Skip to content
This repository was archived by the owner on Mar 8, 2022. It is now read-only.

Commit 61f12d7

Browse files
author
Alex Kalyvitis
committed
Merge branch 'master' into add-auth0_trigger_binding
2 parents ce1302b + 0a93020 commit 61f12d7

File tree

8 files changed

+29
-1
lines changed

8 files changed

+29
-1
lines changed

.github/workflows/build.yml

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ jobs:
3434
AUTH0_DOMAIN: ${{ secrets.AUTH0_DOMAIN }}
3535
AUTH0_CLIENT_ID: ${{ secrets.AUTH0_CLIENT_ID }}
3636
AUTH0_CLIENT_SECRET: ${{ secrets.AUTH0_CLIENT_SECRET }}
37+
DIGITALOCEAN_ACCESS_TOKEN: ${{ secrets.DIGITALOCEAN_ACCESS_TOKEN }}
3738

3839
- name: Send code coverage report
3940
uses: aktions/codeclimate-test-reporter@v1

.github/workflows/release.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,8 @@ jobs:
2828
GPG_PRIVATE_KEY: ${{ secrets.GPG_PRIVATE_KEY }}
2929

3030
- name: Create release notes
31-
run: scripts/release-notes.sh ${{ env.VERSION }} > release-notes.md
31+
run: |
32+
scripts/release-notes.sh ${{ env.VERSION }} | tee release-notes.md
3233
3334
- name: Go release
3435
uses: goreleaser/goreleaser-action@v1

CHANGELOG.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,11 @@
1+
## 0.25.0
2+
3+
ENHANCEMENTS:
4+
5+
* **New Resource:** `auth0_trigger_binding` a.k.a Action Flow ([#481](https://github.com/alexkappa/terraform-provider-auth0/pull/481))
6+
* resource/auth0_connection: Add `entity_id` field for SAMLP connections ([#468](https://github.com/alexkappa/terraform-provider-auth0/pull/468))
7+
* resource/auth0_client_grant: Update import documentation ([#471](https://github.com/alexkappa/terraform-provider-auth0/pull/471))
8+
19
## 0.24.3
210

311
BUG FIXES:

auth0/resource_auth0_connection.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -588,6 +588,11 @@ var connectionSchema = map[string]*schema.Schema{
588588
Optional: true,
589589
Description: "Sign Request Algorithm Digest",
590590
},
591+
"entity_id": {
592+
Type: schema.TypeString,
593+
Optional: true,
594+
Description: "Custom Entity ID for the connection",
595+
},
591596
},
592597
},
593598
Description: "Configuration settings for connection options",

auth0/resource_auth0_connection_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1290,6 +1290,7 @@ func TestAccConnectionSAML(t *testing.T) {
12901290
Check: resource.ComposeTestCheckFunc(
12911291
resource.TestCheckResourceAttr("auth0_connection.my_connection", "options.0.idp_initiated.0.client_authorize_query", "type=code&timeout=60"),
12921292
resource.TestCheckResourceAttr("auth0_connection.my_connection", "options.0.sign_out_endpoint", ""),
1293+
resource.TestCheckResourceAttr("auth0_connection.my_connection", "options.0.entity_id", "example"),
12931294
),
12941295
},
12951296
},
@@ -1388,6 +1389,7 @@ EOF
13881389
protocol_binding = "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post"
13891390
signature_algorithm = "rsa-sha256"
13901391
digest_algorithm = "sha256"
1392+
entity_id = "example"
13911393
fields_map = {
13921394
foo = "bar"
13931395
baz = "baa"

auth0/structure_auth0_connection.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -287,6 +287,7 @@ func flattenConnectionOptionsSAML(o *management.ConnectionOptionsSAML) interface
287287
"user_id_attribute": o.GetUserIDAttribute(),
288288
"set_user_root_attributes": o.GetSetUserAttributes(),
289289
"non_persistent_attrs": o.GetNonPersistentAttrs(),
290+
"entity_id": o.GetEntityID(),
290291
}
291292
}
292293

@@ -669,6 +670,7 @@ func expandConnectionOptionsSAML(d ResourceData) *management.ConnectionOptionsSA
669670
LogoURL: String(d, "icon_url"),
670671
SetUserAttributes: String(d, "set_user_root_attributes"),
671672
NonPersistentAttrs: castToListOfStrings(Set(d, "non_persistent_attrs").List()),
673+
EntityID: String(d, "entity_id"),
672674
}
673675

674676
List(d, "idp_initiated").Elem(func(d ResourceData) {

docs/resources/client_grant.md

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,3 +45,11 @@ Arguments accepted by this resource include:
4545
* `client_id` - (Required) String. ID of the client for this grant.
4646
* `audience` - (Required) String. Audience or API Identifier for this grant.
4747
* `scope` - (Required) List(String). Permissions (scopes) included in this grant.
48+
49+
## Import
50+
51+
Client grants can be imported using the grant ID (Application -> APIs -> Expand the required API)
52+
53+
```
54+
$ terraform import auth0_client_grant.example cgr_XXXXXXXXXXXXXXXX
55+
```

docs/resources/connection.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -411,6 +411,7 @@ With the `samlp` connection strategy, `options` supports the following arguments
411411
* `user_id_attribute` - (Optional) Attribute in the SAML token that will be mapped to the user_id property in Auth0.
412412
* `set_user_root_attributes` - (Optional) Determines whether the 'name', 'given_name', 'family_name', 'nickname', and 'picture' attributes can be independently updated when using the external IdP. Default is `on_each_login` and can be set to `on_first_login`.
413413
* `non_persistent_attrs` - (Optional) If there are user fields that should not be stored in Auth0 databases due to privacy reasons, you can add them to the denylist. See [here](https://auth0.com/docs/security/denylist-user-attributes) for more info.
414+
* `entity_id` - (Optional) Custom Entity ID for the connection.
414415

415416
**Example**:
416417
```hcl

0 commit comments

Comments
 (0)