Skip to content

Commit aa37d82

Browse files
committed
fixing links
fixing conflict
1 parent 6e69464 commit aa37d82

File tree

3 files changed

+9
-8
lines changed

3 files changed

+9
-8
lines changed

modules/rosa-red-hat-support-access.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -111,6 +111,6 @@ Write: None
111111
|===
112112
--
113113
1. Limited to addressing common use cases such as failing deployments, upgrading a cluster, and replacing bad worker nodes.
114-
2. Elevated access gives SRE the access levels of a cluster-admin role and is gated by Approved Access. For more information, see "Default cluster roles" and "Approved Access".
114+
2. Elevated access gives SRE the access levels of a `cluster-admin` role and is gated by Approved Access. For more information, see "Default cluster roles" and "Approved Access".
115115
3. Limited to what is granted through RBAC by the Customer Administrator and namespaces created by the user.
116116
--

rosa_architecture/rosa_policy_service_definition/rosa-service-definition.adoc

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ include::modules/rosa-sdpolicy-networking.adoc[leveloffset=+1]
5858
[role="_additional-resources"]
5959
.Additional resources
6060

61-
* For more information about the network verification checks, see
61+
* For more information about the network verification checks, see
6262
ifdef::openshift-rosa-hcp[]
6363
link:https://docs.openshift.com/rosa/networking/network-verification.html#network-verification[Network verification].
6464
endif::openshift-rosa-hcp[]
@@ -74,13 +74,14 @@ include::modules/rosa-sdpolicy-security.adoc[leveloffset=+1]
7474
[id="additional-resources_rosa-service-definition"]
7575
== Additional resources
7676

77+
* See
7778
ifdef::openshift-rosa-hcp[]
7879
link:https://docs.openshift.com/rosa/rosa_policy_service_definition/rosa-policy-process-security.html#rosa-policy-process-security[Understanding process and security for ROSA]
7980
endif::openshift-rosa-hcp[]
8081
ifndef::openshift-rosa-hcp[]
8182
xref:../rosa_policy_service_definition/rosa-policy-process-security.adoc#rosa-policy-process-security[Understanding process and security for ROSA]
8283
endif::openshift-rosa-hcp[]
83-
84+
* See
8485
ifdef::openshift-rosa-hcp[]
8586
link:https://docs.openshift.com/rosa/rosa_policy_service_definition/rosa-life-cycle.html#rosa-life-cycle[ROSA life cycle]
8687
endif::openshift-rosa-hcp[]

rosa_architecture/rosa_policy_service_definition/rosa-sre-access.adoc

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,9 +18,9 @@ include::modules/sre-cluster-access.adoc[leveloffset=+1]
1818
include::modules/rosa-red-hat-support-access.adoc[leveloffset=+1]
1919
[role="_additional-resources"]
2020
.Additional resources
21-
* For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/support/approved-access[Approved Access].
21+
* link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/support/approved-access[Approved Access].
2222

23-
* For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/authentication_and_authorization/using-rbac#default-roles_using-rbac[Default cluster roles]
23+
* link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/authentication_and_authorization/using-rbac#default-roles_using-rbac[Default cluster roles].
2424

2525
include::modules/rosa-customer-access.adoc[leveloffset=+1]
2626
include::modules/rosa-access-approval-review.adoc[leveloffset=+1]
@@ -29,8 +29,8 @@ include::modules/how-service-accounts-assume-aws-iam-roles-in-sre-owned-projects
2929
[role="_additional-resources"]
3030
.Additional resources
3131

32-
* For more information about the AWS IAM roles used by the cluster Operators, see https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/introduction_to_rosa/rosa-sts-about-iam-resources#rosa-sts-operator-roles_rosa-sts-about-iam-resources[Cluster-specific Operator IAM role reference].
32+
* link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/introduction_to_rosa/rosa-sts-about-iam-resources#rosa-sts-operator-roles_rosa-sts-about-iam-resources[Cluster-specific Operator IAM role reference].
3333

34-
* For more information about the policies and permissions that the cluster Operators require, see https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/introduction_to_rosa/rosa-sts-about-iam-resources#rosa-sts-account-wide-roles-and-policies-creation-methods_rosa-sts-about-iam-resources[Methods of account-wide role creation].
34+
* See policies and permissions that the cluster Operators require, link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/introduction_to_rosa/rosa-sts-about-iam-resources#rosa-sts-account-wide-roles-and-policies-creation-methods_rosa-sts-about-iam-resources[Methods of account-wide role creation].
3535

36-
* For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/support/approved-access[Approved Access].
36+
* link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html/support/approved-access[Approved Access].

0 commit comments

Comments
 (0)