Make sure the documentation build works.
authorEric S. Raymond <esr@thyrsus.com>
Mon, 1 Oct 2012 06:35:39 +0000 (02:35 -0400)
committerEric S. Raymond <esr@thyrsus.com>
Mon, 1 Oct 2012 06:35:39 +0000 (02:35 -0400)
Makefile
security.txt

index 481a098450f88d7386efe17ab4319b8c4fb18881..d004f41932b5aa8d04ca923ea368f48d80e4873e 100644 (file)
--- a/Makefile
+++ b/Makefile
@@ -14,6 +14,11 @@ irkerhook.1: irkerhook.xml
 irkerhook.html: irkerhook.xml
        xmlto html-nochunks irkerhook.xml
 
+security.html: security.txt
+       asciidoc -o security.html security.txt
+hacking.html: hacking.txt
+       asciidoc -o hacking.html hacking.txt
+
 install: irkerd.8 irkerhook.1 uninstall
        install -m 755 -o 0 -g 0 -d $(ROOT)/usr/bin/
        install -m 755 -o 0 -g 0 irkerd $(ROOT)/usr/bin/irkerd
@@ -48,5 +53,5 @@ irker-$(VERS).tar.gz: $(SOURCES) irkerd.8 irkerhook.1
 
 dist: irker-$(VERS).tar.gz
 
-release: irker-$(VERS).tar.gz irkerd.html irkerhook.html
+release: irker-$(VERS).tar.gz irkerd.html irkerhook.html security.html hacking.html
        shipper -u -m -t; make clean
index 01488a50efd575830652d764774679c270d4e593..448c6a0d0786f6926d2b6930437d27b7e1782c0b 100644 (file)
@@ -157,7 +157,7 @@ near resource limits.  An ordinary DoS attack would then be prevented
 from completely blocking all message traffic; the cost would be a
 whole lot of join/leave spam due to connection churn.
 
-= Authentication/Integrity =
+== Authentication/Integrity ==
 
 One way to help prevent DoS attacks would be in-band authentication -
 requiring irkerd submitters to present a credential along with each