described in the section below. diff --git a/managing-os/templates.md b/managing-os/templates.md index 39c09d60..9d7de876 100644 --- a/managing-os/templates.md +++ b/managing-os/templates.md @@ -17,7 +17,7 @@ TemplateBasedVMs is installed. The default template is based on Fedora, but there are additional templates based on other Linux distributions. There are also templates available with or without certain software preinstalled. The concept of TemplateVMs is initially described -[here](/doc/getting-started/#appvms-domains-and-templatevms). The technical +[here](/getting-started/#appvms-qubes-and-templatevms). The technical details of this implementation are described in the developer documentation [here](/doc/template-implementation/). diff --git a/managing-os/templates/archlinux.md b/managing-os/templates/archlinux.md index 636ce1aa..a0cde5fe 100644 --- a/managing-os/templates/archlinux.md +++ b/managing-os/templates/archlinux.md @@ -694,6 +694,6 @@ Note: For info on Reflector and its configs: [Reflector](https://wiki.archlinux. * [How can I contribute to the Qubes Project?](/doc/contributing/) -* [Guidelines for Documentation Contributors](doc/doc-guidelines/) +* [Guidelines for Documentation Contributors](/doc/doc-guidelines/)
diff --git a/managing-os/templates/fedora-minimal.md b/managing-os/templates/fedora-minimal.md index 7aea2fbd..4370313e 100644 --- a/managing-os/templates/fedora-minimal.md +++ b/managing-os/templates/fedora-minimal.md @@ -75,7 +75,7 @@ This template is now ready to use for a standard firewall VM. The needed packages depend on the VPN technology. The `dnf search "NetworkManager VPN plugin"` command may help you to choose the right one. You should also install the corresponding GNOME related packages as well. -[More details about setting up a VPN Gateway](/wiki/VPN#ProxyVM) +[More details about setting up a VPN Gateway](/doc/vpn/#proxyvm) #### TOR diff --git a/releases/3.1/release-notes.md b/releases/3.1/release-notes.md index c4506032..657f06f3 100644 --- a/releases/3.1/release-notes.md +++ b/releases/3.1/release-notes.md @@ -71,6 +71,6 @@ using](/doc/releases/3.0/release-notes/#upgrading) first, then follow the instructions above. This will be time consuming process. [salt-doc]: /doc/salt/ -[pvgrub-doc]: /doc/managing-vm-kernel/#tocAnchor-1-3 +[pvgrub-doc]: /doc/managing-vm-kernel/#using-kernel-installed-in-the-vm [input-proxy]: https://github.com/QubesOS/qubes-app-linux-input-proxy/blob/master/README.md [github-release-notes]: https://github.com/QubesOS/qubes-issues/issues?q=is%3Aissue+sort%3Aupdated-desc+milestone%3A%22Release+3.1%22+label%3Arelease-notes+is%3Aclosed diff --git a/releases/3.1/schedule.md b/releases/3.1/schedule.md index 296ca3e0..e4caa612 100644 --- a/releases/3.1/schedule.md +++ b/releases/3.1/schedule.md @@ -9,7 +9,7 @@ redirect_from: Qubes R3.1 Release Schedule =========================== -This schedule is based on [Version Scheme](/doc/version-scheme/#tocAnchor-1-1-3). +This schedule is based on [Version Scheme](/doc/version-scheme/#release-schedule).