mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
22a400d626
* Add default license header to files which have no copyright or license header yet.
* yml extension should have been xml...
(cherry picked from commit 1ab2a5f1bc
)
175 lines
4.7 KiB
YAML
175 lines
4.7 KiB
YAML
---
|
|
# Copyright (c) Ansible Project
|
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
- name: Create realm
|
|
community.general.keycloak_realm:
|
|
auth_keycloak_url: "{{ url }}"
|
|
auth_realm: "{{ admin_realm }}"
|
|
auth_username: "{{ admin_user }}"
|
|
auth_password: "{{ admin_password }}"
|
|
id: "{{ realm }}"
|
|
realm: "{{ realm }}"
|
|
state: present
|
|
|
|
- name: Create new identity provider
|
|
community.general.keycloak_identity_provider:
|
|
auth_keycloak_url: "{{ url }}"
|
|
auth_realm: "{{ admin_realm }}"
|
|
auth_username: "{{ admin_user }}"
|
|
auth_password: "{{ admin_password }}"
|
|
realm: "{{ realm }}"
|
|
alias: "{{ idp }}"
|
|
display_name: OpenID Connect IdP
|
|
enabled: true
|
|
provider_id: oidc
|
|
config:
|
|
issuer: https://idp.example.com
|
|
authorizationUrl: https://idp.example.com/auth
|
|
tokenUrl: https://idp.example.com/token
|
|
userInfoUrl: https://idp.example.com/userinfo
|
|
clientAuthMethod: client_secret_post
|
|
clientId: clientid
|
|
clientSecret: clientsecret
|
|
syncMode: FORCE
|
|
mappers:
|
|
- name: "first_name"
|
|
identityProviderAlias: "oidc-idp"
|
|
identityProviderMapper: "oidc-user-attribute-idp-mapper"
|
|
config:
|
|
claim: "first_name"
|
|
user.attribute: "first_name"
|
|
syncMode: "INHERIT"
|
|
- name: "last_name"
|
|
identityProviderAlias: "oidc-idp"
|
|
identityProviderMapper: "oidc-user-attribute-idp-mapper"
|
|
config:
|
|
claim: "last_name"
|
|
user.attribute: "last_name"
|
|
syncMode: "INHERIT"
|
|
state: present
|
|
register: result
|
|
|
|
- name: Debug
|
|
debug:
|
|
var: result
|
|
|
|
- name: Assert identity provider created
|
|
assert:
|
|
that:
|
|
- result is changed
|
|
- result.existing == {}
|
|
- result.end_state.alias == "{{ idp }}"
|
|
- result.end_state.mappers != []
|
|
|
|
- name: Update existing identity provider (no change)
|
|
community.general.keycloak_identity_provider:
|
|
auth_keycloak_url: "{{ url }}"
|
|
auth_realm: "{{ admin_realm }}"
|
|
auth_username: "{{ admin_user }}"
|
|
auth_password: "{{ admin_password }}"
|
|
realm: "{{ realm }}"
|
|
alias: "{{ idp }}"
|
|
enabled: true
|
|
provider_id: oidc
|
|
config:
|
|
issuer: https://idp.example.com
|
|
authorizationUrl: https://idp.example.com/auth
|
|
tokenUrl: https://idp.example.com/token
|
|
userInfoUrl: https://idp.example.com/userinfo
|
|
clientAuthMethod: client_secret_post
|
|
clientId: clientid
|
|
clientSecret: "**********"
|
|
syncMode: FORCE
|
|
mappers:
|
|
- name: "first_name"
|
|
identityProviderAlias: "oidc-idp"
|
|
identityProviderMapper: "oidc-user-attribute-idp-mapper"
|
|
config:
|
|
claim: "first_name"
|
|
user.attribute: "first_name"
|
|
syncMode: "INHERIT"
|
|
- name: "last_name"
|
|
identityProviderAlias: "oidc-idp"
|
|
identityProviderMapper: "oidc-user-attribute-idp-mapper"
|
|
config:
|
|
claim: "last_name"
|
|
user.attribute: "last_name"
|
|
syncMode: "INHERIT"
|
|
state: present
|
|
register: result
|
|
|
|
- name: Debug
|
|
debug:
|
|
var: result
|
|
|
|
- name: Assert identity provider unchanged
|
|
assert:
|
|
that:
|
|
- result is not changed
|
|
|
|
- name: Update existing identity provider (with change)
|
|
community.general.keycloak_identity_provider:
|
|
auth_keycloak_url: "{{ url }}"
|
|
auth_realm: "{{ admin_realm }}"
|
|
auth_username: "{{ admin_user }}"
|
|
auth_password: "{{ admin_password }}"
|
|
realm: "{{ realm }}"
|
|
alias: "{{ idp }}"
|
|
enabled: false
|
|
state: present
|
|
register: result
|
|
|
|
- name: Debug
|
|
debug:
|
|
var: result
|
|
|
|
- name: Assert identity provider updated
|
|
assert:
|
|
that:
|
|
- result is changed
|
|
- result.existing.enabled == true
|
|
- result.end_state.enabled == false
|
|
|
|
- name: Delete existing identity provider
|
|
community.general.keycloak_identity_provider:
|
|
auth_keycloak_url: "{{ url }}"
|
|
auth_realm: "{{ admin_realm }}"
|
|
auth_username: "{{ admin_user }}"
|
|
auth_password: "{{ admin_password }}"
|
|
realm: "{{ realm }}"
|
|
alias: "{{ idp }}"
|
|
state: absent
|
|
register: result
|
|
|
|
- name: Debug
|
|
debug:
|
|
var: result
|
|
|
|
- name: Assert identity provider deleted
|
|
assert:
|
|
that:
|
|
- result is changed
|
|
- result.end_state == {}
|
|
|
|
- name: Delete absent identity provider
|
|
community.general.keycloak_identity_provider:
|
|
auth_keycloak_url: "{{ url }}"
|
|
auth_realm: "{{ admin_realm }}"
|
|
auth_username: "{{ admin_user }}"
|
|
auth_password: "{{ admin_password }}"
|
|
realm: "{{ realm }}"
|
|
alias: "{{ idp }}"
|
|
state: absent
|
|
register: result
|
|
|
|
- name: Debug
|
|
debug:
|
|
var: result
|
|
|
|
- name: Assert identity provider unchanged
|
|
assert:
|
|
that:
|
|
- result is not changed
|
|
- result.end_state == {}
|