Skip to content

Commit

Permalink
Merge pull request #67 from nota-ja/replace-tabs-to-spaces-in-readme
Browse files Browse the repository at this point in the history
Replace tabs with spaces (and fix indent) of YAML in code blocks
  • Loading branch information
Shashwathi committed Mar 2, 2017
2 parents 4cd96f0 + 966729c commit a44b5db
Showing 1 changed file with 51 additions and 51 deletions.
102 changes: 51 additions & 51 deletions README.md
Expand Up @@ -102,12 +102,12 @@ for you automatically.
```
properties:
uaa:
ssl:
port: <choose a port for UAA to listen to SSL on; e.g. 8443>
sslCertificate: |
<insert certificate>
sslPrivateKey: |
<insert private key>
ssl:
port: <choose a port for UAA to listen to SSL on; e.g. 8443>
sslCertificate: |
<insert certificate>
sslPrivateKey: |
<insert private key>
```
1. You must add the `routing.router_groups.read` and
`routing.router_groups.write` scopes to your admin user.
Expand All @@ -116,8 +116,8 @@ for you automatically.
properties:
uaa:
scim:
users:
- admin|PASSWORD|scim.write,scim.read,openid,cloud_controller.admin,clients.read,clients.write,doppler.firehose,routing.router_groups.read,routing.router_groups.write
users:
- admin|PASSWORD|scim.write,scim.read,openid,cloud_controller.admin,clients.read,clients.write,doppler.firehose,routing.router_groups.read,routing.router_groups.write
```

1. The following OAuth clients must be configured for UAA. All but the `cf`
Expand All @@ -130,45 +130,45 @@ for you automatically.
```
properties:
uaa:
clients:
cc_routing:
authorities: routing.router_groups.read
authorized-grant-types: client_credentials
secret: <your-secret>
cf:
override: true
authorized-grant-types: password,refresh_token
scope: cloud_controller.read,cloud_controller.write,openid,password.write,cloud_controller.admin,cloud_controller.admin_read_only,scim.read,scim.write,doppler.firehose,uaa.user,routing.router_groups.read,routing.router_groups.write
authorities: uaa.none
access-token-validity: 600
refresh-token-validity: 2592000
gorouter:
authorities: routing.routes.read
authorized-grant-types: client_credentials,refresh_token
secret: <your-secret>
tcp_emitter:
authorities: routing.routes.write,routing.routes.read
authorized-grant-types: client_credentials,refresh_token
secret: <your-secret>
tcp_router:
authorities: routing.routes.read
authorized-grant-types: client_credentials,refresh_token
secret: <your-secret>
clients:
cc_routing:
authorities: routing.router_groups.read
authorized-grant-types: client_credentials
secret: <your-secret>
cf:
override: true
authorized-grant-types: password,refresh_token
scope: cloud_controller.read,cloud_controller.write,openid,password.write,cloud_controller.admin,cloud_controller.admin_read_only,scim.read,scim.write,doppler.firehose,uaa.user,routing.router_groups.read,routing.router_groups.write
authorities: uaa.none
access-token-validity: 600
refresh-token-validity: 2592000
gorouter:
authorities: routing.routes.read
authorized-grant-types: client_credentials,refresh_token
secret: <your-secret>
tcp_emitter:
authorities: routing.routes.write,routing.routes.read
authorized-grant-types: client_credentials,refresh_token
secret: <your-secret>
tcp_router:
authorities: routing.routes.read
authorized-grant-types: client_credentials,refresh_token
secret: <your-secret>
```
1. UAA must be configured to accept requests using an internal hostname. The
manifest generation scripts for cf-release will do this for you (both BOSH
Lite and non). However, if you override the `uaa.zones.internal.hostnames`
property yourself, be sure to include `uaa.service.cf.internal` in your
stub.

```
properties:
uaa:
zones:
internal:
hostnames:
- uaa.service.cf.internal
```
```
properties:
uaa:
zones:
internal:
hostnames:
- uaa.service.cf.internal
```

#### Warning!

Expand Down Expand Up @@ -305,10 +305,10 @@ range").
```
properties:
routing_api:
router_groups:
- name: default-tcp
reservable_ports: 1024-1123
type: tcp
router_groups:
- name: default-tcp
reservable_ports: 1024-1123
type: tcp
```

### Relational Database
Expand All @@ -320,13 +320,13 @@ The routing-release now supports a relational database for the Routing API. We r
```
properties:
routing_api:
sqldb:
type: <mysql || postgres>
host: <IP of SQL Host>
port: <Port for SQL Host>
schema: <Schema name>
username: <Username for SQL DB>
password: <Password for SQL DB>
sqldb:
type: <mysql || postgres>
host: <IP of SQL Host>
port: <Port for SQL Host>
schema: <Schema name>
username: <Username for SQL DB>
password: <Password for SQL DB>
```

If you are using
Expand Down

0 comments on commit a44b5db

Please sign in to comment.