@@ -137,6 +137,20 @@ func (api *API) provisionerKeyDaemons(rw http.ResponseWriter, r *http.Request) {
137
137
}
138
138
sdkKeys := convertProvisionerKeys (pks )
139
139
140
+ // For the default organization, we insert three rows for the special
141
+ // provisioner key types (built-in, user-auth, and psk). We _don't_ insert
142
+ // those into the database for any other org, but we still need to include the
143
+ // user-auth key in this list, so we just insert it manually.
144
+ if ! slices .ContainsFunc (sdkKeys , func (key codersdk.ProvisionerKey ) bool {
145
+ return key .ID == codersdk .ProvisionerKeyUUIDUserAuth
146
+ }) {
147
+ sdkKeys = append (sdkKeys , codersdk.ProvisionerKey {
148
+ ID : codersdk .ProvisionerKeyUUIDUserAuth ,
149
+ Name : codersdk .ProvisionerKeyNameUserAuth ,
150
+ Tags : map [string ]string {},
151
+ })
152
+ }
153
+
140
154
daemons , err := api .Database .GetProvisionerDaemonsByOrganization (ctx , database.GetProvisionerDaemonsByOrganizationParams {OrganizationID : organization .ID })
141
155
if err != nil {
142
156
httpapi .InternalServerError (rw , err )
@@ -244,19 +258,5 @@ func convertProvisionerKeys(dbKeys []database.ProvisionerKey) []codersdk.Provisi
244
258
return key1 .CreatedAt .Compare (key2 .CreatedAt )
245
259
})
246
260
247
- // For the default organization, we insert three rows for the special provisioner
248
- // key types (built-in, user-auth, and psk). We _don't_ insert those into the
249
- // database for any other org, but we still need to include the user-auth key
250
- // in this list, so we just insert it manually.
251
- if ! slices .ContainsFunc (keys , func (key codersdk.ProvisionerKey ) bool {
252
- return key .ID == codersdk .ProvisionerKeyUUIDUserAuth
253
- }) {
254
- keys = append (keys , codersdk.ProvisionerKey {
255
- ID : codersdk .ProvisionerKeyUUIDUserAuth ,
256
- Name : codersdk .ProvisionerKeyNameUserAuth ,
257
- Tags : make (map [string ]string ),
258
- })
259
- }
260
-
261
261
return keys
262
262
}
0 commit comments