@@ -217,20 +217,20 @@ func TestRolePermissions(t *testing.T) {
217
217
},
218
218
{
219
219
Name :"Templates" ,
220
- Actions : []policy.Action {policy .ActionCreate ,policy .ActionUpdate ,policy .ActionDelete , policy . ActionViewInsights },
220
+ Actions : []policy.Action {policy .ActionCreate ,policy .ActionUpdate ,policy .ActionDelete },
221
221
Resource :rbac .ResourceTemplate .WithID (templateID ).InOrg (orgID ),
222
222
AuthorizeMap :map [bool ][]hasAuthSubjects {
223
223
true : {owner ,orgAdmin ,templateAdmin ,orgTemplateAdmin },
224
- false : {setOtherOrg ,orgAuditor , orgUserAdmin ,memberMe ,orgMemberMe ,userAdmin },
224
+ false : {setOtherOrg ,orgUserAdmin , orgAuditor ,memberMe ,orgMemberMe ,userAdmin },
225
225
},
226
226
},
227
227
{
228
228
Name :"ReadTemplates" ,
229
- Actions : []policy.Action {policy .ActionRead },
229
+ Actions : []policy.Action {policy .ActionRead , policy . ActionViewInsights },
230
230
Resource :rbac .ResourceTemplate .InOrg (orgID ),
231
231
AuthorizeMap :map [bool ][]hasAuthSubjects {
232
- true : {owner ,orgAdmin ,templateAdmin ,orgTemplateAdmin },
233
- false : {setOtherOrg ,orgAuditor , orgUserAdmin ,memberMe ,userAdmin ,orgMemberMe },
232
+ true : {owner ,orgAuditor , orgAdmin ,templateAdmin ,orgTemplateAdmin },
233
+ false : {setOtherOrg ,orgUserAdmin ,memberMe ,userAdmin ,orgMemberMe },
234
234
},
235
235
},
236
236
{
@@ -377,8 +377,8 @@ func TestRolePermissions(t *testing.T) {
377
377
Actions : []policy.Action {policy .ActionRead },
378
378
Resource :rbac .ResourceOrganizationMember .WithID (currentUser ).InOrg (orgID ).WithOwner (currentUser .String ()),
379
379
AuthorizeMap :map [bool ][]hasAuthSubjects {
380
- true : {owner ,orgAdmin ,userAdmin ,orgMemberMe ,templateAdmin ,orgUserAdmin ,orgTemplateAdmin },
381
- false : {memberMe ,setOtherOrg , orgAuditor },
380
+ true : {owner ,orgAuditor , orgAdmin ,userAdmin ,orgMemberMe ,templateAdmin ,orgUserAdmin ,orgTemplateAdmin },
381
+ false : {memberMe ,setOtherOrg },
382
382
},
383
383
},
384
384
{
@@ -404,7 +404,7 @@ func TestRolePermissions(t *testing.T) {
404
404
}),
405
405
AuthorizeMap :map [bool ][]hasAuthSubjects {
406
406
true : {owner ,orgAdmin ,userAdmin ,orgUserAdmin },
407
- false : {setOtherOrg ,memberMe ,orgMemberMe ,templateAdmin ,orgTemplateAdmin ,orgAuditor , groupMemberMe },
407
+ false : {setOtherOrg ,memberMe ,orgMemberMe ,templateAdmin ,orgTemplateAdmin ,groupMemberMe , orgAuditor },
408
408
},
409
409
},
410
410
{
@@ -416,26 +416,26 @@ func TestRolePermissions(t *testing.T) {
416
416
},
417
417
}),
418
418
AuthorizeMap :map [bool ][]hasAuthSubjects {
419
- true : {owner ,orgAdmin ,userAdmin ,templateAdmin ,orgTemplateAdmin ,orgUserAdmin ,groupMemberMe },
420
- false : {setOtherOrg ,memberMe ,orgMemberMe , orgAuditor },
419
+ true : {owner ,orgAdmin ,userAdmin ,templateAdmin ,orgTemplateAdmin ,orgUserAdmin ,groupMemberMe , orgAuditor },
420
+ false : {setOtherOrg ,memberMe ,orgMemberMe },
421
421
},
422
422
},
423
423
{
424
424
Name :"GroupMemberMeRead" ,
425
425
Actions : []policy.Action {policy .ActionRead },
426
426
Resource :rbac .ResourceGroupMember .WithID (currentUser ).InOrg (orgID ).WithOwner (currentUser .String ()),
427
427
AuthorizeMap :map [bool ][]hasAuthSubjects {
428
- true : {owner ,orgAdmin ,userAdmin ,templateAdmin ,orgTemplateAdmin ,orgUserAdmin ,orgMemberMe ,groupMemberMe },
429
- false : {setOtherOrg ,memberMe , orgAuditor },
428
+ true : {owner ,orgAuditor , orgAdmin ,userAdmin ,templateAdmin ,orgTemplateAdmin ,orgUserAdmin ,orgMemberMe ,groupMemberMe },
429
+ false : {setOtherOrg ,memberMe },
430
430
},
431
431
},
432
432
{
433
433
Name :"GroupMemberOtherRead" ,
434
434
Actions : []policy.Action {policy .ActionRead },
435
435
Resource :rbac .ResourceGroupMember .WithID (adminID ).InOrg (orgID ).WithOwner (adminID .String ()),
436
436
AuthorizeMap :map [bool ][]hasAuthSubjects {
437
- true : {owner ,orgAdmin ,userAdmin ,templateAdmin ,orgTemplateAdmin ,orgUserAdmin },
438
- false : {setOtherOrg ,memberMe ,orgAuditor , orgMemberMe ,groupMemberMe },
437
+ true : {owner ,orgAuditor , orgAdmin ,userAdmin ,templateAdmin ,orgTemplateAdmin ,orgUserAdmin },
438
+ false : {setOtherOrg ,memberMe ,orgMemberMe ,groupMemberMe },
439
439
},
440
440
},
441
441
{
@@ -534,16 +534,16 @@ func TestRolePermissions(t *testing.T) {
534
534
Actions : []policy.Action {policy .ActionCreate ,policy .ActionUpdate ,policy .ActionDelete },
535
535
Resource :rbac .ResourceProvisionerDaemon .InOrg (orgID ),
536
536
AuthorizeMap :map [bool ][]hasAuthSubjects {
537
- true : {owner ,templateAdmin ,orgAdmin },
538
- false : {setOtherOrg ,orgTemplateAdmin ,orgUserAdmin ,memberMe ,orgMemberMe ,userAdmin , orgAuditor },
537
+ true : {owner ,templateAdmin ,orgAdmin , orgTemplateAdmin },
538
+ false : {setOtherOrg ,orgAuditor ,orgUserAdmin ,memberMe ,orgMemberMe ,userAdmin },
539
539
},
540
540
},
541
541
{
542
542
Name :"ProvisionerDaemonsRead" ,
543
543
Actions : []policy.Action {policy .ActionRead },
544
544
Resource :rbac .ResourceProvisionerDaemon .InOrg (orgID ),
545
545
AuthorizeMap :map [bool ][]hasAuthSubjects {
546
- true : {owner ,templateAdmin ,setOrgNotMe ,orgMemberMe },
546
+ true : {owner ,templateAdmin ,setOrgNotMe ,orgAuditor , orgMemberMe },
547
547
false : {setOtherOrg ,memberMe ,userAdmin },
548
548
},
549
549
},