Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Change Aggregation Property resource to Aggregation Properties resource #99

8 changes: 4 additions & 4 deletions docs/resources/port_action_permissions.md
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ description: |-
}
}
}

Example Usage with Policy
Port allows setting dynamic permissions for executing and/or approving execution of self-service actions, based on any properties/relations of an action's corresponding blueprint.
Docs about the Policy language can be found here https://docs.getport.io/create-self-service-experiences/set-self-service-actions-rbac/dynamic-permissions#configuring-permissions.
Expand Down Expand Up @@ -75,7 +75,7 @@ description: |-
}
)
}

}
}
```
Expand Down Expand Up @@ -170,7 +170,7 @@ resource "port_action_permissions" "restart_microservice_permissions" {
}
```

## Disclaimer
## Disclaimer

- Action permissions are created by default when creating a new action, this means that you should use this resource when you want to change the default permissions of an action.
- When deleting an action permissions resource using terraform, the action permissions will not be deleted from Port, as they are required for the action to work, instead, the action permissions will be removed from the terraform state.
Expand Down Expand Up @@ -221,4 +221,4 @@ Optional:
- `policy` (String) The policy to use for execution
- `roles` (List of String) The roles with execution permission
- `teams` (List of String) The teams with execution permission
- `users` (List of String) The users with execution permission
- `users` (List of String) The users with execution permission
Loading
Loading