mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
ca5a2b291a
* KeycloakClientDiffBugs - Introduce test that passes. * KeycloakClientDiffBugs - Add test to show that checking of redirect_uri's fails. * KeycloakClientDiffBugs - (Fix1) Update so that checking of `redirectUris` no longer shows a change. * KeycloakClientDiffBugs - Add test to show that checking of attributes's fails (sorting issue) * KeycloakClientDiffBugs - (Fix2) Update so that checking of `attributes` no longer shows a change. * KeycloakClientDiffBugs - Add test to show that checking of protocol_mappers's fail * KeycloakClientDiffBugs - (Fix3) Update so that checking of `protocol_mappers` no longer shows a change when there is none. * Introduce code fragment. * Update the changelog to be based on the PR instead of the issue. * Fix the readme * Fix yaml indentation. * Fix pep8 * Update changelogs/fragments/3610-fix-keycloak-client-diff-bugs-when-sorting.yml Co-authored-by: Felix Fontein <felix@fontein.de> * Update changelogs/fragments/3610-fix-keycloak-client-diff-bugs-when-sorting.yml Co-authored-by: Felix Fontein <felix@fontein.de> * Update plugins/modules/identity/keycloak/keycloak_client.py Co-authored-by: Felix Fontein <felix@fontein.de> * Remove need for .copy() after making normalise_cr not mutate the dict. Co-authored-by: Pierre Dumuid <pierre@knowyourdata.com.au> Co-authored-by: Felix Fontein <felix@fontein.de>
57 lines
1.5 KiB
YAML
57 lines
1.5 KiB
YAML
---
|
|
url: http://localhost:8080/auth
|
|
admin_realm: master
|
|
admin_user: admin
|
|
admin_password: password
|
|
realm: myrealm
|
|
client_id: myclient
|
|
role: myrole
|
|
description_1: desc 1
|
|
description_2: desc 2
|
|
|
|
auth_args:
|
|
auth_keycloak_url: "{{ url }}"
|
|
auth_realm: "{{ admin_realm }}"
|
|
auth_username: "{{ admin_user }}"
|
|
auth_password: "{{ admin_password }}"
|
|
|
|
redirect_uris1:
|
|
- "http://example.c.com/"
|
|
- "http://example.b.com/"
|
|
- "http://example.a.com/"
|
|
|
|
client_attributes1: {"backchannel.logout.session.required": true, "backchannel.logout.revoke.offline.tokens": false}
|
|
|
|
protocol_mappers1:
|
|
- name: 'email'
|
|
protocol: 'openid-connect'
|
|
protocolMapper: 'oidc-usermodel-property-mapper'
|
|
config:
|
|
"claim.name": "email"
|
|
"user.attribute": "email"
|
|
"jsonType.label": "String"
|
|
"id.token.claim": "true"
|
|
"access.token.claim": "true"
|
|
"userinfo.token.claim": "true"
|
|
|
|
- name: 'email_verified'
|
|
protocol: 'openid-connect'
|
|
protocolMapper: 'oidc-usermodel-property-mapper'
|
|
config:
|
|
"claim.name": "email_verified"
|
|
"user.attribute": "emailVerified"
|
|
"jsonType.label": "boolean"
|
|
"id.token.claim": "true"
|
|
"access.token.claim": "true"
|
|
"userinfo.token.claim": "true"
|
|
|
|
- name: 'family_name'
|
|
protocol: 'openid-connect'
|
|
protocolMapper: 'oidc-usermodel-property-mapper'
|
|
config:
|
|
"claim.name": "family_name"
|
|
"user.attribute": "lastName"
|
|
"jsonType.label": "String"
|
|
"id.token.claim": "true"
|
|
"access.token.claim": "true"
|
|
"userinfo.token.claim": "true"
|