From 3f4901aa51da926cdb12abe54baa80fa4b1dc917 Mon Sep 17 00:00:00 2001 From: Anton Troshin Date: Thu, 10 Oct 2024 13:25:53 -0500 Subject: [PATCH] Fix typos in Configuration docs Signed-off-by: Anton Troshin --- .../en/operations/configuration/configuration-overview.md | 2 +- .../en/operations/configuration/increase-request-size.md | 2 +- .../en/operations/configuration/install-certificates.md | 8 ++++---- .../en/operations/configuration/invoke-allowlist.md | 2 +- .../content/en/operations/configuration/secret-scope.md | 2 +- 5 files changed, 8 insertions(+), 8 deletions(-) diff --git a/daprdocs/content/en/operations/configuration/configuration-overview.md b/daprdocs/content/en/operations/configuration/configuration-overview.md index 0cba2414ca4..fb6831e37b6 100644 --- a/daprdocs/content/en/operations/configuration/configuration-overview.md +++ b/daprdocs/content/en/operations/configuration/configuration-overview.md @@ -12,7 +12,7 @@ description: "Information on Dapr configuration and how to set options for your #### Self-hosted sidecar -In self hosted mode the Dapr configuration is a configuration file, for example `config.yaml`. By default the Dapr sidecar looks in the default Dapr folder for the runtime configuration eg: `$HOME/.dapr/config.yaml` in Linux/MacOS and `%USERPROFILE%\.dapr\config.yaml` in Windows. +In self hosted mode the Dapr configuration is a configuration file, for example `config.yaml`. By default, the Dapr sidecar looks in the default Dapr folder for the runtime configuration eg: `$HOME/.dapr/config.yaml` in Linux/MacOS and `%USERPROFILE%\.dapr\config.yaml` in Windows. A Dapr sidecar can also apply a configuration by using a `--config` flag to the file path with `dapr run` CLI command. diff --git a/daprdocs/content/en/operations/configuration/increase-request-size.md b/daprdocs/content/en/operations/configuration/increase-request-size.md index 2faadecf085..69713fe4b68 100644 --- a/daprdocs/content/en/operations/configuration/increase-request-size.md +++ b/daprdocs/content/en/operations/configuration/increase-request-size.md @@ -6,7 +6,7 @@ weight: 6000 description: "Configure http requests that are bigger than 4 MB" --- -By default Dapr has a limit for the request body size which is set to 4 MB, however you can change this by defining `dapr.io/http-max-request-size` annotation or `--dapr-http-max-request-size` flag. +By default, Dapr has a limit for the request body size which is set to 4 MB, however you can change this by defining `dapr.io/http-max-request-size` annotation or `--dapr-http-max-request-size` flag. diff --git a/daprdocs/content/en/operations/configuration/install-certificates.md b/daprdocs/content/en/operations/configuration/install-certificates.md index 071753ef93d..ca832c141f6 100644 --- a/daprdocs/content/en/operations/configuration/install-certificates.md +++ b/daprdocs/content/en/operations/configuration/install-certificates.md @@ -16,8 +16,8 @@ When the sidecar is not running inside a container, certificates must be directl When the sidecar is running as a container: 1. Certificates must be available to the sidecar container. This can be configured using volume mounts. -1. The environment variable `SSL_CERT_DIR` must be set in the sidecar container, pointing to the directory containing the certificates. -1. For Windows containers, the container needs to run with administrator privileges to be able to install the certificates. +2. The environment variable `SSL_CERT_DIR` must be set in the sidecar container, pointing to the directory containing the certificates. +3. For Windows containers, the container needs to run with administrator privileges to be able to install the certificates. Below is an example that uses Docker Compose to install certificates (present locally in the `./certificates` directory) in the sidecar container: ```yaml @@ -46,7 +46,7 @@ services: On Kubernetes: 1. Certificates must be available to the sidecar container using a volume mount. -1. The environment variable `SSL_CERT_DIR` must be set in the sidecar container, pointing to the directory containing the certificates. +2. The environment variable `SSL_CERT_DIR` must be set in the sidecar container, pointing to the directory containing the certificates. The YAML below is an example of a deployment that attaches a pod volume to the sidecar, and sets `SSL_CERT_DIR` to install the certificates. ```yaml @@ -91,7 +91,7 @@ spec: All the certificates in the directory pointed by `SSL_CERT_DIR` are installed. 1. On Linux containers, all the certificate extensions supported by OpenSSL are supported. For more information, see https://www.openssl.org/docs/man1.1.1/man1/openssl-rehash.html -1. On Windows container, all the certificate extensions supported by certoc.exe are supported. For more information, see certoc.exe present in [Windows Server Core](https://hub.docker.com/_/microsoft-windows-servercore) +2. On Windows container, all the certificate extensions supported by certoc.exe are supported. For more information, see certoc.exe present in [Windows Server Core](https://hub.docker.com/_/microsoft-windows-servercore) ## Example diff --git a/daprdocs/content/en/operations/configuration/invoke-allowlist.md b/daprdocs/content/en/operations/configuration/invoke-allowlist.md index 725c8308491..594f5d06790 100644 --- a/daprdocs/content/en/operations/configuration/invoke-allowlist.md +++ b/daprdocs/content/en/operations/configuration/invoke-allowlist.md @@ -111,7 +111,7 @@ spec: Scenario 3: Deny access to all apps except when a specific verb for HTTP and operation for GRPC is matched -With this configuration, the only scenarios below are allowed access and and all other method requests from all other apps, including other methods on app1 or app2, are denied +With this configuration, the only scenarios below are allowed access and all other method requests from all other apps, including other methods on app1 or app2, are denied * trustDomain = public, namespace = default, appID = app1, operation = op1, http verb = POST/PUT * trustDomain = "myDomain", namespace = "ns1", appID = app2, operation = op2 and application protocol is GRPC , only HTTP verbs POST/PUT on method op1 from appId = app1 are allowed and all other method requests from all other apps, including other methods on app1, are denied diff --git a/daprdocs/content/en/operations/configuration/secret-scope.md b/daprdocs/content/en/operations/configuration/secret-scope.md index 39796447268..9764a520824 100644 --- a/daprdocs/content/en/operations/configuration/secret-scope.md +++ b/daprdocs/content/en/operations/configuration/secret-scope.md @@ -38,7 +38,7 @@ When an `allowedSecrets` list is present with at least one element, only those s ## Permission priority -The `allowedSecrets` and `deniedSecrets` list values take priorty over the `defaultAccess`. +The `allowedSecrets` and `deniedSecrets` list values take priority over the `defaultAccess`. | Scenarios | defaultAccess | allowedSecrets | deniedSecrets | permission |----- | ------- | -----------| ----------| ------------