Repository: trafficserver
Updated Branches:
  refs/heads/master 731d35d38 -> ba1c77c26


docs: Minor edits

This closes #89


Project: http://git-wip-us.apache.org/repos/asf/trafficserver/repo
Commit: http://git-wip-us.apache.org/repos/asf/trafficserver/commit/ba1c77c2
Tree: http://git-wip-us.apache.org/repos/asf/trafficserver/tree/ba1c77c2
Diff: http://git-wip-us.apache.org/repos/asf/trafficserver/diff/ba1c77c2

Branch: refs/heads/master
Commit: ba1c77c26e485fc8307e9d7a869fa37adb5abcb2
Parents: 731d35d
Author: Jack Bates <j...@nottheoilrig.com>
Authored: Thu May 22 09:42:53 2014 -0700
Committer: James Peach <jpe...@apache.org>
Committed: Fri Aug 22 12:26:41 2014 -0700

----------------------------------------------------------------------
 doc/reference/api/TSLifecycleHookAdd.en.rst        | 17 ++++++++++-------
 .../configuration/ssl_multicert.config.en.rst      | 10 +++++-----
 2 files changed, 15 insertions(+), 12 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/trafficserver/blob/ba1c77c2/doc/reference/api/TSLifecycleHookAdd.en.rst
----------------------------------------------------------------------
diff --git a/doc/reference/api/TSLifecycleHookAdd.en.rst 
b/doc/reference/api/TSLifecycleHookAdd.en.rst
index 3f58f5c..ae18207 100644
--- a/doc/reference/api/TSLifecycleHookAdd.en.rst
+++ b/doc/reference/api/TSLifecycleHookAdd.en.rst
@@ -36,31 +36,34 @@ Description
 based on the Traffic Server process, not on any specific transaction or 
session. These will typically be called only
 once during the execution of the Traffic Server process and therefore should 
be added in :func:`TSPluginInit` (which could itself be considered a lifecyle 
hook). Unlike other hooks, lifecycle hooks may not have a well defined ordering 
and use of them should not assume that one of the hooks is always called before 
another unless specifically mentioned.
 
-`TS_LIFECYCLE_PORTS_INITIALIZED_HOOK`
+.. c:var:: TS_LIFECYCLE_PORTS_INITIALIZED_HOOK
+
    Called after the :ts:cv:`proxy server port 
<proxy.config.http.server_ports>` data structures have been initialized
    but before connections are accepted on those ports. The sockets 
corresponding to the ports may or may not be open
    depending on how the :program:`traffic_server` process was invoked. Other 
API functions that depend on server ports should be
    called from this hook and not :func:`TSPluginInit`.
 
-   Invoked with the event `TS_EVENT_LIFECYCLE_PORTS_INITIALIZED` and `NULL` 
data.
+   Invoked with the event :c:data:`TS_EVENT_LIFECYCLE_PORTS_INITIALIZED` and 
:c:data:`NULL` data.
+
+.. c:var:: TS_LIFECYCLE_PORTS_READY_HOOK
 
-`TS_LIFECYCLE_PORTS_READY_HOOK`
    Called after enabling connections on the proxy server ports. Because 
Traffic Server is threaded this may or may not
    be called before any connections are accepted. The hook code may assume 
that any connection to Traffic Server started
    after this hook is called will be accepted by Traffic Server, making this a 
convenient place to signal external
    processes of that.
 
-   Invoked with the event `TS_EVENT_LIFECYCLE_PORTS_READY` and `NULL` data.
+   Invoked with the event :c:data:`TS_EVENT_LIFECYCLE_PORTS_READY` and 
:c:data:`NULL` data.
+
+.. c:var:: TS_LIFECYCLE_CACHE_READY_HOOK
 
-`TS_LIFECYCLE_CACHE_READY_HOOK`
    Called after Traffic Server cache initialization has finished.
 
-   Invoked with the event `TS_EVENT_LIFECYCLE_CACHE_READY` and `NULL` data.
+   Invoked with the event :c:data:`TS_EVENT_LIFECYCLE_CACHE_READY` and 
:c:data:`NULL` data.
 
 Ordering
 ========
 
-`TS_LIFECYCLE_PORTS_INITIALIZED_HOOK` will always be called before 
`TS_LIFECYCLE_PORTS_READY_HOOK`.
+:c:data:`TS_LIFECYCLE_PORTS_INITIALIZED_HOOK` will always be called before 
:c:data:`TS_LIFECYCLE_PORTS_READY_HOOK`.
 
 Examples
 ========

http://git-wip-us.apache.org/repos/asf/trafficserver/blob/ba1c77c2/doc/reference/configuration/ssl_multicert.config.en.rst
----------------------------------------------------------------------
diff --git a/doc/reference/configuration/ssl_multicert.config.en.rst 
b/doc/reference/configuration/ssl_multicert.config.en.rst
index f044868..8bdeeb8 100644
--- a/doc/reference/configuration/ssl_multicert.config.en.rst
+++ b/doc/reference/configuration/ssl_multicert.config.en.rst
@@ -47,7 +47,7 @@ Each :file:`ssl_multicert.config` line consists of a sequence 
of
 particular SSL certificate.
 
 ssl_cert_name=FILENAME[,FILENAME ...]
-  The name of the file containing the TLS certificate. `FILENAME`
+  The name of the file containing the TLS certificate. *FILENAME*
   is located relative to the directory specified by the
   :ts:cv:`proxy.config.ssl.server.cert.path` configuration variable.
   It may also include the intermediate CA certificates, sorted from
@@ -70,7 +70,7 @@ ssl_cert_name=FILENAME[,FILENAME ...]
 dest_ip=ADDRESS (optional)
   The IP (v4 or v6) address that the certificate should be presented
   on. This is now only used as a fallback in the case that the TLS
-  SubjectNameIndication extension is not supported. If `ADDRESS` is
+  SubjectNameIndication extension is not supported. If *ADDRESS* is
   `*`, the corresponding certificate will be used as the global
   default fallback if no other match can be made. The address may
   contain a port specifier, in which case the corresponding certificate
@@ -81,13 +81,13 @@ dest_ip=ADDRESS (optional)
 ssl_key_name=FILENAME (optional)
   The name of the file containing the private key for this certificate.
   If the key is contained in the certificate file, this field can
-  be omitted, otherwise `FILENAME` is resolved relative to the
+  be omitted, otherwise *FILENAME* is resolved relative to the
   :ts:cv:`proxy.config.ssl.server.private_key.path` configuration variable.
 
 ssl_ca_name=FILENAME (optional)
   If the certificate is issued by an authority that is not in the
   system CA bundle, additional certificates may be needed to validate
-  the certificate chain. `FILENAME` is resolved relative to the
+  the certificate chain. *FILENAME* is resolved relative to the
   :ts:cv:`proxy.config.ssl.CA.cert.path` configuration variable.
 
 ssl_ticket_enabled=1|0 (optional)
@@ -97,7 +97,7 @@ ssl_ticket_enabled=1|0 (optional)
 
 ticket_key_name=FILENAME (optional)
   The name of session ticket key file which contains a secret for
-  encrypting and decrypting TLS session tickets. If `FILENAME` is
+  encrypting and decrypting TLS session tickets. If *FILENAME* is
   not an absolute path, it is resolved relative to the
   :ts:cv:`proxy.config.ssl.server.cert.path` configuration variable.
   This option has no effect if session tickets are disabled by the

Reply via email to