mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
bc228d82be
* Add keycloak_authz_authorization scope module This module allows managing Keycloak client authorization scopes. The client has to have authorization enable for this to work. * botmeta: make mattock maintainer of keycloak_authz_authorization_scope * botmeta: add mattock to team_keycloak * keycloak_authz_authorization_scope: documentation and code layout fixes * keycloak_authz_authorization_scope: do not fail on names with whitespace * keycloak_authz_authorization_scope: use url quote method Co-authored-by: Felix Fontein <felix@fontein.de> * keycloak_authz_authorization_scope: style fixes to documentation * keycloak_authz_authorization_scope: do not claim check/diff mode support * keycloak_authz_authorization_scope: fix documentation * keycloak_authz_authorization_scope: support check_mode and diff_mode * keycloak_authz_authorization_scope: use more common terminology Most keycloak modules use before_<object_type> and desired_<object_type> to designate current and desired states of objects. Do the same for authorization scopes. * keycloak_authz_authorization_scope: fixes to check_mode and docs --------- Co-authored-by: Felix Fontein <felix@fontein.de>
27 lines
1.2 KiB
Text
27 lines
1.2 KiB
Text
// Copyright (c) Ansible Project
|
|
// GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
// SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
To be able to run these integration tests a keycloak server must be
|
|
reachable under a specific url with a specific admin user and password.
|
|
The exact values expected for these parameters can be found in
|
|
'vars/main.yml' file. A simple way to do this is to use the official
|
|
keycloak docker images like this:
|
|
|
|
----
|
|
docker run --name mykeycloak -p 8080:8080 -e KC_HTTP_RELATIVE_PATH=<url-path> -e KEYCLOAK_ADMIN=<admin_user> -e KEYCLOAK_ADMIN_PASSWORD=<admin_password> quay.io/keycloak/keycloak:20.0.2 start-dev
|
|
----
|
|
|
|
Example with concrete values inserted:
|
|
|
|
----
|
|
docker run --name mykeycloak -p 8080:8080 -e KC_HTTP_RELATIVE_PATH=/auth -e KEYCLOAK_ADMIN=admin -e KEYCLOAK_ADMIN_PASSWORD=password quay.io/keycloak/keycloak:20.0.2 start-dev
|
|
----
|
|
|
|
This test suite can run against a fresh unconfigured server instance
|
|
(no preconfiguration required) and cleans up after itself (undoes all
|
|
its config changes) as long as it runs through completly. While its active
|
|
it changes the server configuration in the following ways:
|
|
|
|
* creating, modifying and deleting some keycloak groups
|
|
|