Skip to content

Commit

Permalink
fix lint
Browse files Browse the repository at this point in the history
  • Loading branch information
soyuka committed Oct 16, 2023
1 parent aa441c6 commit 73b8a0e
Show file tree
Hide file tree
Showing 4 changed files with 7 additions and 7 deletions.
4 changes: 2 additions & 2 deletions deployment/traefik.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,15 +6,15 @@
## Basic Implementation

This tutorial will help you to define your own routes for your client, api and more generally for your containers.
This tutorial will help you to define your own routes for your client, API and more generally for your containers.

Use this custom API Platform `docker-compose.yml` file which implements ready-to-use Træfik container configuration. Override
ports and add labels to tell Træfik to listen on the routes mentioned and redirect routes to a specified container.

A few points to note:

* `--api.insecure=true` Tells Træfik to generate a browser view to watch containers and IP/DNS associated easier
* `--providers.docker` Tells Træfik to listen on Docker Api
* `--providers.docker` Tells Træfik to listen on Docker API
* `labels:` Key for Træfik configuration into Docker integration

```yaml
Expand Down
2 changes: 1 addition & 1 deletion extra/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,7 +47,7 @@ Scores from the following areas are added together to produce a score. The score

* Integrity: Does this vulnerability cause non-public data to be accessible? If so, does the attacker have control over the data disclosed? (0-4)
* Disclosure: Can this exploit allow system data (or data handled by the system) to be compromised? If so, does the attacker have control over modification? (0-4)
* Code Execution: Does the vulnerability allow arbitrary code to be executed on an end-users system, or the server that it runs on? (0-4)
* Code Execution: Does the vulnerability allow arbitrary code to be executed on an end users system, or the server that it runs on? (0-4)
* Availability: Is the availability of a service or application affected? Is it reduced availability or total loss of availability of a service / application? Availability includes networked services (e.g., databases) or resources such as consumption of network bandwidth, processor cycles, or disk space. (0-4)

### Affected Projects
Expand Down
6 changes: 3 additions & 3 deletions extra/troubleshooting.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Docker Toolbox is not supported anymore by API Platform. Please upgrade to [Dock

If the `php` container cannot start and display this `Error starting userland proxy: Bind for 0.0.0.0:80`, it means that port 80 is already in use. You can check to see which processes are currently listening on certain ports.

Find out if any service listens on port 80. You can use this command on UNIX-based OSes like MacOS and Linux:
Find out if any service listens on port 80. You can use this command on UNIX-based OSes like macOS and Linux:

```console
sudo lsof -n -i :80 | grep LISTEN
Expand Down Expand Up @@ -46,9 +46,9 @@ The JMS Serializer service is available as `jms_serializer`.

## "upstream sent too big header while reading response header from upstream" NGINX 502 Error

Some of your API calls fail with a 502 error and the logs for the api container shows the following error message `upstream sent too big header while reading response header from upstream`.
Some of your api calls fail with a 502 error and the logs for the api container shows the following error message `upstream sent too big header while reading response header from upstream`.

This can be due to the cache invalidation headers that are too big for NGINX. When you query the API, API Platform adds the ids of all returned entities and their dependencies in the headers like so : `Cache-Tags: /entity/1,/dependent_entity/1,/entity/2`. This can overflow the default header size (4k) when your API gets larger and more complex.
This can be due to the cache invalidation headers that are too big for NGINX. When you query the API, API Platform adds the IDs of all returned entities and their dependencies in the headers like so : `Cache-Tags: /entity/1,/dependent_entity/1,/entity/2`. This can overflow the default header size (4k) when your API gets larger and more complex.

You can modify the `api/docker/nginx/conf.d/default.conf` file and set values to `fastcgi_buffer_size` and `fastcgi_buffers` that suit your needs, like so:

Expand Down
2 changes: 1 addition & 1 deletion schema-generator/index.md
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
# The Schema Generator

`schema` is a command line tool part of [the API Platform framework](https://api-platform.com) that instantly generates a set
`schema` is a command-line tool part of [the API Platform framework](https://api-platform.com) that instantly generates a set
of PHP classes from [RDF](https://en.wikipedia.org/wiki/Resource_Description_Framework) vocabularies such as (but not limited to)
[Schema.org](https://schema.org) or [ActivityStreams](https://www.w3.org/TR/activitystreams-core/).
Alternatively, it can generate PHP classes from an [OpenAPI](https://www.openapis.org/) documentation.
Expand Down

0 comments on commit 73b8a0e

Please sign in to comment.