Skip to content

Commit ef02d43

Browse files
authored
Removed anthropomorphism and extra heading title (#1372)
1 parent 82e2ecb commit ef02d43

File tree

1 file changed

+32
-41
lines changed

1 file changed

+32
-41
lines changed

modules/authorization/ref-rbac-permission-policies.adoc

Lines changed: 32 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,6 @@ g, user:default/myuser, role:default/myrole
3737

3838
Catalog permissions::
3939

40-
.Catalog permissions
4140
[cols="15%,25%,15%,45%", frame="all", options="header"]
4241
|===
4342
|Name
@@ -48,42 +47,41 @@ Catalog permissions::
4847
|`catalog.entity.read`
4948
|`catalog-entity`
5049
|`read`
51-
|Allows a user or role to read from the catalog
50+
|Enables a user or role to read from the catalog
5251

5352
|`catalog.entity.create`
5453
|
5554
|`create`
56-
|Allows a user or role to create catalog entities, including registering an existing component in the catalog
55+
|Enables a user or role to create catalog entities, including registering an existing component in the catalog
5756

5857
|`catalog.entity.refresh`
5958
|`catalog-entity`
6059
|`update`
61-
|Allows a user or role to refresh a single or multiple entities from the catalog
60+
|Enables a user or role to refresh a single or multiple entities from the catalog
6261

6362
|`catalog.entity.delete`
6463
|`catalog-entity`
6564
|`delete`
66-
|Allows a user or role to delete a single or multiple entities from the catalog
65+
|Enables a user or role to delete a single or multiple entities from the catalog
6766

6867
|`catalog.location.read`
6968
|
7069
|`read`
71-
|Allows a user or role to read a single or multiple locations from the catalog
70+
|Enables a user or role to read a single or multiple locations from the catalog
7271

7372
|`catalog.location.create`
7473
|
7574
|`create`
76-
|Allows a user or role to create locations within the catalog
75+
|Enables a user or role to create locations within the catalog
7776

7877
|`catalog.location.delete`
7978
|
8079
|`delete`
81-
|Allows a user or role to delete locations from the catalog
80+
|Enables a user or role to delete locations from the catalog
8281
|===
8382

8483
Bulk import permission::
8584

86-
.Bulk import permission
8785
[cols="15%,25%,15%,45%", frame="all", options="header"]
8886
|===
8987
|Name
@@ -94,13 +92,12 @@ Bulk import permission::
9492
|`bulk.import`
9593
|`bulk-import`
9694
|`use`
97-
|Allows the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests
95+
|Enables the user to access the bulk import endpoints, such as listing all repositories and organizations accessible by all GitHub integrations and managing the import requests
9896

9997
|===
10098

10199
Scaffolder permissions::
102100

103-
.Scaffolder permissions
104101
[cols="15%,25%,15%,45%", frame="all", options="header"]
105102
|===
106103
|Name
@@ -111,42 +108,41 @@ Scaffolder permissions::
111108
|`scaffolder.action.execute`
112109
|`scaffolder-action`
113110
|`use`
114-
|Allows the execution of an action from a template
111+
|Enables the execution of an action from a template
115112

116113
|`scaffolder.template.parameter.read`
117114
|`scaffolder-template`
118115
|`read`
119-
|Allows a user or role to read a single or multiple one parameters from a template
116+
|Enables a user or role to read a single or multiple one parameters from a template
120117

121118
|`scaffolder.template.step.read`
122119
|`scaffolder-template`
123120
|`read`
124-
|Allows a user or role to read a single or multiple steps from a template
121+
|Enables a user or role to read a single or multiple steps from a template
125122

126123
|`scaffolder.task.create`
127124
|
128125
|`create`
129-
|Allows a user or role to trigger software templates which create new scaffolder tasks
126+
|Enables a user or role to trigger software templates which create new scaffolder tasks
130127

131128
|`scaffolder.task.cancel`
132129
|
133130
|`use`
134-
|Allows a user or role to cancel currently running scaffolder tasks
131+
|Enables a user or role to cancel currently running scaffolder tasks
135132

136133
|`scaffolder.task.read`
137134
|
138135
|`read`
139-
|Allows a user or role to read all scaffolder tasks and their associated events and logs
136+
|Enables a user or role to read all scaffolder tasks and their associated events and logs
140137

141138
|`scaffolder.template.management`
142139
|
143140
|`use`
144-
|Allows a user or role to access frontend template management features, including editing, previewing, and trying templates, forms, and custom fields.
141+
|Enables a user or role to access frontend template management features, including editing, previewing, and trying templates, forms, and custom fields.
145142
|===
146143

147144
RBAC permissions::
148145

149-
.RBAC permissions
150146
[cols="15%,25%,15%,45%", frame="all", options="header"]
151147
|===
152148
|Name
@@ -157,27 +153,26 @@ RBAC permissions::
157153
|`policy.entity.read`
158154
|`policy-entity`
159155
|`read`
160-
|Allows a user or role to read permission policies and roles
156+
|Enables a user or role to read permission policies and roles
161157

162158
|`policy.entity.create`
163159
|
164160
|`create`
165-
|Allows a user or role to create a single or multiple permission policies and roles
161+
|Enables a user or role to create a single or multiple permission policies and roles
166162

167163
|`policy.entity.update`
168164
|`policy-entity`
169165
|`update`
170-
|Allows a user or role to update a single or multiple permission policies and roles
166+
|Enables a user or role to update a single or multiple permission policies and roles
171167

172168
|`policy.entity.delete`
173169
|`policy-entity`
174170
|`delete`
175-
|Allows a user or role to delete a single or multiple permission policies and roles
171+
|Enables a user or role to delete a single or multiple permission policies and roles
176172
|===
177173

178174
Kubernetes permissions::
179175

180-
.Kubernetes permissions
181176
[cols="15%,25%,15%,45%", frame="all", options="header"]
182177
|===
183178
|Name
@@ -188,17 +183,17 @@ Kubernetes permissions::
188183
|`kubernetes.clusters.read`
189184
|
190185
|`read`
191-
|Allows a user to read Kubernetes cluster details under the `/clusters` path
186+
|Enables a user to read Kubernetes cluster details under the `/clusters` path
192187

193188
|`kubernetes.resources.read`
194189
|
195190
|`read`
196-
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
191+
|Enables a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
197192

198193
|`kubernetes.proxy`
199194
|
200195
|`use`
201-
|Allows a user or role to access the proxy endpoint
196+
|Enables a user or role to access the proxy endpoint
202197
|===
203198

204199
OCM permissions::
@@ -235,17 +230,16 @@ conditions:
235230
|`ocm.entity.read`
236231
|
237232
|`read`
238-
|Allows a user or role to read from the OCM plugin
233+
|Enables a user or role to read from the OCM plugin
239234

240235
|`ocm.cluster.read`
241236
|
242237
|`read`
243-
|Allows a user or role to read the cluster information in the OCM plugin
238+
|Enables a user or role to read the cluster information in the OCM plugin
244239
|===
245240

246241
Topology permissions::
247242

248-
.Topology permissions
249243
[cols="15%,25%,15%,45%", frame="all", options="header"]
250244
|===
251245
|Name
@@ -256,23 +250,22 @@ Topology permissions::
256250
|`kubernetes.clusters.read`
257251
|
258252
|`read`
259-
|Allows a user to read Kubernetes cluster details under the `/clusters` path
253+
|Enables a user to read Kubernetes cluster details under the `/clusters` path
260254

261255
|`kubernetes.resources.read`
262256
|
263257
|`read`
264-
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
258+
|Enables a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
265259

266260
|`kubernetes.proxy`
267261
|
268262
|`use`
269-
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
263+
|Enables a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
270264
|===
271265

272266

273267
Tekton permissions::
274268

275-
.Tekton permissions
276269
[cols="15%,25%,15%,45%", frame="all", options="header"]
277270
|===
278271
|Name
@@ -283,23 +276,22 @@ Tekton permissions::
283276
|`kubernetes.clusters.read`
284277
|
285278
|`read`
286-
|Allows a user to read Kubernetes cluster details under the `/clusters` path
279+
|Enables a user to read Kubernetes cluster details under the `/clusters` path
287280

288281
|`kubernetes.resources.read`
289282
|
290283
|`read`
291-
|Allows a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
284+
|Enables a user to read information about Kubernetes resources located at `/services/:serviceId` and `/resources`
292285

293286
|`kubernetes.proxy`
294287
|
295288
|`use`
296-
|Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
289+
|Enables a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short}
297290
|===
298291

299292

300293
ArgoCD permissions::
301294

302-
.ArgoCD permissions
303295
[cols="15%,25%,15%,45%", frame="all", options="header"]
304296
|===
305297
|Name
@@ -310,13 +302,12 @@ ArgoCD permissions::
310302
|`argocd.view.read`
311303
|
312304
|`read`
313-
|Allows a user to read from the ArgoCD plugin
305+
|Enables a user to read from the ArgoCD plugin
314306
|===
315307

316308

317309
Quay permissions::
318310

319-
.Quay permissions
320311
[cols="15%,25%,15%,45%", frame="all", options="header"]
321312
|===
322313
|Name
@@ -327,5 +318,5 @@ Quay permissions::
327318
|`quay.view.read`
328319
|
329320
|`read`
330-
|Allows a user to read from the Quay plugin
321+
|Enables a user to read from the Quay plugin
331322
|===

0 commit comments

Comments
 (0)