secrets/azure: fix API docs rendering of code block (#13245)

This commit is contained in:
Austin Gebauer
2021-11-23 22:38:06 -08:00
committed by GitHub
parent 1cd90b5902
commit a85ef11094

View File

@@ -39,8 +39,8 @@ service principals. Environment variables will override any parameters set in th
- `use_microsoft_graph_api` `(bool: false)` - Indicates whether the secrets engine should use the - `use_microsoft_graph_api` `(bool: false)` - Indicates whether the secrets engine should use the
[Microsoft Graph API](https://docs.microsoft.com/en-us/graph/use-the-api). If set to false, this will use the Azure [Microsoft Graph API](https://docs.microsoft.com/en-us/graph/use-the-api). If set to false, this will use the Azure
Active Directory API which is being [retired by Microsoft and will be removed in 2022](https://docs.microsoft.com/en-us/graph/migrate-azure-ad-graph-faq). Active Directory API which is being [retired by Microsoft and will be removed in 2022](https://docs.microsoft.com/en-us/graph/migrate-azure-ad-graph-faq).
- `root_password_ttl` `(string: 182d)` - Specifies how long the root password is valid for in Azure when - `root_password_ttl` `(string: 182d)` - Specifies how long the root password is valid for in Azure when
rotate-root generates a new client secret. This can be either a number of seconds or a time formatted rotate-root generates a new client secret. This can be either a number of seconds or a time formatted
duration (ex: 24h, 48d). duration (ex: 24h, 48d).
If set to true, the user specified via the `client_id` and `client_secret` will need to have the following permissions If set to true, the user specified via the `client_id` and `client_secret` will need to have the following permissions
@@ -168,11 +168,11 @@ $ vault delete azure/config
## Rotate Root ## Rotate Root
This endpoint generates a new client secret for the root account defined in the config. The This endpoint generates a new client secret for the root account defined in the config. The
value generated will only be known by Vault. value generated will only be known by Vault.
~> Due to the eventual consistency of Microsoft Azure client secret APIs, the plugin ~> Due to the eventual consistency of Microsoft Azure client secret APIs, the plugin
may briefly stop authenticating to Azure as the password propagates through their may briefly stop authenticating to Azure as the password propagates through their
datacenters. datacenters.
| Method | Path | | Method | Path |
@@ -190,6 +190,7 @@ $ curl \
--header "X-Vault-Token: ..." \ --header "X-Vault-Token: ..." \
--request POST \ --request POST \
http://127.0.0.1:8200/v1/azure/rotate-root http://127.0.0.1:8200/v1/azure/rotate-root
```
## Create/Update Role ## Create/Update Role