Code Monkey home page Code Monkey logo

Comments (3)

vitaliCoasy avatar vitaliCoasy commented on August 11, 2024 2

Hey, I am not sure, if it relates here as well, but I have an issue with auth0 client as well.
My configuration:
refresh_token {
rotation_type = "non-rotating"
expiration_type = "non-expiring"
infinite_token_lifetime = "false"
infinite_idle_token_lifetime = "false"
}
Causing next output:
Error: 400 Bad Request: Neither infinite_token_lifetime nor infinite_idle_token_lifetime can be true when token expiration type is 'non-expiring'

Does it looks like a bug as well which is related to these 2 fields?

from terraform-provider-auth0.

sergiught avatar sergiught commented on August 11, 2024 1

Hey folks, this got fixed through #187 and it will be available in the next release planned towards the end of next week (approximately). We'll be closing this down cuz of this.

from terraform-provider-auth0.

algiorgi avatar algiorgi commented on August 11, 2024

Sorry for my bad english.
I have been experimenting something similiar.

I have this terraform script:

terraform {
  required_providers {
    auth0 = {
      source  = "auth0/auth0"
      version = "0.30.2"
    }
  }
}

provider "auth0" {
  domain        = "some-valid-domain"
  client_id     = "some-valid-client-id"
  client_secret = "some-valid-client-secret"
}

resource "auth0_client" "auth0_test" {
  name                       = "AppName"
  description                = "AppDescription"
  app_type                   = "spa"
  oidc_conformant            = true
  token_endpoint_auth_method = "none"

  refresh_token {
    rotation_type   = "non-rotating"
    expiration_type = "non-expiring"
    token_lifetime  = 36000
  }

  jwt_configuration {
    alg = "RS256"
  }
}

This script works fine the very first time but when I execute it again I get:

Error: 400 Bad Request: Neither infinite_token_lifetime nor infinite_idle_token_lifetime can be true when token expiration type is 'non-expiring'

According to the documentation both values are false by default:

infinite_idle_token_lifetime - (Optional) Boolean, (Default=false) Whether or not inactive refresh tokens should be remain valid indefinitely.

infinite_token_lifetime - (Optional) Boolean, (Default=false) Whether or not refresh tokens should remain valid indefinitely. If false, token_lifetime should also be set

Adding more information about this:

This is the plan output for the first time:

 + refresh_token {
          + expiration_type = "non-expiring"
          + rotation_type   = "non-rotating"
          + token_lifetime  = 36000
        }

The second time, the plan output show:

 ~ refresh_token {
          - idle_token_lifetime          = 35999 -> null
          - infinite_idle_token_lifetime = true -> null
          - infinite_token_lifetime      = true -> null
            # (4 unchanged attributes hidden)
        }

Seem like both infinite_idle_token_lifetime and infinite_token_lifetime were saved as true, right?

from terraform-provider-auth0.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.