diff --git a/docs/data-sources/client.md b/docs/data-sources/client.md index 6df1ee423..65308fa37 100644 --- a/docs/data-sources/client.md +++ b/docs/data-sources/client.md @@ -32,6 +32,7 @@ data "auth0_client" "some-client-by-id" { ### Read-Only +- `addons` (List of Object) Addons enabled for this client and their associated configurations. (see [below for nested schema](#nestedatt--addons)) - `allowed_clients` (List of String) List of applications ID's that will be allowed to make delegation request. By default, all applications will be allowed. - `allowed_logout_urls` (List of String) URLs that Auth0 may redirect to after logout. - `allowed_origins` (List of String) URLs that represent valid origins for cross-origin resource sharing. By default, all your callback URLs will be allowed. @@ -67,6 +68,24 @@ data "auth0_client" "some-client-by-id" { - `token_endpoint_auth_method` (String) Defines the requested authentication method for the token endpoint. Options include `none` (public client without a client secret), `client_secret_post` (client uses HTTP POST parameters), `client_secret_basic` (client uses HTTP Basic). - `web_origins` (List of String) URLs that represent valid web origins for use with web message response mode. + +### Nested Schema for `addons` + +Read-Only: + +- `aws` (List of Object) (see [below for nested schema](#nestedobjatt--addons--aws)) + + +### Nested Schema for `addons.aws` + +Read-Only: + +- `lifetime_in_seconds` (Number) +- `principal` (String) +- `role` (String) + + + ### Nested Schema for `jwt_configuration` diff --git a/docs/data-sources/global_client.md b/docs/data-sources/global_client.md index 539319a84..3b5dbabf3 100644 --- a/docs/data-sources/global_client.md +++ b/docs/data-sources/global_client.md @@ -19,6 +19,7 @@ data "auth0_global_client" "global" {} ### Read-Only +- `addons` (List of Object) Addons enabled for this client and their associated configurations. (see [below for nested schema](#nestedatt--addons)) - `allowed_clients` (List of String) List of applications ID's that will be allowed to make delegation request. By default, all applications will be allowed. - `allowed_logout_urls` (List of String) URLs that Auth0 may redirect to after logout. - `allowed_origins` (List of String) URLs that represent valid origins for cross-origin resource sharing. By default, all your callback URLs will be allowed. @@ -56,6 +57,24 @@ data "auth0_global_client" "global" {} - `token_endpoint_auth_method` (String) Defines the requested authentication method for the token endpoint. Options include `none` (public client without a client secret), `client_secret_post` (client uses HTTP POST parameters), `client_secret_basic` (client uses HTTP Basic). - `web_origins` (List of String) URLs that represent valid web origins for use with web message response mode. + +### Nested Schema for `addons` + +Read-Only: + +- `aws` (List of Object) (see [below for nested schema](#nestedobjatt--addons--aws)) + + +### Nested Schema for `addons.aws` + +Read-Only: + +- `lifetime_in_seconds` (Number) +- `principal` (String) +- `role` (String) + + + ### Nested Schema for `jwt_configuration` diff --git a/docs/resources/client.md b/docs/resources/client.md index 5d575b593..2220937b2 100644 --- a/docs/resources/client.md +++ b/docs/resources/client.md @@ -89,6 +89,7 @@ resource "auth0_client" "my_client" { ### Optional +- `addons` (Block List, Max: 1) Addons enabled for this client and their associated configurations. (see [below for nested schema](#nestedblock--addons)) - `allowed_clients` (List of String) List of applications ID's that will be allowed to make delegation request. By default, all applications will be allowed. - `allowed_logout_urls` (List of String) URLs that Auth0 may redirect to after logout. - `allowed_origins` (List of String) URLs that represent valid origins for cross-origin resource sharing. By default, all your callback URLs will be allowed. @@ -129,6 +130,24 @@ resource "auth0_client" "my_client" { - `id` (String) The ID of this resource. - `signing_keys` (List of Map of String, Sensitive) List containing a map of the public cert of the signing key and the public cert of the signing key in PKCS7. + +### Nested Schema for `addons` + +Optional: + +- `aws` (Block List, Max: 1) AWS Addon configuration. (see [below for nested schema](#nestedblock--addons--aws)) + + +### Nested Schema for `addons.aws` + +Optional: + +- `lifetime_in_seconds` (Number) AWS token lifetime in seconds. +- `principal` (String) AWS principal ARN, for example `arn:aws:iam::010616021751:saml-provider/idpname`. +- `role` (String) AWS role ARN, for example `arn:aws:iam::010616021751:role/foo`. + + + ### Nested Schema for `jwt_configuration` diff --git a/docs/resources/global_client.md b/docs/resources/global_client.md index 61e1c7ebe..78b4c9e1b 100644 --- a/docs/resources/global_client.md +++ b/docs/resources/global_client.md @@ -31,6 +31,7 @@ PAGE ### Optional +- `addons` (Block List, Max: 1) Addons enabled for this client and their associated configurations. (see [below for nested schema](#nestedblock--addons)) - `allowed_clients` (List of String) List of applications ID's that will be allowed to make delegation request. By default, all applications will be allowed. - `allowed_logout_urls` (List of String) URLs that Auth0 may redirect to after logout. - `allowed_origins` (List of String) URLs that represent valid origins for cross-origin resource sharing. By default, all your callback URLs will be allowed. @@ -72,6 +73,24 @@ PAGE - `id` (String) The ID of this resource. + +### Nested Schema for `addons` + +Optional: + +- `aws` (Block List, Max: 1) AWS Addon configuration. (see [below for nested schema](#nestedblock--addons--aws)) + + +### Nested Schema for `addons.aws` + +Optional: + +- `lifetime_in_seconds` (Number) AWS token lifetime in seconds. +- `principal` (String) AWS principal ARN, for example `arn:aws:iam::010616021751:saml-provider/idpname`. +- `role` (String) AWS role ARN, for example `arn:aws:iam::010616021751:role/foo`. + + + ### Nested Schema for `jwt_configuration` diff --git a/internal/acctest/acctest.go b/internal/acctest/acctest.go index f100b071c..e68b29b48 100644 --- a/internal/acctest/acctest.go +++ b/internal/acctest/acctest.go @@ -58,7 +58,7 @@ func testFactoriesWithHTTPRecordings(httpRecorder *recorder.Recorder) map[string } func configureTestProviderWithHTTPRecordings(httpRecorder *recorder.Recorder) schema.ConfigureContextFunc { - return func(ctx context.Context, data *schema.ResourceData) (interface{}, diag.Diagnostics) { + return func(_ context.Context, data *schema.ResourceData) (interface{}, diag.Diagnostics) { domain := data.Get("domain").(string) debug := data.Get("debug").(bool) @@ -77,6 +77,8 @@ func configureTestProviderWithHTTPRecordings(httpRecorder *recorder.Recorder) sc authenticationOption := management.WithStaticToken(apiToken) if apiToken == "" { + ctx := context.Background() + authenticationOption = management.WithClientCredentials(ctx, clientID, clientSecret) if audience != "" { authenticationOption = management.WithClientCredentialsAndAudience(ctx, clientID, clientSecret, audience) diff --git a/internal/auth0/client/expand.go b/internal/auth0/client/expand.go index 2f7d79236..3556a7898 100644 --- a/internal/auth0/client/expand.go +++ b/internal/auth0/client/expand.go @@ -42,9 +42,9 @@ func expandClient(d *schema.ResourceData) *management.Client { ClientMetadata: expandClientMetadata(d), RefreshToken: expandClientRefreshToken(d), JWTConfiguration: expandClientJWTConfiguration(d), - // Addons: expandClientAddons(d), TODO: DXCDT-441 Add new go-auth0 v1-beta types. - NativeSocialLogin: expandClientNativeSocialLogin(d), - Mobile: expandClientMobile(d), + Addons: expandClientAddons(d), + NativeSocialLogin: expandClientNativeSocialLogin(d), + Mobile: expandClientMobile(d), } return client @@ -236,6 +236,44 @@ func expandClientMetadata(d *schema.ResourceData) *map[string]interface{} { return &newMetadataMap } +func expandClientAddons(d *schema.ResourceData) *management.ClientAddons { + if !d.HasChange("addons") { + return nil + } + + var addons management.ClientAddons + + d.GetRawConfig().GetAttr("addons").ForEachElement(func(_ cty.Value, addonsCfg cty.Value) (stop bool) { + addons.AWS = expandClientAddonAWS(addonsCfg.GetAttr("aws")) + + return stop + }) + + if addons == (management.ClientAddons{}) { + return nil + } + + return &addons +} + +func expandClientAddonAWS(awsCfg cty.Value) *management.AWSClientAddon { + var awsAddon management.AWSClientAddon + + awsCfg.ForEachElement(func(_ cty.Value, awsCfg cty.Value) (stop bool) { + awsAddon.Principal = value.String(awsCfg.GetAttr("principal")) + awsAddon.Role = value.String(awsCfg.GetAttr("role")) + awsAddon.LifetimeInSeconds = value.Int(awsCfg.GetAttr("lifetime_in_seconds")) + + return stop + }) + + if awsAddon == (management.AWSClientAddon{}) { + return nil + } + + return &awsAddon +} + func clientHasChange(c *management.Client) bool { return c.String() != "{}" } diff --git a/internal/auth0/client/resource_test.go b/internal/auth0/client/resource_test.go index a3d7944ac..c9812c5cf 100644 --- a/internal/auth0/client/resource_test.go +++ b/internal/auth0/client/resource_test.go @@ -577,7 +577,7 @@ func TestAccClient(t *testing.T) { resource.TestCheckResourceAttr("auth0_client.my_client", "oidc_conformant", "false"), resource.TestCheckResourceAttr("auth0_client.my_client", "cross_origin_auth", "false"), resource.TestCheckResourceAttr("auth0_client.my_client", "mobile.#", "0"), - + resource.TestCheckResourceAttr("auth0_client.my_client", "addons.#", "0"), resource.TestCheckResourceAttr("auth0_client.my_client", "native_social_login.#", "0"), resource.TestCheckResourceAttr("auth0_client.my_client", "signing_keys.#", "1"), resource.TestCheckResourceAttr("auth0_client.my_client", "grant_types.#", "4"), @@ -636,7 +636,7 @@ func TestAccClient(t *testing.T) { resource.TestCheckResourceAttr("auth0_client.my_client", "oidc_conformant", "true"), resource.TestCheckResourceAttr("auth0_client.my_client", "cross_origin_auth", "false"), resource.TestCheckResourceAttr("auth0_client.my_client", "mobile.#", "0"), - + resource.TestCheckResourceAttr("auth0_client.my_client", "addons.#", "0"), resource.TestCheckResourceAttr("auth0_client.my_client", "native_social_login.#", "0"), resource.TestCheckResourceAttr("auth0_client.my_client", "signing_keys.#", "1"), resource.TestCheckResourceAttr("auth0_client.my_client", "grant_types.#", "5"), @@ -703,7 +703,7 @@ func TestAccClient(t *testing.T) { resource.TestCheckResourceAttr("auth0_client.my_client", "oidc_conformant", "true"), resource.TestCheckResourceAttr("auth0_client.my_client", "cross_origin_auth", "false"), resource.TestCheckResourceAttr("auth0_client.my_client", "mobile.#", "0"), - + resource.TestCheckResourceAttr("auth0_client.my_client", "addons.#", "0"), resource.TestCheckResourceAttr("auth0_client.my_client", "native_social_login.#", "0"), resource.TestCheckResourceAttr("auth0_client.my_client", "signing_keys.#", "1"), resource.TestCheckResourceAttr("auth0_client.my_client", "grant_types.#", "0"), @@ -738,171 +738,33 @@ func TestAccClient(t *testing.T) { }) } -const testAccCreateClientWithAddons = ` -resource "auth0_client" "my_client" { - name = "Acceptance Test - SSO Integration - {{.testName}}" - app_type = "sso_integration" - - addons { - firebase = { - client_email = "john.doe@example.com" - lifetime_in_seconds = 1 - private_key = "wer" - private_key_id = "qwreerwerwe" - } - - samlp { - issuer = "https://tableau-server-test.domain.eu.com/api/v1" - audience = "https://tableau-server-test.domain.eu.com/audience-different" - destination = "https://tableau-server-test.domain.eu.com/destination" - digest_algorithm = "sha256" - lifetime_in_seconds = 3600 - name_identifier_format = "urn:oasis:names:tc:SAML:2.0:attrname-format:basic" - name_identifier_probes = [ - "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" - ] - create_upn_claim = false - passthrough_claims_with_no_mapping = false - map_unknown_claims_as_is = false - map_identities = false - recipient = "https://tableau-server-test.domain.eu.com/recipient-different" - signing_cert = "-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n" - mappings = { - email = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress" - name = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name" - } - logout = { - callback = "https://example.com/callback" - slo_enabled = true - } - } - } -} -` - -const testAccCreateClientWithAddonsAndEmptyFields = ` +const testAccCreateClientWithAddonsAWS = ` resource "auth0_client" "my_client" { name = "Acceptance Test - SSO Integration - {{.testName}}" app_type = "sso_integration" addons { - firebase = { - client_email = "john.doe@example.com" - lifetime_in_seconds = 1 - private_key = "wer" - private_key_id = "qwreerwerwe" - } - - samlp { - issuer = "https://tableau-server-test.domain.eu.com/api/v3" - audience = "https://tableau-server-test.domain.eu.com/audience-different" - destination = "https://tableau-server-test.domain.eu.com/destination" - digest_algorithm = "sha256" - lifetime_in_seconds = 3600 - name_identifier_format = "urn:oasis:names:tc:SAML:2.0:attrname-format:basic" - name_identifier_probes = [] - create_upn_claim = false - passthrough_claims_with_no_mapping = false - map_unknown_claims_as_is = false - map_identities = false - recipient = "https://tableau-server-test.domain.eu.com/recipient-different" - signing_cert = "-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n" - mappings = {} - logout = {} + aws { + principal = "arn:aws:iam::010616021751:saml-provider/idpname" + role = "arn:aws:iam::010616021751:role/foo" + lifetime_in_seconds = 32000 } } } ` -const testAccCreateClientWithAddonsRemovedFromConfig = ` -resource "auth0_client" "my_client" { - name = "Acceptance Test - SSO Integration - {{.testName}}" - app_type = "sso_integration" - - # Unfortunately we can't set firebase and - # samlp addons set above, to empty. - # This is because we don't have properly - # defined structs for them in the Go SDK - # and neither here in the terraform provider. -} -` - -func TestAccClientSSOIntegrationWithSAML(t *testing.T) { - t.Skip() - +func TestAccClientAddons(t *testing.T) { acctest.Test(t, resource.TestCase{ Steps: []resource.TestStep{ { - Config: acctest.ParseTestName(testAccCreateClientWithAddons, t.Name()), - Check: resource.ComposeTestCheckFunc( - resource.TestCheckResourceAttr("auth0_client.my_client", "name", fmt.Sprintf("Acceptance Test - SSO Integration - %s", t.Name())), - resource.TestCheckResourceAttr("auth0_client.my_client", "app_type", "sso_integration"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.#", "1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.%", "4"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.client_email", "john.doe@example.com"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.lifetime_in_seconds", "1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.private_key", "wer"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.private_key_id", "qwreerwerwe"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.#", "1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.issuer", "https://tableau-server-test.domain.eu.com/api/v1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.audience", "https://tableau-server-test.domain.eu.com/audience-different"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.destination", "https://tableau-server-test.domain.eu.com/destination"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.digest_algorithm", "sha256"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.lifetime_in_seconds", "3600"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.name_identifier_format", "urn:oasis:names:tc:SAML:2.0:attrname-format:basic"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.name_identifier_probes.#", "1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.name_identifier_probes.0", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.create_upn_claim", "false"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.passthrough_claims_with_no_mapping", "false"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.map_unknown_claims_as_is", "false"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.map_identities", "false"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.recipient", "https://tableau-server-test.domain.eu.com/recipient-different"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.signing_cert", "-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.mappings.%", "2"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.mappings.email", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.mappings.name", "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.logout.%", "2"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.logout.callback", "https://example.com/callback"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.logout.slo_enabled", "true"), - ), - }, - { - Config: acctest.ParseTestName(testAccCreateClientWithAddonsAndEmptyFields, t.Name()), - Check: resource.ComposeTestCheckFunc( - resource.TestCheckResourceAttr("auth0_client.my_client", "name", fmt.Sprintf("Acceptance Test - SSO Integration - %s", t.Name())), - resource.TestCheckResourceAttr("auth0_client.my_client", "app_type", "sso_integration"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.#", "1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.%", "4"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.client_email", "john.doe@example.com"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.lifetime_in_seconds", "1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.private_key", "wer"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.private_key_id", "qwreerwerwe"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.#", "1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.issuer", "https://tableau-server-test.domain.eu.com/api/v3"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.audience", "https://tableau-server-test.domain.eu.com/audience-different"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.destination", "https://tableau-server-test.domain.eu.com/destination"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.digest_algorithm", "sha256"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.lifetime_in_seconds", "3600"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.name_identifier_format", "urn:oasis:names:tc:SAML:2.0:attrname-format:basic"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.name_identifier_probes.#", "0"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.create_upn_claim", "false"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.passthrough_claims_with_no_mapping", "false"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.map_unknown_claims_as_is", "false"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.map_identities", "false"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.recipient", "https://tableau-server-test.domain.eu.com/recipient-different"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.signing_cert", "-----BEGIN PUBLIC KEY-----\nMIGf...bpP/t3\n+JGNGIRMj1hF1rnb6QIDAQAB\n-----END PUBLIC KEY-----\n"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.mappings.%", "0"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.0.logout.%", "0"), - ), - }, - { - Config: acctest.ParseTestName(testAccCreateClientWithAddonsRemovedFromConfig, t.Name()), + Config: acctest.ParseTestName(testAccCreateClientWithAddonsAWS, t.Name()), Check: resource.ComposeTestCheckFunc( resource.TestCheckResourceAttr("auth0_client.my_client", "name", fmt.Sprintf("Acceptance Test - SSO Integration - %s", t.Name())), resource.TestCheckResourceAttr("auth0_client.my_client", "app_type", "sso_integration"), resource.TestCheckResourceAttr("auth0_client.my_client", "addons.#", "1"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.firebase.%", "4"), - resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.samlp.#", "1"), + resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.aws.0.principal", "arn:aws:iam::010616021751:saml-provider/idpname"), + resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.aws.0.role", "arn:aws:iam::010616021751:role/foo"), + resource.TestCheckResourceAttr("auth0_client.my_client", "addons.0.aws.0.lifetime_in_seconds", "32000"), ), }, }, diff --git a/test/data/recordings/TestAccClientAddons.yaml b/test/data/recordings/TestAccClientAddons.yaml new file mode 100644 index 000000000..59726611b --- /dev/null +++ b/test/data/recordings/TestAccClientAddons.yaml @@ -0,0 +1,146 @@ +--- +version: 2 +interactions: + - id: 0 + request: + proto: HTTP/1.1 + proto_major: 1 + proto_minor: 1 + content_length: 249 + transfer_encoding: [] + trailer: {} + host: terraform-provider-auth0-dev.eu.auth0.com + remote_addr: "" + request_uri: "" + body: | + {"name":"Acceptance Test - SSO Integration - TestAccClientAddons","app_type":"sso_integration","addons":{"aws":{"principal":"arn:aws:iam::010616021751:saml-provider/idpname","role":"arn:aws:iam::010616021751:role/foo","lifetime_in_seconds":32000}}} + form: {} + headers: + Content-Type: + - application/json + User-Agent: + - Go-Auth0-SDK/latest + url: https://terraform-provider-auth0-dev.eu.auth0.com/api/v2/clients + method: POST + response: + proto: HTTP/2.0 + proto_major: 2 + proto_minor: 0 + transfer_encoding: [] + trailer: {} + content_length: -1 + uncompressed: false + body: '{"name":"Acceptance Test - SSO Integration - TestAccClientAddons","client_id":"T8mmXrIWvY8fOozSWa6jsyDAcilJ05ia","client_secret":"[REDACTED]","app_type":"sso_integration","is_first_party":true,"is_token_endpoint_ip_header_trusted":false,"oidc_conformant":false,"jwt_configuration":{"secret_encoded":false,"lifetime_in_seconds":36000},"signing_keys":[{"cert":"[REDACTED]"}],"sso_disabled":false,"grant_types":["authorization_code","implicit","refresh_token","client_credentials"],"custom_login_page_on":true,"addons":{"aws":{"principal":"arn:aws:iam::010616021751:saml-provider/idpname","role":"arn:aws:iam::010616021751:role/foo","lifetime_in_seconds":32000}},"refresh_token":{"rotation_type":"non-rotating","expiration_type":"non-expiring","leeway":0,"token_lifetime":2592000,"infinite_token_lifetime":true,"infinite_idle_token_lifetime":true,"idle_token_lifetime":1296000}}' + headers: + Content-Type: + - application/json; charset=utf-8 + status: 201 Created + code: 201 + duration: 926.172ms + - id: 1 + request: + proto: HTTP/1.1 + proto_major: 1 + proto_minor: 1 + content_length: 5 + transfer_encoding: [] + trailer: {} + host: terraform-provider-auth0-dev.eu.auth0.com + remote_addr: "" + request_uri: "" + body: | + null + form: {} + headers: + Content-Type: + - application/json + User-Agent: + - Go-Auth0-SDK/latest + url: https://terraform-provider-auth0-dev.eu.auth0.com/api/v2/clients/T8mmXrIWvY8fOozSWa6jsyDAcilJ05ia + method: GET + response: + proto: HTTP/2.0 + proto_major: 2 + proto_minor: 0 + transfer_encoding: [] + trailer: {} + content_length: -1 + uncompressed: true + body: '{"name":"Acceptance Test - SSO Integration - TestAccClientAddons","client_id":"T8mmXrIWvY8fOozSWa6jsyDAcilJ05ia","client_secret":"[REDACTED]","app_type":"sso_integration","is_first_party":true,"is_token_endpoint_ip_header_trusted":false,"oidc_conformant":false,"jwt_configuration":{"secret_encoded":false,"lifetime_in_seconds":36000},"signing_keys":[{"cert":"[REDACTED]"}],"sso_disabled":false,"grant_types":["authorization_code","implicit","refresh_token","client_credentials"],"custom_login_page_on":true,"addons":{"aws":{"principal":"arn:aws:iam::010616021751:saml-provider/idpname","role":"arn:aws:iam::010616021751:role/foo","lifetime_in_seconds":32000}},"refresh_token":{"rotation_type":"non-rotating","expiration_type":"non-expiring","leeway":0,"token_lifetime":2592000,"infinite_token_lifetime":true,"infinite_idle_token_lifetime":true,"idle_token_lifetime":1296000}}' + headers: + Content-Type: + - application/json; charset=utf-8 + status: 200 OK + code: 200 + duration: 112.954083ms + - id: 2 + request: + proto: HTTP/1.1 + proto_major: 1 + proto_minor: 1 + content_length: 5 + transfer_encoding: [] + trailer: {} + host: terraform-provider-auth0-dev.eu.auth0.com + remote_addr: "" + request_uri: "" + body: | + null + form: {} + headers: + Content-Type: + - application/json + User-Agent: + - Go-Auth0-SDK/latest + url: https://terraform-provider-auth0-dev.eu.auth0.com/api/v2/clients/T8mmXrIWvY8fOozSWa6jsyDAcilJ05ia + method: GET + response: + proto: HTTP/2.0 + proto_major: 2 + proto_minor: 0 + transfer_encoding: [] + trailer: {} + content_length: -1 + uncompressed: true + body: '{"name":"Acceptance Test - SSO Integration - TestAccClientAddons","client_id":"T8mmXrIWvY8fOozSWa6jsyDAcilJ05ia","client_secret":"[REDACTED]","app_type":"sso_integration","is_first_party":true,"is_token_endpoint_ip_header_trusted":false,"oidc_conformant":false,"jwt_configuration":{"secret_encoded":false,"lifetime_in_seconds":36000},"signing_keys":[{"cert":"[REDACTED]"}],"sso_disabled":false,"grant_types":["authorization_code","implicit","refresh_token","client_credentials"],"custom_login_page_on":true,"addons":{"aws":{"principal":"arn:aws:iam::010616021751:saml-provider/idpname","role":"arn:aws:iam::010616021751:role/foo","lifetime_in_seconds":32000}},"refresh_token":{"rotation_type":"non-rotating","expiration_type":"non-expiring","leeway":0,"token_lifetime":2592000,"infinite_token_lifetime":true,"infinite_idle_token_lifetime":true,"idle_token_lifetime":1296000}}' + headers: + Content-Type: + - application/json; charset=utf-8 + status: 200 OK + code: 200 + duration: 118.992834ms + - id: 3 + request: + proto: HTTP/1.1 + proto_major: 1 + proto_minor: 1 + content_length: 0 + transfer_encoding: [] + trailer: {} + host: terraform-provider-auth0-dev.eu.auth0.com + remote_addr: "" + request_uri: "" + body: "" + form: {} + headers: + Content-Type: + - application/json + User-Agent: + - Go-Auth0-SDK/latest + url: https://terraform-provider-auth0-dev.eu.auth0.com/api/v2/clients/T8mmXrIWvY8fOozSWa6jsyDAcilJ05ia + method: DELETE + response: + proto: HTTP/2.0 + proto_major: 2 + proto_minor: 0 + transfer_encoding: [] + trailer: {} + content_length: 0 + uncompressed: false + body: "" + headers: + Content-Type: + - application/json; charset=utf-8 + status: 204 No Content + code: 204 + duration: 211.839791ms