Skip to content

Update readme with Resource ACL#334

Merged
Bento007 merged 3 commits intomasterfrom
tsmith/readme
Nov 14, 2019
Merged

Update readme with Resource ACL#334
Bento007 merged 3 commits intomasterfrom
tsmith/readme

Conversation

@Bento007
Copy link
Copy Markdown
Collaborator

No description provided.

@Bento007 Bento007 self-assigned this Nov 14, 2019
@codecov-io
Copy link
Copy Markdown

codecov-io commented Nov 14, 2019

Codecov Report

Merging #334 into master will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #334   +/-   ##
=======================================
  Coverage   88.11%   88.11%           
=======================================
  Files          19       19           
  Lines        1943     1943           
=======================================
  Hits         1712     1712           
  Misses        231      231

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update f6100a2...f3e997f. Read the comment docs.

Copy link
Copy Markdown
Member

@xbrianh xbrianh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approving, but see language nits

Comment thread Readme.md Outdated

`account-id` to the deployment stage. The field **resourcetype** can optionally be the name of a resource type defined
in fusillade. If `resourcetype` matches a resource type defined in fusillade then a resource policy will be used
evaluating the users access. All other fields can be used as needed or use \* for wild cards. Resource names are
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/will be used evaluating the user access/will be used to evaluate user access/

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will fix

Comment thread Readme.md Outdated

#### Resource ACL
A new resource type is created by providing the name of the resource type, and the actions that can be performed on it.
Once a resource type is created you can store specific ids of the resource you'd like to control. A principal only has
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

created you can store specific ids of the resource you'd like to control

To be consistent, s/ids/IDs/

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

will change to resource_id

Comment thread Readme.md Outdated
Once a resource type is created you can store specific ids of the resource you'd like to control. A principal only has
access to resource they are give access to, either directly or through group membership. The creator of a resource ID is
automatically designated as the owner of the resource. The owner of a resource can add additional owners, and assign
access levels to their resource. The different levels of access are defined by access policies associated with a
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The different levels of access are defined by access policies associated

s/The different/Different

Comment thread Readme.md Outdated
access levels to their resource. The different levels of access are defined by access policies associated with a
resource type. New access policies can be defined for a resource type after the resource type has been created. All
resources of that type share the same access policies and can only be assigned access policies that have already been
defined. Access policies can only define policies that use actions supported by that resource type. Actions can be
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All resources of that type share the same access policies and can only be assigned access policies that have already been defined.

Trying to understand the implications of this sentence. Suppose I have two resources of type "foo," A and B. Is it impossible to assign different policies to A and B?

Alternatively, is there a pool of resource policies associated with "foo", and the policies attached to A and B must come from that pool?

Copy link
Copy Markdown
Collaborator Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The later. I'll change the description

@Bento007 Bento007 merged commit 086eec2 into master Nov 14, 2019
@Bento007 Bento007 deleted the tsmith/readme branch November 14, 2019 22:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants