Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

providers/scim: fix error when user-group m2m is updated forward #5082

Merged
merged 2 commits into from Mar 26, 2023

Conversation

BeryJu
Copy link
Member

@BeryJu BeryJu commented Mar 26, 2023

No description provided.

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
@codecov
Copy link

codecov bot commented Mar 26, 2023

Codecov Report

Patch coverage: 100.00% and project coverage change: -0.02 ⚠️

Comparison is base (5c0d7f9) 92.77% compared to head (43dffcc) 92.74%.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #5082      +/-   ##
==========================================
- Coverage   92.77%   92.74%   -0.02%     
==========================================
  Files         506      506              
  Lines       25776    25779       +3     
==========================================
- Hits        23910    23907       -3     
- Misses       1866     1872       +6     
Flag Coverage Δ
e2e 52.66% <66.67%> (-0.04%) ⬇️
integration 26.38% <33.34%> (-<0.01%) ⬇️
unit 89.56% <100.00%> (+0.01%) ⬆️

Flags with carried forward coverage won't be shown. Click here to find out more.

Impacted Files Coverage Δ
authentik/providers/scim/signals.py 100.00% <100.00%> (ø)
authentik/providers/scim/tasks.py 81.25% <100.00%> (ø)

... and 2 files with indirect coverage changes

Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here.

☔ View full report in Codecov by Sentry.
📢 Do you have feedback about the report comment? Let us know in this issue.

Signed-off-by: Jens Langhammer <jens@goauthentik.io>
@github-actions
Copy link
Contributor

authentik PR Installation instructions

Instructions for docker-compose

Add the following block to your .env file:

AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-providers-scim-fix-error-when-non-reverse-1679854951-5323e4a
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s

For arm64, use these values:

AUTHENTIK_IMAGE=ghcr.io/goauthentik/dev-server
AUTHENTIK_TAG=gh-providers-scim-fix-error-when-non-reverse-1679854951-5323e4a-arm64
AUTHENTIK_OUTPOSTS__CONTAINER_IMAGE_BASE=ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s

Afterwards, run the upgrade commands from the latest release notes.

Instructions for Kubernetes

Add the following block to your values.yml file:

authentik:
    outposts:
        container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
image:
    repository: ghcr.io/goauthentik/dev-server
    tag: gh-providers-scim-fix-error-when-non-reverse-1679854951-5323e4a

For arm64, use these values:

authentik:
    outposts:
        container_image_base: ghcr.io/goauthentik/dev-%(type)s:gh-%(build_hash)s
image:
    repository: ghcr.io/goauthentik/dev-server
    tag: gh-providers-scim-fix-error-when-non-reverse-1679854951-5323e4a-arm64

Afterwards, run the upgrade commands from the latest release notes.

@BeryJu BeryJu merged commit b097cf4 into main Mar 26, 2023
52 of 54 checks passed
@BeryJu BeryJu deleted the providers/scim/fix-error-when-non-reverse branch March 26, 2023 20:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant