diff --git a/modules/authorization/ref-rbac-permission-policies.adoc b/modules/authorization/ref-rbac-permission-policies.adoc index 800231ed7f..989d89bd9d 100644 --- a/modules/authorization/ref-rbac-permission-policies.adoc +++ b/modules/authorization/ref-rbac-permission-policies.adoc @@ -33,8 +33,6 @@ g, user:default/myuser, role:default/myrole {product-short} supports following permission policies: -Catalog permissions:: - .Catalog permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |=== @@ -79,8 +77,6 @@ Catalog permissions:: |Allows a user or role to delete locations from the catalog |=== -Bulk import permission:: - .Bulk import permission [cols="15%,25%,15%,45%", frame="all", options="header"] |=== @@ -96,8 +92,6 @@ Bulk import permission:: |=== -Scaffolder permissions:: - .Scaffolder permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |=== @@ -142,8 +136,6 @@ Scaffolder permissions:: |Allows a user or role to access frontend template management features, including editing, previewing, and trying templates, forms, and custom fields. |=== -RBAC permissions:: - .RBAC permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |=== @@ -173,8 +165,6 @@ RBAC permissions:: |Allows a user or role to delete a single or multiple permission policies and roles |=== -Kubernetes permissions:: - .Kubernetes permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |=== @@ -210,19 +200,19 @@ result: CONDITIONAL roleEntityRef: 'role:default/' pluginId: catalog resourceType: catalog-entity -permissionMapping: +permissionMapping: - read - update - delete -conditions: - not: +conditions: + not: rule: HAS_SPEC resourceType: catalog-entity - params: + params: key: type value: kubernetes-cluster ---- - +.OCM permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |=== |Name @@ -241,8 +231,6 @@ conditions: |Allows a user or role to read the cluster information in the OCM plugin |=== -Topology permissions:: - .Topology permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |=== @@ -267,9 +255,6 @@ Topology permissions:: |Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short} |=== - -Tekton permissions:: - .Tekton permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |=== @@ -294,9 +279,6 @@ Tekton permissions:: |Allows a user or role to access the proxy endpoint, allowing the user or role to read pod logs and events within {product-very-short} |=== - -ArgoCD permissions:: - .ArgoCD permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |=== @@ -311,9 +293,6 @@ ArgoCD permissions:: |Allows a user to read from the ArgoCD plugin |=== - -Quay permissions:: - .Quay permissions [cols="15%,25%,15%,45%", frame="all", options="header"] |===