@@ -114,7 +114,7 @@ site_allow(roles) := num if {
114
114
# Adding a second org_members set might affect the partial evaluation.
115
115
# This is being left until org scopes are used.
116
116
org_members:= {orgID|
117
- input.subject.roles[_].org [orgID]
117
+ input.subject.roles[_].by_org_id [orgID]
118
118
}
119
119
120
120
# 'org' is the same as 'site' except we need to iterate over each organization
@@ -140,7 +140,7 @@ org_allow_set(roles, key) := allow_set if {
140
140
id:= org_members[_]
141
141
set:= {is_allowed|
142
142
# Iterate over all org permissions in all roles
143
- perm:= roles[_][key][id ][_]
143
+ perm:= roles[_].by_org_id[id][key ][_]
144
144
perm.action in [input.action," *" ]
145
145
perm.resource_type in [input.object.type," *" ]
146
146
@@ -260,15 +260,15 @@ org_member := num if {
260
260
# Object must be jointly owned by the user
261
261
input.object.owner!= " "
262
262
input.subject.id= input.object.owner
263
- num:= org_allow (input.subject.roles," org_member " )
263
+ num:= org_allow (input.subject.roles," member " )
264
264
}
265
265
266
266
default scope_org_member:= 0
267
267
scope_org_member:= num if {
268
268
# Object must be jointly owned by the user
269
269
input.object.owner!= " "
270
270
input.subject.id= input.object.owner
271
- num:= org_allow ([input.subject.scope]," org_member " )
271
+ num:= org_allow ([input.subject.scope]," member " )
272
272
}
273
273
274
274
# Scope allow_list is a list of resource (Type, ID) tuples explicitly allowed by the scope.