Skip to content

Commit 954f0d2

Browse files
committed
Test updates
1 parent e53fabd commit 954f0d2

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

coderd/database/dbauthz/customroles_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -98,7 +98,7 @@ func TestInsertCustomRoles(t *testing.T) {
9898
org: codersdk.CreatePermissions(map[codersdk.RBACResource][]codersdk.RBACAction{
9999
codersdk.ResourceWorkspace: {codersdk.ActionRead},
100100
}),
101-
errorContains: "cannot assign both org and site permissions",
101+
errorContains: "organization roles specify site or user permissions",
102102
},
103103
{
104104
name: "invalid-action",

coderd/rbac/roles.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -342,10 +342,10 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
342342
Identifier: RoleUserAdmin(),
343343
DisplayName: "User Admin",
344344
Site: Permissions(map[string][]policy.Action{
345-
ResourceAssignRole.Type: {policy.ActionAssign, policy.ActionDelete, policy.ActionRead, policy.ActionUpdate},
345+
ResourceAssignRole.Type: {policy.ActionAssign, policy.ActionDelete, policy.ActionRead},
346346
// Need organization assign as well to create users. At present, creating a user
347347
// will always assign them to some organization.
348-
ResourceAssignOrgRole.Type: {policy.ActionAssign, policy.ActionDelete, policy.ActionRead, policy.ActionUpdate},
348+
ResourceAssignOrgRole.Type: {policy.ActionAssign, policy.ActionDelete, policy.ActionRead},
349349
ResourceUser.Type: {
350350
policy.ActionCreate, policy.ActionRead, policy.ActionUpdate, policy.ActionDelete,
351351
policy.ActionUpdatePersonal, policy.ActionReadPersonal,
@@ -461,7 +461,7 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
461461
Org: map[string][]Permission{
462462
organizationID.String(): Permissions(map[string][]policy.Action{
463463
// Assign, remove, and read roles in the organization.
464-
ResourceAssignOrgRole.Type: {policy.ActionAssign, policy.ActionDelete, policy.ActionRead, policy.ActionUpdate},
464+
ResourceAssignOrgRole.Type: {policy.ActionAssign, policy.ActionDelete, policy.ActionRead},
465465
ResourceOrganizationMember.Type: {policy.ActionCreate, policy.ActionRead, policy.ActionUpdate, policy.ActionDelete},
466466
ResourceGroup.Type: ResourceGroup.AvailableActions(),
467467
ResourceGroupMember.Type: ResourceGroupMember.AvailableActions(),

coderd/rbac/roles_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -281,7 +281,7 @@ func TestRolePermissions(t *testing.T) {
281281
},
282282
{
283283
Name: "CreateCustomRole",
284-
Actions: []policy.Action{policy.ActionCreate},
284+
Actions: []policy.Action{policy.ActionCreate, policy.ActionUpdate},
285285
Resource: rbac.ResourceAssignRole,
286286
AuthorizeMap: map[bool][]hasAuthSubjects{
287287
true: {owner},
@@ -317,7 +317,7 @@ func TestRolePermissions(t *testing.T) {
317317
},
318318
{
319319
Name: "CreateOrgRoleAssignment",
320-
Actions: []policy.Action{policy.ActionCreate},
320+
Actions: []policy.Action{policy.ActionCreate, policy.ActionUpdate},
321321
Resource: rbac.ResourceAssignOrgRole.InOrg(orgID),
322322
AuthorizeMap: map[bool][]hasAuthSubjects{
323323
true: {owner, orgAdmin},

0 commit comments

Comments
 (0)