From bfbd7f4215061d40d1c9648abb36b5502fcb4719 Mon Sep 17 00:00:00 2001
From: Ulya Trofimovich <skvadrik@gmail.com>
Date: Fri, 4 Mar 2016 10:47:56 +0000
Subject: [PATCH] Added forgotten PDF file; changed section title.

---
 src/_templates/sidebar-home.html | 2 +-
 src/about/about.rst              | 2 +-
 src/conf.py                      | 5 ++++-
 src/examples/example_02.rst      | 2 +-
 4 files changed, 7 insertions(+), 4 deletions(-)

diff --git a/src/_templates/sidebar-home.html b/src/_templates/sidebar-home.html
index 9e32550a..5cd9e993 100644
--- a/src/_templates/sidebar-home.html
+++ b/src/_templates/sidebar-home.html
@@ -2,7 +2,7 @@
     re2c-{{ version }}
 </div>
 
-<h3>Sitemap</h3>
+<h3>Documentation</h3>
 {{ toctree(includehidden=True, maxdepth=1) }}
 
 <h3>Community</h3>
diff --git a/src/about/about.rst b/src/about/about.rst
index 38156326..ccba659a 100644
--- a/src/about/about.rst
+++ b/src/about/about.rst
@@ -10,7 +10,7 @@ Authors
 
 Originally written by Peter Bumbulis (peter@csg.uwaterloo.ca)
 and described in research article
-`"RE2C: a more versatile scanner generator" <1994_bumbulis_cowan_re2c_a_more_versatile_scanner_generator.pdf>`_
+:download:`"RE2C: a more versatile scanner generator" <1994_bumbulis_cowan_re2c_a_more_versatile_scanner_generator.pdf>`
 by Peter Bumbulis, Donald D. Cowan, 1994,
 ACM Letters on Programming Languages and Systems (LOPLAS).
 
diff --git a/src/conf.py b/src/conf.py
index 3bcdc888..71de36e3 100644
--- a/src/conf.py
+++ b/src/conf.py
@@ -180,7 +180,10 @@ html_static_path = ['_static']
 # Add any extra paths that contain custom files (such as robots.txt or
 # .htaccess) here, relative to this directory. These files are copied
 # directly to the root of the documentation.
-html_extra_path = ['CNAME', '.nojekyll']
+html_extra_path = [
+    'CNAME',
+    '.nojekyll'
+]
 
 # If not '', a 'Last updated on:' timestamp is inserted at every page bottom,
 # using the given strftime format.
diff --git a/src/examples/example_02.rst b/src/examples/example_02.rst
index 60b03c5a..d0677349 100644
--- a/src/examples/example_02.rst
+++ b/src/examples/example_02.rst
@@ -23,7 +23,7 @@ If the check fails, lexer calls ``YYFILL(n)``, which can either supply at least
 
 For those interested in the internal re2c algorithm used to determine checkpoints,
 here is a quote from the original paper
-`"RE2C: a more versatile scanner generator" <../about/1994_bumbulis_cowan_re2c_a_more_versatile_scanner_generator.pdf>`_
+:download:`"RE2C: a more versatile scanner generator" <../about/1994_bumbulis_cowan_re2c_a_more_versatile_scanner_generator.pdf>`
 by Peter Bumbulis, Donald D. Cowan, 1994, ACM Letters on Programming Languages and Systems (LOPLAS):
 
     *A set of key states can be determined by discovering the strongly-connected components (SCCs) of the
-- 
2.40.0