@@ -507,13 +507,13 @@ def self.result2string(code) #:nodoc:
507
507
# talking over the public internet), you need to set :tls_options
508
508
# something like this...
509
509
#
510
- # Net::LDAP.new(
511
- # # ... set host, bind dn, etc ...
512
- # encryption: {
513
- # method: :simple_tls,
514
- # tls_options: OpenSSL::SSL::SSLContext::DEFAULT_PARAMS,
515
- # }
516
- # )
510
+ # Net::LDAP.new(
511
+ # # ... set host, bind dn, etc ...
512
+ # encryption: {
513
+ # method: :simple_tls,
514
+ # tls_options: OpenSSL::SSL::SSLContext::DEFAULT_PARAMS,
515
+ # }
516
+ # )
517
517
#
518
518
# The above will use the operating system-provided store of CA
519
519
# certificates to validate your LDAP server's cert.
@@ -528,17 +528,16 @@ def self.result2string(code) #:nodoc:
528
528
# `update-ca-certificates`), then the cert should pass validation.
529
529
# To ignore the OS's CA store, put your CA in a PEM-encoded file and...
530
530
#
531
- # encryption: {
532
- # method: :simple_tls,
533
- # tls_options: { ca_file: '/path/to/my-little-ca.pem',
534
- # ssl_version: 'TLSv1_1' },
535
- # }
531
+ # encryption: {
532
+ # method: :simple_tls,
533
+ # tls_options: { ca_file: '/path/to/my-little-ca.pem',
534
+ # ssl_version: 'TLSv1_1' },
535
+ # }
536
536
#
537
537
# As you might guess, the above example also fails the connection
538
538
# if the client can't negotiate TLS v1.1.
539
- # tls_options is ultimately passed to OpenSSL::SSL::SSLContext#set_params
540
- # For more details, see
541
- # http://ruby-doc.org/stdlib-2.0.0/libdoc/openssl/rdoc/OpenSSL/SSL/SSLContext.html
539
+ # tls_options is ultimately passed to
540
+ # +OpenSSL::SSL::SSLContext#set_params+, For more details, see http://ruby-doc.org/stdlib-2.0.0/libdoc/openssl/rdoc/OpenSSL/SSL/SSLContext.html
542
541
#
543
542
# Instantiating a Net::LDAP object does <i>not</i> result in network
544
543
# traffic to the LDAP server. It simply stores the connection and binding
0 commit comments