From 79d804c5b4af50a0fd73db17d2522d6a6b45c9ca Mon Sep 17 00:00:00 2001 From: Serge Logvinov Date: Sun, 2 May 2021 12:03:55 +0300 Subject: [PATCH] docs: fix typos Fix yaml key systemDisksEncryption -> systemDiskEncryption Signed-off-by: Serge Logvinov --- .../docs/v0.10/Guides/disk-encryption.md | 24 +++++++++---------- .../docs/v0.11/Guides/disk-encryption.md | 24 +++++++++---------- .../docs/v0.9/Guides/disk-encryption.md | 18 +++++++------- 3 files changed, 33 insertions(+), 33 deletions(-) diff --git a/website/content/docs/v0.10/Guides/disk-encryption.md b/website/content/docs/v0.10/Guides/disk-encryption.md index 7fe02281b7..04b3fbfd8f 100644 --- a/website/content/docs/v0.10/Guides/disk-encryption.md +++ b/website/content/docs/v0.10/Guides/disk-encryption.md @@ -32,15 +32,15 @@ To enable disk encryption you should modify the machine configuration with the f ```yaml machine: ... - systemDisksEncryption: + systemDiskEncryption: ephemeral: keys: - - nodeID: - keySlot: 0 + - nodeID: {} + slot: 0 state: keys: - - nodeID: - keySlot: 0 + - nodeID: {} + slot: 0 ``` ### Encryption Keys @@ -52,21 +52,21 @@ LUKS2 supports up to 32 encryption keys and it is possible to specify all of the Talos always tries to sync the keys list defined in the machine config with the actual keys defined for the LUKS2 partition. So if you update the keys list you should have at least one key that is not changed to be used for keys management. -When you define a key you should specify the key kind and the `keySlot`: +When you define a key you should specify the key kind and the `slot`: ```yaml machine: ... state: keys: - - nodeID: # key kind - keySlot: 1 + - nodeID: {} # key kind + slot: 1 ephemeral: keys: - static: passphrase: supersecret - keySlot: 0 + slot: 0 ``` Take a note that key order does not play any role on which key slot is used. @@ -95,10 +95,10 @@ machine: keys: - static: passphrase: oldkey - keySlot: 0 + slot: 0 - static: passphrase: newkey - keySlot: 1 + slot: 1 ... ``` @@ -117,7 +117,7 @@ machine: keys: - static: passphrase: newkey - keySlot: 1 + slot: 1 ... ``` diff --git a/website/content/docs/v0.11/Guides/disk-encryption.md b/website/content/docs/v0.11/Guides/disk-encryption.md index 7fe02281b7..04b3fbfd8f 100644 --- a/website/content/docs/v0.11/Guides/disk-encryption.md +++ b/website/content/docs/v0.11/Guides/disk-encryption.md @@ -32,15 +32,15 @@ To enable disk encryption you should modify the machine configuration with the f ```yaml machine: ... - systemDisksEncryption: + systemDiskEncryption: ephemeral: keys: - - nodeID: - keySlot: 0 + - nodeID: {} + slot: 0 state: keys: - - nodeID: - keySlot: 0 + - nodeID: {} + slot: 0 ``` ### Encryption Keys @@ -52,21 +52,21 @@ LUKS2 supports up to 32 encryption keys and it is possible to specify all of the Talos always tries to sync the keys list defined in the machine config with the actual keys defined for the LUKS2 partition. So if you update the keys list you should have at least one key that is not changed to be used for keys management. -When you define a key you should specify the key kind and the `keySlot`: +When you define a key you should specify the key kind and the `slot`: ```yaml machine: ... state: keys: - - nodeID: # key kind - keySlot: 1 + - nodeID: {} # key kind + slot: 1 ephemeral: keys: - static: passphrase: supersecret - keySlot: 0 + slot: 0 ``` Take a note that key order does not play any role on which key slot is used. @@ -95,10 +95,10 @@ machine: keys: - static: passphrase: oldkey - keySlot: 0 + slot: 0 - static: passphrase: newkey - keySlot: 1 + slot: 1 ... ``` @@ -117,7 +117,7 @@ machine: keys: - static: passphrase: newkey - keySlot: 1 + slot: 1 ... ``` diff --git a/website/content/docs/v0.9/Guides/disk-encryption.md b/website/content/docs/v0.9/Guides/disk-encryption.md index 7fe02281b7..a35b228ff7 100644 --- a/website/content/docs/v0.9/Guides/disk-encryption.md +++ b/website/content/docs/v0.9/Guides/disk-encryption.md @@ -32,15 +32,15 @@ To enable disk encryption you should modify the machine configuration with the f ```yaml machine: ... - systemDisksEncryption: + systemDiskEncryption: ephemeral: keys: - - nodeID: - keySlot: 0 + - nodeID: {} + slot: 0 state: keys: - - nodeID: - keySlot: 0 + - nodeID: {} + slot: 0 ``` ### Encryption Keys @@ -52,21 +52,21 @@ LUKS2 supports up to 32 encryption keys and it is possible to specify all of the Talos always tries to sync the keys list defined in the machine config with the actual keys defined for the LUKS2 partition. So if you update the keys list you should have at least one key that is not changed to be used for keys management. -When you define a key you should specify the key kind and the `keySlot`: +When you define a key you should specify the key kind and the `slot`: ```yaml machine: ... state: keys: - - nodeID: # key kind - keySlot: 1 + - nodeID: {} # key kind + slot: 1 ephemeral: keys: - static: passphrase: supersecret - keySlot: 0 + slot: 0 ``` Take a note that key order does not play any role on which key slot is used.