Merge pull request #79048 from sepTN/its-platform-not-plafrom
Fix a typo in the TLSOptions documentation
This commit is contained in:
commit
ce32fe974e
2 changed files with 5 additions and 5 deletions
|
@ -29,15 +29,15 @@
|
|||
<description>
|
||||
Creates a TLS client configuration which validates certificates and their common names (fully qualified domain names).
|
||||
You can specify a custom [param trusted_chain] of certification authorities (the default CA list will be used if [code]null[/code]), and optionally provide a [param common_name_override] if you expect the certificate to have a common name other then the server FQDN.
|
||||
Note: On the Web plafrom, TLS verification is always enforced against the CA list of the web browser. This is considered a security feature.
|
||||
[b]Note:[/b] On the Web platform, TLS verification is always enforced against the CA list of the web browser. This is considered a security feature.
|
||||
</description>
|
||||
</method>
|
||||
<method name="client_unsafe" qualifiers="static">
|
||||
<return type="TLSOptions" />
|
||||
<param index="0" name="trusted_chain" type="X509Certificate" default="null" />
|
||||
<description>
|
||||
Creates an [b]unsafe[/b] TLS client configuration where certificate validation is optional. You can optionally provide a valid [param trusted_chain], but the common name of the certififcates will never be checked. Using this configuration for purposes other than testing [b]is not recommended[/b].
|
||||
Note: On the Web plafrom, TLS verification is always enforced against the CA list of the web browser. This is considered a security feature.
|
||||
Creates an [b]unsafe[/b] TLS client configuration where certificate validation is optional. You can optionally provide a valid [param trusted_chain], but the common name of the certificates will never be checked. Using this configuration for purposes other than testing [b]is not recommended[/b].
|
||||
[b]Note:[/b] On the Web platform, TLS verification is always enforced against the CA list of the web browser. This is considered a security feature.
|
||||
</description>
|
||||
</method>
|
||||
<method name="server" qualifiers="static">
|
||||
|
@ -46,7 +46,7 @@
|
|||
<param index="1" name="certificate" type="X509Certificate" />
|
||||
<description>
|
||||
Creates a TLS server configuration using the provided [param key] and [param certificate].
|
||||
Note: The [param certificate] should include the full certificate chain up to the signing CA (certificates file can be concatenated using a general purpose text editor).
|
||||
[b]Note:[/b] The [param certificate] should include the full certificate chain up to the signing CA (certificates file can be concatenated using a general purpose text editor).
|
||||
</description>
|
||||
</method>
|
||||
</methods>
|
||||
|
|
|
@ -536,7 +536,7 @@ const GodotDisplay = {
|
|||
}
|
||||
navigator.clipboard.writeText(text).catch(function (e) {
|
||||
// Setting OS clipboard is only possible from an input callback.
|
||||
GodotRuntime.error('Setting OS clipboard is only possible from an input callback for the Web plafrom. Exception:', e);
|
||||
GodotRuntime.error('Setting OS clipboard is only possible from an input callback for the Web platform. Exception:', e);
|
||||
});
|
||||
return 0;
|
||||
},
|
||||
|
|
Loading…
Reference in a new issue