-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[STCOR-835] refactor getUserTenantsPermissions to leverage roles instead of permissions #1543
Conversation
Bigtest Unit Test Results192 tests ±0 187 ✅ ±0 7s ⏱️ -1s Results for commit 2e9829d. ± Comparison against base commit cc8ef65. This pull request removes 5 and adds 3 tests. Note that renamed tests count towards both.
♻️ This comment has been updated with latest results. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm uncertain about this in light of the corresponding work @aidynoJ just did for UIU-3102 in PR 2752 to eliminate dependencies on the users-keycloak
interface. I'm also confused about the directions given on this ticket. The conditional checks for the presence of roles
but the endpoint (/users-keycloak/_self
) comes from users-keycloak
, so something seems amiss.
Finally, on the non-Eureka side, we should use /bl-users/_self
instead of /perms/users/${id}/permissions
since the former is universally accessible to any authenticated user but the latter requires specific permissions. If you don't want to do that clean up here I understand. Please file a new bug on UIU and have a chat with the ECS team who originally implemented this function since it was done incorrectly.
Seems like based on folio-org/ui-users#2752, both Eureka and non-Eureka can call |
That was the requirements for UIU-3192 |
I might be wrong. But based on https://folio-org.atlassian.net/browse/MODUSERSKC-30 and Bridging the gap between Users in the system and Users of the system we no longer need to create keycloak record directly. We can create them by assigning users to role and vice versa. |
In this case, the endpoint is just being used to retrieve permissions a user has with tenants within a consortium. There is no create actions taking place here. |
I meant that probably it is related, now when we create user, the user is not created in keycloak and calling mod-roles-keycloak _self might cause an issue |
Quality Gate passedIssues Measures |
/users-keycloak/_self
endpoint whenusers-keycloak
interface is present.