|
| 1 | + p, role:default/platform_admin, catalog-entity, read, allow |
| 2 | + p, role:default/platform_admin, catalog.entity.create, create, allow |
| 3 | + p, role:default/platform_admin, catalog.entity.update, update, allow |
| 4 | + p, role:default/platform_admin, catalog.entity.delete, delete, allow |
| 5 | + p, role:default/platform_admin, catalog.location.create, create, allow |
| 6 | + p, role:default/platform_admin, catalog.location.read, read, allow |
| 7 | + p, role:default/platform_admin, catalog.location.update, update, allow |
| 8 | + p, role:default/platform_admin, catalog.location.delete, delete, allow |
| 9 | + p, role:default/platform_admin, scaffolder.action.execute, use, allow |
| 10 | + p, role:default/platform_admin, scaffolder.task.create, create, allow |
| 11 | + p, role:default/platform_admin, scaffolder.task.read, read, allow |
| 12 | + p, role:default/platform_admin, kubernetes.proxy, use, allow |
| 13 | + p, role:default/platform_admin, techdocs.entity.read, read, allow |
| 14 | + p, role:default/platform_admin, techdocs.entity.create, create, allow |
| 15 | + p, role:default/platform_admin, rbac.policy.entity.read, read, allow |
| 16 | + p, role:default/platform_admin, rbac.policy.entity.create, create, allow |
| 17 | + p, role:default/platform_admin, rbac.policy.entity.update, update, allow |
| 18 | + p, role:default/platform_admin, rbac.policy.entity.delete, delete, allow |
| 19 | + p, role:default/engineering_lead, catalog-entity, read, allow |
| 20 | + p, role:default/engineering_lead, catalog.entity.create, create, allow |
| 21 | + p, role:default/engineering_lead, catalog.entity.update, update, allow |
| 22 | + p, role:default/engineering_lead, catalog.entity.delete, delete, allow |
| 23 | + p, role:default/engineering_lead, catalog.location.create, create, allow |
| 24 | + p, role:default/engineering_lead, catalog.location.read, read, allow |
| 25 | + p, role:default/engineering_lead, catalog.location.update, update, allow |
| 26 | + p, role:default/engineering_lead, catalog.location.delete, delete, allow |
| 27 | + p, role:default/engineering_lead, scaffolder.action.execute, use, allow |
| 28 | + p, role:default/engineering_lead, scaffolder.task.create, create, allow |
| 29 | + p, role:default/engineering_lead, scaffolder.task.read, read, allow |
| 30 | + p, role:default/engineering_lead, kubernetes.proxy, use, allow |
| 31 | + p, role:default/engineering_lead, techdocs.entity.read, read, allow |
| 32 | + p, role:default/engineering_lead, techdocs.entity.create, create, allow |
| 33 | + p, role:default/senior_engineer, catalog-entity, read, allow |
| 34 | + p, role:default/senior_engineer, catalog.entity.create, create, allow |
| 35 | + p, role:default/senior_engineer, catalog.entity.update, update, allow |
| 36 | + p, role:default/senior_engineer, catalog.entity.delete, delete, allow |
| 37 | + p, role:default/senior_engineer, catalog.location.create, create, allow |
| 38 | + p, role:default/senior_engineer, catalog.location.read, read, allow |
| 39 | + p, role:default/senior_engineer, scaffolder.action.execute, use, allow |
| 40 | + p, role:default/senior_engineer, scaffolder.task.create, create, allow |
| 41 | + p, role:default/senior_engineer, scaffolder.task.read, read, allow |
| 42 | + p, role:default/senior_engineer, kubernetes.proxy, use, allow |
| 43 | + p, role:default/senior_engineer, techdocs.entity.read, read, allow |
| 44 | + p, role:default/backend_engineer, catalog-entity, read, allow |
| 45 | + p, role:default/backend_engineer, catalog.entity.create, create, allow |
| 46 | + p, role:default/backend_engineer, catalog.entity.update, update, allow |
| 47 | + p, role:default/backend_engineer, catalog.location.create, create, allow |
| 48 | + p, role:default/backend_engineer, catalog.location.read, read, allow |
| 49 | + p, role:default/backend_engineer, scaffolder.action.execute, use, allow |
| 50 | + p, role:default/backend_engineer, scaffolder.task.create, create, allow |
| 51 | + p, role:default/backend_engineer, scaffolder.task.read, read, allow |
| 52 | + p, role:default/backend_engineer, kubernetes.proxy, use, allow |
| 53 | + p, role:default/backend_engineer, techdocs.entity.read, read, allow |
| 54 | + p, role:default/frontend_engineer, catalog-entity, read, allow |
| 55 | + p, role:default/frontend_engineer, catalog.entity.create, create, allow |
| 56 | + p, role:default/frontend_engineer, catalog.entity.update, update, allow |
| 57 | + p, role:default/frontend_engineer, catalog.location.create, create, allow |
| 58 | + p, role:default/frontend_engineer, catalog.location.read, read, allow |
| 59 | + p, role:default/frontend_engineer, scaffolder.action.execute, use, allow |
| 60 | + p, role:default/frontend_engineer, scaffolder.task.create, create, allow |
| 61 | + p, role:default/frontend_engineer, scaffolder.task.read, read, allow |
| 62 | + p, role:default/frontend_engineer, kubernetes.proxy, use, allow |
| 63 | + p, role:default/frontend_engineer, techdocs.entity.read, read, allow |
| 64 | + p, role:default/product_manager, catalog-entity, read, allow |
| 65 | + p, role:default/product_manager, catalog.location.read, read, allow |
| 66 | + p, role:default/product_manager, techdocs.entity.read, read, allow |
| 67 | + p, role:default/QA_engineer, catalog-entity, read, allow |
| 68 | + p, role:default/QA_engineer, catalog.location.read, read, allow |
| 69 | + p, role:default/QA_engineer, kubernetes.proxy, use, allow |
| 70 | + p, role:default/QA_engineer, techdocs.entity.read, read, allow |
| 71 | + p, role:default/external_contractor, catalog-entity, read, allow |
| 72 | + p, role:default/external_contractor, techdocs.entity.read, read, allow |
| 73 | + p, role:default/compliance_security, catalog-entity, read, allow |
| 74 | + p, role:default/compliance_security, catalog.location.read, read, allow |
| 75 | + p, role:default/compliance_security, rbac.policy.entity.read, read, allow |
| 76 | + p, role:default/on_call_team, catalog-entity, read, allow |
| 77 | + p, role:default/on_call_team, catalog.entity.update, update, allow |
| 78 | + p, role:default/on_call_team, catalog.location.read, read, allow |
| 79 | + p, role:default/on_call_team, kubernetes.proxy, use, allow |
| 80 | + p, role:default/on_call_team, techdocs.entity.read, read, allow |
0 commit comments