Skip to content

Commit aa94aad

Browse files
authored
Update image links (#84)
* add /docs in front of other * add /docs to images
1 parent e237402 commit aa94aad

File tree

9 files changed

+10
-10
lines changed

9 files changed

+10
-10
lines changed

.CONTRIBUTING.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ All images intended for display on the website should be in `.webp` format. You
195195
To add an image to your page, you should have [alt text](https://developers.google.com/style/images#alt-text) and use the following syntax:
196196
197197
```markdown
198-
![Alt text goes here](/images/<subdirectory>/<image-file-name>.webp)
198+
![Alt text goes here](/docs/images/<subdirectory>/<image-file-name>.webp)
199199
```
200200
201201
See the [style guide](https://github.com/papermoonio/documentation-style-guide/blob/main/style-guide.md#screenshots) for more tips on handling images.

build/applications/queries/overview.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Wormhole Queries offers on-demand access to Guardian-attested on-chain data. The
1616

1717
The general overview of a query's flow is as follows: an off-chain process sends HTTPS query requests to a Query Proxy, which validates and forwards them to the Guardians; these Guardians independently validate, sign, and return the response, with the entire process typically taking less than a second.
1818

19-
![The architecture flow of a query](/images/build/applications/queries/overview/overview-1.webp)
19+
![The architecture flow of a query](/docs/images/build/applications/queries/overview/overview-1.webp)
2020

2121
The step-by-step flow of a query is as follows:
2222

build/contract-integrations/wormhole-relayers.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Before getting started, it's important to note that the Wormhole-deployed relaye
1818
To interact with the Wormhole relayer, you'll need to create contracts on the source and target chains to handle the sending and receiving of messages. No off-chain logic needs to be implemented to take advantage of Wormhole-powered relaying.
1919

2020
<figure markdown="span">
21-
![Wormhole Relayer](/images/build/contract-integrations/wormhole-relayers/relayer-1.webp)
21+
![Wormhole Relayer](/docs/images/build/contract-integrations/wormhole-relayers/relayer-1.webp)
2222
<figcaption>The components outlined in blue must be implemented.</figcaption>
2323
</figure>
2424

build/toolkit/tilt.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -86,7 +86,7 @@ If you're using Linux with a windows manager, it's highly recommended that you i
8686

8787
If you're using Docker Desktop, you can enable Kubernetes by going into Settings > Kubernetes and checking the checkbox to enable Kubernetes.
8888

89-
![Enable Kubernetes](/images/build/toolkit/tilt/tilt-1.webp)
89+
![Enable Kubernetes](/docs/images/build/toolkit/tilt/tilt-1.webp)
9090

9191
#### Minikube
9292

infrastructure/relayers/run-relayer.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ This guide teaches you how to set up and configure a custom relayer for efficien
2020
To start building a custom relayer, it's essential to grasp the components you'll be managing as part of your relaying service. Your relayer must be capable of retrieving and delivering VAAs.
2121

2222
<figure markdown="span">
23-
![Custom relayer](/images/infrastructure/relayers/run-relayer/relayer-1.webp)
23+
![Custom relayer](/docs/images/infrastructure/relayers/run-relayer/relayer-1.webp)
2424
<figcaption>The off-chain components outlined in blue must be implemented.</figcaption>
2525
</figure>
2626

learn/fundamentals/architecture.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ description: Overview of Wormhole's architecture, detailing key on-chain and off
99

1010
Wormhole has several noteworthy components. Before discussing each component in depth, this page will provide an overview of how the major pieces fit together.
1111

12-
![Wormhole architecture detailed diagram: source to target chain communication.](/images/learn/fundamentals/architecture/architecture-1.webp)
12+
![Wormhole architecture detailed diagram: source to target chain communication.](/docs/images/learn/fundamentals/architecture/architecture-1.webp)
1313

1414
## On-Chain Components
1515

learn/fundamentals/introduction.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ Wormhole addresses this problem by providing a _generic message-passing_ protoco
1111

1212
Wormhole is distinguished by its focus on robust security, scalability, and transparency. The protocol is supported by a decentralized network of validators that ensure the integrity of every cross-chain transaction. This, combined with Wormhole’s proven performance in real-world applications, gives developers a dependable platform to create and scale multichain applications confidently.
1313

14-
![Message-passing process in the Wormhole protocol](/images/learn/fundamentals/introduction/introduction-1.webp)
14+
![Message-passing process in the Wormhole protocol](/docs/images/learn/fundamentals/introduction/introduction-1.webp)
1515

1616
!!! note
1717
The above is an oversimplified illustration of the protocol; details about the architecture and components are available on the [architecture page](/docs/learn/fundamentals/architecture/){target=\_blank}.

learn/messaging/native-token-transfers/architecture.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Transceivers can be defined independently of the Wormhole core and modified to s
2727
- `sendMessage` - this external function sends messages to a specified recipient chain. It encodes the token transfer details into a message format recognized by the system
2828
- `quoteDeliveryPrice` - provides an estimation of the cost associated with delivering a message to a target chain and gauges transaction fees
2929

30-
![NTT architecture diagram](/images/learn/messaging/native-token-transfers/architecture/architecture-1.webp)
30+
![NTT architecture diagram](/docs/images/learn/messaging/native-token-transfers/architecture/architecture-1.webp)
3131

3232
!!! note
3333
[Learn more](/docs/learn/messaging/native-token-transfers/architecture/#lifecycle-of-a-message){target=\_blank} about the architecture of Native Token Transfers message lifecycles.
@@ -39,7 +39,7 @@ The NTT framework supports advanced features such as custom transceivers for spe
3939

4040
NTT has the flexibility to support custom message verification in addition to Wormhole Guardian message verification. Custom verifiers are implemented as transceiver contracts and can be protocol-specific or provided by other third-party attesters. Protocols can also configure the threshold of attestations required to mark a token transfer as valid — for example, 2/2, 2/3, 3/5.
4141

42-
![Custom Attestation with NTT diagram](/images/learn/messaging/native-token-transfers/architecture/architecture-2.webp)
42+
![Custom Attestation with NTT diagram](/docs/images/learn/messaging/native-token-transfers/architecture/architecture-2.webp)
4343

4444
The verifier performs checks based on predefined criteria and issues approval for transactions that meet these requirements. This approval is incorporated into the Wormhole message, ensuring that only transactions verified by both the Wormhole Guardian Network and the additional verifier are processed. The model includes an extra verifier in the bridging process, enhancing security and providing an added assurance of transaction integrity.
4545

tutorials/messaging/cross-chain-contracts.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ We'll interact with two key Wormhole components: the [Wormhole relayer](/docs/le
2121

2222
Additionally, we'll rely on the Wormhole relayer to automatically determine cross-chain transaction costs and facilitate payments. This feature simplifies cross-chain development by allowing you to specify only the target chain and the message. The relayer handles the rest, ensuring that the message is transmitted with the appropriate fee.
2323

24-
![Wormhole architecture detailed diagram: source to target chain communication.](/images/learn/fundamentals/architecture/architecture-1.webp)
24+
![Wormhole architecture detailed diagram: source to target chain communication.](/docs/images/learn/fundamentals/architecture/architecture-1.webp)
2525

2626
## Prerequisites
2727

0 commit comments

Comments
 (0)