@@ -119,7 +119,7 @@ func TestRolePermissions(t *testing.T) {
119
119
memberMe := authSubject {Name :"member_me" ,UserID :currentUser .String (),Roles : []string {rbac .RoleMember ()}}
120
120
orgMemberMe := authSubject {Name :"org_member_me" ,UserID :currentUser .String (),Roles : []string {rbac .RoleMember (),rbac .RoleOrgMember (orgID )}}
121
121
122
- admin := authSubject {Name :"admin " ,UserID :adminID .String (),Roles : []string {rbac .RoleMember (),rbac .RoleOwner ()}}
122
+ owner := authSubject {Name :"owner " ,UserID :adminID .String (),Roles : []string {rbac .RoleMember (),rbac .RoleOwner ()}}
123
123
orgAdmin := authSubject {Name :"org_admin" ,UserID :adminID .String (),Roles : []string {rbac .RoleMember (),rbac .RoleOrgMember (orgID ),rbac .RoleOrgAdmin (orgID )}}
124
124
125
125
otherOrgMember := authSubject {Name :"org_member_other" ,UserID :uuid .NewString (),Roles : []string {rbac .RoleMember (),rbac .RoleOrgMember (otherOrg )}}
@@ -130,7 +130,7 @@ func TestRolePermissions(t *testing.T) {
130
130
131
131
// requiredSubjects are required to be asserted in each test case. This is
132
132
// to make sure one is not forgotten.
133
- requiredSubjects := []authSubject {memberMe ,admin ,orgMemberMe ,orgAdmin ,otherOrgAdmin ,otherOrgMember ,templateAdmin ,userAdmin }
133
+ requiredSubjects := []authSubject {memberMe ,owner ,orgMemberMe ,orgAdmin ,otherOrgAdmin ,otherOrgMember ,templateAdmin ,userAdmin }
134
134
135
135
testCases := []struct {
136
136
// Name the test case to better locate the failing test case.
@@ -150,7 +150,7 @@ func TestRolePermissions(t *testing.T) {
150
150
Actions : []rbac.Action {rbac .ActionRead },
151
151
Resource :rbac .ResourceUser ,
152
152
AuthorizeMap :map [bool ][]authSubject {
153
- true : {admin ,memberMe ,orgMemberMe ,orgAdmin ,otherOrgMember ,otherOrgAdmin ,templateAdmin ,userAdmin },
153
+ true : {owner ,memberMe ,orgMemberMe ,orgAdmin ,otherOrgMember ,otherOrgAdmin ,templateAdmin ,userAdmin },
154
154
false : {},
155
155
},
156
156
},
@@ -159,7 +159,7 @@ func TestRolePermissions(t *testing.T) {
159
159
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionUpdate ,rbac .ActionDelete },
160
160
Resource :rbac .ResourceUser ,
161
161
AuthorizeMap :map [bool ][]authSubject {
162
- true : {admin ,userAdmin },
162
+ true : {owner ,userAdmin },
163
163
false : {memberMe ,orgMemberMe ,orgAdmin ,otherOrgMember ,otherOrgAdmin ,templateAdmin },
164
164
},
165
165
},
@@ -169,7 +169,7 @@ func TestRolePermissions(t *testing.T) {
169
169
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionRead ,rbac .ActionUpdate ,rbac .ActionDelete },
170
170
Resource :rbac .ResourceWorkspace .InOrg (orgID ).WithOwner (currentUser .String ()),
171
171
AuthorizeMap :map [bool ][]authSubject {
172
- true : {admin ,orgMemberMe ,orgAdmin ,templateAdmin },
172
+ true : {owner ,orgMemberMe ,orgAdmin ,templateAdmin },
173
173
false : {memberMe ,otherOrgAdmin ,otherOrgMember ,userAdmin },
174
174
},
175
175
},
@@ -179,7 +179,7 @@ func TestRolePermissions(t *testing.T) {
179
179
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionRead ,rbac .ActionUpdate ,rbac .ActionDelete },
180
180
Resource :rbac .ResourceWorkspaceExecution .InOrg (orgID ).WithOwner (currentUser .String ()),
181
181
AuthorizeMap :map [bool ][]authSubject {
182
- true : {admin ,orgAdmin ,orgMemberMe },
182
+ true : {owner ,orgAdmin ,orgMemberMe },
183
183
false : {memberMe ,otherOrgAdmin ,otherOrgMember ,templateAdmin ,userAdmin },
184
184
},
185
185
},
@@ -188,7 +188,7 @@ func TestRolePermissions(t *testing.T) {
188
188
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionUpdate ,rbac .ActionDelete },
189
189
Resource :rbac .ResourceTemplate .InOrg (orgID ),
190
190
AuthorizeMap :map [bool ][]authSubject {
191
- true : {admin ,orgAdmin ,templateAdmin },
191
+ true : {owner ,orgAdmin ,templateAdmin },
192
192
false : {memberMe ,orgMemberMe ,otherOrgAdmin ,otherOrgMember ,userAdmin },
193
193
},
194
194
},
@@ -197,7 +197,7 @@ func TestRolePermissions(t *testing.T) {
197
197
Actions : []rbac.Action {rbac .ActionRead },
198
198
Resource :rbac .ResourceTemplate .InOrg (orgID ),
199
199
AuthorizeMap :map [bool ][]authSubject {
200
- true : {admin ,orgMemberMe ,orgAdmin ,templateAdmin },
200
+ true : {owner ,orgMemberMe ,orgAdmin ,templateAdmin },
201
201
false : {memberMe ,otherOrgAdmin ,otherOrgMember ,userAdmin },
202
202
},
203
203
},
@@ -206,7 +206,7 @@ func TestRolePermissions(t *testing.T) {
206
206
Actions : []rbac.Action {rbac .ActionCreate },
207
207
Resource :rbac .ResourceFile ,
208
208
AuthorizeMap :map [bool ][]authSubject {
209
- true : {admin ,templateAdmin },
209
+ true : {owner ,templateAdmin },
210
210
false : {orgMemberMe ,orgAdmin ,memberMe ,otherOrgAdmin ,otherOrgMember ,userAdmin },
211
211
},
212
212
},
@@ -215,7 +215,7 @@ func TestRolePermissions(t *testing.T) {
215
215
Actions : []rbac.Action {rbac .ActionRead ,rbac .ActionUpdate ,rbac .ActionDelete },
216
216
Resource :rbac .ResourceFile .WithOwner (currentUser .String ()),
217
217
AuthorizeMap :map [bool ][]authSubject {
218
- true : {admin ,memberMe ,orgMemberMe ,templateAdmin },
218
+ true : {owner ,memberMe ,orgMemberMe ,templateAdmin },
219
219
false : {orgAdmin ,otherOrgAdmin ,otherOrgMember ,userAdmin },
220
220
},
221
221
},
@@ -224,7 +224,7 @@ func TestRolePermissions(t *testing.T) {
224
224
Actions : []rbac.Action {rbac .ActionCreate },
225
225
Resource :rbac .ResourceOrganization ,
226
226
AuthorizeMap :map [bool ][]authSubject {
227
- true : {admin },
227
+ true : {owner },
228
228
false : {orgAdmin ,otherOrgAdmin ,otherOrgMember ,memberMe ,orgMemberMe ,templateAdmin ,userAdmin },
229
229
},
230
230
},
@@ -233,7 +233,7 @@ func TestRolePermissions(t *testing.T) {
233
233
Actions : []rbac.Action {rbac .ActionUpdate ,rbac .ActionDelete },
234
234
Resource :rbac .ResourceOrganization .InOrg (orgID ),
235
235
AuthorizeMap :map [bool ][]authSubject {
236
- true : {admin ,orgAdmin },
236
+ true : {owner ,orgAdmin },
237
237
false : {otherOrgAdmin ,otherOrgMember ,memberMe ,orgMemberMe ,templateAdmin ,userAdmin },
238
238
},
239
239
},
@@ -242,7 +242,7 @@ func TestRolePermissions(t *testing.T) {
242
242
Actions : []rbac.Action {rbac .ActionRead },
243
243
Resource :rbac .ResourceOrganization .InOrg (orgID ),
244
244
AuthorizeMap :map [bool ][]authSubject {
245
- true : {admin ,orgAdmin ,orgMemberMe },
245
+ true : {owner ,orgAdmin ,orgMemberMe },
246
246
false : {otherOrgAdmin ,otherOrgMember ,memberMe ,templateAdmin ,userAdmin },
247
247
},
248
248
},
@@ -251,16 +251,16 @@ func TestRolePermissions(t *testing.T) {
251
251
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionUpdate ,rbac .ActionDelete },
252
252
Resource :rbac .ResourceRoleAssignment ,
253
253
AuthorizeMap :map [bool ][]authSubject {
254
- true : {admin },
255
- false : {orgAdmin ,orgMemberMe ,otherOrgAdmin ,otherOrgMember ,memberMe ,templateAdmin , userAdmin },
254
+ true : {owner , userAdmin },
255
+ false : {orgAdmin ,orgMemberMe ,otherOrgAdmin ,otherOrgMember ,memberMe ,templateAdmin },
256
256
},
257
257
},
258
258
{
259
259
Name :"ReadRoleAssignment" ,
260
260
Actions : []rbac.Action {rbac .ActionRead },
261
261
Resource :rbac .ResourceRoleAssignment ,
262
262
AuthorizeMap :map [bool ][]authSubject {
263
- true : {admin ,orgAdmin ,orgMemberMe ,otherOrgAdmin ,otherOrgMember ,memberMe ,templateAdmin ,userAdmin },
263
+ true : {owner ,orgAdmin ,orgMemberMe ,otherOrgAdmin ,otherOrgMember ,memberMe ,templateAdmin ,userAdmin },
264
264
false : {},
265
265
},
266
266
},
@@ -269,7 +269,7 @@ func TestRolePermissions(t *testing.T) {
269
269
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionUpdate ,rbac .ActionDelete },
270
270
Resource :rbac .ResourceOrgRoleAssignment .InOrg (orgID ),
271
271
AuthorizeMap :map [bool ][]authSubject {
272
- true : {admin ,orgAdmin },
272
+ true : {owner ,orgAdmin },
273
273
false : {orgMemberMe ,otherOrgAdmin ,otherOrgMember ,memberMe ,templateAdmin ,userAdmin },
274
274
},
275
275
},
@@ -278,7 +278,7 @@ func TestRolePermissions(t *testing.T) {
278
278
Actions : []rbac.Action {rbac .ActionRead },
279
279
Resource :rbac .ResourceOrgRoleAssignment .InOrg (orgID ),
280
280
AuthorizeMap :map [bool ][]authSubject {
281
- true : {admin ,orgAdmin ,orgMemberMe },
281
+ true : {owner ,orgAdmin ,orgMemberMe },
282
282
false : {otherOrgAdmin ,otherOrgMember ,memberMe ,templateAdmin ,userAdmin },
283
283
},
284
284
},
@@ -287,7 +287,7 @@ func TestRolePermissions(t *testing.T) {
287
287
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionRead ,rbac .ActionUpdate ,rbac .ActionDelete },
288
288
Resource :rbac .ResourceAPIKey .WithOwner (currentUser .String ()),
289
289
AuthorizeMap :map [bool ][]authSubject {
290
- true : {admin ,orgMemberMe ,memberMe },
290
+ true : {owner ,orgMemberMe ,memberMe },
291
291
false : {orgAdmin ,otherOrgAdmin ,otherOrgMember ,templateAdmin ,userAdmin },
292
292
},
293
293
},
@@ -296,7 +296,7 @@ func TestRolePermissions(t *testing.T) {
296
296
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionRead ,rbac .ActionUpdate ,rbac .ActionDelete },
297
297
Resource :rbac .ResourceUserData .WithOwner (currentUser .String ()),
298
298
AuthorizeMap :map [bool ][]authSubject {
299
- true : {admin ,orgMemberMe ,memberMe },
299
+ true : {owner ,orgMemberMe ,memberMe },
300
300
false : {orgAdmin ,otherOrgAdmin ,otherOrgMember ,templateAdmin ,userAdmin },
301
301
},
302
302
},
@@ -305,17 +305,17 @@ func TestRolePermissions(t *testing.T) {
305
305
Actions : []rbac.Action {rbac .ActionCreate ,rbac .ActionUpdate ,rbac .ActionDelete },
306
306
Resource :rbac .ResourceOrganizationMember .InOrg (orgID ),
307
307
AuthorizeMap :map [bool ][]authSubject {
308
- true : {admin ,orgAdmin },
309
- false : {orgMemberMe ,memberMe ,otherOrgAdmin ,otherOrgMember ,templateAdmin , userAdmin },
308
+ true : {owner ,orgAdmin , userAdmin },
309
+ false : {orgMemberMe ,memberMe ,otherOrgAdmin ,otherOrgMember ,templateAdmin },
310
310
},
311
311
},
312
312
{
313
313
Name :"ReadOrgMember" ,
314
314
Actions : []rbac.Action {rbac .ActionRead },
315
315
Resource :rbac .ResourceOrganizationMember .InOrg (orgID ),
316
316
AuthorizeMap :map [bool ][]authSubject {
317
- true : {admin ,orgAdmin ,orgMemberMe },
318
- false : {memberMe ,otherOrgAdmin ,otherOrgMember ,templateAdmin , userAdmin },
317
+ true : {owner ,orgAdmin ,orgMemberMe , userAdmin },
318
+ false : {memberMe ,otherOrgAdmin ,otherOrgMember ,templateAdmin },
319
319
},
320
320
},
321
321
}