docs: fix the output in creating org roles (#654)

* docs: fix the output in creating org roles and remove the TF configurations not used by each section

* Fixing dead link and cli output typo

Co-authored-by: Pete Pacent <ppacent@hashicorp.com>
pull/656/head
Jeff Malnick 6 years ago committed by GitHub
parent f7bd5e18f9
commit f35da900b0
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -24,7 +24,7 @@ Roles can live in the global, org, or project scopes. In this example we will cr
```bash
$ boundary roles create -scope-id $your_scope_id -name my_role -description "My first role"
$ boundary roles create -scope-id o_1234567890 -name my_role -description "My first role"
Role information:
Created Time: Fri, 09 Oct 2020 14:19:22 PDT
@ -37,9 +37,9 @@ Role information:
Scope:
ID: o_1234567890
Name: Generated project scope
Name: Generated org scope
Parent Scope ID: global
Type: project
Type: org
```
</Tab>
@ -67,8 +67,6 @@ resource "boundary_scope" "role" {
name = "my_role"
description = "My first role!"
scope_id = o_1234567890 // sets the role's scope as the default generated org. To change the role's scope provide a different scope id.
principals = u_1234567890 // assigns the default generated admin user to the role. To assign a different principal provide a different principal id.
grants = ["id=*;type=*;action=read,list"] // assigns grants for read and list actions on all resources to the role
}
```
@ -134,7 +132,6 @@ resource "boundary_scope" "role" {
description = "My first role!"
scope_id = o_1234567890 // sets the role's scope as the default generated org. To change the role's scope provide a different scope id.
principals = u_1234567890 // assigns the default generated admin user to the role. To assign a different principal provide a different principal id.
grants = ["id=*;type=*;action=read,list"] // assigns grants for read and list actions on all resources to the role
}
```
@ -144,7 +141,7 @@ resource "boundary_scope" "role" {
# Assign Grants to a Role
Grants give roles permission to perform actions. For more information on how to format grants see [Permission Grant Formats](https://boundaryproject.io/docs/concepts/security/permissions-model#permission-grant-formats).
Grants give roles permission to perform actions. For more information on how to format grants see [Permission Grant Formats](https://boundaryproject.io/docs/concepts/security/permissions#permission-grant-formats).
In this example we give a role read and list permissions to all resources.
<Tabs>
@ -175,7 +172,7 @@ Role information:
Scope ID: o_1234567890
Canonical Grants:
id=*;type=*;actions=read
id=*;type=*;actions=list,read
```

Loading…
Cancel
Save