Skip to content

Commit e7e7a37

Browse files
ldecarvalho-docquantumsheepRoRoJnerda-codes
authored
fix(iam): review ro
Co-authored-by: Nathanael Demacon <[email protected]> Co-authored-by: Rowena Jones <[email protected]> Co-authored-by: Néda <[email protected]>
1 parent 262308f commit e7e7a37

File tree

4 files changed

+9
-9
lines changed

4 files changed

+9
-9
lines changed

pages/iam/concepts.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ With the introduction of IAM, an API key is now associated with an IAM [user](#u
3434

3535
## Common Expression Language (CEL)
3636

37-
Common Expression Language (CEL) is the expression language used to specify an expression in [conditions](#conditions) within an IAM policy. The language helps express attribute-based logic expressions. In general, a condition expression consists of one or more statements. Each statement expresses an attribute-based control rule, and ultimately determines whether the permissions applies. IAM conditions use the following CEL features: **Variables**, **Operators**, **Functions** and **Logical Operators**. Refer to the [Understanding policy conditions](/iam/reference-content/understanding-policy-conditions) documentation page for a detailed description of the supported CEL features.
37+
The Common Expression Language (CEL) is used to define expressions in [conditions](#conditions) within an IAM policy. CEL allows you to create attribute-based logic expressions that determine whether specific permissions apply. A condition expression typically consists of one or more statements, each defining an attribute-based control rule. IAM conditions use the following CEL features: **Variables**, **Operators**, **Functions**, and **Logical Operators**. Refer to the [Understanding policy conditions](/iam/reference-content/understanding-policy-conditions) documentation page for a detailed description of the supported CEL features.
3838

3939
## Conditions
4040

pages/iam/how-to/create-policy.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ An IAM [policy](/iam/reference-content/policy/) is used to define the permission
4242
5. Click **Add rules** to progress to the next part of the policy creation wizard.
4343
<Lightbox src="scaleway-iam-create-policy-2.webp" alt="" />
4444
<Message type="tip">
45-
Rules define the actions that the attached principal will be able to carry out within the Organization. When creating a rule, you first set the **scope** of the rule, and then select the **permission sets** to apply within the scope. You can optionally set up **contditions** for your rule. See our dedicated documentation for more help with [policies, rules, scopes and permission sets](/iam/reference-content/policy/).
45+
Rules define the actions that the attached principal will be able to carry out within the Organization. When creating a rule, you first set the **scope** of the rule, and then select the **permission sets** to apply within the scope. You can optionally set up **conditions** for your rule. See our dedicated documentation for more help with [policies, rules, scopes and permission sets](/iam/reference-content/policy/).
4646
</Message>
4747
6. Select a **scope** for the rule:
4848
- To give the principal permissions to view, create, edit and/or delete [resources](/iam/concepts/#resource), select the **Access to resources** scope. Then, select the [Project](/iam/concepts/#project) in which you want the permissions to apply. You can select from **all current and future Projects**, **all current Projects** or select specific Projects.
@@ -55,7 +55,7 @@ An IAM [policy](/iam/reference-content/policy/) is used to define the permission
5555
Refer to the [Understanding policy conditions](/iam/reference-content/understanding-policy-conditions) documentation page for more details about how to write condition expressions, as well as examples of conditions.
5656
</Message>
5757
11. Click **Validate**. The rule, with its scope and permission sets, is added to the list of the policy's rules.
58-
12. Click **Add new rule** and repeat steps 6-8 as many times as required to add multiple rules to your policy.
58+
12. Click **Add new rule** and repeat steps 6 to 8 as many times as required to add multiple rules to your policy.
5959
<Message type="tip">
6060
You can delete <Icon name="delete" /> or edit <Icon name="edit" /> an existing rule by clicking the relevant button in the top right corner of the rule's summary.
6161
</Message>

pages/iam/quickstart.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,7 @@ Users you have invited to your Organization, and applications you have created,
8383
Refer to the [Understanding policy conditions](/iam/reference-content/understanding-policy-conditions) documentation page for more details about how to write condition expressions, as well as examples of conditions.
8484
</Message>
8585
11. Click **Validate**. The rule, with its scope and permission sets, is added to the list of the policy's rules.
86-
12. Click **Add new rule** and repeat steps 6-8 as many times as required to add multiple rules to your policy.
86+
12. Click **Add new rule** and repeat steps 6 to 8 as many times as required to add multiple rules to your policy.
8787
<Message type="tip">
8888
You can delete <Icon name="delete" /> or edit <Icon name="edit" /> an existing rule by clicking the relevant button in the top right corner of the rule's summary.
8989
</Message>

pages/iam/reference-content/understanding-policy-conditions.mdx

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ Expressions at Scaleway are defined in CEL, which provides a human-readable and
3333

3434
Common Expression Language is used to specify a IAM condition expression.
3535

36-
Expressions consist of one or more statements that declare an attribute-based control rule, and determines whether a permission applies.
36+
Expressions consist of one or more statements that declare an attribute-based control rule, and determine whether a permission applies.
3737

3838
IAM conditions use the following CEL features:
3939
- Variables
@@ -66,7 +66,7 @@ Refer to the official [CEL syntax specification](https://github.com/google/cel-s
6666

6767
#### Logical operators
6868

69-
Conditions supports three logical operators that can be used to build complex logic expressions from basic expression statements:
69+
Conditions support three logical operators that can be used to build complex logic expressions from basic expression statements:
7070

7171
| Logical operator | Description | Example |
7272
| -- | ------------------- | ------ |
@@ -77,7 +77,7 @@ Conditions supports three logical operators that can be used to build complex lo
7777

7878
### Functions
7979

80-
A function is a compound operator for data types that supports more complex operations. In condition expressions, there are predefined functions that can be used with a given data type.
80+
A function is a compound operator for data types, that supports more complex operations. In condition expressions, predefined functions can be used with a given data type.
8181

8282
| Function | Description | Parameters |
8383
| ------------ | ------------------- | ------ |
@@ -96,7 +96,7 @@ For example, if you set up a policy that grants access to a resource only on Mon
9696

9797
We recommend that you specify timezones when creating time-based conditions.
9898

99-
Refer to the official [CEL specification](https://github.com/google/cel-spec/blob/master/doc/langdef.md#timezones) for the correct grammar to express timezones in conditions.
99+
Refer to the official [CEL specification](https://github.com/google/cel-spec/blob/master/doc/langdef.md#timezones) for the correct syntax to express timezones in conditions.
100100

101101
### Timestamps
102102

@@ -121,7 +121,7 @@ request.user_agent.contains("terraform/")
121121

122122
### Time conditions
123123

124-
To check if a request was performed at a specific timeslot you can use the following expression. In this example, use weekdays from 9am to 5pm as a timestamp.
124+
To check if a request was performed within a specific timeslot you can use the following expression. In this example, use weekdays from 9am to 5pm as a timestamp.
125125
```
126126
request.time.getDayOfWeek() != 0 && request.time.getDayOfWeek() != 6
127127
&& request.time.getHours("Europe/Paris") < 17

0 commit comments

Comments
 (0)