krb5 commit: Minor rst markup fix

Zhanna A Tsitkova tsitkova at MIT.EDU
Mon Jul 2 14:05:23 EDT 2012


https://github.com/krb5/krb5/commit/e679fe0317623ced6901e20e5094e3fb7a69754e
commit e679fe0317623ced6901e20e5094e3fb7a69754e
Author: Zhanna Tsitkov <tsitkova at mit.edu>
Date:   Mon Jul 2 14:08:32 2012 -0400

    Minor rst markup fix

 doc/rst_source/krb_admins/conf_files/kdc_conf.rst  |    4 ++--
 doc/rst_source/krb_admins/conf_files/krb5_conf.rst |    6 +++---
 doc/rst_source/krb_admins/conf_ldap.rst            |    2 +-
 3 files changed, 6 insertions(+), 6 deletions(-)

diff --git a/doc/rst_source/krb_admins/conf_files/kdc_conf.rst b/doc/rst_source/krb_admins/conf_files/kdc_conf.rst
index 66f51dc..06d9213 100644
--- a/doc/rst_source/krb_admins/conf_files/kdc_conf.rst
+++ b/doc/rst_source/krb_admins/conf_files/kdc_conf.rst
@@ -492,7 +492,7 @@ PKINIT options
 
        [realms]
            EXAMPLE.COM = {
-               pkinit_anchors = FILE\:/usr/local/example.com.crt
+               pkinit_anchors = FILE:/usr/local/example.com.crt
            }
 
 2. generic value in the [kdcdefaults] section.
@@ -500,7 +500,7 @@ PKINIT options
     ::
 
        [kdcdefaults]
-           pkinit_anchors = DIR\:/usr/local/generic_trusted_cas/
+           pkinit_anchors = DIR:/usr/local/generic_trusted_cas/
 
 For information about the syntax of some of these options, see
 :ref:`Specifying PKINIT identity information <pkinit_identity>` in
diff --git a/doc/rst_source/krb_admins/conf_files/krb5_conf.rst b/doc/rst_source/krb_admins/conf_files/krb5_conf.rst
index 04d4d4d..e392c86 100644
--- a/doc/rst_source/krb_admins/conf_files/krb5_conf.rst
+++ b/doc/rst_source/krb_admins/conf_files/krb5_conf.rst
@@ -727,7 +727,7 @@ PKINIT options
 
        [libdefaults]
            EXAMPLE.COM = {
-               pkinit_anchors = FILE\:/usr/local/example.com.crt
+               pkinit_anchors = FILE:/usr/local/example.com.crt
            }
 
 2. realm-specific value in the [realms] section,
@@ -736,7 +736,7 @@ PKINIT options
 
        [realms]
            OTHERREALM.ORG = {
-               pkinit_anchors = FILE\:/usr/local/otherrealm.org.crt
+               pkinit_anchors = FILE:/usr/local/otherrealm.org.crt
            }
 
 3. generic value in the [libdefaults] section.
@@ -744,7 +744,7 @@ PKINIT options
     ::
 
        [libdefaults]
-           pkinit_anchors = DIR\:/usr/local/generic_trusted_cas/
+           pkinit_anchors = DIR:/usr/local/generic_trusted_cas/
 
 
 .. _pkinit_identity:
diff --git a/doc/rst_source/krb_admins/conf_ldap.rst b/doc/rst_source/krb_admins/conf_ldap.rst
index b59da28..8fe4767 100644
--- a/doc/rst_source/krb_admins/conf_ldap.rst
+++ b/doc/rst_source/krb_admins/conf_ldap.rst
@@ -5,7 +5,7 @@ Configuring Kerberos with OpenLDAP back-end
 
 1. Set up SSL on the OpenLDAP server and client to ensure secure
    communication when the KDC service and LDAP server are on different
-   machines.  ``ldapi\://`` can be used if the LDAP server and KDC
+   machines.  ``ldapi://`` can be used if the LDAP server and KDC
    service are running on the same machine.
 
    A. Setting up SSL on the OpenLDAP server:


More information about the cvs-krb5 mailing list