fix: User's should be able to read what roles available (#1575)

This commit is contained in:
Steven Masley
2022-05-18 15:47:43 -05:00
committed by GitHub
parent 8bd1abee33
commit 2638c274cb
3 changed files with 21 additions and 6 deletions

View File

@ -66,7 +66,8 @@ var (
DisplayName: "Member",
Site: permissions(map[Object][]Action{
// All users can read all other users and know they exist.
ResourceUser: {ActionRead},
ResourceUser: {ActionRead},
ResourceRoleAssignment: {ActionRead},
}),
User: permissions(map[Object][]Action{
ResourceWildcard: {WildcardSymbol},

View File

@ -34,7 +34,7 @@ func TestRoleByName(t *testing.T) {
t.Run(c.Role.Name, func(t *testing.T) {
role, err := RoleByName(c.Role.Name)
require.NoError(t, err, "role exists")
require.Equal(t, c.Role, role)
equalRoles(t, c.Role, role)
})
}
})
@ -53,3 +53,18 @@ func TestRoleByName(t *testing.T) {
require.Error(t, err, "expect orgID")
})
}
// SameAs compares 2 roles for equality.
func equalRoles(t *testing.T, a, b Role) {
require.Equal(t, a.Name, b.Name, "role names")
require.Equal(t, a.DisplayName, b.DisplayName, "role display names")
require.ElementsMatch(t, a.Site, b.Site, "site permissions")
require.ElementsMatch(t, a.User, b.User, "user permissions")
require.Equal(t, len(a.Org), len(b.Org), "same number of org roles")
for ak, av := range a.Org {
bv, ok := b.Org[ak]
require.True(t, ok, "org permissions missing: %s", ak)
require.ElementsMatchf(t, av, bv, "org %s permissions", ak)
}
}

View File

@ -112,7 +112,6 @@ func TestListRoles(t *testing.T) {
})
require.NoError(t, err, "create org")
const unauth = "forbidden"
const notMember = "not a member of the organization"
testCases := []struct {
@ -128,14 +127,14 @@ func TestListRoles(t *testing.T) {
x, err := member.ListSiteRoles(ctx)
return x, err
},
AuthorizedError: unauth,
ExpectedRoles: convertRoles(rbac.SiteRoles()),
},
{
Name: "OrgMemberListOrg",
APICall: func() ([]codersdk.Role, error) {
return member.ListOrganizationRoles(ctx, admin.OrganizationID)
},
AuthorizedError: unauth,
ExpectedRoles: convertRoles(rbac.OrganizationRoles(admin.OrganizationID)),
},
{
Name: "NonOrgMemberListOrg",
@ -150,7 +149,7 @@ func TestListRoles(t *testing.T) {
APICall: func() ([]codersdk.Role, error) {
return orgAdmin.ListSiteRoles(ctx)
},
AuthorizedError: unauth,
ExpectedRoles: convertRoles(rbac.SiteRoles()),
},
{
Name: "OrgAdminListOrg",