Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

okta_admin_role_custom resource does not allow "okta.profilesources.import.run" in permissions #1051

Closed
github-sylvain-tormena opened this issue Apr 7, 2022 · 4 comments
Assignees
Labels

Comments

@github-sylvain-tormena
Copy link

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Terraform Version

Terraform v1.1.3
on darwin_arm64
+ provider registry.terraform.io/hashicorp/aws v4.8.0
+ provider registry.terraform.io/okta/okta v3.22.1

Affected Resource(s)

  • okta_admin_role_custom

Expected Behavior

The value okta.profilesources.import.run should be accepted on permissions

Actual Behavior

│ Error: expected value to be one of 'okta.users.manage', 'okta.users.create', 'okta.users.read', 'okta.users.credentials.manage', 'okta.users.userprofile.manage', 'okta.users.lifecycle.manage', 'okta.users.groupMembership.manage', 'okta.users.appAssignment.manage', 'okta.groups.manage', 'okta.groups.create', 'okta.groups.members.manage', 'okta.groups.read', 'okta.groups.appAssignment.manage', 'okta.apps.read', 'okta.apps.manage', 'okta.apps.assignment.manage', got 'okta.profilesources.import.run'
│ 
│   with okta_admin_role_custom.hr_users_import_approvers,
│   on adminrole.tf line 4, in resource "okta_admin_role_custom" "hr_users_import_approvers":
│    4:   permissions = [ "okta.profilesources.import.run" ]

Steps to Reproduce

Create a resource okta_admin_role_custom, add okta.profilesources.import.run to permissions array
Do a terraform plan

Important Factoids

image

References

https://developer.okta.com/docs/reference/api/roles/#permission-types

@github-sylvain-tormena github-sylvain-tormena changed the title okta_admin_role_custom resource does not allow "okta.profilesources.import.run"in permissions okta_admin_role_custom resource does not allow "okta.profilesources.import.run" in permissions Apr 7, 2022
@monde monde self-assigned this Apr 7, 2022
@monde monde added the needs-investigation Needs further investigation label Apr 7, 2022
@monde
Copy link
Collaborator

monde commented Apr 7, 2022

Thanks @stteads I will look into this.

@monde monde removed the needs-investigation Needs further investigation label Apr 25, 2022
@faurel
Copy link

faurel commented May 18, 2022

Hi @monde, @stteads seems that this feature is partially implemented in latest provider version (tested with v3.27.0). However there is a typo in the permission name please check out #1116

@monde
Copy link
Collaborator

monde commented May 18, 2022

I have this PR open to get the API docs updated okta/okta-developer-docs#3353 , I'll take @faurel's PR #1116

@monde monde added the bug label May 18, 2022
@monde
Copy link
Collaborator

monde commented May 18, 2022

#1116 closes this and will be released on Friday

@monde monde closed this as completed May 18, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants