Skip to content

Commit 63979d5

Browse files
authored
Merge pull request #493 from smallstep/carl/vale-zero
Zero vale errors
2 parents aa001c0 + e091393 commit 63979d5

30 files changed

Lines changed: 92 additions & 454 deletions

.github/mdl.config.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@
4040
"pattern": "^https://www.gnu.org"
4141
},
4242
{
43-
"pattern": "^https://freedesktop.org"
43+
"pattern": "^https://.*freedesktop.org"
4444
},
4545
{
4646
"pattern": "^https://www.hashicorp.com"

.github/workflows/link-check.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ jobs:
2727
- name: Check changed files only (PR)
2828
if: github.event_name == 'pull_request'
2929
run: |
30-
CHANGED_FILES=$(git diff --name-only origin/${{ github.base_ref }}...HEAD -- '*.mdx')
30+
CHANGED_FILES=$(git diff --name-only --diff-filter=ACMR origin/${{ github.base_ref }}...HEAD -- '*.mdx')
3131
if [ -z "$CHANGED_FILES" ]; then
3232
echo "No .mdx files changed"
3333
exit 0

.vale.ini

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,13 @@ Google.Exclamation = NO
4343
# Slang like "TL;DR" is acceptable in developer-focused technical documentation
4444
Google.Slang = NO
4545

46+
# "There is/There are" constructions are acceptable in technical documentation
47+
write-good.ThereIs = NO
48+
49+
# DateFormat matches version numbers like "10.0.15063" incorrectly
50+
Google.DateFormat = NO
51+
52+
4653
TokenIgnores = (@smallstep/[a-zA-Z0-9-]+), \
4754
(_[a-zA-Z0-9_]+_), \
4855
([a-zA-Z]+_[a-zA-Z_]+)

.vale/styles/Smallstep/Branding.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ message: "Use '%s' instead of '%s' for consistent branding."
33
level: error
44
ignorecase: false
55
swap:
6-
smallstep: Smallstep
76
Small Step: Smallstep
87
stepca: step-ca
98
Step-CA: step-ca

.vale/styles/config/vocabularies/Smallstep/accept.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -772,7 +772,6 @@ attestationRoots
772772
clientId
773773
complexify
774774
customappsso
775-
Emojivoto
776775
encryptedKey
777776
excludeIntermediate
778777
failover
@@ -948,3 +947,4 @@ organizationalUnit
948947
publicKey
949948
serialNumber
950949
testuser
950+
disallow

agent.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,8 @@
1-
Use vale for docs linting, ignoring auto-generated files in step-cli/reference
1+
Use vale for docs linting.
2+
When running vale, always ignore auto-generated files in step-cli/reference:
3+
4+
vale --no-wrap --glob='!step-cli/reference/**'
5+
26
DO NOT modify any auto-generated files inside step-cli/reference
37
Use markdown-link-check to check links
48
To preview the docs in a web browser, run `pnpm dev` inside the `smallstep.com` repo, which you may find in the parent directory. A server will open on https://localhost:5050

certificate-manager/acme-old.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ Automatically manage certificates on internal websites, servers, and the entire
2222
### About ACME
2323
At a high level, ACME is pretty simple. An ACME client creates an account with an ACME server and submits a certificate order. The server responds with a set of challenges for the client to complete to prove control over identifiers (domain names) in the certificate. Once the client successfully completes these challenges, it submits a certificate signing request (CSR) and the server issues a certificate.
2424

25-
The most interesting part of all of this is the challengewhere the client proves control over an identifier. No single standard way exists to "prove control" over an "identifier", so the core ACME specification makes this an extension point. Smallstep supports all the popular ACME challenges including DNS, HTTP, ALPN, IP, and EAB configurations.
25+
The most interesting part of all of this is the challengewhere the client proves control over an identifier. No single standard way exists to "prove control" over an "identifier", so the core ACME specification makes this an extension point. Smallstep supports all the popular ACME challenges including DNS, HTTP, ALPN, IP, and EAB configurations.
2626

2727
### ACME challenge verification
2828
When public ACME Certificate Authorities (CA) like Let's Encrypt issue certificates to clients in the Web PKI, the CA depends heavily on public DNS for client verification. To get a certificate, a client must prove to the CA that it either directly controls the public DNS records for a domain (for the DNS-01 challenge type) or controls the IP address pointed to by public DNS records (for the HTTP-01 and TLS-ALPN-01 challenge types).

certificate-manager/basic-ops.mdx

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ This tutorial covers:
2323
### Before you begin
2424
This tutorial assumes you have created a Smallstep Team and a Certificate Manager Authority using the steps in [Getting Started](./getting-started.mdx).
2525

26-
### Step 1 - Create a test certificate
26+
### 1.Create a test certificate
2727

2828
With an Authority created and your local client configured,
2929
you can create a test certificate by running the `step ca certificate` command.
@@ -43,7 +43,7 @@ In this command, we are asking the CA to create a certificate with the following
4343
When you run this command, it will envoke the `authority-admin` provisioner and start a single sign-on flow via the Smallstep console.
4444
After a successful sign-in, the authority will issue the certificate.
4545

46-
### Step 2 - Inspect a test certificate
46+
### 2. Inspect a test certificate
4747
You can inspect your certificate by running:
4848

4949
<CodeBlock language="shell-session" copyText="step certificate inspect --short myservice.crt">
@@ -63,7 +63,7 @@ X.509v3 TLS Certificate (ECDSA P-256) [Serial: 2441...2018]
6363
to: 2021-10-05T21:31:12Z
6464
```
6565

66-
### Step 3 - Renew a certificate
66+
### 3. Renew a certificate
6767
Certificates expire.
6868
Certificate Manager makes renewing a certificate ahead of expiration easy.
6969
Renewals are authenticated using your existing certificate and produce an identical certificate with a new serial number and extended lifetime.
@@ -92,7 +92,7 @@ X.509v3 TLS Certificate (ECDSA P-256) [Serial: 2441...2018]
9292
</CodeBlock>
9393

9494

95-
### Step 4 - Revoke a certificate
95+
### 4. Revoke a certificate
9696

9797
Certificate Manager DevOps Authorities use passive revocation and short-lived certificates by default.
9898
To passively revoke a certificate means to block its renewal at the CA.

certificate-manager/core-concepts.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ The Smallstep Platform is powered by a number of components that can be combined
99

1010
The components include:
1111

12-
- **[Authorities]()** Certificate or registration authorities powered by `step-ca`
13-
- **[Provisioners]()** Machinery for securely automating certificate issuance
14-
- **[Inventories]()** Catalogs of entities like hosts, services, and people for use with templates and provisioners
15-
- **[Templates]()** Customization of x.509 or SSH certificates for any use case
16-
- **[Events]()** Observability and alerting for certificate lifecycle activities
12+
- **[Authorities]()**: Certificate or registration authorities powered by `step-ca`
13+
- **[Provisioners]()**: Machinery for securely automating certificate issuance
14+
- **[Inventories]()**: Catalogs of entities like hosts, services, and people for use with templates and provisioners
15+
- **[Templates]()**: Customization of x.509 or SSH certificates for any use case
16+
- **[Events]()**: Observability and alerting for certificate lifecycle activities
1717

1818

1919
# Authorities

certificate-manager/how-it-works.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,7 @@ default for the `OIDC` provisioner).
157157
* This is an Advanced Authority feature
158158

159159
Some use cases demand an option to renew expired certificates.
160-
For example, intermittently-connected devices may not be able to reach the CA in time for a renewal.
160+
For example, intermittently connected devices may not be able to reach the CA in time for a renewal.
161161
The ability to renew expired certificates can be enabled on a per-provisioner basis.
162162
Enable it in the Smallstep console when you create a new provisioner,
163163
or on the command line for an existing provisioner.

0 commit comments

Comments
 (0)