Skip to content

Commit 223370e

Browse files
authored
Merge pull request jsonwebtoken#447 from carlos-menezes/patch-1
Fix hyperlinks in Introduction page
2 parents 7620e8a + b3e5f02 commit 223370e

File tree

2 files changed

+3
-3
lines changed

2 files changed

+3
-3
lines changed

views/website/introduction.pug

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,8 @@ block content
3939
img(src='/img/logo.svg').logo
4040

4141
nav.menu
42-
a(href='/#debugger').scrollto Debugger
43-
a(href='/#libraries').scrollto Libraries
42+
a(href='/#debugger-io').scrollto Debugger
43+
a(href='/#libraries-io').scrollto Libraries
4444
a(href='/introduction').active Introduction
4545
a(href='https://community.auth0.com', target='_blank') Ask
4646
a(href='http://swag.auth0.com/', target='_blank') Get a T-shirt!

views/website/md/introduction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ The output is three Base64-URL strings separated by dots that can be easily pass
8888
The following shows a JWT that has the previous header and payload encoded, and it is signed with a secret.
8989
![Encoded JWT](https://cdn.auth0.com/content/jwt/encoded-jwt3.png)
9090

91-
If you want to play with JWT and put these concepts into practice, you can use [jwt.io Debugger](http://jwt.io) to decode, verify, and generate JWTs.
91+
If you want to play with JWT and put these concepts into practice, you can use [jwt.io Debugger](https://jwt.io/#debugger-io) to decode, verify, and generate JWTs.
9292

9393
![JWT.io Debugger](https://cdn.auth0.com/blog/legacy-app-auth/legacy-app-auth-5.png)
9494

0 commit comments

Comments
 (0)