From f35da900b0323ff3a0a3763919204640437f1da2 Mon Sep 17 00:00:00 2001 From: Jeff Malnick Date: Tue, 13 Oct 2020 08:50:28 -0700 Subject: [PATCH] docs: fix the output in creating org roles (#654) * docs: fix the output in creating org roles and remove the TF configurations not used by each section * Fixing dead link and cli output typo Co-authored-by: Pete Pacent --- .../content/docs/common-workflows/manage-roles.mdx | 13 +++++-------- 1 file changed, 5 insertions(+), 8 deletions(-) diff --git a/website/content/docs/common-workflows/manage-roles.mdx b/website/content/docs/common-workflows/manage-roles.mdx index 9cd031e4d3..7919064385 100644 --- a/website/content/docs/common-workflows/manage-roles.mdx +++ b/website/content/docs/common-workflows/manage-roles.mdx @@ -24,7 +24,7 @@ Roles can live in the global, org, or project scopes. In this example we will cr ```bash -$ boundary roles create -scope-id $your_scope_id -name my_role -description "My first role" +$ boundary roles create -scope-id o_1234567890 -name my_role -description "My first role" Role information: Created Time: Fri, 09 Oct 2020 14:19:22 PDT @@ -37,9 +37,9 @@ Role information: Scope: ID: o_1234567890 - Name: Generated project scope + Name: Generated org scope Parent Scope ID: global - Type: project + Type: org ``` @@ -67,8 +67,6 @@ resource "boundary_scope" "role" { name = "my_role" description = "My first role!" scope_id = o_1234567890 // sets the role's scope as the default generated org. To change the role's scope provide a different scope id. - principals = u_1234567890 // assigns the default generated admin user to the role. To assign a different principal provide a different principal id. - grants = ["id=*;type=*;action=read,list"] // assigns grants for read and list actions on all resources to the role } ``` @@ -134,7 +132,6 @@ resource "boundary_scope" "role" { description = "My first role!" scope_id = o_1234567890 // sets the role's scope as the default generated org. To change the role's scope provide a different scope id. principals = u_1234567890 // assigns the default generated admin user to the role. To assign a different principal provide a different principal id. - grants = ["id=*;type=*;action=read,list"] // assigns grants for read and list actions on all resources to the role } ``` @@ -144,7 +141,7 @@ resource "boundary_scope" "role" { # Assign Grants to a Role -Grants give roles permission to perform actions. For more information on how to format grants see [Permission Grant Formats](https://boundaryproject.io/docs/concepts/security/permissions-model#permission-grant-formats). +Grants give roles permission to perform actions. For more information on how to format grants see [Permission Grant Formats](https://boundaryproject.io/docs/concepts/security/permissions#permission-grant-formats). In this example we give a role read and list permissions to all resources. @@ -175,7 +172,7 @@ Role information: Scope ID: o_1234567890 Canonical Grants: - id=*;type=*;actions=read + id=*;type=*;actions=list,read ```