|
@@ -1,4 +1,5 @@
|
|
|
# etcd
|
|
# etcd
|
|
|
|
|
+README version 0.1
|
|
|
|
|
|
|
|
[](https://travis-ci.org/coreos/etcd)
|
|
[](https://travis-ci.org/coreos/etcd)
|
|
|
|
|
|
|
@@ -272,7 +273,7 @@ Next, lets configure etcd to use this keypair:
|
|
|
You can now test the configuration using https:
|
|
You can now test the configuration using https:
|
|
|
|
|
|
|
|
```sh
|
|
```sh
|
|
|
-curl --cacert fixtures/ca/ca.crt https://127.0.0.1:4001/v1/keys/foo -F value=bar
|
|
|
|
|
|
|
+curl --cacert fixtures/ca/ca.crt https://127.0.0.1:4001/v1/keys/foo -d value=bar -v
|
|
|
```
|
|
```
|
|
|
|
|
|
|
|
You should be able to see the handshake succeed.
|
|
You should be able to see the handshake succeed.
|
|
@@ -302,7 +303,7 @@ We can also do authentication using CA certs. The clients will provide their cer
|
|
|
Try the same request to this server:
|
|
Try the same request to this server:
|
|
|
|
|
|
|
|
```sh
|
|
```sh
|
|
|
-curl --cacert fixtures/ca/ca.crt https://127.0.0.1:4001/v1/keys/foo -F value=bar
|
|
|
|
|
|
|
+curl --cacert fixtures/ca/ca.crt https://127.0.0.1:4001/v1/keys/foo -d value=bar -v
|
|
|
```
|
|
```
|
|
|
|
|
|
|
|
The request should be rejected by the server.
|
|
The request should be rejected by the server.
|