Skip to content
This repository has been archived by the owner on Mar 8, 2022. It is now read-only.

Auth0 client refresh token #255

Merged
merged 6 commits into from
Aug 17, 2020

Conversation

rienafairefr
Copy link
Contributor

Proposed Changes

/moved from the terraform-providers/terraform-provider-auth0 repo
This adds support for the refresh_token field on clients

Fixes #19

Acceptance Test Output

$ make testacc TESTS=TestAccClient.*
==> Checking that code complies with gofmt requirements...
?   	github.com/terraform-providers/terraform-provider-auth0	[no test files]
=== RUN   TestAccClientGrant
--- PASS: TestAccClientGrant (22.34s)
=== RUN   TestAccClient
--- PASS: TestAccClient (7.24s)
=== RUN   TestAccClientZeroValueCheck
--- PASS: TestAccClientZeroValueCheck (8.34s)
=== RUN   TestAccClientRotateSecret
--- PASS: TestAccClientRotateSecret (1.79s)
=== RUN   TestAccClientInitiateLoginUri
--- PASS: TestAccClientInitiateLoginUri (0.02s)
=== RUN   TestAccClientJwtScopes
--- PASS: TestAccClientJwtScopes (7.82s)
PASS
coverage: 26.0% of statements
ok  	github.com/terraform-providers/terraform-provider-auth0/auth0	47.560s	coverage: 26.0% of statements
?   	github.com/terraform-providers/terraform-provider-auth0/auth0/internal/debug	[no test files]
testing: warning: no tests to run
PASS
coverage: 0.0% of statements
ok  	github.com/terraform-providers/terraform-provider-auth0/auth0/internal/random	0.009s	coverage: 0.0% of statements [no tests to run]
testing: warning: no tests to run
PASS
coverage: 0.0% of statements
ok  	github.com/terraform-providers/terraform-provider-auth0/auth0/internal/validation	0.001s	coverage: 0.0% of statements [no tests to run]
?   	github.com/terraform-providers/terraform-provider-auth0/version	[no test files]

Community Note

  • Please vote on this pull request by adding a 👍 reaction to the original pull request comment to help the community and maintainers prioritize this request
  • Please do not leave "+1" comments, they generate extra noise for pull request followers and do not help prioritize the request

@rienafairefr
Copy link
Contributor Author

@alexkappa moved the PR here.
Re: The oidc_conformant issue, it's apparently necessary to put that for the refresh token rotation to be acceptable by auth0

@alexkappa
Copy link
Owner

Thank you @rienafairefr!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

refresh_token field for client
2 participants