From bcdb70b689ebf15a58f1dbedcc59f0b96670e247 Mon Sep 17 00:00:00 2001 From: Michel Loiseleur <97035654+mloiseleur@users.noreply.github.com> Date: Fri, 1 Aug 2025 11:34:05 +0200 Subject: [PATCH] Fix invalid links in documentation --- docs/content/https/tls.md | 2 +- docs/content/operations/api.md | 2 +- docs/content/routing/overview.md | 4 ++-- docs/content/routing/providers/kubernetes-ingress.md | 2 +- docs/content/user-guides/docker-compose/acme-dns/index.md | 2 +- 5 files changed, 6 insertions(+), 6 deletions(-) diff --git a/docs/content/https/tls.md b/docs/content/https/tls.md index 505043259..2d8178e6d 100644 --- a/docs/content/https/tls.md +++ b/docs/content/https/tls.md @@ -242,7 +242,7 @@ The TLS options allow one to configure some parameters of the TLS connection. !!! important "TLSOption in Kubernetes" - When using the [TLSOption resource](../../routing/providers/kubernetes-crd#kind-tlsoption) in Kubernetes, one might setup a default set of options that, + When using the [TLSOption resource](../../routing/providers/kubernetes-crd/#kind-tlsoption) in Kubernetes, one might setup a default set of options that, if not explicitly overwritten, should apply to all ingresses. To achieve that, you'll have to create a TLSOption resource with the name `default`. There may exist only one TLSOption with the name `default` (across all namespaces) - otherwise they will be dropped. diff --git a/docs/content/operations/api.md b/docs/content/operations/api.md index 2829f3ffe..16717a8bc 100644 --- a/docs/content/operations/api.md +++ b/docs/content/operations/api.md @@ -46,7 +46,7 @@ And then define a routing configuration on Traefik itself with the --8<-- "content/operations/include-api-examples.md" -??? warning "The router's [rule](../../routing/routers#rule) must catch requests for the URI path `/api`" +??? warning "The router's [rule](../../routing/routers/#rule) must catch requests for the URI path `/api`" Using an "Host" rule is recommended, by catching all the incoming traffic on this host domain to the API. However, you can also use "path prefix" rule or any combination or rules. diff --git a/docs/content/routing/overview.md b/docs/content/routing/overview.md index 96adbc649..aceb335fe 100644 --- a/docs/content/routing/overview.md +++ b/docs/content/routing/overview.md @@ -10,8 +10,8 @@ What's Happening to the Requests? Let's zoom in on Traefik's architecture and talk about the components that enable the routes to be created. -First, when you start Traefik, you define [entrypoints](../entrypoints) (in their most basic forms, they are port numbers). -Then, connected to these entrypoints, [routers](../routers) analyze the incoming requests to see if they match a set of [rules](../routers#rule). +First, when you start Traefik, you define [entrypoints](../entrypoints/) (in their most basic forms, they are port numbers). +Then, connected to these entrypoints, [routers](../routers/) analyze the incoming requests to see if they match a set of [rules](../routers/#rule). If they do, the router might transform the request using pieces of [middleware](../middlewares/overview.md) before forwarding them to your [services](./services/index.md). ![Architecture](../assets/img/architecture-overview.png) diff --git a/docs/content/routing/providers/kubernetes-ingress.md b/docs/content/routing/providers/kubernetes-ingress.md index 5b86c70a1..57d38892d 100644 --- a/docs/content/routing/providers/kubernetes-ingress.md +++ b/docs/content/routing/providers/kubernetes-ingress.md @@ -907,7 +907,7 @@ TLS certificates can be managed in Secrets objects. whether the LB's children are directly the pods IPs or if the only child is the Kubernetes Service clusterIP. One alternative is to use an `ExternalName` service to forward requests to the Kubernetes service through DNS. - To do so, one must [allow external name services](https://doc.traefik.io/traefik/providers/kubernetes-ingress/#allowexternalnameservices "Link to docs about allowing external name services"). + To do so, one must [allow external name services](../../../providers/kubernetes-ingress/#allowexternalnameservices "Link to docs about allowing external name services"). Traefik automatically requests endpoint information based on the service provided in the ingress spec. Although Traefik will connect directly to the endpoints (pods), diff --git a/docs/content/user-guides/docker-compose/acme-dns/index.md b/docs/content/user-guides/docker-compose/acme-dns/index.md index e626c633a..78f25f8d4 100644 --- a/docs/content/user-guides/docker-compose/acme-dns/index.md +++ b/docs/content/user-guides/docker-compose/acme-dns/index.md @@ -6,7 +6,7 @@ description: "Learn how to create a certificate with the Let's Encrypt DNS chall # Docker-compose with Let's Encrypt: DNS Challenge This guide aims to demonstrate how to create a certificate with the Let's Encrypt DNS challenge to use https on a simple service exposed with Traefik. -Please also read the [basic example](../basic-example) for details on how to expose such a service. +Please also read the [basic example](../basic-example/) for details on how to expose such a service. ## Prerequisite