@@ -11,7 +11,7 @@ Module included in the following assemblies:
11
11
12
12
After you create cluster-scoped CRDs, you can grant permissions to it. If you
13
13
use the admin, edit, and view
14
- xref:architecture/additional_concepts/authorization.adoc#roles[default
14
+ xref:../ architecture/additional_concepts/authorization.adoc#roles[default
15
15
cluster roles], take advantage of cluster role aggregation for their rules.
16
16
17
17
[IMPORTANT]
@@ -22,7 +22,7 @@ assign a rule to a role, you must also assign that verb to roles that have more
22
22
permissions. For example, if you grant the "get crontabs" permission to the view
23
23
role, you must also grant it to the edit and admin roles. The admin or edit role
24
24
is usually assigned to the user that created a project through the
25
- xref:admin_guide/managing_projects.adoc#modifying-the-template-for-new-projects[project
25
+ xref:../ admin_guide/managing_projects.adoc#modifying-the-template-for-new-projects[project
26
26
template].
27
27
====
28
28
66
66
<4> Specify this label to grant permissions to the edit default role.
67
67
<5> Specify the group name of the CRD.
68
68
<6> Specify the plural name of the CRD that these rules apply to.
69
- <7> Specify the xref:architecture/additional_concepts/authorization.adoc#action[verbs]
69
+ <7> Specify the xref:../ architecture/additional_concepts/authorization.adoc#action[verbs]
70
70
that represent the permissions that are granted to the role. For example, apply
71
71
read and write permissions to the admin and edit roles and only read permission
72
72
to the view role.
0 commit comments