mirror of
https://github.com/ansible-middleware/keycloak.git
synced 2025-04-06 10:50:31 -07:00
ci: update linter settings, fix new linter issues
This commit is contained in:
parent
0cf7b3ac49
commit
fd375a141d
5 changed files with 37 additions and 26 deletions
|
@ -21,19 +21,20 @@ warn_list:
|
||||||
- experimental
|
- experimental
|
||||||
- ignore-errors
|
- ignore-errors
|
||||||
- no-handler
|
- no-handler
|
||||||
- fqcn-builtins
|
|
||||||
- no-log-password
|
- no-log-password
|
||||||
- jinja[spacing]
|
- jinja[spacing]
|
||||||
- jinja[invalid]
|
- jinja[invalid]
|
||||||
- meta-no-tags
|
- meta-no-tags
|
||||||
- name[template]
|
|
||||||
- name[casing]
|
- name[casing]
|
||||||
- fqcn[action]
|
- fqcn[action]
|
||||||
- schema[meta]
|
- schema[meta]
|
||||||
|
- var-naming[no-role-prefix]
|
||||||
|
- key-order[task]
|
||||||
|
|
||||||
skip_list:
|
skip_list:
|
||||||
- vars_should_not_be_used
|
- vars_should_not_be_used
|
||||||
- file_is_small_enough
|
- file_is_small_enough
|
||||||
|
- name[template]
|
||||||
|
|
||||||
use_default_rules: true
|
use_default_rules: true
|
||||||
parseable: true
|
parseable: true
|
||||||
|
|
|
@ -15,8 +15,11 @@
|
||||||
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
- name: Verify we are running on requested jvm
|
- name: Verify we are running on requested jvm
|
||||||
shell: |
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
ps -ef | grep /usr/lib/jvm/java-11 | grep -v grep
|
ps -ef | grep /usr/lib/jvm/java-11 | grep -v grep
|
||||||
|
args:
|
||||||
|
executable: /bin/bash
|
||||||
changed_when: no
|
changed_when: no
|
||||||
- name: Verify token api call
|
- name: Verify token api call
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
|
@ -48,8 +51,6 @@
|
||||||
headers:
|
headers:
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
register: keycloak_query_clients
|
register: keycloak_query_clients
|
||||||
- debug:
|
|
||||||
msg: "{{ keycloak_query_clients.json | selectattr('clientId','equalto','TestClient') }}"
|
|
||||||
- name: Verify expected config
|
- name: Verify expected config
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
|
|
|
@ -11,25 +11,30 @@
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|
||||||
- ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=instance'
|
- name: Create certificate request
|
||||||
|
ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=instance'
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
|
changed_when: False
|
||||||
|
|
||||||
- block:
|
- name: Set /etc/hosts
|
||||||
- ansible.builtin.lineinfile:
|
ansible.builtin.lineinfile:
|
||||||
dest: /etc/hosts
|
dest: /etc/hosts
|
||||||
line: "127.0.0.1 instance"
|
line: "127.0.0.1 instance"
|
||||||
state: present
|
state: present
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
become: yes
|
become: yes
|
||||||
when:
|
when:
|
||||||
- hera_home is defined
|
- hera_home is defined
|
||||||
- hera_home | length == 0
|
- hera_home | length == 0
|
||||||
|
|
||||||
- ansible.builtin.file:
|
- name: Create conf directory # risky-file-permissions in test user account does not exist yet
|
||||||
|
ansible.builtin.file:
|
||||||
state: directory
|
state: directory
|
||||||
path: /opt/keycloak/keycloak-18.0.0/conf/
|
path: /opt/keycloak/keycloak-18.0.0/conf/
|
||||||
|
mode: 0755
|
||||||
|
|
||||||
- ansible.builtin.copy:
|
- name: Copy certificates
|
||||||
|
ansible.builtin.copy:
|
||||||
src: "{{ item }}"
|
src: "{{ item }}"
|
||||||
dest: "/opt/keycloak/keycloak-18.0.0/conf/{{ item }}"
|
dest: "/opt/keycloak/keycloak-18.0.0/conf/{{ item }}"
|
||||||
mode: 0444
|
mode: 0444
|
||||||
|
|
|
@ -4,26 +4,30 @@
|
||||||
tasks:
|
tasks:
|
||||||
- name: Populate service facts
|
- name: Populate service facts
|
||||||
ansible.builtin.service_facts:
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
- name: Check if keycloak service started
|
- name: Check if keycloak service started
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
|
||||||
- set_fact:
|
- name: Set internal envvar
|
||||||
|
ansible.builtin.set_fact:
|
||||||
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|
||||||
- block:
|
- name: Verify openid config
|
||||||
- name: Fetch openID config
|
block:
|
||||||
shell: |
|
- name: Fetch openID config # noqa command-instead-of-module
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
curl https://instance:8443/realms/master/.well-known/openid-configuration -k | jq .
|
curl https://instance:8443/realms/master/.well-known/openid-configuration -k | jq .
|
||||||
|
args:
|
||||||
|
executable: /bin/bash
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
register: openid_config
|
register: openid_config
|
||||||
- debug:
|
changed_when: False
|
||||||
msg: " {{ openid_config.stdout | from_json }}"
|
|
||||||
delegate_to: localhost
|
|
||||||
- name: Verify endpoint URLs
|
- name: Verify endpoint URLs
|
||||||
assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- (openid_config.stdout | from_json)["backchannel_authentication_endpoint"] == 'https://instance/realms/master/protocol/openid-connect/ext/ciba/auth'
|
- (openid_config.stdout | from_json)["backchannel_authentication_endpoint"] == 'https://instance/realms/master/protocol/openid-connect/ext/ciba/auth'
|
||||||
- (openid_config.stdout | from_json)['issuer'] == 'https://instance/realms/master'
|
- (openid_config.stdout | from_json)['issuer'] == 'https://instance/realms/master'
|
||||||
|
|
|
@ -35,14 +35,14 @@
|
||||||
run_once: yes
|
run_once: yes
|
||||||
|
|
||||||
- name: Determine patch versions list
|
- name: Determine patch versions list
|
||||||
set_fact:
|
ansible.builtin.set_fact:
|
||||||
filtered_versions: "{{ rhn_products.results | map(attribute='file_path') | select('match', '^[^/]*/rh-sso-.*[0-9]*[.][0-9]*[.][0-9]*.*$') | map('regex_replace','[^/]*/rh-sso-([0-9]*[.][0-9]*[.][0-9]*)-.*','\\1' ) | list | unique }}"
|
filtered_versions: "{{ rhn_products.results | map(attribute='file_path') | select('match', '^[^/]*/rh-sso-.*[0-9]*[.][0-9]*[.][0-9]*.*$') | map('regex_replace','[^/]*/rh-sso-([0-9]*[.][0-9]*[.][0-9]*)-.*','\\1' ) | list | unique }}"
|
||||||
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: yes
|
||||||
|
|
||||||
- name: Determine latest version
|
- name: Determine latest version
|
||||||
set_fact:
|
ansible.builtin.set_fact:
|
||||||
sso_latest_version: "{{ filtered_versions | middleware_automation.keycloak.version_sort | last }}"
|
sso_latest_version: "{{ filtered_versions | middleware_automation.keycloak.version_sort | last }}"
|
||||||
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
|
@ -58,7 +58,7 @@
|
||||||
run_once: yes
|
run_once: yes
|
||||||
|
|
||||||
- name: "Determine selected patch from supplied version: {{ sso_patch_version }}"
|
- name: "Determine selected patch from supplied version: {{ sso_patch_version }}"
|
||||||
set_fact:
|
ansible.builtin.set_fact:
|
||||||
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_patch_bundle + '$') }}"
|
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_patch_bundle + '$') }}"
|
||||||
patch_bundle: "{{ sso_patch_bundle }}"
|
patch_bundle: "{{ sso_patch_bundle }}"
|
||||||
patch_version: "{{ sso_patch_version }}"
|
patch_version: "{{ sso_patch_version }}"
|
||||||
|
|
Loading…
Add table
Reference in a new issue