Skip to content

Commit d109fca

Browse files
authored
Merge pull request #416 from hashicorp/RK/HCP-EU
[WIP] Getting the HCP EU documentation ready to go
2 parents 18bbce8 + 8008ed6 commit d109fca

File tree

91 files changed

+2031
-602
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+2031
-602
lines changed

content/terraform-docs-agents/v1.24.x/docs/cloud-docs/agents/agent-pools.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ Terraform Enterprise does not support Stacks. You can only scope agent pools to
1818

1919
Managing agent pools requires the following permissions:
2020

21-
- You must have the [**Manage Agent Pools**](/terraform/cloud-docs/users-teams-organizations/permissions#manage-agent-pools) permission in your organization to manage an organization's agents.
21+
- You must have the [**Manage Agent Pools**](/terraform/cloud-docs/users-teams-organizations/permissions/organization#manage-agent-pools) permission in your organization to manage an organization's agents.
2222
- You must have **Admin** access to a workspace or Stack before you can change its execution mode to use an agent pool.
2323

2424
Refer to [Permissions](/terraform/cloud-docs/users-teams-organizations/permissions) in the HCP Terraform documentation for details.

content/terraform-docs-common/data/cloud-docs-nav-data.json

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -29,6 +29,10 @@
2929
"title": "Migrate to HCP Terraform",
3030
"path": "migrate"
3131
},
32+
{
33+
"title": "Use HCP Terraform in Europe",
34+
"path": "europe"
35+
},
3236
{
3337
"title": "Manage access and organizations",
3438
"routes": [
@@ -73,16 +77,21 @@
7377
]
7478
},
7579
{
76-
"title": "Permissions",
77-
"path": "users-teams-organizations/permissions"
80+
"title": "Set permissions",
81+
"routes": [
82+
{"title": "Overview","path": "users-teams-organizations/permissions"},
83+
{"title": "Set permissions","path": "users-teams-organizations/permissions/set-permissions"},
84+
{ "title": "Organization permissions", "path": "users-teams-organizations/permissions/organization" },
85+
{ "title": "Project permissions", "path": "users-teams-organizations/permissions/project" },
86+
{ "title": "Workspace permissions", "path": "users-teams-organizations/permissions/workspace" }
87+
]
7888
},
79-
8089
{
81-
"title": "Two-factor authentication",
90+
"title": "Two-factor authentication",
8291
"path": "users-teams-organizations/2fa"
8392
},
8493
{
85-
"title": "API tokens",
94+
"title": "API tokens",
8695
"path": "users-teams-organizations/api-tokens"
8796
},
8897
{

content/terraform-docs-common/docs/cloud-docs/api-docs/configuration-versions.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ description: >-
4444

4545
A configuration version (`configuration-version`) is a resource used to reference the uploaded configuration files on a workspace. It is associated with the run to use the uploaded configuration files for performing the plan and apply.
4646

47-
You need read runs permission to list and view configuration versions for a workspace, and you need queue plans permission to create new configuration versions. Refer to the [permissions](/terraform/cloud-docs/users-teams-organizations/permissions#general-workspace-permissions) documentation for more details.
47+
You need read runs permission to list and view configuration versions for a workspace, and you need queue plans permission to create new configuration versions. Refer to the [permissions](/terraform/cloud-docs/users-teams-organizations/permissions/workspace) documentation for more details.
4848

4949
[permissions-citation]: #intentionally-unused---keep-for-maintainers
5050

content/terraform-docs-common/docs/cloud-docs/api-docs/hold-your-own-key/configurations.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ tfc_only: true
4141

4242
@include 'tfc-package-callouts/hyok.mdx'
4343

44-
Hold your own key (HYOK) lets you authenticate a key management system with HCP Terraform to encrypt HCP Terraform state and plan data with a key that you provide and control.
44+
Hold your own key (HYOK) lets you authenticate a key management system with HCP Terraform to encrypt workspace state and plan data with a key that you provide and control.
4545

4646
HCP Terraform lets you configure multiple HYOK configurations for an
4747
organization. Each HYOK configuration corresponds to a single key in a

content/terraform-docs-common/docs/cloud-docs/api-docs/organization-memberships.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ You can invite users who already have an account, as well as new users. If the u
5252
| -------------------- | ----------------------------------------------------------------------------------------------------------------------------------------- |
5353
| `:organization_name` | The name of the organization the user will be invited to join. The inviting user must have permission to manage organization memberships. |
5454

55-
-> **Note:** Organization membership management is restricted to members of the owners team, the owners [team API token](/terraform/cloud-docs/users-teams-organizations/api-tokens#team-api-tokens), the [organization API token](/terraform/cloud-docs/users-teams-organizations/api-tokens#organization-api-tokens), and users or teams with one of the [Team Management](/terraform/cloud-docs/users-teams-organizations/permissions#team-management-permissions) permissions.
55+
-> **Note:** Organization membership management is restricted to members of the owners team, the owners [team API token](/terraform/cloud-docs/users-teams-organizations/api-tokens#team-api-tokens), the [organization API token](/terraform/cloud-docs/users-teams-organizations/api-tokens#organization-api-tokens), and users or teams with one of the [Team Management](/terraform/cloud-docs/users-teams-organizations/permissions/organization#team-permissions) permissions.
5656

5757
[permissions-citation]: #intentionally-unused---keep-for-maintainers
5858

@@ -194,7 +194,7 @@ This endpoint supports pagination [with standard URL query parameters](/terrafor
194194
| ---------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
195195
| `q` | **Optional.** A search query string. Organization memberships are searchable by user name and email. |
196196
| `filter[status]` | **Optional.** If specified, restricts results to those with the matching status value. Valid values are `invited` and `active`. |
197-
| `filter[email]` | **Optional.** If specified, restricts results to those with a matching user email address. If multiple comma separated values are specified, results matching any of the values are returned. |
197+
| `filter[email]` | **Optional.** If specified, restricts results to those with a matching user email address. If multiple comma separated values are specified, results matching any of the values are returned. |
198198
| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. |
199199
| `page[size]` | **Optional.** If omitted, the endpoint will return 20 users per page. |
200200

content/terraform-docs-common/docs/cloud-docs/api-docs/private-registry/gpg-keys.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ description: >-
4040

4141
These endpoints are only relevant to private providers. When you [publish a private provider](/terraform/cloud-docs/registry/publish-providers) to the HCP Terraform private registry, you must upload the public key of the GPG key-pair that you used to sign the release. The HCP Terraform registry supports RSA or DSA formatted GPG keys. Refer to [Preparing and adding a signing key](/terraform/registry/providers/publishing#preparing-and-adding-a-signing-key) for more details.
4242

43-
You need [owners team](/terraform/cloud-docs/users-teams-organizations/permissions#organization-owners) or [Manage Private Registry](/terraform/cloud-docs/users-teams-organizations/permissions#manage-private-registry) permissions to add, update, or delete GPG keys in a private registry.
43+
You need [owners team](/terraform/cloud-docs/users-teams-organizations/permissions/organization#organization-owners) or [Manage Private Registry](/terraform/cloud-docs/users-teams-organizations/permissions/organization#manage-private-registry) permissions to add, update, or delete GPG keys in a private registry.
4444

4545
## List GPG Keys
4646

content/terraform-docs-common/docs/cloud-docs/api-docs/private-registry/provider-versions-platforms.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ description: >-
4141
These endpoints are only relevant to private providers. When you [publish a private provider](/terraform/cloud-docs/registry/publish-providers) to the HCP Terraform private registry, you must also create at least one version and at least one platform for that version before consumers can use the provider in configurations. Unlike the public Terraform Registry, the private registry does not automatically upload new releases. You must manually add new provider versions and the associated release files.
4242

4343

44-
All members of an organization can view and use both public and private providers, but you need [owners team](/terraform/cloud-docs/users-teams-organizations/permissions#organization-owners) or [Manage Private Registry](/terraform/cloud-docs/users-teams-organizations/permissions#manage-private-registry) permissions to add, update, or delete provider versions and platforms in private registry.
44+
All members of an organization can view and use both public and private providers, but you need [owners team](/terraform/cloud-docs/users-teams-organizations/permissions/organization#organization-owners) or [Manage Private Registry](/terraform/cloud-docs/users-teams-organizations/permissions/organization#manage-private-registry) permissions to add, update, or delete provider versions and platforms in private registry.
4545

4646
## Create a Provider Version
4747

content/terraform-docs-common/docs/cloud-docs/api-docs/private-registry/providers.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ description: >-
4141
You can add publicly curated providers from the [Terraform Registry](https://registry.terraform.io/) and custom, private providers to your HCP Terraform private registry. The private registry stores a pointer to public providers so that you can view their data from within HCP Terraform. This lets you clearly designate all of the providers that are recommended for the organization and makes them centrally accessible.
4242

4343

44-
All members of an organization can view and use both public and private providers, but you need [owners team](/terraform/cloud-docs/users-teams-organizations/permissions#organization-owners) or [Manage Private Registry](/terraform/cloud-docs/users-teams-organizations/permissions#manage-private-registry) permissions to add, update, or delete them them in private registry.
44+
All members of an organization can view and use both public and private providers, but you need [owners team](/terraform/cloud-docs/users-teams-organizations/permissions/organization#organization-owners) or [Manage Private Registry](/terraform/cloud-docs/users-teams-organizations/permissions/organization#manage-private-registry) permissions to add, update, or delete them them in private registry.
4545

4646
## HCP Terraform Registry Implementation
4747

content/terraform-docs-common/docs/cloud-docs/api-docs/run-tasks/run-tasks.mdx

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ Refer to [run tasks Integration](/terraform/cloud-docs/api-docs/run-tasks/run-ta
5050

5151
## Required Permissions
5252

53-
To interact with run tasks on an organization, you need the [Manage Run Tasks permission](/terraform/cloud-docs/users-teams-organizations/permissions#manage-run-tasks). To associate or dissociate run tasks in a workspace, you need the [Manage Workspace Run Tasks permission](/terraform/cloud-docs/users-teams-organizations/permissions#general-workspace-permissions) on that particular workspace.
53+
To interact with run tasks on an organization, you need the [Manage Run Tasks permission](/terraform/cloud-docs/users-teams-organizations/permissions/organization#manage-run-tasks). To associate or dissociate run tasks in a workspace, you need the [Manage Workspace Run Tasks permission](/terraform/cloud-docs/users-teams-organizations/permissions/workspace#manage-workspace-run-tasks) on that particular workspace.
5454

5555
[permissions-citation]: #intentionally-unused---keep-for-maintainers
5656

@@ -60,7 +60,7 @@ To interact with run tasks on an organization, you need the [Manage Run Tasks pe
6060

6161
| Parameter | Description |
6262
| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
63-
| `:organization_name` | The organization to create a run task in. The organization must already exist in HCP Terraform, and the token authenticating the API request must have [owner permission](/terraform/cloud-docs/users-teams-organizations/permissions). |
63+
| `:organization_name` | The organization to create a run task in. The organization must already exist in HCP Terraform, and the token authenticating the API request must have [owner permission](/terraform/cloud-docs/users-teams-organizations/permissions/organization#organization-owners). |
6464

6565
[permissions-citation]: #intentionally-unused---keep-for-maintainers
6666

content/terraform-docs-common/docs/cloud-docs/api-docs/variable-sets.mdx

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ A [variable set](/terraform/cloud-docs/variables#scope) is a resource that allow
4141

4242
Projects and organizations can both own variable sets. The owner of a variable set can determine the precedence of that set. Refer to [**Manage variable sets**](/terraform/cloud-docs/variables/managing-variables#permissions) for more details on variable set permissions.
4343

44-
To view the variables applied from a variable set on a particular workspace, you must have [**Read** variables permission](/terraform/cloud-docs/users-teams-organizations/permissions#general-workspace-permissions) on that workspace.
44+
To view the variables applied from a variable set on a particular workspace, you must have [**Read** variables permission](/terraform/cloud-docs/users-teams-organizations/permissions/workspace) on that workspace.
4545

4646
## Create a Variable Set
4747

0 commit comments

Comments
 (0)