mirror of
https://github.com/zitadel/zitadel.git
synced 2025-07-16 07:58:35 +00:00

# Which Problems Are Solved We provide a seamless way to initialize Zitadel and the login together. # How the Problems Are Solved Additionally to the `IAM_OWNER` role, a set up admin user also gets the `IAM_LOGIN_CLIENT` role if it is a machine user with a PAT. # Additional Changes - Simplifies the load balancing example, as the intermediate configuration step is not needed anymore. # Additional Context - Depends on #10116 - Contributes to https://github.com/zitadel/zitadel-charts/issues/332 - Contributes to https://github.com/zitadel/zitadel/issues/10016 --------- Co-authored-by: Stefan Benz <46600784+stebenz@users.noreply.github.com>
42 lines
1.1 KiB
Go
42 lines
1.1 KiB
Go
package domain
|
|
|
|
import (
|
|
"strings"
|
|
|
|
"github.com/zitadel/zitadel/internal/api/authz"
|
|
)
|
|
|
|
const (
|
|
IAMRolePrefix = "IAM"
|
|
OrgRolePrefix = "ORG"
|
|
ProjectRolePrefix = "PROJECT"
|
|
ProjectGrantRolePrefix = "PROJECT_GRANT"
|
|
RoleOrgOwner = "ORG_OWNER"
|
|
RoleOrgProjectCreator = "ORG_PROJECT_CREATOR"
|
|
RoleIAMOwner = "IAM_OWNER"
|
|
RoleIAMLoginClient = "IAM_LOGIN_CLIENT"
|
|
RoleProjectOwner = "PROJECT_OWNER"
|
|
RoleProjectOwnerGlobal = "PROJECT_OWNER_GLOBAL"
|
|
RoleProjectGrantOwner = "PROJECT_GRANT_OWNER"
|
|
RoleSelfManagementGlobal = "SELF_MANAGEMENT_GLOBAL"
|
|
)
|
|
|
|
func CheckForInvalidRoles(roles []string, rolePrefix string, validRoles []authz.RoleMapping) []string {
|
|
invalidRoles := make([]string, 0)
|
|
for _, role := range roles {
|
|
if !containsRole(role, rolePrefix, validRoles) {
|
|
invalidRoles = append(invalidRoles, role)
|
|
}
|
|
}
|
|
return invalidRoles
|
|
}
|
|
|
|
func containsRole(role, rolePrefix string, validRoles []authz.RoleMapping) bool {
|
|
for _, validRole := range validRoles {
|
|
if role == validRole.Role && strings.HasPrefix(role, rolePrefix) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|