@@ -153,7 +153,7 @@ func TestUpsertCustomRoles(t *testing.T) {
153
153
UUID :uuid .New (),
154
154
Valid :true ,
155
155
},
156
- subject :merge (canAssignRole ,rbac .RoleOrgAdmin (orgID .UUID )),
156
+ subject :merge (canAssignRole ,rbac .ScopedRoleOrgAdmin (orgID .UUID )),
157
157
org :codersdk .CreatePermissions (map [codersdk.RBACResource ][]codersdk.RBACAction {
158
158
codersdk .ResourceWorkspace : {codersdk .ActionRead },
159
159
}),
@@ -162,7 +162,7 @@ func TestUpsertCustomRoles(t *testing.T) {
162
162
{
163
163
name :"user-escalation" ,
164
164
// These roles do not grant user perms
165
- subject :merge (canAssignRole ,rbac .RoleOrgAdmin (orgID .UUID )),
165
+ subject :merge (canAssignRole ,rbac .ScopedRoleOrgAdmin (orgID .UUID )),
166
166
user :codersdk .CreatePermissions (map [codersdk.RBACResource ][]codersdk.RBACAction {
167
167
codersdk .ResourceWorkspace : {codersdk .ActionRead },
168
168
}),
@@ -190,7 +190,7 @@ func TestUpsertCustomRoles(t *testing.T) {
190
190
},
191
191
{
192
192
name :"read-workspace-in-org" ,
193
- subject :merge (canAssignRole ,rbac .RoleOrgAdmin (orgID .UUID )),
193
+ subject :merge (canAssignRole ,rbac .ScopedRoleOrgAdmin (orgID .UUID )),
194
194
organizationID :orgID ,
195
195
org :codersdk .CreatePermissions (map [codersdk.RBACResource ][]codersdk.RBACAction {
196
196
codersdk .ResourceWorkspace : {codersdk .ActionRead },