Fix spell in parameter name

This commit is contained in:
Guido Grazioli 2025-04-09 17:22:22 +02:00
commit 314e2f26b2
9 changed files with 12 additions and 9 deletions

View file

@ -52,7 +52,7 @@
roles: roles:
- role: keycloak_quarkus - role: keycloak_quarkus
- role: keycloak_realm - role: keycloak_realm
keycloak_url: "{{ keycloak_quarkus_hostname }}" keycloak_url: http://instance:8080
keycloak_context: '' keycloak_context: ''
keycloak_admin_user: "{{ keycloak_quarkus_bootstrap_admin_user }}" keycloak_admin_user: "{{ keycloak_quarkus_bootstrap_admin_user }}"
keycloak_admin_password: "{{ keycloak_quarkus_bootstrap_admin_password }}" keycloak_admin_password: "{{ keycloak_quarkus_bootstrap_admin_password }}"

View file

@ -31,6 +31,7 @@ provisioner:
ansible_python_interpreter: "{{ ansible_playbook_python }}" ansible_python_interpreter: "{{ ansible_playbook_python }}"
env: env:
ANSIBLE_FORCE_COLOR: "true" ANSIBLE_FORCE_COLOR: "true"
PYTHONHTTPSVERIFY: 0
verifier: verifier:
name: ansible name: ansible
scenario: scenario:

View file

@ -102,8 +102,8 @@
- name: "Get Clients" - name: "Get Clients"
ansible.builtin.uri: ansible.builtin.uri:
url: "https://instance:8443/admin/realms/TestRealm/clients" url: "https://instance:8443/admin/realms/TestRealm/clients"
validate_certs: false
headers: headers:
validate_certs: false
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}" Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
register: keycloak_clients register: keycloak_clients
@ -114,15 +114,15 @@
- name: "Get Client {{ keycloak_client_uuid }}" - name: "Get Client {{ keycloak_client_uuid }}"
ansible.builtin.uri: ansible.builtin.uri:
url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}" url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}"
validate_certs: false
headers: headers:
validate_certs: false
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}" Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
register: keycloak_test_client register: keycloak_test_client
- name: "Get Client roles" - name: "Get Client roles"
ansible.builtin.uri: ansible.builtin.uri:
url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}/roles" url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}/roles"
validate_certs: false
headers: headers:
validate_certs: false
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}" Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
register: keycloak_test_client_roles register: keycloak_test_client_roles

View file

@ -65,6 +65,7 @@ provisioner:
ansible_python_interpreter: "{{ ansible_playbook_python }}" ansible_python_interpreter: "{{ ansible_playbook_python }}"
env: env:
ANSIBLE_FORCE_COLOR: "true" ANSIBLE_FORCE_COLOR: "true"
PYTHONHTTPSVERIFY: 0
verifier: verifier:
name: ansible name: ansible
scenario: scenario:

View file

@ -112,7 +112,7 @@ Role Defaults
|`keycloak_quarkus_restart_strategy`| Strategy task file for restarting in HA (one of provided restart/['serial.yml','none.yml','serial_then_parallel.yml']) or path to file when providing custom strategy | `restart/serial.yml` | |`keycloak_quarkus_restart_strategy`| Strategy task file for restarting in HA (one of provided restart/['serial.yml','none.yml','serial_then_parallel.yml']) or path to file when providing custom strategy | `restart/serial.yml` |
|`keycloak_quarkus_restart_health_check`| Whether to wait for successful health check after restart | `true` | |`keycloak_quarkus_restart_health_check`| Whether to wait for successful health check after restart | `true` |
|`keycloak_quarkus_restart_health_check_delay`| Seconds to let pass before starting healch checks | `10` | |`keycloak_quarkus_restart_health_check_delay`| Seconds to let pass before starting healch checks | `10` |
|`keycloak_quarkus_restart_health_check_reries`| Number of attempts for successful health check before failing | `25` | |`keycloak_quarkus_restart_health_check_retries`| Number of attempts for successful health check before failing | `25` |
|`keycloak_quarkus_restart_pause`| Seconds to wait between restarts in HA strategy | `15` | |`keycloak_quarkus_restart_pause`| Seconds to wait between restarts in HA strategy | `15` |

View file

@ -163,5 +163,5 @@ keycloak_quarkus_supported_policy_types: ['password-blacklists']
keycloak_quarkus_restart_strategy: restart/serial.yml keycloak_quarkus_restart_strategy: restart/serial.yml
keycloak_quarkus_restart_health_check: true keycloak_quarkus_restart_health_check: true
keycloak_quarkus_restart_health_check_delay: 10 keycloak_quarkus_restart_health_check_delay: 10
keycloak_quarkus_restart_health_check_reries: 25 keycloak_quarkus_restart_health_check_retries: 25
keycloak_quarkus_restart_pause: 15 keycloak_quarkus_restart_pause: 15

View file

@ -464,7 +464,7 @@ argument_specs:
description: "Seconds to let pass before starting healch checks" description: "Seconds to let pass before starting healch checks"
default: 10 default: 10
type: 'int' type: 'int'
keycloak_quarkus_restart_health_check_reries: keycloak_quarkus_restart_health_check_retries:
description: "Number of attempts for successful health check before failing" description: "Number of attempts for successful health check before failing"
default: 25 default: 25
type: 'int' type: 'int'

View file

@ -12,7 +12,7 @@
url: "{{ keycloak.health_url }}" url: "{{ keycloak.health_url }}"
register: keycloak_status register: keycloak_status
until: keycloak_status.status == 200 until: keycloak_status.status == 200
retries: "{{ keycloak_quarkus_restart_health_check_reries }}" retries: "{{ keycloak_quarkus_restart_health_check_retries }}"
delay: "{{ keycloak_quarkus_restart_health_check_delay }}" delay: "{{ keycloak_quarkus_restart_health_check_delay }}"
when: internal_force_health_check | default(keycloak_quarkus_restart_health_check) when: internal_force_health_check | default(keycloak_quarkus_restart_health_check)

View file

@ -14,3 +14,4 @@
until: keycloak_status.status == 200 until: keycloak_status.status == 200
retries: 25 retries: 25
delay: 10 delay: 10
when: internal_force_health_check | default(keycloak_quarkus_restart_health_check)