Skip to content

Commit d9f761d

Browse files
committed
Drop unused resources & roles
1 parent 512c09e commit d9f761d

File tree

3 files changed

+14
-18
lines changed

3 files changed

+14
-18
lines changed

coderd/authz/authz_test.go

Lines changed: 12 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,18 @@ func TestAuthorizeDomain(t *testing.T) {
6060

6161
user = authz.SubjectTODO{
6262
UserID: "me",
63-
Roles: []authz.Role{authz.RoleDenyAll},
63+
Roles: []authz.Role{{
64+
Name: "deny-all",
65+
// List out deny permissions explicitly
66+
Site: []authz.Permission{
67+
{
68+
Negate: true,
69+
ResourceType: authz.Wildcard,
70+
ResourceID: authz.Wildcard,
71+
Action: authz.Wildcard,
72+
},
73+
},
74+
}},
6475
}
6576

6677
testAuthorize(t, "DeletedMember", user, []authTestCase{

coderd/authz/resources.go

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,9 +6,7 @@ type ResourceType string
66
const (
77
ResourceWorkspace ResourceType = "workspace"
88
ResourceTemplate ResourceType = "template"
9-
ResourceDevURL ResourceType = "devurl"
109
ResourceUser ResourceType = "user"
11-
ResourceAuditLogs ResourceType = "audit-logs"
1210
)
1311

1412
func (z ResourceType) All() Object {

coderd/authz/role.go

Lines changed: 2 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -51,26 +51,13 @@ var (
5151
RoleSiteAuditor = Role{
5252
Name: "auditor",
5353
Site: permissions(map[ResourceType][]Action{
54-
ResourceAuditLogs: {ActionRead},
54+
// TODO: @emyrk when audit logs are added, add back a read perm
55+
//ResourceAuditLogs: {ActionRead},
5556
// Should be able to read user details to associate with logs.
5657
// Without this the user-id in logs is not very helpful
5758
ResourceUser: {ActionRead},
5859
}),
5960
}
60-
61-
// RoleDenyAll is a role that denies everything everywhere.
62-
RoleDenyAll = Role{
63-
Name: "deny-all",
64-
// List out deny permissions explicitly
65-
Site: []Permission{
66-
{
67-
Negate: true,
68-
ResourceType: Wildcard,
69-
ResourceID: Wildcard,
70-
Action: Wildcard,
71-
},
72-
},
73-
}
7461
)
7562

7663
func RoleOrgDenyAll(orgID string) Role {

0 commit comments

Comments
 (0)