Skip to content
This repository has been archived by the owner on Mar 8, 2022. It is now read-only.

Client SAML configuration output is snake_case instead of camelCase #226

Closed
politician opened this issue May 7, 2020 · 5 comments · Fixed by #248
Closed

Client SAML configuration output is snake_case instead of camelCase #226

politician opened this issue May 7, 2020 · 5 comments · Fixed by #248
Labels

Comments

@politician
Copy link
Contributor

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or "me too" comments, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Terraform Version

Terraform v0.12.24

Affected Resource(s)

  • auth0_client

Terraform Configuration Files

resource "auth0_client" "gsuite" {
  name                                = "G Suite SSO"
  is_token_endpoint_ip_header_trusted = false
  is_first_party                      = true
  oidc_conformant                     = true
  sso_disabled                        = false
  cross_origin_auth                   = false
  callbacks                           = ["https://www.google.com/a/MYDOMAIN.com/acs"]
  allowed_logout_urls = [
    "https://MYDOMAIN.COM/logout"
  ]
  token_endpoint_auth_method = "client_secret_post"
  app_type                   = "regular_web"
  grant_types = [
    "authorization_code",
    "implicit",
    "refresh_token",
    "client_credentials"
  ]
  jwt_configuration {
    alg = "RS256"
  }

  addons {
    samlp {
      audience = "https://www.google.com/a/MYDOMAIN.com/acs"
      mappings = {
        nickname = "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"
      }
      create_upn_claim                   = false
      passthrough_claims_with_no_mapping = false
      map_unknown_claims_as_is           = false
      map_identities                     = false
      signature_algorithm                = "rsa-sha256"
      digest_algorithm                   = "sha256"

      name_identifier_format = "urn:oasis:names:tc:SAML:2.0:nameid-format:email"
      name_identifier_probes = [
        "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
      ]
    }
  }
}

Expected Behavior

In Auth0, the configuration should be set in camelCase such as:

{
  "audience": "https://www.google.com/a/MYDOMAIN.com/acs",
  "authnContextClassRef": "",
  "binding": "",
  "createUpnClaim": false,
  "destination": "",
  "digestAlgorithm": "sha256",
  "includeAttributeNameFormat": true,
  "lifetimeInSeconds": 3600,
  "logout": {},
  "mapIdentities": false,
  "mapUnknownClaimsAsIs": false,
  "mappings": {
    "nickname": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"
  },
  "nameIdentifierFormat": "urn:oasis:names:tc:SAML:2.0:nameid-format:email",
  "nameIdentifierProbes": [
    "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
  ],
  "passthroughClaimsWithNoMapping": false,
  "recipient": "",
  "signResponse": false,
  "signatureAlgorithm": "rsa-sha256",
  "typedAttributes": true
}

Actual Behavior

In Auth0, the configuration is set in snake_case which results in my SAML SSO not working.

{
  "audience": "https://www.google.com/a/MYDOMAIN.com/acs",
  "authn_context_class_ref": "",
  "binding": "",
  "create_upn_claim": false,
  "destination": "",
  "digest_algorithm": "sha256",
  "include_attribute_name_format": true,
  "lifetime_in_seconds": 3600,
  "logout": {},
  "map_identities": false,
  "map_unknown_claims_as_is": false,
  "mappings": {
    "nickname": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name"
  },
  "name_identifier_format": "urn:oasis:names:tc:SAML:2.0:nameid-format:email",
  "name_identifier_probes": [
    "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress"
  ],
  "passthrough_claims_with_no_mapping": false,
  "recipient": "",
  "sign_response": false,
  "signature_algorithm": "rsa-sha256",
  "typed_attributes": true
}

Steps to Reproduce

  1. terraform apply

Important Factoids

References

  • #0000
@politician
Copy link
Contributor Author

@alexkappa my Go knowledge is too limited to submit a PR for this one

@github-actions
Copy link

github-actions bot commented Jul 7, 2020

This issue is stale because it has been open 30 days with no activity.
Stale issues will be closed after 5 days if no action is taken. If you
think this issue should not be closed, remove the stale label.

@github-actions github-actions bot added the stale label Jul 7, 2020
@politician
Copy link
Contributor Author

@alexkappa could you have a look at this issue please?

Thank you!

@alexkappa
Copy link
Owner

@Incorrupt be on the lookout for release 0.12.2 soon. It should correctly translate samlp fields to camel case.

@politician
Copy link
Contributor Author

@alexkappa Ok great I’ll try it out when it’s released!

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
2 participants