bcgov / moh-keycloak-client-configurations

Apache License 2.0
1 stars 3 forks source link

TEST env: Add phsa_windowsaccountname to all clients that use HA login. #560

Closed sharpedavid closed 4 months ago

sharpedavid commented 4 months ago

Changes being made

TEST env: Add phsa_windowsaccountname to all clients that use HA login.

Context

RFC-20240429-01-BCMOHAD-20395-TEST-KEYCLOAK-Change_PHSA_Username_Format

Quality Check

github-actions[bot] commented 4 months ago

Terraform Format and Style 🖌success

Terraform Initialization ⚙️success

Terraform Validation 🤖success

Terraform Plan 📖success

Show Plan ``` + realm_id = "moh_applications" } # module.KEYCLOAK_TEST.module.moh_applications.module.PLR_IAT.keycloak_generic_client_protocol_mapper.phsa_windowsaccountname will be created + resource "keycloak_generic_client_protocol_mapper" "phsa_windowsaccountname" { + client_id = "a837283e-f96e-446d-9c51-5ac7d0eab773" + config = { + "access.token.claim" = "true" + "claim.name" = "preferred_username" + "id.token.claim" = "true" + "jsonType.label" = "String" + "user.attribute" = "phsa_windowsaccountname" + "userinfo.token.claim" = "false" } + id = (known after apply) + name = "preferred_username" + protocol = "openid-connect" + protocol_mapper = "oidc-override-usermodel-attribute-mapper" + realm_id = "moh_applications" } # module.KEYCLOAK_TEST.module.moh_applications.module.PLR_REV.keycloak_generic_client_protocol_mapper.phsa_windowsaccountname will be created + resource "keycloak_generic_client_protocol_mapper" "phsa_windowsaccountname" { + client_id = "20e896f4-bf43-43ed-9441-d166e0513f34" + config = { + "access.token.claim" = "true" + "claim.name" = "preferred_username" + "id.token.claim" = "true" + "jsonType.label" = "String" + "user.attribute" = "phsa_windowsaccountname" + "userinfo.token.claim" = "false" } + id = (known after apply) + name = "preferred_username" + protocol = "openid-connect" + protocol_mapper = "oidc-override-usermodel-attribute-mapper" + realm_id = "moh_applications" } # module.KEYCLOAK_TEST.module.moh_applications.module.PRP-WEB.keycloak_generic_client_protocol_mapper.phsa_windowsaccountname will be created + resource "keycloak_generic_client_protocol_mapper" "phsa_windowsaccountname" { + client_id = "dc91ec52-7b17-40bd-94a9-9831f1481c9e" + config = { + "access.token.claim" = "true" + "claim.name" = "preferred_username" + "id.token.claim" = "true" + "jsonType.label" = "String" + "user.attribute" = "phsa_windowsaccountname" + "userinfo.token.claim" = "true" } + id = (known after apply) + name = "preferred_username" + protocol = "openid-connect" + protocol_mapper = "oidc-override-usermodel-attribute-mapper" + realm_id = "moh_applications" } # module.KEYCLOAK_TEST.module.moh_applications.module.SAT-EFORMS.keycloak_generic_client_protocol_mapper.phsa_windowsaccountname will be created + resource "keycloak_generic_client_protocol_mapper" "phsa_windowsaccountname" { + client_id = "4694cd35-d7c2-4592-bc16-992452cfe15f" + config = { + "access.token.claim" = "true" + "claim.name" = "preferred_username" + "id.token.claim" = "true" + "jsonType.label" = "String" + "user.attribute" = "phsa_windowsaccountname" + "userinfo.token.claim" = "true" } + id = (known after apply) + name = "preferred_username" + protocol = "openid-connect" + protocol_mapper = "oidc-override-usermodel-attribute-mapper" + realm_id = "moh_applications" } # module.KEYCLOAK_TEST.module.moh_applications.module.TBCM.keycloak_generic_client_protocol_mapper.phsa_windowsaccountname will be created + resource "keycloak_generic_client_protocol_mapper" "phsa_windowsaccountname" { + client_id = "fb2d5ba6-c52e-49b9-ba37-b6c2f5953e03" + config = { + "access.token.claim" = "true" + "claim.name" = "preferred_username" + "id.token.claim" = "true" + "jsonType.label" = "String" + "user.attribute" = "phsa_windowsaccountname" + "userinfo.token.claim" = "true" } + id = (known after apply) + name = "preferred_username" + protocol = "openid-connect" + protocol_mapper = "oidc-override-usermodel-attribute-mapper" + realm_id = "moh_applications" } Plan: 24 to add, 0 to change, 0 to destroy. ───────────────────────────────────────────────────────────────────────────── Note: You didn't use the -out option to save this plan, so Terraform can't guarantee to take exactly these actions if you run "terraform apply" now. ```

Pushed by: @sharpedavid, Action: pull_request