diff --git a/docs/BUILD b/docs/BUILD index d5db36d1..56e03ee8 100644 --- a/docs/BUILD +++ b/docs/BUILD @@ -34,6 +34,7 @@ proto_library( "//envoy/config/filter/http/ip_tagging/v2:ip_tagging", "//envoy/config/filter/http/lua/v2:lua", "//envoy/config/filter/http/rate_limit/v2:rate_limit", + "//envoy/config/filter/http/rbac/v2:rbac", "//envoy/config/filter/http/router/v2:router", "//envoy/config/filter/http/squash/v2:squash", "//envoy/config/filter/http/transcoder/v2:transcoder", @@ -48,6 +49,7 @@ proto_library( "//envoy/config/metrics/v2:metrics_service", "//envoy/config/metrics/v2:stats", "//envoy/config/ratelimit/v2:rls", + "//envoy/config/rbac/v2alpha:rbac", "//envoy/config/trace/v2:trace", "//envoy/config/transport_socket/capture/v2alpha:capture", "//envoy/extensions/common/tap/v2alpha:capture", diff --git a/envoy/config/rbac/v2alpha/rbac.proto b/envoy/config/rbac/v2alpha/rbac.proto index 5d003922..818054ad 100644 --- a/envoy/config/rbac/v2alpha/rbac.proto +++ b/envoy/config/rbac/v2alpha/rbac.proto @@ -8,12 +8,8 @@ package envoy.config.rbac.v2alpha; option go_package = "v2alpha"; // Role Based Access Control (RBAC) provides service-level and method-level access control for a -// service. The RBAC engine authorizes a request by evaluating the request context (expressed in the -// form of :ref: `AttributeContext `) against -// the RBAC policies. -// -// RBAC policies are additive. The policies are examined in order. A request is allowed once a -// matching policy is found (suppose the `action` is ALLOW). +// service. RBAC policies are additive. The policies are examined in order. A request is allowed +// once a matching policy is found (suppose the `action` is ALLOW). // // Here is an example of RBAC configuration. It has two policies: // @@ -48,13 +44,13 @@ option go_package = "v2alpha"; // - any: true // message RBAC { - // Should we do white-list or black-list style access control? + // Should we do safe-list or block-list style access control? enum Action { - // The policies grant access to principals. The rest is denied. This is white-list style + // The policies grant access to principals. The rest is denied. This is safe-list style // access control. This is the default type. ALLOW = 0; - // The policies deny access to principals. The rest is allowed. This is black-list style + // The policies deny access to principals. The rest is allowed. This is block-list style // access control. DENY = 1; }