mirror of
https://github.com/ansible-middleware/keycloak.git
synced 2025-04-06 10:50:31 -07:00
Merge pull request #159 from world-direct/feature/inifinispan_ha
#158: Feature/inifinispan TCPPING
This commit is contained in:
commit
d6c29ed4fc
9 changed files with 152 additions and 5 deletions
|
@ -19,6 +19,7 @@ Role Defaults
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
|`keycloak_quarkus_ha_enabled`| Enable auto configuration for database backend, clustering and remote caches on infinispan | `False` |
|
|`keycloak_quarkus_ha_enabled`| Enable auto configuration for database backend, clustering and remote caches on infinispan | `False` |
|
||||||
|
|`keycloak_quarkus_ha_discovery`| Discovery protocol for HA cluster members | `TCPPING` |
|
||||||
|`keycloak_quarkus_db_enabled`| Enable auto configuration for database backend | `True` if `keycloak_quarkus_ha_enabled` is True, else `False` |
|
|`keycloak_quarkus_db_enabled`| Enable auto configuration for database backend | `True` if `keycloak_quarkus_ha_enabled` is True, else `False` |
|
||||||
|`keycloak_quarkus_admin_user`| Administration console user account | `admin` |
|
|`keycloak_quarkus_admin_user`| Administration console user account | `admin` |
|
||||||
|`keycloak_quarkus_bind_address`| Address for binding service ports | `0.0.0.0` |
|
|`keycloak_quarkus_bind_address`| Address for binding service ports | `0.0.0.0` |
|
||||||
|
@ -28,7 +29,7 @@ Role Defaults
|
||||||
|`keycloak_quarkus_http_port`| HTTP listening port | `8080` |
|
|`keycloak_quarkus_http_port`| HTTP listening port | `8080` |
|
||||||
|`keycloak_quarkus_https_port`| TLS HTTP listening port | `8443` |
|
|`keycloak_quarkus_https_port`| TLS HTTP listening port | `8443` |
|
||||||
|`keycloak_quarkus_ajp_port`| AJP port | `8009` |
|
|`keycloak_quarkus_ajp_port`| AJP port | `8009` |
|
||||||
|`keycloak_quarkus_jgroups_port`| jgroups cluster tcp port | `7600` |
|
|`keycloak_quarkus_jgroups_port`| jgroups cluster tcp port | `7800` |
|
||||||
|`keycloak_quarkus_service_user`| Posix account username | `keycloak` |
|
|`keycloak_quarkus_service_user`| Posix account username | `keycloak` |
|
||||||
|`keycloak_quarkus_service_group`| Posix account group | `keycloak` |
|
|`keycloak_quarkus_service_group`| Posix account group | `keycloak` |
|
||||||
|`keycloak_quarkus_service_restart_always`| systemd restart always behavior activation | `False` |
|
|`keycloak_quarkus_service_restart_always`| systemd restart always behavior activation | `False` |
|
||||||
|
|
|
@ -37,7 +37,7 @@ keycloak_quarkus_http_enabled: true
|
||||||
keycloak_quarkus_http_port: 8080
|
keycloak_quarkus_http_port: 8080
|
||||||
keycloak_quarkus_https_port: 8443
|
keycloak_quarkus_https_port: 8443
|
||||||
keycloak_quarkus_ajp_port: 8009
|
keycloak_quarkus_ajp_port: 8009
|
||||||
keycloak_quarkus_jgroups_port: 7600
|
keycloak_quarkus_jgroups_port: 7800
|
||||||
keycloak_quarkus_java_opts: "-Xms1024m -Xmx2048m"
|
keycloak_quarkus_java_opts: "-Xms1024m -Xmx2048m"
|
||||||
|
|
||||||
### TLS/HTTPS configuration
|
### TLS/HTTPS configuration
|
||||||
|
@ -55,6 +55,7 @@ keycloak_quarkus_trust_store_password: ''
|
||||||
|
|
||||||
### Enable configuration for database backend, clustering and remote caches on infinispan
|
### Enable configuration for database backend, clustering and remote caches on infinispan
|
||||||
keycloak_quarkus_ha_enabled: false
|
keycloak_quarkus_ha_enabled: false
|
||||||
|
keycloak_quarkus_ha_discovery: "TCPPING"
|
||||||
### Enable database configuration, must be enabled when HA is configured
|
### Enable database configuration, must be enabled when HA is configured
|
||||||
keycloak_quarkus_db_enabled: "{{ True if keycloak_quarkus_ha_enabled else False }}"
|
keycloak_quarkus_db_enabled: "{{ True if keycloak_quarkus_ha_enabled else False }}"
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,8 @@
|
||||||
---
|
---
|
||||||
|
# handler should be invoked anytime a [build configuration](https://www.keycloak.org/server/all-config?f=build) changes
|
||||||
|
- name: "Rebuild {{ keycloak.service_name }} config"
|
||||||
|
ansible.builtin.include_tasks: rebuild_config.yml
|
||||||
|
listen: "rebuild keycloak config"
|
||||||
- name: "Restart {{ keycloak.service_name }}"
|
- name: "Restart {{ keycloak.service_name }}"
|
||||||
ansible.builtin.include_tasks: restart.yml
|
ansible.builtin.include_tasks: restart.yml
|
||||||
listen: "restart keycloak"
|
listen: "restart keycloak"
|
|
@ -168,7 +168,7 @@ argument_specs:
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_quarkus_jgroups_port:
|
keycloak_quarkus_jgroups_port:
|
||||||
# line 32 of defaults/main.yml
|
# line 32 of defaults/main.yml
|
||||||
default: 7600
|
default: 7800
|
||||||
description: "jgroups cluster tcp port"
|
description: "jgroups cluster tcp port"
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_quarkus_java_opts:
|
keycloak_quarkus_java_opts:
|
||||||
|
@ -181,6 +181,10 @@ argument_specs:
|
||||||
default: false
|
default: false
|
||||||
description: "Enable auto configuration for database backend, clustering and remote caches on infinispan"
|
description: "Enable auto configuration for database backend, clustering and remote caches on infinispan"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
|
keycloak_quarkus_ha_discovery:
|
||||||
|
default: "TCPPING"
|
||||||
|
description: "Discovery protocol for HA cluster members"
|
||||||
|
type: "str"
|
||||||
keycloak_quarkus_db_enabled:
|
keycloak_quarkus_db_enabled:
|
||||||
# line 38 of defaults/main.yml
|
# line 38 of defaults/main.yml
|
||||||
default: "{{ True if keycloak_quarkus_ha_enabled else False }}"
|
default: "{{ True if keycloak_quarkus_ha_enabled else False }}"
|
||||||
|
|
|
@ -30,6 +30,7 @@
|
||||||
mode: 0644
|
mode: 0644
|
||||||
become: true
|
become: true
|
||||||
notify:
|
notify:
|
||||||
|
- rebuild keycloak config
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
- name: "Configure quarkus config for keycloak service"
|
- name: "Configure quarkus config for keycloak service"
|
||||||
|
@ -43,6 +44,32 @@
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
|
- name: Create tcpping cluster node list
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
keycloak_quarkus_cluster_nodes: >
|
||||||
|
{{ keycloak_quarkus_cluster_nodes | default([]) + [
|
||||||
|
{
|
||||||
|
"name": item,
|
||||||
|
"address": 'jgroups-' + item,
|
||||||
|
"inventory_host": hostvars[item].ansible_default_ipv4.address | default(item) + '[' + (keycloak_quarkus_jgroups_port | string) + ']',
|
||||||
|
"value": hostvars[item].ansible_default_ipv4.address | default(item)
|
||||||
|
}
|
||||||
|
] }}
|
||||||
|
loop: "{{ ansible_play_batch }}"
|
||||||
|
when: keycloak_quarkus_ha_enabled and keycloak_quarkus_ha_discovery == 'TCPPING'
|
||||||
|
|
||||||
|
- name: "Configure infinispan config for keycloak service"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: cache-ispn.xml
|
||||||
|
dest: "{{ keycloak.home }}/conf/cache-ispn.xml"
|
||||||
|
owner: "{{ keycloak.service_user }}"
|
||||||
|
group: "{{ keycloak.service_group }}"
|
||||||
|
mode: 0644
|
||||||
|
become: true
|
||||||
|
notify:
|
||||||
|
- rebuild keycloak config
|
||||||
|
- restart keycloak
|
||||||
|
|
||||||
- name: Ensure logdirectory exists
|
- name: Ensure logdirectory exists
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
state: directory
|
state: directory
|
||||||
|
|
7
roles/keycloak_quarkus/tasks/rebuild_config.yml
Normal file
7
roles/keycloak_quarkus/tasks/rebuild_config.yml
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
---
|
||||||
|
# cf. https://www.keycloak.org/server/configuration#_optimize_the_keycloak_startup
|
||||||
|
- name: "Rebuild {{ keycloak.service_name }} config"
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
{{ keycloak.home }}/bin/kc.sh build
|
||||||
|
become: true
|
||||||
|
changed_when: true
|
101
roles/keycloak_quarkus/templates/cache-ispn.xml
Normal file
101
roles/keycloak_quarkus/templates/cache-ispn.xml
Normal file
|
@ -0,0 +1,101 @@
|
||||||
|
<!-- {{ ansible_managed }} -->
|
||||||
|
<!--
|
||||||
|
~ Copyright 2019 Red Hat, Inc. and/or its affiliates
|
||||||
|
~ and other contributors as indicated by the @author tags.
|
||||||
|
~
|
||||||
|
~ Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
~ you may not use this file except in compliance with the License.
|
||||||
|
~ You may obtain a copy of the License at
|
||||||
|
~
|
||||||
|
~ http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
~
|
||||||
|
~ Unless required by applicable law or agreed to in writing, software
|
||||||
|
~ distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
~ See the License for the specific language governing permissions and
|
||||||
|
~ limitations under the License.
|
||||||
|
-->
|
||||||
|
|
||||||
|
<infinispan
|
||||||
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
|
xsi:schemaLocation="urn:infinispan:config:14.0 http://www.infinispan.org/schemas/infinispan-config-14.0.xsd"
|
||||||
|
xmlns="urn:infinispan:config:14.0">
|
||||||
|
|
||||||
|
{% set stack_expression='' %}
|
||||||
|
{% if keycloak_quarkus_ha_enabled and keycloak_quarkus_ha_discovery == 'TCPPING' %}
|
||||||
|
{% set stack_expression='stack="tcpping"' %}
|
||||||
|
<jgroups>
|
||||||
|
<stack name="tcpping" extends="tcp">
|
||||||
|
<!-- <TCP external_addr="${env.KC_EXTERNAL_ADDR}" bind_addr="{{ keycloak_quarkus_bind_address }}" bind_port="{{ keycloak_quarkus_jgroups_port }}" /> -->
|
||||||
|
<TCPPING
|
||||||
|
initial_hosts="{{ keycloak_quarkus_cluster_nodes | map(attribute='inventory_host') | join (',') }}"
|
||||||
|
port_range="0"
|
||||||
|
stack.combine="REPLACE"
|
||||||
|
stack.position="MPING"
|
||||||
|
/>
|
||||||
|
</stack>
|
||||||
|
</jgroups>
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
<cache-container name="keycloak">
|
||||||
|
<transport lock-timeout="60000" {{ stack_expression }}/>
|
||||||
|
<local-cache name="realms" simple-cache="true">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<memory max-count="10000"/>
|
||||||
|
</local-cache>
|
||||||
|
<local-cache name="users" simple-cache="true">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<memory max-count="10000"/>
|
||||||
|
</local-cache>
|
||||||
|
<distributed-cache name="sessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="authenticationSessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="offlineSessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="clientSessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="offlineClientSessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="loginFailures" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<local-cache name="authorization" simple-cache="true">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<memory max-count="10000"/>
|
||||||
|
</local-cache>
|
||||||
|
<replicated-cache name="work">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</replicated-cache>
|
||||||
|
<local-cache name="keys" simple-cache="true">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<expiration max-idle="3600000"/>
|
||||||
|
<memory max-count="1000"/>
|
||||||
|
</local-cache>
|
||||||
|
<distributed-cache name="actionTokens" owners="2">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<expiration max-idle="-1" lifespan="-1" interval="300000"/>
|
||||||
|
<memory max-count="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
</cache-container>
|
||||||
|
</infinispan>
|
|
@ -48,7 +48,9 @@ hostname-strict-backchannel={{ keycloak_quarkus_hostname_strict_backchannel | lo
|
||||||
{% if keycloak_quarkus_ha_enabled %}
|
{% if keycloak_quarkus_ha_enabled %}
|
||||||
cache=ispn
|
cache=ispn
|
||||||
cache-config-file=cache-ispn.xml
|
cache-config-file=cache-ispn.xml
|
||||||
cache-stack=tcp
|
{% if keycloak_quarkus_ha_enabled and keycloak_quarkus_ha_discovery == 'TCPPING' %}
|
||||||
|
# cache-stack=tcp # configured directly in `cache-ispn.xml`
|
||||||
|
{% endif %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if keycloak_quarkus_proxy_mode is defined and keycloak_quarkus_proxy_mode != "none" %}
|
{% if keycloak_quarkus_proxy_mode is defined and keycloak_quarkus_proxy_mode != "none" %}
|
||||||
|
|
|
@ -10,7 +10,7 @@ PIDFile={{ keycloak_quarkus_service_pidfile }}
|
||||||
{% if keycloak_quarkus_start_dev %}
|
{% if keycloak_quarkus_start_dev %}
|
||||||
ExecStart={{ keycloak.home }}/bin/kc.sh start-dev
|
ExecStart={{ keycloak.home }}/bin/kc.sh start-dev
|
||||||
{% else %}
|
{% else %}
|
||||||
ExecStart={{ keycloak.home }}/bin/kc.sh start --log={{ keycloak_quarkus_log }}
|
ExecStart={{ keycloak.home }}/bin/kc.sh start --optimized
|
||||||
{% endif %}
|
{% endif %}
|
||||||
User={{ keycloak.service_user }}
|
User={{ keycloak.service_user }}
|
||||||
Group={{ keycloak.service_group }}
|
Group={{ keycloak.service_group }}
|
||||||
|
|
Loading…
Add table
Reference in a new issue