@@ -119,7 +119,7 @@ func TestRolePermissions(t *testing.T) {
119
119
memberMe := authSubject {Name : "member_me" , UserID : currentUser .String (), Roles : []string {rbac .RoleMember ()}}
120
120
orgMemberMe := authSubject {Name : "org_member_me" , UserID : currentUser .String (), Roles : []string {rbac .RoleMember (), rbac .RoleOrgMember (orgID )}}
121
121
122
- admin := authSubject {Name : "admin " , UserID : adminID .String (), Roles : []string {rbac .RoleMember (), rbac .RoleOwner ()}}
122
+ owner := authSubject {Name : "owner " , UserID : adminID .String (), Roles : []string {rbac .RoleMember (), rbac .RoleOwner ()}}
123
123
orgAdmin := authSubject {Name : "org_admin" , UserID : adminID .String (), Roles : []string {rbac .RoleMember (), rbac .RoleOrgMember (orgID ), rbac .RoleOrgAdmin (orgID )}}
124
124
125
125
otherOrgMember := authSubject {Name : "org_member_other" , UserID : uuid .NewString (), Roles : []string {rbac .RoleMember (), rbac .RoleOrgMember (otherOrg )}}
@@ -130,7 +130,7 @@ func TestRolePermissions(t *testing.T) {
130
130
131
131
// requiredSubjects are required to be asserted in each test case. This is
132
132
// to make sure one is not forgotten.
133
- requiredSubjects := []authSubject {memberMe , admin , orgMemberMe , orgAdmin , otherOrgAdmin , otherOrgMember , templateAdmin , userAdmin }
133
+ requiredSubjects := []authSubject {memberMe , owner , orgMemberMe , orgAdmin , otherOrgAdmin , otherOrgMember , templateAdmin , userAdmin }
134
134
135
135
testCases := []struct {
136
136
// Name the test case to better locate the failing test case.
@@ -150,7 +150,7 @@ func TestRolePermissions(t *testing.T) {
150
150
Actions : []rbac.Action {rbac .ActionRead },
151
151
Resource : rbac .ResourceUser ,
152
152
AuthorizeMap : map [bool ][]authSubject {
153
- true : {admin , memberMe , orgMemberMe , orgAdmin , otherOrgMember , otherOrgAdmin , templateAdmin , userAdmin },
153
+ true : {owner , memberMe , orgMemberMe , orgAdmin , otherOrgMember , otherOrgAdmin , templateAdmin , userAdmin },
154
154
false : {},
155
155
},
156
156
},
@@ -159,7 +159,7 @@ func TestRolePermissions(t *testing.T) {
159
159
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionUpdate , rbac .ActionDelete },
160
160
Resource : rbac .ResourceUser ,
161
161
AuthorizeMap : map [bool ][]authSubject {
162
- true : {admin , userAdmin },
162
+ true : {owner , userAdmin },
163
163
false : {memberMe , orgMemberMe , orgAdmin , otherOrgMember , otherOrgAdmin , templateAdmin },
164
164
},
165
165
},
@@ -169,7 +169,7 @@ func TestRolePermissions(t *testing.T) {
169
169
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionRead , rbac .ActionUpdate , rbac .ActionDelete },
170
170
Resource : rbac .ResourceWorkspace .InOrg (orgID ).WithOwner (currentUser .String ()),
171
171
AuthorizeMap : map [bool ][]authSubject {
172
- true : {admin , orgMemberMe , orgAdmin , templateAdmin },
172
+ true : {owner , orgMemberMe , orgAdmin , templateAdmin },
173
173
false : {memberMe , otherOrgAdmin , otherOrgMember , userAdmin },
174
174
},
175
175
},
@@ -179,7 +179,7 @@ func TestRolePermissions(t *testing.T) {
179
179
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionRead , rbac .ActionUpdate , rbac .ActionDelete },
180
180
Resource : rbac .ResourceWorkspaceExecution .InOrg (orgID ).WithOwner (currentUser .String ()),
181
181
AuthorizeMap : map [bool ][]authSubject {
182
- true : {admin , orgAdmin , orgMemberMe },
182
+ true : {owner , orgAdmin , orgMemberMe },
183
183
false : {memberMe , otherOrgAdmin , otherOrgMember , templateAdmin , userAdmin },
184
184
},
185
185
},
@@ -188,7 +188,7 @@ func TestRolePermissions(t *testing.T) {
188
188
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionUpdate , rbac .ActionDelete },
189
189
Resource : rbac .ResourceTemplate .InOrg (orgID ),
190
190
AuthorizeMap : map [bool ][]authSubject {
191
- true : {admin , orgAdmin , templateAdmin },
191
+ true : {owner , orgAdmin , templateAdmin },
192
192
false : {memberMe , orgMemberMe , otherOrgAdmin , otherOrgMember , userAdmin },
193
193
},
194
194
},
@@ -197,7 +197,7 @@ func TestRolePermissions(t *testing.T) {
197
197
Actions : []rbac.Action {rbac .ActionRead },
198
198
Resource : rbac .ResourceTemplate .InOrg (orgID ),
199
199
AuthorizeMap : map [bool ][]authSubject {
200
- true : {admin , orgMemberMe , orgAdmin , templateAdmin },
200
+ true : {owner , orgMemberMe , orgAdmin , templateAdmin },
201
201
false : {memberMe , otherOrgAdmin , otherOrgMember , userAdmin },
202
202
},
203
203
},
@@ -206,7 +206,7 @@ func TestRolePermissions(t *testing.T) {
206
206
Actions : []rbac.Action {rbac .ActionCreate },
207
207
Resource : rbac .ResourceFile ,
208
208
AuthorizeMap : map [bool ][]authSubject {
209
- true : {admin , templateAdmin },
209
+ true : {owner , templateAdmin },
210
210
false : {orgMemberMe , orgAdmin , memberMe , otherOrgAdmin , otherOrgMember , userAdmin },
211
211
},
212
212
},
@@ -215,7 +215,7 @@ func TestRolePermissions(t *testing.T) {
215
215
Actions : []rbac.Action {rbac .ActionRead , rbac .ActionUpdate , rbac .ActionDelete },
216
216
Resource : rbac .ResourceFile .WithOwner (currentUser .String ()),
217
217
AuthorizeMap : map [bool ][]authSubject {
218
- true : {admin , memberMe , orgMemberMe , templateAdmin },
218
+ true : {owner , memberMe , orgMemberMe , templateAdmin },
219
219
false : {orgAdmin , otherOrgAdmin , otherOrgMember , userAdmin },
220
220
},
221
221
},
@@ -224,7 +224,7 @@ func TestRolePermissions(t *testing.T) {
224
224
Actions : []rbac.Action {rbac .ActionCreate },
225
225
Resource : rbac .ResourceOrganization ,
226
226
AuthorizeMap : map [bool ][]authSubject {
227
- true : {admin },
227
+ true : {owner },
228
228
false : {orgAdmin , otherOrgAdmin , otherOrgMember , memberMe , orgMemberMe , templateAdmin , userAdmin },
229
229
},
230
230
},
@@ -233,7 +233,7 @@ func TestRolePermissions(t *testing.T) {
233
233
Actions : []rbac.Action {rbac .ActionUpdate , rbac .ActionDelete },
234
234
Resource : rbac .ResourceOrganization .InOrg (orgID ),
235
235
AuthorizeMap : map [bool ][]authSubject {
236
- true : {admin , orgAdmin },
236
+ true : {owner , orgAdmin },
237
237
false : {otherOrgAdmin , otherOrgMember , memberMe , orgMemberMe , templateAdmin , userAdmin },
238
238
},
239
239
},
@@ -242,7 +242,7 @@ func TestRolePermissions(t *testing.T) {
242
242
Actions : []rbac.Action {rbac .ActionRead },
243
243
Resource : rbac .ResourceOrganization .InOrg (orgID ),
244
244
AuthorizeMap : map [bool ][]authSubject {
245
- true : {admin , orgAdmin , orgMemberMe },
245
+ true : {owner , orgAdmin , orgMemberMe },
246
246
false : {otherOrgAdmin , otherOrgMember , memberMe , templateAdmin , userAdmin },
247
247
},
248
248
},
@@ -251,16 +251,16 @@ func TestRolePermissions(t *testing.T) {
251
251
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionUpdate , rbac .ActionDelete },
252
252
Resource : rbac .ResourceRoleAssignment ,
253
253
AuthorizeMap : map [bool ][]authSubject {
254
- true : {admin },
255
- false : {orgAdmin , orgMemberMe , otherOrgAdmin , otherOrgMember , memberMe , templateAdmin , userAdmin },
254
+ true : {owner , userAdmin },
255
+ false : {orgAdmin , orgMemberMe , otherOrgAdmin , otherOrgMember , memberMe , templateAdmin },
256
256
},
257
257
},
258
258
{
259
259
Name : "ReadRoleAssignment" ,
260
260
Actions : []rbac.Action {rbac .ActionRead },
261
261
Resource : rbac .ResourceRoleAssignment ,
262
262
AuthorizeMap : map [bool ][]authSubject {
263
- true : {admin , orgAdmin , orgMemberMe , otherOrgAdmin , otherOrgMember , memberMe , templateAdmin , userAdmin },
263
+ true : {owner , orgAdmin , orgMemberMe , otherOrgAdmin , otherOrgMember , memberMe , templateAdmin , userAdmin },
264
264
false : {},
265
265
},
266
266
},
@@ -269,7 +269,7 @@ func TestRolePermissions(t *testing.T) {
269
269
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionUpdate , rbac .ActionDelete },
270
270
Resource : rbac .ResourceOrgRoleAssignment .InOrg (orgID ),
271
271
AuthorizeMap : map [bool ][]authSubject {
272
- true : {admin , orgAdmin },
272
+ true : {owner , orgAdmin },
273
273
false : {orgMemberMe , otherOrgAdmin , otherOrgMember , memberMe , templateAdmin , userAdmin },
274
274
},
275
275
},
@@ -278,7 +278,7 @@ func TestRolePermissions(t *testing.T) {
278
278
Actions : []rbac.Action {rbac .ActionRead },
279
279
Resource : rbac .ResourceOrgRoleAssignment .InOrg (orgID ),
280
280
AuthorizeMap : map [bool ][]authSubject {
281
- true : {admin , orgAdmin , orgMemberMe },
281
+ true : {owner , orgAdmin , orgMemberMe },
282
282
false : {otherOrgAdmin , otherOrgMember , memberMe , templateAdmin , userAdmin },
283
283
},
284
284
},
@@ -287,7 +287,7 @@ func TestRolePermissions(t *testing.T) {
287
287
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionRead , rbac .ActionUpdate , rbac .ActionDelete },
288
288
Resource : rbac .ResourceAPIKey .WithOwner (currentUser .String ()),
289
289
AuthorizeMap : map [bool ][]authSubject {
290
- true : {admin , orgMemberMe , memberMe },
290
+ true : {owner , orgMemberMe , memberMe },
291
291
false : {orgAdmin , otherOrgAdmin , otherOrgMember , templateAdmin , userAdmin },
292
292
},
293
293
},
@@ -296,7 +296,7 @@ func TestRolePermissions(t *testing.T) {
296
296
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionRead , rbac .ActionUpdate , rbac .ActionDelete },
297
297
Resource : rbac .ResourceUserData .WithOwner (currentUser .String ()),
298
298
AuthorizeMap : map [bool ][]authSubject {
299
- true : {admin , orgMemberMe , memberMe },
299
+ true : {owner , orgMemberMe , memberMe },
300
300
false : {orgAdmin , otherOrgAdmin , otherOrgMember , templateAdmin , userAdmin },
301
301
},
302
302
},
@@ -305,17 +305,17 @@ func TestRolePermissions(t *testing.T) {
305
305
Actions : []rbac.Action {rbac .ActionCreate , rbac .ActionUpdate , rbac .ActionDelete },
306
306
Resource : rbac .ResourceOrganizationMember .InOrg (orgID ),
307
307
AuthorizeMap : map [bool ][]authSubject {
308
- true : {admin , orgAdmin },
309
- false : {orgMemberMe , memberMe , otherOrgAdmin , otherOrgMember , templateAdmin , userAdmin },
308
+ true : {owner , orgAdmin , userAdmin },
309
+ false : {orgMemberMe , memberMe , otherOrgAdmin , otherOrgMember , templateAdmin },
310
310
},
311
311
},
312
312
{
313
313
Name : "ReadOrgMember" ,
314
314
Actions : []rbac.Action {rbac .ActionRead },
315
315
Resource : rbac .ResourceOrganizationMember .InOrg (orgID ),
316
316
AuthorizeMap : map [bool ][]authSubject {
317
- true : {admin , orgAdmin , orgMemberMe },
318
- false : {memberMe , otherOrgAdmin , otherOrgMember , templateAdmin , userAdmin },
317
+ true : {owner , orgAdmin , orgMemberMe , userAdmin },
318
+ false : {memberMe , otherOrgAdmin , otherOrgMember , templateAdmin },
319
319
},
320
320
},
321
321
}
0 commit comments