From aac3d70fa15467964ec011f89d7b45c51e8700be Mon Sep 17 00:00:00 2001 From: Michel Loiseleur <97035654+mloiseleur@users.noreply.github.com> Date: Tue, 12 Aug 2025 15:38:05 +0200 Subject: [PATCH] Fix invalid links in documentation --- docs/content/https/tls.md | 2 +- docs/content/migrate/v3.md | 6 +++--- docs/content/operations/api.md | 2 +- docs/content/reference/install-configuration/tls/ocsp.md | 2 +- docs/content/routing/overview.md | 2 +- docs/content/routing/providers/kubernetes-crd.md | 2 +- docs/content/user-guides/cert-manager.md | 4 ++-- docs/content/user-guides/docker-compose/acme-http/index.md | 2 +- 8 files changed, 11 insertions(+), 11 deletions(-) diff --git a/docs/content/https/tls.md b/docs/content/https/tls.md index 35a866ed5..d8e1a0add 100644 --- a/docs/content/https/tls.md +++ b/docs/content/https/tls.md @@ -503,7 +503,7 @@ Traefik supports mutual authentication, through the `clientAuth` section. For authentication policies that require verification of the client certificate, the certificate authority for the certificates should be set in `clientAuth.caFiles`. -In Kubernetes environment, CA certificate can be set in `clientAuth.secretNames`. See [TLSOption resource](../../routing/providers/kubernetes-crd#kind-tlsoption) for more details. +In Kubernetes environment, CA certificate can be set in `clientAuth.secretNames`. See [TLSOption resource](../../routing/providers/kubernetes-crd/#kind-tlsoption) for more details. The `clientAuth.clientAuthType` option governs the behaviour as follows: diff --git a/docs/content/migrate/v3.md b/docs/content/migrate/v3.md index 256445ec2..c973311c9 100644 --- a/docs/content/migrate/v3.md +++ b/docs/content/migrate/v3.md @@ -113,9 +113,9 @@ kubectl apply -f https://raw.githubusercontent.com/traefik/traefik/v3.3/docs/con **Updated Resources:** -- [TraefikService](../../routing/services#mirroring-service) ([PR #11032](https://github.com/traefik/traefik/pull/11032)) -- [RateLimit](../../middlewares/http/ratelimit) & [InFlightReq](../../middlewares/http/inflightreq) middlewares ([PR #9747](https://github.com/traefik/traefik/pull/9747)) -- [Compress](../../middlewares/http/compress) middleware ([PR #10943](https://github.com/traefik/traefik/pull/10943)) +- [TraefikService](../../routing/services/#mirroring-service) ([PR #11032](https://github.com/traefik/traefik/pull/11032)) +- [RateLimit](../../middlewares/http/ratelimit/) & [InFlightReq](../../middlewares/http/inflightreq/) middlewares ([PR #9747](https://github.com/traefik/traefik/pull/9747)) +- [Compress](../../middlewares/http/compress/) middleware ([PR #10943](https://github.com/traefik/traefik/pull/10943)) ### Kubernetes Gateway Provider Standard Channel diff --git a/docs/content/operations/api.md b/docs/content/operations/api.md index 416d885fd..b2779ad74 100644 --- a/docs/content/operations/api.md +++ b/docs/content/operations/api.md @@ -109,7 +109,7 @@ api: --api.dashboard=true ``` -!!! warning "With Dashboard enabled, the router [rule](../../routing/routers#rule) must catch requests for both `/api` and `/dashboard`" +!!! warning "With Dashboard enabled, the router [rule](../../routing/routers/#rule) must catch requests for both `/api` and `/dashboard`" Please check the [Dashboard documentation](./dashboard.md#dashboard-router-rule) to learn more about this and to get examples. ### `debug` diff --git a/docs/content/reference/install-configuration/tls/ocsp.md b/docs/content/reference/install-configuration/tls/ocsp.md index a960d88d0..0148f658e 100644 --- a/docs/content/reference/install-configuration/tls/ocsp.md +++ b/docs/content/reference/install-configuration/tls/ocsp.md @@ -28,7 +28,7 @@ The OCSP response is cached in memory and is not persisted between Traefik resta ### General -Enabling OCSP is part of the [static configuration](../getting-started/configuration-overview.md#the-static-configuration). +Enabling OCSP is part of the [static configuration](../../../getting-started/configuration-overview.md#the-static-configuration). It can be defined by using a file (YAML or TOML) or CLI arguments: ```yaml tab="File (YAML)" diff --git a/docs/content/routing/overview.md b/docs/content/routing/overview.md index 39efaf485..dd1d0342f 100644 --- a/docs/content/routing/overview.md +++ b/docs/content/routing/overview.md @@ -246,7 +246,7 @@ http: Most of what happens to the connection between the clients and Traefik, and then between Traefik and the backend servers, is configured through the -[entrypoints](../entrypoints) and the [routers](../routers). +[entrypoints](../entrypoints/) and the [routers](../routers/). In addition, a few parameters are dedicated to configuring globally what happens with the connections between Traefik and the backends. diff --git a/docs/content/routing/providers/kubernetes-crd.md b/docs/content/routing/providers/kubernetes-crd.md index 66da0fae3..095691e14 100644 --- a/docs/content/routing/providers/kubernetes-crd.md +++ b/docs/content/routing/providers/kubernetes-crd.md @@ -392,7 +392,7 @@ Register the `IngressRoute` [kind](../../reference/dynamic-configuration/kuberne | [13] | `services[n].port` | Defines the port of a [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/). This can be a reference to a named port. | | [14] | `services[n].serversTransport` | Defines the reference to a [ServersTransport](#kind-serverstransport). The ServersTransport namespace is assumed to be the [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/) namespace (see [ServersTransport reference](#serverstransport-reference)). | | [15] | `services[n].healthCheck` | Defines the HealthCheck when service references a [Kubernetes service](https://kubernetes.io/docs/concepts/services-networking/service/) of type ExternalName. | -| [16] | `services[n].strategy` | Defines the load-balancing strategy for the load-balancer. Supported values are `wrr` and `p2c`, please refer to the [Load Balancing documentation](../routing/services/#load-balancing-strategy) for more information. | +| [16] | `services[n].strategy` | Defines the load-balancing strategy for the load-balancer. Supported values are `wrr` and `p2c`, please refer to the [Load Balancing documentation](../../services/#load-balancing-strategy) for more information. | | [17] | `services[n].nativeLB` | Controls, when creating the load-balancer, whether the LB's children are directly the pods IPs or if the only child is the Kubernetes Service clusterIP. | | [18] | `services[n].nodePortLB` | Controls, when creating the load-balancer, whether the LB's children are directly the nodes internal IPs using the nodePort when the service type is NodePort. | | [19] | `tls` | Defines [TLS](../routers/index.md#tls) certificate configuration | diff --git a/docs/content/user-guides/cert-manager.md b/docs/content/user-guides/cert-manager.md index f776ea0fa..e0b248003 100644 --- a/docs/content/user-guides/cert-manager.md +++ b/docs/content/user-guides/cert-manager.md @@ -94,7 +94,7 @@ To use this certificate with an Ingress, the [Kubernetes Ingress](../../provider ### With an IngressRoute -To use this certificate with an IngressRoute, the [Kubernetes CRD](../../providers/kubernetes-crd) provider has to be enabled. +To use this certificate with an IngressRoute, the [Kubernetes CRD](../../providers/kubernetes-crd/) provider has to be enabled. !!! info Traefik Helm Chart @@ -124,7 +124,7 @@ To use this certificate with an IngressRoute, the [Kubernetes CRD](../../provide ### With an HTTPRoute -To use this certificate with an HTTPRoute, the [Kubernetes Gateway](../../routing/providers/kubernetes-gateway) provider has to be enabled. +To use this certificate with an HTTPRoute, the [Kubernetes Gateway](../../routing/providers/kubernetes-gateway/) provider has to be enabled. !!! info Traefik Helm Chart diff --git a/docs/content/user-guides/docker-compose/acme-http/index.md b/docs/content/user-guides/docker-compose/acme-http/index.md index 5f9b90565..5f60c077f 100644 --- a/docs/content/user-guides/docker-compose/acme-http/index.md +++ b/docs/content/user-guides/docker-compose/acme-http/index.md @@ -6,7 +6,7 @@ description: "Learn how to create a certificate with the Let's Encrypt HTTP chal # Docker-compose with Let's Encrypt : HTTP Challenge This guide aims to demonstrate how to create a certificate with the Let's Encrypt HTTP challenge to use https on a simple service exposed with Traefik. -Please also read the [basic example](../basic-example) for details on how to expose such a service. +Please also read the [basic example](../basic-example/) for details on how to expose such a service. ## Prerequisite