blob: 03b0908a68b5f7538e009b6e95cc9f0512e97d62 [file] [log] [blame]
---
# keycloak molecule/default/molecule.yml
#
# SPDX-FileCopyrightText: © 2021 Open Networking Foundation <support@opennetworking.org>
# SPDX-License-Identifier: Apache-2.0
dependency:
name: galaxy
driver:
name: docker
platforms:
- name: "debian-11-priv"
image: "onfinfra/molecule-systemd:debian-11"
privileged: true
volumes:
- "/sys/fs/cgroup:/sys/fs/cgroup:ro"
provisioner:
name: ansible
inventory:
host_vars:
debian-11-priv:
keycloak_behind_reverse_proxy: false
keycloak_server: "http://localhost:8080"
keycloak_admin_api: "{{ keycloak_server }}/auth/admin/realms/master"
keycloak_ldap_testing_user: "test2"
keycloak_ldap_server: "ldap://127.0.0.1:389"
keycloak_ldap_userdn: "ou=people,dc=testing,dc=org"
keycloak_ldap_admin_dn: "cn=Directory Manager"
keycloak_ldap_admin_password: "changeme"
keyclaok_ldap_user_object: "inetOrgPerson,organizationalPerson"
keycloak_admin_username: "admin"
keycloak_admin_password: "changeme"
keycloak_client_settings:
- name: client_testing
client_id: https://testing.client.site/v1-saml/keycloak/saml/metadata
auth_realm: master
protocol: saml
description: "Testing Server"
attributes:
saml.client.signature: false
saml.assertion.signature: true
saml_idp_initiated_sso_url_name: "IdPSSOName"
saml.server.signature: true
saml_name_id_format: "username"
redirect_uris:
- https://testing.client.site/v1-saml/keycloak/saml/acs
protocol_mappers:
- config:
attribute.name: "uid"
attribute.nameformat: "Basic"
user.attribute: "username"
name: "x509 username"
protocol: "saml"
protocolMapper: "saml-user-property-mapper"
- config:
attribute.name: "member"
attribute.nameformat: "Basic"
full.path: "false"
single: "true"
name: "groups"
protocol: "saml"
protocolMapper: "saml-group-membership-mapper"
verifier:
name: ansible