diff --git a/command/auth_enable.go b/command/auth_enable.go index 6f0590ffdb..796757239a 100644 --- a/command/auth_enable.go +++ b/command/auth_enable.go @@ -114,14 +114,14 @@ func (c *AuthEnableCommand) Flags() *FlagSets { f.StringSliceVar(&StringSliceVar{ Name: flagNameAuditNonHMACRequestKeys, Target: &c.flagAuditNonHMACRequestKeys, - Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit" + + Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit " + "devices in the request data object.", }) f.StringSliceVar(&StringSliceVar{ Name: flagNameAuditNonHMACResponseKeys, Target: &c.flagAuditNonHMACResponseKeys, - Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit" + + Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit " + "devices in the response data object.", }) diff --git a/command/auth_tune.go b/command/auth_tune.go index 4a00a422ba..cfb44c3048 100644 --- a/command/auth_tune.go +++ b/command/auth_tune.go @@ -58,14 +58,14 @@ func (c *AuthTuneCommand) Flags() *FlagSets { f.StringSliceVar(&StringSliceVar{ Name: flagNameAuditNonHMACRequestKeys, Target: &c.flagAuditNonHMACRequestKeys, - Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit" + + Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit " + "devices in the request data object.", }) f.StringSliceVar(&StringSliceVar{ Name: flagNameAuditNonHMACResponseKeys, Target: &c.flagAuditNonHMACResponseKeys, - Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit" + + Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit " + "devices in the response data object.", }) @@ -83,14 +83,14 @@ func (c *AuthTuneCommand) Flags() *FlagSets { f.StringVar(&StringVar{ Name: flagNameDescription, Target: &c.flagDescription, - Usage: "Human-friendly description of the this auth method. This overrides" + + Usage: "Human-friendly description of the this auth method. This overrides " + "the current stored value, if any.", }) f.StringVar(&StringVar{ Name: flagNameListingVisibility, Target: &c.flagListingVisibility, - Usage: "Determines the visibility of the mount in the UI-specific listing" + + Usage: "Determines the visibility of the mount in the UI-specific listing " + "endpoint.", }) diff --git a/command/secrets_enable.go b/command/secrets_enable.go index aceced3f63..8b0fdb3458 100644 --- a/command/secrets_enable.go +++ b/command/secrets_enable.go @@ -121,14 +121,14 @@ func (c *SecretsEnableCommand) Flags() *FlagSets { f.StringSliceVar(&StringSliceVar{ Name: flagNameAuditNonHMACRequestKeys, Target: &c.flagAuditNonHMACRequestKeys, - Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit" + + Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit " + "devices in the request data object.", }) f.StringSliceVar(&StringSliceVar{ Name: flagNameAuditNonHMACResponseKeys, Target: &c.flagAuditNonHMACResponseKeys, - Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit" + + Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit " + "devices in the response data object.", }) diff --git a/command/secrets_tune.go b/command/secrets_tune.go index 12f8305101..3465b4995b 100644 --- a/command/secrets_tune.go +++ b/command/secrets_tune.go @@ -57,14 +57,14 @@ func (c *SecretsTuneCommand) Flags() *FlagSets { f.StringSliceVar(&StringSliceVar{ Name: flagNameAuditNonHMACRequestKeys, Target: &c.flagAuditNonHMACRequestKeys, - Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit" + + Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit " + "devices in the request data object.", }) f.StringSliceVar(&StringSliceVar{ Name: flagNameAuditNonHMACResponseKeys, Target: &c.flagAuditNonHMACResponseKeys, - Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit" + + Usage: "Comma-separated string or list of keys that will not be HMAC'd by audit " + "devices in the response data object.", }) @@ -82,14 +82,14 @@ func (c *SecretsTuneCommand) Flags() *FlagSets { f.StringVar(&StringVar{ Name: flagNameDescription, Target: &c.flagDescription, - Usage: "Human-friendly description of this secret engine. This overrides the" + + Usage: "Human-friendly description of this secret engine. This overrides the " + "current stored value, if any.", }) f.StringVar(&StringVar{ Name: flagNameListingVisibility, Target: &c.flagListingVisibility, - Usage: "Determines the visibility of the mount in the UI-specific listing" + + Usage: "Determines the visibility of the mount in the UI-specific listing " + "endpoint.", }) diff --git a/command/token_create.go b/command/token_create.go index 99aa796f7d..7c454ff9ba 100644 --- a/command/token_create.go +++ b/command/token_create.go @@ -85,7 +85,7 @@ func (c *TokenCreateCommand) Flags() *FlagSets { Target: &c.flagTTL, Completion: complete.PredictAnything, Usage: "Initial TTL to associate with the token. Token renewals may be " + - "able to extend beyond this value, depending on the configured maximum" + + "able to extend beyond this value, depending on the configured maximum " + "TTLs. This is specified as a numeric string with suffix like \"30s\" " + "or \"5m\".", })