From bfbd7f4215061d40d1c9648abb36b5502fcb4719 Mon Sep 17 00:00:00 2001 From: Ulya Trofimovich <skvadrik@gmail.com> Date: Fri, 4 Mar 2016 10:47:56 +0000 Subject: [PATCH] Added forgotten PDF file; changed section title. --- src/_templates/sidebar-home.html | 2 +- src/about/about.rst | 2 +- src/conf.py | 5 ++++- src/examples/example_02.rst | 2 +- 4 files changed, 7 insertions(+), 4 deletions(-) diff --git a/src/_templates/sidebar-home.html b/src/_templates/sidebar-home.html index 9e32550a..5cd9e993 100644 --- a/src/_templates/sidebar-home.html +++ b/src/_templates/sidebar-home.html @@ -2,7 +2,7 @@ re2c-{{ version }} </div> -<h3>Sitemap</h3> +<h3>Documentation</h3> {{ toctree(includehidden=True, maxdepth=1) }} <h3>Community</h3> diff --git a/src/about/about.rst b/src/about/about.rst index 38156326..ccba659a 100644 --- a/src/about/about.rst +++ b/src/about/about.rst @@ -10,7 +10,7 @@ Authors Originally written by Peter Bumbulis (peter@csg.uwaterloo.ca) and described in research article -`"RE2C: a more versatile scanner generator" <1994_bumbulis_cowan_re2c_a_more_versatile_scanner_generator.pdf>`_ +:download:`"RE2C: a more versatile scanner generator" <1994_bumbulis_cowan_re2c_a_more_versatile_scanner_generator.pdf>` by Peter Bumbulis, Donald D. Cowan, 1994, ACM Letters on Programming Languages and Systems (LOPLAS). diff --git a/src/conf.py b/src/conf.py index 3bcdc888..71de36e3 100644 --- a/src/conf.py +++ b/src/conf.py @@ -180,7 +180,10 @@ html_static_path = ['_static'] # Add any extra paths that contain custom files (such as robots.txt or # .htaccess) here, relative to this directory. These files are copied # directly to the root of the documentation. -html_extra_path = ['CNAME', '.nojekyll'] +html_extra_path = [ + 'CNAME', + '.nojekyll' +] # If not '', a 'Last updated on:' timestamp is inserted at every page bottom, # using the given strftime format. diff --git a/src/examples/example_02.rst b/src/examples/example_02.rst index 60b03c5a..d0677349 100644 --- a/src/examples/example_02.rst +++ b/src/examples/example_02.rst @@ -23,7 +23,7 @@ If the check fails, lexer calls ``YYFILL(n)``, which can either supply at least For those interested in the internal re2c algorithm used to determine checkpoints, here is a quote from the original paper -`"RE2C: a more versatile scanner generator" <../about/1994_bumbulis_cowan_re2c_a_more_versatile_scanner_generator.pdf>`_ +:download:`"RE2C: a more versatile scanner generator" <../about/1994_bumbulis_cowan_re2c_a_more_versatile_scanner_generator.pdf>` by Peter Bumbulis, Donald D. Cowan, 1994, ACM Letters on Programming Languages and Systems (LOPLAS): *A set of key states can be determined by discovering the strongly-connected components (SCCs) of the -- 2.40.0