From 0b686618bc9760bb1d70b8447228a8a942528032 Mon Sep 17 00:00:00 2001 From: kagarmoe Date: Fri, 23 Apr 2021 09:36:03 -0700 Subject: [PATCH] 'Use' not 'utilize' Signed-off-by: kagarmoe --- .../content/habitat/application_lifecycle_hooks.md | 2 +- .../docs-chef-io/content/habitat/environment_variables.md | 4 ++-- components/docs-chef-io/content/habitat/keys.md | 2 +- 3 files changed, 4 insertions(+), 4 deletions(-) diff --git a/components/docs-chef-io/content/habitat/application_lifecycle_hooks.md b/components/docs-chef-io/content/habitat/application_lifecycle_hooks.md index 0078ff5ae3..9ed12dc4c4 100644 --- a/components/docs-chef-io/content/habitat/application_lifecycle_hooks.md +++ b/components/docs-chef-io/content/habitat/application_lifecycle_hooks.md @@ -84,7 +84,7 @@ An `install` hook may be triggered by `hab pkg install` or by a Supervisor loadi The exit code returned from an `install` hook will be "remembered". If a previously installed package is either installed again via `hab pkg install` or loaded into a Supervisor, its `install` hook will be rerun if it previously failed (exited with a non `0` result) or has not been previously run (perhaps because `--ignore-install-hook` was passed to `hab pkg install`). -An `install` hook, unlike other hooks, will not have access to any census data exposed via binds or the `svc` namespace. Also, configuration in `svc_config_path` is not accessible to an `install` hook. If an `install` hook needs to utilize templated configuration files, templates located in the `svc_config_install_path` may be referenced. This location will contain rendered templates in a package's `config_install` folder. Finally, any configuration updates made during a service's runtime that would alter an `install` hook or any configuration template in `svc_config_install_path` will not cause a service to reload. +An `install` hook, unlike other hooks, will not have access to any census data exposed via binds or the `svc` namespace. Also, configuration in `svc_config_path` is not accessible to an `install` hook. If an `install` hook needs to use templated configuration files, templates located in the `svc_config_install_path` may be referenced. This location will contain rendered templates in a package's `config_install` folder. Finally, any configuration updates made during a service's runtime that would alter an `install` hook or any configuration template in `svc_config_install_path` will not cause a service to reload. ### reload diff --git a/components/docs-chef-io/content/habitat/environment_variables.md b/components/docs-chef-io/content/habitat/environment_variables.md index 390cbc84f0..8afbc3538b 100644 --- a/components/docs-chef-io/content/habitat/environment_variables.md +++ b/components/docs-chef-io/content/habitat/environment_variables.md @@ -41,8 +41,8 @@ This is a list of all environment variables that can be used to modify the opera | `HAB_STUDIO_NOSTUDIORC` | build system | no default | When set to a non-empty value, a `.studiorc` will not be sourced when entering an interactive Studio via `hab studio enter`. | | `HAB_STUDIO_SUP` | build system | no default | Used to customize the arguments passed to an automatically launched Supervisor, or to disable the automatic launching by setting it to `false`, `no`, or `0`. | | `HAB_GLYPH_STYLE` | build system | `full` (`limited` on Windows) | Used to customize the rendering of unicode glyphs in UI messages. Valid values are `full`, `limited`, or `ascii`. | -| `HAB_SUP_UPDATE_MS` | Supervisor | 60000 | Interval in milliseconds governing how often to check for Supervisor updates when running with the [--auto-update]({{< relref "habitat_cli/#hab-sup-run" >}}) flag. Note: This variable has been deprecated. Users should instead utilize the [--auto-update-period]({{< relref "habitat_cli/#hab-sup-run" >}}) flag. | -| `HAB_UPDATE_STRATEGY_FREQUENCY_MS` | Supervisor | 60000 | Interval in milliseconds governing how often to check for service updates when running with an [update strategy]({{< relref "service_updates" >}}). Note: This variable has been deprecated. Users should instead utilize the [--service-update-period]({{< relref "habitat_cli/#hab-sup-run" >}}) flag. | +| `HAB_SUP_UPDATE_MS` | Supervisor | 60000 | Interval in milliseconds governing how often to check for Supervisor updates when running with the [--auto-update]({{< relref "habitat_cli/#hab-sup-run" >}}) flag. Note: This variable has been deprecated. Users should instead use the [--auto-update-period]({{< relref "habitat_cli/#hab-sup-run" >}}) flag. | +| `HAB_UPDATE_STRATEGY_FREQUENCY_MS` | Supervisor | 60000 | Interval in milliseconds governing how often to check for service updates when running with an [update strategy]({{< relref "service_updates" >}}). Note: This variable has been deprecated. Users should instead use the [--service-update-period]({{< relref "habitat_cli/#hab-sup-run" >}}) flag. | | `HAB_USER` | Supervisor | no default | User key to use when running with [service group encryption]({{< relref "sup_secure" >}}) | | `http_proxy` | build system, Supervisor | no default | A URL for a local HTTP proxy server optionally supporting basic authentication | | `https_proxy` | build system, Supervisor | no default | A URL for a local HTTPS proxy server optionally supporting basic authentication | diff --git a/components/docs-chef-io/content/habitat/keys.md b/components/docs-chef-io/content/habitat/keys.md index 1e257a2a57..e9a8799b96 100644 --- a/components/docs-chef-io/content/habitat/keys.md +++ b/components/docs-chef-io/content/habitat/keys.md @@ -41,7 +41,7 @@ User and service group keys are used to set up trust relationships between these By default, service groups will trust *any* communication, so for a production deployment of Chef Habitat, setting up these relationships is essential. -User and service group keys also utilize asymmetric cryptography. To apply configuration changes to service groups when running in this mode, a user uses their own private key to encrypt configuration information for a service group, using that service group's public key. The service group then uses its private key to decrypt the configuration information, and the user's public key to verify. +User and service group keys also use asymmetric cryptography. To apply configuration changes to service groups when running in this mode, a user uses their own private key to encrypt configuration information for a service group, using that service group's public key. The service group then uses its private key to decrypt the configuration information, and the user's public key to verify. ## Ring Encryption Key