From 60c0998e1a589f8ef2acdcbdda522717d8596f2a Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Vladim=C3=ADr=20=C4=8Cun=C3=A1t?= <vladimir.cunat@nic.cz>
Date: Thu, 29 Mar 2018 14:06:01 +0200
Subject: [PATCH] docs: cross-linking nitpicks

- clickable module references
- clickable RFC references via :rfc:`NNN#anchor`
---
 daemon/README.rst                  | 2 +-
 modules/dns64/README.rst           | 2 +-
 modules/hints/README.rst           | 2 +-
 modules/policy/README.rst          | 3 +--
 modules/priming/README.rst         | 2 +-
 modules/serve_stale/README.rst     | 2 +-
 modules/ta_signal_query/README.rst | 6 +++---
 7 files changed, 9 insertions(+), 10 deletions(-)

diff --git a/daemon/README.rst b/daemon/README.rst
index 545e0fa18..2880143c1 100644
--- a/daemon/README.rst
+++ b/daemon/README.rst
@@ -762,7 +762,7 @@ daemons or manipulated from other processes, making for example synchronised loa
   :return: current timeout
 
   Get or set time interval for which a nameserver address will be ignored after determining that it doesn't return (useful) answers.
-  The intention is to avoid waiting if there's little hope; instead, kresd can immediately SERVFAIL or immediately use stale records (with ``serve_stale`` module).
+  The intention is to avoid waiting if there's little hope; instead, kresd can immediately SERVFAIL or immediately use stale records (with :ref:`serve_stale <mod-serve_stale>` module).
 
   .. warning:: This settings applies only to the current kresd process.
 
diff --git a/modules/dns64/README.rst b/modules/dns64/README.rst
index 79096dc16..6ee33d816 100644
--- a/modules/dns64/README.rst
+++ b/modules/dns64/README.rst
@@ -5,7 +5,7 @@ DNS64
 
 The module for :rfc:`6147` DNS64 AAAA-from-A record synthesis, it is used to enable client-server communication between an IPv6-only client and an IPv4-only server. See the well written `introduction`_ in the PowerDNS documentation.
 
-.. warning:: The module currently won't work well with policy.STUB.
+.. warning:: The module currently won't work well with :ref:`policy.STUB <mod-policy>`.
 
 .. tip:: The A record sub-requests will be DNSSEC secured, but the synthetic AAAA records can't be. Make sure the last mile between stub and resolver is secure to avoid spoofing.
 
diff --git a/modules/hints/README.rst b/modules/hints/README.rst
index e37b1580f..fef407157 100644
--- a/modules/hints/README.rst
+++ b/modules/hints/README.rst
@@ -25,7 +25,7 @@ Examples
     -- Add a custom hint
     hints['foo.bar'] = '127.0.0.1'
 
-.. note:: The ``policy`` module applies before ``hints``, meaning e.g. that hints for special names (:rfc:`6761#section-6`) like ``localhost`` or ``test`` will get shadowed by ``policy`` rules by default.
+.. note:: The :ref:`policy <mod-policy>` module applies before hints, meaning e.g. that hints for special names (:rfc:`6761#section-6`) like ``localhost`` or ``test`` will get shadowed by policy rules by default.
     That can be worked around e.g. by explicit ``policy.PASS`` action.
 
 Properties
diff --git a/modules/policy/README.rst b/modules/policy/README.rst
index 722819dbe..c2ceb1537 100644
--- a/modules/policy/README.rst
+++ b/modules/policy/README.rst
@@ -55,7 +55,7 @@ Also, it is possible to write your own action (i.e. Lua function). It is possibl
 
 Forwarding over TLS protocol (DNS-over-TLS)
 ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
-Policy `TLS_FORWARD` allows you to forward queries using `Transport Layer Security`_ protocol, which hides the content of your queries from an attacker observing the network traffic. Further details about this protocol can be found in `RFC 7858`_ and `IETF draft dprive-dtls-and-tls-profiles`_.
+Policy `TLS_FORWARD` allows you to forward queries using `Transport Layer Security`_ protocol, which hides the content of your queries from an attacker observing the network traffic. Further details about this protocol can be found in :rfc:`7858` and `IETF draft dprive-dtls-and-tls-profiles`_.
 
 Queries affected by `TLS_FORWARD` policy will always be resolved over TLS connection. Knot Resolver does not implement fallback to non-TLS connection, so if TLS connection cannot be established or authenticated according to the configuration, the resolution will fail.
 
@@ -211,5 +211,4 @@ This module is enabled by default because it implements mandatory :rfc:`6761` lo
 .. _`Jan-Piet Mens's post`: http://jpmens.net/2011/04/26/how-to-configure-your-bind-resolvers-to-lie-using-response-policy-zones-rpz/
 .. _`Transport Layer Security`: https://en.wikipedia.org/wiki/Transport_Layer_Security
 .. _`DNS Privacy Project`: https://dnsprivacy.org/
-.. _`RFC 7858`: https://tools.ietf.org/html/rfc7858
 .. _`IETF draft dprive-dtls-and-tls-profiles`: https://tools.ietf.org/html/draft-ietf-dprive-dtls-and-tls-profiles
diff --git a/modules/priming/README.rst b/modules/priming/README.rst
index 826c78c13..29136849d 100644
--- a/modules/priming/README.rst
+++ b/modules/priming/README.rst
@@ -4,7 +4,7 @@ Priming module
 --------------
 
 The module for Initializing a DNS Resolver with Priming Queries implemented
-according to RFC 8109. Purpose of the module is to keep up-to-date list of
+according to :rfc:`8109`. Purpose of the module is to keep up-to-date list of
 root DNS servers and associated IP addresses.
 
 Result of successful priming query replaces root hints distributed with
diff --git a/modules/serve_stale/README.rst b/modules/serve_stale/README.rst
index 74ee09be5..5c681facf 100644
--- a/modules/serve_stale/README.rst
+++ b/modules/serve_stale/README.rst
@@ -9,7 +9,7 @@ unable to contact upstream servers.
 By default it allows stale-ness by up to one day,
 after roughly four seconds trying to contact the servers.
 It's quite configurable/flexible; see the beginning of the module source for details.
-See also the RFC draft_ (not fully followed).
+See also the RFC draft_ (not fully followed) and :any:`cache.ns_tout`.
 
 Running
 ^^^^^^^
diff --git a/modules/ta_signal_query/README.rst b/modules/ta_signal_query/README.rst
index 00bdd48f5..04ee1edce 100644
--- a/modules/ta_signal_query/README.rst
+++ b/modules/ta_signal_query/README.rst
@@ -4,7 +4,7 @@ Signaling Trust Anchor Knowledge in DNSSEC
 ------------------------------------------
 
 The module for Signaling Trust Anchor Knowledge in DNSSEC Using Key Tag Query,
-implemented according to RFC 8145 section 5.
+implemented according to :rfc:`8145#section-5`.
 
 This feature allows validating resolvers to signal to authoritative servers
 which keys are referenced in their chain of trust. The data from such
@@ -15,8 +15,8 @@ This mechanism serve to measure the acceptance and use of new DNSSEC
 trust anchors and key signing keys (KSKs). This signaling data can be
 used by zone administrators as a gauge to measure the successful deployment
 of new keys. This is of particular interest for the DNS root zone in the event
-of key and/or algorithm rollovers that rely on RFC 5011 to automatically
+of key and/or algorithm rollovers that rely on :rfc:`5011` to automatically
 update a validating DNS resolver’s trust anchor.
 
-This module is enabled by default. You may use modules.unload('ta_signal_query')
+This module is enabled by default. You may use ``modules.unload('ta_signal_query')``
 in your configuration.
-- 
GitLab