Update keycloak_realm, add organizations_enabled (#8927)

* Update keycloak_realm.py, add organizations_enabled

* Update plugins/modules/keycloak_realm.py

Co-authored-by: Felix Fontein <felix@fontein.de>

* Create 9027-support-organizations-in-keycloak-realm.yml

Add changelog file

* Bump version_added

* Update version_added

* Update changelogs/fragments/9027-support-organizations-in-keycloak-realm.yml

Co-authored-by: Felix Fontein <felix@fontein.de>

---------

Co-authored-by: Felix Fontein <felix@fontein.de>
pull/9060/head
Boris Budini 2024-10-21 20:53:56 +02:00 committed by GitHub
parent 5b3b7a1fb1
commit a8c41ac4c1
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 10 additions and 0 deletions

View File

@ -0,0 +1,2 @@
minor_changes:
- keycloak_realm - add boolean toggle to configure organization support for a given keycloak realm (https://github.com/ansible-collections/community.general/issues/9027, https://github.com/ansible-collections/community.general/pull/8927/).

View File

@ -384,6 +384,13 @@ options:
aliases: aliases:
- passwordPolicy - passwordPolicy
type: str type: str
organizations_enabled:
description:
- Enables support for experimental organization feature.
aliases:
- organizationsEnabled
type: bool
version_added: 10.0.0
permanent_lockout: permanent_lockout:
description: description:
- The realm permanent lockout. - The realm permanent lockout.
@ -686,6 +693,7 @@ def main():
otp_policy_type=dict(type='str', aliases=['otpPolicyType']), otp_policy_type=dict(type='str', aliases=['otpPolicyType']),
otp_supported_applications=dict(type='list', elements='str', aliases=['otpSupportedApplications']), otp_supported_applications=dict(type='list', elements='str', aliases=['otpSupportedApplications']),
password_policy=dict(type='str', aliases=['passwordPolicy'], no_log=False), password_policy=dict(type='str', aliases=['passwordPolicy'], no_log=False),
organizations_enabled=dict(type='bool', aliases=['organizationsEnabled']),
permanent_lockout=dict(type='bool', aliases=['permanentLockout']), permanent_lockout=dict(type='bool', aliases=['permanentLockout']),
quick_login_check_milli_seconds=dict(type='int', aliases=['quickLoginCheckMilliSeconds']), quick_login_check_milli_seconds=dict(type='int', aliases=['quickLoginCheckMilliSeconds']),
refresh_token_max_reuse=dict(type='int', aliases=['refreshTokenMaxReuse'], no_log=False), refresh_token_max_reuse=dict(type='int', aliases=['refreshTokenMaxReuse'], no_log=False),