-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrate Authenticator API into v2 Client #311
Integrate Authenticator API into v2 Client #311
Conversation
a15ab31
to
40ce7f8
Compare
it('should deactivate an active Authenticator', async () => { | ||
const authenticators = await client.listAuthenticators(); // returns Collection<Authenticator> | ||
// OKTA-483353 | ||
xit('should deactivate an active Authenticator', async () => { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe some MFA enrollment policy are not cleared after test.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this appears to be an issue even in isolated run (running only this test for the first time after policy reset succeeds, but all subsequent runs fail)
@@ -1,44 +0,0 @@ | |||
import * as okta from '@okta/okta-sdk-nodejs'; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
duplicate with the deactivate one?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes, they have same steps
@@ -4,7 +4,7 @@ import { | |||
DefaultRequestExecutor, | |||
UserSchema, | |||
UserSchemaDefinitions, | |||
UserType } from '@okta/okta-sdk-nodejs'; | |||
v3 } from '@okta/okta-sdk-nodejs'; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this just a temp solution, and we will do a final swap when everything is ready?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yes; the swap will be a breaking change though since v2 and v3 models are not compatible (v3 doesn't have CRUD)
integrate Authenticator API into v2 client
integrate Authenticator API into v2 client
integrate Authenticator API into v2 client
OKTA-453756, OKTA-453757
PR Checklist
Please check if your PR fulfills the following requirements:
PR Type
What kind of change does this PR introduce?
What is the current behavior?
Issue Number: N/A
What is the new behavior?
Does this PR introduce a breaking change?
Other information
Reviewers