Skip to content

Commit 49b788b

Browse files
committed
Remove monospace formatting inside link text
AsciiDocNet incorrectly parses this
1 parent e241d4d commit 49b788b

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

docs/client-concepts/certificates/working-with-certificates.asciidoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -80,7 +80,7 @@ public class AllowAllCertificatesCluster : SslAndKpiXPackCluster
8080
If your client application has access to the public CA certificate locally, Elasticsearch.NET and NEST ship with some handy helpers
8181
that can assert that a certificate the server presents is one that came from the local CA.
8282

83-
If you use X-Pack's {ref_current}/certutil.html`certutil` tool] to generate SSL certificates, the generated node certificate
83+
If you use X-Pack's {ref_current}/certutil.html[certutil tool] to generate SSL certificates, the generated node certificate
8484
does not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use`CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
8585
the certificate the server presented was generated using it
8686

src/Tests/ClientConcepts/Certificates/WorkingWithCertificates.doc.cs

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -110,7 +110,7 @@ public AllowAllSslCertificatesApiTests(AllowAllCertificatesCluster cluster, Endp
110110
* If your client application has access to the public CA certificate locally, Elasticsearch.NET and NEST ship with some handy helpers
111111
* that can assert that a certificate the server presents is one that came from the local CA.
112112
*
113-
* If you use X-Pack's {ref_current}/certutil.html[`certutil` tool] to generate SSL certificates, the generated node certificate
113+
* If you use X-Pack's {ref_current}/certutil.html[certutil tool] to generate SSL certificates, the generated node certificate
114114
* does not include the CA in the certificate chain, in order to cut down on SSL handshake size. In those case you can use
115115
* `CertificateValidations.AuthorityIsRoot` and pass it your local copy of the CA public key to assert that
116116
* the certificate the server presented was generated using it

0 commit comments

Comments
 (0)