Skip to content

Commit 09b0c96

Browse files
author
Rand McKinney
committed
fix more links
1 parent 7dfe1ea commit 09b0c96

File tree

4 files changed

+10
-10
lines changed

4 files changed

+10
-10
lines changed

docs/manifest/assertions-actions.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ title: Assertions and actions
77

88
Assertions provide information about when, where, and how an asset was created or transformed.
99

10-
In the JSON manifest, each assertion is specified by a [ManifestAssertion](../manifest/manifest-ref#manifestassertion) object. All the assertions in the manifest are in the `assertions` array. A ManifestAssertion object has two required properties, `label`, a string, and `data`, which can contain arbitrary information; and two optional properties, `kind` and `instance`.
10+
In the JSON manifest, each assertion is specified by a [ManifestAssertion](../manifest/manifest-ref.mdx#manifestassertion) object. All the assertions in the manifest are in the `assertions` array. A ManifestAssertion object has two required properties, `label`, a string, and `data`, which can contain arbitrary information; and two optional properties, `kind` and `instance`.
1111

1212
The standard form of an assertion in a JSON manifest is:
1313

@@ -37,7 +37,7 @@ Metadata assertions must include one or more `@context` properties in the `data`
3737

3838
### C2PA standard assertions
3939

40-
The C2PA Technical Specification defines a [set of standard assertions](https://c2pa.org/specifications/specifications/1.3/specs/C2PA_Specification.html#_standard_c2pa_assertion_summary) and their corresponding labels. In addition, you can define [custom assertions](#custom-assertions) for your specific application.
40+
The C2PA Technical Specification defines a [set of standard assertions](https://c2pa.org/specifications/specifications/1.4/specs/C2PA_Specification.html#_standard_c2pa_assertion_summary) and their corresponding labels. In addition, you can define [custom assertions](#custom-assertions) for your specific application.
4141

4242
The following table summarizes some of the most important standard assertions.
4343

@@ -71,7 +71,7 @@ The value of each of these properties is an object with a `use` property that ca
7171
- `notAllowed`: Permission is NOT granted for this type of use.
7272
- `constrained`: Permission is not unconditionally granted for this use. You can provide more details (such as contact information) in the `constraints_info` text property.
7373

74-
For more information, see the [C2PA Technical Specification](https://c2pa.org/specifications/specifications/1.3/specs/C2PA_Specification.html#_training_and_data_mining).
74+
For more information, see the [C2PA Technical Specification](https://c2pa.org/specifications/specifications/1.4/specs/C2PA_Specification.html#_training_and_data_mining).
7575

7676
For example:
7777

docs/manifest/examples.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,9 @@ import CodeBlock from '@theme/CodeBlock';
99

1010
The C2PA [public-testfiles](https://github.com/c2pa-org/public-testfiles) repository contains numerous examples of asset files with Content Credentials. See https://c2pa.org/public-testfiles/ for links to easily inspect each asset file using Verify using [an asset URL](../verify#entering-an-asset-url) and to the corresponding [manifest report](../c2patool/#displaying-manifest-data) and [detailed manifest report](../c2patool/#detailed-manifest-report) from C2PA Tool.
1111

12-
## Examples from c2patool
12+
## Examples from C2PA Tool
1313

14-
The command-line tool [`c2patool`](/docs/c2patool) is helpful when developing applications to work with manifest data. When saving a manifest, it has two modes:
14+
The command-line [C2PA Tool](/docs/c2patool), `c2patool`, is helpful when developing applications to work with manifest data. When saving a manifest, it has two modes:
1515

1616
- **Standard mode** (the default), where it saves a manifest file in JSON format, which is simplified and slightly different from the underlying binary manifest structure.
1717
- **Detailed mode** (specified with the `-d` option), where it saves a file that more closely reflects the actual structure of the binary data, including assertions with JUMBF URLs and their associated hashes.

docs/manifest/ingredients.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ The C2PA Technical Specification describes _ingredient assertions_ but the CAI S
1515

1616
## Ingredient objects
1717

18-
Each ingredient used to create an asset is listed in the [JSON manifest](manifest-ref) `ingredients` array. When an ingredient itself has Content Credentials, those manifests are included in the composed asset's manifest store to keep the provenance data intact.
18+
Each ingredient used to create an asset is listed in the [JSON manifest](manifest-ref.mdx) `ingredients` array. When an ingredient itself has Content Credentials, those manifests are included in the composed asset's manifest store to keep the provenance data intact.
1919

2020
The `ingredients` array contains an [ingredient object](manifest-ref#ingredient) for each ingredient. The only required property of the `ingredient` object is the `title` property, which usually is the source file name.
2121

docs/manifest/signing-manifests.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ title: Signing manifests
44
---
55

66
:::tip
7-
Before reading this page, be sure to read [Getting started](/docs/getting-started) so you'll have some basic background on public-key infrastructure (PKI) technology, certificates, and signing manifests.
7+
Before reading this page, be sure to read [Getting started](../getting-started.mdx) so you'll have some basic background on public-key infrastructure (PKI) technology, certificates, and signing manifests.
88
:::
99

1010
## Overview
@@ -72,7 +72,7 @@ The information in this table is based on the [C2PA specification Trust Model se
7272
Here is an example of generating a C2PA-compliant set of credentials using [GlobalSign](http://globalsign.com/) certificate authority (CA).
7373

7474
:::note
75-
GlobalSign is just one of many CAs. For a list of some others, see [Getting started](/docs/getting-started#getting-a-security-certificate).
75+
GlobalSign is just one of many CAs. For a list of some others, see [Getting started](../getting-started.mdx#getting-a-security-certificate).
7676
:::note
7777

7878
Credential management is a complex topic and different for every organization. See [above](#overview) for links to best practices.
@@ -167,7 +167,7 @@ You now have all the needed information to configure C2PA Tool for manifest sign
167167

168168
The `private_key` and `sign_cert` properties must be full paths to the key and certificate chain files generated above.
169169

170-
You can now use C2PA Tool as described in its [documentation](/docs/c2patool/#adding-a-manifest-to-an-asset-file) to add a manifest to an image or other asset file. The command will be something like this:
170+
You can now use C2PA Tool as described in its [documentation](../c2patool/readme.md#adding-a-manifest-to-an-asset-file) to add a manifest to an image or other asset file. The command will be something like this:
171171

172172
```
173173
c2patool -m my_manifest.json -o signed_image.jpg my_image.jpg
@@ -176,7 +176,7 @@ c2patool -m my_manifest.json -o signed_image.jpg my_image.jpg
176176
The example above uses the information in `my_manifest.json` to add a new manifest to output `signed_image.jpg` using source `my_image.jpg`. The manifest will be signed using the PS256 signature algorithm with private key `mykey.pem`. The manifest will contain the trust chain specified in `mycerts.pem`.
177177

178178
:::warning
179-
In a production application, do not access a private key and certificate directly from the file system as shown in this example. Doing so is fine during development, but not in production because it exposes these sensitive files to potential attackers. Instead use a hardware security module (HSM) and optionally a Key Management Service (KMS) to access them; for example as show in the [C2PA Python Example](../../docs/c2pa-python-example).
179+
In a production application, do not access a private key and certificate directly from the file system as shown in this example. Doing so is fine during development, but not in production because it exposes these sensitive files to potential attackers. Instead use a hardware security module (HSM) and optionally a Key Management Service (KMS) to access them; for example as show in the [C2PA Python Example](../c2pa-python-example/readme.md).
180180
:::
181181

182182
### Confirm it worked

0 commit comments

Comments
 (0)