You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests.
95
+
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests
96
96
97
97
|===
98
98
@@ -114,27 +114,27 @@ Scaffolder permissions::
114
114
|`scaffolder.template.parameter.read`
115
115
|`scaffolder-template`
116
116
|`read`
117
-
|Allows user or role to read a single or multiple one parameters from a template
117
+
|Allows a user or role to read a single or multiple one parameters from a template
118
118
119
119
|`scaffolder.template.step.read`
120
120
|`scaffolder-template`
121
121
|`read`
122
-
|Allows user or role to read a single or multiple steps from a template
122
+
|Allows a user or role to read a single or multiple steps from a template
123
123
124
124
|`scaffolder.task.create`
125
125
|
126
126
|`create`
127
-
|Allows the user or role to trigger software templates which create new scaffolder tasks
127
+
|Allows a user or role to trigger software templates which create new scaffolder tasks
128
128
129
129
|`scaffolder.task.cancel`
130
130
|
131
131
|`use`
132
-
|Allows the user or role to cancel currently running scaffolder tasks
132
+
|Allows a user or role to cancel currently running scaffolder tasks
133
133
134
134
|`scaffolder.task.read`
135
135
|
136
136
|`read`
137
-
|Allows user or role to read all scaffolder tasks and their associated events and logs
137
+
|Allows a user or role to read all scaffolder tasks and their associated events and logs
138
138
|===
139
139
140
140
RBAC permissions::
@@ -150,22 +150,22 @@ RBAC permissions::
150
150
|`policy.entity.read`
151
151
|`policy-entity`
152
152
|`read`
153
-
|Allows user or role to read permission policies and roles
153
+
|Allows a user or role to read permission policies and roles
154
154
155
155
|`policy.entity.create`
156
156
|`policy-entity`
157
157
|`create`
158
-
|Allows user or role to create a single or multiple permission policies and roles
158
+
|Allows a user or role to create a single or multiple permission policies and roles
159
159
160
160
|`policy.entity.update`
161
161
|`policy-entity`
162
162
|`update`
163
-
|Allows user or role to update a single or multiple permission policies and roles
163
+
|Allows a user or role to update a single or multiple permission policies and roles
164
164
165
165
|`policy.entity.delete`
166
166
|`policy-entity`
167
167
|`delete`
168
-
|Allows user or role to delete a single or multiple permission policies and roles
168
+
|Allows a user or role to delete a single or multiple permission policies and roles
169
169
|===
170
170
171
171
Kubernetes permissions::
@@ -181,7 +181,7 @@ Kubernetes permissions::
181
181
|`kubernetes.proxy`
182
182
|
183
183
|`use`
184
-
|Allows user or role to access the proxy endpoint
184
+
|Allows a user or role to access the proxy endpoint
185
185
|===
186
186
187
187
OCM permissions::
@@ -218,12 +218,12 @@ conditions:
218
218
|`ocm.entity.read`
219
219
|
220
220
|`read`
221
-
|Allows user or role to read from the OCM plugin
221
+
|Allows a user or role to read from the OCM plugin
222
222
223
223
|`ocm.cluster.read`
224
224
|
225
225
|`read`
226
-
|Allows user or role to read the cluster information in the OCM plugin
226
+
|Allows a user or role to read the cluster information in the OCM plugin
227
227
|===
228
228
229
229
Topology permissions::
@@ -239,10 +239,10 @@ Topology permissions::
239
239
|`topology.view.read`
240
240
|
241
241
|`read`
242
-
|Allows user or role to view the topology plugin
242
+
|Allows a user or role to view the topology plugin
243
243
244
244
|`kubernetes.proxy`
245
245
|
246
246
|`use`
247
-
|Allows user or role to access the proxy endpoint, allowing them to read pod logs and events within {product-very-short}
247
+
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
0 commit comments