Skip to content

Commit 7c29734

Browse files
committed
Fix code style
1 parent ce08445 commit 7c29734

File tree

2 files changed

+2
-2
lines changed

2 files changed

+2
-2
lines changed

specification/security/invalidate_token/SecurityInvalidateTokenRequest.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ import { Name, Username } from '@_types/common'
2525
* The access tokens returned by the get token API have a finite period of time for which they are valid.
2626
* After that time period, they can no longer be used.
2727
* The time period is defined by the `xpack.security.authc.token.timeout` setting.
28-
*
28+
*
2929
* The refresh tokens returned by the get token API are only valid for 24 hours. They can also be used exactly once.
3030
* If you want to invalidate one or more access or refresh tokens immediately, use this invalidate token API.
3131
* @rest_spec_name security.invalidate_token

specification/security/put_role_mapping/SecurityPutRoleMappingRequest.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ import { Metadata, Name, Refresh } from '@_types/common'
2727
* Role mappings define which roles are assigned to each user.
2828
* Each mapping has rules that identify users and a list of roles that are granted to those users.
2929
* The role mapping APIs are generally the preferred way to manage role mappings rather than using role mapping files. The create or update role mappings API cannot update role mappings that are defined in role mapping files.
30-
*
30+
*
3131
* This API does not create roles. Rather, it maps users to existing roles.
3232
* Roles can be created by using the create or update roles API or roles files.
3333
* @rest_spec_name security.put_role_mapping

0 commit comments

Comments
 (0)