Fix links in documentation for LICENSE and related sections

This commit is contained in:
2025-11-09 13:22:26 +01:00
parent 423406ce20
commit eaab1c5a5e
4 changed files with 5 additions and 5 deletions

View File

@@ -72,7 +72,7 @@ The changelog for Calminer can be found in the [Changelog](CHANGELOG.md) section
## License ## License
This project is licensed under the GNU General Public License v3.0. See the [LICENSE](LICENSE) file for more details. This project is licensed under the GNU General Public License v3.0. See the [LICENSE](LICENSE.md) file for more details.
## Contact ## Contact

View File

@@ -435,7 +435,7 @@ erDiagram
#### Product Sales #### Product Sales
Mining product sales represent the primary revenue stream for most mining projects. Product sales revenue is calculated based on the quantity of product sold, price per unit, and any applicable adjustments for quality or other factors like penalties for impurities. Also see [Price Calculation](/specifications/price_calculation.md) for more details. Mining product sales represent the primary revenue stream for most mining projects. Product sales revenue is calculated based on the quantity of product sold, price per unit, and any applicable adjustments for quality or other factors like penalties for impurities. Also see [Price Calculation](../../specifications/price_calculation.md) for more details.
```mermaid ```mermaid
erDiagram erDiagram

View File

@@ -10,11 +10,11 @@ All sensitive data is encrypted at rest and in transit to prevent unauthorized a
Role-based access controls (RBAC) are implemented to restrict data access based on user roles and responsibilities. Role-based access controls (RBAC) are implemented to restrict data access based on user roles and responsibilities.
Also see [Authentication and Authorization](08_concepts.md#authentication-and-authorization) and the [Data Model](08_02_data_model.md#user-roles) sections. Also see [Authentication and Authorization](../08_concepts.md#authentication-and-authorization) and the [Data Model](../08_concepts/02_data_model.md#user-roles) sections.
## Audit Logging ## Audit Logging
Comprehensive logging of user activities and system events is maintained for monitoring and auditing purposes. Also see [Error Handling and Logging](08_concepts.md#error-handling-and-logging) section for more details. Comprehensive logging of user activities and system events is maintained for monitoring and auditing purposes. Also see [Error Handling and Logging](../08_concepts.md#error-handling-and-logging) section for more details.
## Vulnerability Management ## Vulnerability Management

View File

@@ -29,7 +29,7 @@ CalMiner achieves this by utilizing a combination of data streaming and in-memor
> The platform must feature an intuitive interface that minimizes the learning curve for new users. > The platform must feature an intuitive interface that minimizes the learning curve for new users.
The UI design principles outlined in the [UI Design Documentation](08_03_ui_design.md) guide the development of a user-friendly interface that adheres to best practices in usability and accessibility. The UI design principles outlined in the [UI Design Documentation](08_concepts/08_ui_design.md) guide the development of a user-friendly interface that adheres to best practices in usability and accessibility.
### Security ### Security