1
0
mirror of https://github.com/taigrr/nats.docs synced 2025-01-18 04:03:23 -08:00

Pointed logo to nats.io site to use absolute path

This commit is contained in:
Stephen Asbury
2019-05-30 16:28:02 -07:00
parent be56526d77
commit 7164aa2dc8
150 changed files with 299 additions and 299 deletions

View File

@@ -2426,7 +2426,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
<script>
var gitbook = gitbook || [];
gitbook.push(function() {
gitbook.page.hasChanged({"page":{"title":"Authenticating with a Credentials File","level":"3.4.4","depth":2,"next":{"title":"Encrypting Connections with TLS","level":"3.4.5","depth":2,"path":"developer/security/tls.md","ref":"developer/security/tls.md","articles":[]},"previous":{"title":"Authenticating with an NKey","level":"3.4.3","depth":2,"path":"developer/security/nkey.md","ref":"developer/security/nkey.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/creds.md","mtime":"2019-05-30T21:51:29.775Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:16:20.593Z"},"basePath":"../..","book":{"language":""}});
gitbook.page.hasChanged({"page":{"title":"Authenticating with a Credentials File","level":"3.4.4","depth":2,"next":{"title":"Encrypting Connections with TLS","level":"3.4.5","depth":2,"path":"developer/security/tls.md","ref":"developer/security/tls.md","articles":[]},"previous":{"title":"Authenticating with an NKey","level":"3.4.3","depth":2,"path":"developer/security/nkey.md","ref":"developer/security/nkey.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/creds.md","mtime":"2019-05-30T21:51:29.775Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:27:21.986Z"},"basePath":"../..","book":{"language":""}});
});
</script>
</div>
@@ -2598,7 +2598,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
display: inline-block;
width: 16px;
height: 16px;
background: url(assets/images/nats.svg);
background: url(https://nats.io/img/nats-icon-color.svg);
background-size: 16px 16px;
}

View File

@@ -2347,7 +2347,7 @@
<script>
var gitbook = gitbook || [];
gitbook.push(function() {
gitbook.page.hasChanged({"page":{"title":"Securing Connections","level":"3.4","depth":1,"next":{"title":"Authenticating with a User and Password","level":"3.4.1","depth":2,"path":"developer/security/userpass.md","ref":"developer/security/userpass.md","articles":[]},"previous":{"title":"Buffering Messages During Reconnect Attempts","level":"3.3.6","depth":2,"path":"developer/reconnect/buffer.md","ref":"developer/reconnect/buffer.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/intro.md","mtime":"2019-05-30T21:51:29.775Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:16:20.593Z"},"basePath":"../..","book":{"language":""}});
gitbook.page.hasChanged({"page":{"title":"Securing Connections","level":"3.4","depth":1,"next":{"title":"Authenticating with a User and Password","level":"3.4.1","depth":2,"path":"developer/security/userpass.md","ref":"developer/security/userpass.md","articles":[]},"previous":{"title":"Buffering Messages During Reconnect Attempts","level":"3.3.6","depth":2,"path":"developer/reconnect/buffer.md","ref":"developer/reconnect/buffer.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/intro.md","mtime":"2019-05-30T21:51:29.775Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:27:21.986Z"},"basePath":"../..","book":{"language":""}});
});
</script>
</div>
@@ -2519,7 +2519,7 @@
display: inline-block;
width: 16px;
height: 16px;
background: url(assets/images/nats.svg);
background: url(https://nats.io/img/nats-icon-color.svg);
background-size: 16px 16px;
}

View File

@@ -2445,7 +2445,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
<script>
var gitbook = gitbook || [];
gitbook.push(function() {
gitbook.page.hasChanged({"page":{"title":"Authenticating with an NKey","level":"3.4.3","depth":2,"next":{"title":"Authenticating with a Credentials File","level":"3.4.4","depth":2,"path":"developer/security/creds.md","ref":"developer/security/creds.md","articles":[]},"previous":{"title":"Authenticating with a Token","level":"3.4.2","depth":2,"path":"developer/security/token.md","ref":"developer/security/token.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/nkey.md","mtime":"2019-05-30T21:51:29.775Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:16:20.593Z"},"basePath":"../..","book":{"language":""}});
gitbook.page.hasChanged({"page":{"title":"Authenticating with an NKey","level":"3.4.3","depth":2,"next":{"title":"Authenticating with a Credentials File","level":"3.4.4","depth":2,"path":"developer/security/creds.md","ref":"developer/security/creds.md","articles":[]},"previous":{"title":"Authenticating with a Token","level":"3.4.2","depth":2,"path":"developer/security/token.md","ref":"developer/security/token.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/nkey.md","mtime":"2019-05-30T21:51:29.775Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:27:21.986Z"},"basePath":"../..","book":{"language":""}});
});
</script>
</div>
@@ -2617,7 +2617,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
display: inline-block;
width: 16px;
height: 16px;
background: url(assets/images/nats.svg);
background: url(https://nats.io/img/nats-icon-color.svg);
background-size: 16px 16px;
}

View File

@@ -2756,7 +2756,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
<script>
var gitbook = gitbook || [];
gitbook.push(function() {
gitbook.page.hasChanged({"page":{"title":"Encrypting Connections with TLS","level":"3.4.5","depth":2,"next":{"title":"Receiving Messages","level":"3.5","depth":1,"path":"developer/receiving/intro.md","ref":"developer/receiving/intro.md","articles":[{"title":"Synchronous Subscriptions","level":"3.5.1","depth":2,"path":"developer/receiving/sync.md","ref":"developer/receiving/sync.md","articles":[]},{"title":"Asynchronous Subscriptions","level":"3.5.2","depth":2,"path":"developer/receiving/async.md","ref":"developer/receiving/async.md","articles":[]},{"title":"Unsubscribing","level":"3.5.3","depth":2,"path":"developer/receiving/unsubscribing.md","ref":"developer/receiving/unsubscribing.md","articles":[]},{"title":"Unsubscribing After N Messages","level":"3.5.4","depth":2,"path":"developer/receiving/unsub_after.md","ref":"developer/receiving/unsub_after.md","articles":[]},{"title":"Replying to a Message","level":"3.5.5","depth":2,"path":"developer/receiving/reply.md","ref":"developer/receiving/reply.md","articles":[]},{"title":"Wildcard Subscriptions","level":"3.5.6","depth":2,"path":"developer/receiving/wildcards.md","ref":"developer/receiving/wildcards.md","articles":[]},{"title":"Queue Subscriptions","level":"3.5.7","depth":2,"path":"developer/receiving/queues.md","ref":"developer/receiving/queues.md","articles":[]},{"title":"Draining Messages Before Disconnect","level":"3.5.8","depth":2,"path":"developer/receiving/drain.md","ref":"developer/receiving/drain.md","articles":[]},{"title":"Structured Data","level":"3.5.9","depth":2,"path":"developer/receiving/structure.md","ref":"developer/receiving/structure.md","articles":[]}]},"previous":{"title":"Authenticating with a Credentials File","level":"3.4.4","depth":2,"path":"developer/security/creds.md","ref":"developer/security/creds.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/tls.md","mtime":"2019-05-30T21:51:29.776Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:16:20.593Z"},"basePath":"../..","book":{"language":""}});
gitbook.page.hasChanged({"page":{"title":"Encrypting Connections with TLS","level":"3.4.5","depth":2,"next":{"title":"Receiving Messages","level":"3.5","depth":1,"path":"developer/receiving/intro.md","ref":"developer/receiving/intro.md","articles":[{"title":"Synchronous Subscriptions","level":"3.5.1","depth":2,"path":"developer/receiving/sync.md","ref":"developer/receiving/sync.md","articles":[]},{"title":"Asynchronous Subscriptions","level":"3.5.2","depth":2,"path":"developer/receiving/async.md","ref":"developer/receiving/async.md","articles":[]},{"title":"Unsubscribing","level":"3.5.3","depth":2,"path":"developer/receiving/unsubscribing.md","ref":"developer/receiving/unsubscribing.md","articles":[]},{"title":"Unsubscribing After N Messages","level":"3.5.4","depth":2,"path":"developer/receiving/unsub_after.md","ref":"developer/receiving/unsub_after.md","articles":[]},{"title":"Replying to a Message","level":"3.5.5","depth":2,"path":"developer/receiving/reply.md","ref":"developer/receiving/reply.md","articles":[]},{"title":"Wildcard Subscriptions","level":"3.5.6","depth":2,"path":"developer/receiving/wildcards.md","ref":"developer/receiving/wildcards.md","articles":[]},{"title":"Queue Subscriptions","level":"3.5.7","depth":2,"path":"developer/receiving/queues.md","ref":"developer/receiving/queues.md","articles":[]},{"title":"Draining Messages Before Disconnect","level":"3.5.8","depth":2,"path":"developer/receiving/drain.md","ref":"developer/receiving/drain.md","articles":[]},{"title":"Structured Data","level":"3.5.9","depth":2,"path":"developer/receiving/structure.md","ref":"developer/receiving/structure.md","articles":[]}]},"previous":{"title":"Authenticating with a Credentials File","level":"3.4.4","depth":2,"path":"developer/security/creds.md","ref":"developer/security/creds.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/tls.md","mtime":"2019-05-30T21:51:29.776Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:27:21.986Z"},"basePath":"../..","book":{"language":""}});
});
</script>
</div>
@@ -2928,7 +2928,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
display: inline-block;
width: 16px;
height: 16px;
background: url(assets/images/nats.svg);
background: url(https://nats.io/img/nats-icon-color.svg);
background-size: 16px 16px;
}

View File

@@ -2530,7 +2530,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
<script>
var gitbook = gitbook || [];
gitbook.push(function() {
gitbook.page.hasChanged({"page":{"title":"Authenticating with a Token","level":"3.4.2","depth":2,"next":{"title":"Authenticating with an NKey","level":"3.4.3","depth":2,"path":"developer/security/nkey.md","ref":"developer/security/nkey.md","articles":[]},"previous":{"title":"Authenticating with a User and Password","level":"3.4.1","depth":2,"path":"developer/security/userpass.md","ref":"developer/security/userpass.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/token.md","mtime":"2019-05-30T21:51:29.776Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:16:20.593Z"},"basePath":"../..","book":{"language":""}});
gitbook.page.hasChanged({"page":{"title":"Authenticating with a Token","level":"3.4.2","depth":2,"next":{"title":"Authenticating with an NKey","level":"3.4.3","depth":2,"path":"developer/security/nkey.md","ref":"developer/security/nkey.md","articles":[]},"previous":{"title":"Authenticating with a User and Password","level":"3.4.1","depth":2,"path":"developer/security/userpass.md","ref":"developer/security/userpass.md","articles":[]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/token.md","mtime":"2019-05-30T21:51:29.776Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:27:21.986Z"},"basePath":"../..","book":{"language":""}});
});
</script>
</div>
@@ -2702,7 +2702,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
display: inline-block;
width: 16px;
height: 16px;
background: url(assets/images/nats.svg);
background: url(https://nats.io/img/nats-icon-color.svg);
background-size: 16px 16px;
}

View File

@@ -2564,7 +2564,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
<script>
var gitbook = gitbook || [];
gitbook.push(function() {
gitbook.page.hasChanged({"page":{"title":"Authenticating with a User and Password","level":"3.4.1","depth":2,"next":{"title":"Authenticating with a Token","level":"3.4.2","depth":2,"path":"developer/security/token.md","ref":"developer/security/token.md","articles":[]},"previous":{"title":"Securing Connections","level":"3.4","depth":1,"path":"developer/security/intro.md","ref":"developer/security/intro.md","articles":[{"title":"Authenticating with a User and Password","level":"3.4.1","depth":2,"path":"developer/security/userpass.md","ref":"developer/security/userpass.md","articles":[]},{"title":"Authenticating with a Token","level":"3.4.2","depth":2,"path":"developer/security/token.md","ref":"developer/security/token.md","articles":[]},{"title":"Authenticating with an NKey","level":"3.4.3","depth":2,"path":"developer/security/nkey.md","ref":"developer/security/nkey.md","articles":[]},{"title":"Authenticating with a Credentials File","level":"3.4.4","depth":2,"path":"developer/security/creds.md","ref":"developer/security/creds.md","articles":[]},{"title":"Encrypting Connections with TLS","level":"3.4.5","depth":2,"path":"developer/security/tls.md","ref":"developer/security/tls.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/userpass.md","mtime":"2019-05-30T21:51:29.776Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:16:20.593Z"},"basePath":"../..","book":{"language":""}});
gitbook.page.hasChanged({"page":{"title":"Authenticating with a User and Password","level":"3.4.1","depth":2,"next":{"title":"Authenticating with a Token","level":"3.4.2","depth":2,"path":"developer/security/token.md","ref":"developer/security/token.md","articles":[]},"previous":{"title":"Securing Connections","level":"3.4","depth":1,"path":"developer/security/intro.md","ref":"developer/security/intro.md","articles":[{"title":"Authenticating with a User and Password","level":"3.4.1","depth":2,"path":"developer/security/userpass.md","ref":"developer/security/userpass.md","articles":[]},{"title":"Authenticating with a Token","level":"3.4.2","depth":2,"path":"developer/security/token.md","ref":"developer/security/token.md","articles":[]},{"title":"Authenticating with an NKey","level":"3.4.3","depth":2,"path":"developer/security/nkey.md","ref":"developer/security/nkey.md","articles":[]},{"title":"Authenticating with a Credentials File","level":"3.4.4","depth":2,"path":"developer/security/creds.md","ref":"developer/security/creds.md","articles":[]},{"title":"Encrypting Connections with TLS","level":"3.4.5","depth":2,"path":"developer/security/tls.md","ref":"developer/security/tls.md","articles":[]}]},"dir":"ltr"},"config":{"plugins":["prism","-sharing","-highlight","include-html","toggle-chapters","anchors"],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"prism":{"lang":{"ascii":"markup","text":"markup"}},"include-html":{},"toggle-chapters":{},"anchors":{},"search":{},"lunr":{"maxIndexSize":1000000,"ignoreSpecialCharacters":false},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"theme":"default","author":"The NATS Maintainers","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"NATS","gitbook":"*","description":"Administrative, developer and conceptual documentation for the NATS messaging system."},"file":{"path":"developer/security/userpass.md","mtime":"2019-05-30T21:51:29.776Z","type":"markdown"},"gitbook":{"version":"3.2.3","time":"2019-05-30T23:27:21.986Z"},"basePath":"../..","book":{"language":""}});
});
</script>
</div>
@@ -2736,7 +2736,7 @@ nc<span class="token punctuation">.</span><span class="token function">close</sp
display: inline-block;
width: 16px;
height: 16px;
background: url(assets/images/nats.svg);
background: url(https://nats.io/img/nats-icon-color.svg);
background-size: 16px 16px;
}