mirror of
https://github.com/hashicorp/vault.git
synced 2026-05-05 04:16:31 +02:00
Fix spelling errors (#3390)
This commit is contained in:
parent
b8082675e8
commit
b314c13882
@ -406,7 +406,7 @@ Returns the previously configured periodic whitelist tidying settings.
|
||||
|
||||
| Method | Path | Produces |
|
||||
| :------- | :--------------------------- | :--------------------- |
|
||||
| `GET` | `/auth/aws/config/tidy/identity-whitelist` | `200 applicaiton/json` |
|
||||
| `GET` | `/auth/aws/config/tidy/identity-whitelist` | `200 application/json` |
|
||||
|
||||
### Sample Request
|
||||
|
||||
@ -484,7 +484,7 @@ Returns the previously configured periodic blacklist tidying settings.
|
||||
|
||||
| Method | Path | Produces |
|
||||
| :------- | :--------------------------- | :--------------------- |
|
||||
| `GET` | `/auth/aws/config/tidy/roletag-blacklist` | `200 applicaiton/json` |
|
||||
| `GET` | `/auth/aws/config/tidy/roletag-blacklist` | `200 application/json` |
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
||||
@ -294,7 +294,7 @@ role must be created before queried.
|
||||
### Parameters
|
||||
|
||||
- `name` `(string: <required>)` – Specifies the name of the role to generate
|
||||
credentials againts. This is part of the request URL.
|
||||
credentials against. This is part of the request URL.
|
||||
|
||||
### Sample Request
|
||||
|
||||
|
||||
@ -197,7 +197,7 @@ This endpoint creates or updates a named role.
|
||||
|
||||
- `key_id_format` `(string: "")` – When supplied, this value specifies a custom
|
||||
format for the key id of a signed certificate. The following variables are
|
||||
availble for use: '{{token_display_name}}' - The display name of the token used
|
||||
available for use: '{{token_display_name}}' - The display name of the token used
|
||||
to make the request. '{{role_name}}' - The name of the role signing the request.
|
||||
'{{public_key_hash}}' - A SHA256 checksum of the public key that is being signed.
|
||||
e.g. "custom-keyid-{{token_display_name}}",
|
||||
|
||||
@ -263,7 +263,7 @@ This endpoint promotes the DR secondary cluster to DR primary. For data safety a
|
||||
security reasons, new secondary tokens will need to be issued to other
|
||||
secondaries, and there should never be more than one primary at a time.
|
||||
|
||||
If the DR secondary's primary cluster is also in a performace replication set,
|
||||
If the DR secondary's primary cluster is also in a performance replication set,
|
||||
the DR secondary will be promoted into that replication set. Care should be
|
||||
taken when promoting to ensure multiple performance primary clusters are not
|
||||
activate at the same time.
|
||||
|
||||
@ -38,7 +38,7 @@ $ vault write aws/config/root \
|
||||
```
|
||||
|
||||
*Note that `root` does not mean it needs to be your AWS account's root credentials, and it
|
||||
probably should not be. It is also unnecessary in many cases as Vault will use normal AWS credential mechanisms (instance profile, env vars, etc.) when possible. If you need to use static credentails, create an IAM user with permissions to manage IAM and STS.
|
||||
probably should not be. It is also unnecessary in many cases as Vault will use normal AWS credential mechanisms (instance profile, env vars, etc.) when possible. If you need to use static credentials, create an IAM user with permissions to manage IAM and STS.
|
||||
See below for the specific actions required.*
|
||||
|
||||
The following parameters are required:
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user