@@ -283,10 +283,11 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
283
283
Permissions (map [string ][]policy.Action {
284
284
// Reduced permission set on dormant workspaces. No build, ssh, or exec
285
285
ResourceWorkspaceDormant .Type : {policy .ActionRead , policy .ActionDelete , policy .ActionCreate , policy .ActionUpdate , policy .ActionWorkspaceStop },
286
-
287
286
// Users cannot do create/update/delete on themselves, but they
288
287
// can read their own details.
289
288
ResourceUser .Type : {policy .ActionRead , policy .ActionReadPersonal , policy .ActionUpdatePersonal },
289
+ // Can read their own organization member record
290
+ ResourceOrganizationMember .Type : {policy .ActionRead },
290
291
// Users can create provisioner daemons scoped to themselves.
291
292
ResourceProvisionerDaemon .Type : {policy .ActionRead , policy .ActionCreate , policy .ActionRead , policy .ActionUpdate },
292
293
})... ,
@@ -423,12 +424,7 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
423
424
ResourceAssignOrgRole .Type : {policy .ActionRead },
424
425
}),
425
426
},
426
- User : []Permission {
427
- {
428
- ResourceType : ResourceOrganizationMember .Type ,
429
- Action : policy .ActionRead ,
430
- },
431
- },
427
+ User : []Permission {},
432
428
}
433
429
},
434
430
orgAuditor : func (organizationID uuid.UUID ) Role {
@@ -439,6 +435,12 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
439
435
Org : map [string ][]Permission {
440
436
organizationID .String (): Permissions (map [string ][]policy.Action {
441
437
ResourceAuditLog .Type : {policy .ActionRead },
438
+ // Allow auditors to see the resources that audit logs reflect.
439
+ ResourceTemplate .Type : {policy .ActionRead , policy .ActionViewInsights },
440
+ ResourceGroup .Type : {policy .ActionRead },
441
+ ResourceGroupMember .Type : {policy .ActionRead },
442
+ ResourceOrganization .Type : {policy .ActionRead },
443
+ ResourceOrganizationMember .Type : {policy .ActionRead },
442
444
}),
443
445
},
444
446
User : []Permission {},
@@ -458,6 +460,7 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
458
460
organizationID .String (): Permissions (map [string ][]policy.Action {
459
461
// Assign, remove, and read roles in the organization.
460
462
ResourceAssignOrgRole .Type : {policy .ActionAssign , policy .ActionDelete , policy .ActionRead },
463
+ ResourceOrganization .Type : {policy .ActionRead },
461
464
ResourceOrganizationMember .Type : {policy .ActionCreate , policy .ActionRead , policy .ActionUpdate , policy .ActionDelete },
462
465
ResourceGroup .Type : ResourceGroup .AvailableActions (),
463
466
ResourceGroupMember .Type : ResourceGroupMember .AvailableActions (),
@@ -479,9 +482,11 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
479
482
ResourceFile .Type : {policy .ActionCreate , policy .ActionRead },
480
483
ResourceWorkspace .Type : {policy .ActionRead },
481
484
// Assigning template perms requires this permission.
485
+ ResourceOrganization .Type : {policy .ActionRead },
482
486
ResourceOrganizationMember .Type : {policy .ActionRead },
483
487
ResourceGroup .Type : {policy .ActionRead },
484
488
ResourceGroupMember .Type : {policy .ActionRead },
489
+ ResourceProvisionerDaemon .Type : {policy .ActionCreate , policy .ActionRead , policy .ActionUpdate , policy .ActionDelete },
485
490
ResourceProvisionerJobs .Type : {policy .ActionRead },
486
491
}),
487
492
},
0 commit comments