-
Notifications
You must be signed in to change notification settings - Fork 9.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #22477 from danquack/client-info
d/aws_cognito_user_pool_client lookup single client attributes
- Loading branch information
Showing
5 changed files
with
356 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
```release-note:new-data-source | ||
aws_cognito_user_pool_client | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
224 changes: 224 additions & 0 deletions
224
internal/service/cognitoidp/user_pool_client_data_source.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,224 @@ | ||
package cognitoidp | ||
|
||
import ( | ||
"fmt" | ||
"log" | ||
|
||
"github.com/aws/aws-sdk-go/aws" | ||
"github.com/aws/aws-sdk-go/service/cognitoidentityprovider" | ||
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" | ||
"github.com/hashicorp/terraform-provider-aws/internal/conns" | ||
"github.com/hashicorp/terraform-provider-aws/internal/flex" | ||
) | ||
|
||
func DataSourceUserPoolClient() *schema.Resource { | ||
return &schema.Resource{ | ||
Read: dataSourceUserPoolClientRead, | ||
|
||
Schema: map[string]*schema.Schema{ | ||
"access_token_validity": { | ||
Type: schema.TypeInt, | ||
Computed: true, | ||
}, | ||
"allowed_oauth_flows": { | ||
Type: schema.TypeSet, | ||
Computed: true, | ||
Elem: &schema.Schema{ | ||
Type: schema.TypeString, | ||
}, | ||
}, | ||
"allowed_oauth_flows_user_pool_client": { | ||
Type: schema.TypeBool, | ||
Computed: true, | ||
}, | ||
"allowed_oauth_scopes": { | ||
Type: schema.TypeSet, | ||
Computed: true, | ||
Elem: &schema.Schema{ | ||
Type: schema.TypeString, | ||
}, | ||
}, | ||
"analytics_configuration": { | ||
Type: schema.TypeList, | ||
Computed: true, | ||
Elem: &schema.Resource{ | ||
Schema: map[string]*schema.Schema{ | ||
"application_id": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"application_arn": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"external_id": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"role_arn": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"user_data_shared": { | ||
Type: schema.TypeBool, | ||
Computed: true, | ||
}, | ||
}, | ||
}, | ||
}, | ||
"callback_urls": { | ||
Type: schema.TypeSet, | ||
Computed: true, | ||
Elem: &schema.Schema{ | ||
Type: schema.TypeString, | ||
}, | ||
}, | ||
"client_id": { | ||
Type: schema.TypeString, | ||
Required: true, | ||
}, | ||
"client_secret": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
Sensitive: true, | ||
}, | ||
"default_redirect_uri": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"enable_token_revocation": { | ||
Type: schema.TypeBool, | ||
Computed: true, | ||
}, | ||
"explicit_auth_flows": { | ||
Type: schema.TypeSet, | ||
Computed: true, | ||
Elem: &schema.Schema{ | ||
Type: schema.TypeString, | ||
}, | ||
}, | ||
"generate_secret": { | ||
Type: schema.TypeBool, | ||
Computed: true, | ||
}, | ||
"id_token_validity": { | ||
Type: schema.TypeInt, | ||
Computed: true, | ||
}, | ||
"logout_urls": { | ||
Type: schema.TypeSet, | ||
Computed: true, | ||
Elem: &schema.Schema{ | ||
Type: schema.TypeString, | ||
}, | ||
}, | ||
"name": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"prevent_user_existence_errors": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"read_attributes": { | ||
Type: schema.TypeSet, | ||
Computed: true, | ||
Elem: &schema.Schema{ | ||
Type: schema.TypeString, | ||
}, | ||
}, | ||
"refresh_token_validity": { | ||
Type: schema.TypeInt, | ||
Computed: true, | ||
}, | ||
"supported_identity_providers": { | ||
Type: schema.TypeSet, | ||
Computed: true, | ||
Elem: &schema.Schema{ | ||
Type: schema.TypeString, | ||
}, | ||
}, | ||
"token_validity_units": { | ||
Type: schema.TypeList, | ||
Computed: true, | ||
Elem: &schema.Resource{ | ||
Schema: map[string]*schema.Schema{ | ||
"access_token": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"id_token": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
"refresh_token": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
}, | ||
}, | ||
}, | ||
}, | ||
"user_pool_id": { | ||
Type: schema.TypeString, | ||
Required: true, | ||
}, | ||
"write_attributes": { | ||
Type: schema.TypeSet, | ||
Computed: true, | ||
Elem: &schema.Schema{ | ||
Type: schema.TypeString, | ||
}, | ||
}, | ||
}, | ||
} | ||
} | ||
|
||
func dataSourceUserPoolClientRead(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*conns.AWSClient).CognitoIDPConn | ||
|
||
clientId := d.Get("client_id").(string) | ||
d.SetId(clientId) | ||
|
||
params := &cognitoidentityprovider.DescribeUserPoolClientInput{ | ||
ClientId: aws.String(clientId), | ||
UserPoolId: aws.String(d.Get("user_pool_id").(string)), | ||
} | ||
|
||
log.Printf("[DEBUG] Reading Cognito User Pool Client: %s", params) | ||
|
||
resp, err := conn.DescribeUserPoolClient(params) | ||
|
||
if err != nil { | ||
return fmt.Errorf("error reading Cognito User Pool Client (%s): %w", clientId, err) | ||
} | ||
|
||
userPoolClient := resp.UserPoolClient | ||
d.Set("user_pool_id", userPoolClient.UserPoolId) | ||
d.Set("name", userPoolClient.ClientName) | ||
d.Set("explicit_auth_flows", flex.FlattenStringSet(userPoolClient.ExplicitAuthFlows)) | ||
d.Set("read_attributes", flex.FlattenStringSet(userPoolClient.ReadAttributes)) | ||
d.Set("write_attributes", flex.FlattenStringSet(userPoolClient.WriteAttributes)) | ||
d.Set("refresh_token_validity", userPoolClient.RefreshTokenValidity) | ||
d.Set("access_token_validity", userPoolClient.AccessTokenValidity) | ||
d.Set("id_token_validity", userPoolClient.IdTokenValidity) | ||
d.Set("client_secret", userPoolClient.ClientSecret) | ||
d.Set("allowed_oauth_flows", flex.FlattenStringSet(userPoolClient.AllowedOAuthFlows)) | ||
d.Set("allowed_oauth_flows_user_pool_client", userPoolClient.AllowedOAuthFlowsUserPoolClient) | ||
d.Set("allowed_oauth_scopes", flex.FlattenStringSet(userPoolClient.AllowedOAuthScopes)) | ||
d.Set("callback_urls", flex.FlattenStringSet(userPoolClient.CallbackURLs)) | ||
d.Set("default_redirect_uri", userPoolClient.DefaultRedirectURI) | ||
d.Set("logout_urls", flex.FlattenStringSet(userPoolClient.LogoutURLs)) | ||
d.Set("prevent_user_existence_errors", userPoolClient.PreventUserExistenceErrors) | ||
d.Set("supported_identity_providers", flex.FlattenStringSet(userPoolClient.SupportedIdentityProviders)) | ||
d.Set("enable_token_revocation", userPoolClient.EnableTokenRevocation) | ||
|
||
if err := d.Set("analytics_configuration", flattenUserPoolClientAnalyticsConfig(userPoolClient.AnalyticsConfiguration)); err != nil { | ||
return fmt.Errorf("error setting analytics_configuration: %w", err) | ||
} | ||
|
||
if err := d.Set("token_validity_units", flattenUserPoolClientTokenValidityUnitsType(userPoolClient.TokenValidityUnits)); err != nil { | ||
return fmt.Errorf("error setting token_validity_units: %w", err) | ||
} | ||
|
||
return nil | ||
} |
45 changes: 45 additions & 0 deletions
45
internal/service/cognitoidp/user_pool_client_data_source_test.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
package cognitoidp_test | ||
|
||
import ( | ||
"testing" | ||
|
||
"github.com/aws/aws-sdk-go/service/cognitoidentityprovider" | ||
sdkacctest "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest" | ||
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource" | ||
"github.com/hashicorp/terraform-provider-aws/internal/acctest" | ||
) | ||
|
||
func TestAccCognitoIDPUserPoolClientDataSource_basic(t *testing.T) { | ||
var client cognitoidentityprovider.UserPoolClientType | ||
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix) | ||
resourceName := "data.aws_cognito_user_pool_client.test" | ||
|
||
resource.ParallelTest(t, resource.TestCase{ | ||
PreCheck: func() { acctest.PreCheck(t); testAccPreCheckIdentityProvider(t) }, | ||
ErrorCheck: acctest.ErrorCheck(t, cognitoidentityprovider.EndpointsID), | ||
Providers: acctest.Providers, | ||
CheckDestroy: testAccCheckUserPoolClientDestroy, | ||
Steps: []resource.TestStep{ | ||
{ | ||
Config: testAccUserPoolClientConfigDataSource_basic(rName), | ||
Check: resource.ComposeAggregateTestCheckFunc( | ||
testAccCheckUserPoolClientExists(resourceName, &client), | ||
resource.TestCheckResourceAttr(resourceName, "name", rName), | ||
resource.TestCheckResourceAttr(resourceName, "explicit_auth_flows.#", "1"), | ||
resource.TestCheckTypeSetElemAttr(resourceName, "explicit_auth_flows.*", "ADMIN_NO_SRP_AUTH"), | ||
resource.TestCheckResourceAttr(resourceName, "token_validity_units.#", "0"), | ||
resource.TestCheckResourceAttr(resourceName, "analytics_configuration.#", "0"), | ||
), | ||
}, | ||
}, | ||
}) | ||
} | ||
|
||
func testAccUserPoolClientConfigDataSource_basic(rName string) string { | ||
return testAccUserPoolClientConfig_basic(rName) + ` | ||
data "aws_cognito_user_pool_client" "test" { | ||
user_pool_id = aws_cognito_user_pool.test.id | ||
client_id = aws_cognito_user_pool_client.test.id | ||
} | ||
` | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,83 @@ | ||
--- | ||
subcategory: "Cognito" | ||
layout: "aws" | ||
page_title: "AWS: aws_cognito_user_pool_client" | ||
description: |- | ||
Provides a Cognito User Pool Client | ||
--- | ||
|
||
# Data Source: aws_cognito_user_pool_client | ||
|
||
Provides a Cognito User Pool Client resource. | ||
|
||
## Example Usage | ||
|
||
### Get User Pool Client names | ||
|
||
```terraform | ||
resource "aws_cognito_user_pool" "pool" { | ||
name = "pool" | ||
} | ||
data "aws_cognito_user_pool_clients" "main" { | ||
user_pool_id = aws_cognito_user_pool.main.id | ||
} | ||
data "aws_cognito_user_pool_client" "client" { | ||
for_each = data.aws_cognito_user_pool_clients.main.client_ids | ||
client_id = each.value | ||
user_pool_id = aws_cognito_user_pool.pool.id | ||
} | ||
output "names" { | ||
value = data.aws_cognito_user_pool_client.client.*.name | ||
} | ||
``` | ||
|
||
## Argument Reference | ||
|
||
The following arguments are required: | ||
|
||
* `client_id` - (Required) Client Id of the user pool. | ||
* `user_pool_id` - (Required) User pool the client belongs to. | ||
|
||
## Attributes Reference | ||
|
||
In addition to all arguments above, the following attributes are exported: | ||
|
||
* `access_token_validity` - (Optional) Time limit, between 5 minutes and 1 day, after which the access token is no longer valid and cannot be used. This value will be overridden if you have entered a value in `token_validity_units`. | ||
* `allowed_oauth_flows_user_pool_client` - (Optional) Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools. | ||
* `allowed_oauth_flows` - (Optional) List of allowed OAuth flows (code, implicit, client_credentials). | ||
* `allowed_oauth_scopes` - (Optional) List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin). | ||
* `analytics_configuration` - (Optional) Configuration block for Amazon Pinpoint analytics for collecting metrics for this user pool. [Detailed below](#analytics_configuration). | ||
* `callback_urls` - (Optional) List of allowed callback URLs for the identity providers. | ||
* `default_redirect_uri` - (Optional) Default redirect URI. Must be in the list of callback URLs. | ||
* `enable_token_revocation` - (Optional) Enables or disables token revocation. | ||
* `explicit_auth_flows` - (Optional) List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH). | ||
* `generate_secret` - (Optional) Should an application secret be generated. | ||
* `id_token_validity` - (Optional) Time limit, between 5 minutes and 1 day, after which the ID token is no longer valid and cannot be used. This value will be overridden if you have entered a value in `token_validity_units`. | ||
* `logout_urls` - (Optional) List of allowed logout URLs for the identity providers. | ||
* `prevent_user_existence_errors` - (Optional) Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to `ENABLED` and the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set to `LEGACY`, those APIs will return a `UserNotFoundException` exception if the user does not exist in the user pool. | ||
* `read_attributes` - (Optional) List of user pool attributes the application client can read from. | ||
* `refresh_token_validity` - (Optional) Time limit in days refresh tokens are valid for. | ||
* `supported_identity_providers` - (Optional) List of provider names for the identity providers that are supported on this client. Uses the `provider_name` attribute of `aws_cognito_identity_provider` resource(s), or the equivalent string(s). | ||
* `token_validity_units` - (Optional) Configuration block for units in which the validity times are represented in. [Detailed below](#token_validity_units). | ||
* `write_attributes` - (Optional) List of user pool attributes the application client can write to. | ||
|
||
### analytics_configuration | ||
|
||
Either `application_arn` or `application_id` is required. | ||
|
||
* `application_arn` - (Optional) Application ARN for an Amazon Pinpoint application. Conflicts with `external_id` and `role_arn`. | ||
* `application_id` - (Optional) Application ID for an Amazon Pinpoint application. | ||
* `external_id` - (Optional) ID for the Analytics Configuration. Conflicts with `application_arn`. | ||
* `role_arn` - (Optional) ARN of an IAM role that authorizes Amazon Cognito to publish events to Amazon Pinpoint analytics. Conflicts with `application_arn`. | ||
* `user_data_shared` (Optional) If set to `true`, Amazon Cognito will include user data in the events it publishes to Amazon Pinpoint analytics. | ||
|
||
### token_validity_units | ||
|
||
Valid values for the following arguments are: `seconds`, `minutes`, `hours` or `days`. | ||
|
||
* `access_token` - (Optional) Time unit in for the value in `access_token_validity`, defaults to `hours`. | ||
* `id_token` - (Optional) Time unit in for the value in `id_token_validity`, defaults to `hours`. | ||
* `refresh_token` - (Optional) Time unit in for the value in `refresh_token_validity`, defaults to `days`. |