Skip to content

Commit e1a3b43

Browse files
committed
typos
1 parent 148ebae commit e1a3b43

File tree

1 file changed

+3
-10
lines changed

1 file changed

+3
-10
lines changed

README.md

Lines changed: 3 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,8 @@ readonlyrest:
3232

3333
ssl:
3434
enable: true
35-
keystore_file: "/elasticsearch/plugins/readonlyrest/keystore.jks
36-
keystore_pass: readonlyres
35+
keystore_file: "/elasticsearch/plugins/readonlyrest/keystore.jks"
36+
keystore_pass: readonlyrest
3737
key_pass: readonlyrest
3838
```
3939
@@ -42,13 +42,6 @@ readonlyrest:
4242
```yml
4343
readonlyrest:
4444
enable: true
45-
46-
ssl:
47-
enable: true
48-
keystore_file: "/elasticsearch/plugins/readonlyrest/keystore.jks
49-
keystore_pass: readonlyres
50-
key_pass: readonlyrest
51-
5245
response_if_req_forbidden: Sorry, your request is forbidden.
5346

5447
access_control_rules:
@@ -143,7 +136,7 @@ Some suggest to spin up a new HTTP proxy (Varnish, NGNix, HAProxy) between ES an
143136
- You're introducing more complexity in your architecture.
144137
- Reasoning about security at HTTP level is risky, flaky and less granular than controlling access at the internal ElasticSearch protocol level.
145138

146-
> The only clean way to do the access control is AFTER ElasticSearch has parsed the queries.
139+
**The only clean way to do the access control is AFTER ElasticSearch has parsed the queries.**
147140

148141
Just set a few rules with this plugin and confidently open it up to the external world.
149142

0 commit comments

Comments
 (0)