ci: update linter settings, fix new linter issues

This commit is contained in:
Guido Grazioli 2023-05-22 16:12:25 +02:00
parent 0cf7b3ac49
commit fd375a141d
5 changed files with 37 additions and 26 deletions

View file

@ -21,19 +21,20 @@ warn_list:
- experimental - experimental
- ignore-errors - ignore-errors
- no-handler - no-handler
- fqcn-builtins
- no-log-password - no-log-password
- jinja[spacing] - jinja[spacing]
- jinja[invalid] - jinja[invalid]
- meta-no-tags - meta-no-tags
- name[template]
- name[casing] - name[casing]
- fqcn[action] - fqcn[action]
- schema[meta] - schema[meta]
- var-naming[no-role-prefix]
- key-order[task]
skip_list: skip_list:
- vars_should_not_be_used - vars_should_not_be_used
- file_is_small_enough - file_is_small_enough
- name[template]
use_default_rules: true use_default_rules: true
parseable: true parseable: true

View file

@ -15,8 +15,11 @@
- ansible_facts.services["keycloak.service"]["state"] == "running" - ansible_facts.services["keycloak.service"]["state"] == "running"
- ansible_facts.services["keycloak.service"]["status"] == "enabled" - ansible_facts.services["keycloak.service"]["status"] == "enabled"
- name: Verify we are running on requested jvm - name: Verify we are running on requested jvm
shell: | ansible.builtin.shell: |
set -o pipefail
ps -ef | grep /usr/lib/jvm/java-11 | grep -v grep ps -ef | grep /usr/lib/jvm/java-11 | grep -v grep
args:
executable: /bin/bash
changed_when: no changed_when: no
- name: Verify token api call - name: Verify token api call
ansible.builtin.uri: ansible.builtin.uri:
@ -48,8 +51,6 @@
headers: headers:
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}" Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
register: keycloak_query_clients register: keycloak_query_clients
- debug:
msg: "{{ keycloak_query_clients.json | selectattr('clientId','equalto','TestClient') }}"
- name: Verify expected config - name: Verify expected config
ansible.builtin.assert: ansible.builtin.assert:
that: that:

View file

@ -11,25 +11,30 @@
ansible.builtin.set_fact: ansible.builtin.set_fact:
hera_home: "{{ lookup('env', 'HERA_HOME') }}" hera_home: "{{ lookup('env', 'HERA_HOME') }}"
- ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=instance' - name: Create certificate request
ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=instance'
delegate_to: localhost delegate_to: localhost
changed_when: False
- block: - name: Set /etc/hosts
- ansible.builtin.lineinfile: ansible.builtin.lineinfile:
dest: /etc/hosts dest: /etc/hosts
line: "127.0.0.1 instance" line: "127.0.0.1 instance"
state: present state: present
delegate_to: localhost delegate_to: localhost
become: yes become: yes
when: when:
- hera_home is defined - hera_home is defined
- hera_home | length == 0 - hera_home | length == 0
- ansible.builtin.file: - name: Create conf directory # risky-file-permissions in test user account does not exist yet
ansible.builtin.file:
state: directory state: directory
path: /opt/keycloak/keycloak-18.0.0/conf/ path: /opt/keycloak/keycloak-18.0.0/conf/
mode: 0755
- ansible.builtin.copy: - name: Copy certificates
ansible.builtin.copy:
src: "{{ item }}" src: "{{ item }}"
dest: "/opt/keycloak/keycloak-18.0.0/conf/{{ item }}" dest: "/opt/keycloak/keycloak-18.0.0/conf/{{ item }}"
mode: 0444 mode: 0444

View file

@ -4,26 +4,30 @@
tasks: tasks:
- name: Populate service facts - name: Populate service facts
ansible.builtin.service_facts: ansible.builtin.service_facts:
- name: Check if keycloak service started - name: Check if keycloak service started
ansible.builtin.assert: ansible.builtin.assert:
that: that:
- ansible_facts.services["keycloak.service"]["state"] == "running" - ansible_facts.services["keycloak.service"]["state"] == "running"
- ansible_facts.services["keycloak.service"]["status"] == "enabled" - ansible_facts.services["keycloak.service"]["status"] == "enabled"
- set_fact: - name: Set internal envvar
ansible.builtin.set_fact:
hera_home: "{{ lookup('env', 'HERA_HOME') }}" hera_home: "{{ lookup('env', 'HERA_HOME') }}"
- block: - name: Verify openid config
- name: Fetch openID config block:
shell: | - name: Fetch openID config # noqa command-instead-of-module
ansible.builtin.shell: |
set -o pipefail
curl https://instance:8443/realms/master/.well-known/openid-configuration -k | jq . curl https://instance:8443/realms/master/.well-known/openid-configuration -k | jq .
args:
executable: /bin/bash
delegate_to: localhost delegate_to: localhost
register: openid_config register: openid_config
- debug: changed_when: False
msg: " {{ openid_config.stdout | from_json }}"
delegate_to: localhost
- name: Verify endpoint URLs - name: Verify endpoint URLs
assert: ansible.builtin.assert:
that: that:
- (openid_config.stdout | from_json)["backchannel_authentication_endpoint"] == 'https://instance/realms/master/protocol/openid-connect/ext/ciba/auth' - (openid_config.stdout | from_json)["backchannel_authentication_endpoint"] == 'https://instance/realms/master/protocol/openid-connect/ext/ciba/auth'
- (openid_config.stdout | from_json)['issuer'] == 'https://instance/realms/master' - (openid_config.stdout | from_json)['issuer'] == 'https://instance/realms/master'

View file

@ -35,14 +35,14 @@
run_once: yes run_once: yes
- name: Determine patch versions list - name: Determine patch versions list
set_fact: ansible.builtin.set_fact:
filtered_versions: "{{ rhn_products.results | map(attribute='file_path') | select('match', '^[^/]*/rh-sso-.*[0-9]*[.][0-9]*[.][0-9]*.*$') | map('regex_replace','[^/]*/rh-sso-([0-9]*[.][0-9]*[.][0-9]*)-.*','\\1' ) | list | unique }}" filtered_versions: "{{ rhn_products.results | map(attribute='file_path') | select('match', '^[^/]*/rh-sso-.*[0-9]*[.][0-9]*[.][0-9]*.*$') | map('regex_replace','[^/]*/rh-sso-([0-9]*[.][0-9]*[.][0-9]*)-.*','\\1' ) | list | unique }}"
when: sso_patch_version is not defined or sso_patch_version | length == 0 when: sso_patch_version is not defined or sso_patch_version | length == 0
delegate_to: localhost delegate_to: localhost
run_once: yes run_once: yes
- name: Determine latest version - name: Determine latest version
set_fact: ansible.builtin.set_fact:
sso_latest_version: "{{ filtered_versions | middleware_automation.keycloak.version_sort | last }}" sso_latest_version: "{{ filtered_versions | middleware_automation.keycloak.version_sort | last }}"
when: sso_patch_version is not defined or sso_patch_version | length == 0 when: sso_patch_version is not defined or sso_patch_version | length == 0
delegate_to: localhost delegate_to: localhost
@ -58,7 +58,7 @@
run_once: yes run_once: yes
- name: "Determine selected patch from supplied version: {{ sso_patch_version }}" - name: "Determine selected patch from supplied version: {{ sso_patch_version }}"
set_fact: ansible.builtin.set_fact:
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_patch_bundle + '$') }}" rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_patch_bundle + '$') }}"
patch_bundle: "{{ sso_patch_bundle }}" patch_bundle: "{{ sso_patch_bundle }}"
patch_version: "{{ sso_patch_version }}" patch_version: "{{ sso_patch_version }}"