@@ -232,8 +232,9 @@ var (
232
232
// Provisionerd creates usage events
233
233
rbac .ResourceUsageEvent .Type : {policy .ActionCreate },
234
234
}),
235
- Org :map [string ][]rbac.Permission {},
236
- User : []rbac.Permission {},
235
+ Org :map [string ][]rbac.Permission {},
236
+ User : []rbac.Permission {},
237
+ OrgMember :map [string ][]rbac.Permission {},
237
238
},
238
239
}),
239
240
Scope :rbac .ScopeAll ,
@@ -257,8 +258,9 @@ var (
257
258
rbac .ResourceWorkspace .Type : {policy .ActionDelete ,policy .ActionRead ,policy .ActionUpdate ,policy .ActionWorkspaceStart ,policy .ActionWorkspaceStop },
258
259
rbac .ResourceWorkspaceDormant .Type : {policy .ActionDelete ,policy .ActionRead ,policy .ActionUpdate ,policy .ActionWorkspaceStop },
259
260
}),
260
- Org :map [string ][]rbac.Permission {},
261
- User : []rbac.Permission {},
261
+ Org :map [string ][]rbac.Permission {},
262
+ User : []rbac.Permission {},
263
+ OrgMember :map [string ][]rbac.Permission {},
262
264
},
263
265
}),
264
266
Scope :rbac .ScopeAll ,
@@ -279,8 +281,9 @@ var (
279
281
rbac .ResourceWorkspace .Type : {policy .ActionRead ,policy .ActionUpdate },
280
282
rbac .ResourceProvisionerJobs .Type : {policy .ActionRead ,policy .ActionUpdate },
281
283
}),
282
- Org :map [string ][]rbac.Permission {},
283
- User : []rbac.Permission {},
284
+ Org :map [string ][]rbac.Permission {},
285
+ User : []rbac.Permission {},
286
+ OrgMember :map [string ][]rbac.Permission {},
284
287
},
285
288
}),
286
289
Scope :rbac .ScopeAll ,
@@ -298,8 +301,9 @@ var (
298
301
Site :rbac .Permissions (map [string ][]policy.Action {
299
302
rbac .ResourceCryptoKey .Type : {policy .WildcardSymbol },
300
303
}),
301
- Org :map [string ][]rbac.Permission {},
302
- User : []rbac.Permission {},
304
+ Org :map [string ][]rbac.Permission {},
305
+ User : []rbac.Permission {},
306
+ OrgMember :map [string ][]rbac.Permission {},
303
307
},
304
308
}),
305
309
Scope :rbac .ScopeAll ,
@@ -317,8 +321,9 @@ var (
317
321
Site :rbac .Permissions (map [string ][]policy.Action {
318
322
rbac .ResourceCryptoKey .Type : {policy .WildcardSymbol },
319
323
}),
320
- Org :map [string ][]rbac.Permission {},
321
- User : []rbac.Permission {},
324
+ Org :map [string ][]rbac.Permission {},
325
+ User : []rbac.Permission {},
326
+ OrgMember :map [string ][]rbac.Permission {},
322
327
},
323
328
}),
324
329
Scope :rbac .ScopeAll ,
@@ -335,8 +340,9 @@ var (
335
340
Site :rbac .Permissions (map [string ][]policy.Action {
336
341
rbac .ResourceConnectionLog .Type : {policy .ActionUpdate ,policy .ActionRead },
337
342
}),
338
- Org :map [string ][]rbac.Permission {},
339
- User : []rbac.Permission {},
343
+ Org :map [string ][]rbac.Permission {},
344
+ User : []rbac.Permission {},
345
+ OrgMember :map [string ][]rbac.Permission {},
340
346
},
341
347
}),
342
348
Scope :rbac .ScopeAll ,
@@ -356,8 +362,9 @@ var (
356
362
rbac .ResourceWebpushSubscription .Type : {policy .ActionCreate ,policy .ActionRead ,policy .ActionUpdate ,policy .ActionDelete },
357
363
rbac .ResourceDeploymentConfig .Type : {policy .ActionRead ,policy .ActionUpdate },// To read and upsert VAPID keys
358
364
}),
359
- Org :map [string ][]rbac.Permission {},
360
- User : []rbac.Permission {},
365
+ Org :map [string ][]rbac.Permission {},
366
+ User : []rbac.Permission {},
367
+ OrgMember :map [string ][]rbac.Permission {},
361
368
},
362
369
}),
363
370
Scope :rbac .ScopeAll ,
@@ -375,8 +382,9 @@ var (
375
382
// The workspace monitor needs to be able to update monitors
376
383
rbac .ResourceWorkspaceAgentResourceMonitor .Type : {policy .ActionUpdate },
377
384
}),
378
- Org :map [string ][]rbac.Permission {},
379
- User : []rbac.Permission {},
385
+ Org :map [string ][]rbac.Permission {},
386
+ User : []rbac.Permission {},
387
+ OrgMember :map [string ][]rbac.Permission {},
380
388
},
381
389
}),
382
390
Scope :rbac .ScopeAll ,
@@ -398,6 +406,7 @@ var (
398
406
User :rbac .Permissions (map [string ][]policy.Action {
399
407
rbac .ResourceWorkspace .Type : {policy .ActionRead ,policy .ActionUpdate ,policy .ActionCreateAgent ,policy .ActionDeleteAgent },
400
408
}),
409
+ OrgMember :map [string ][]rbac.Permission {},
401
410
},
402
411
}),
403
412
Scope :rbac .ScopeAll ,
@@ -436,8 +445,9 @@ var (
436
445
rbac .ResourceOauth2App .Type : {policy .ActionCreate ,policy .ActionRead ,policy .ActionUpdate ,policy .ActionDelete },
437
446
rbac .ResourceOauth2AppSecret .Type : {policy .ActionCreate ,policy .ActionRead ,policy .ActionUpdate ,policy .ActionDelete },
438
447
}),
439
- Org :map [string ][]rbac.Permission {},
440
- User : []rbac.Permission {},
448
+ Org :map [string ][]rbac.Permission {},
449
+ User : []rbac.Permission {},
450
+ OrgMember :map [string ][]rbac.Permission {},
441
451
},
442
452
}),
443
453
Scope :rbac .ScopeAll ,
@@ -454,8 +464,9 @@ var (
454
464
Site :rbac .Permissions (map [string ][]policy.Action {
455
465
rbac .ResourceProvisionerDaemon .Type : {policy .ActionRead },
456
466
}),
457
- Org :map [string ][]rbac.Permission {},
458
- User : []rbac.Permission {},
467
+ Org :map [string ][]rbac.Permission {},
468
+ User : []rbac.Permission {},
469
+ OrgMember :map [string ][]rbac.Permission {},
459
470
},
460
471
}),
461
472
Scope :rbac .ScopeAll ,
@@ -531,8 +542,9 @@ var (
531
542
Site :rbac .Permissions (map [string ][]policy.Action {
532
543
rbac .ResourceFile .Type : {policy .ActionRead },
533
544
}),
534
- Org :map [string ][]rbac.Permission {},
535
- User : []rbac.Permission {},
545
+ Org :map [string ][]rbac.Permission {},
546
+ User : []rbac.Permission {},
547
+ OrgMember :map [string ][]rbac.Permission {},
536
548
},
537
549
}),
538
550
Scope :rbac .ScopeAll ,
@@ -552,8 +564,9 @@ var (
552
564
// reads/processes them.
553
565
rbac .ResourceUsageEvent .Type : {policy .ActionRead ,policy .ActionUpdate },
554
566
}),
555
- Org :map [string ][]rbac.Permission {},
556
- User : []rbac.Permission {},
567
+ Org :map [string ][]rbac.Permission {},
568
+ User : []rbac.Permission {},
569
+ OrgMember :map [string ][]rbac.Permission {},
557
570
},
558
571
}),
559
572
Scope :rbac .ScopeAll ,
@@ -575,8 +588,9 @@ var (
575
588
rbac .ResourceApiKey .Type : {policy .ActionRead },// Validate API keys.
576
589
rbac .ResourceAibridgeInterception .Type : {policy .ActionCreate ,policy .ActionRead ,policy .ActionUpdate },
577
590
}),
578
- Org :map [string ][]rbac.Permission {},
579
- User : []rbac.Permission {},
591
+ Org :map [string ][]rbac.Permission {},
592
+ User : []rbac.Permission {},
593
+ OrgMember :map [string ][]rbac.Permission {},
580
594
},
581
595
}),
582
596
Scope :rbac .ScopeAll ,