From 5863adf994b6491567971d2699449daad04e7f8e Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Antoine=20Beaupr=C3=A9?= <anarcat@debian.org>
Date: Mon, 9 Nov 2020 17:01:57 -0500
Subject: [PATCH] word wrap

---
 policy/tpa-rfc-7-root.md | 7 ++++---
 1 file changed, 4 insertions(+), 3 deletions(-)

diff --git a/policy/tpa-rfc-7-root.md b/policy/tpa-rfc-7-root.md
index a7e1494e..9e3100e3 100644
--- a/policy/tpa-rfc-7-root.md
+++ b/policy/tpa-rfc-7-root.md
@@ -18,9 +18,10 @@ There are multiple possible access levels, often conflated:
     their SSH keys authorized to the root user (through Puppet, in the
     `profile::admins::keys` Hiera field)
  2. `sudo` to root: user has access to the `root` user through `sudo`,
-    using their `sudoPassword` defined in LDAP3. Puppet access: by virtue of being able to push to the Puppet git
-    repository, an admin necessarily gets `root` access everywhere,
-    because Puppet runs as root everywhere
+    using their `sudoPassword` defined in LDAP3. Puppet access: by
+    virtue of being able to push to the Puppet git repository, an
+    admin necessarily gets `root` access everywhere, because Puppet
+    runs as root everywhere
  4. LDAP admin: a user member of the `adm` group in LDAP also gets
     access everywhere through `sudo`, but also through being able to
     impersonate or modify other users in LDAP
-- 
GitLab