@@ -45,16 +45,13 @@ var defaultPolicy = `
4545## gRPC routes
4646p, role:org-admin, policy.*, *, allow
4747p, role:org-admin, kasregistry.*, *, allow
48- p, role:org-admin, kas.AccessService/LegacyPublicKey, *, allow
49- p, role:org-admin, kas.AccessService/PublicKey, *, allow
5048p, role:org-admin, kas.AccessService/Rewrap, *, allow
5149## HTTP routes
5250p, role:org-admin, /attributes*, *, allow
5351p, role:org-admin, /namespaces*, *, allow
5452p, role:org-admin, /subject-mappings*, *, allow
5553p, role:org-admin, /resource-mappings*, *, allow
5654p, role:org-admin, /key-access-servers*, *, allow
57- p, role:org-admin, /kas.AccessService/LegacyPublicKey, *, allow
5855p, role:org-admin, /kas/v2/rewrap, *, allow
5956# add unsafe actions to the org-admin role
6057
@@ -64,15 +61,12 @@ p, role:admin, policy.*, *, allow
6461p, role:admin, kasregistry.*, *, allow
6562p, role:admin, kas.AccessService/Info, *, allow
6663p, role:admin, kas.AccessService/Rewrap, *, allow
67- p, role:admin, kas.AccessService/LegacyPublicKey, *, allow
68- p, role:admin, kas.AccessService/PublicKey, *, allow
6964## HTTP routes
7065p, role:admin, /attributes*, *, allow
7166p, role:admin, /namespaces*, *, allow
7267p, role:admin, /subject-mappings*, *, allow
7368p, role:admin, /resource-mappings*, *, allow
7469p, role:admin, /key-access-servers*, *, allow
75- p, role:admin, /kas.AccessService/LegacyPublicKey, *, allow
7670p, role:admin, /kas/v2/rewrap, *, allow
7771
7872## Role: Standard
@@ -81,28 +75,20 @@ p, role:standard, policy.*, read, allow
8175p, role:standard, kasregistry.*, read, allow
8276p, role:standard, kas.AccessService/Info, *, allow
8377p, role:standard, kas.AccessService/Rewrap, *, allow
84- p, role:standard, kas.AccessService/LegacyPublicKey, *, allow
85- p, role:standard, kas.AccessService/PublicKey, *, allow
8678## HTTP routes
8779p, role:standard, /attributes*, read, allow
8880p, role:standard, /namespaces*, read, allow
8981p, role:standard, /subject-mappings*, read, allow
9082p, role:standard, /resource-mappings*, read, allow
9183p, role:standard, /key-access-servers*, read, allow
92- p, role:standard, /kas/kas_public_key, read, allow
93- p, role:standard, /kas/v2/kas_public_key, read, allow
9484p, role:standard, /kas/v2/rewrap, write, allow
9585p, role:standard, /entityresolution/resolve, write, allow
9686
9787# Public routes
9888## gRPC routes
99- p, role:unknown, kas.AccessService/LegacyPublicKey, other, allow
100- p, role:unknown, kas.AccessService/PublicKey, other, allow
10189## for ERS, right now we don't care about requester role, just that a valid jwt is provided when the OPA engine calls (enforced in the ERS itself, not casbin)
10290p, role:unknown, entityresolution.EntityResolutionService.ResolveEntities, write, allow
10391## HTTP routes
104- p, role:unknown, /kas/v2/kas_public_key, read, allow
105- p, role:unknown, /kas/kas_public_key, read, allow
10692## for ERS, right now we don't care about requester role, just that a valid jwt is provided when the OPA engine calls (enforced in the ERS itself, not casbin)
10793p, role:unknown, /entityresolution/resolve, write, allow
10894`
0 commit comments