Added disambiguation that creation request can also update roles (#17371)
+ added disambiguation that creation request can also update roles
This commit is contained in:
parent
3a361e1e83
commit
b9bcd135e5
|
@ -71633,9 +71633,9 @@ declare var __webpack_require__: mixed;
|
|||
|
||||
function isHexCode(c) {
|
||||
return (
|
||||
(0x30 /* 0 */ <= c && c <= 0x39 /* 9 */) ||
|
||||
(0x41 /* A */ <= c && c <= 0x46 /* F */) ||
|
||||
(0x61 /* a */ <= c && c <= 0x66 /* f */)
|
||||
(0x30 /* 0 */ <= c && c <= 0x39) /* 9 */ ||
|
||||
(0x41 /* A */ <= c && c <= 0x46) /* F */ ||
|
||||
(0x61 /* a */ <= c && c <= 0x66) /* f */
|
||||
);
|
||||
}
|
||||
|
||||
|
@ -140682,9 +140682,8 @@ util.inherits(module.exports.ISO_8859_7, sbcs);
|
|||
DBCSCodec.prototype._setEncodeChar = function (uCode, dbcsCode) {
|
||||
var bucket = this._getEncodeBucket(uCode);
|
||||
var low = uCode & 0xff;
|
||||
if (bucket[low] <= SEQ_START)
|
||||
this.encodeTableSeq[SEQ_START - bucket[low]][DEF_CHAR] =
|
||||
dbcsCode; // There's already a sequence, set a single-char subsequence of it.
|
||||
if (bucket[low] <= SEQ_START) this.encodeTableSeq[SEQ_START - bucket[low]][DEF_CHAR] = dbcsCode;
|
||||
// There's already a sequence, set a single-char subsequence of it.
|
||||
else if (bucket[low] == UNASSIGNED) bucket[low] = dbcsCode;
|
||||
};
|
||||
|
||||
|
|
|
@ -14,7 +14,7 @@ This documentation assumes the AliCloud auth method is mounted at the `/auth/ali
|
|||
path in Vault. Since it is possible to enable auth methods at any location,
|
||||
please update your API calls accordingly.
|
||||
|
||||
## Create Role
|
||||
## Create/Update Role
|
||||
|
||||
Registers a role. Only entities using the role registered using this endpoint
|
||||
will be able to perform the login operation.
|
||||
|
|
|
@ -687,7 +687,7 @@ $ curl \
|
|||
http://127.0.0.1:8200/v1/auth/aws/config/tidy/roletag-denylist
|
||||
```
|
||||
|
||||
## Create Role
|
||||
## Create/Update Role
|
||||
|
||||
Registers a role in the method. Only those instances or principals which
|
||||
are using the role registered using this endpoint, will be able to perform
|
||||
|
|
|
@ -133,7 +133,7 @@ $ curl \
|
|||
https://127.0.0.1:8200/v1/auth/azure/rotate-root
|
||||
```
|
||||
|
||||
## Create Role
|
||||
## Create/Update Role
|
||||
|
||||
Registers a role in the method. Role types have specific entities
|
||||
that can perform login operations against this endpoint. Constraints specific
|
||||
|
|
|
@ -125,7 +125,7 @@ $ curl \
|
|||
http://127.0.0.1:8200/v1/auth/cf/config
|
||||
```
|
||||
|
||||
## Create Role
|
||||
## Create/Update Role
|
||||
|
||||
Create a role in Vault granting a particular level of access to a particular group
|
||||
of CF instances. We recommend using the CF API or the CF CLI to gain the IDs you
|
||||
|
|
|
@ -128,7 +128,7 @@ $ curl \
|
|||
}
|
||||
```
|
||||
|
||||
## Create Role
|
||||
## Create/Update Role
|
||||
|
||||
Registers a role in the method. Role types have specific entities
|
||||
that can perform login operations against this endpoint. Constraints specific
|
||||
|
|
|
@ -95,7 +95,7 @@ $ curl \
|
|||
}
|
||||
```
|
||||
|
||||
## Create Role
|
||||
## Create/Update Role
|
||||
|
||||
Registers a role in the method. Role types have specific entities
|
||||
that can perform login operations against this endpoint. Constraints specific
|
||||
|
|
|
@ -112,7 +112,7 @@ $ curl \
|
|||
}
|
||||
```
|
||||
|
||||
## Create Role
|
||||
## Create/Update Role
|
||||
|
||||
Registers a role in the auth method. Role types have specific entities
|
||||
that can perform login operations against this endpoint. Constraints specific
|
||||
|
|
|
@ -70,7 +70,7 @@ $ curl \
|
|||
}
|
||||
```
|
||||
|
||||
## Create Role
|
||||
## Create/Update Role
|
||||
|
||||
Create a Vault administrator role in the OCI Auth method.
|
||||
|
||||
|
|
Loading…
Reference in New Issue