summaryrefslogtreecommitdiff
path: root/pelican/content/ReleaseNotes.md
diff options
context:
space:
mode:
authorRob Austein <sra@hactrn.net>2021-02-15 23:55:13 +0000
committerRob Austein <sra@hactrn.net>2021-02-15 23:55:13 +0000
commit86202308b68db7a6cf299c5fe3cdee4dc1850330 (patch)
tree267929b96cc0f386112b07ab49a4debc0af347dd /pelican/content/ReleaseNotes.md
parenta255b67f6d487703db648c58ee1e50c0aa85c2a6 (diff)
Try mapping source: and browser: links
This turns out to be less useful than expected, because somehow for every single link in the wiki, the source repository is not quite in the obvios plae with cgit. Might be a cgit configuration issue, but this gets wonky enough that it's probably simpler just to expand the JSON file we already have for the filter rules so that it includes other magic stuff like a URL map for this kind of link.
Diffstat (limited to 'pelican/content/ReleaseNotes.md')
-rw-r--r--pelican/content/ReleaseNotes.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/pelican/content/ReleaseNotes.md b/pelican/content/ReleaseNotes.md
index 8282557..a95050a 100644
--- a/pelican/content/ReleaseNotes.md
+++ b/pelican/content/ReleaseNotes.md
@@ -22,7 +22,7 @@ Modified: 2017-05-13 19:18
* Python client implementations of libhal RPC mechanism and PKCS #11 now installed as `cryptech.libhal` and `cryptech.py11`, respectively.
* Python PKCS #11 client hacked to play nicely with `pkcs11-spy` debugging tool.
* RTOS replaced by simple non-preemptive (voluntary yield) tasking system, eliminating a huge morass of potential race conditions, debugging nightmares, priority inversions, and similar horrors. Lack of preemption means that console acess may have to wait for something else to yield the ARM CPU, but it's more than worth it to get rid of all the stability problems the RTOS was causing.
-* [Sample code for using the HSM as an OpenSSL engine](source:/user/sra/openssl-engine) is available. This only works with RSA for the moment, due to apparent limitations of the engine implementation.
+* [Sample code for using the HSM as an OpenSSL engine](https://git.cryptech.is/user/sra/openssl-engine) is available. This only works with RSA for the moment, due to apparent limitations of the engine implementation.
Getting started with 3.0: