From c173f3bb45417f055cb5227d8d692461e65a80be Mon Sep 17 00:00:00 2001 From: TomPallister Date: Tue, 4 Jul 2017 19:45:03 +0100 Subject: [PATCH] removed files we dont use anymore --- configuration-explanation.txt | 103 ---------------------------------- configuration.json | 1 - configuration.yaml | 3 - 3 files changed, 107 deletions(-) delete mode 100644 configuration-explanation.txt delete mode 100755 configuration.json delete mode 100755 configuration.yaml diff --git a/configuration-explanation.txt b/configuration-explanation.txt deleted file mode 100644 index 09d44a2a..00000000 --- a/configuration-explanation.txt +++ /dev/null @@ -1,103 +0,0 @@ -{ - "ReRoutes": [ - { - # The downstream path we are forwarding the request to, ocelot will not add a trailing slash. - # Ocelot replaces any placeholders {etc} with matched values from the incoming request. - "DownstreamPathTemplate": "/identityserverexample/{someid}/something", - # The scheme you want Ocelot to use when making the downstream request - "DownstreamScheme": "https", - # The port you want Ocelot to use when making the downstream request, will default to - # scheme if nothing set - "DownstreamPort": 80, - # The host address of the downstream service, should not have a trailing slash or scheme - # if there is a trailing slash Ocelot will remove it. - "DownstreamHost" "localhost" - # The path template we are listening on for this re route, Ocelot will add a trailing - # slash to this property. Then when a request is made Ocelot makes sure a trailing - # slash is added, so everything matches - "UpstreamPathTemplate": "/identityserverexample", - # The method we are listening for on this re route - "UpstreamHttpMethod": "Get", - # Only support identity server at the moment - "AuthenticationOptions": { - "Provider": "IdentityServer", - "ProviderRootUrl": "http://localhost:52888", - "ApiName": "api", - "AllowedScopes": [ - "openid", - "offline_access" - ], - # Required if using reference tokens - "ApiSecret": "secret" - }, - # WARNING - will overwrite any headers already in the request with these values. - # Ocelot will look in the user claims for the key in [] then return the value and save - # it as a header with the given key before the colon (:). The index selection on value - # means that Ocelot will use the delimiter specified after the next > to split the - # claim value and return the index specified. - "AddHeadersToRequest": { - "CustomerId": "Claims[CustomerId] > value", - "LocationId": "Claims[LocationId] > value", - "UserType": "Claims[sub] > value[0] > |", - "UserId": "Claims[sub] > value[1] > |" - }, - # WARNING - will overwrite any claims already in the request with these values. - # Ocelot will look in the user claims for the key in [] then return the value and save - # it as a claim with the given key before the colon (:). The index selection on value - # means that Ocelot will use the delimiter specified after the next > to split the - # claim value and return the index specified. - "AddClaimsToRequest": { - "CustomerId": "Claims[CustomerId] > value", - "LocationId": "Claims[LocationId] > value", - "UserType": "Claims[sub] > value[0] > |", - "UserId": "Claims[sub] > value[1] > |" - }, - # WARNING - will overwrite any query string entries already in the request with these values. - # Ocelot will look in the user claims for the key in [] then return the value and save - # it as a query string with the given key before the colon (:). The index selection on value - # means that Ocelot will use the delimiter specified after the next > to split the - # claim value and return the index specified. - "AddQueriesToRequest": { - "CustomerId": "Claims[CustomerId] > value", - "LocationId": "Claims[LocationId] > value", - "UserType": "Claims[sub] > value[0] > |", - "UserId": "Claims[sub] > value[1] > |" - }, - # This specifies any claims that are required for the user to access this re route. - # In this example the user must have the claim type UserType and - # the value must be registered - "RouteClaimsRequirement": { - "UserType": "registered" - }, - # This tells Ocelot to look for a header and use its value as a request/correlation id. - # If it is set here then the id will be forwarded to the downstream service. If it - # does not then it will not be forwarded - "RequestIdKey": "OcRequestId", - # If this is set the response from the downstream service will be cached using the key that called it. - # This gives the user a chance to influence the key by adding some random query string paramter for - # a user id or something that would get ignored by the downstream service. This is a hack and I - # intend to provide a mechanism the user can specify for the ttl caching. Also want to expand - # the caching a lot. - "FileCacheOptions": { "TtlSeconds": 15 }, - # The value of this is used when matching the upstream template to an upstream url. - "ReRouteIsCaseSensitive": false, - # Tells Ocelot the name of the service it is looking when making requests to service discovery - # for hosts and ports - "ServiceName": "product" - # Tells Ocelot which load balancer to use when making downstream requests. - "LoadBalancer": "RoundRobin" - }, - # This section is meant to be for global configuration settings - "GlobalConfiguration": { - # If this is set it will override any route specific request id keys, behaves the same - # otherwise - "RequestIdKey": "OcRequestId", - # If set Ocelot will try and use service discovery to locate downstream hosts and ports - "ServiceDiscoveryProvider": - { - "Provider":"Consul", - "Host":"localhost", - "Port":8500 - } - } - } \ No newline at end of file diff --git a/configuration.json b/configuration.json deleted file mode 100755 index 65b211fc..00000000 --- a/configuration.json +++ /dev/null @@ -1 +0,0 @@ -{"ReRoutes":[{"DownstreamPathTemplate":"/","UpstreamPathTemplate":"/","UpstreamHttpMethod":"get","AuthenticationOptions":{"Provider":null,"ProviderRootUrl":null,"ScopeName":null,"RequireHttps":false,"AdditionalScopes":[],"ScopeSecret":null},"AddHeadersToRequest":{},"AddClaimsToRequest":{},"RouteClaimsRequirement":{},"AddQueriesToRequest":{},"RequestIdKey":null,"FileCacheOptions":{"TtlSeconds":0},"ReRouteIsCaseSensitive":false,"ServiceName":null,"DownstreamScheme":"https","DownstreamHost":"localhost","DownstreamPort":80,"QoSOptions":{"ExceptionsAllowedBeforeBreaking":0,"DurationOfBreak":0,"TimeoutValue":0},"LoadBalancer":null,"RateLimitOptions":{"ClientWhitelist":[],"EnableRateLimiting":false,"Period":null,"PeriodTimespan":0.0,"Limit":0}},{"DownstreamPathTemplate":"/","UpstreamPathTemplate":"/test","UpstreamHttpMethod":"get","AuthenticationOptions":{"Provider":null,"ProviderRootUrl":null,"ScopeName":null,"RequireHttps":false,"AdditionalScopes":[],"ScopeSecret":null},"AddHeadersToRequest":{},"AddClaimsToRequest":{},"RouteClaimsRequirement":{},"AddQueriesToRequest":{},"RequestIdKey":null,"FileCacheOptions":{"TtlSeconds":0},"ReRouteIsCaseSensitive":false,"ServiceName":null,"DownstreamScheme":"https","DownstreamHost":"localhost","DownstreamPort":80,"QoSOptions":{"ExceptionsAllowedBeforeBreaking":0,"DurationOfBreak":0,"TimeoutValue":0},"LoadBalancer":null,"RateLimitOptions":{"ClientWhitelist":[],"EnableRateLimiting":false,"Period":null,"PeriodTimespan":0.0,"Limit":0}}],"GlobalConfiguration":{"RequestIdKey":"RequestId","ServiceDiscoveryProvider":{"Provider":"test","Host":"127.0.0.1","Port":0},"AdministrationPath":"/administration","RateLimitOptions":{"ClientIdHeader":"ClientId","QuotaExceededMessage":null,"RateLimitCounterPrefix":"ocelot","DisableRateLimitHeaders":false,"HttpStatusCode":429}}} \ No newline at end of file diff --git a/configuration.yaml b/configuration.yaml deleted file mode 100755 index 2e47e77d..00000000 --- a/configuration.yaml +++ /dev/null @@ -1,3 +0,0 @@ -Routes: -- Downstream: http://localhost:51879/ - Upstream: /heee