Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save emanor-okta/0cae00d5a4cef74229d1a9a90180f3ef to your computer and use it in GitHub Desktop.
Save emanor-okta/0cae00d5a4cef74229d1a9a90180f3ef to your computer and use it in GitHub Desktop.
IdP Authenticator Type does not expose idpId in AuthenticatorProviderConfiguration
2023-07-14T17:51:17.435-0700 [WARN] Provider "registry.terraform.io/okta/okta" produced an invalid plan for okta_authenticator.duo_idp, but we are tolerating it because it is using the legacy plugin SDK.
The following problems may be the cause of any confusing errors from downstream operations:
- .provider_hostname: planned value cty.StringVal("localhost") for a non-computed attribute
- .provider_user_name_template: planned value cty.StringVal("global.assign.userName.login") for a non-computed attribute
- .status: planned value cty.StringVal("ACTIVE") for a non-computed attribute
okta_authenticator.duo_idp: Modifying... [id=aut3wx2513aJbq87J1d7]
2023-07-14T17:51:17.435-0700 [INFO] Starting apply for okta_authenticator.duo_idp
2023-07-14T17:51:17.435-0700 [DEBUG] okta_authenticator.duo_idp: applying the planned Update change
2023-07-14T17:51:17.436-0700 [DEBUG] provider.terraform-provider-okta_v3.41.0: 2023/07/14 05:51:17 [DEBUG] performing request: method=PUT url=https://domain.oktapreview.com/api/v1/authenticators/aut3wx2513aJbq87J1d7
2023-07-14T17:51:17.436-0700 [INFO] provider.terraform-provider-okta_v3.41.0: 2023/07/14 17:51:17 [DEBUG] Okta API Request Details:
---[ REQUEST ]---------------------------------------
PUT /api/v1/authenticators/aut3wx2513aJbq87J1d7 HTTP/1.1
Host: domain.oktapreview.com
User-Agent: okta-sdk-golang/2.15.0 golang/go1.17.13 darwin/amd64 okta-terraform/3.41.0
Content-Length: 140
Accept: application/json
Authorization: SSWS {secret}
Content-Type: application/json
Accept-Encoding: gzip
{
"id": "aut3wx2513aJbq87J1d7",
"key": "external_idp",
"name": "DUO-MFA-ONLY",
"provider": {
"configuration": {},
"type": "CLAIMS"
},
"type": "federated"
}
-----------------------------------------------------: timestamp=2023-07-14T17:51:17.436-0700
2023-07-14T17:51:17.725-0700 [INFO] provider.terraform-provider-okta_v3.41.0: 2023/07/14 17:51:17 [DEBUG] Okta API Response Details:
---[ RESPONSE ]--------------------------------------
HTTP/2.0 400 Bad Request
Connection: close
Cache-Control: no-cache, no-store
Content-Security-Policy: default-src 'self' domain.oktapreview.com *.oktacdn.com; connect-src 'self' domain.oktapreview.com domain-admin.oktapreview.com *.oktacdn.com *.mixpanel.com *.mapbox.com app.pendo.io data.pendo.io pendo-static-5634101834153984.storage.googleapis.com pendo-static-5391521872216064.storage.googleapis.com *.mtls.oktapreview.com domain.kerberos.oktapreview.com *.authenticatorlocalprod.com:8769 http://localhost:8769 http://127.0.0.1:8769 *.authenticatorlocalprod.com:65111 http://localhost:65111 http://127.0.0.1:65111 *.authenticatorlocalprod.com:65121 http://localhost:65121 http://127.0.0.1:65121 *.authenticatorlocalprod.com:65131 http://localhost:65131 http://127.0.0.1:65131 *.authenticatorlocalprod.com:65141 http://localhost:65141 http://127.0.0.1:65141 *.authenticatorlocalprod.com:65151 http://localhost:65151 http://127.0.0.1:65151 https://oinmanager.okta.com data:; script-src 'unsafe-inline' 'unsafe-eval' 'self' domain.oktapreview.com *.oktacdn.com; style-src 'unsafe-inline' 'self' domain.oktapreview.com *.oktacdn.com app.pendo.io cdn.pendo.io pendo-static-5634101834153984.storage.googleapis.com pendo-static-5391521872216064.storage.googleapis.com; frame-src 'self' domain.oktapreview.com domain-admin.oktapreview.com login.okta.com com-okta-authenticator: api-49ebded2.duosecurity.com; img-src 'self' domain.oktapreview.com *.oktacdn.com *.tiles.mapbox.com *.mapbox.com app.pendo.io data.pendo.io cdn.pendo.io pendo-static-5634101834153984.storage.googleapis.com pendo-static-5391521872216064.storage.googleapis.com data: blob:; font-src 'self' domain.oktapreview.com data: *.oktacdn.com fonts.gstatic.com; frame-ancestors 'self'
Content-Type: application/json
Date: Sat, 15 Jul 2023 00:51:17 GMT
Expires: 0
P3p: CP="HONK"
Pragma: no-cache
Public-Key-Pins-Report-Only: pin-sha256="jZomPEBSDXoipA9un78hKRIeN/+U4ZteRaiX8YpWfqc="; pin-sha256="axSbM6RQ+19oXxudaOTdwXJbSr6f7AahxbDHFy3p8s8="; pin-sha256="SE4qe2vdD9tAegPwO79rMnZyhHvqj3i5g1c2HkyGUNE="; pin-sha256="ylP0lMLMvBaiHn0ihLxHjzvlPVQNoyQ+rMiaj0da/Pw="; max-age=60; report-uri="https://okta.report-uri.com/r/default/hpkp/reportOnly"
Server: nginx
Set-Cookie: sid="";Version=1;Path=/;Max-Age=0;Expires=Thu, 01 Jan 1970 00:00:00 GMT
Set-Cookie: autolaunch_triggered=""; Expires=Thu, 01-Jan-1970 00:00:10 GMT; Path=/
Set-Cookie: JSESSIONID=8CAD9B341D14224AF77F736C4AD726B1; Path=/; Secure; HttpOnly
Strict-Transport-Security: max-age=315360000; includeSubDomains
X-Content-Type-Options: nosniff
X-Okta-Request-Id: ZLHthW5ev0FXUjn4Bw16uwAADpo
X-Rate-Limit-Limit: 300
X-Rate-Limit-Remaining: 297
X-Rate-Limit-Reset: 1689382326
X-Xss-Protection: 0
{
"errorCode": "E0000001",
"errorSummary": "Api validation failed: provider.configuration.idpId",
"errorLink": "E0000001",
"errorId": "oaei9mOiAwGTkGf3mPSqsYc7g",
"errorCauses": [
{
"errorSummary": "provider.configuration.idpId: The field cannot be left blank"
}
]
}
-----------------------------------------------------: timestamp=2023-07-14T17:51:17.725-0700
2023-07-14T17:51:17.725-0700 [ERROR] provider.terraform-provider-okta_v3.41.0: Response contains error diagnostic: tf_rpc=ApplyResourceChange @module=sdk.proto tf_proto_version=5.3 tf_provider_addr=provider tf_resource_type=okta_authenticator @caller=github.com/hashicorp/[email protected]/tfprotov5/internal/diag/diagnostics.go:56 diagnostic_detail= diagnostic_severity=ERROR diagnostic_summary="failed to update authenticator: the API returned an error: Api validation failed: provider.configuration.idpId. Causes: errorSummary: provider.configuration.idpId: The field cannot be left blank" tf_req_id=c248f30f-7f9e-3a2b-8f9e-3070213275d4 timestamp=2023-07-14T17:51:17.725-0700
2023-07-14T17:51:17.749-0700 [ERROR] vertex "okta_authenticator.duo_idp" error: failed to update authenticator: the API returned an error: Api validation failed: provider.configuration.idpId. Causes: errorSummary: provider.configuration.idpId: The field cannot be left blank
│ Error: failed to update authenticator: the API returned an error: Api validation failed: provider.configuration.idpId. Causes: errorSummary: provider.configuration.idpId: The field cannot be left blank
│ with okta_authenticator.duo_idp,
│ on main.tf line 33, in resource "okta_authenticator" "duo_idp":
│ 33: resource "okta_authenticator" "duo_idp" {
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment