-
Notifications
You must be signed in to change notification settings - Fork 883
feat: show user-auth provisioners #14883
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
why'd you remove the inline group tags? those were part of the design, and we never talked about removing them |
Co-authored-by: Ben Potter <[email protected]>
enterprise/coderd/provisionerkeys.go
Outdated
// Currently the user-auth key orgID is hardcoded to the default org. | ||
// This will be changed when we update the `user-auth` keys to be | ||
// directly tied to a user ID. | ||
if key.ID.String() == codersdk.ProvisionerKeyIDUserAuth { | ||
continue | ||
key.OrganizationID = organization.ID |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This says the default org, but the organization
could be any org right? The organization.ID
comes from the org in the url
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Comment is confusing and will update it. The user-auth
key.OrganizationID
is hardcoded to the default
org in the database and we are overwriting it here. The organization
is valid here because it's the ID we use to query the list to begin with. It's just that for provisioners in the non-default org that use user-auth
would have the default org ID returned here, so we edit the fake user-auth
key to have the correct org here before returning it.
@aslilac tags patch lgtm, |
Closes #14867
What this changes:
user-auth
grouped provisioners