Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: scim assume control UI - move scim into sso configs #6929

Merged
merged 3 commits into from
Apr 25, 2024

Conversation

daveleek
Copy link
Contributor

About the changes

  • Adds support for the configuration option for SCIM taking over control of users and groups
  • Moves SCIM settings into SSO config pages (OIDC and SAML). SCIM registers a callback to be invoked when saving in a parent SSO config page

image

Adds a callback to be invoked from sso settings page when saving.
Removes scim settings tab
Copy link

vercel bot commented Apr 25, 2024

The latest updates on your projects. Learn more about Vercel for Git ↗︎

Name Status Preview Comments Updated (UTC)
unleash-monorepo-frontend ✅ Ready (Inspect) Visit Preview 💬 Add feedback Apr 25, 2024 0:49am
1 Ignored Deployment
Name Status Preview Comments Updated (UTC)
unleash-docs ⬜️ Ignored (Inspect) Visit Preview Apr 25, 2024 0:49am

Copy link

@codescene-delta-analysis codescene-delta-analysis bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Health Quality Gates: FAILED

  • Declining Code Health: 3 findings(s) 🚩
  • Improving Code Health: 1 findings(s) ✅

View detailed results in CodeScene

Comment on lines -21 to -22
const scimEnabled = useUiFlag('scimApi');

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

✅ No longer an issue: Large Method
AuthSettings is no longer above the threshold for lines of code

Copy link

@codescene-delta-analysis codescene-delta-analysis bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Health Quality Gates: FAILED

  • Declining Code Health: 2 findings(s) 🚩
  • Improving Code Health: 1 findings(s) ✅

View detailed results in CodeScene

Comment on lines +92 to +107
const {
settings,
enabled,
setEnabled,
assumeControlOfExisting,
setAssumeControlOfExisting,
newToken,
tokenGenerationDialog,
setTokenGenerationDialog,
tokenDialog,
setTokenDialog,
loading: scimLoading,
saveScimSettings,
onGenerateNewTokenConfirm,
} = useScim();

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❌ Getting worse: Large Method
OidcAuth increases from 266 to 307 lines of code, threshold = 120

Suppress

Comment on lines +83 to +98
const {
settings,
enabled,
setEnabled,
assumeControlOfExisting,
setAssumeControlOfExisting,
newToken,
tokenGenerationDialog,
setTokenGenerationDialog,
tokenDialog,
setTokenDialog,
loading: scimLoading,
saveScimSettings,
onGenerateNewTokenConfirm,
} = useScim();

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❌ Getting worse: Large Method
SamlAuth increases from 242 to 283 lines of code, threshold = 120

Suppress

Copy link
Contributor

@chriswk chriswk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It looks sensible to me. And adding it to both OIDC and SAML for now also makes sense. Down the line we might need separate configs for OIDC-SCIM and SAML-SCIM if you configure both OIDC and SAML login services. But for now I think this is 👍

@daveleek daveleek merged commit d1bb65b into main Apr 25, 2024
11 of 13 checks passed
@daveleek daveleek deleted the feat/scim-assume-control-ui branch April 25, 2024 13:39
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Archived in project
Development

Successfully merging this pull request may close these issues.

None yet

2 participants