mirror of https://github.com/hashicorp/boundary
Update the sidebar to remove so many Model refs (#595)
It's a bit overwhelming to consume the site and see that you have to understand all these models. This simplifies it a bit. I also fixed up some minor wording here and there.pull/596/head
parent
11fd0d0300
commit
273cf29ba4
@ -1,11 +0,0 @@
|
||||
---
|
||||
layout: docs
|
||||
page_title: API Standards
|
||||
sidebar_title: API Standards
|
||||
description: |-
|
||||
An introduction to Boundary API standards.
|
||||
---
|
||||
|
||||
# Boundary API Standards
|
||||
|
||||
This section covers our API standards including command line and HTTP API.
|
||||
@ -1,14 +1,14 @@
|
||||
---
|
||||
layout: docs
|
||||
page_title: CLI Standards
|
||||
sidebar_title: CLI Standards
|
||||
page_title: CLI Behavior
|
||||
sidebar_title: CLI Behavior
|
||||
description: |-
|
||||
Boundary's CLI standards
|
||||
Boundary's CLI behavior
|
||||
---
|
||||
|
||||
# CLI Standards
|
||||
# CLI Behavior
|
||||
|
||||
Boundary's CLI has predictable behavior throughout its various commands. This page details these standards to help users make better use of the CLI.
|
||||
Boundary's CLI has predictable behavior throughout its various commands. This page details the common patterns in used in order to help users make better use of the CLI.
|
||||
|
||||
## Parameter Handling
|
||||
|
||||
@ -0,0 +1,12 @@
|
||||
---
|
||||
layout: docs
|
||||
page_title: API
|
||||
sidebar_title: API
|
||||
description: |-
|
||||
An introduction to Boundary's API.
|
||||
---
|
||||
|
||||
# Boundary API
|
||||
|
||||
This section covers our API, including information about its underlying model
|
||||
and how the CLI implements support for the API.
|
||||
@ -1,11 +0,0 @@
|
||||
---
|
||||
layout: docs
|
||||
page_title: Security Model
|
||||
sidebar_title: Security Model
|
||||
description: |-
|
||||
Boundary security model overview.
|
||||
---
|
||||
|
||||
# Security Model
|
||||
|
||||
This section describes the security models that Boundary follows. Here you can find in-depth analysis about how permissions, identity, and target security are handled within the Boundary product.
|
||||
@ -0,0 +1,11 @@
|
||||
---
|
||||
layout: docs
|
||||
page_title: Security
|
||||
sidebar_title: Security
|
||||
description: |-
|
||||
Boundary security overview.
|
||||
---
|
||||
|
||||
# Security
|
||||
|
||||
This section describes Boundary's security norms. Here you can find in-depth analysis about how permissions, identity, and target security are handled within the Boundary product.
|
||||
Loading…
Reference in new issue