From 59599dc5194e7b03a2384d835957bbb741835025 Mon Sep 17 00:00:00 2001 From: Evan Date: Fri, 30 Aug 2013 23:52:37 -0400 Subject: [PATCH 1/2] Update README.md add README version change -F to -d for consistence add -v to show SSL handshake message --- README.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 687e48ced..84cd8a4c1 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,5 @@ # etcd +README version 0.1 [![Build Status](https://travis-ci.org/coreos/etcd.png)](https://travis-ci.org/coreos/etcd) @@ -272,7 +273,7 @@ Next, lets configure etcd to use this keypair: You can now test the configuration using https: ```sh -curl --cacert fixtures/ca/ca.crt https://127.0.0.1:4001/v1/keys/foo -F value=bar +curl --cacert fixtures/ca/ca.crt https://127.0.0.1:4001/v1/keys/foo -d value=bar -v ``` You should be able to see the handshake succeed. @@ -302,7 +303,7 @@ We can also do authentication using CA certs. The clients will provide their cer Try the same request to this server: ```sh -curl --cacert fixtures/ca/ca.crt https://127.0.0.1:4001/v1/keys/foo -F value=bar +curl --cacert fixtures/ca/ca.crt https://127.0.0.1:4001/v1/keys/foo -d value=bar -v ``` The request should be rejected by the server. From a22bd2b8b27b095b3d19f7a62f4fdcd93cf95fb2 Mon Sep 17 00:00:00 2001 From: Evan Date: Sun, 1 Sep 2013 17:38:41 -0400 Subject: [PATCH 2/2] full version for readme --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 84cd8a4c1..832815ee0 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ # etcd -README version 0.1 +README version 0.1.0 [![Build Status](https://travis-ci.org/coreos/etcd.png)](https://travis-ci.org/coreos/etcd)