Releases: okta/terraform-provider-okta
Releases · okta/terraform-provider-okta
v4.6.2
This version is broken due to issue from the okta-sdk-golang. Please use v4.6.1
4.6.2 (November 28, 2023)
BUG FIXES
- Correct updating an app when status is involved with the update #1806. Thanks, @monde!
- Datasource okta_org_metadata incorrect value for domains.organization #1810. Thanks, @monde!
- CustomDiff for status on okta_group_rule #1813. Thanks, @monde!
- Update okta_idp_social resource docs #1814. Thanks, @monde!
- Support array enum of object type in schemas #1827. Thanks, @monde!
- Fix risk_score default broke customer without FF #1829. Thanks, @duytiennguyen-okta!
- Resource okta_brand's email_domain_id is an attribute, not an argument #1831. Thanks, @monde!
- Add header to local sdk files, update contribution notes #1833. Thanks, @monde!
v4.6.1
4.6.1 (November 2, 2023)
BUG FIXES
v4.6.0
4.6.0 (November 1, 2023)
IMPROVEMENTS
- Add progressive_profiling_action to okta_policy_rule_profile_enrollment #1777. Thanks, @duytiennguyen-okta!
- Add system to okta_app_signon_policy_rule, okta_auth_server_policy_rule #1788. Thanks, @monde!
- Update okta_group search#1794. Thanks, @monde!
BUG FIXES
- Add default to risk_score to avoid breaking change #1780. Thanks, @duytiennguyen-okta!
- Fix incorrect drift detection and other bad behavior in okta_app_oauth_role_assignment #1781. Thanks, @monde!
- Implement proper error for incorrect compound import input #1785. Thanks, @monde!
- Fix a panic in resource okta_resource_set #1786. Thanks, @monde!
- Correct change detection on resources okta_app_oauth_post_logout_redirect_uri and okta_app_oauth_redirect_uri #1793. Thanks, @monde!
v4.5.0
4.5.0 (October 17, 2023)
NEW - RESOURCES, DATA SOURCES, PROPERTIES, ATTRIBUTES, ENV VARS:
- New resource:
okta_app_oauth_role_assignment
allow the assignment of admin roles on OAuth Clients in Okta - 1756. Thanks, @tgoodsell-tempus - New datasource:
okta_org_metadata
1768. Thanks, @tgoodsell-tempus - Add
risk_score
argument to resourceokta_app_signon_policy_rule
#1761. Thanks, @duytiennguyen-okta!
BUG FIXES
- Fix JSON change detection of JSON resource arguments #1758. Thanks, @monde!
- Fix panic issue when convertInterfaceArrToStringArr #1760. Thanks, @duytiennguyen-okta!
- Fix panic issue in the missing error check #1765. Thanks, @monde!
IMPROVEMENTS
- Add track all users argument to okta_group_memberships import #1766. Thanks, @arvindkrishnakumar-okta!
v4.4.3
4.4.3 (October 09, 2023)
BUG FIXES
- Correct incorrect scope escaping in OAuth 2.0 access request for resources
okta_brand
,okta_app_access_policy_assignment
,okta_policy_device_assurance_*_os
#1744. Thanks, @monde! - Fixed HTTP proxy not correctly established for v3 okta-sdk-client when enabled #1724. Thanks, @monde!
IMPROVEMENTS
- In resource
okta_app_oauth
, setsrefresh_token_rotation
's default argument toSTATIC
, and setsrefresh_token_leeway
's default argument to0
#1738. Thanks, @duytiennguyen-okta! - Correct attribution for
tgoodsell-tempus
1736. Thanks, @tgoodsell-tempus! - Client OAuth2.0 authentication with PKCS#1 format or PKCS#8 format private key #1725. Thanks, @monde!
- Improve documentation production with
hashicorp/terraform-plugin-docs
#1705. Thanks, @duytiennguyen-okta!
v4.4.2
4.4.2 (September 13, 2023)
BUG FIXES
- Proper EC and RSA jwks support in resource
okta_app_oauth
1720. Thanks, @tgoodsell!
IMPROVEMENTS
- Clean up example TF files formatting (
terraform fmt --recursive
) 1720. Thanks, @tgoodsell! - Improve stalebot stale labels behavior #1703. Thanks, @exitcode0!
- Guard fouled
org_name
+base_url
orhttp_proxy
values from erroring without contextual information (includes ACC OAuth bearer token tests) #1721. Thanks, @monde!
v4.4.1
4.4.1 (September 11, 2023)
BUG FIXES
IMPROVEMENTS
- Update okta app oauth to clarify we support multiple jwks creation #1704. Thanks, @duytiennguyen-okta!
v4.4.0
4.4.0 (September 7, 2023)
NEW - RESOURCES, DATA SOURCES, PROPERTIES, ATTRIBUTES, ENV VARS:
- New resource:
okta_app_access_policy_assignment
easily assign access/authentication/signon policy to an application - 1698. Thanks, @adantop, @monde! - Add
brand_id
argument to resourceokta_domain
#1685. Thanks, @duytiennguyen-okta! - Add
optional
attribute to data sourceokta_auth_server_scopes
#1680. Thanks, @duytiennguyen-okta! - Make resource
okta_brand
fully CRUD (original API support was for read/update only) #1677. Thanks, @duytiennguyen-okta!
IMPROVEMENTS
- PR 1691. Thanks, @monde!
- Add guards to resources
okta_profile_mapping
andokta_app_oauth
allowing for OAuth 2.0 authentication - Update clarification in docs that resources
okta_security_notification_emails
andokta_rate_limiting
are OAuth 2.0 authentication incompatible
- Add guards to resources
BUG FIXES
- Fix
metadata_url
attribute parsing in resourceokta_app_saml
#1632. Thanks, @arvindkrishnakumar-okta!
PROJECT IMPROVEMENTS:
- Add brand
name
attribute to resource and data source docs #1619. Thanks, @thatguysimon! - Refine/improve stalebot behavior for issue triage #1688, #1697. Thanks, @exitcode0!
- Improve development and upgrade sections of the README #1679. Thanks, @jefftaylor-okta!
v4.3.0
4.3.0 (August 18, 2023)
IMPROVEMENTS
- Add Import to resource
okta_app_signon_policy
#1670. Thanks, @duytiennguyen-okta! - Enhanced VCR ACC testing allowing quick datasource and resource smoketest during release #1650. Thanks, @monde!
v4.2.0
4.2.0 (August 11, 2023)
NEW - RESOURCES, DATA SOURCES, PROPERTIES, ATTRIBUTES, ENV VARS:
-
New device assurance resources #1659. Thanks, @duytiennguyen-okta!
okta_device_assurance_policy_android
okta_device_assurance_policy_chromeos
okta_device_assurance_policy_ios
okta_device_assurance_policy_macos
okta_device_assurance_policy_windows
-
Add constraints argument for webauthn to resource
okta_policy_mfa
#1663. Thanks, @duytiennguyen-okta! -
jwks_uri
argument for resourceokta_app_oauth
#1648. Thanks, @virgofx!
IMPROVEMENTS
- Data Source
okta_group
'sname
andid
arguments are optional and computed #1665. Thanks, @MatthewJohn! - Improve backoff with proper context #1658. Thanks, @monde!
- Correct obsolete documentation; document PKCS#1 and PKCS#8 private key usage in provider config and oauth apps #1666. Thanks, @monde!