From e293045751ecc2b8979bc7bc06fcad7617f0ee29 Mon Sep 17 00:00:00 2001 From: Lowe Schmidt Date: Mon, 11 Mar 2019 16:25:19 +0100 Subject: [PATCH] Typo fix (segement > segment) (#5469) --- website/source/docs/agent/acl-rules.html.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/website/source/docs/agent/acl-rules.html.md b/website/source/docs/agent/acl-rules.html.md index 064ddb7705..290f854763 100644 --- a/website/source/docs/agent/acl-rules.html.md +++ b/website/source/docs/agent/acl-rules.html.md @@ -41,7 +41,7 @@ Policies can have several control levels: * `read`: allow the resource to be read but not modified. * `write`: allow the resource to be read and modified. * `deny`: do not allow the resource to be read or modified. -* `list`: allows access to all the keys under a segement in the Consul KV. Note, this policy can only be used with the `key_prefix` resource and [`acl.enabled_key_list_policy`](https://www.consul.io/docs/guides/acl.html#list-policy-for-keys) must be set to true. +* `list`: allows access to all the keys under a segment in the Consul KV. Note, this policy can only be used with the `key_prefix` resource and [`acl.enabled_key_list_policy`](https://www.consul.io/docs/guides/acl.html#list-policy-for-keys) must be set to true. When using prefix-based rules, the most specific prefix match determines the action. This allows for flexible rules like an empty prefix to allow read-only access to all