Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DXCDT-483: Skip is_token_endpoint_ip_header_trusted on client create #696

Merged
merged 2 commits into from
Jul 10, 2023

Conversation

sergiught
Copy link
Contributor

🔧 Changes

As mentioned in #620, directly creating a client with is_token_endpoint_ip_header_trustedset to true, without setting the authentication method to client_secret_* will result in an error. To circumvent this we'll only allow this setting to get updated after the creation of the client.

📚 References

🔬 Testing

📝 Checklist

  • All new/changed/fixed functionality is covered by tests (or N/A)
  • I have added documentation for all new/changed functionality (or N/A)

@sergiught sergiught self-assigned this Jul 8, 2023
@sergiught sergiught marked this pull request as ready for review July 8, 2023 10:37
@sergiught sergiught requested a review from a team as a code owner July 8, 2023 10:37
@codecov-commenter
Copy link

codecov-commenter commented Jul 8, 2023

Codecov Report

Merging #696 (b7ec78f) into main (e2c7a2f) will increase coverage by 0.01%.
The diff coverage is 100.00%.

Additional details and impacted files

Impacted file tree graph

@@            Coverage Diff             @@
##             main     #696      +/-   ##
==========================================
+ Coverage   86.57%   86.59%   +0.01%     
==========================================
  Files          83       83              
  Lines       12414    12416       +2     
==========================================
+ Hits        10748    10752       +4     
+ Misses       1267     1265       -2     
  Partials      399      399              
Impacted Files Coverage Δ
internal/auth0/client/expand.go 78.70% <100.00%> (+0.13%) ⬆️
internal/auth0/client/resource.go 97.25% <100.00%> (ø)

... and 1 file with indirect coverage changes

Copy link
Contributor

@willvedd willvedd left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

One small suggestion about the docs but otherwise sensible to me 👍

@sergiught sergiught force-pushed the patch/DXCDT-483-skip branch from 0609c84 to 32e54f4 Compare July 10, 2023 17:30
@sergiught sergiught force-pushed the patch/DXCDT-483-skip branch from 32e54f4 to b7ec78f Compare July 10, 2023 17:30
@sergiught sergiught merged commit 154cdb8 into main Jul 10, 2023
@sergiught sergiught deleted the patch/DXCDT-483-skip branch July 10, 2023 17:40
iwahbe added a commit to pulumi/pulumi-auth0 that referenced this pull request Jul 12, 2023
This reflects auth0/terraform-provider-auth0#696, which prevents
effectively setting this property on create.
iwahbe added a commit to pulumi/pulumi-auth0 that referenced this pull request Jul 12, 2023
* make tfgen

* make build_sdks

* Fix lints

* Don't set `isTokenEndpointIpHeaderTrusted` on create

This reflects auth0/terraform-provider-auth0#696, which prevents
effectively setting this property on create.

---------

Co-authored-by: pulumi-bot <runner@fv-az246-187.5psvvmmilinuxk0dtff2z2cd4h.cx.internal.cloudapp.net>
Co-authored-by: Ian Wahbe <ian@wahbe.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants