Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Integrate Authenticator API into v2 Client #311

Merged
merged 9 commits into from
Mar 28, 2022

Conversation

oleksandrpravosudko-okta
Copy link
Contributor

@oleksandrpravosudko-okta oleksandrpravosudko-okta commented Mar 25, 2022

OKTA-453756, OKTA-453757

PR Checklist

Please check if your PR fulfills the following requirements:

  • The commit message follows our guidelines
  • Tests for the changes have been added (for bug fixes / features)
  • Docs have been added / updated (for bug fixes / features)

PR Type

What kind of change does this PR introduce?

  • Bugfix
  • Feature
  • Code style update (formatting, local variables)
  • Refactoring (no functional changes, no api changes)
  • Adding Tests
  • Build related changes
  • CI related changes
  • Documentation changes
  • Other... Please describe:

What is the current behavior?

Issue Number: N/A

What is the new behavior?

Does this PR introduce a breaking change?

  • Yes
  • No

Other information

Reviewers

@oleksandrpravosudko-okta oleksandrpravosudko-okta changed the title Op okta 453756 authenticator api v3 Integrate Authenticator API into v2 Client Mar 25, 2022
@oleksandrpravosudko-okta oleksandrpravosudko-okta marked this pull request as ready for review March 25, 2022 20:19
@oleksandrpravosudko-okta oleksandrpravosudko-okta force-pushed the op-okta-453756-authenticator-api-v3 branch from a15ab31 to 40ce7f8 Compare March 28, 2022 11:27
it('should deactivate an active Authenticator', async () => {
const authenticators = await client.listAuthenticators(); // returns Collection<Authenticator>
// OKTA-483353
xit('should deactivate an active Authenticator', async () => {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

maybe some MFA enrollment policy are not cleared after test.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this appears to be an issue even in isolated run (running only this test for the first time after policy reset succeeds, but all subsequent runs fail)

@@ -1,44 +0,0 @@
import * as okta from '@okta/okta-sdk-nodejs';
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

duplicate with the deactivate one?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes, they have same steps

@@ -4,7 +4,7 @@ import {
DefaultRequestExecutor,
UserSchema,
UserSchemaDefinitions,
UserType } from '@okta/okta-sdk-nodejs';
v3 } from '@okta/okta-sdk-nodejs';
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this just a temp solution, and we will do a final swap when everything is ready?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes; the swap will be a breaking change though since v2 and v3 models are not compatible (v3 doesn't have CRUD)

@oleksandrpravosudko-okta oleksandrpravosudko-okta merged commit 67fe812 into oas-v3 Mar 28, 2022
oleksandrpravosudko-okta added a commit that referenced this pull request Mar 31, 2022
integrate Authenticator API into v2 client
oleksandrpravosudko-okta added a commit that referenced this pull request May 30, 2022
integrate Authenticator API into v2 client
oleksandrpravosudko-okta added a commit that referenced this pull request May 30, 2022
integrate Authenticator API into v2 client
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants