From bbf9e6011d76b2465d8f5e19de570048fff37da8 Mon Sep 17 00:00:00 2001 From: Marius Kleidl Date: Tue, 13 Jun 2023 16:34:47 +0200 Subject: [PATCH] docs: Minor whitespace improvements --- docs/usage-binary.md | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/docs/usage-binary.md b/docs/usage-binary.md index f06e560..8baa581 100644 --- a/docs/usage-binary.md +++ b/docs/usage-binary.md @@ -67,7 +67,7 @@ $ tusd -gcs-bucket=my-test-bucket.com [tusd] Using /metrics as the metrics path. ``` -Tusd also supports storing uploads on Microsoft Azure Blob Storage. In order to enable this feature, provide the +Tusd also supports storing uploads on Microsoft Azure Blob Storage. In order to enable this feature, provide the corresponding access credentials using environment variables. ``` @@ -111,7 +111,7 @@ Using endpoint https://xxxxx.blob.core.windows.net [tusd] Using /metrics as the metrics path. ``` -TLS support for HTTPS connections can be enabled by supplying a certificate and private key. Note that the certificate file must include the entire chain of certificates up to the CA certificate. The default configuration supports TLSv1.2 and TLSv1.3. It is possible to use only TLSv1.3 with `-tls-mode=tls13`; alternately, it is possible to disable TLSv1.3 and use only 256-bit AES ciphersuites with `-tls-mode=tls12-strong`. The following example generates a self-signed certificate for `localhost` and then uses it to serve files on the loopback address; that this certificate is not appropriate for production use. Note also that the key file must not be encrypted/require a passphrase. +TLS support for HTTPS connections can be enabled by supplying a certificate and private key. Note that the certificate file must include the entire chain of certificates up to the CA certificate. The default configuration supports TLSv1.2 and TLSv1.3. It is possible to use only TLSv1.3 with `-tls-mode=tls13`; alternately, it is possible to disable TLSv1.3 and use only 256-bit AES ciphersuites with `-tls-mode=tls12-strong`. The following example generates a self-signed certificate for `localhost` and then uses it to serve files on the loopback address; that this certificate is not appropriate for production use. Note also that the key file must not be encrypted/require a passphrase. ``` $ openssl req -x509 -new -newkey rsa:4096 -nodes -sha256 -days 3650 -keyout localhost.key -out localhost.pem -subj "/CN=localhost" @@ -130,7 +130,6 @@ $ tusd -upload-dir=./data -host=127.0.0.1 -port=8443 -tls-certificate=localhost. [tusd] You can now upload files to: https://127.0.0.1:8443/files/ ``` - Besides these simple examples, tusd can be easily configured using a variety of command line options: