From d3ca08d7cde66d7792e654a96fa2b9fcdeed6f52 Mon Sep 17 00:00:00 2001 From: Stefan Kalscheuer Date: Sun, 26 Apr 2020 17:17:22 +0200 Subject: [PATCH] typo fixes --- Usage-Authorization.md | 2 +- Usage-Connection.md | 4 ++-- Usage-Secrets.md | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/Usage-Authorization.md b/Usage-Authorization.md index 5313931..2c11604 100644 --- a/Usage-Authorization.md +++ b/Usage-Authorization.md @@ -26,7 +26,7 @@ The connector currently supports four authorization methods. .withId("token-id") .withDisplayName("token name") .build(); - // Write token to Vault (orphan creatin and role binding possible). + // Write token to Vault (orphan creation and role binding possible). AuthResponse createResponse = connector.createToken(token); ``` diff --git a/Usage-Connection.md b/Usage-Connection.md index fca285d..9cb8120 100644 --- a/Usage-Connection.md +++ b/Usage-Connection.md @@ -5,7 +5,7 @@ ### Connection The package features an HTTP connector by default. -To establish connection to your Vault cluter, the connector needs to be instantiated with the relevant parameters. +To establish connection to your Vault cluster, the connector needs to be instantiated with the relevant parameters. To do so, use the builder to configure your connector. @@ -34,7 +34,7 @@ For internal sites or to enforce a specific CA you might provide a custom CA cer #### Configuration from environment variables -It is also possible to provide the configuraiton externally through environment variables. +It is also possible to provide the configuration externally through environment variables. This feature supports the default Vault environment variables: * `VAULT_ADDR` - URL to Vault cluster (e.g. _https://vault.example.com:8200_) diff --git a/Usage-Secrets.md b/Usage-Secrets.md index 8b67e64..d201ab8 100644 --- a/Usage-Secrets.md +++ b/Usage-Secrets.md @@ -62,7 +62,7 @@ Several common features have been abstracted to reduce overhead code. // Update metadata to maximum Versions 10 and enforce CAS. connector.updateSecretMetadata("mount", "to/write", 10, true); - // Delete specifc secret version(s). undelete...() and destroy...() also available. + // Delete specific secret version(s). undelete...() and destroy...() also available. connector.deleteSecretVersions("mount", "to/delete", 1, 2, 4); ``` #### Read database credentials