mirror of
https://github.com/opencloud-eu/opencloud.git
synced 2026-01-05 11:51:16 -06:00
chore: bump reva
This commit is contained in:
16
vendor/github.com/cs3org/reva/v2/pkg/conversions/role.go
generated
vendored
16
vendor/github.com/cs3org/reva/v2/pkg/conversions/role.go
generated
vendored
@@ -52,6 +52,8 @@ const (
|
||||
RoleUploader = "uploader"
|
||||
// RoleManager grants manager permissions on a resource. Semantically equivalent to co-owner.
|
||||
RoleManager = "manager"
|
||||
// RoleSecureViewer grants secure view permissions on a resource or space.
|
||||
RoleSecureViewer = "secure-viewer"
|
||||
|
||||
// RoleUnknown is used for unknown roles.
|
||||
RoleUnknown = "unknown"
|
||||
@@ -159,6 +161,8 @@ func RoleFromName(name string) *Role {
|
||||
return NewUploaderRole()
|
||||
case RoleManager:
|
||||
return NewManagerRole()
|
||||
case RoleSecureViewer:
|
||||
return NewSecureViewerRole()
|
||||
default:
|
||||
return NewUnknownRole()
|
||||
}
|
||||
@@ -363,6 +367,18 @@ func NewManagerRole() *Role {
|
||||
}
|
||||
}
|
||||
|
||||
// NewSecureViewerRole creates a secure viewer role
|
||||
func NewSecureViewerRole() *Role {
|
||||
return &Role{
|
||||
Name: RoleSecureViewer,
|
||||
cS3ResourcePermissions: &provider.ResourcePermissions{
|
||||
GetPath: true,
|
||||
ListContainer: true,
|
||||
Stat: true,
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
// RoleFromOCSPermissions tries to map ocs permissions to a role
|
||||
// TODO: rethink using this. ocs permissions cannot be assigned 1:1 to roles
|
||||
func RoleFromOCSPermissions(p Permissions, ri *provider.ResourceInfo) *Role {
|
||||
|
||||
Reference in New Issue
Block a user