Skip to content

Commit c9413cb

Browse files
committed
More lint fixes
1 parent 02bd63d commit c9413cb

File tree

2 files changed

+0
-2
lines changed

2 files changed

+0
-2
lines changed

app/authzed/concepts/authzed-materialize/page.mdx

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,6 @@ In summary, AuthZed Materialize allows you to:
2525
## Limitations
2626

2727
- Your schema can contain any of the following, but they cannot be on the path of your configured Materialize permissions or it will throw an error:
28-
2928
- [Caveats]
3029
- [Wildcard] subject types
3130
- [.all intersections]

app/authzed/concepts/restricted-api-access/page.mdx

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -275,7 +275,6 @@ If you want to apply a configuration to an existing SpiceDB cluster without down
275275
2. Prepare the FGAM configuration YAML.
276276
You'll add the hashes that you generated in the previous step to the `hash` key in the `token` list for each respective token.
277277
This process heavily depends on what each client needs:
278-
279278
1. You may want to start with FGAM tokens bound to a admin-like Role, since that's what the original PSKs effectively were.
280279
This is probably lower risk, and then from there you can move to start trimming down permissions.
281280
2. Or you may want to move directly to downscoped tokens for your individual services, creating the tokens you need.

0 commit comments

Comments
 (0)