You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficserver.apache.org by zw...@apache.org on 2019/11/20 06:21:32 UTC

[trafficserver] 02/03: Fixes misc. spelling and whitespace

This is an automated email from the ASF dual-hosted git repository.

zwoop pushed a commit to branch CleanupWS9.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git

commit 7c4d9be38970d6e1a6d8f9ab652587e4d0331726
Author: Randall Meyer <rr...@apache.org>
AuthorDate: Fri Nov 1 16:09:39 2019 -0700

    Fixes misc. spelling and whitespace
    
    (cherry picked from commit 6ef4db40f24f707bbd05d5ef05cb2e4b5d35f91b)
    
     Conflicts:
    	doc/release-notes/upgrading.en.rst
    	doc/release-notes/whats-new.en.rst
---
 doc/admin-guide/files/records.config.en.rst | 20 ++++++++++----------
 1 file changed, 10 insertions(+), 10 deletions(-)

diff --git a/doc/admin-guide/files/records.config.en.rst b/doc/admin-guide/files/records.config.en.rst
index 56a5645..e710de9 100644
--- a/doc/admin-guide/files/records.config.en.rst
+++ b/doc/admin-guide/files/records.config.en.rst
@@ -3473,21 +3473,21 @@ Client-Related Configuration
 
    Indicate how the SNI value for the TLS connection to the origin is selected.  By default it is
    `host` which means the host header field value is used for the SNI.  If `remap` is specified, the
-   remapped origin name is used for the SNI value.  If `verify_with_name_source` is specified, the 
-   SNI will be the host header value and the name to check in the server certificate will be the 
+   remapped origin name is used for the SNI value.  If `verify_with_name_source` is specified, the
+   SNI will be the host header value and the name to check in the server certificate will be the
    remap header value.
-   We have two names that could be used in the transaction host header and the SNI value to the 
-   origin. These could be the host header from the client or the remap host name. Unless you have 
+   We have two names that could be used in the transaction host header and the SNI value to the
+   origin. These could be the host header from the client or the remap host name. Unless you have
    pristine host header enabled, these are likely the same values.
    If sni_policy = host, both the sni and the host header to origin will be the same.
-   If sni_policy = remap, the sni value with be the remap host name and the host header will be the 
+   If sni_policy = remap, the sni value with be the remap host name and the host header will be the
    host header from the client.
-   In addition, We may want to set the SNI and host headers the same (makes some common web servers 
-   happy), but the certificate served by the origin may have a name that corresponds to the remap 
-   name. So instead of using the SNI name for the name check, we may want to use the remap name. 
-   So if sni_policy = verify_with_name_source, the sni will be the host header value and the name to 
+   In addition, We may want to set the SNI and host headers the same (makes some common web servers
+   happy), but the certificate served by the origin may have a name that corresponds to the remap
+   name. So instead of using the SNI name for the name check, we may want to use the remap name.
+   So if sni_policy = verify_with_name_source, the sni will be the host header value and the name to
    check in the server certificate will be the remap header value.
-   
+
 
 .. ts:cv:: CONFIG proxy.config.ssl.client.TLSv1 INT 0