From 45b70a7703be81b3a1ef0a1aa9ffde8cbb4853f4 Mon Sep 17 00:00:00 2001 From: Gergely Csatari Date: Mon, 25 Nov 2024 16:41:26 +0200 Subject: [PATCH] Changing docs to the docs.anuket.io ones Signed-off-by: Gergely Csatari --- doc/common/references.rst | 10 ---------- doc/conf.py | 12 ++++++------ test-requirements.txt | 16 ++++++++-------- 3 files changed, 14 insertions(+), 24 deletions(-) diff --git a/doc/common/references.rst b/doc/common/references.rst index 0a8d696ad3..8f2cc71ba9 100644 --- a/doc/common/references.rst +++ b/doc/common/references.rst @@ -26,8 +26,6 @@ Ref Doc Number Title [17] ETSI GS NFV-SEC 003 V1.1.1 “Network Functions Virtualisation (NFV); NFV Security; Security and Trust Guidance”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/003/01.01.01_60/gs_NFV-SEC003v010101p.pdf `__ [18] ETSI GS NFV-SEC 013 V3.1.1 “Network Functions Virtualisation (NFV) Release 3; NFV Security; Security Specification for MANO Components and Reference points”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/014/03.01.01_60/gs_NFV-SEC014v030101p.pdf `__ [19] ETSI GS NFV-SEC 013 V2.6.1 “Network Functions Virtualisation (NFV) Release 2; Security; VNF Package Security Specification ”. Available at `https://www.etsi.org/deliver/etsi_gs/NFV-SEC/001_099/021/02.06.01_60/gs_nfv-sec021v020601p.pdf `__ -[20] GSMA FS.31 V2.0 February 2020 “Baseline Security controls ”. Available at `https://www.gsma.com/security/resources/fs-31-gsma-baseline-security-controls `__ -[21] GSMA whitepaper January 2021 “Open Networking & the Security of Open Source Software deployment ”. Available at `https://www.gsma.com/futurenetworks/resources/open-networking-the-security-of-open-source-software-deployment `__ [22] Cloud Security Alliance (CSA) and SAFECode “The Six Pillars of DevSecOps: Automation (2020) ”. Available at `https://safecode.org/resource-secure-development-practices/the-six-pillars-of-devsecops-automation/ `__ [23] ISO/IEC 27000:2018 Information technology — Security techniques — Information security management systems — Overview and vocabulary. Available at `https://www.iso.org/standard/73906.html `__. [24] Cloud Security Alliance (CSA) “Information Security Management through Reflexive Security ”. Available at `https://cloudsecurityalliance.org/artifacts/information-security-management-through-reflexive-security/ `__ @@ -40,9 +38,7 @@ Ref Doc Number Title [31] IEEE 1588-2019 "Precision Clock Synchronization Protocol for Networked Measurement and Control Systems", Available at `https://standards.ieee.org/standard/1588-2019.html `__ [32] ITU-T G.8262 "Timing characteristics of a synchronous equipment slave clock", Available at `https://www.itu.int/rec/T-REC-G.8262 `__ [33] ITU-T G.8275.2 "Precision time protocol telecom profile for time/phase synchronization with partial timing support from the network", Available at `https://www.itu.int/rec/T-REC-G.8275.2 `__ -[34] GSMA OPG.02 "Operator Platform: Requirements and Architecture", Available at `https://www.gsma.com/futurenetworks/operator-platform-hp/ `__ [35] O-RAN.WG6.AAL-GAnP-v01.00 "O-RAN Acceleration Abstraction Layer General Aspects and Principles 1.0”, November 2020", Available at `https://www.o-ran.org `__ -[36] GSMA FS.40-v02.00 "5G Security Guide, version 2.0, 20 October 2021”, November 2020", Available at `https://www.gsma.com/security/publications/ `__ [37] ETSI TS 103 457 "CYBER; Trusted Cross-Domain Interface: Interface to offload sensitive functions to a trusted domain”, TS 103 457 - V1.1.1, Available at `https://www.etsi.org/deliver/etsi_ts/103400_103499/103457/01.01.01_60/ts_103457v010101p.pdf `__ [38] RFC 2544 "Benchmarking Methodology for Network Interconnect Devices", Available at `https://www.ietf.org/rfc/rfc2544.txt `__ [39] O-RAN.WG6 "WG6: Cloudification and Orchestration Workgroup specifications", Available at `https://www.o-ran.org `__ @@ -52,7 +48,6 @@ Ref Doc Number Title [43] ITU-T L.1361 "Measurement method for energy efficiency of network functions virtualization", Available at `https://www.itu.int/rec/T-REC-L.1361 `__ [44] "Open RAN Technical Priority - Focus on Energy Efficiency", Available at `https://www.o-ran.org/ecosystem-resources `__ [45] "QuEST Forum - NFV Workload Efficiency Whitepaper", Available at `https://tl9000.org/resources/documents/NFV%20Workload%20Efficiency%20Whitepaper.pdf `__ -[46] GSMA FS.16 "Network Equipment Security Assurance Scheme – Development and Lifecycle Security Requirements, version 2.2", Available at `https://www.gsma.com/security/resources/fs-16-network-equipment-security-assurance-scheme-development-and-lifecycle-security-requirements/ `__ ==== ======================================================= ================================================================================================================================================================================================================================================================================================================================================================================================================================= Cloud Native and Kubernetes References @@ -147,11 +142,6 @@ Security Related References Information security management systems - Overview and vocabulary. Available at `https://www.iso.org/standard/73906.html `__. - * - [S9] - - - - "Open Networking & the Security of Open Source Software deployment". - Available at `https://www.gsma.com/futurenetworks/resources/open-networking-the-security-of-open-source-software-deployment/ - `__. * - [S10] - - OWASP "Secure Coding Practices - Quick Reference Guide". diff --git a/doc/conf.py b/doc/conf.py index d8f0808c1d..36bd85b6d9 100644 --- a/doc/conf.py +++ b/doc/conf.py @@ -24,12 +24,12 @@ 'https://wiki.lfnetworking.org/' ] intersphinx_mapping = { - 'ref_model': ('https://cntt.readthedocs.io/projects/rm/en/latest/', None), - 'ref_arch_openstack': ('https://cntt.readthedocs.io/projects/ra1/en/latest/', None), - 'ref_arch_kubernetes': ('https://cntt.readthedocs.io/projects/ra2/en/latest/', None), - 'ref_cert_RC2': ('https://cntt.readthedocs.io/projects/rc2/en/latest/', None), - 'ref_impl_cntt-ri': ('https://cntt.readthedocs.io/projects/ri1/en/latest/', None), - 'ref_impl_cntt-ri2': ('https://cntt.readthedocs.io/projects/ri2/en/latest/', None) + 'ref_model': ('https://docs.anuket.io/projects/RM/en/latest/', None), + 'ref_arch_openstack': ('https://docs.anuket.io/projects/RA1/en/latest/', None), + 'ref_arch_kubernetes': ('https://docs.anuket.io/projects/RA2/en/latest/', None), + 'ref_cert_RC2': ('https://docs.anuket.io/projects/RC2/en/latest/', None), + 'ref_impl_cntt-ri': ('https://docs.anuket.io/projects/RI1/en/latest/', None), + 'ref_impl_cntt-ri2': ('https://docs.anuket.io/projects/RI2/en/latest/', None) } autosectionlabel_prefix_document = True autosectionlabel_maxdepth = 4 diff --git a/test-requirements.txt b/test-requirements.txt index c491f81423..154cded7f0 100644 --- a/test-requirements.txt +++ b/test-requirements.txt @@ -1,11 +1,11 @@ # The order of packages is significant, because pip processes them in the order # of appearance. Changing the order has an impact on the overall integration # process, which may cause wedges in the gate later. -sphinx==4.5.0 # BSD -doc8==0.11.2 # Apache-2.0 -piccolo-theme==0.16.0 # MIT -sphinxcontrib-devhelp===1.0.2 -sphinxcontrib-applehelp===1.0.2 -sphinxcontrib-htmlhelp===2.0.0 -sphinxcontrib-qthelp===1.0.3 -sphinxcontrib-serializinghtml===1.1.5 +sphinx # BSD +doc8 # Apache-2.0 +piccolo-theme # MIT +sphinxcontrib-devhelp +sphinxcontrib-applehelp +sphinxcontrib-htmlhelp +sphinxcontrib-qthelp +sphinxcontrib-serializinghtml