Skip to content

Commit d9cdd91

Browse files
Removed anthropomorphism and extra heading title (#1375)
Co-authored-by: Priyanka Abel <[email protected]>
1 parent 499de50 commit d9cdd91

File tree

1 file changed

+32
-41
lines changed

1 file changed

+32
-41
lines changed

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 32 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -35,7 +35,6 @@ g, user:default/myuser, role:default/myrole
3535

3636
Catalog permissions::
3737

38-
.Catalog permissions
3938
[cols="15%,25%,15%,45%", frame="all", options="header"]
4039
|===
4140
|Name
@@ -46,42 +45,41 @@ Catalog permissions::
4645
|`catalog.entity.read`
4746
|`catalog-entity`
4847
|`read`
49-
|Allows a user or role to read from the catalog
48+
|Enables a user or role to read from the catalog
5049

5150
|`catalog.entity.create`
5251
|
5352
|`create`
54-
|Allows a user or role to create catalog entities, including registering an existing component in the catalog
53+
|Enables a user or role to create catalog entities, including registering an existing component in the catalog
5554

5655
|`catalog.entity.refresh`
5756
|`catalog-entity`
5857
|`update`
59-
|Allows a user or role to refresh a single or multiple entities from the catalog
58+
|Enables a user or role to refresh a single or multiple entities from the catalog
6059

6160
|`catalog.entity.delete`
6261
|`catalog-entity`
6362
|`delete`
64-
|Allows a user or role to delete a single or multiple entities from the catalog
63+
|Enables a user or role to delete a single or multiple entities from the catalog
6564

6665
|`catalog.location.read`
6766
|
6867
|`read`
69-
|Allows a user or role to read a single or multiple locations from the catalog
68+
|Enables a user or role to read a single or multiple locations from the catalog
7069

7170
|`catalog.location.create`
7271
|
7372
|`create`
74-
|Allows a user or role to create locations within the catalog
73+
|Enables a user or role to create locations within the catalog
7574

7675
|`catalog.location.delete`
7776
|
7877
|`delete`
79-
|Allows a user or role to delete locations from the catalog
78+
|Enables a user or role to delete locations from the catalog
8079
|===
8180

8281
Bulk import permission::
8382

84-
.Bulk import permission
8583
[cols="15%,25%,15%,45%", frame="all", options="header"]
8684
|===
8785
|Name
@@ -92,13 +90,12 @@ Bulk import permission::
9290
|`bulk.import`
9391
|`bulk-import`
9492
|`use`
95-
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests
93+
|Enables the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests
9694

9795
|===
9896

9997
Scaffolder permissions::
10098

101-
.Scaffolder permissions
10299
[cols="15%,25%,15%,45%", frame="all", options="header"]
103100
|===
104101
|Name
@@ -109,42 +106,41 @@ Scaffolder permissions::
109106
|`scaffolder.action.execute`
110107
|`scaffolder-action`
111108
|`use`
112-
|Allows the execution of an action from a template
109+
|Enables the execution of an action from a template
113110

114111
|`scaffolder.template.parameter.read`
115112
|`scaffolder-template`
116113
|`read`
117-
|Allows a user or role to read a single or multiple one parameters from a template
114+
|Enables a user or role to read a single or multiple one parameters from a template
118115

119116
|`scaffolder.template.step.read`
120117
|`scaffolder-template`
121118
|`read`
122-
|Allows a user or role to read a single or multiple steps from a template
119+
|Enables a user or role to read a single or multiple steps from a template
123120

124121
|`scaffolder.task.create`
125122
|
126123
|`create`
127-
|Allows a user or role to trigger software templates which create new scaffolder tasks
124+
|Enables a user or role to trigger software templates which create new scaffolder tasks
128125

129126
|`scaffolder.task.cancel`
130127
|
131128
|`use`
132-
|Allows a user or role to cancel currently running scaffolder tasks
129+
|Enables a user or role to cancel currently running scaffolder tasks
133130

134131
|`scaffolder.task.read`
135132
|
136133
|`read`
137-
|Allows a user or role to read all scaffolder tasks and their associated events and logs
134+
|Enables a user or role to read all scaffolder tasks and their associated events and logs
138135

139136
|`scaffolder.template.management`
140137
|
141138
|`use`
142-
|Allows a user or role to access frontend template management features, including editing, previewing, and trying templates, forms, and custom fields.
139+
|Enables a user or role to access frontend template management features, including editing, previewing, and trying templates, forms, and custom fields.
143140
|===
144141

145142
RBAC permissions::
146143

147-
.RBAC permissions
148144
[cols="15%,25%,15%,45%", frame="all", options="header"]
149145
|===
150146
|Name
@@ -155,27 +151,26 @@ RBAC permissions::
155151
|`policy.entity.read`
156152
|`policy-entity`
157153
|`read`
158-
|Allows a user or role to read permission policies and roles
154+
|Enables a user or role to read permission policies and roles
159155

160156
|`policy.entity.create`
161157
|
162158
|`create`
163-
|Allows a user or role to create a single or multiple permission policies and roles
159+
|Enables a user or role to create a single or multiple permission policies and roles
164160

165161
|`policy.entity.update`
166162
|`policy-entity`
167163
|`update`
168-
|Allows a user or role to update a single or multiple permission policies and roles
164+
|Enables a user or role to update a single or multiple permission policies and roles
169165

170166
|`policy.entity.delete`
171167
|`policy-entity`
172168
|`delete`
173-
|Allows a user or role to delete a single or multiple permission policies and roles
169+
|Enables a user or role to delete a single or multiple permission policies and roles
174170
|===
175171

176172
Kubernetes permissions::
177173

178-
.Kubernetes permissions
179174
[cols="15%,25%,15%,45%", frame="all", options="header"]
180175
|===
181176
|Name
@@ -186,17 +181,17 @@ Kubernetes permissions::
186181
|`kubernetes.clusters.read`
187182
|
188183
|`read`
189-
|Allows a user to read Kubernetes cluster details under the `/clusters` path
184+
|Enables a user to read Kubernetes cluster details under the `/clusters` path
190185

191186
|`kubernetes.resources.read`
192187
|
193188
|`read`
194-
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
189+
|Enables a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
195190

196191
|`kubernetes.proxy`
197192
|
198193
|`use`
199-
|Allows a user or role to access the proxy endpoint
194+
|Enables a user or role to access the proxy endpoint
200195
|===
201196

202197
OCM permissions::
@@ -233,17 +228,16 @@ conditions:
233228
|`ocm.entity.read`
234229
|
235230
|`read`
236-
|Allows a user or role to read from the OCM plugin
231+
|Enables a user or role to read from the OCM plugin
237232

238233
|`ocm.cluster.read`
239234
|
240235
|`read`
241-
|Allows a user or role to read the cluster information in the OCM plugin
236+
|Enables a user or role to read the cluster information in the OCM plugin
242237
|===
243238

244239
Topology permissions::
245240

246-
.Topology permissions
247241
[cols="15%,25%,15%,45%", frame="all", options="header"]
248242
|===
249243
|Name
@@ -254,23 +248,22 @@ Topology permissions::
254248
|`kubernetes.clusters.read`
255249
|
256250
|`read`
257-
|Allows a user to read Kubernetes cluster details under the `/clusters` path
251+
|Enables a user to read Kubernetes cluster details under the `/clusters` path
258252

259253
|`kubernetes.resources.read`
260254
|
261255
|`read`
262-
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
256+
|Enables a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
263257

264258
|`kubernetes.proxy`
265259
|
266260
|`use`
267-
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
261+
|Enables a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
268262
|===
269263

270264

271265
Tekton permissions::
272266

273-
.Tekton permissions
274267
[cols="15%,25%,15%,45%", frame="all", options="header"]
275268
|===
276269
|Name
@@ -281,23 +274,22 @@ Tekton permissions::
281274
|`kubernetes.clusters.read`
282275
|
283276
|`read`
284-
|Allows a user to read Kubernetes cluster details under the `/clusters` path
277+
|Enables a user to read Kubernetes cluster details under the `/clusters` path
285278

286279
|`kubernetes.resources.read`
287280
|
288281
|`read`
289-
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
282+
|Enables a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
290283

291284
|`kubernetes.proxy`
292285
|
293286
|`use`
294-
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
287+
|Enables a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
295288
|===
296289

297290

298291
ArgoCD permissions::
299292

300-
.ArgoCD permissions
301293
[cols="15%,25%,15%,45%", frame="all", options="header"]
302294
|===
303295
|Name
@@ -308,13 +300,12 @@ ArgoCD permissions::
308300
|`argocd.view.read`
309301
|
310302
|`read`
311-
|Allows a user to read from the ArgoCD plugin
303+
|Enables a user to read from the ArgoCD plugin
312304
|===
313305

314306

315307
Quay permissions::
316308

317-
.Quay permissions
318309
[cols="15%,25%,15%,45%", frame="all", options="header"]
319310
|===
320311
|Name
@@ -325,5 +316,5 @@ Quay permissions::
325316
|`quay.view.read`
326317
|
327318
|`read`
328-
|Allows a user to read from the Quay plugin
319+
|Enables a user to read from the Quay plugin
329320
|===

0 commit comments

Comments
 (0)