Fix links in documentation for LICENSE and related sections
This commit is contained in:
@@ -72,7 +72,7 @@ The changelog for Calminer can be found in the [Changelog](CHANGELOG.md) section
|
||||
|
||||
## License
|
||||
|
||||
This project is licensed under the GNU General Public License v3.0. See the [LICENSE](LICENSE) file for more details.
|
||||
This project is licensed under the GNU General Public License v3.0. See the [LICENSE](LICENSE.md) file for more details.
|
||||
|
||||
## Contact
|
||||
|
||||
|
||||
@@ -435,7 +435,7 @@ erDiagram
|
||||
|
||||
#### Product Sales
|
||||
|
||||
Mining product sales represent the primary revenue stream for most mining projects. Product sales revenue is calculated based on the quantity of product sold, price per unit, and any applicable adjustments for quality or other factors like penalties for impurities. Also see [Price Calculation](/specifications/price_calculation.md) for more details.
|
||||
Mining product sales represent the primary revenue stream for most mining projects. Product sales revenue is calculated based on the quantity of product sold, price per unit, and any applicable adjustments for quality or other factors like penalties for impurities. Also see [Price Calculation](../../specifications/price_calculation.md) for more details.
|
||||
|
||||
```mermaid
|
||||
erDiagram
|
||||
|
||||
@@ -10,11 +10,11 @@ All sensitive data is encrypted at rest and in transit to prevent unauthorized a
|
||||
|
||||
Role-based access controls (RBAC) are implemented to restrict data access based on user roles and responsibilities.
|
||||
|
||||
Also see [Authentication and Authorization](08_concepts.md#authentication-and-authorization) and the [Data Model](08_02_data_model.md#user-roles) sections.
|
||||
Also see [Authentication and Authorization](../08_concepts.md#authentication-and-authorization) and the [Data Model](../08_concepts/02_data_model.md#user-roles) sections.
|
||||
|
||||
## Audit Logging
|
||||
|
||||
Comprehensive logging of user activities and system events is maintained for monitoring and auditing purposes. Also see [Error Handling and Logging](08_concepts.md#error-handling-and-logging) section for more details.
|
||||
Comprehensive logging of user activities and system events is maintained for monitoring and auditing purposes. Also see [Error Handling and Logging](../08_concepts.md#error-handling-and-logging) section for more details.
|
||||
|
||||
## Vulnerability Management
|
||||
|
||||
|
||||
@@ -29,7 +29,7 @@ CalMiner achieves this by utilizing a combination of data streaming and in-memor
|
||||
|
||||
> The platform must feature an intuitive interface that minimizes the learning curve for new users.
|
||||
|
||||
The UI design principles outlined in the [UI Design Documentation](08_03_ui_design.md) guide the development of a user-friendly interface that adheres to best practices in usability and accessibility.
|
||||
The UI design principles outlined in the [UI Design Documentation](08_concepts/08_ui_design.md) guide the development of a user-friendly interface that adheres to best practices in usability and accessibility.
|
||||
|
||||
### Security
|
||||
|
||||
|
||||
Reference in New Issue
Block a user