Skip to content

Commit e37f732

Browse files
ryan-nortonmiquella
authored andcommitted
fix error in edit man page
1 parent 5446ba3 commit e37f732

File tree

3 files changed

+37
-34
lines changed

3 files changed

+37
-34
lines changed

doc/man/vaulted-edit.1

+23-19
Original file line numberDiff line numberDiff line change
@@ -22,26 +22,30 @@ m \- MFA
2222
Manages MFA (multi\-factor authentication) ARN or serial number. If enabled,
2323
user will be prompted to enter MFA code when accessing vault. MFA will
2424
remain active for the vault duration.
25-
.RE
26-
.PP
27-
If you are using STS credentials, which occurs by default (see the 't'
28-
option below for details), you must have MFA enabled to invoke any IAM calls.
29-
* r \- Role
3025
.br
31-
ARN of role to be assumed when accessing vault.
32-
When assuming a role, the maximum duration allowed by AWS is 1 hour. If your
33-
duration is greater than 1 hour when setting a role, the duration will be
34-
adjusted to 1 hour.
35-
* t \- Substitute with temporary credentials
26+
If you are using STS credentials, which occurs by default (see the 't'
27+
option below for details), you must have MFA enabled to invoke any IAM calls.
28+
.IP \(bu 2
29+
r \- Role
30+
.br
31+
ARN of role to be assumed when accessing vault.
32+
When assuming a role, the maximum duration allowed by AWS is 1 hour. If your
33+
duration is greater than 1 hour when setting a role, the duration will be
34+
adjusted to 1 hour.
35+
.IP \(bu 2
36+
t \- Substitute with temporary credentials
3637
.br
37-
Toggles whether your AWS credentials are substituted with a set of temporary
38-
credentials. For more details on this process, see the documentation for
39-
\fB\fCvaulted shell\fR\&.
40-
* S \- Show/Hide Key
38+
Toggles whether your AWS credentials are substituted with a set of temporary
39+
credentials. For more details on this process, see the documentation for
40+
\fB\fCvaulted shell\fR\&.
41+
.IP \(bu 2
42+
S \- Show/Hide Key
4143
.br
42-
Toggles whether Secret Access Key ID is displayed when viewing vault
43-
details in the edit menu. This setting only affects the current editing
44-
session and is reset to hidden each time the vault is reopened for editing.
45-
* D \- Delete
44+
Toggles whether Secret Access Key ID is displayed when viewing vault
45+
details in the edit menu. This setting only affects the current editing
46+
session and is reset to hidden each time the vault is reopened for editing.
47+
.IP \(bu 2
48+
D \- Delete
4649
.br
47-
Removes all AWS details stored in the vault.
50+
Removes all AWS details stored in the vault.
51+
.RE

doc/vaulted-edit.1.md

+2-3
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,7 @@ AWS KEY
2626
* m - MFA
2727
Manages MFA (multi-factor authentication) ARN or serial number. If enabled,
2828
user will be prompted to enter MFA code when accessing vault. MFA will
29-
remain active for the vault duration.
30-
29+
remain active for the vault duration.
3130
If you are using STS credentials, which occurs by default (see the 't'
3231
option below for details), you must have MFA enabled to invoke any IAM calls.
3332
* r - Role
@@ -44,4 +43,4 @@ AWS KEY
4443
details in the edit menu. This setting only affects the current editing
4544
session and is reset to hidden each time the vault is reopened for editing.
4645
* D - Delete
47-
Removes all AWS details stored in the vault.
46+
Removes all AWS details stored in the vault.

man.go

+12-12
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

0 commit comments

Comments
 (0)