We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
1 parent 9089bb9 commit b81448bCopy full SHA for b81448b
coderd/rbac/role.go
@@ -20,8 +20,6 @@ type Role struct {
20
Name string `json:"name"`
21
Site []Permission `json:"site"`
22
// Org is a map of orgid to permissions. We represent orgid as a string.
23
- // TODO: Maybe switch to uuid, but tokens might need to support a "wildcard" org
24
- // which could be a special uuid (like all 0s?)
25
Org map[string][]Permission `json:"org"`
26
User []Permission `json:"user"`
27
}
@@ -49,7 +47,6 @@ var (
49
47
RoleAuditor = Role{
50
48
Name: "auditor",
51
Site: permissions(map[Object][]Action{
52
- // TODO: @emyrk when audit logs are added, add back a read perm
53
//ResourceAuditLogs: {ActionRead},
54
// Should be able to read user details to associate with logs.
55
// Without this the user-id in logs is not very helpful
0 commit comments