Description
Authorized users, even when they do not correspond as an existing user (which makes sense to manage accesses using external authentication like OIDC or certificates) are none the less listed in active users, which should not be the case.
$ curl -XGET http://172.19.0.7:8000/users [] $ docker exec -ti james james-cli adduser bob@localhost 123456 AddUser command executed sucessfully in 545 ms. $ curl -XGET http://172.19.0.7:8000/users [{"username":"bob@localhost"}] $ docker exec -ti james james-cli adduser alice@localhost 123456 AddUser command executed sucessfully in 314 ms. $ curl -XGET http://172.19.0.7:8000/users [{"username":"bob@localhost"},{"username":"alice@localhost"}]hp@hp-HP-ProBook-440-G5:~/Documents/james-project/server/apps/distributed-app$ $ $ curl -XPUT http://172.19.0.7:8000/users/bob@localhost/authorizedUsers/virtual $ curl -XGET http://172.19.0.7:8000/users/bob@localhost/authorizedUsers ["virtual"] $ curl -XGET http://172.19.0.7:8000/users [{"username":"bob@localhost"},{"username":"alice@localhost"},{"username":"virtual"}]
This is because a row tracking the delegations the user have access to is included even if the user do not exist, creating a partial user raw tricking James into thinking the user exist.
Definition of done: unit test reproducing the issue that should be eventually fixed.
Attachments
Issue Links
- links to