Skip to content

Commit e968275

Browse files
authored
Merge pull request smallstep#1729 from patsevanton/master
Spelling errors and punctuation have been corrected
2 parents dc577e2 + 7e1b93b commit e968275

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

Diff for: CHANGELOG.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ and this project adheres to [Semantic Versioning](http://semver.org/spec/v2.0.0.
3636

3737
- Generation of first provisioner name on `step ca init` in (smallstep/certificates#1566)
3838
- Processing of SCEP Get PKIOperation requests in (smallstep/certificates#1570)
39-
- Support for signing identity certificate during SSH sign by skipping URI validation in (smallstep/certificates#1572)
39+
- Support for signing identity certificate during SSH sign by skipping URI validation in (smallstep/certificates#1572)
4040
- Dependency on `micromdm/scep` and `go.mozilla.org/pkcs7` to use Smallstep forks in (smallstep/certificates#1600)
4141
- Make the Common Name validator for JWK provisioners accept values from SANs too in (smallstep/certificates#1609)
4242

Diff for: examples/README.md

+8-8
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ the token does contain the root fingerprint then it is simpler to use:
2121
client, err := ca.Bootstrap(token)
2222
```
2323

24-
After the initialization there are examples of all the client methods. These
24+
After the initialization, there are examples of all the client methods. These
2525
methods are a convenient way to use the CA API. The first method, `Health`,
2626
returns the status of the CA server. If the server is up it will return
2727
`{"status":"ok"}`.
@@ -77,7 +77,7 @@ if err != nil { ... }
7777
```
7878

7979
The following methods are for inpsecting Provisioners.
80-
One method that returns a list of provisioners or a the encrypted key of one provisioner.
80+
One method that returns a list of provisioners or an encrypted key of one provisioner.
8181

8282
```go
8383
// Without options it will return the first 20 provisioners.
@@ -98,7 +98,7 @@ key, err := client.ProvisionerKey("DmAtZt2EhmZr_iTJJ387fr4Md2NbzMXGdXQNW1UWPXk")
9898
```
9999

100100
The following example shows how to create a
101-
tls.Config object that can be injected into servers and clients. By default these
101+
tls.Config object that can be injected into servers and clients. By default, these
102102
methods will spin off Go routines that auto-renew a certificate once (approximately)
103103
two thirds of the duration of the certificate has passed.
104104

@@ -184,7 +184,7 @@ resp, err := client.Get("https://localhost:8443")
184184
```
185185

186186
We will demonstrate the mTLS configuration in a different example. In this
187-
examplefor we will configure the server to only verify client certificates
187+
example we will configure the server to only verify client certificates
188188
if they are provided.
189189

190190
To being with let's start the Step CA:
@@ -226,7 +226,7 @@ If you'd like to turn off curl's verification of the certificate, use
226226
HTTPS-proxy has similar options --proxy-cacert and --proxy-insecure.
227227
```
228228

229-
Now lets use the root certificate generated for the Step PKI. It should work.
229+
Now let's use the root certificate generated for the Step PKI. It should work.
230230

231231
```sh
232232
certificates $ curl --cacert examples/pki/secrets/root_ca.crt https://localhost:8443
@@ -236,7 +236,7 @@ Hello nobody at 2018-11-03 01:49:25.66912 +0000 UTC!!!
236236
Notice that in the response we see `nobody`. This is because the server did not
237237
detected a TLS client configuration.
238238

239-
But if we create a client with it's own certificate (generated by the Step CA),
239+
But if we create a client with its own certificate (generated by the Step CA),
240240
we should see the Common Name of the client certificate:
241241

242242
```sh
@@ -304,7 +304,7 @@ We can use the bootstrap-server to demonstrate certificate rotation. We've
304304
added a second provisioner, named `mike@smallstep.com`, to the CA configuration.
305305
This provisioner is has a default certificate duration of 2 minutes.
306306
Let's run the server, and inspect the certificate. We can should be able to
307-
see the certificate rotate once approximately 2/3rds of it's lifespan has passed.
307+
see the certificate rotate once approximately 2/3rds of its lifespan has passed.
308308

309309
```sh
310310
certificates $ export STEPPATH=examples/pki
@@ -320,7 +320,7 @@ The exact formula is `<duration>-<duration>/3-rand(<duration>/20)` (`duration=12
320320
in our example).
321321

322322
We can use the following command to check the certificate expiration and to make
323-
sure the certificate changes after 74-80 seconds.
323+
sure the certificate changes after 74-80 seconds.
324324

325325
```sh
326326
certificates $ step certificate inspect --insecure https://localhost:8443

Diff for: scripts/README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,5 +4,5 @@ Please note that `install-step-ra.sh` is referenced on the `files.smallstep.com`
44

55
## badger-migration
66

7-
badger-migration is a tool that allows migrating data data from BadgerDB (v1 or
7+
badger-migration is a tool that allows migrating data from BadgerDB (v1 or
88
v2) to MySQL or PostgreSQL.

0 commit comments

Comments
 (0)