This repo hosts the inspq.keycloak
Ansible Collection.
The collection includes a variety of Ansible content to help automate the management of resources in Keycloak.
Click on the name of a plugin or module to view that content's documentation:
- Connection Plugins:
- Filter Plugins:
- Inventory Source:
- Callback Plugins:
- Lookup Plugins:
- Modules:
- keycloak_authentication
- keycloak_client
- keycloak_clienttemplate
- keycloak_component
- keycloak_group
- keycloak_identity_provider
- keycloak_realm
- keycloak_role
- keycloak_user
This collection is currently testing the modules against Keycloak versions 8.0.2
and 9.0.2
.
Before using the Keycloak collection, you need to install it with the Ansible Galaxy CLI:
ansible-galaxy collection install <collection_archive_path>
The archive can be downloaded from the Github release page.
You can either call modules by their Fully Qualified Collection Namespace (FQCN), like inspq.keycloak.keycloak_client
, or you can call modules by their short name if you list the inspq.keycloak
collection in the playbook's collections
, like so:
---
- hosts: localhost
gather_facts: false
connection: local
collections:
- inspq.keycloak
tasks:
- name: Create or update Keycloak client (minimal example)
keycloak_client
auth_client_id: admin-cli
auth_keycloak_url: https://auth.example.com/auth
auth_realm: master
auth_username: USERNAME
auth_password: PASSWORD
client_id: test
state: present
- name: Ensure Influxdb datasource exists.
keycloak_client:
name: "some-client"
grafana_url: "https://grafana.company.com"
grafana_user: "admin"
grafana_password: "xxxxxx"
org_id: "1"
ds_type: "influxdb"
ds_url: "https://influx.company.com:8086"
database: "telegraf"
time_interval: ">10s"
tls_ca_cert: "/etc/ssl/certs/ca.pem"
For documentation on how to use individual modules and other content included in this collection, please see the links in the 'Included content' section earlier in this README.
If you want to develop new content for this collection or improve what's already here, the easiest way to work on the collection is to clone it into one of the configured COLLECTIONS_PATHS
, and work on it there.
The tests
directory contains configuration for running sanity and integration tests using ansible-test
.
To be able to run ansible-test, the project must be checked out in .../ansible_collections/{names;ace}/{colection}. In our case .../ansible-collections/elfelip/keycloak
Prepare the workspace for integration test: Docker and Docker Compose need to be installed. Create and source a Python virtual env:
python3 -m venv kcvenv source kcvenv/bin/activate
Upgrade PIP and Ansible
python3 -m pip install pip --upgrade python3 -m pip install ansible --upgrade
Start Keycloak and LDAP server using tests/docker-compose.yml
docker-compose -f tests/docker-compose.yml up -d
You can run the collection's test suites with the commands:
Sanity check:
ansible-test sanity --docker -v --color
Unit tests:
ansible-test units --python 3.8 -v --color
Integration Tests:
ansible-test integration --docker --docker-network tests_default -v --color
Tests servers can be stopped using this command:
docker-compose -f tests/docker-compose.yml down
You can Test modules using Keycloak and 389ds container with Python Nose. This enables debug/breakpoint fonctionnality.
First, you need to create the containers:
cd tests docker-compose up -d
Modules unit test cases may then be executed and debugged. The unit tests files are in the tests/unit/modules directory
GNU General Public License v3.0 or later
See LICENCE to see the full text.
Any contribution is welcome and we only ask contributors to:
- Provide at least integration tests for any contribution.
- Create an issues for any significant contribution that would change a large portion of the code base.