-
Notifications
You must be signed in to change notification settings - Fork 75
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(config-api): issues in the API and attributes #2227
Comments
JansFido2DynConfiguration
and attributes
re: |
It's intentional. Read the docs to learn how to get source code. Maybe needs to be clarified somehow in yaml ?
It does not make sense to supply revision number for a new flow. -1 is expected |
re: |
Or maybe |
IMHO, It's implicit it's the access token because it's the introspection endpoint |
Then agreed, I will rename it to |
JansFido2DynConfiguration:Reported issue fixed in Spec Attributes:Reported issue fixed in Spec CouchbaseConfig:Reported issue fixed in Spec Custom scripts:Reported issue fixed in Spec AuthConfig :authorizationRequestCustomAllowedParameters returns array of AuthorizationRequestCustomParameter and spec is correct NativePersistenceConfiguration:Reported issue fixed in Spec JWKs:Modified DELETE on /jans-config-api/api/v1/config/jwks/{kid} to use https://jans.io/oauth/config/jwks.delete scope UMAResource:
ClientAttributes:Fixed by @yuriyz CustomAttribute:Reported missed attributes fixed in Spec OIDC Client:-logoUri: rectified to LocalizedString - had not done the change earlier as it was supposed to be changed back to string in auth Scope:Reported missed attributes fixed in Spec Organization:Following and other missing attributes added: SMTP:Able to update all the fields in LDAP DB, pls see attached video. LDAP configuration:Able to update Couchbase configuration:There are difference between All database configurations:Verified and it seems that test env configId for any DB is defined as |
Rev attribute is removed as redundant in #2393 |
Tested with latest code on MySql jenkins env, not able to replicate CustomUser issue. Shared details with @moabu |
@moabu request your confirmation for closure |
I'm closing and will create separate issues for the ones that remain |
Documentation
\
in the path. If the slash is not provided, the server responds with a 500 (which should probably be fixed to be a 400).API discrepancies
JansFido2DynConfiguration
MetricReporterEnabled
ADDRESSED
Reported issue fixed in Spec
Attributes
Selected
Custom
Required
(spelled 'requred' in the response object)AdminCanAccess
AdminCanView
AdminCanEdit
UserCanAccess
UserCanView
UserCanEdit
WhitePagesCanView
BaseDn
nameIdType
jansHideOnDiscovery
attributeValidation
salt
scimCustomAttr
seeAlso
sourceAttribute
tooltip
usageType
ADDRESSED
Reported issue fixed in Spec
Response is missing attribute - if values is null then that attribute is not part of response.
Few attributes were redundant hence removed from spec
CouchbaseConfig
KVTimeout
QueryTimeout
ADDRESSED
Reported issue fixed in Spec
Custom scripts
LocationType
BaseDN
ADDRESSED
Reported issue fixed in Spec
AuthConfig
authorizationRequestCustomAllowedParameters
, according to API it should be array of strings, but server returns array of `CustomAllowedParameterADDRESSED
authorizationRequestCustomAllowedParameters returns array of AuthorizationRequestCustomParameter and spec is correct
NativePersistenceConfiguration
DisableAttemptUpdateBeforeInsert
ADDRESSED
Reported issue fixed in Spec
JWKs
DELETE
on/jans-config-api/api/v1/config/jwks/{kid}:
expects a scopehttps://jans.io/oauth/config/jwks.write
, but instead it should behttps://jans.io/oauth/config/jwks.delete
, if it's to be consistent with otherDELETE
operations.ADDRESSED
Modified DELETE on /jans-config-api/api/v1/config/jwks/{kid} to use https://jans.io/oauth/config/jwks.delete scope
UMAResource
Rev
attribute is required, but not marked as such in the API. Not providing it results in a 500 error (it should be a 400). Also it should probably be of type int, asrev
attributes in other entities are of type int and it seems to be parsed to an int by the server anyway.ADDRESSED
by @yuriyz in 2e02d5e
ClientAttributes
runIntrospectionScriptBeforeAccessTokenAsJwtCreationAndIncludeClaims
is a very long attribute name, a shorter name should be considered .ADDRESSED
in #2391
CustomAttribute
displayValue
value
ADDRESSED
Reported issue fixed in Spec
OIDC Client
logoUri
defined as string, but get objectclientUri
defined as string, but get objectpolicyUri
defined as string, but get objecttosUri
defined as string, but get objectlastAccessTime
defined as string, but get intlastLogonTime
defined as string, but get intbackchannelUserCodeParameter
defined as boolean, but get stringauthenticationMethod
tokenBindingSupported
baseDn
clientName
ADDRESSED
-logoUri: rectified to LocalizedString - had not done the change earlier as it was supposed to be changed back to string in auth
-clientUri: rectified to LocalizedString - had not done the change earlier as it was supposed to be changed back to string in auth
-policyUri: rectified to LocalizedString - had not done the change earlier as it was supposed to be changed back to string in auth
-tosUri: rectified to LocalizedString - had not done the change earlier as it was supposed to be changed back to string in auth
-lastAccessTime: no change done as date is defined in swagger as string of date-time format
-lastLogonTime : no change done as date is defined in swagger as string of date-time format
Following and other missing attributes added:
-authenticationMethod
-tokenBindingSupported
-baseDn
-clientName
NativePersistenceCacheConfiguration
disableAttemptUpdateBeforeInsert
Scope
baseDn
Organization
dn
baseDn
organizationTitle
(maybe that's calledtitle
in the API, because that one is missing in the response)CountryName
which doesn't exist in the backendStatus
which doesn't exist in the backendCustomMessages
which doesn't exist in the backendTitle
which doesn't exist in the backendJsLogoPath
which doesn't exist in the backendJsFaviconPath
which doesn't exist in the backendSMTP
host
,port
,password
fields. All other fields are not changedLDAP configuration
useSSL
attributeCouchbase configuration
SSLTrustStoreFormat
,OperationTracingEnabled
,ComputationPoolSize
All database configurations
auth_ldap_server
configID as a response, even if all the other fields are not set. This behaviour is not really clear, nor is it documented. What is the intention behind it?AdminPermission
AdminPermission
,AdminUIPermission
,AdminUIUserPermission
?get
for individual permission, only possible to get all permissions at once. At the same time permissions can be individually updated or deleted.permission
?delete
should only take the ID of the entity, e.g.permission
ADDRESSED
in #2390
AdminRole
AdminPermission
ADDRESSED
in #2390
AdminRolePermissionMapping
AdminPermission
AdminUI permission
defaultPermissionInToken
ADDRESSED
in #2390
AgamaFlow
ANSWERED
in #2227 (comment)
CustomUser
The text was updated successfully, but these errors were encountered: