-
-
Notifications
You must be signed in to change notification settings - Fork 669
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: scim assume control UI - move scim into sso configs #6929
Conversation
Adds a callback to be invoked from sso settings page when saving. Removes scim settings tab
The latest updates on your projects. Learn more about Vercel for Git ↗︎
1 Ignored Deployment
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ Code Health Quality Gates: FAILED
- Declining Code Health: 3 findings(s) 🚩
- Improving Code Health: 1 findings(s) ✅
const scimEnabled = useUiFlag('scimApi'); | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
✅ No longer an issue: Large Method
AuthSettings is no longer above the threshold for lines of code
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ Code Health Quality Gates: FAILED
- Declining Code Health: 2 findings(s) 🚩
- Improving Code Health: 1 findings(s) ✅
const { | ||
settings, | ||
enabled, | ||
setEnabled, | ||
assumeControlOfExisting, | ||
setAssumeControlOfExisting, | ||
newToken, | ||
tokenGenerationDialog, | ||
setTokenGenerationDialog, | ||
tokenDialog, | ||
setTokenDialog, | ||
loading: scimLoading, | ||
saveScimSettings, | ||
onGenerateNewTokenConfirm, | ||
} = useScim(); | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ Getting worse: Large Method
OidcAuth increases from 266 to 307 lines of code, threshold = 120
const { | ||
settings, | ||
enabled, | ||
setEnabled, | ||
assumeControlOfExisting, | ||
setAssumeControlOfExisting, | ||
newToken, | ||
tokenGenerationDialog, | ||
setTokenGenerationDialog, | ||
tokenDialog, | ||
setTokenDialog, | ||
loading: scimLoading, | ||
saveScimSettings, | ||
onGenerateNewTokenConfirm, | ||
} = useScim(); | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
❌ Getting worse: Large Method
SamlAuth increases from 242 to 283 lines of code, threshold = 120
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It looks sensible to me. And adding it to both OIDC and SAML for now also makes sense. Down the line we might need separate configs for OIDC-SCIM and SAML-SCIM if you configure both OIDC and SAML login services. But for now I think this is 👍
About the changes