diff --git a/app/mainapp/graphql/private/resolvers/runpipelines.resolvers.go b/app/mainapp/graphql/private/resolvers/runpipelines.resolvers.go index 833d98a28..af27241b8 100644 --- a/app/mainapp/graphql/private/resolvers/runpipelines.resolvers.go +++ b/app/mainapp/graphql/private/resolvers/runpipelines.resolvers.go @@ -5,7 +5,7 @@ package privateresolvers import ( "context" - "dataplane/mainapp/auth_permissions" + permissions "dataplane/mainapp/auth_permissions" "dataplane/mainapp/config" "dataplane/mainapp/database" "dataplane/mainapp/database/models" @@ -131,6 +131,8 @@ func (r *queryResolver) PipelineTasksRun(ctx context.Context, pipelineID string, {Subject: "user", SubjectID: currentUser, Resource: "platform_environment", ResourceID: platformID, Access: "write", EnvironmentID: environmentID}, {Subject: "user", SubjectID: currentUser, Resource: "environment_run_all_pipelines", ResourceID: platformID, Access: "write", EnvironmentID: environmentID}, {Subject: "user", SubjectID: currentUser, Resource: "specific_pipeline", ResourceID: pipelineID, Access: "run", EnvironmentID: environmentID}, + {Subject: "user", SubjectID: currentUser, Resource: "specific_pipeline", ResourceID: pipelineID, Access: "write", EnvironmentID: environmentID}, + {Subject: "user", SubjectID: currentUser, Resource: "specific_pipeline", ResourceID: pipelineID, Access: "read", EnvironmentID: environmentID}, } permOutcome, _, _, _ := permissions.MultiplePermissionChecks(perms) @@ -158,6 +160,8 @@ func (r *queryResolver) GetPipelineRuns(ctx context.Context, pipelineID string, {Subject: "user", SubjectID: currentUser, Resource: "admin_platform", ResourceID: platformID, Access: "write", EnvironmentID: "d_platform"}, {Subject: "user", SubjectID: currentUser, Resource: "platform_environment", ResourceID: platformID, Access: "write", EnvironmentID: environmentID}, {Subject: "user", SubjectID: currentUser, Resource: "environment_run_all_pipelines", ResourceID: platformID, Access: "write", EnvironmentID: environmentID}, + {Subject: "user", SubjectID: currentUser, Resource: "specific_pipeline", ResourceID: pipelineID, Access: "write", EnvironmentID: environmentID}, + {Subject: "user", SubjectID: currentUser, Resource: "specific_pipeline", ResourceID: pipelineID, Access: "read", EnvironmentID: environmentID}, } permOutcome, _, _, _ := permissions.MultiplePermissionChecks(perms)