Fixed bad identation

Updated date to current date in obsolte message.
This commit is contained in:
jvelilla
2017-06-23 09:51:59 -03:00
parent dbf5e76047
commit 02383810b4
4 changed files with 20 additions and 20 deletions

View File

@@ -57,14 +57,14 @@ feature -- Secure connection Helpers
set_secure_protocol_to_ssl_2_or_3 set_secure_protocol_to_ssl_2_or_3
-- Set `ssl_protocol' with `Ssl_23'. -- Set `ssl_protocol' with `Ssl_23'.
-- Protocol not supported anymore. -- Protocol not supported anymore.
obsolete obsolete
"Use set_secure_protocol_to_tls_1_2 [2017-11-30]." "Use set_secure_protocol_to_tls_1_2 [2017-06-23]."
local local
err: DEVELOPER_EXCEPTION err: DEVELOPER_EXCEPTION
do do
create err create err
err.set_description ("SSL_2 or SSL_3 are not supported anymore, upgrate to TLS set_secure_protocol_to_tls_1_2") err.set_description ("SSL_2 or SSL_3 are not supported anymore, upgrate to TLS set_secure_protocol_to_tls_1_2")
err.raise err.raise
end end
set_secure_protocol_to_tls_1_0 set_secure_protocol_to_tls_1_0

View File

@@ -27,8 +27,8 @@ feature -- Factory
Result := l_secure Result := l_secure
if attached secure_protocol as l_prot then if attached secure_protocol as l_prot then
if l_prot.is_case_insensitive_equal ("ssl_2_3") then if l_prot.is_case_insensitive_equal ("ssl_2_3") then
l_secure.set_secure_protocol_to_ssl_2_or_3 l_secure.set_secure_protocol_to_ssl_2_or_3
elseif l_prot.is_case_insensitive_equal ("tls_1_0") then elseif l_prot.is_case_insensitive_equal ("tls_1_0") then
l_secure.set_secure_protocol_to_tls_1_0 l_secure.set_secure_protocol_to_tls_1_0
elseif l_prot.is_case_insensitive_equal ("tls_1_1") then elseif l_prot.is_case_insensitive_equal ("tls_1_1") then
l_secure.set_secure_protocol_to_tls_1_1 l_secure.set_secure_protocol_to_tls_1_1

View File

@@ -298,8 +298,8 @@ feature -- Element change
-- Set `secure_protocol' with `a_ssl_version'. -- Set `secure_protocol' with `a_ssl_version'.
do do
if a_ssl_version.is_case_insensitive_equal ("ssl_2_3") then if a_ssl_version.is_case_insensitive_equal ("ssl_2_3") then
set_secure_protocol_to_ssl_2_or_3 set_secure_protocol_to_ssl_2_or_3
elseif a_ssl_version.is_case_insensitive_equal ("tls_1_0") then elseif a_ssl_version.is_case_insensitive_equal ("tls_1_0") then
set_secure_protocol_to_tls_1_0 set_secure_protocol_to_tls_1_0
elseif a_ssl_version.is_case_insensitive_equal ("tls_1_1") then elseif a_ssl_version.is_case_insensitive_equal ("tls_1_1") then
set_secure_protocol_to_tls_1_1 set_secure_protocol_to_tls_1_1
@@ -317,7 +317,7 @@ feature -- SSL Helpers
set_secure_protocol_to_ssl_2_or_3 set_secure_protocol_to_ssl_2_or_3
-- Set `secure_protocol' with `Ssl_23'. -- Set `secure_protocol' with `Ssl_23'.
obsolete obsolete
"Use set_secure_protocol_to_tls_1_0 [2017-11-30]." "Use set_secure_protocol_to_tls_1_2 [2017-06-23]."
deferred deferred
end end

View File

@@ -36,17 +36,17 @@ feature -- Access
feature -- SSL Helpers feature -- SSL Helpers
set_secure_protocol_to_ssl_2_or_3 set_secure_protocol_to_ssl_2_or_3
-- Set `ssl_protocol' with `Ssl_23'. -- Set `ssl_protocol' with `Ssl_23'.
-- Protocol not supported anymore. -- Protocol not supported anymore.
obsolete obsolete
"Use set_secure_protocol_to_tls_1_2 [2017-11-30]." "Use set_secure_protocol_to_tls_1_2 [2017-06-23]."
local local
err: DEVELOPER_EXCEPTION err: DEVELOPER_EXCEPTION
do do
create err create err
err.set_description ("SSL_2 or SSL_3 are not supported anymore, upgrate to TLS set_secure_protocol_to_tls_1_2") err.set_description ("SSL_2 or SSL_3 are not supported anymore, upgrate to TLS set_secure_protocol_to_tls_1_2")
err.raise err.raise
end end
set_secure_protocol_to_tls_1_0 set_secure_protocol_to_tls_1_0
-- Set `secure_protocol' with `Tls_1_0'. -- Set `secure_protocol' with `Tls_1_0'.