@@ -98,12 +98,15 @@ you want clients to be able to connect without specific certificates.
98
98
The certificates in the file must be PEM-formatted.)" );
99
99
100
100
options
101
- ->addOption (" --ssl.keyfile" , " The keyfile used for secure connections." ,
101
+ ->addOption (" --ssl.keyfile" ,
102
+ " The path to a PEM file (server certificate + private key) "
103
+ " to use for secure connections." ,
102
104
new StringParameter (&_keyfile))
103
- .setLongDescription (R"( If you use SSL-encryption by binding the server to
104
- an SSL endpoint (e.g. `--server.endpoint ssl://127.0.0.1:8529`), you must use
105
- this option to specify the filename of the server's private key. The file must
106
- be PEM-formatted and contain both, the certificate and the server's private key.
105
+ .setLongDescription (R"( If you use TLS/SSL encryption by binding the
106
+ server to an `ssl://` endpoint (e.g. `--server.endpoint ssl://127.0.0.1:8529`),
107
+ you must use this option to specify the filename of the server's private key.
108
+ The file must be PEM-formatted and contain both, the certificate and the
109
+ server's private key.
107
110
108
111
You can generate a keyfile using OpenSSL as follows:
109
112
@@ -130,7 +133,7 @@ cat server.crt server.key > server.pem
130
133
You may use certificates issued by a Certificate Authority or self-signed
131
134
certificates. Self-signed certificates can be created by a tool of your
132
135
choice. When using OpenSSL for creating the self-signed certificate, the
133
- following commands should create a valid keyfile:
136
+ above commands should create a valid keyfile with a structure like this :
134
137
135
138
```
136
139
-----BEGIN CERTIFICATE-----
0 commit comments