Update manual pages

This commit is contained in:
Tatsuhiro Tsujikawa 2017-05-21 11:42:46 +09:00
parent 52a4d6ac31
commit b91e4e4df1
6 changed files with 68 additions and 16 deletions

View File

@ -1,6 +1,6 @@
.\" Man page generated from reStructuredText. .\" Man page generated from reStructuredText.
. .
.TH "H2LOAD" "1" "Apr 24, 2017" "1.22.0" "nghttp2" .TH "H2LOAD" "1" "May 21, 2017" "1.23.0-DEV" "nghttp2"
.SH NAME .SH NAME
h2load \- HTTP/2 benchmarking tool h2load \- HTTP/2 benchmarking tool
. .

View File

@ -1,6 +1,6 @@
.\" Man page generated from reStructuredText. .\" Man page generated from reStructuredText.
. .
.TH "NGHTTP" "1" "Apr 24, 2017" "1.22.0" "nghttp2" .TH "NGHTTP" "1" "May 21, 2017" "1.23.0-DEV" "nghttp2"
.SH NAME .SH NAME
nghttp \- HTTP/2 client nghttp \- HTTP/2 client
. .
@ -236,6 +236,12 @@ combined with the \fI\%\-d\fP option.
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-y, \-\-no\-verify\-peer
Suppress warning on server certificate verification
failure.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-version .B \-\-version
Display version information and exit. Display version information and exit.
.UNINDENT .UNINDENT

View File

@ -186,6 +186,11 @@ OPTIONS
Continue interim response. This option is ignored unless Continue interim response. This option is ignored unless
combined with the :option:`-d` option. combined with the :option:`-d` option.
.. option:: -y, --no-verify-peer
Suppress warning on server certificate verification
failure.
.. option:: --version .. option:: --version
Display version information and exit. Display version information and exit.

View File

@ -1,6 +1,6 @@
.\" Man page generated from reStructuredText. .\" Man page generated from reStructuredText.
. .
.TH "NGHTTPD" "1" "Apr 24, 2017" "1.22.0" "nghttp2" .TH "NGHTTPD" "1" "May 21, 2017" "1.23.0-DEV" "nghttp2"
.SH NAME .SH NAME
nghttpd \- HTTP/2 server nghttpd \- HTTP/2 server
. .

View File

@ -1,6 +1,6 @@
.\" Man page generated from reStructuredText. .\" Man page generated from reStructuredText.
. .
.TH "NGHTTPX" "1" "Apr 24, 2017" "1.22.0" "nghttp2" .TH "NGHTTPX" "1" "May 21, 2017" "1.23.0-DEV" "nghttp2"
.SH NAME .SH NAME
nghttpx \- HTTP/2 proxy nghttpx \- HTTP/2 proxy
. .
@ -96,6 +96,18 @@ host pattern "*.nghttp2.org" matches against
match against "nghttp2.org". The exact hosts match match against "nghttp2.org". The exact hosts match
takes precedence over the wildcard hosts match. takes precedence over the wildcard hosts match.
.sp .sp
If path part ends with "*", it is treated as wildcard
path. The wildcard path behaves differently from the
normal path. For normal path, match is made around the
boundary of path component separator,"\fI/\fP". On the other
hand, the wildcard path does not take into account the
path component separator. All paths which include the
wildcard path without last "*" as prefix, and are
strictly longer than wildcard path without last "*" are
matched. "*" must match at least one character. For
example, the pattern "\fI/foo*\fP" matches "\fI/foo/\fP" and
"\fI/foobar\fP". But it does not match "\fI/foo\fP", or "\fI/fo\fP".
.sp
If <PATTERN> is omitted or empty string, "\fI/\fP" is used as If <PATTERN> is omitted or empty string, "\fI/\fP" is used as
pattern, which matches all request paths (catch\-all pattern, which matches all request paths (catch\-all
pattern). The catch\-all backend must be given. pattern). The catch\-all backend must be given.
@ -611,12 +623,12 @@ password protected it\(aqll be requested interactively.
Specify additional certificate and private key file. Specify additional certificate and private key file.
nghttpx will choose certificates based on the hostname nghttpx will choose certificates based on the hostname
indicated by client using TLS SNI extension. If nghttpx indicated by client using TLS SNI extension. If nghttpx
is built with OpenSSL >= 1.0.2, signature algorithms is built with OpenSSL >= 1.0.2, the shared elliptic
(e.g., ECDSA+SHA256, RSA+SHA256) presented by client are curves (e.g., P\-256) between client and server are also
also taken into consideration. This allows nghttpx to taken into consideration. This allows nghttpx to send
send ECDSA certificate to modern clients, while sending ECDSA certificate to modern clients, while sending RSA
RSA based certificate to older clients. This option can based certificate to older clients. This option can be
be used multiple times. To make OCSP stapling work, used multiple times. To make OCSP stapling work,
<CERTPATH> must be absolute path. <CERTPATH> must be absolute path.
.sp .sp
Additional parameter can be specified in <PARAM>. The Additional parameter can be specified in <PARAM>. The
@ -812,6 +824,15 @@ Default: \fB4h\fP
.UNINDENT .UNINDENT
.INDENT 0.0 .INDENT 0.0
.TP .TP
.B \-\-ocsp\-startup
Start accepting connections after initial attempts to
get OCSP responses finish. It does not matter some of
the attempts fail. This feature is useful if OCSP
responses must be available before accepting
connections.
.UNINDENT
.INDENT 0.0
.TP
.B \-\-no\-ocsp .B \-\-no\-ocsp
Disable OCSP stapling. Disable OCSP stapling.
.UNINDENT .UNINDENT

View File

@ -80,6 +80,18 @@ Connections
match against "nghttp2.org". The exact hosts match match against "nghttp2.org". The exact hosts match
takes precedence over the wildcard hosts match. takes precedence over the wildcard hosts match.
If path part ends with "\*", it is treated as wildcard
path. The wildcard path behaves differently from the
normal path. For normal path, match is made around the
boundary of path component separator,"*/*". On the other
hand, the wildcard path does not take into account the
path component separator. All paths which include the
wildcard path without last "\*" as prefix, and are
strictly longer than wildcard path without last "\*" are
matched. "\*" must match at least one character. For
example, the pattern "*/foo\**" matches "*/foo/*" and
"*/foobar*". But it does not match "*/foo*", or "*/fo*".
If <PATTERN> is omitted or empty string, "*/*" is used as If <PATTERN> is omitted or empty string, "*/*" is used as
pattern, which matches all request paths (catch-all pattern, which matches all request paths (catch-all
pattern). The catch-all backend must be given. pattern). The catch-all backend must be given.
@ -563,12 +575,12 @@ SSL/TLS
Specify additional certificate and private key file. Specify additional certificate and private key file.
nghttpx will choose certificates based on the hostname nghttpx will choose certificates based on the hostname
indicated by client using TLS SNI extension. If nghttpx indicated by client using TLS SNI extension. If nghttpx
is built with OpenSSL >= 1.0.2, signature algorithms is built with OpenSSL >= 1.0.2, the shared elliptic
(e.g., ECDSA+SHA256, RSA+SHA256) presented by client are curves (e.g., P-256) between client and server are also
also taken into consideration. This allows nghttpx to taken into consideration. This allows nghttpx to send
send ECDSA certificate to modern clients, while sending ECDSA certificate to modern clients, while sending RSA
RSA based certificate to older clients. This option can based certificate to older clients. This option can be
be used multiple times. To make OCSP stapling work, used multiple times. To make OCSP stapling work,
<CERTPATH> must be absolute path. <CERTPATH> must be absolute path.
Additional parameter can be specified in <PARAM>. The Additional parameter can be specified in <PARAM>. The
@ -743,6 +755,14 @@ SSL/TLS
Default: ``4h`` Default: ``4h``
.. option:: --ocsp-startup
Start accepting connections after initial attempts to
get OCSP responses finish. It does not matter some of
the attempts fail. This feature is useful if OCSP
responses must be available before accepting
connections.
.. option:: --no-ocsp .. option:: --no-ocsp
Disable OCSP stapling. Disable OCSP stapling.