c04d045279
feat: RBAC provisionerdaemons and parameters ( #1755 )
...
* chore: Remove org_id from provisionerdaemons
2022-05-26 11:20:54 -05:00
eea8dc6c16
feat: Add rbac to templateversion+orgmember endpoints ( #1713 )
2022-05-25 11:00:59 -05:00
c7ca86d374
feat: Implement RBAC checks on /templates endpoints ( #1678 )
...
* feat: Generic Filter method for rbac objects
2022-05-24 08:43:34 -05:00
4ad5ac2d4a
feat: Rbac more coderd endpoints, unit test to confirm ( #1437 )
...
* feat: Enforce authorize call on all endpoints
- Make 'request()' exported for running custom requests
* Rbac users endpoints
* 401 -> 403
2022-05-17 13:43:19 -05:00
e6168ba238
feat: Add permissions for links ( #1407 )
2022-05-13 14:25:57 +00:00
57bb108465
feat: Add update user password endpoint ( #1310 )
2022-05-06 09:20:08 -05:00
d0293e4d33
feat: Implement list roles & enforce authorize examples ( #1273 )
2022-05-03 16:10:19 -05:00
35211e2190
feat: Add user roles, but do not yet enforce them ( #1200 )
...
* chore: Rework roles to be expandable by name alone
2022-04-29 09:04:19 -05:00
770c567123
feat: Add RBAC package for managing user permissions ( #929 )
...
This PR adds an RBAC package for managing using permissions:
- The top-level `authz.Authorize` function is the main user-facing entrypoint to the package.
- Actual permission evaluation is handled in `policy.rego`.
- Unit tests for `authz.Authorize` are in `authz_test.go`
- Documentation for the package is in `README.md`.
Co-authored-by: Cian Johnston <cian@coder.com >
2022-04-13 08:35:35 -05:00