From 5375a8eefa6026b744e1b3f9e837f127b6fb334b Mon Sep 17 00:00:00 2001 From: abhishek9686 Date: Wed, 30 Oct 2024 12:31:15 +0400 Subject: [PATCH] fix user roles and groups descriptions --- pro/logic/user_mgmt.go | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/pro/logic/user_mgmt.go b/pro/logic/user_mgmt.go index f32bd63b2..2c08ba065 100644 --- a/pro/logic/user_mgmt.go +++ b/pro/logic/user_mgmt.go @@ -31,7 +31,7 @@ var PlatformUserUserPermissionTemplate = models.UserRolePermissionTemplate{ var NetworkAdminAllPermissionTemplate = models.UserRolePermissionTemplate{ ID: models.UserRoleID(fmt.Sprintf("global-%s", models.NetworkAdmin)), Name: "Network Admins", - MetaData: "Users with this role can manage all your networks configuration including adding and removing devices.", + MetaData: "Can manage all your networks configuration including adding and removing devices.", Default: true, FullAccess: true, NetworkID: models.AllNetworks, @@ -40,7 +40,7 @@ var NetworkAdminAllPermissionTemplate = models.UserRolePermissionTemplate{ var NetworkUserAllPermissionTemplate = models.UserRolePermissionTemplate{ ID: models.UserRoleID(fmt.Sprintf("global-%s", models.NetworkUser)), Name: "Network Users", - MetaData: "Users with this role Cannot access the admin console, but can connect to nodes in your networks via RAC.", + MetaData: "Cannot access the admin console, but can connect to nodes in your networks via Remote Access Client.", Default: true, FullAccess: false, NetworkID: models.AllNetworks, @@ -85,7 +85,7 @@ func UserGroupsInit() { ID: models.UserGroupID(fmt.Sprintf("global-%s-grp", models.NetworkAdmin)), Default: true, Name: "Network Admin Group", - MetaData: "Users in this group can manage all your networks configuration.", + MetaData: "Can manage all your networks configuration.", NetworkRoles: map[models.NetworkID]map[models.UserRoleID]struct{}{ models.AllNetworks: { models.UserRoleID(fmt.Sprintf("global-%s", models.NetworkAdmin)): {}, @@ -101,7 +101,7 @@ func UserGroupsInit() { models.UserRoleID(fmt.Sprintf("global-%s", models.NetworkUser)): {}, }, }, - MetaData: "Users in this group cannot access the admin console, but can connect to nodes in your networks via RAC.", + MetaData: "Cannot access the admin console, but can connect to nodes in your networks via Remote Access Client.", } d, _ := json.Marshal(NetworkGlobalAdminGroup) database.Insert(NetworkGlobalAdminGroup.ID.String(), string(d), database.USER_GROUPS_TABLE_NAME) @@ -116,7 +116,7 @@ func CreateDefaultNetworkRolesAndGroups(netID models.NetworkID) { var NetworkAdminPermissionTemplate = models.UserRolePermissionTemplate{ ID: models.UserRoleID(fmt.Sprintf("%s-%s", netID, models.NetworkAdmin)), Name: fmt.Sprintf("%s Admin", netID), - MetaData: fmt.Sprintf("Users with this role can manage your network `%s` configuration.", netID), + MetaData: fmt.Sprintf("Can manage your network `%s` configuration.", netID), Default: true, NetworkID: netID, FullAccess: true, @@ -126,7 +126,7 @@ func CreateDefaultNetworkRolesAndGroups(netID models.NetworkID) { var NetworkUserPermissionTemplate = models.UserRolePermissionTemplate{ ID: models.UserRoleID(fmt.Sprintf("%s-%s", netID, models.NetworkUser)), Name: fmt.Sprintf("%s User", netID), - MetaData: fmt.Sprintf("Users Cannot access the admin console, but can connect to nodes in your network `%s` via RAC.", netID), + MetaData: fmt.Sprintf("Cannot access the admin console, but can connect to nodes in your network `%s` via Remote Access Client.", netID), Default: true, FullAccess: false, NetworkID: netID, @@ -163,7 +163,7 @@ func CreateDefaultNetworkRolesAndGroups(netID models.NetworkID) { models.UserRoleID(fmt.Sprintf("%s-%s", netID, models.NetworkAdmin)): {}, }, }, - MetaData: fmt.Sprintf("User in this group can manage your network `%s` configuration including adding and removing devices.", netID), + MetaData: fmt.Sprintf("Can manage your network `%s` configuration including adding and removing devices.", netID), } var NetworkUserGroup = models.UserGroup{ ID: models.UserGroupID(fmt.Sprintf("%s-%s-grp", netID, models.NetworkUser)), @@ -173,7 +173,7 @@ func CreateDefaultNetworkRolesAndGroups(netID models.NetworkID) { models.UserRoleID(fmt.Sprintf("%s-%s", netID, models.NetworkUser)): {}, }, }, - MetaData: fmt.Sprintf("Users in this group cannot access the admin console, but can connect to nodes in your network `%s` via RAC.", netID), + MetaData: fmt.Sprintf("Cannot access the admin console, but can connect to nodes in your network `%s` via Remote Access Client.", netID), } d, _ = json.Marshal(NetworkAdminGroup) database.Insert(NetworkAdminGroup.ID.String(), string(d), database.USER_GROUPS_TABLE_NAME)