@@ -274,8 +274,6 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
274
274
DisplayName : "Member" ,
275
275
Site : Permissions (map [string ][]policy.Action {
276
276
ResourceAssignRole .Type : {policy .ActionRead },
277
- // All users can see the provisioner daemons.
278
- ResourceProvisionerDaemon .Type : {policy .ActionRead },
279
277
// All users can see OAuth2 provider applications.
280
278
ResourceOauth2App .Type : {policy .ActionRead },
281
279
ResourceWorkspaceProxy .Type : {policy .ActionRead },
@@ -414,18 +412,15 @@ func ReloadBuiltinRoles(opts *RoleOptions) {
414
412
DisplayName : "" ,
415
413
Site : []Permission {},
416
414
Org : map [string ][]Permission {
417
- organizationID .String (): {
418
- {
419
- // All org members can read the organization
420
- ResourceType : ResourceOrganization .Type ,
421
- Action : policy .ActionRead ,
422
- },
423
- {
424
- // Can read available roles.
425
- ResourceType : ResourceAssignOrgRole .Type ,
426
- Action : policy .ActionRead ,
427
- },
428
- },
415
+ organizationID .String (): Permissions (map [string ][]policy.Action {
416
+ // All users can see the provisioner daemons for workspace
417
+ // creation.
418
+ ResourceProvisionerDaemon .Type : {policy .ActionRead },
419
+ // All org members can read the organization
420
+ ResourceOrganization .Type : {policy .ActionRead },
421
+ // Can read available roles.
422
+ ResourceAssignOrgRole .Type : {policy .ActionRead },
423
+ }),
429
424
},
430
425
User : []Permission {
431
426
{
0 commit comments