Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added 'users_excluded' to the 'okta_group_rule' resource #651

Merged
merged 1 commit into from
Sep 16, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions examples/okta_group_rule/basic_deactivated.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,10 +2,18 @@ resource "okta_group" "test_other" {
name = "testAcc_replace_with_uuid"
}

resource "okta_user" "test" {
first_name = "TestAcc"
last_name = "Smith"
login = "testAcc-replace_with_uuid@example.com"
email = "testAcc-replace_with_uuid@example.com"
}

resource "okta_group_rule" "test" {
name = "testAcc_replace_with_uuid"
status = "INACTIVE"
group_assignments = [okta_group.test_other.id]
expression_type = "urn:okta:expression:1.0"
expression_value = "String.startsWith(user.firstName,\"bob\")"
users_excluded = [okta_user.test.id]
}
19 changes: 19 additions & 0 deletions okta/resource_okta_group.go
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,9 @@ import (
"errors"
"fmt"
"strings"
"time"

"github.com/cenkalti/backoff/v4"

"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
Expand Down Expand Up @@ -69,6 +72,22 @@ func resourceGroupCreate(ctx context.Context, d *schema.ResourceData, m interfac
if err != nil {
return diag.Errorf("failed to create group: %v", err)
}
bOff := backoff.NewExponentialBackOff()
bOff.MaxElapsedTime = time.Second * 10
bOff.InitialInterval = time.Second
err = backoff.Retry(func() error {
g, resp, err := getOktaClientFromMetadata(m).Group.GetGroup(ctx, responseGroup.Id)
if err := suppressErrorOn404(resp, err); err != nil {
return backoff.Permanent(err)
}
if g == nil {
return fmt.Errorf("group '%s' hasn't been created after multiple checks", responseGroup.Id)
}
return nil
}, bOff)
if err != nil {
return diag.FromErr(err)
}
d.SetId(responseGroup.Id)
err = updateGroupUsers(ctx, d, m)
if err != nil {
Expand Down
24 changes: 20 additions & 4 deletions okta/resource_okta_group_rule.go
Original file line number Diff line number Diff line change
Expand Up @@ -50,6 +50,12 @@ func resourceGroupRule() *schema.Resource {
Optional: true,
Description: "Remove users added by this rule from the assigned group after deleting this resource",
},
"users_excluded": {
Type: schema.TypeSet,
Optional: true,
Description: "The list of user IDs that would be excluded when rules are processed",
Elem: &schema.Schema{Type: schema.TypeString},
},
},
CustomizeDiff: customdiff.ForceNewIf("status", func(ctx context.Context, d *schema.ResourceDiff, meta interface{}) bool {
g, _, _ := getOktaClientFromMetadata(meta).Group.GetGroupRule(ctx, d.Id(), nil)
Expand Down Expand Up @@ -89,9 +95,14 @@ func resourceGroupRuleRead(ctx context.Context, d *schema.ResourceData, m interf
_ = d.Set("name", g.Name)
_ = d.Set("status", g.Status)
// Just for the sake of safety, should never be nil
if g.Conditions != nil && g.Conditions.Expression != nil {
_ = d.Set("expression_type", g.Conditions.Expression.Type)
_ = d.Set("expression_value", g.Conditions.Expression.Value)
if g.Conditions != nil {
if g.Conditions.Expression != nil {
_ = d.Set("expression_type", g.Conditions.Expression.Type)
_ = d.Set("expression_value", g.Conditions.Expression.Value)
}
if g.Conditions.People != nil && g.Conditions.People.Users != nil {
_ = d.Set("users_excluded", convertStringSliceToSet(g.Conditions.People.Users.Exclude))
}
}
err = setNonPrimitives(d, map[string]interface{}{
"group_assignments": convertStringSliceToSet(g.Actions.AssignUserToGroups.GroupIds),
Expand Down Expand Up @@ -139,7 +150,7 @@ func resourceGroupRuleUpdate(ctx context.Context, d *schema.ResourceData, m inte
}

func hasGroupRuleChange(d *schema.ResourceData) bool {
for _, k := range []string{"expression_type", "expression_value", "name", "group_assignments"} {
for _, k := range []string{"expression_type", "expression_value", "name", "group_assignments", "users_excluded"} {
if d.HasChange(k) {
return true
}
Expand Down Expand Up @@ -176,6 +187,11 @@ func buildGroupRule(d *schema.ResourceData) *okta.GroupRule {
Type: d.Get("expression_type").(string),
Value: d.Get("expression_value").(string),
},
People: &okta.GroupRulePeopleCondition{
Users: &okta.GroupRuleUserCondition{
Exclude: convertInterfaceToStringSet(d.Get("users_excluded")),
},
},
},
Name: d.Get("name").(string),
Type: "group_rule",
Expand Down
1 change: 1 addition & 0 deletions okta/resource_okta_group_rule_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -78,6 +78,7 @@ func TestAccOktaGroupRule_crud(t *testing.T) {
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr(resourceName, "name", name2),
resource.TestCheckResourceAttr(resourceName, "status", statusInactive),
resource.TestCheckResourceAttr(resourceName, "users_excluded.#", "1"),
),
},
},
Expand Down
2 changes: 1 addition & 1 deletion okta/resource_okta_group_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -26,7 +26,7 @@ func sweepGroups(client *testClient) error {
return condenseError(errorList)
}

func TestAccOktaGroups_crud(t *testing.T) {
func TestAccOktaGroup_crud(t *testing.T) {
ri := acctest.RandInt()
resourceName := fmt.Sprintf("%s.test", oktaGroup)
mgr := newFixtureManager("okta_group")
Expand Down
2 changes: 2 additions & 0 deletions website/docs/r/group_rule.html.markdown
Original file line number Diff line number Diff line change
Expand Up @@ -43,6 +43,8 @@ The following arguments are supported:
- `remove_assigned_users` - (Optional) This tells the provider to remove users added by this rule from the assigned
group after destroying this resource. Default is `false`.

- `users_excluded` - (Optional) The list of user IDs that would be excluded when rules are processed.

## Attributes Reference

- `id` - The ID of the Group Rule.
Expand Down