ci: more linter fixes

This commit is contained in:
Guido Grazioli 2024-04-17 16:48:24 +02:00
parent f0318b2ecf
commit 5b459f3dde
7 changed files with 106 additions and 104 deletions

View file

@ -637,7 +637,7 @@ EXAMPLES = '''
- test01 - test01
- test02 - test02
authentication_flow_binding_overrides: authentication_flow_binding_overrides:
browser: 4c90336b-bf1d-4b87-916d-3677ba4e5fbb browser: 4c90336b-bf1d-4b87-916d-3677ba4e5fbb
protocol_mappers: protocol_mappers:
- config: - config:
access.token.claim: true access.token.claim: true

View file

@ -142,14 +142,14 @@ EXAMPLES = '''
auth_password: PASSWORD auth_password: PASSWORD
name: my-new-role name: my-new-role
attributes: attributes:
attrib1: value1 attrib1: value1
attrib2: value2 attrib2: value2
attrib3: attrib3:
- with - with
- numerous - numerous
- individual - individual
- list - list
- items - items
delegate_to: localhost delegate_to: localhost
''' '''

View file

@ -475,99 +475,99 @@ author:
''' '''
EXAMPLES = ''' EXAMPLES = '''
- name: Create LDAP user federation - name: Create LDAP user federation
middleware_automation.keycloak.keycloak_user_federation: middleware_automation.keycloak.keycloak_user_federation:
auth_keycloak_url: https://keycloak.example.com/auth auth_keycloak_url: https://keycloak.example.com/auth
auth_realm: master auth_realm: master
auth_username: admin auth_username: admin
auth_password: password auth_password: password
realm: my-realm realm: my-realm
name: my-ldap name: my-ldap
state: present state: present
provider_id: ldap provider_id: ldap
provider_type: org.keycloak.storage.UserStorageProvider provider_type: org.keycloak.storage.UserStorageProvider
config: config:
priority: 0 priority: 0
enabled: true enabled: true
cachePolicy: DEFAULT cachePolicy: DEFAULT
batchSizeForSync: 1000 batchSizeForSync: 1000
editMode: READ_ONLY editMode: READ_ONLY
importEnabled: true importEnabled: true
syncRegistrations: false syncRegistrations: false
vendor: other vendor: other
usernameLDAPAttribute: uid usernameLDAPAttribute: uid
rdnLDAPAttribute: uid rdnLDAPAttribute: uid
uuidLDAPAttribute: entryUUID uuidLDAPAttribute: entryUUID
userObjectClasses: inetOrgPerson, organizationalPerson userObjectClasses: inetOrgPerson, organizationalPerson
connectionUrl: ldaps://ldap.example.com:636 connectionUrl: ldaps://ldap.example.com:636
usersDn: ou=Users,dc=example,dc=com usersDn: ou=Users,dc=example,dc=com
authType: simple authType: simple
bindDn: cn=directory reader bindDn: cn=directory reader
bindCredential: password bindCredential: password
searchScope: 1 searchScope: 1
validatePasswordPolicy: false validatePasswordPolicy: false
trustEmail: false trustEmail: false
useTruststoreSpi: ldapsOnly useTruststoreSpi: ldapsOnly
connectionPooling: true connectionPooling: true
pagination: true pagination: true
allowKerberosAuthentication: false allowKerberosAuthentication: false
debug: false debug: false
useKerberosForPasswordAuthentication: false useKerberosForPasswordAuthentication: false
mappers: mappers:
- name: "full name" - name: "full name"
providerId: "full-name-ldap-mapper" providerId: "full-name-ldap-mapper"
providerType: "org.keycloak.storage.ldap.mappers.LDAPStorageMapper" providerType: "org.keycloak.storage.ldap.mappers.LDAPStorageMapper"
config: config:
ldap.full.name.attribute: cn ldap.full.name.attribute: cn
read.only: true read.only: true
write.only: false write.only: false
- name: Create Kerberos user federation - name: Create Kerberos user federation
middleware_automation.keycloak.keycloak_user_federation: middleware_automation.keycloak.keycloak_user_federation:
auth_keycloak_url: https://keycloak.example.com/auth auth_keycloak_url: https://keycloak.example.com/auth
auth_realm: master auth_realm: master
auth_username: admin auth_username: admin
auth_password: password auth_password: password
realm: my-realm realm: my-realm
name: my-kerberos name: my-kerberos
state: present state: present
provider_id: kerberos provider_id: kerberos
provider_type: org.keycloak.storage.UserStorageProvider provider_type: org.keycloak.storage.UserStorageProvider
config: config:
priority: 0 priority: 0
enabled: true enabled: true
cachePolicy: DEFAULT cachePolicy: DEFAULT
kerberosRealm: EXAMPLE.COM kerberosRealm: EXAMPLE.COM
serverPrincipal: HTTP/host.example.com@EXAMPLE.COM serverPrincipal: HTTP/host.example.com@EXAMPLE.COM
keyTab: keytab keyTab: keytab
allowPasswordAuthentication: false allowPasswordAuthentication: false
updateProfileFirstLogin: false updateProfileFirstLogin: false
- name: Create sssd user federation - name: Create sssd user federation
middleware_automation.keycloak.keycloak_user_federation: middleware_automation.keycloak.keycloak_user_federation:
auth_keycloak_url: https://keycloak.example.com/auth auth_keycloak_url: https://keycloak.example.com/auth
auth_realm: master auth_realm: master
auth_username: admin auth_username: admin
auth_password: password auth_password: password
realm: my-realm realm: my-realm
name: my-sssd name: my-sssd
state: present state: present
provider_id: sssd provider_id: sssd
provider_type: org.keycloak.storage.UserStorageProvider provider_type: org.keycloak.storage.UserStorageProvider
config: config:
priority: 0 priority: 0
enabled: true enabled: true
cachePolicy: DEFAULT cachePolicy: DEFAULT
- name: Delete user federation - name: Delete user federation
middleware_automation.keycloak.keycloak_user_federation: middleware_automation.keycloak.keycloak_user_federation:
auth_keycloak_url: https://keycloak.example.com/auth auth_keycloak_url: https://keycloak.example.com/auth
auth_realm: master auth_realm: master
auth_username: admin auth_username: admin
auth_password: password auth_password: password
realm: my-realm realm: my-realm
name: my-federation name: my-federation
state: absent state: absent
''' '''
RETURN = ''' RETURN = '''

View file

@ -73,7 +73,7 @@
- name: Ensure logdirectory exists - name: Ensure logdirectory exists
ansible.builtin.file: ansible.builtin.file:
state: directory state: directory
path: "{{ keycloak.log.file | dirname }}" path: "{{ keycloak.log.file | dirname }}"
owner: "{{ keycloak.service_user }}" owner: "{{ keycloak.service_user }}"
group: "{{ keycloak.service_group }}" group: "{{ keycloak.service_group }}"
mode: '0775' mode: '0775'

View file

@ -13,4 +13,4 @@
register: keycloak_status register: keycloak_status
until: keycloak_status.status == 200 until: keycloak_status.status == 200
retries: 25 retries: 25
delay: 10 delay: 10

View file

@ -7,4 +7,5 @@ keycloak_quarkus_prereq_package_list:
- apt - apt
- tzdata - tzdata
keycloak_quarkus_sysconf_file: /etc/default/keycloak keycloak_quarkus_sysconf_file: /etc/default/keycloak
keycloak_quarkus_pkg_java_home: "/usr/lib/jvm/java-{{ keycloak_quarkus_varjvm_package | regex_search('(?!:openjdk-)[0-9.]+') }}-openjdk-{{ 'arm64' if ansible_architecture == 'aarch64' else 'amd64' }}" keycloak_quarkus_pkg_java_home: "/usr/lib/jvm/java-{{ keycloak_quarkus_varjvm_package | \
regex_search('(?!:openjdk-)[0-9.]+') }}-openjdk-{{ 'arm64' if ansible_architecture == 'aarch64' else 'amd64' }}"

View file

@ -1,10 +1,11 @@
--- ---
keycloak: keycloak: # noqa var-naming this is an internal dict of interpolated values
home: "{{ keycloak_quarkus_home }}" home: "{{ keycloak_quarkus_home }}"
config_dir: "{{ keycloak_quarkus_config_dir }}" config_dir: "{{ keycloak_quarkus_config_dir }}"
bundle: "{{ keycloak_quarkus_archive }}" bundle: "{{ keycloak_quarkus_archive }}"
service_name: "keycloak" service_name: "keycloak"
health_url: "http://{{ keycloak_quarkus_host }}:{{ keycloak_quarkus_http_port }}{{ keycloak_quarkus_http_relative_path }}{{ '/' if keycloak_quarkus_http_relative_path | length > 1 else '' }}realms/master/.well-known/openid-configuration" health_url: "http://{{ keycloak_quarkus_host }}:{{ keycloak_quarkus_http_port }}{{ keycloak_quarkus_http_relative_path }}{{ '/' \
if keycloak_quarkus_http_relative_path | length > 1 else '' }}realms/master/.well-known/openid-configuration"
cli_path: "{{ keycloak_quarkus_home }}/bin/kcadm.sh" cli_path: "{{ keycloak_quarkus_home }}/bin/kcadm.sh"
service_user: "{{ keycloak_quarkus_service_user }}" service_user: "{{ keycloak_quarkus_service_user }}"
service_group: "{{ keycloak_quarkus_service_group }}" service_group: "{{ keycloak_quarkus_service_group }}"