From 57e1136b7e708b9365f7756c6cf506a6b483ea69 Mon Sep 17 00:00:00 2001 From: Matt Keeler Date: Mon, 3 Jun 2019 09:31:02 -0500 Subject: [PATCH] Fix acl.enable_key_list to be acl.enable_key_list_policy in docs (#5907) --- website/source/docs/agent/options.html.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/source/docs/agent/options.html.md b/website/source/docs/agent/options.html.md index 1772f5f7a5..36961e981d 100644 --- a/website/source/docs/agent/options.html.md +++ b/website/source/docs/agent/options.html.md @@ -573,7 +573,7 @@ default will automatically work with some tooling. a whitelist: any operation not specifically allowed is blocked. *Note*: this will not take effect until you've enabled ACLs. - * `enable_key_list` - Either "enabled" or "disabled", defaults to "disabled". When enabled, the `list` permission will be required on the prefix being recursively read from the KV store. Regardless of being enabled, the full set of KV entries under the prefix will be filtered to remove any entries that the request's ACL token does not grant at least read permissions. This option is only available in Consul 1.0 and newer. + * `enable_key_list_policy` - Either "enabled" or "disabled", defaults to "disabled". When enabled, the `list` permission will be required on the prefix being recursively read from the KV store. Regardless of being enabled, the full set of KV entries under the prefix will be filtered to remove any entries that the request's ACL token does not grant at least read permissions. This option is only available in Consul 1.0 and newer. * `enable_token_replication` - By default secondary Consul datacenters will perform replication of only ACL policies and roles.