summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorKK Sriramadhesikan <kksriram@users.noreply.github.com>2017-10-05 08:42:39 -0700
committerKK Sriramadhesikan <kksriram@users.noreply.github.com>2017-10-05 08:44:08 -0700
commit526cd08e2297bfd6cabf9fc672d93a65306e0ad4 (patch)
treeb409a4afa58d7b75f235e3539e0a2bcd6122d400
parent65648f210eb4f3fb53d70f8500673a26cf6f8ab1 (diff)
Typos addressing @ericchiang comments
-rw-r--r--contributors/design-proposals/vault-based-kms-provider.md4
1 files changed, 2 insertions, 2 deletions
diff --git a/contributors/design-proposals/vault-based-kms-provider.md b/contributors/design-proposals/vault-based-kms-provider.md
index 86c123b2..097e2f13 100644
--- a/contributors/design-proposals/vault-based-kms-provider.md
+++ b/contributors/design-proposals/vault-based-kms-provider.md
@@ -182,7 +182,7 @@ minimum:
2. ``key-names`` list of names of the keys in Vault to be used. eg: key-name:
kube-secret-enc-key.
-Note : key name does not need to be changed if key is rotated in Vault, the
+Note : key name does not need to be changed if the key is rotated in Vault, the
rotated key is identified by key version which is prefix to ciphertext.
A new key can be added in the list. Encryption will be done using the first key
@@ -250,7 +250,7 @@ Here's a sample configuration file using a Vault AppRole for authentication.
The KEK is generated in Vault and rotated using direct API call or CLI to Vault
itself. The Key never leaves the vault.
-Note that when a key is rotated, Vault does not allow to choose a different
+Note that when a key is rotated, Vault does not allow choosing a different
encryption algorithm or key size. If a key for different encryption algorithm or
a different key size is desired, new key needs to be generated in Vault and the
corresponding key name be added in the configuration. Subsequent encryption will