From a49781690c4a3244ee1ea0fa26061fcca9e5c474 Mon Sep 17 00:00:00 2001 From: Michael Hanselmann <hansmi@google.com> Date: Fri, 20 Aug 2010 15:13:51 +0200 Subject: [PATCH] Use Sphinx' :rfc: extension to refer to RFCs Signed-off-by: Michael Hanselmann <hansmi@google.com> Reviewed-by: Iustin Pop <iustin@google.com> --- NEWS | 2 +- doc/design-2.2.rst | 2 +- doc/rapi.rst | 11 +++++------ doc/security.rst | 2 +- 4 files changed, 8 insertions(+), 9 deletions(-) diff --git a/NEWS b/NEWS index 5cb7ec6ad..e1d544686 100644 --- a/NEWS +++ b/NEWS @@ -88,7 +88,7 @@ Version 2.2.0 beta 0 - Added per-request RPC timeout - RAPI now requires a Content-Type header for requests with a body (e.g. ``PUT`` or ``POST``) which must be set to ``application/json`` (see - RFC2616 (HTTP/1.1), section 7.2.1) + :rfc:`2616` (HTTP/1.1), section 7.2.1) - ``ganeti-watcher`` attempts to restart ``ganeti-rapi`` if RAPI is not reachable - Implemented initial support for running Ganeti daemons as separate diff --git a/doc/design-2.2.rst b/doc/design-2.2.rst index 2017fe67e..57a67803b 100644 --- a/doc/design-2.2.rst +++ b/doc/design-2.2.rst @@ -411,7 +411,7 @@ between clusters before instances can be moved. If the third party does not know the secret, it can't forge the certificates or redirect the data. Unless disabled by a new cluster parameter, verifying the HMAC signatures must be mandatory. The HMAC signature for X509 certificates -will be prepended to the certificate similar to an RFC822 header and +will be prepended to the certificate similar to an :rfc:`822` header and only covers the certificate (from ``-----BEGIN CERTIFICATE-----`` to ``-----END CERTIFICATE-----``). The header name will be ``X-Ganeti-Signature`` and its value will have the format diff --git a/doc/rapi.rst b/doc/rapi.rst index b9fe651d9..b01d21785 100644 --- a/doc/rapi.rst +++ b/doc/rapi.rst @@ -53,7 +53,7 @@ Example:: .. [#pwhash] Using the MD5 hash of username, realm and password is - described in RFC2617_ ("HTTP Authentication"), sections 3.2.2.2 and + described in :rfc:`2617` ("HTTP Authentication"), sections 3.2.2.2 and 3.3. The reason for using it over another algorithm is forward compatibility. If ``ganeti-rapi`` were to implement HTTP Digest authentication in the future, the same hash could be used. @@ -65,11 +65,10 @@ Protocol -------- The protocol used is JSON_ over HTTP designed after the REST_ principle. -HTTP Basic authentication as per RFC2617_ is supported. +HTTP Basic authentication as per :rfc:`2617` is supported. .. _JSON: http://www.json.org/ .. _REST: http://en.wikipedia.org/wiki/Representational_State_Transfer -.. _RFC2617: http://tools.ietf.org/rfc/rfc2617.txt A note on JSON as used by RAPI @@ -108,9 +107,9 @@ problems. PUT or POST? ------------ -According to RFC2616 the main difference between PUT and POST is that -POST can create new resources but PUT can only create the resource the -URI was pointing to on the PUT request. +According to :rfc:`2616` the main difference between PUT and POST is +that POST can create new resources but PUT can only create the resource +the URI was pointing to on the PUT request. Unfortunately, due to historic reasons, the Ganeti RAPI library is not consistent with this usage, so just use the methods as documented below diff --git a/doc/security.rst b/doc/security.rst index 48251c0e8..a02a72e23 100644 --- a/doc/security.rst +++ b/doc/security.rst @@ -93,7 +93,7 @@ Remote API ---------- Starting with Ganeti 2.0, Remote API traffic is encrypted using SSL/TLS -by default. It supports Basic authentication as per RFC2617. +by default. It supports Basic authentication as per :rfc:`2617`. Paths for certificate, private key and CA files required for SSL/TLS will be set at source configure time. Symlinks or command line -- GitLab