Skip to content

Commit 4d479ab

Browse files
committed
Change image imports to use @site for portability
1 parent 318c38d commit 4d479ab

File tree

4 files changed

+17
-19
lines changed

4 files changed

+17
-19
lines changed

docs/getting-started/index.mdx

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -2,11 +2,9 @@
22
title: Getting started with Content Credentials
33
---
44

5-
import c2pa_terms from '../../static/img/c2pa-terms.png';
6-
import cai_open_source from '../../static/img/cai-open-source.jpg';
7-
import cai_os_tools_table from '../../static/img/cai-os-tools-table.png';
8-
import cai_levels from '../../static/img/cai-levels.png';
9-
import cr_pin from '../../static/img/cr-pin.png';
5+
import c2pa_terms from '@site/static/img/c2pa-terms.png';
6+
import cai_levels from '@site/static/img/cai-levels.png';
7+
import cr_pin from '@site/static/img/cr-pin.png';
108

119
This is a technical introduction to the Content Authenticity Initiative (CAI) open-source SDK that provides initial context and an overview of the technical aspects of implementing CAI solutions.
1210

@@ -89,9 +87,9 @@ In practice, to use a certificate with the CAI SDK, follow this process:
8987
For more information on getting and using certificates, see [Signing and certificates](signing/index.md).
9088
:::
9189

92-
### Verify trust list
90+
### Interim trust list
9391

94-
import verify_unknown_source from '../../static/img/verify-cc-unknown-source.png';
92+
import verify_unknown_source from '@site/static/img/verify-cc-unknown-source.png';
9593

9694
The C2PA [Verify tool](https://verify.contentauthenticity.org) uses a list of _known certificates_ (sometimes referred to as a "trust list") to determine whether a Content Credential was issued by a known source. Currently, it uses the [interim trust list](verify-known-cert-list) but it will be updated soon to use the official [C2PA trust list](conformance.mdx#c2pa-trust-lists).
9795

docs/getting-started/trust-list.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: verify-known-cert-list
33
title: The interim trust list
44
---
55

6-
import verify_unknown_source from '../../static/img/verify-cc-unknown-source.png';
6+
import verify_unknown_source from '@site/static/img/verify-cc-unknown-source.png';
77

88
:::warning Warning
99
The process described on this page is deprecated. The C2PA has released its official trust lists, and Verify will be updated to use them soon. See [Deprecation timeline](#deprecation-timeline) for more information.

docs/getting-started/verify.mdx

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ id: verify
33
title: Using the Verify tool
44
---
55

6-
import verify_site from '../../static/img/verify.png';
6+
import verify_site from '@site/static/img/verify.png';
77

88
The C2PA **[Verify tool](https://verify.contentauthenticity.org)** (often referred to as simply "Verify") is useful both for consumers and for CAI application developers.
99

@@ -71,7 +71,7 @@ Once you've uploaded an asset or entered an asset URL, if the asset:
7171
- Does not have an associated manifest store, Verify displays the message **No Content Credential**.
7272
- Does have an associated manifest store, Verify displays information from it in the three vertical panels, for example as shown below.
7373

74-
import verify_sections from '../../static/img/verify-sections.png';
74+
import verify_sections from '@site/static/img/verify-sections.png';
7575

7676
<img src={verify_sections} style={{ width: '800px', marginBottom: '20px' }} />
7777

@@ -149,7 +149,7 @@ import verify_sections from '../../static/img/verify-sections.png';
149149

150150
### Title and signing information
151151

152-
import verify_title_date from '../../static/img/verify-title-date.png';
152+
import verify_title_date from '@site/static/img/verify-title-date.png';
153153

154154
<img
155155
src={verify_title_date}
@@ -176,7 +176,7 @@ For example, suppose you downloaded a file from Adobe Stock and renamed it `my_s
176176

177177
If the Content Credential was signed by a certificate that is NOT on the [known certificate list](verify-known-cert-list), such as one of the SDK's [test certificates](signing/test-certs.md), then Verify displays "Unrecognized" at the top of this section with this notice:
178178

179-
import verify_unknown_source from '../../static/img/verify-cc-unknown-source.png';
179+
import verify_unknown_source from '@site/static/img/verify-cc-unknown-source.png';
180180

181181
<img
182182
src={verify_unknown_source}
@@ -205,7 +205,7 @@ If the issuer string is too long, then the date might be truncated or not shown
205205

206206
If the manifest has [validation errors](manifest/reading/validation.md), then Verify displays this notice:
207207

208-
import verify_validation_error from '../../static/img/verify-validation-error.png';
208+
import verify_validation_error from '@site/static/img/verify-validation-error.png';
209209

210210
<img
211211
src={verify_validation_error}
@@ -263,7 +263,7 @@ The **Process** section displays information about the process used to create th
263263

264264
For example:
265265

266-
import verify_process from '../../static/img/verify-process.png';
266+
import verify_process from '@site/static/img/verify-process.png';
267267

268268
<img src={verify_process} style={{ width: '600px' }} />
269269

@@ -329,7 +329,7 @@ The **Actions** subsection lists [actions](https://opensource.contentauthenticit
329329

330330
#### AI-generated content
331331

332-
import verify_process_ai from '../../static/img/verify-process-ai.png';
332+
import verify_process_ai from '@site/static/img/verify-process-ai.png';
333333

334334
<img src={verify_process_ai} style={{ width: '250px' }} />
335335

@@ -343,7 +343,7 @@ This section displays the same information as described in [Title and singing in
343343

344344
If the active manifest includes [Exif metadata assertions](../manifest/writing/assertions-actions.md#cawg-metadata-assertions), then an additional **Camera capture details** section shows information about the device used to create the asset, as illustrated below:
345345

346-
import verify_exif from '../../static/img/verify-exif.png';
346+
import verify_exif from '@site/static/img/verify-exif.png';
347347

348348
<img src={verify_exif} style={{ width: '500px' }} />
349349

docs/introduction.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@ id: introduction
33
title: CAI open source SDK
44
---
55

6-
import cr_pin from '../static/img/cr-pin.png';
7-
import cai_open_source from '../static/img/cai-open-source.jpg';
6+
import cr_pin from '@site/static/img/cr-pin.png';
7+
import cai_open_source from '@site/static/img/cai-open-source.jpg';
88

99
You're strongly encouraged to read this introduction and [Getting started](getting-started/index.mdx) for some basic background and context, before you dive right into development. [Working with manifests](manifest/understanding.md) also has some useful information, regardless of which language and library you use.
1010

@@ -51,7 +51,7 @@ An embedded application can use the Rust FFI (foreign function interface) to cal
5151

5252
## Which tool is right for you?
5353

54-
import green_check from '../static/img/green_check.png';
54+
import green_check from '@site/static/img/green_check.png';
5555

5656
<table>
5757
<thead>

0 commit comments

Comments
 (0)