Skip to content

Commit ba2d516

Browse files
authored
Merge pull request #45 from julianleonard123/update-docs-to-authzed-name
docs: update docs from `cloudapi` to `authzed`
2 parents 191edea + 8be4b62 commit ba2d516

File tree

18 files changed

+134
-131
lines changed

18 files changed

+134
-131
lines changed

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
# Build artifacts
22
dist/
3+
terraform-provider-authzed
34
# IDE files
45
.idea/
56
.vscode/

.tfrepo

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,6 +3,6 @@ provider_installation {
33
url = "https://terraform.releases.hashicorp.com"
44
}
55
direct {
6-
exclude = ["registry.terraform.io/authzed/cloudapi"]
6+
exclude = ["registry.terraform.io/authzed/authzed"]
77
}
88
}

CONTRIBUTING.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# Contributing to the AuthZed Cloud API Terraform Provider
1+
# Contributing to the AuthZed Terraform Provider
22

3-
Thank you for considering contributing to the AuthZed Cloud API Terraform Provider! This document provides guidelines and instructions for contributing.
3+
Thank you for considering contributing to the AuthZed Terraform Provider! This document provides guidelines and instructions for contributing.
44

55
## Code of Conduct
66

@@ -11,7 +11,7 @@ Please read and follow our [Code of Conduct](CODE_OF_CONDUCT.md).
1111
1. **Fork the repository** on GitHub.
1212
2. **Clone your fork** locally:
1313
```
14-
git clone https://github.com/YOUR-USERNAME/terraform-provider-cloudapi.git
14+
git clone https://github.com/YOUR-USERNAME/terraform-provider-authzed.git
1515
```
1616
3. **Create a branch** for your work:
1717
```
@@ -23,7 +23,7 @@ Please read and follow our [Code of Conduct](CODE_OF_CONDUCT.md).
2323
### Requirements
2424

2525
- Go 1.23 or higher
26-
- Terraform 1.0 or higher
26+
- Terraform 1.12 or higher
2727
- Access to an AuthZed Cloud account for testing
2828

2929
### Building and Testing
@@ -40,8 +40,8 @@ Please read and follow our [Code of Conduct](CODE_OF_CONDUCT.md).
4040

4141
3. **Install locally for testing**:
4242
```
43-
mkdir -p ~/.terraform.d/plugins/registry.terraform.io/authzed/cloudapi/0.1.0/$(go env GOOS)_$(go env GOARCH)
44-
cp terraform-provider-cloudapi ~/.terraform.d/plugins/registry.terraform.io/authzed/cloudapi/0.1.0/$(go env GOOS)_$(go env GOARCH)/
43+
mkdir -p ~/.terraform.d/plugins/registry.terraform.io/authzed/authzed/0.1.0/$(go env GOOS)_$(go env GOARCH)
44+
cp terraform-provider-authzed ~/.terraform.d/plugins/registry.terraform.io/authzed/authzed/0.1.0/$(go env GOOS)_$(go env GOARCH)/
4545
```
4646

4747
## Making Changes

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
1-
# Terraform Provider for AuthZed Cloud API
1+
# Terraform Provider for AuthZed
22

3-
A Terraform provider for managing administrative access to [AuthZed](https://authzed.com/) through its Cloud API.
3+
A Terraform provider for managing [AuthZed](https://authzed.com/) resources through its Cloud API.
44

55
[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](LICENSE)
66
[![Terraform Registry](https://img.shields.io/badge/Terraform%20Registry-AuthZed-blue.svg)](https://registry.terraform.io/providers/authzed/authzed/latest/docs)
77

88
## Overview
99

10-
This provider automates the management of platform access in AuthZed Dedicated environments:
10+
This provider automates the management of resources in AuthZed Dedicated environments:
1111

1212
- **Service accounts** for programmatic access to permission systems
1313
- **API tokens** for secure authentication

docs/data-sources/permission_system.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,26 @@
11
---
2-
page_title: "Data Source: cloudapi_permission_system"
2+
page_title: "Data Source: authzed_permission_system"
33
description: |-
44
Retrieves information about a specific permission system in AuthZed.
55
---
66

7-
# cloudapi_permission_system
7+
# authzed_permission_system
88

99
This data source retrieves information about a specific permission system in your AuthZed account. Permission systems are where you define and store your permission relationships.
1010

1111
## Example Usage
1212

1313
```terraform
14-
data "cloudapi_permission_system" "development" {
14+
data "authzed_permission_system" "development" {
1515
id = "ps-123456789"
1616
}
1717
1818
output "system_name" {
19-
value = data.cloudapi_permission_system.development.name
19+
value = data.authzed_permission_system.development.name
2020
}
2121
2222
output "system_type" {
23-
value = data.cloudapi_permission_system.development.system_type
23+
value = data.authzed_permission_system.development.system_type
2424
}
2525
```
2626

docs/data-sources/permission_systems.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
---
2-
page_title: "Data Source: cloudapi_permission_systems"
2+
page_title: "Data Source: authzed_permission_systems"
33
description: |-
44
Lists all permission systems available in your AuthZed account.
55
---
66

7-
# cloudapi_permission_systems
7+
# authzed_permission_systems
88

99
This data source retrieves information about all permission systems in your AuthZed account. Use this to discover your permission systems and their properties.
1010

1111
## Example Usage
1212

1313
```terraform
14-
data "cloudapi_permission_systems" "all" {}
14+
data "authzed_permission_systems" "all" {}
1515
1616
output "all_system_names" {
17-
value = [for ps in data.cloudapi_permission_systems.all.permission_systems : ps.name]
17+
value = [for ps in data.authzed_permission_systems.all.permission_systems : ps.name]
1818
}
1919
2020
output "system_count" {
21-
value = data.cloudapi_permission_systems.all.permission_systems_count
21+
value = data.authzed_permission_systems.all.permission_systems_count
2222
}
2323
```
2424

docs/data-sources/policies.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
2-
page_title: "Policies Data Source - cloudapi"
2+
page_title: "Data Source: authzed_policies"
33
subcategory: ""
44
description: |-
55
Lists all policies in a permission system.
66
---
77

8-
# cloudapi_policies (Data Source)
8+
# authzed_policies (Data Source)
99

1010
This data source retrieves a list of all policies defined in an AuthZed Cloud permission system.
1111

1212
## Example Usage
1313

1414
```terraform
15-
data "cloudapi_policies" "all" {
15+
data "authzed_policies" "all" {
1616
permission_system_id = "sys_123456789"
1717
}
1818
1919
output "policy_names" {
20-
value = [for policy in data.cloudapi_policies.all.policies : policy.name]
20+
value = [for policy in data.authzed_policies.all.policies : policy.name]
2121
}
2222
```
2323

docs/data-sources/policy.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
2-
page_title: "Data Source: cloudapi_policy"
2+
page_title: "Data Source: authzed_policy"
33
description: |-
44
Gets information about a specific policy in a permission system.
55
---
66

7-
# cloudapi_policy
7+
# authzed_policy (Data Source)
88

99
This data source retrieves information about a specific policy in an AuthZed permission system.
1010

1111
## Example Usage
1212

1313
```terraform
14-
data "cloudapi_policy" "example" {
14+
data "authzed_policy" "example" {
1515
permission_system_id = "ps-123456789"
1616
policy_id = "apc-abcdef123456"
1717
}
1818
1919
output "policy_roles" {
20-
value = data.cloudapi_policy.example.role_ids
20+
value = data.authzed_policy.example.role_ids
2121
}
2222
```
2323

docs/data-sources/role.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
---
2-
page_title: "Data Source: cloudapi_role"
2+
page_title: "Data Source: authzed_role"
33
description: |-
44
Gets information about a specific role in a permission system.
55
---
66

7-
# cloudapi_role
7+
# authzed_role (Data Source)
88

99
This data source retrieves information about a specific role in an AuthZed permission system.
1010

1111
## Example Usage
1212

1313
```terraform
14-
data "cloudapi_role" "example" {
14+
data "authzed_role" "example" {
1515
permission_system_id = "ps-123456789"
1616
role_id = "arl-abcdef123456"
1717
}
1818
1919
output "role_permissions" {
20-
value = data.cloudapi_role.example.permissions
20+
value = data.authzed_role.example.permissions
2121
}
2222
```
2323

docs/data-sources/roles.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,22 +1,22 @@
11
---
2-
page_title: "Data Source: cloudapi_roles"
2+
page_title: "Data Source: authzed_roles"
33
description: |-
44
Lists all roles in a permission system.
55
---
66

7-
# cloudapi_roles
7+
# authzed_roles (Data Source)
88

99
This data source retrieves a list of all roles defined in an AuthZed permission system.
1010

1111
## Example Usage
1212

1313
```terraform
14-
data "cloudapi_roles" "all" {
14+
data "authzed_roles" "all" {
1515
permission_system_id = "sys_123456789"
1616
}
1717
1818
output "role_names" {
19-
value = [for role in data.cloudapi_roles.all.roles : role.name]
19+
value = [for role in data.authzed_roles.all.roles : role.name]
2020
}
2121
```
2222

0 commit comments

Comments
 (0)