fix typo on TLSOptions.xml and library_godot_display.js

This commit is contained in:
Septian 2023-07-05 09:44:07 +07:00
parent cdd2313ba2
commit b88b6b4f48
2 changed files with 5 additions and 5 deletions

View File

@ -29,15 +29,15 @@
<description> <description>
Creates a TLS client configuration which validates certificates and their common names (fully qualified domain names). Creates a TLS client configuration which validates certificates and their common names (fully qualified domain names).
You can specify a custom [param trusted_chain] of certification authorities (the default CA list will be used if [code]null[/code]), and optionally provide a [param common_name_override] if you expect the certificate to have a common name other then the server FQDN. You can specify a custom [param trusted_chain] of certification authorities (the default CA list will be used if [code]null[/code]), and optionally provide a [param common_name_override] if you expect the certificate to have a common name other then the server FQDN.
Note: On the Web plafrom, TLS verification is always enforced against the CA list of the web browser. This is considered a security feature. [b]Note:[/b] On the Web platform, TLS verification is always enforced against the CA list of the web browser. This is considered a security feature.
</description> </description>
</method> </method>
<method name="client_unsafe" qualifiers="static"> <method name="client_unsafe" qualifiers="static">
<return type="TLSOptions" /> <return type="TLSOptions" />
<param index="0" name="trusted_chain" type="X509Certificate" default="null" /> <param index="0" name="trusted_chain" type="X509Certificate" default="null" />
<description> <description>
Creates an [b]unsafe[/b] TLS client configuration where certificate validation is optional. You can optionally provide a valid [param trusted_chain], but the common name of the certififcates will never be checked. Using this configuration for purposes other than testing [b]is not recommended[/b]. Creates an [b]unsafe[/b] TLS client configuration where certificate validation is optional. You can optionally provide a valid [param trusted_chain], but the common name of the certificates will never be checked. Using this configuration for purposes other than testing [b]is not recommended[/b].
Note: On the Web plafrom, TLS verification is always enforced against the CA list of the web browser. This is considered a security feature. [b]Note:[/b] On the Web platform, TLS verification is always enforced against the CA list of the web browser. This is considered a security feature.
</description> </description>
</method> </method>
<method name="server" qualifiers="static"> <method name="server" qualifiers="static">
@ -46,7 +46,7 @@
<param index="1" name="certificate" type="X509Certificate" /> <param index="1" name="certificate" type="X509Certificate" />
<description> <description>
Creates a TLS server configuration using the provided [param key] and [param certificate]. Creates a TLS server configuration using the provided [param key] and [param certificate].
Note: The [param certificate] should include the full certificate chain up to the signing CA (certificates file can be concatenated using a general purpose text editor). [b]Note:[/b] The [param certificate] should include the full certificate chain up to the signing CA (certificates file can be concatenated using a general purpose text editor).
</description> </description>
</method> </method>
</methods> </methods>

View File

@ -536,7 +536,7 @@ const GodotDisplay = {
} }
navigator.clipboard.writeText(text).catch(function (e) { navigator.clipboard.writeText(text).catch(function (e) {
// Setting OS clipboard is only possible from an input callback. // Setting OS clipboard is only possible from an input callback.
GodotRuntime.error('Setting OS clipboard is only possible from an input callback for the Web plafrom. Exception:', e); GodotRuntime.error('Setting OS clipboard is only possible from an input callback for the Web platform. Exception:', e);
}); });
return 0; return 0;
}, },