From cf778e93c15cc44b5ee2f5cb4f9e3d1b63d66067 Mon Sep 17 00:00:00 2001 From: Stefan Bley Date: Tue, 17 Apr 2018 10:33:28 +0200 Subject: [PATCH 1/2] Fix typos in README.md Replace 'were' by 'where'. --- readme.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/readme.md b/readme.md index 6e161b0..fdab5bb 100644 --- a/readme.md +++ b/readme.md @@ -164,7 +164,7 @@ This can be externalized to Secrets in yaml format: You can select the Secrets to consume in a number of ways: -1. By listing the directories were secrets are mapped: +1. By listing the directories where secrets are mapped: ``` -Dspring.cloud.kubernetes.secrets.paths=/etc/secrets/activemq,etc/secrets/postgres ``` @@ -193,7 +193,7 @@ You can select the Secrets to consume in a number of ways: | spring.cloud.kubernetes.secrets.enabled | Boolean | true | Enable Secrets PropertySource | spring.cloud.kubernetes.secrets.name | String | ${spring.application.name} | Sets the name of the secret to lookup | spring.cloud.kubernetes.secrets.labels | Map | null | Sets the labels used to lookup secrets -| spring.cloud.kubernetes.secrets.paths | List | null | Sets the paths were secrets are mounted /example 1) +| spring.cloud.kubernetes.secrets.paths | List | null | Sets the paths where secrets are mounted /example 1) | spring.cloud.kubernetes.secrets.enableApi | Boolean | false | Enable/Disable consuming secrets via APIs (examples 2 and 3) **Notes:** From f79c6d95080c7c7e522ad1f57ea1a0985afeea87 Mon Sep 17 00:00:00 2001 From: Stefan Bley Date: Tue, 17 Apr 2018 10:36:46 +0200 Subject: [PATCH 2/2] Fix typos in README.md Replace 'wether' by 'whether'. Replace '/example 1)' by '(example 1)'. Replace 'its' by 'it is'. --- readme.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/readme.md b/readme.md index fdab5bb..3a565c8 100644 --- a/readme.md +++ b/readme.md @@ -17,7 +17,7 @@ - [Secrets PropertySource](#secrets-propertysource) - [PropertySource Reload](#propertysource-reload) - [Pod Health Indicator](#pod-health-indicator) -- [Transparency](#transparency) *(its transparent wether the code runs in or outside of Kubernetes)* +- [Transparency](#transparency) *(it is transparent whether the code runs in or outside of Kubernetes)* - [Kubernetes Profile Autoconfiguration](#kubernetes-profile-autoconfiguration) - [Ribbon discovery in Kubernetes](#ribbon-discovery-in-kubernetes) - [Zipkin discovery in Kubernetes](#zipkin-discovery-in-kubernetes) @@ -193,7 +193,7 @@ You can select the Secrets to consume in a number of ways: | spring.cloud.kubernetes.secrets.enabled | Boolean | true | Enable Secrets PropertySource | spring.cloud.kubernetes.secrets.name | String | ${spring.application.name} | Sets the name of the secret to lookup | spring.cloud.kubernetes.secrets.labels | Map | null | Sets the labels used to lookup secrets -| spring.cloud.kubernetes.secrets.paths | List | null | Sets the paths where secrets are mounted /example 1) +| spring.cloud.kubernetes.secrets.paths | List | null | Sets the paths where secrets are mounted (example 1) | spring.cloud.kubernetes.secrets.enableApi | Boolean | false | Enable/Disable consuming secrets via APIs (examples 2 and 3) **Notes:**