Skip to content

Commit e5e3b62

Browse files
authored
Incorporated comments (#785)
1 parent 0babf6a commit e5e3b62

File tree

1 file changed

+24
-24
lines changed

1 file changed

+24
-24
lines changed

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 24 additions & 24 deletions
Original file line numberDiff line numberDiff line change
@@ -46,42 +46,42 @@ Catalog permissions::
4646
|`catalog.entity.read`
4747
|`catalog-entity`
4848
|`read`
49-
|Allows user or role to read from the catalog
49+
|Allows a user or role to read from the catalog
5050

5151
|`catalog.entity.create`
5252
|
5353
|`create`
54-
|Allows user or role to create catalog entities, including registering an existing component in the catalog
54+
|Allows a user or role to create catalog entities, including registering an existing component in the catalog
5555

5656
|`catalog.entity.refresh`
5757
|`catalog-entity`
5858
|`update`
59-
|Allows user or role to refresh a single or multiple entities from the catalog
59+
|Allows a user or role to refresh a single or multiple entities from the catalog
6060

6161
|`catalog.entity.delete`
6262
|`catalog-entity`
6363
|`delete`
64-
|Allows user or role to delete a single or multiple entities from the catalog
64+
|Allows a user or role to delete a single or multiple entities from the catalog
6565

6666
|`catalog.location.read`
6767
|
6868
|`read`
69-
|Allows user or role to read a single or multiple locations from the catalog
69+
|Allows a user or role to read a single or multiple locations from the catalog
7070

7171
|`catalog.location.create`
7272
|
7373
|`create`
74-
|Allows user or role to create locations within the catalog
74+
|Allows a user or role to create locations within the catalog
7575

7676
|`catalog.location.delete`
7777
|
7878
|`delete`
79-
|Allows user or role to delete locations from the catalog
79+
|Allows a user or role to delete locations from the catalog
8080
|===
8181

82-
Bulk import permissions::
82+
Bulk import permission::
8383

84-
.Bulk import permissions
84+
.Bulk import permission
8585
[cols="15%,25%,15%,45%", frame="all", options="header"]
8686
|===
8787
|Name
@@ -92,7 +92,7 @@ Bulk import permissions::
9292
|`bulk.import`
9393
|`bulk-import`
9494
|`use`
95-
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests.
95+
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests
9696

9797
|===
9898

@@ -114,27 +114,27 @@ Scaffolder permissions::
114114
|`scaffolder.template.parameter.read`
115115
|`scaffolder-template`
116116
|`read`
117-
|Allows user or role to read a single or multiple one parameters from a template
117+
|Allows a user or role to read a single or multiple one parameters from a template
118118

119119
|`scaffolder.template.step.read`
120120
|`scaffolder-template`
121121
|`read`
122-
|Allows user or role to read a single or multiple steps from a template
122+
|Allows a user or role to read a single or multiple steps from a template
123123

124124
|`scaffolder.task.create`
125125
|
126126
|`create`
127-
|Allows the user or role to trigger software templates which create new scaffolder tasks
127+
|Allows a user or role to trigger software templates which create new scaffolder tasks
128128

129129
|`scaffolder.task.cancel`
130130
|
131131
|`use`
132-
|Allows the user or role to cancel currently running scaffolder tasks
132+
|Allows a user or role to cancel currently running scaffolder tasks
133133

134134
|`scaffolder.task.read`
135135
|
136136
|`read`
137-
|Allows user or role to read all scaffolder tasks and their associated events and logs
137+
|Allows a user or role to read all scaffolder tasks and their associated events and logs
138138
|===
139139

140140
RBAC permissions::
@@ -150,22 +150,22 @@ RBAC permissions::
150150
|`policy.entity.read`
151151
|`policy-entity`
152152
|`read`
153-
|Allows user or role to read permission policies and roles
153+
|Allows a user or role to read permission policies and roles
154154

155155
|`policy.entity.create`
156156
|`policy-entity`
157157
|`create`
158-
|Allows user or role to create a single or multiple permission policies and roles
158+
|Allows a user or role to create a single or multiple permission policies and roles
159159

160160
|`policy.entity.update`
161161
|`policy-entity`
162162
|`update`
163-
|Allows user or role to update a single or multiple permission policies and roles
163+
|Allows a user or role to update a single or multiple permission policies and roles
164164

165165
|`policy.entity.delete`
166166
|`policy-entity`
167167
|`delete`
168-
|Allows user or role to delete a single or multiple permission policies and roles
168+
|Allows a user or role to delete a single or multiple permission policies and roles
169169
|===
170170

171171
Kubernetes permissions::
@@ -181,7 +181,7 @@ Kubernetes permissions::
181181
|`kubernetes.proxy`
182182
|
183183
|`use`
184-
|Allows user or role to access the proxy endpoint
184+
|Allows a user or role to access the proxy endpoint
185185
|===
186186

187187
OCM permissions::
@@ -218,12 +218,12 @@ conditions:
218218
|`ocm.entity.read`
219219
|
220220
|`read`
221-
|Allows user or role to read from the OCM plugin
221+
|Allows a user or role to read from the OCM plugin
222222

223223
|`ocm.cluster.read`
224224
|
225225
|`read`
226-
|Allows user or role to read the cluster information in the OCM plugin
226+
|Allows a user or role to read the cluster information in the OCM plugin
227227
|===
228228

229229
Topology permissions::
@@ -239,10 +239,10 @@ Topology permissions::
239239
|`topology.view.read`
240240
|
241241
|`read`
242-
|Allows user or role to view the topology plugin
242+
|Allows a user or role to view the topology plugin
243243

244244
|`kubernetes.proxy`
245245
|
246246
|`use`
247-
|Allows user or role to access the proxy endpoint, allowing them to read pod logs and events within {product-very-short}
247+
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
248248
|===

0 commit comments

Comments
 (0)