You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@couchdb.apache.org by dc...@apache.org on 2014/08/14 01:26:33 UTC
[45/50] couchdb commit: updated refs/heads/1.6.x to eeb31cb
local.ini must be comments only
Project: http://git-wip-us.apache.org/repos/asf/couchdb/repo
Commit: http://git-wip-us.apache.org/repos/asf/couchdb/commit/c9397ec0
Tree: http://git-wip-us.apache.org/repos/asf/couchdb/tree/c9397ec0
Diff: http://git-wip-us.apache.org/repos/asf/couchdb/diff/c9397ec0
Branch: refs/heads/1.6.x
Commit: c9397ec0a01667f49bb22c97fb21f52c437cf9e5
Parents: d43f69d
Author: Robert Newson <rn...@apache.org>
Authored: Sun Jul 6 14:29:25 2014 +0100
Committer: Robert Newson <rn...@apache.org>
Committed: Sun Jul 6 14:35:16 2014 +0100
----------------------------------------------------------------------
etc/couchdb/local.ini | 6 +++---
1 file changed, 3 insertions(+), 3 deletions(-)
----------------------------------------------------------------------
http://git-wip-us.apache.org/repos/asf/couchdb/blob/c9397ec0/etc/couchdb/local.ini
----------------------------------------------------------------------
diff --git a/etc/couchdb/local.ini b/etc/couchdb/local.ini
index fef2508..b0378ea 100644
--- a/etc/couchdb/local.ini
+++ b/etc/couchdb/local.ini
@@ -65,9 +65,9 @@
;key_file = /full/path/to/server_key.pem
;password = somepassword
; set to true to validate peer certificates
-verify_ssl_certificates = false
+;verify_ssl_certificates = false
; Set to true to fail if the client does not send a certificate. Only used if verify_ssl_certificates is true.
-fail_if_no_peer_cert = false
+;fail_if_no_peer_cert = false
; Path to file containing PEM encoded CA certificates (trusted
; certificates used for verifying a peer certificate). May be omitted if
; you do not want to verify the peer.
@@ -76,7 +76,7 @@ fail_if_no_peer_cert = false
; verification fun will be used.
;verify_fun = {Module, VerifyFun}
; maximum peer certificate depth
-ssl_certificate_max_depth = 1
+;ssl_certificate_max_depth = 1
;
; Reject renegotiations that do not live up to RFC 5746.
;secure_renegotiate = true