-
Notifications
You must be signed in to change notification settings - Fork 956
feat: add multiple API key scopes support with granular permissions #19015
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: thomask33/07-15-fix_oauth2_allow_custom_uri_schemes_without_reverse_domain_notation_for_native_apps
Are you sure you want to change the base?
Conversation
Change-Id: I5857fd833f8114d53f575b9fa48a8e5e7dbfdb2c Signed-off-by: Thomas Kosiewski <tk@coder.com>
Warning This pull request is not mergeable via GitHub because a downstack PR is open. Once all requirements are satisfied, merge this PR as a stack on Graphite.
This stack of pull requests is managed by Graphite. Learn more about stacking. |
Site: Permissions(map[string][]policy.Action{ | ||
ResourceWorkspace.Type: {policy.ActionRead, policy.ActionCreate, policy.ActionUpdate, policy.ActionDelete}, | ||
}), | ||
Org: map[string][]Permission{ | ||
ResourceWorkspace.Type: { | ||
{ResourceType: ResourceWorkspace.Type, Action: policy.ActionRead}, | ||
{ResourceType: ResourceWorkspace.Type, Action: policy.ActionCreate}, | ||
{ResourceType: ResourceWorkspace.Type, Action: policy.ActionUpdate}, | ||
{ResourceType: ResourceWorkspace.Type, Action: policy.ActionDelete}, | ||
}, | ||
}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Org
level does not make sense in Scope
. Just keep it all at the site level.
Remove the org
permissions here and the others
Change-Id: I5857fd833f8114d53f575b9fa48a8e5e7dbfdb2c
Signed-off-by: Thomas Kosiewski tk@coder.com