8000 Docs: Adjust descriptions of --ssl.keyfile startup option (#21701) · solisoft/arangodb@3b6e143 · GitHub
[go: up one dir, main page]

Skip to content

Commit 3b6e143

Browse files
authored
Docs: Adjust descriptions of --ssl.keyfile startup option (arangodb#21701)
1 parent 9ee3926 commit 3b6e143

File tree

1 file changed

+9
-6
lines changed

1 file changed

+9
-6
lines changed

arangod/GeneralServer/SslServerFeature.cpp

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -98,12 +98,15 @@ you want clients to be able to connect without specific certificates.
9898
The certificates in the file must be PEM-formatted.)");
9999

100100
options
101-
->addOption("--ssl.keyfile", "The keyfile used for secure connections.",
101+
->addOption("--ssl.keyfile",
102+
"The path to a PEM file (server certificate + private key) "
103+
"to use for secure connections.",
102104
new StringParameter(&_keyfile))
103-
.setLongDescription(R"(If you use SSL-encryption by binding the server to
104-
an SSL endpoint (e.g. `--server.endpoint ssl://127.0.0.1:8529`), you must use
105-
this option to specify the filename of the server's private key. The file must
106-
be PEM-formatted and contain both, the certificate and the server's private key.
105+
.setLongDescription(R"(If you use TLS/SSL encryption by binding the
106+
server to an `ssl://` endpoint (e.g. `--server.endpoint ssl://127.0.0.1:8529`),
107+
you must use this option to specify the filename of the server's private key.
108+
The file must be PEM-formatted and contain both, the certificate and the
109+
server's private key.
107110
108111
You can generate a keyfile using OpenSSL as follows:
109112
@@ -130,7 +133,7 @@ cat server.crt server.key > server.pem
130133
You may use certificates issued by a Certificate Authority or self-signed
131134
certificates. Self-signed certificates can be created by a tool of your
132135
choice. When using OpenSSL for creating the self-signed certificate, the
133-
following commands should create a valid keyfile:
136+
above commands should create a valid keyfile with a structure like this:
134137
135138
```
136139
-----BEGIN CERTIFICATE-----

0 commit comments

Comments
 (0)
0