From fe5717c1aa1deab9ac487a2903c725ac2ac2cb27 Mon Sep 17 00:00:00 2001 From: Benjamin Schubert Date: Thu, 3 Jun 2021 20:42:05 +0100 Subject: [PATCH] keycloak_realm.py: Mark 'reset_password_allowed' as no_log=False (#2694) * keycloak_realm.py: Mark 'reset_password_allowed' as no_log=False This value is not sensitive but Ansible will complain about it otherwise * fixup! keycloak_realm.py: Mark 'reset_password_allowed' as no_log=False * Apply all suggestions from code review Co-authored-by: Felix Fontein Co-authored-by: Felix Fontein --- changelogs/fragments/keycloak-realm-no-log-password-reset.yml | 2 ++ plugins/modules/identity/keycloak/keycloak_realm.py | 2 +- 2 files changed, 3 insertions(+), 1 deletion(-) create mode 100644 changelogs/fragments/keycloak-realm-no-log-password-reset.yml diff --git a/changelogs/fragments/keycloak-realm-no-log-password-reset.yml b/changelogs/fragments/keycloak-realm-no-log-password-reset.yml new file mode 100644 index 0000000000..104bf4179b --- /dev/null +++ b/changelogs/fragments/keycloak-realm-no-log-password-reset.yml @@ -0,0 +1,2 @@ +bugfixes: + - keycloak_realm - remove warning that ``reset_password_allowed`` needs to be marked as ``no_log`` (https://github.com/ansible-collections/community.general/pull/2694). diff --git a/plugins/modules/identity/keycloak/keycloak_realm.py b/plugins/modules/identity/keycloak/keycloak_realm.py index 7e80bd3d3d..509fcab7bc 100644 --- a/plugins/modules/identity/keycloak/keycloak_realm.py +++ b/plugins/modules/identity/keycloak/keycloak_realm.py @@ -654,7 +654,7 @@ def main(): registration_flow=dict(type='str', aliases=['registrationFlow']), remember_me=dict(type='bool', aliases=['rememberMe']), reset_credentials_flow=dict(type='str', aliases=['resetCredentialsFlow']), - reset_password_allowed=dict(type='bool', aliases=['resetPasswordAllowed']), + reset_password_allowed=dict(type='bool', aliases=['resetPasswordAllowed'], no_log=False), revoke_refresh_token=dict(type='bool', aliases=['revokeRefreshToken']), smtp_server=dict(type='dict', aliases=['smtpServer']), ssl_required=dict(type='bool', aliases=['sslRequired']),