@@ -23,7 +23,7 @@ between the driver and the server.
2323 To learn how to authenticate to MongoDB by using a Lightweight
2424 Directory Access Protocol (LDAP) server, see the guide on
2525 :ref:`rust-enterprise-auth`.
26-
26+
2727 To learn more about connecting to a MongoDB deployment, see the
2828 :ref:`rust-connect-to-mongodb`.
2929
@@ -68,8 +68,8 @@ MongoDB supports the following SCRAM-based authentication mechanisms:
6868 If you do not specify an authentication mechanism, the server
6969 attempts to validate credentials by using the default authentication
7070 mechanism, a SCRAM-based mechanism that varies depending on the
71- version of the server that you are connecting to.
72-
71+ version of the server that you are connecting to.
72+
7373 The ``SCRAM-SHA-256`` mechanism is the default authentication
7474 mechanism for MongoDB Server versions 4.0 and later.
7575
@@ -80,7 +80,7 @@ MongoDB supports the following SCRAM-based authentication mechanisms:
8080 - ``username``: Your username
8181 - ``password``: Your password
8282 - ``db``: The authentication database associated with the user
83-
83+
8484 .. literalinclude:: /includes/fundamentals/code-snippets/auth.rs
8585 :language: rust
8686 :dedent:
@@ -144,7 +144,7 @@ feature flag to your ``mongodb`` dependency in your project's
144144
145145.. code-block:: none
146146 :emphasize-lines: 3
147-
147+
148148 [dependencies.mongodb]
149149 version = "{+version+}"
150150 features = [ "aws-auth", ... ]
@@ -154,7 +154,7 @@ feature flag to your ``mongodb`` dependency in your project's
154154 To use the ``MONGODB-AWS`` authentication mechanism in the
155155 {+driver-short+}, your application must meet the following
156156 requirements:
157-
157+
158158 - You are connected to MongoDB Server version 4.4 or later.
159159 - You are using the ``tokio`` asynchronous runtime.
160160
@@ -189,7 +189,7 @@ the corresponding ways.
189189 ``mechanism`` field of your ``Credential`` struct to
190190 ``AuthMechanism::MongoDbAws``. This example specifies the
191191 authentication mechanism by using the following placeholders:
192-
192+
193193 - ``access key ID``: Your AWS access key ID
194194 - ``secret access key``: Your AWS secret access key
195195 - ``db``: The authentication database associated with the user
@@ -253,7 +253,7 @@ the corresponding ways.
253253 .. code-block:: bash
254254
255255 export AWS_WEB_IDENTITY_TOKEN_FILE=<absolute path to OIDC token file>
256-
256+
257257 Set the ``mechanism`` option in your
258258 ``Credential`` struct to ``AuthMechanism::MongoDbAws``. The driver
259259 reads your AWS IAM credentials from the token file.
@@ -286,7 +286,7 @@ To specify the ``MONGODB-X509`` authentication mechanism, set the
286286``mechanism`` field of your ``Credential`` struct to
287287``AuthMechanism::MongoDbX509``. This example specifies the
288288authentication mechanism by using the following placeholders:
289-
289+
290290- ``path to CA certificate``: The filepath for your CA file
291291- ``path to private client key``: The filepath for your certificate key file
292292- ``db``: The authentication database associated with the user
@@ -320,6 +320,6 @@ guide, see the following API documentation:
320320
321321- `Credential <{+api+}/options/struct.Credential.html>`__
322322- `ClientOptions <{+api+}/options/struct.ClientOptions.html>`__
323- - `Client <{+api+}/options/ struct.Client.html>`__
323+ - `Client <{+api+}/struct.Client.html>`__
324324- `Client::with_options() <{+api+}/struct.Client.html#method.with_options>`__
325325- `ClientOptions::parse() <{+api+}/options/struct.ClientOptions.html#method.parse>`__
0 commit comments