mirror of
https://github.com/ansible-middleware/keycloak.git
synced 2025-07-27 07:01:34 -07:00
Fix spell in parameter name
This commit is contained in:
parent
f628b84fb0
commit
314e2f26b2
9 changed files with 12 additions and 9 deletions
|
@ -52,7 +52,7 @@
|
||||||
roles:
|
roles:
|
||||||
- role: keycloak_quarkus
|
- role: keycloak_quarkus
|
||||||
- role: keycloak_realm
|
- role: keycloak_realm
|
||||||
keycloak_url: "{{ keycloak_quarkus_hostname }}"
|
keycloak_url: http://instance:8080
|
||||||
keycloak_context: ''
|
keycloak_context: ''
|
||||||
keycloak_admin_user: "{{ keycloak_quarkus_bootstrap_admin_user }}"
|
keycloak_admin_user: "{{ keycloak_quarkus_bootstrap_admin_user }}"
|
||||||
keycloak_admin_password: "{{ keycloak_quarkus_bootstrap_admin_password }}"
|
keycloak_admin_password: "{{ keycloak_quarkus_bootstrap_admin_password }}"
|
||||||
|
|
|
@ -31,6 +31,7 @@ provisioner:
|
||||||
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
||||||
env:
|
env:
|
||||||
ANSIBLE_FORCE_COLOR: "true"
|
ANSIBLE_FORCE_COLOR: "true"
|
||||||
|
PYTHONHTTPSVERIFY: 0
|
||||||
verifier:
|
verifier:
|
||||||
name: ansible
|
name: ansible
|
||||||
scenario:
|
scenario:
|
||||||
|
|
|
@ -102,8 +102,8 @@
|
||||||
- name: "Get Clients"
|
- name: "Get Clients"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "https://instance:8443/admin/realms/TestRealm/clients"
|
url: "https://instance:8443/admin/realms/TestRealm/clients"
|
||||||
|
validate_certs: false
|
||||||
headers:
|
headers:
|
||||||
validate_certs: false
|
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
register: keycloak_clients
|
register: keycloak_clients
|
||||||
|
|
||||||
|
@ -114,15 +114,15 @@
|
||||||
- name: "Get Client {{ keycloak_client_uuid }}"
|
- name: "Get Client {{ keycloak_client_uuid }}"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}"
|
url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}"
|
||||||
|
validate_certs: false
|
||||||
headers:
|
headers:
|
||||||
validate_certs: false
|
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
register: keycloak_test_client
|
register: keycloak_test_client
|
||||||
|
|
||||||
- name: "Get Client roles"
|
- name: "Get Client roles"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}/roles"
|
url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}/roles"
|
||||||
|
validate_certs: false
|
||||||
headers:
|
headers:
|
||||||
validate_certs: false
|
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
register: keycloak_test_client_roles
|
register: keycloak_test_client_roles
|
||||||
|
|
|
@ -65,6 +65,7 @@ provisioner:
|
||||||
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
||||||
env:
|
env:
|
||||||
ANSIBLE_FORCE_COLOR: "true"
|
ANSIBLE_FORCE_COLOR: "true"
|
||||||
|
PYTHONHTTPSVERIFY: 0
|
||||||
verifier:
|
verifier:
|
||||||
name: ansible
|
name: ansible
|
||||||
scenario:
|
scenario:
|
||||||
|
|
|
@ -112,7 +112,7 @@ Role Defaults
|
||||||
|`keycloak_quarkus_restart_strategy`| Strategy task file for restarting in HA (one of provided restart/['serial.yml','none.yml','serial_then_parallel.yml']) or path to file when providing custom strategy | `restart/serial.yml` |
|
|`keycloak_quarkus_restart_strategy`| Strategy task file for restarting in HA (one of provided restart/['serial.yml','none.yml','serial_then_parallel.yml']) or path to file when providing custom strategy | `restart/serial.yml` |
|
||||||
|`keycloak_quarkus_restart_health_check`| Whether to wait for successful health check after restart | `true` |
|
|`keycloak_quarkus_restart_health_check`| Whether to wait for successful health check after restart | `true` |
|
||||||
|`keycloak_quarkus_restart_health_check_delay`| Seconds to let pass before starting healch checks | `10` |
|
|`keycloak_quarkus_restart_health_check_delay`| Seconds to let pass before starting healch checks | `10` |
|
||||||
|`keycloak_quarkus_restart_health_check_reries`| Number of attempts for successful health check before failing | `25` |
|
|`keycloak_quarkus_restart_health_check_retries`| Number of attempts for successful health check before failing | `25` |
|
||||||
|`keycloak_quarkus_restart_pause`| Seconds to wait between restarts in HA strategy | `15` |
|
|`keycloak_quarkus_restart_pause`| Seconds to wait between restarts in HA strategy | `15` |
|
||||||
|
|
||||||
|
|
||||||
|
|
|
@ -163,5 +163,5 @@ keycloak_quarkus_supported_policy_types: ['password-blacklists']
|
||||||
keycloak_quarkus_restart_strategy: restart/serial.yml
|
keycloak_quarkus_restart_strategy: restart/serial.yml
|
||||||
keycloak_quarkus_restart_health_check: true
|
keycloak_quarkus_restart_health_check: true
|
||||||
keycloak_quarkus_restart_health_check_delay: 10
|
keycloak_quarkus_restart_health_check_delay: 10
|
||||||
keycloak_quarkus_restart_health_check_reries: 25
|
keycloak_quarkus_restart_health_check_retries: 25
|
||||||
keycloak_quarkus_restart_pause: 15
|
keycloak_quarkus_restart_pause: 15
|
||||||
|
|
|
@ -464,7 +464,7 @@ argument_specs:
|
||||||
description: "Seconds to let pass before starting healch checks"
|
description: "Seconds to let pass before starting healch checks"
|
||||||
default: 10
|
default: 10
|
||||||
type: 'int'
|
type: 'int'
|
||||||
keycloak_quarkus_restart_health_check_reries:
|
keycloak_quarkus_restart_health_check_retries:
|
||||||
description: "Number of attempts for successful health check before failing"
|
description: "Number of attempts for successful health check before failing"
|
||||||
default: 25
|
default: 25
|
||||||
type: 'int'
|
type: 'int'
|
||||||
|
|
|
@ -12,7 +12,7 @@
|
||||||
url: "{{ keycloak.health_url }}"
|
url: "{{ keycloak.health_url }}"
|
||||||
register: keycloak_status
|
register: keycloak_status
|
||||||
until: keycloak_status.status == 200
|
until: keycloak_status.status == 200
|
||||||
retries: "{{ keycloak_quarkus_restart_health_check_reries }}"
|
retries: "{{ keycloak_quarkus_restart_health_check_retries }}"
|
||||||
delay: "{{ keycloak_quarkus_restart_health_check_delay }}"
|
delay: "{{ keycloak_quarkus_restart_health_check_delay }}"
|
||||||
when: internal_force_health_check | default(keycloak_quarkus_restart_health_check)
|
when: internal_force_health_check | default(keycloak_quarkus_restart_health_check)
|
||||||
|
|
||||||
|
|
|
@ -14,3 +14,4 @@
|
||||||
until: keycloak_status.status == 200
|
until: keycloak_status.status == 200
|
||||||
retries: 25
|
retries: 25
|
||||||
delay: 10
|
delay: 10
|
||||||
|
when: internal_force_health_check | default(keycloak_quarkus_restart_health_check)
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue