Skip to content

Commit

Permalink
Fix spelling errors (#3390)
Browse files Browse the repository at this point in the history
  • Loading branch information
dadgar authored and vishalnayak committed Sep 28, 2017
1 parent b808267 commit b314c13
Show file tree
Hide file tree
Showing 5 changed files with 6 additions and 6 deletions.
4 changes: 2 additions & 2 deletions website/source/api/auth/aws/index.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -406,7 +406,7 @@ Returns the previously configured periodic whitelist tidying settings.

| Method | Path | Produces |
| :------- | :--------------------------- | :--------------------- |
| `GET` | `/auth/aws/config/tidy/identity-whitelist` | `200 applicaiton/json` |
| `GET` | `/auth/aws/config/tidy/identity-whitelist` | `200 application/json` |

### Sample Request

Expand Down Expand Up @@ -484,7 +484,7 @@ Returns the previously configured periodic blacklist tidying settings.

| Method | Path | Produces |
| :------- | :--------------------------- | :--------------------- |
| `GET` | `/auth/aws/config/tidy/roletag-blacklist` | `200 applicaiton/json` |
| `GET` | `/auth/aws/config/tidy/roletag-blacklist` | `200 application/json` |

### Sample Request

Expand Down
2 changes: 1 addition & 1 deletion website/source/api/secret/aws/index.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -294,7 +294,7 @@ role must be created before queried.
### Parameters

- `name` `(string: <required>)` – Specifies the name of the role to generate
credentials againts. This is part of the request URL.
credentials against. This is part of the request URL.

### Sample Request

Expand Down
2 changes: 1 addition & 1 deletion website/source/api/secret/ssh/index.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -197,7 +197,7 @@ This endpoint creates or updates a named role.

- `key_id_format` `(string: "")` – When supplied, this value specifies a custom
format for the key id of a signed certificate. The following variables are
availble for use: '{{token_display_name}}' - The display name of the token used
available for use: '{{token_display_name}}' - The display name of the token used
to make the request. '{{role_name}}' - The name of the role signing the request.
'{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed.
e.g. "custom-keyid-{{token_display_name}}",
Expand Down
2 changes: 1 addition & 1 deletion website/source/api/system/replication-dr.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -263,7 +263,7 @@ This endpoint promotes the DR secondary cluster to DR primary. For data safety a
security reasons, new secondary tokens will need to be issued to other
secondaries, and there should never be more than one primary at a time.

If the DR secondary's primary cluster is also in a performace replication set,
If the DR secondary's primary cluster is also in a performance replication set,
the DR secondary will be promoted into that replication set. Care should be
taken when promoting to ensure multiple performance primary clusters are not
activate at the same time.
Expand Down
2 changes: 1 addition & 1 deletion website/source/docs/secrets/aws/index.html.md
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ $ vault write aws/config/root \
```

*Note that `root` does not mean it needs to be your AWS account's root credentials, and it
probably should not be. It is also unnecessary in many cases as Vault will use normal AWS credential mechanisms (instance profile, env vars, etc.) when possible. If you need to use static credentails, create an IAM user with permissions to manage IAM and STS.
probably should not be. It is also unnecessary in many cases as Vault will use normal AWS credential mechanisms (instance profile, env vars, etc.) when possible. If you need to use static credentials, create an IAM user with permissions to manage IAM and STS.
See below for the specific actions required.*

The following parameters are required:
Expand Down

0 comments on commit b314c13

Please sign in to comment.