Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

d/aws_cognito_user_pool_client lookup single client attributes #22477

Merged
merged 7 commits into from
Jan 10, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .changelog/22477.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:new-data-source
aws_cognito_user_pool_client
```
1 change: 1 addition & 0 deletions internal/provider/provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -402,6 +402,7 @@ func Provider() *schema.Provider {

"aws_codestarconnections_connection": codestarconnections.DataSourceConnection(),

"aws_cognito_user_pool_client": cognitoidp.DataSourceUserPoolClient(),
"aws_cognito_user_pool_clients": cognitoidp.DataSourceUserPoolClients(),
"aws_cognito_user_pool_signing_certificate": cognitoidp.DataSourceUserPoolSigningCertificate(),
"aws_cognito_user_pools": cognitoidp.DataSourceUserPools(),
Expand Down
224 changes: 224 additions & 0 deletions internal/service/cognitoidp/user_pool_client_data_source.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,224 @@
package cognitoidp

import (
"fmt"
"log"

"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/cognitoidentityprovider"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/hashicorp/terraform-provider-aws/internal/conns"
"github.com/hashicorp/terraform-provider-aws/internal/flex"
)

func DataSourceUserPoolClient() *schema.Resource {
return &schema.Resource{
Read: dataSourceUserPoolClientRead,

Schema: map[string]*schema.Schema{
"access_token_validity": {
Type: schema.TypeInt,
Computed: true,
},
"allowed_oauth_flows": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
"allowed_oauth_flows_user_pool_client": {
Type: schema.TypeBool,
Computed: true,
},
"allowed_oauth_scopes": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
"analytics_configuration": {
Type: schema.TypeList,
Computed: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"application_id": {
Type: schema.TypeString,
Computed: true,
},
"application_arn": {
Type: schema.TypeString,
Computed: true,
},
"external_id": {
Type: schema.TypeString,
Computed: true,
},
"role_arn": {
Type: schema.TypeString,
Computed: true,
},
"user_data_shared": {
Type: schema.TypeBool,
Computed: true,
},
},
},
},
"callback_urls": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
"client_id": {
Type: schema.TypeString,
Required: true,
},
"client_secret": {
Type: schema.TypeString,
Computed: true,
Sensitive: true,
},
"default_redirect_uri": {
Type: schema.TypeString,
Computed: true,
},
"enable_token_revocation": {
Type: schema.TypeBool,
Computed: true,
},
"explicit_auth_flows": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
"generate_secret": {
Type: schema.TypeBool,
Computed: true,
},
"id_token_validity": {
Type: schema.TypeInt,
Computed: true,
},
"logout_urls": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
"name": {
Type: schema.TypeString,
Computed: true,
},
"prevent_user_existence_errors": {
Type: schema.TypeString,
Computed: true,
},
"read_attributes": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
"refresh_token_validity": {
Type: schema.TypeInt,
Computed: true,
},
"supported_identity_providers": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
"token_validity_units": {
Type: schema.TypeList,
Computed: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"access_token": {
Type: schema.TypeString,
Computed: true,
},
"id_token": {
Type: schema.TypeString,
Computed: true,
},
"refresh_token": {
Type: schema.TypeString,
Computed: true,
},
},
},
},
"user_pool_id": {
Type: schema.TypeString,
Required: true,
},
"write_attributes": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
},
}
}

func dataSourceUserPoolClientRead(d *schema.ResourceData, meta interface{}) error {
conn := meta.(*conns.AWSClient).CognitoIDPConn

clientId := d.Get("client_id").(string)
d.SetId(clientId)

params := &cognitoidentityprovider.DescribeUserPoolClientInput{
ClientId: aws.String(clientId),
UserPoolId: aws.String(d.Get("user_pool_id").(string)),
}

log.Printf("[DEBUG] Reading Cognito User Pool Client: %s", params)

resp, err := conn.DescribeUserPoolClient(params)

if err != nil {
return fmt.Errorf("error reading Cognito User Pool Client (%s): %w", clientId, err)
}

userPoolClient := resp.UserPoolClient
d.Set("user_pool_id", userPoolClient.UserPoolId)
d.Set("name", userPoolClient.ClientName)
d.Set("explicit_auth_flows", flex.FlattenStringSet(userPoolClient.ExplicitAuthFlows))
d.Set("read_attributes", flex.FlattenStringSet(userPoolClient.ReadAttributes))
d.Set("write_attributes", flex.FlattenStringSet(userPoolClient.WriteAttributes))
d.Set("refresh_token_validity", userPoolClient.RefreshTokenValidity)
d.Set("access_token_validity", userPoolClient.AccessTokenValidity)
d.Set("id_token_validity", userPoolClient.IdTokenValidity)
d.Set("client_secret", userPoolClient.ClientSecret)
d.Set("allowed_oauth_flows", flex.FlattenStringSet(userPoolClient.AllowedOAuthFlows))
d.Set("allowed_oauth_flows_user_pool_client", userPoolClient.AllowedOAuthFlowsUserPoolClient)
d.Set("allowed_oauth_scopes", flex.FlattenStringSet(userPoolClient.AllowedOAuthScopes))
d.Set("callback_urls", flex.FlattenStringSet(userPoolClient.CallbackURLs))
d.Set("default_redirect_uri", userPoolClient.DefaultRedirectURI)
d.Set("logout_urls", flex.FlattenStringSet(userPoolClient.LogoutURLs))
d.Set("prevent_user_existence_errors", userPoolClient.PreventUserExistenceErrors)
d.Set("supported_identity_providers", flex.FlattenStringSet(userPoolClient.SupportedIdentityProviders))
d.Set("enable_token_revocation", userPoolClient.EnableTokenRevocation)

if err := d.Set("analytics_configuration", flattenUserPoolClientAnalyticsConfig(userPoolClient.AnalyticsConfiguration)); err != nil {
return fmt.Errorf("error setting analytics_configuration: %w", err)
}

if err := d.Set("token_validity_units", flattenUserPoolClientTokenValidityUnitsType(userPoolClient.TokenValidityUnits)); err != nil {
return fmt.Errorf("error setting token_validity_units: %w", err)
}

return nil
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,45 @@
package cognitoidp_test

import (
"testing"

"github.com/aws/aws-sdk-go/service/cognitoidentityprovider"
sdkacctest "github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/terraform-provider-aws/internal/acctest"
)

func TestAccCognitoIDPUserPoolClientDataSource_basic(t *testing.T) {
var client cognitoidentityprovider.UserPoolClientType
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
resourceName := "data.aws_cognito_user_pool_client.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { acctest.PreCheck(t); testAccPreCheckIdentityProvider(t) },
ErrorCheck: acctest.ErrorCheck(t, cognitoidentityprovider.EndpointsID),
Providers: acctest.Providers,
CheckDestroy: testAccCheckUserPoolClientDestroy,
Steps: []resource.TestStep{
{
Config: testAccUserPoolClientConfigDataSource_basic(rName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckUserPoolClientExists(resourceName, &client),
resource.TestCheckResourceAttr(resourceName, "name", rName),
resource.TestCheckResourceAttr(resourceName, "explicit_auth_flows.#", "1"),
resource.TestCheckTypeSetElemAttr(resourceName, "explicit_auth_flows.*", "ADMIN_NO_SRP_AUTH"),
resource.TestCheckResourceAttr(resourceName, "token_validity_units.#", "0"),
resource.TestCheckResourceAttr(resourceName, "analytics_configuration.#", "0"),
),
},
},
})
}

func testAccUserPoolClientConfigDataSource_basic(rName string) string {
return testAccUserPoolClientConfig_basic(rName) + `
data "aws_cognito_user_pool_client" "test" {
user_pool_id = aws_cognito_user_pool.test.id
client_id = aws_cognito_user_pool_client.test.id
}
`
}
83 changes: 83 additions & 0 deletions website/docs/d/cognito_user_pool_client.markdown
Original file line number Diff line number Diff line change
@@ -0,0 +1,83 @@
---
subcategory: "Cognito"
layout: "aws"
page_title: "AWS: aws_cognito_user_pool_client"
description: |-
Provides a Cognito User Pool Client
---

# Data Source: aws_cognito_user_pool_client

Provides a Cognito User Pool Client resource.

## Example Usage

### Get User Pool Client names

```terraform
resource "aws_cognito_user_pool" "pool" {
name = "pool"
}

data "aws_cognito_user_pool_clients" "main" {
user_pool_id = aws_cognito_user_pool.main.id
}

data "aws_cognito_user_pool_client" "client" {
for_each = data.aws_cognito_user_pool_clients.main.client_ids
client_id = each.value
user_pool_id = aws_cognito_user_pool.pool.id
}

output "names" {
value = data.aws_cognito_user_pool_client.client.*.name
}
```

## Argument Reference

The following arguments are required:

* `client_id` - (Required) Client Id of the user pool.
* `user_pool_id` - (Required) User pool the client belongs to.

## Attributes Reference

In addition to all arguments above, the following attributes are exported:

* `access_token_validity` - (Optional) Time limit, between 5 minutes and 1 day, after which the access token is no longer valid and cannot be used. This value will be overridden if you have entered a value in `token_validity_units`.
* `allowed_oauth_flows_user_pool_client` - (Optional) Whether the client is allowed to follow the OAuth protocol when interacting with Cognito user pools.
* `allowed_oauth_flows` - (Optional) List of allowed OAuth flows (code, implicit, client_credentials).
* `allowed_oauth_scopes` - (Optional) List of allowed OAuth scopes (phone, email, openid, profile, and aws.cognito.signin.user.admin).
* `analytics_configuration` - (Optional) Configuration block for Amazon Pinpoint analytics for collecting metrics for this user pool. [Detailed below](#analytics_configuration).
* `callback_urls` - (Optional) List of allowed callback URLs for the identity providers.
* `default_redirect_uri` - (Optional) Default redirect URI. Must be in the list of callback URLs.
* `enable_token_revocation` - (Optional) Enables or disables token revocation.
* `explicit_auth_flows` - (Optional) List of authentication flows (ADMIN_NO_SRP_AUTH, CUSTOM_AUTH_FLOW_ONLY, USER_PASSWORD_AUTH, ALLOW_ADMIN_USER_PASSWORD_AUTH, ALLOW_CUSTOM_AUTH, ALLOW_USER_PASSWORD_AUTH, ALLOW_USER_SRP_AUTH, ALLOW_REFRESH_TOKEN_AUTH).
* `generate_secret` - (Optional) Should an application secret be generated.
* `id_token_validity` - (Optional) Time limit, between 5 minutes and 1 day, after which the ID token is no longer valid and cannot be used. This value will be overridden if you have entered a value in `token_validity_units`.
* `logout_urls` - (Optional) List of allowed logout URLs for the identity providers.
* `prevent_user_existence_errors` - (Optional) Choose which errors and responses are returned by Cognito APIs during authentication, account confirmation, and password recovery when the user does not exist in the user pool. When set to `ENABLED` and the user does not exist, authentication returns an error indicating either the username or password was incorrect, and account confirmation and password recovery return a response indicating a code was sent to a simulated destination. When set to `LEGACY`, those APIs will return a `UserNotFoundException` exception if the user does not exist in the user pool.
* `read_attributes` - (Optional) List of user pool attributes the application client can read from.
* `refresh_token_validity` - (Optional) Time limit in days refresh tokens are valid for.
* `supported_identity_providers` - (Optional) List of provider names for the identity providers that are supported on this client. Uses the `provider_name` attribute of `aws_cognito_identity_provider` resource(s), or the equivalent string(s).
* `token_validity_units` - (Optional) Configuration block for units in which the validity times are represented in. [Detailed below](#token_validity_units).
* `write_attributes` - (Optional) List of user pool attributes the application client can write to.

### analytics_configuration

Either `application_arn` or `application_id` is required.

* `application_arn` - (Optional) Application ARN for an Amazon Pinpoint application. Conflicts with `external_id` and `role_arn`.
* `application_id` - (Optional) Application ID for an Amazon Pinpoint application.
* `external_id` - (Optional) ID for the Analytics Configuration. Conflicts with `application_arn`.
* `role_arn` - (Optional) ARN of an IAM role that authorizes Amazon Cognito to publish events to Amazon Pinpoint analytics. Conflicts with `application_arn`.
* `user_data_shared` (Optional) If set to `true`, Amazon Cognito will include user data in the events it publishes to Amazon Pinpoint analytics.

### token_validity_units

Valid values for the following arguments are: `seconds`, `minutes`, `hours` or `days`.

* `access_token` - (Optional) Time unit in for the value in `access_token_validity`, defaults to `hours`.
* `id_token` - (Optional) Time unit in for the value in `id_token_validity`, defaults to `hours`.
* `refresh_token` - (Optional) Time unit in for the value in `refresh_token_validity`, defaults to `days`.