mirror of https://github.com/dapr/docs.git
Fix typos in Configuration docs
Signed-off-by: Anton Troshin <anton@diagrid.io>
This commit is contained in:
parent
69ce373feb
commit
3f4901aa51
|
|
@ -12,7 +12,7 @@ description: "Information on Dapr configuration and how to set options for your
|
|||
|
||||
#### Self-hosted sidecar
|
||||
|
||||
In self hosted mode the Dapr configuration is a configuration file, for example `config.yaml`. By default the Dapr sidecar looks in the default Dapr folder for the runtime configuration eg: `$HOME/.dapr/config.yaml` in Linux/MacOS and `%USERPROFILE%\.dapr\config.yaml` in Windows.
|
||||
In self hosted mode the Dapr configuration is a configuration file, for example `config.yaml`. By default, the Dapr sidecar looks in the default Dapr folder for the runtime configuration eg: `$HOME/.dapr/config.yaml` in Linux/MacOS and `%USERPROFILE%\.dapr\config.yaml` in Windows.
|
||||
|
||||
A Dapr sidecar can also apply a configuration by using a `--config` flag to the file path with `dapr run` CLI command.
|
||||
|
||||
|
|
|
|||
|
|
@ -6,7 +6,7 @@ weight: 6000
|
|||
description: "Configure http requests that are bigger than 4 MB"
|
||||
---
|
||||
|
||||
By default Dapr has a limit for the request body size which is set to 4 MB, however you can change this by defining `dapr.io/http-max-request-size` annotation or `--dapr-http-max-request-size` flag.
|
||||
By default, Dapr has a limit for the request body size which is set to 4 MB, however you can change this by defining `dapr.io/http-max-request-size` annotation or `--dapr-http-max-request-size` flag.
|
||||
|
||||
|
||||
|
||||
|
|
|
|||
|
|
@ -16,8 +16,8 @@ When the sidecar is not running inside a container, certificates must be directl
|
|||
|
||||
When the sidecar is running as a container:
|
||||
1. Certificates must be available to the sidecar container. This can be configured using volume mounts.
|
||||
1. The environment variable `SSL_CERT_DIR` must be set in the sidecar container, pointing to the directory containing the certificates.
|
||||
1. For Windows containers, the container needs to run with administrator privileges to be able to install the certificates.
|
||||
2. The environment variable `SSL_CERT_DIR` must be set in the sidecar container, pointing to the directory containing the certificates.
|
||||
3. For Windows containers, the container needs to run with administrator privileges to be able to install the certificates.
|
||||
|
||||
Below is an example that uses Docker Compose to install certificates (present locally in the `./certificates` directory) in the sidecar container:
|
||||
```yaml
|
||||
|
|
@ -46,7 +46,7 @@ services:
|
|||
|
||||
On Kubernetes:
|
||||
1. Certificates must be available to the sidecar container using a volume mount.
|
||||
1. The environment variable `SSL_CERT_DIR` must be set in the sidecar container, pointing to the directory containing the certificates.
|
||||
2. The environment variable `SSL_CERT_DIR` must be set in the sidecar container, pointing to the directory containing the certificates.
|
||||
|
||||
The YAML below is an example of a deployment that attaches a pod volume to the sidecar, and sets `SSL_CERT_DIR` to install the certificates.
|
||||
```yaml
|
||||
|
|
@ -91,7 +91,7 @@ spec:
|
|||
All the certificates in the directory pointed by `SSL_CERT_DIR` are installed.
|
||||
|
||||
1. On Linux containers, all the certificate extensions supported by OpenSSL are supported. For more information, see https://www.openssl.org/docs/man1.1.1/man1/openssl-rehash.html
|
||||
1. On Windows container, all the certificate extensions supported by certoc.exe are supported. For more information, see certoc.exe present in [Windows Server Core](https://hub.docker.com/_/microsoft-windows-servercore)
|
||||
2. On Windows container, all the certificate extensions supported by certoc.exe are supported. For more information, see certoc.exe present in [Windows Server Core](https://hub.docker.com/_/microsoft-windows-servercore)
|
||||
|
||||
## Example
|
||||
|
||||
|
|
|
|||
|
|
@ -111,7 +111,7 @@ spec:
|
|||
|
||||
<font size=5>Scenario 3: Deny access to all apps except when a specific verb for HTTP and operation for GRPC is matched</font>
|
||||
|
||||
With this configuration, the only scenarios below are allowed access and and all other method requests from all other apps, including other methods on app1 or app2, are denied
|
||||
With this configuration, the only scenarios below are allowed access and all other method requests from all other apps, including other methods on app1 or app2, are denied
|
||||
* trustDomain = public, namespace = default, appID = app1, operation = op1, http verb = POST/PUT
|
||||
* trustDomain = "myDomain", namespace = "ns1", appID = app2, operation = op2 and application protocol is GRPC
|
||||
, only HTTP verbs POST/PUT on method op1 from appId = app1 are allowed and all other method requests from all other apps, including other methods on app1, are denied
|
||||
|
|
|
|||
|
|
@ -38,7 +38,7 @@ When an `allowedSecrets` list is present with at least one element, only those s
|
|||
|
||||
## Permission priority
|
||||
|
||||
The `allowedSecrets` and `deniedSecrets` list values take priorty over the `defaultAccess`.
|
||||
The `allowedSecrets` and `deniedSecrets` list values take priority over the `defaultAccess`.
|
||||
|
||||
| Scenarios | defaultAccess | allowedSecrets | deniedSecrets | permission
|
||||
|----- | ------- | -----------| ----------| ------------
|
||||
|
|
|
|||
Loading…
Reference in New Issue