mirror of
https://github.com/ansible-middleware/keycloak.git
synced 2025-04-17 00:11:24 -07:00
Compare commits
473 commits
Author | SHA1 | Date | |
---|---|---|---|
|
20797e4cad | ||
|
70d61ce8de | ||
|
69a947c0b6 | ||
|
c7ce7be6c4 | ||
|
e9061b29ef | ||
|
c92bf19720 | ||
|
1ca0b30a81 | ||
|
7738e0feb1 | ||
|
671cf4eb53 | ||
|
f146eb5fda | ||
|
a10bc95bfc | ||
|
314e2f26b2 | ||
|
f628b84fb0 | ||
|
ac0ceca35f | ||
|
744766fe3b | ||
|
7f980c44d2 | ||
|
532dc12a60 | ||
|
173a85638f | ||
|
81f019f8b5 | ||
|
5db96afa56 | ||
|
fa36721207 | ||
|
86284b12c2 | ||
|
b3e93dd89b | ||
|
e029e1c2fd | ||
|
d0f19b59dc | ||
|
213449ec58 | ||
|
277e1336ee | ||
|
58233549a7 | ||
|
0c58ae48ff | ||
|
bf0bd9e1da | ||
|
5d15d37890 | ||
|
910a2aa5d4 | ||
|
5f534ca566 | ||
|
692fb59797 | ||
|
d1859aaff2 | ||
|
0d0e52f9ff | ||
|
68a0f88423 | ||
|
333d55ad73 | ||
|
f6fdae4aa8 | ||
|
b8c11f3ca8 | ||
|
1279937bb0 | ||
|
c57753f608 | ||
|
be19ec1289 | ||
|
5f1b43f37b | ||
|
c6bb815979 | ||
|
ac4511bea9 | ||
|
c8021f3102 | ||
|
0386254073 | ||
|
b2edea8777 | ||
|
fc0ee5a896 | ||
|
eb66d4a412 | ||
|
f170257205 | ||
|
3f4617c32c | ||
|
34caf6a490 | ||
|
fa6ac99b34 | ||
|
a35c963a65 | ||
|
11aab0f5e2 | ||
|
fa2319d5da | ||
|
7c520dcdd2 | ||
|
35b3b090f6 | ||
|
94f1b8b355 | ||
|
e40f554936 | ||
|
64e2a95685 | ||
|
c6fac7bb70 | ||
|
5f059e8d63 | ||
|
e927ddbb6c | ||
|
a82bdfbbb6 | ||
|
c850484e67 | ||
|
a4deaa005a | ||
|
4fb44091d6 | ||
|
883127d280 | ||
|
e69e5b7ba4 | ||
|
bf1871182b | ||
|
adfee5f6e1 | ||
|
ef53ca545a | ||
|
2092c2d23a | ||
|
8ca73364e9 | ||
|
df1939e387 | ||
|
0de0b654ee | ||
|
62cbaa3596 | ||
|
92c24e49e7 | ||
|
cc012767a4 | ||
|
4d31117c16 | ||
|
0fd8eb52d2 | ||
|
6f2ed4d53b | ||
|
1519d46f0e | ||
|
4b21569f36 | ||
|
f63b20b9d4 | ||
|
fdcf1b2ed2 | ||
|
c22389c86f | ||
|
2d573c2b62 | ||
|
1e9a669dea | ||
|
db831fa339 | ||
|
d57be1f188 | ||
|
5adb28dcd8 | ||
|
477ce5eaa3 | ||
|
d2ece93c12 | ||
|
1a23350a8f | ||
|
26316ddc50 | ||
|
6d01ffbb77 | ||
|
d87c8ca8ac | ||
|
d8e9620a8a | ||
|
4b902adc8d | ||
|
1b69191a6e | ||
|
6682853a2d | ||
|
9f4623b05a | ||
|
599ce0179c | ||
|
8f14be37d7 | ||
|
3076c3d5ce | ||
|
6610a310ff | ||
|
fcf629d05e | ||
|
4bbc8e0256 | ||
|
4c96cbe7f6 | ||
|
22f5ad902f | ||
|
3c22417674 | ||
|
cd36eacb07 | ||
|
a019823871 | ||
|
3863508df5 | ||
|
1115ee409a | ||
|
b497e946cc | ||
|
5067c03201 | ||
|
a45b18dc85 | ||
|
70834ccf13 | ||
|
2a7395c444 | ||
|
4da0e83ae9 | ||
|
b427cb8a24 | ||
|
fa39e9b824 | ||
|
320a5f0d9a | ||
|
7141e1c9b2 | ||
|
9bc1ae69e9 | ||
|
bfbbacc72b | ||
|
feec4d9f8b | ||
|
ba127153ff | ||
|
b14d75dfab | ||
|
1d6a6eb7ee | ||
|
1ab3ebc2a4 | ||
|
d16c23faf9 | ||
|
978494524f | ||
|
1a73c39a91 | ||
|
9e6a6f6076 | ||
|
55f6881b2f | ||
|
41cbcc41e8 | ||
|
c2904bf20d | ||
|
e76b33e1db | ||
|
a7b9f0ef97 | ||
|
eafc4586d6 | ||
|
8493adc5c8 | ||
|
43b9ffcb64 | ||
|
a33393a477 | ||
|
278a70d627 | ||
|
6967385c7f | ||
|
ac23e04d6a | ||
|
4c056d886e | ||
|
213a9a0766 | ||
|
2925ea8cf1 | ||
|
82498ab3f5 | ||
|
16accd5e30 | ||
|
04bb465992 | ||
|
b978e8bb88 | ||
|
289b4767e0 | ||
|
9a961f743b | ||
|
b8cba487ac | ||
|
ff198bcd3e | ||
|
d06dcea998 | ||
|
89db3fa36f | ||
|
cd8d61afc3 | ||
|
47e6644fdd | ||
|
3e28b3f4f7 | ||
|
f7bcac79d0 | ||
|
10057262bc | ||
|
5808d055ae | ||
|
8060dd7fb8 | ||
|
4f8ed5194c | ||
|
462389cf0f | ||
|
903938ca16 | ||
|
74636e8629 | ||
|
6706fd9bf5 | ||
|
e991bd32c8 | ||
|
d469d389f3 | ||
|
c38642e0cd | ||
|
0ee29eb483 | ||
|
60ca798e1a | ||
|
921364b451 | ||
|
50d189ee14 | ||
|
5b459f3dde | ||
|
f0318b2ecf | ||
|
1f910bd400 | ||
|
d17c364257 | ||
|
1ff6f237a9 | ||
|
0c0c4e19ea | ||
|
7bedb08f6e | ||
|
5464a01a62 | ||
|
2cf3e2470d | ||
|
ad6021c29a | ||
|
05ebd90121 | ||
|
1229a0b023 | ||
|
4ba9014edb | ||
|
ea57f8b689 | ||
|
3fbae4882e | ||
|
27717d7b4e | ||
|
4aa862101c | ||
|
8e2f3eb77f | ||
|
10d4cb8db7 | ||
|
8f8de33350 | ||
|
7dceb7f819 | ||
|
c2e456e1d5 | ||
|
4421375dd5 | ||
|
2bbf7d9cc4 | ||
|
467cfda0f7 | ||
|
e17505fe42 | ||
|
0e4df659f4 | ||
|
3400b64b10 | ||
|
3b1534d700 | ||
|
dd6171f024 | ||
|
c1da6ea38d | ||
|
56e4a43cf9 | ||
|
7a0a99a31c | ||
|
fdce0bd922 | ||
|
b9d9874a00 | ||
|
1cecf51f37 | ||
|
0cea03dfc0 | ||
|
0c079740e1 | ||
|
96804d8086 | ||
|
a875166fe0 | ||
|
a97c349f41 | ||
|
a59a1fb8dd | ||
|
d74820190f | ||
|
6541b5e386 | ||
|
1e1665adb0 | ||
|
33a839fec6 | ||
|
d97ddbde3c | ||
|
7f021a849e | ||
|
167bf512c5 | ||
|
beee25dec2 | ||
|
5bd39a0d0e | ||
|
7324f48e8d | ||
|
b3ca517583 | ||
|
b1848046dc | ||
|
983a1fb8f2 | ||
|
d4fb20b230 | ||
|
f7bef0a956 | ||
|
f62a97709a | ||
|
9593752e62 | ||
|
d6c29ed4fc | ||
|
df81dc5497 | ||
|
4adab64dc0 | ||
|
e0d4920a49 | ||
|
c2009a0a12 | ||
|
0c5047bcc1 | ||
|
63f83d7744 | ||
|
64fa8bb788 | ||
|
688ec956fc | ||
|
e866d1f4e4 | ||
|
2985f808ea | ||
|
30309582f3 | ||
|
40229631e6 | ||
|
8adc018cb3 | ||
|
053d0f9873 | ||
|
eb80ed0bd4 | ||
|
d138b4b2ff | ||
|
922e4c10f5 | ||
|
313bd8452a | ||
|
b1b31427d5 | ||
|
b057f0297a | ||
|
bfd9db6703 | ||
|
1d5ce87c16 | ||
|
83bcb6712a | ||
|
dab388d744 | ||
|
ed6dbd60fb | ||
|
db19fd5d19 | ||
|
473fb212c3 | ||
|
98b82ccb4f | ||
|
0fbf454279 | ||
|
d469d5df8b | ||
|
a23bf4c540 | ||
|
ac0b421456 | ||
|
5b8fcb67dc | ||
|
acdee7fa63 | ||
|
86576de6e8 | ||
|
89944a6cd1 | ||
|
33e6d428b5 | ||
|
f365351abf | ||
|
75899dfa77 | ||
|
593c4df861 | ||
|
4a72e3818c | ||
|
72ca9f5dfa | ||
|
842e61c43e | ||
|
1728b20cd3 | ||
|
c01ffed113 | ||
|
fea7ae0c6f | ||
|
94530640c1 | ||
|
d6f020ab44 | ||
|
55c02d7fc5 | ||
|
5e8e8c67e8 | ||
|
88935abb62 | ||
|
3a1d9099a7 | ||
|
a439ccab5e | ||
|
e086ee8d29 | ||
|
2841c7a951 | ||
|
d947e85745 | ||
|
143084d726 | ||
|
23bda1b4c5 | ||
|
efc3e547fe | ||
|
8af5d6e556 | ||
|
a0f6a4931f | ||
|
49c5071733 | ||
|
7a1eeec6b6 | ||
|
69bd5b6ca8 | ||
|
cee02cfd36 | ||
|
ea086e8a62 | ||
|
24787e4607 | ||
|
0e510c093a | ||
|
880d70ffb9 | ||
|
c8f968a587 | ||
|
8eb5185287 | ||
|
316cde4759 | ||
|
92639e40cb | ||
|
027ac1a78e | ||
|
5543217c6a | ||
|
61730b981b | ||
|
03175e283b | ||
|
62e5380d38 | ||
|
a538828f0d | ||
|
12147b4769 | ||
|
cad87557d6 | ||
|
363c5d9f9e | ||
|
19a2013fa8 | ||
|
b819c98ab3 | ||
|
9ddd6d7d5e | ||
|
6f26fa3da4 | ||
|
6970236201 | ||
|
e5f0a3efe1 | ||
|
41c1306602 | ||
|
c67b301f97 | ||
|
d945c51172 | ||
|
d6c57a17a8 | ||
|
bf1cb3695e | ||
|
307eee771f | ||
|
e842462a22 | ||
|
0f7bbc7ef9 | ||
|
00e6cb6b0e | ||
|
dded412bd0 | ||
|
5b70d3db2a | ||
|
e3ce4bd574 | ||
|
af0dc3c5f1 | ||
|
f3104285bc | ||
|
cb25c28bb8 | ||
|
3bb32ed075 | ||
|
80e4df8dce | ||
|
194101f010 | ||
|
f0f90b8930 | ||
|
38ff519624 | ||
|
9c361c9628 | ||
|
9a46b455f6 | ||
|
aa7902b9c3 | ||
|
0f17e09731 | ||
|
942b5fce0f | ||
|
bef20b6a57 | ||
|
d673fcf48a | ||
|
b72460e464 | ||
|
6c65fadf31 | ||
|
d12f62b89d | ||
|
7bb9647d0d | ||
|
0199e554b5 | ||
|
276444ce0e | ||
|
40c015d3e1 | ||
|
df7fab8f41 | ||
|
6330f08b28 | ||
|
5c8d7d9554 | ||
|
2513ac2c43 | ||
|
6e6bf2ff71 | ||
|
11621516e3 | ||
|
7c05ee5239 | ||
|
5251826477 | ||
|
0783000849 | ||
|
ca2dbe78c2 | ||
|
52d9286ea3 | ||
|
c8ebbe72d2 | ||
|
91ec411699 | ||
|
07b1c514bb | ||
|
345c50fb85 | ||
|
db0aafd465 | ||
|
b950cdb8b4 | ||
|
5b01123846 | ||
|
84d6e7baca | ||
|
ea735ea79e | ||
|
9db1cbd564 | ||
|
7933592725 | ||
|
3170af8b2b | ||
|
f400a5bbf8 | ||
|
5385fbb8e9 | ||
|
7fea211639 | ||
|
8738240a24 | ||
|
f195d164d1 | ||
|
7c4d420fea | ||
|
d45071bf58 | ||
|
10876ba615 | ||
|
f3815403c8 | ||
|
18d686b43a | ||
|
26a9249d07 | ||
|
fae3079751 | ||
|
a82e654cc4 | ||
|
cebec9c717 | ||
|
ad59cd8cb3 | ||
|
926353f395 | ||
|
fed86ac0c3 | ||
|
5f1f8b5762 | ||
|
bab3069712 | ||
|
fc6e00974d | ||
|
83525dbed0 | ||
|
7ec695ee15 | ||
|
14e7b402b7 | ||
|
832432b86c | ||
|
8f697f6a53 | ||
|
1dd579a6d1 | ||
|
3340428194 | ||
|
18e60daa93 | ||
|
874215a592 | ||
|
97bea7ba39 | ||
|
e99a0db174 | ||
|
3b03c54fed | ||
|
ced4ce7828 | ||
|
6986190159 | ||
|
db480d0bc9 | ||
|
bc4cb5c52a | ||
|
8f042d3e29 | ||
|
24eaacc1ac | ||
|
623db426e0 | ||
|
b77c166945 | ||
|
b7eef6a720 | ||
|
203e6c06ac | ||
|
aaae1d1129 | ||
|
cca20a067d | ||
|
2be35f9a67 | ||
|
19f1750a33 | ||
|
c3d8bbc94e | ||
|
c4b4be3c3b | ||
|
98e1633c43 | ||
|
fd375a141d | ||
|
0cf7b3ac49 | ||
|
370d424b24 | ||
|
01fd2cc4fd | ||
|
7471e07921 | ||
|
e8e0f6718b | ||
|
e4811221be | ||
|
6cb4aac556 | ||
|
aad373a8e9 | ||
|
fd0a4e4492 | ||
|
706677910b | ||
|
a3bffe9401 | ||
|
f566917bc2 | ||
|
44ad3b8e6d | ||
|
1a450ea1d7 | ||
|
b0a01a8e46 | ||
|
020bc86955 | ||
|
d72d46c945 | ||
|
c7d2bdcee3 | ||
|
43d978370d | ||
|
3d37def38d | ||
|
8d16e241c1 | ||
|
6ac0c18842 | ||
|
6334daf244 | ||
|
87ad97d57f | ||
|
242b1cea0a | ||
|
c0b72b6890 | ||
|
1cfa229a5f | ||
|
f013a99832 | ||
|
6bfe046f5e | ||
|
526f64e5eb | ||
|
a2c17f545e | ||
|
40c29d07b8 | ||
|
91a18bf571 | ||
|
ecb6cbb9bf |
156 changed files with 8616 additions and 1629 deletions
|
@ -21,19 +21,23 @@ warn_list:
|
||||||
- experimental
|
- experimental
|
||||||
- ignore-errors
|
- ignore-errors
|
||||||
- no-handler
|
- no-handler
|
||||||
- fqcn-builtins
|
|
||||||
- no-log-password
|
- no-log-password
|
||||||
- jinja[spacing]
|
- jinja[spacing]
|
||||||
- jinja[invalid]
|
- jinja[invalid]
|
||||||
- meta-no-tags
|
- meta-no-tags
|
||||||
- name[template]
|
|
||||||
- name[casing]
|
- name[casing]
|
||||||
- fqcn[action]
|
- fqcn[action]
|
||||||
- schema[meta]
|
- schema[meta]
|
||||||
|
- key-order[task]
|
||||||
|
- blocked_modules
|
||||||
|
- run-once[task]
|
||||||
|
|
||||||
skip_list:
|
skip_list:
|
||||||
- vars_should_not_be_used
|
- vars_should_not_be_used
|
||||||
- file_is_small_enough
|
- file_is_small_enough
|
||||||
|
- file_has_valid_name
|
||||||
|
- name[template]
|
||||||
|
- var-naming[no-role-prefix]
|
||||||
|
|
||||||
use_default_rules: true
|
use_default_rules: true
|
||||||
parseable: true
|
parseable: true
|
||||||
|
|
54
.github/workflows/ci.yml
vendored
54
.github/workflows/ci.yml
vendored
|
@ -5,53 +5,15 @@ on:
|
||||||
branches:
|
branches:
|
||||||
- main
|
- main
|
||||||
pull_request:
|
pull_request:
|
||||||
|
workflow_dispatch:
|
||||||
env:
|
schedule:
|
||||||
COLORTERM: 'yes'
|
- cron: '15 6 * * *'
|
||||||
TERM: 'xterm-256color'
|
|
||||||
PYTEST_ADDOPTS: '--color=yes'
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
ci:
|
ci:
|
||||||
runs-on: ubuntu-latest
|
uses: ansible-middleware/github-actions/.github/workflows/ci.yml@main
|
||||||
strategy:
|
secrets: inherit
|
||||||
matrix:
|
|
||||||
python_version: ["3.9"]
|
|
||||||
steps:
|
|
||||||
- name: Check out code
|
|
||||||
uses: actions/checkout@v2
|
|
||||||
with:
|
with:
|
||||||
path: ansible_collections/middleware_automation/keycloak
|
fqcn: 'middleware_automation/keycloak'
|
||||||
|
molecule_tests: >-
|
||||||
- name: Set up Python ${{ matrix.python_version }}
|
[ "default", "overridexml", "https_revproxy", "quarkus", "quarkus-devmode", "quarkus_upgrade", "debian", "quarkus_ha" ]
|
||||||
uses: actions/setup-python@v1
|
|
||||||
with:
|
|
||||||
python-version: ${{ matrix.python_version }}
|
|
||||||
|
|
||||||
- name: Install yamllint, ansible and molecule
|
|
||||||
run: |
|
|
||||||
python -m pip install --upgrade pip
|
|
||||||
pip install yamllint 'molecule[docker]~=3.5.2' ansible-core flake8 ansible-lint voluptuous
|
|
||||||
pip install -r ansible_collections/middleware_automation/keycloak/requirements.txt
|
|
||||||
|
|
||||||
- name: Create default collection path
|
|
||||||
run: |
|
|
||||||
mkdir -p /home/runner/.ansible/
|
|
||||||
ln -s /home/runner/work/keycloak/keycloak /home/runner/.ansible/collections
|
|
||||||
|
|
||||||
- name: Install ansible-lint custom rules
|
|
||||||
uses: actions/checkout@v2
|
|
||||||
with:
|
|
||||||
repository: ansible-middleware/ansible-lint-custom-rules
|
|
||||||
path: ansible_collections/ansible-lint-custom-rules/
|
|
||||||
|
|
||||||
- name: Run sanity tests
|
|
||||||
run: ansible-test sanity -v --color --python ${{ matrix.python_version }} --exclude changelogs/fragments/.gitignore --skip-test symlinks
|
|
||||||
working-directory: ./ansible_collections/middleware_automation/keycloak
|
|
||||||
|
|
||||||
- name: Run molecule test
|
|
||||||
run: molecule test --all
|
|
||||||
working-directory: ./ansible_collections/middleware_automation/keycloak
|
|
||||||
env:
|
|
||||||
PY_COLORS: '1'
|
|
||||||
ANSIBLE_FORCE_COLOR: '1'
|
|
||||||
|
|
54
.github/workflows/docs.yml
vendored
54
.github/workflows/docs.yml
vendored
|
@ -8,55 +8,11 @@ on:
|
||||||
- "[0-9]+.[0-9]+.[0-9]+"
|
- "[0-9]+.[0-9]+.[0-9]+"
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
|
|
||||||
env:
|
|
||||||
COLORTERM: 'yes'
|
|
||||||
TERM: 'xterm-256color'
|
|
||||||
PYTEST_ADDOPTS: '--color=yes'
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
docs:
|
docs:
|
||||||
runs-on: ubuntu-latest
|
uses: ansible-middleware/github-actions/.github/workflows/docs.yml@main
|
||||||
if: github.repository == 'ansible-middleware/keycloak'
|
secrets: inherit
|
||||||
permissions:
|
|
||||||
actions: write
|
|
||||||
checks: write
|
|
||||||
contents: write
|
|
||||||
deployments: write
|
|
||||||
packages: write
|
|
||||||
pages: write
|
|
||||||
steps:
|
|
||||||
- name: Check out code
|
|
||||||
uses: actions/checkout@v2
|
|
||||||
with:
|
with:
|
||||||
path: ansible_collections/middleware_automation/keycloak
|
fqcn: 'middleware_automation/keycloak'
|
||||||
fetch-depth: 0
|
collection_fqcn: 'middleware_automation.keycloak'
|
||||||
|
historical_docs: 'false'
|
||||||
- name: Set up Python
|
|
||||||
uses: actions/setup-python@v2
|
|
||||||
with:
|
|
||||||
python-version: 3.9
|
|
||||||
|
|
||||||
- name: Install doc dependencies
|
|
||||||
run: |
|
|
||||||
python -m pip install --upgrade pip
|
|
||||||
pip install -r ansible_collections/middleware_automation/keycloak/docs/requirements.txt
|
|
||||||
pip install -r ansible_collections/middleware_automation/keycloak/requirements.txt
|
|
||||||
sudo apt install -y sed hub
|
|
||||||
|
|
||||||
- name: Create default collection path
|
|
||||||
run: |
|
|
||||||
mkdir -p /home/runner/.ansible/
|
|
||||||
ln -s /home/runner/work/keycloak/keycloak /home/runner/.ansible/collections
|
|
||||||
|
|
||||||
- name: Create changelog and documentation
|
|
||||||
uses: ansible-middleware/collection-docs-action@main
|
|
||||||
with:
|
|
||||||
collection_fqcn: middleware_automation.keycloak
|
|
||||||
collection_repo: ansible-middleware/keycloak
|
|
||||||
dependencies: false
|
|
||||||
commit_changelog: false
|
|
||||||
commit_ghpages: true
|
|
||||||
changelog_release: false
|
|
||||||
generate_docs: true
|
|
||||||
path: ansible_collections/middleware_automation/keycloak
|
|
||||||
token: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
|
|
93
.github/workflows/release.yml
vendored
93
.github/workflows/release.yml
vendored
|
@ -2,96 +2,27 @@
|
||||||
name: Release collection
|
name: Release collection
|
||||||
on:
|
on:
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
|
inputs:
|
||||||
|
release_summary:
|
||||||
|
description: 'Optional release summary for changelogs'
|
||||||
|
required: false
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
release:
|
release:
|
||||||
runs-on: ubuntu-latest
|
uses: ansible-middleware/github-actions/.github/workflows/release.yml@main
|
||||||
if: github.repository == 'ansible-middleware/keycloak'
|
|
||||||
permissions:
|
|
||||||
actions: write
|
|
||||||
checks: write
|
|
||||||
contents: write
|
|
||||||
deployments: write
|
|
||||||
packages: write
|
|
||||||
pages: write
|
|
||||||
outputs:
|
|
||||||
tag_version: ${{ steps.get_version.outputs.TAG_VERSION }}
|
|
||||||
steps:
|
|
||||||
- name: Checkout code
|
|
||||||
uses: actions/checkout@v3
|
|
||||||
with:
|
with:
|
||||||
fetch-depth: 0
|
collection_fqcn: 'middleware_automation.keycloak'
|
||||||
token: ${{ secrets.TRIGGERING_PAT }}
|
downstream_name: 'rhbk'
|
||||||
|
release_summary: "${{ github.event.inputs.release_summary }}"
|
||||||
- name: Set up Python
|
secrets:
|
||||||
uses: actions/setup-python@v1
|
galaxy_token: ${{ secrets.ANSIBLE_GALAXY_API_KEY }}
|
||||||
with:
|
jira_webhook: ${{ secrets.JIRA_WEBHOOK_CREATE_VERSION }}
|
||||||
python-version: "3.x"
|
|
||||||
|
|
||||||
- name: Get current version
|
|
||||||
id: get_version
|
|
||||||
run: echo "::set-output name=TAG_VERSION::$(grep version galaxy.yml | awk -F'"' '{ print $2 }')"
|
|
||||||
|
|
||||||
- name: Check if tag exists
|
|
||||||
id: check_tag
|
|
||||||
run: echo "::set-output name=TAG_EXISTS::$(git tag | grep ${{ steps.get_version.outputs.TAG_VERSION }})"
|
|
||||||
|
|
||||||
- name: Fail if tag exists
|
|
||||||
if: ${{ steps.get_version.outputs.TAG_VERSION == steps.check_tag.outputs.TAG_EXISTS }}
|
|
||||||
uses: actions/github-script@v3
|
|
||||||
with:
|
|
||||||
script: |
|
|
||||||
core.setFailed('Release tag already exists')
|
|
||||||
|
|
||||||
- name: Install dependencies
|
|
||||||
run: |
|
|
||||||
python -m pip install --upgrade pip
|
|
||||||
pip install ansible-core antsibull
|
|
||||||
sudo apt install -y sed hub
|
|
||||||
|
|
||||||
- name: Build collection
|
|
||||||
run: |
|
|
||||||
ansible-galaxy collection build .
|
|
||||||
|
|
||||||
- name: Create changelog and documentation
|
|
||||||
uses: ansible-middleware/collection-docs-action@main
|
|
||||||
with:
|
|
||||||
collection_fqcn: middleware_automation.keycloak
|
|
||||||
collection_repo: ansible-middleware/keycloak
|
|
||||||
dependencies: false
|
|
||||||
commit_changelog: true
|
|
||||||
commit_ghpages: false
|
|
||||||
changelog_release: true
|
|
||||||
generate_docs: false
|
|
||||||
token: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
|
|
||||||
- name: Publish collection
|
|
||||||
env:
|
|
||||||
ANSIBLE_GALAXY_API_KEY: ${{ secrets.ANSIBLE_GALAXY_API_KEY }}
|
|
||||||
run: |
|
|
||||||
ansible-galaxy collection publish *.tar.gz --api-key $ANSIBLE_GALAXY_API_KEY
|
|
||||||
|
|
||||||
- name: Create release tag
|
|
||||||
run: |
|
|
||||||
git config user.name github-actions
|
|
||||||
git config user.email github-actions@github.com
|
|
||||||
git tag -a ${{ steps.get_version.outputs.TAG_VERSION }} -m "Release v${{ steps.get_version.outputs.TAG_VERSION }}" || true
|
|
||||||
git push origin --tags
|
|
||||||
|
|
||||||
- name: Publish Release
|
|
||||||
uses: softprops/action-gh-release@v1
|
|
||||||
env:
|
|
||||||
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
|
||||||
with:
|
|
||||||
tag_name: ${{ steps.get_version.outputs.TAG_VERSION }}
|
|
||||||
files: "*.tar.gz"
|
|
||||||
body_path: gh-release.md
|
|
||||||
|
|
||||||
dispatch:
|
dispatch:
|
||||||
needs: release
|
needs: release
|
||||||
strategy:
|
strategy:
|
||||||
matrix:
|
matrix:
|
||||||
repo: ['ansible-middleware/cross-dc-rhsso-demo', 'ansible-middleware/flange-demo', 'ansible-middleware/ansible-middleware-ee']
|
repo: ['ansible-middleware/ansible-middleware-ee']
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
steps:
|
steps:
|
||||||
- name: Repository Dispatch
|
- name: Repository Dispatch
|
||||||
|
|
26
.github/workflows/traffic.yml
vendored
Normal file
26
.github/workflows/traffic.yml
vendored
Normal file
|
@ -0,0 +1,26 @@
|
||||||
|
name: Collect traffic stats
|
||||||
|
on:
|
||||||
|
schedule:
|
||||||
|
- cron: "51 23 * * 0"
|
||||||
|
workflow_dispatch:
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
traffic:
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v2
|
||||||
|
with:
|
||||||
|
ref: "gh-pages"
|
||||||
|
|
||||||
|
- name: GitHub traffic
|
||||||
|
uses: sangonzal/repository-traffic-action@v.0.1.6
|
||||||
|
env:
|
||||||
|
TRAFFIC_ACTION_TOKEN: ${{ secrets.TRIGGERING_PAT }}
|
||||||
|
|
||||||
|
- name: Commit changes
|
||||||
|
uses: EndBug/add-and-commit@v4
|
||||||
|
with:
|
||||||
|
author_name: Ansible Middleware
|
||||||
|
message: "GitHub traffic"
|
||||||
|
add: "./traffic/*"
|
||||||
|
ref: "gh-pages"
|
4
.gitignore
vendored
4
.gitignore
vendored
|
@ -2,6 +2,8 @@
|
||||||
*.zip
|
*.zip
|
||||||
.tmp
|
.tmp
|
||||||
.cache
|
.cache
|
||||||
|
.vscode/
|
||||||
|
__pycache__/
|
||||||
docs/plugins/
|
docs/plugins/
|
||||||
docs/roles/
|
docs/roles/
|
||||||
docs/_build/
|
docs/_build/
|
||||||
|
@ -10,3 +12,5 @@ docs/_build/
|
||||||
*.retry
|
*.retry
|
||||||
changelogs/.plugin-cache.yaml
|
changelogs/.plugin-cache.yaml
|
||||||
*.pem
|
*.pem
|
||||||
|
*.key
|
||||||
|
*.p12
|
||||||
|
|
|
@ -15,7 +15,8 @@ rules:
|
||||||
commas:
|
commas:
|
||||||
max-spaces-after: -1
|
max-spaces-after: -1
|
||||||
level: error
|
level: error
|
||||||
comments: disable
|
comments:
|
||||||
|
min-spaces-from-content: 1
|
||||||
comments-indentation: disable
|
comments-indentation: disable
|
||||||
document-start: disable
|
document-start: disable
|
||||||
empty-lines:
|
empty-lines:
|
||||||
|
@ -31,3 +32,7 @@ rules:
|
||||||
type: unix
|
type: unix
|
||||||
trailing-spaces: disable
|
trailing-spaces: disable
|
||||||
truthy: disable
|
truthy: disable
|
||||||
|
octal-values:
|
||||||
|
forbid-implicit-octal: true
|
||||||
|
forbid-explicit-octal: true
|
||||||
|
|
||||||
|
|
316
CHANGELOG.rst
316
CHANGELOG.rst
|
@ -1,11 +1,314 @@
|
||||||
============================================
|
=============================================
|
||||||
middleware_automation.keycloak Release Notes
|
middleware\_automation.keycloak Release Notes
|
||||||
============================================
|
=============================================
|
||||||
|
|
||||||
.. contents:: Topics
|
.. contents:: Topics
|
||||||
|
|
||||||
This changelog describes changes after version 0.2.6.
|
This changelog describes changes after version 0.2.6.
|
||||||
|
|
||||||
|
v2.4.3
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Update keycloak to 24.0.5 `#241 <https://github.com/ansible-middleware/keycloak/pull/241>`_
|
||||||
|
|
||||||
|
v2.4.2
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- New parameter ``keycloak_quarkus_download_path`` `#239 <https://github.com/ansible-middleware/keycloak/pull/239>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- Add wait_for_port number parameter `#237 <https://github.com/ansible-middleware/keycloak/pull/237>`_
|
||||||
|
|
||||||
|
v2.4.1
|
||||||
|
======
|
||||||
|
|
||||||
|
Release Summary
|
||||||
|
---------------
|
||||||
|
|
||||||
|
Internal release, documentation or test changes only.
|
||||||
|
|
||||||
|
v2.4.0
|
||||||
|
======
|
||||||
|
|
||||||
|
Major Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Enable by default health check on restart `#234 <https://github.com/ansible-middleware/keycloak/pull/234>`_
|
||||||
|
- Update minimum ansible-core version > 2.15 `#232 <https://github.com/ansible-middleware/keycloak/pull/232>`_
|
||||||
|
|
||||||
|
v2.3.0
|
||||||
|
======
|
||||||
|
|
||||||
|
Major Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Allow for custom providers hosted on maven repositories `#223 <https://github.com/ansible-middleware/keycloak/pull/223>`_
|
||||||
|
- Restart handler strategy behaviour `#231 <https://github.com/ansible-middleware/keycloak/pull/231>`_
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Add support for policy files `#225 <https://github.com/ansible-middleware/keycloak/pull/225>`_
|
||||||
|
- Allow to add extra custom env vars in sysconfig file `#229 <https://github.com/ansible-middleware/keycloak/pull/229>`_
|
||||||
|
- Download from alternate URL with optional http authentication `#220 <https://github.com/ansible-middleware/keycloak/pull/220>`_
|
||||||
|
- Update Keycloak to version 24.0.4 `#218 <https://github.com/ansible-middleware/keycloak/pull/218>`_
|
||||||
|
- ``proxy-header`` enhancement `#227 <https://github.com/ansible-middleware/keycloak/pull/227>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- ``kc.sh build`` uses configured jdk `#211 <https://github.com/ansible-middleware/keycloak/pull/211>`_
|
||||||
|
|
||||||
|
v2.2.2
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Copying of key material for TLS configuration `#210 <https://github.com/ansible-middleware/keycloak/pull/210>`_
|
||||||
|
- Validate certs parameter for JDBC driver downloads `#207 <https://github.com/ansible-middleware/keycloak/pull/207>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- Turn off controller privilege escalation `#209 <https://github.com/ansible-middleware/keycloak/pull/209>`_
|
||||||
|
|
||||||
|
v2.2.1
|
||||||
|
======
|
||||||
|
|
||||||
|
Release Summary
|
||||||
|
---------------
|
||||||
|
|
||||||
|
Internal release, documentation or test changes only.
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- JDBC provider: fix clause in argument validation `#204 <https://github.com/ansible-middleware/keycloak/pull/204>`_
|
||||||
|
|
||||||
|
v2.2.0
|
||||||
|
======
|
||||||
|
|
||||||
|
Major Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Support java keystore for configuration of sensitive options `#189 <https://github.com/ansible-middleware/keycloak/pull/189>`_
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Add ``wait_for_port`` and ``wait_for_log`` systemd unit logic `#199 <https://github.com/ansible-middleware/keycloak/pull/199>`_
|
||||||
|
- Customize jdbc driver downloads, optional authentication `#202 <https://github.com/ansible-middleware/keycloak/pull/202>`_
|
||||||
|
- Keystore-based vault SPI configuration `#196 <https://github.com/ansible-middleware/keycloak/pull/196>`_
|
||||||
|
- New ``keycloak_quarkus_hostname_strict_https`` parameter `#195 <https://github.com/ansible-middleware/keycloak/pull/195>`_
|
||||||
|
- Providers config and custom providers `#201 <https://github.com/ansible-middleware/keycloak/pull/201>`_
|
||||||
|
- Remove administrator credentials from files once keycloak is bootstrapped `#197 <https://github.com/ansible-middleware/keycloak/pull/197>`_
|
||||||
|
- Update keycloak to 24.0 `#194 <https://github.com/ansible-middleware/keycloak/pull/194>`_
|
||||||
|
|
||||||
|
v2.1.2
|
||||||
|
======
|
||||||
|
|
||||||
|
Release Summary
|
||||||
|
---------------
|
||||||
|
|
||||||
|
Internal release, documentation or test changes only.
|
||||||
|
|
||||||
|
v2.1.1
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Add reverse ``proxy_headers`` config, supersedes ``proxy_mode`` `#187 <https://github.com/ansible-middleware/keycloak/pull/187>`_
|
||||||
|
- Debian/Ubuntu compatibility `#178 <https://github.com/ansible-middleware/keycloak/pull/178>`_
|
||||||
|
- Use ``keycloak_realm`` as default for sub-entities `#180 <https://github.com/ansible-middleware/keycloak/pull/180>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- Fix permissions on controller-side downloaded artifacts `#184 <https://github.com/ansible-middleware/keycloak/pull/184>`_
|
||||||
|
- JVM args moved to ``JAVA_OPTS`` envvar (instead of JAVA_OPTS_APPEND) `#186 <https://github.com/ansible-middleware/keycloak/pull/186>`_
|
||||||
|
- Unrelax configuration file permissions `#191 <https://github.com/ansible-middleware/keycloak/pull/191>`_
|
||||||
|
- Utilize comment filter for ``ansible_managed`` annotations `#176 <https://github.com/ansible-middleware/keycloak/pull/176>`_
|
||||||
|
|
||||||
|
v2.1.0
|
||||||
|
======
|
||||||
|
|
||||||
|
Major Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Implement infinispan TCPPING discovery protocol `#159 <https://github.com/ansible-middleware/keycloak/pull/159>`_
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Set enable-recovery when xa transactions are enabled `#167 <https://github.com/ansible-middleware/keycloak/pull/167>`_
|
||||||
|
- keycloak_quarkus: Allow configuring log rotate options in quarkus configuration `#161 <https://github.com/ansible-middleware/keycloak/pull/161>`_
|
||||||
|
- keycloak_quarkus: ``sticky-session`` for infinispan routes `#163 <https://github.com/ansible-middleware/keycloak/pull/163>`_
|
||||||
|
|
||||||
|
Breaking Changes / Porting Guide
|
||||||
|
--------------------------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: renamed infinispan host list configuration `#157 <https://github.com/ansible-middleware/keycloak/pull/157>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- keycloak_quarkus: fix custom JAVA_HOME parameter name `#171 <https://github.com/ansible-middleware/keycloak/pull/171>`_
|
||||||
|
|
||||||
|
v2.0.2
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: Add support for sqlserver jdbc driver `#148 <https://github.com/ansible-middleware/keycloak/pull/148>`_
|
||||||
|
- keycloak_quarkus: allow configuration of ``hostname-strict-backchannel`` `#152 <https://github.com/ansible-middleware/keycloak/pull/152>`_
|
||||||
|
- keycloak_quarkus: systemd restart behavior `#145 <https://github.com/ansible-middleware/keycloak/pull/145>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- keycloak_quarkus: Use ``keycloak_quarkus_java_opts`` `#154 <https://github.com/ansible-middleware/keycloak/pull/154>`_
|
||||||
|
- keycloak_quarkus: allow ports <1024 (e.g. :443) in systemd unit `#150 <https://github.com/ansible-middleware/keycloak/pull/150>`_
|
||||||
|
|
||||||
|
v2.0.1
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: add hostname-strict parameter `#139 <https://github.com/ansible-middleware/keycloak/pull/139>`_
|
||||||
|
- keycloak_quarkus: update to version 23.0.1 `#133 <https://github.com/ansible-middleware/keycloak/pull/133>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- keycloak_quarkus: template requires lowercase boolean values `#138 <https://github.com/ansible-middleware/keycloak/pull/138>`_
|
||||||
|
|
||||||
|
v2.0.0
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Add new parameter for port offset configuration `#124 <https://github.com/ansible-middleware/keycloak/pull/124>`_
|
||||||
|
- Update Keycloak to version 22.0.5 `#122 <https://github.com/ansible-middleware/keycloak/pull/122>`_
|
||||||
|
|
||||||
|
Breaking Changes / Porting Guide
|
||||||
|
--------------------------------
|
||||||
|
|
||||||
|
- Add support for more http-related configs `#115 <https://github.com/ansible-middleware/keycloak/pull/115>`_
|
||||||
|
- Update minimum ansible-core version > 2.14 `#119 <https://github.com/ansible-middleware/keycloak/pull/119>`_
|
||||||
|
- keycloak_quarkus: enable config of key store and trust store `#116 <https://github.com/ansible-middleware/keycloak/pull/116>`_
|
||||||
|
|
||||||
|
v1.3.0
|
||||||
|
======
|
||||||
|
|
||||||
|
Major Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Run service as ``keycloak_service_user`` `#106 <https://github.com/ansible-middleware/keycloak/pull/106>`_
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: Update Keycloak to version 22.0.3 `#112 <https://github.com/ansible-middleware/keycloak/pull/112>`_
|
||||||
|
- keycloak_quarkus: fix admin console redirect when running locally `#111 <https://github.com/ansible-middleware/keycloak/pull/111>`_
|
||||||
|
- keycloak_quarkus: skip proxy config if ``keycloak_quarkus_proxy_mode`` is ``none`` `#109 <https://github.com/ansible-middleware/keycloak/pull/109>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- keycloak_quarkus: fix validation failure upon port configuration change `#113 <https://github.com/ansible-middleware/keycloak/pull/113>`_
|
||||||
|
|
||||||
|
v1.2.8
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: set openjdk 17 as default `#103 <https://github.com/ansible-middleware/keycloak/pull/103>`_
|
||||||
|
- keycloak_quarkus: update to version 22.0.1 `#107 <https://github.com/ansible-middleware/keycloak/pull/107>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- Fix incorrect checks for ``keycloak_jgroups_subnet`` `#98 <https://github.com/ansible-middleware/keycloak/pull/98>`_
|
||||||
|
- Undefine ``keycloak_db_valid_conn_sql`` default `#91 <https://github.com/ansible-middleware/keycloak/pull/91>`_
|
||||||
|
- Update bindep.txt package python3-devel to support RHEL9 `#105 <https://github.com/ansible-middleware/keycloak/pull/105>`_
|
||||||
|
|
||||||
|
v1.2.7
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Allow to override jgroups subnet `#93 <https://github.com/ansible-middleware/keycloak/pull/93>`_
|
||||||
|
- keycloak-quarkus: update keycloakx to v21.1.1 `#92 <https://github.com/ansible-middleware/keycloak/pull/92>`_
|
||||||
|
|
||||||
|
v1.2.6
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Add profile features enabling/disabling `#87 <https://github.com/ansible-middleware/keycloak/pull/87>`_
|
||||||
|
- Improve service restart behavior configuration `#88 <https://github.com/ansible-middleware/keycloak/pull/88>`_
|
||||||
|
- Update default xa_datasource_class value for mariadb jdbc configuration `#89 <https://github.com/ansible-middleware/keycloak/pull/89>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- Handle WFLYCTL0117 when background validation millis is 0 `#90 <https://github.com/ansible-middleware/keycloak/pull/90>`_
|
||||||
|
|
||||||
|
v1.2.5
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Add configuration for database connection pool validation `#85 <https://github.com/ansible-middleware/keycloak/pull/85>`_
|
||||||
|
- Allow to configure administration endpoint URL `#86 <https://github.com/ansible-middleware/keycloak/pull/86>`_
|
||||||
|
- Allow to force backend URLs to frontend URLs `#84 <https://github.com/ansible-middleware/keycloak/pull/84>`_
|
||||||
|
- Introduce systemd unit restart behavior `#81 <https://github.com/ansible-middleware/keycloak/pull/81>`_
|
||||||
|
|
||||||
|
v1.2.4
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Add ``sqlserver`` to keycloak role jdbc configurations `#78 <https://github.com/ansible-middleware/keycloak/pull/78>`_
|
||||||
|
- Add configurability for XA transactions `#73 <https://github.com/ansible-middleware/keycloak/pull/73>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- Fix deprecation warning for ``ipaddr`` `#77 <https://github.com/ansible-middleware/keycloak/pull/77>`_
|
||||||
|
- Fix undefined facts when offline patching sso `#71 <https://github.com/ansible-middleware/keycloak/pull/71>`_
|
||||||
|
|
||||||
|
v1.2.1
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Allow to setup keycloak HA cluster without remote cache store `#68 <https://github.com/ansible-middleware/keycloak/pull/68>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- Pass attributes to realm clients `#69 <https://github.com/ansible-middleware/keycloak/pull/69>`_
|
||||||
|
|
||||||
v1.2.0
|
v1.2.0
|
||||||
======
|
======
|
||||||
|
|
||||||
|
@ -84,6 +387,11 @@ Minor Changes
|
||||||
v1.0.4
|
v1.0.4
|
||||||
======
|
======
|
||||||
|
|
||||||
|
Release Summary
|
||||||
|
---------------
|
||||||
|
|
||||||
|
Internal release, documentation or test changes only.
|
||||||
|
|
||||||
v1.0.3
|
v1.0.3
|
||||||
======
|
======
|
||||||
|
|
||||||
|
@ -124,7 +432,6 @@ Release Summary
|
||||||
|
|
||||||
Minor enhancements, bug and documentation fixes.
|
Minor enhancements, bug and documentation fixes.
|
||||||
|
|
||||||
|
|
||||||
Major Changes
|
Major Changes
|
||||||
-------------
|
-------------
|
||||||
|
|
||||||
|
@ -142,4 +449,3 @@ Release Summary
|
||||||
---------------
|
---------------
|
||||||
|
|
||||||
This is the first stable release of the ``middleware_automation.keycloak`` collection.
|
This is the first stable release of the ``middleware_automation.keycloak`` collection.
|
||||||
|
|
||||||
|
|
|
@ -1,3 +1,37 @@
|
||||||
|
## Developing
|
||||||
|
|
||||||
|
### Build and install locally
|
||||||
|
|
||||||
|
Clone the repository, checkout the tag you want to build, or pick the main branch for the development version; then:
|
||||||
|
|
||||||
|
ansible-galaxy collection build .
|
||||||
|
ansible-galaxy collection install middleware_automation-keycloak-*.tar.gz
|
||||||
|
|
||||||
|
|
||||||
|
### Development environment
|
||||||
|
|
||||||
|
Make sure your development machine has avilable:
|
||||||
|
|
||||||
|
* python 3.11+
|
||||||
|
* virtualenv
|
||||||
|
* docker (or podman)
|
||||||
|
|
||||||
|
In order to run setup the development environment and run the molecule tests locally, after cloning the repository:
|
||||||
|
|
||||||
|
```
|
||||||
|
# create new virtualenv using python 3
|
||||||
|
virtualenv $PATH_TO_DEV_VIRTUALENV
|
||||||
|
# activate the virtual env
|
||||||
|
source $PATH_TO_DEV_VIRTUALENV/bin/activate
|
||||||
|
# install ansible and tools onto the virtualenv
|
||||||
|
pip install yamllint 'molecule>=6.0' 'molecule-plugins[docker]' 'ansible-core>=2.16' ansible-lint
|
||||||
|
# install collection dependencies
|
||||||
|
ansible-galaxy collection install -r requirements.yml
|
||||||
|
# install python dependencies
|
||||||
|
pip install -r requirements.txt molecule/requirements.txt
|
||||||
|
# execute the tests (replace --all with -s subdirectory to run a single test)
|
||||||
|
molecule test --all
|
||||||
|
```
|
||||||
|
|
||||||
## Contributor's Guidelines
|
## Contributor's Guidelines
|
||||||
|
|
||||||
|
|
73
README.md
73
README.md
|
@ -1,14 +1,18 @@
|
||||||
# Ansible Collection - middleware_automation.keycloak
|
# Ansible Collection - middleware_automation.keycloak
|
||||||
|
|
||||||
|
<!--start build_status -->
|
||||||
[](https://github.com/ansible-middleware/keycloak/actions/workflows/ci.yml)
|
[](https://github.com/ansible-middleware/keycloak/actions/workflows/ci.yml)
|
||||||
|
|
||||||
|
> **_NOTE:_ If you are Red Hat customer, install `redhat.rhbk` (for Red Hat Build of Keycloak) or `redhat.sso` (for Red Hat Single Sign-On) from [Automation Hub](https://console.redhat.com/ansible/ansible-dashboard) as the certified version of this collection.**
|
||||||
|
|
||||||
Collection to install and configure [Keycloak](https://www.keycloak.org/) or [Red Hat Single Sign-On](https://access.redhat.com/products/red-hat-single-sign-on).
|
<!--end build_status -->
|
||||||
|
<!--start description -->
|
||||||
|
Collection to install and configure [Keycloak](https://www.keycloak.org/) or [Red Hat Single Sign-On](https://access.redhat.com/products/red-hat-single-sign-on) / [Red Hat Build of Keycloak](https://access.redhat.com/products/red-hat-build-of-keycloak).
|
||||||
|
<!--end description -->
|
||||||
<!--start requires_ansible-->
|
<!--start requires_ansible-->
|
||||||
## Ansible version compatibility
|
## Ansible version compatibility
|
||||||
|
|
||||||
This collection has been tested against following Ansible versions: **>=2.9.10**.
|
This collection has been tested against following Ansible versions: **>=2.16.0**.
|
||||||
|
|
||||||
Plugins and modules within a collection may be tested with only specific Ansible versions. A collection may contain metadata that identifies these versions.
|
Plugins and modules within a collection may be tested with only specific Ansible versions. A collection may contain metadata that identifies these versions.
|
||||||
<!--end requires_ansible-->
|
<!--end requires_ansible-->
|
||||||
|
@ -16,12 +20,15 @@ Plugins and modules within a collection may be tested with only specific Ansible
|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
|
<!--start galaxy_download -->
|
||||||
### Installing the Collection from Ansible Galaxy
|
### Installing the Collection from Ansible Galaxy
|
||||||
|
|
||||||
Before using the collection, you need to install it with the Ansible Galaxy CLI:
|
Before using the collection, you need to install it with the Ansible Galaxy CLI:
|
||||||
|
|
||||||
ansible-galaxy collection install middleware_automation.keycloak
|
ansible-galaxy collection install middleware_automation.keycloak
|
||||||
|
|
||||||
|
<!--end galaxy_download -->
|
||||||
|
|
||||||
You can also include it in a `requirements.yml` file and install it via `ansible-galaxy collection install -r requirements.yml`, using the format:
|
You can also include it in a `requirements.yml` file and install it via `ansible-galaxy collection install -r requirements.yml`, using the format:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
|
@ -33,60 +40,51 @@ collections:
|
||||||
The keycloak collection also depends on the following python packages to be present on the controller host:
|
The keycloak collection also depends on the following python packages to be present on the controller host:
|
||||||
|
|
||||||
* netaddr
|
* netaddr
|
||||||
|
* lxml
|
||||||
|
|
||||||
A requirement file is provided to install:
|
A requirement file is provided to install:
|
||||||
|
|
||||||
pip install -r requirements.txt
|
pip install -r requirements.txt
|
||||||
|
|
||||||
|
<!--start roles_paths -->
|
||||||
### Included roles
|
### Included roles
|
||||||
|
|
||||||
* [`keycloak`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md): role for installing the service.
|
* `keycloak_quarkus`: role for installing keycloak (>= 19.0.0, quarkus based).
|
||||||
* [`keycloak_realm`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md): role for configuring a realm, user federation(s), clients and users, in an installed service.
|
* `keycloak_realm`: role for configuring a realm, user federation(s), clients and users, in an installed service.
|
||||||
* [`keycloak_quarkus`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_quarkus/README.md): role for installing the quarkus variant of keycloak (>= 17.0.0).
|
* `keycloak`: role for installing legacy keycloak (<= 19.0, wildfly based).
|
||||||
|
|
||||||
|
<!--end roles_paths -->
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
|
|
||||||
### Install Playbook
|
### Install Playbook
|
||||||
|
<!--start rhbk_playbook -->
|
||||||
* [`playbooks/keycloak.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak.yml) installs the upstream(Keycloak) based on the defined variables.
|
* [`playbooks/keycloak_quarkus.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_quarkus.yml) installs keycloak >= 17 based on the defined variables (using most defaults).
|
||||||
* [`playbooks/rhsso.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/rhsso.yml) installs Red Hat Single Sign-On(RHSSO) based on defined variables.
|
* [`playbooks/keycloak.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak.yml) installs keycloak legacy based on the defined variables (using most defaults).
|
||||||
|
|
||||||
Both playbooks include the `keycloak` role, with different settings, as described in the following sections.
|
Both playbooks include the `keycloak` role, with different settings, as described in the following sections.
|
||||||
|
|
||||||
For full service configuration details, refer to the [keycloak role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md).
|
For full service configuration details, refer to the [keycloak role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md).
|
||||||
|
<!--end rhbk_playbook -->
|
||||||
|
|
||||||
|
#### Install from controller node (offline)
|
||||||
|
|
||||||
#### Install from controller node (local source)
|
Making the keycloak zip archive available to the playbook working directory, and setting `keycloak_offline_install` to `true`, allows to skip
|
||||||
|
the download tasks. The local path for the archive does match the downloaded archive path, so that it is also used as a cache when multiple hosts are provisioned in a cluster.
|
||||||
Making the keycloak zip archive (or the RHSSO zip archive), available to the playbook repository root directory, and setting `keycloak_offline_install` to `True`, allows to skip
|
|
||||||
the download tasks. The local path for the archive matches the downloaded archive path, so it is also used as a cache when multiple hosts are provisioned in a cluster.
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
keycloak_offline_install: True
|
keycloak_offline_install: true
|
||||||
```
|
```
|
||||||
|
|
||||||
And depending on `keycloak_rhsso_enable`:
|
|
||||||
|
|
||||||
* `True`: install RHSSO using file rh-sso-x.y.z-server-dist.zip
|
<!--start rhn_credentials -->
|
||||||
* `False`: install keycloak using file keycloak-x.y.zip
|
<!--end rhn_credentials -->
|
||||||
|
|
||||||
|
|
||||||
#### Install from alternate sources (like corporate Nexus, artifactory, proxy, etc)
|
#### Install from alternate sources (like corporate Nexus, artifactory, proxy, etc)
|
||||||
|
|
||||||
For RHSSO:
|
It is possible to perform downloads from alternate sources, using the `keycloak_download_url` variable; make sure the final downloaded filename matches with the source filename (ie. keycloak-legacy-x.y.zip or rh-sso-x.y.z-server-dist.zip).
|
||||||
|
|
||||||
```yaml
|
|
||||||
sso_download_url: "https://<internal-nexus.private.net>/<path>/<to>/rh-sso-x.y.z-server-dist.zip"
|
|
||||||
```
|
|
||||||
|
|
||||||
For keycloak:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
keycloak_download_url: "https://<internal-nexus.private.net>/<path>/<to>/keycloak-x.y.zip"
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
### Example installation command
|
### Example installation command
|
||||||
|
@ -105,14 +103,16 @@ ansible-playbook -i <ansible_hosts> -e @rhn-creds.yml playbooks/keycloak.yml -e
|
||||||
localhost ansible_connection=local
|
localhost ansible_connection=local
|
||||||
```
|
```
|
||||||
|
|
||||||
|
Note: when deploying clustered configurations, all hosts belonging to the cluster must be present in `ansible_play_batch`; ie. they must be targeted by the same ansible-playbook execution.
|
||||||
|
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|
||||||
|
|
||||||
### Config Playbook
|
### Config Playbook
|
||||||
|
<!--start rhbk_realm_playbook -->
|
||||||
[`playbooks/keycloak_realm.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_realm.yml) creates or updates provided realm, user federation(s), client(s), client role(s) and client user(s).
|
[`playbooks/keycloak_realm.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_realm.yml) creates or updates provided realm, user federation(s), client(s), client role(s) and client user(s).
|
||||||
|
<!--end rhbk_realm_playbook -->
|
||||||
|
|
||||||
### Example configuration command
|
### Example configuration command
|
||||||
|
|
||||||
|
@ -130,16 +130,17 @@ ansible-playbook -i <ansible_hosts> playbooks/keycloak_realm.yml -e keycloak_adm
|
||||||
[keycloak]
|
[keycloak]
|
||||||
localhost ansible_connection=local
|
localhost ansible_connection=local
|
||||||
```
|
```
|
||||||
|
<!--start rhbk_realm_readme -->
|
||||||
For full configuration details, refer to the [keycloak_realm role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md).
|
For full configuration details, refer to the [keycloak_realm role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md).
|
||||||
|
<!--end rhbk_realm_readme -->
|
||||||
|
|
||||||
## Support
|
<!--start support -->
|
||||||
|
<!--end support -->
|
||||||
|
|
||||||
Keycloak collection v1.0.0 is a Beta release and for [Technical Preview](https://access.redhat.com/support/offerings/techpreview). If you have any issues or questions related to collection, please don't hesitate to contact us on Ansible-middleware-core@redhat.com or open an issue on https://github.com/ansible-middleware/keycloak/issues
|
|
||||||
|
|
||||||
## License
|
## License
|
||||||
|
|
||||||
Apache License v2.0 or later
|
Apache License v2.0 or later
|
||||||
|
<!--start license -->
|
||||||
See [LICENSE](LICENSE) to view the full text.
|
See [LICENSE](LICENSE) to view the full text.
|
||||||
|
<!--end license -->
|
||||||
|
|
14
bindep.txt
14
bindep.txt
|
@ -1,7 +1,9 @@
|
||||||
python39-devel [platform:rpm compile]
|
python3-dev [compile platform:dpkg]
|
||||||
git-lfs [platform:rpm]
|
python3-devel [compile platform:rpm]
|
||||||
python3-netaddr [platform:rpm]
|
python39-devel [compile platform:centos-8 platform:rhel-8]
|
||||||
python3-lxml [platform:rpm]
|
git-lfs [platform:rpm platform:dpkg]
|
||||||
python3-jmespath [platform:rpm]
|
python3-netaddr [platform:rpm platform:dpkg]
|
||||||
python3-requests [platform:rpm]
|
python3-lxml [platform:rpm platform:dpkg]
|
||||||
|
python3-jmespath [platform:rpm platform:dpkg]
|
||||||
|
python3-requests [platform:rpm platform:dpkg]
|
||||||
|
|
||||||
|
|
|
@ -59,6 +59,10 @@ releases:
|
||||||
- 31.yaml
|
- 31.yaml
|
||||||
release_date: '2022-05-09'
|
release_date: '2022-05-09'
|
||||||
1.0.4:
|
1.0.4:
|
||||||
|
changes:
|
||||||
|
release_summary: 'Internal release, documentation or test changes only.
|
||||||
|
|
||||||
|
'
|
||||||
release_date: '2022-05-11'
|
release_date: '2022-05-11'
|
||||||
1.0.5:
|
1.0.5:
|
||||||
changes:
|
changes:
|
||||||
|
@ -167,3 +171,445 @@ releases:
|
||||||
- 63.yaml
|
- 63.yaml
|
||||||
- 64.yaml
|
- 64.yaml
|
||||||
release_date: '2023-03-16'
|
release_date: '2023-03-16'
|
||||||
|
1.2.1:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'Pass attributes to realm clients `#69 <https://github.com/ansible-middleware/keycloak/pull/69>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Allow to setup keycloak HA cluster without remote cache store `#68 <https://github.com/ansible-middleware/keycloak/pull/68>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 68.yaml
|
||||||
|
- 69.yaml
|
||||||
|
release_date: '2023-04-11'
|
||||||
|
1.2.4:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'Fix deprecation warning for ``ipaddr`` `#77 <https://github.com/ansible-middleware/keycloak/pull/77>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Fix undefined facts when offline patching sso `#71 <https://github.com/ansible-middleware/keycloak/pull/71>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Add ``sqlserver`` to keycloak role jdbc configurations `#78 <https://github.com/ansible-middleware/keycloak/pull/78>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Add configurability for XA transactions `#73 <https://github.com/ansible-middleware/keycloak/pull/73>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 71.yaml
|
||||||
|
- 73.yaml
|
||||||
|
- 77.yaml
|
||||||
|
- 78.yaml
|
||||||
|
release_date: '2023-05-09'
|
||||||
|
1.2.5:
|
||||||
|
changes:
|
||||||
|
minor_changes:
|
||||||
|
- 'Add configuration for database connection pool validation `#85 <https://github.com/ansible-middleware/keycloak/pull/85>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Allow to configure administration endpoint URL `#86 <https://github.com/ansible-middleware/keycloak/pull/86>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Allow to force backend URLs to frontend URLs `#84 <https://github.com/ansible-middleware/keycloak/pull/84>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Introduce systemd unit restart behavior `#81 <https://github.com/ansible-middleware/keycloak/pull/81>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 81.yaml
|
||||||
|
- 84.yaml
|
||||||
|
- 85.yaml
|
||||||
|
- 86.yaml
|
||||||
|
release_date: '2023-05-26'
|
||||||
|
1.2.6:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'Handle WFLYCTL0117 when background validation millis is 0 `#90 <https://github.com/ansible-middleware/keycloak/pull/90>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Add profile features enabling/disabling `#87 <https://github.com/ansible-middleware/keycloak/pull/87>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Improve service restart behavior configuration `#88 <https://github.com/ansible-middleware/keycloak/pull/88>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Update default xa_datasource_class value for mariadb jdbc configuration `#89
|
||||||
|
<https://github.com/ansible-middleware/keycloak/pull/89>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 87.yaml
|
||||||
|
- 88.yaml
|
||||||
|
- 89.yaml
|
||||||
|
- 90.yaml
|
||||||
|
release_date: '2023-06-07'
|
||||||
|
1.2.7:
|
||||||
|
changes:
|
||||||
|
minor_changes:
|
||||||
|
- 'Allow to override jgroups subnet `#93 <https://github.com/ansible-middleware/keycloak/pull/93>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak-quarkus: update keycloakx to v21.1.1 `#92 <https://github.com/ansible-middleware/keycloak/pull/92>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 92.yaml
|
||||||
|
- 93.yaml
|
||||||
|
release_date: '2023-06-19'
|
||||||
|
1.2.8:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'Fix incorrect checks for ``keycloak_jgroups_subnet`` `#98 <https://github.com/ansible-middleware/keycloak/pull/98>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Undefine ``keycloak_db_valid_conn_sql`` default `#91 <https://github.com/ansible-middleware/keycloak/pull/91>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Update bindep.txt package python3-devel to support RHEL9 `#105 <https://github.com/ansible-middleware/keycloak/pull/105>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'keycloak_quarkus: set openjdk 17 as default `#103 <https://github.com/ansible-middleware/keycloak/pull/103>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: update to version 22.0.1 `#107 <https://github.com/ansible-middleware/keycloak/pull/107>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 103.yaml
|
||||||
|
- 105.yaml
|
||||||
|
- 107.yaml
|
||||||
|
- 91.yaml
|
||||||
|
- 98.yaml
|
||||||
|
release_date: '2023-08-28'
|
||||||
|
1.3.0:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'keycloak_quarkus: fix validation failure upon port configuration change `#113
|
||||||
|
<https://github.com/ansible-middleware/keycloak/pull/113>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
major_changes:
|
||||||
|
- 'Run service as ``keycloak_service_user`` `#106 <https://github.com/ansible-middleware/keycloak/pull/106>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'keycloak_quarkus: Update Keycloak to version 22.0.3 `#112 <https://github.com/ansible-middleware/keycloak/pull/112>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: fix admin console redirect when running locally `#111 <https://github.com/ansible-middleware/keycloak/pull/111>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: skip proxy config if ``keycloak_quarkus_proxy_mode`` is
|
||||||
|
``none`` `#109 <https://github.com/ansible-middleware/keycloak/pull/109>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 106.yaml
|
||||||
|
- 109.yaml
|
||||||
|
- 111.yaml
|
||||||
|
- 112.yaml
|
||||||
|
- 113.yaml
|
||||||
|
release_date: '2023-09-25'
|
||||||
|
2.0.0:
|
||||||
|
changes:
|
||||||
|
breaking_changes:
|
||||||
|
- 'Add support for more http-related configs `#115 <https://github.com/ansible-middleware/keycloak/pull/115>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Update minimum ansible-core version > 2.14 `#119 <https://github.com/ansible-middleware/keycloak/pull/119>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: enable config of key store and trust store `#116 <https://github.com/ansible-middleware/keycloak/pull/116>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Add new parameter for port offset configuration `#124 <https://github.com/ansible-middleware/keycloak/pull/124>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Update Keycloak to version 22.0.5 `#122 <https://github.com/ansible-middleware/keycloak/pull/122>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 115.yaml
|
||||||
|
- 116.yaml
|
||||||
|
- 119.yaml
|
||||||
|
- 122.yaml
|
||||||
|
- 124.yaml
|
||||||
|
release_date: '2023-11-20'
|
||||||
|
2.0.1:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'keycloak_quarkus: template requires lowercase boolean values `#138 <https://github.com/ansible-middleware/keycloak/pull/138>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'keycloak_quarkus: add hostname-strict parameter `#139 <https://github.com/ansible-middleware/keycloak/pull/139>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: update to version 23.0.1 `#133 <https://github.com/ansible-middleware/keycloak/pull/133>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 133.yaml
|
||||||
|
- 138.yaml
|
||||||
|
- 139.yaml
|
||||||
|
release_date: '2023-12-07'
|
||||||
|
2.0.2:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'keycloak_quarkus: Use ``keycloak_quarkus_java_opts`` `#154 <https://github.com/ansible-middleware/keycloak/pull/154>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: allow ports <1024 (e.g. :443) in systemd unit `#150 <https://github.com/ansible-middleware/keycloak/pull/150>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'keycloak_quarkus: Add support for sqlserver jdbc driver `#148 <https://github.com/ansible-middleware/keycloak/pull/148>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: allow configuration of ``hostname-strict-backchannel``
|
||||||
|
`#152 <https://github.com/ansible-middleware/keycloak/pull/152>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: systemd restart behavior `#145 <https://github.com/ansible-middleware/keycloak/pull/145>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 145.yaml
|
||||||
|
- 148.yaml
|
||||||
|
- 150.yaml
|
||||||
|
- 152.yaml
|
||||||
|
- 154.yaml
|
||||||
|
release_date: '2024-01-17'
|
||||||
|
2.1.0:
|
||||||
|
changes:
|
||||||
|
breaking_changes:
|
||||||
|
- 'keycloak_quarkus: renamed infinispan host list configuration `#157 <https://github.com/ansible-middleware/keycloak/pull/157>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
bugfixes:
|
||||||
|
- 'keycloak_quarkus: fix custom JAVA_HOME parameter name `#171 <https://github.com/ansible-middleware/keycloak/pull/171>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
major_changes:
|
||||||
|
- 'Implement infinispan TCPPING discovery protocol `#159 <https://github.com/ansible-middleware/keycloak/pull/159>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Set enable-recovery when xa transactions are enabled `#167 <https://github.com/ansible-middleware/keycloak/pull/167>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: Allow configuring log rotate options in quarkus configuration
|
||||||
|
`#161 <https://github.com/ansible-middleware/keycloak/pull/161>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: ``sticky-session`` for infinispan routes `#163 <https://github.com/ansible-middleware/keycloak/pull/163>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 157.yaml
|
||||||
|
- 159.yaml
|
||||||
|
- 161.yaml
|
||||||
|
- 163.yaml
|
||||||
|
- 167.yaml
|
||||||
|
- 171.yaml
|
||||||
|
release_date: '2024-02-28'
|
||||||
|
2.1.1:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'Fix permissions on controller-side downloaded artifacts `#184 <https://github.com/ansible-middleware/keycloak/pull/184>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'JVM args moved to ``JAVA_OPTS`` envvar (instead of JAVA_OPTS_APPEND) `#186
|
||||||
|
<https://github.com/ansible-middleware/keycloak/pull/186>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Unrelax configuration file permissions `#191 <https://github.com/ansible-middleware/keycloak/pull/191>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Utilize comment filter for ``ansible_managed`` annotations `#176 <https://github.com/ansible-middleware/keycloak/pull/176>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Add reverse ``proxy_headers`` config, supersedes ``proxy_mode`` `#187 <https://github.com/ansible-middleware/keycloak/pull/187>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Debian/Ubuntu compatibility `#178 <https://github.com/ansible-middleware/keycloak/pull/178>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Use ``keycloak_realm`` as default for sub-entities `#180 <https://github.com/ansible-middleware/keycloak/pull/180>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 176.yaml
|
||||||
|
- 178.yaml
|
||||||
|
- 180.yaml
|
||||||
|
- 184.yaml
|
||||||
|
- 186.yaml
|
||||||
|
- 187.yaml
|
||||||
|
- 191.yaml
|
||||||
|
release_date: '2024-04-17'
|
||||||
|
2.1.2:
|
||||||
|
changes:
|
||||||
|
release_summary: 'Internal release, documentation or test changes only.
|
||||||
|
|
||||||
|
'
|
||||||
|
release_date: '2024-04-17'
|
||||||
|
2.2.0:
|
||||||
|
changes:
|
||||||
|
major_changes:
|
||||||
|
- 'Support java keystore for configuration of sensitive options `#189 <https://github.com/ansible-middleware/keycloak/pull/189>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Add ``wait_for_port`` and ``wait_for_log`` systemd unit logic `#199 <https://github.com/ansible-middleware/keycloak/pull/199>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Customize jdbc driver downloads, optional authentication `#202 <https://github.com/ansible-middleware/keycloak/pull/202>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Keystore-based vault SPI configuration `#196 <https://github.com/ansible-middleware/keycloak/pull/196>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'New ``keycloak_quarkus_hostname_strict_https`` parameter `#195 <https://github.com/ansible-middleware/keycloak/pull/195>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Providers config and custom providers `#201 <https://github.com/ansible-middleware/keycloak/pull/201>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Remove administrator credentials from files once keycloak is bootstrapped
|
||||||
|
`#197 <https://github.com/ansible-middleware/keycloak/pull/197>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Update keycloak to 24.0 `#194 <https://github.com/ansible-middleware/keycloak/pull/194>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 189.yaml
|
||||||
|
- 194.yaml
|
||||||
|
- 195.yaml
|
||||||
|
- 196.yaml
|
||||||
|
- 197.yaml
|
||||||
|
- 199.yaml
|
||||||
|
- 201.yaml
|
||||||
|
- 202.yaml
|
||||||
|
release_date: '2024-05-01'
|
||||||
|
2.2.1:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'JDBC provider: fix clause in argument validation `#204 <https://github.com/ansible-middleware/keycloak/pull/204>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
release_summary: Internal release, documentation or test changes only.
|
||||||
|
fragments:
|
||||||
|
- 204.yaml
|
||||||
|
- v2.2.1-devel_summary.yaml
|
||||||
|
release_date: '2024-05-02'
|
||||||
|
2.2.2:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'Turn off controller privilege escalation `#209 <https://github.com/ansible-middleware/keycloak/pull/209>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Copying of key material for TLS configuration `#210 <https://github.com/ansible-middleware/keycloak/pull/210>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Validate certs parameter for JDBC driver downloads `#207 <https://github.com/ansible-middleware/keycloak/pull/207>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 207.yaml
|
||||||
|
- 209.yaml
|
||||||
|
- 210.yaml
|
||||||
|
release_date: '2024-05-06'
|
||||||
|
2.3.0:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- '``kc.sh build`` uses configured jdk `#211 <https://github.com/ansible-middleware/keycloak/pull/211>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
major_changes:
|
||||||
|
- 'Allow for custom providers hosted on maven repositories `#223 <https://github.com/ansible-middleware/keycloak/pull/223>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Restart handler strategy behaviour `#231 <https://github.com/ansible-middleware/keycloak/pull/231>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Add support for policy files `#225 <https://github.com/ansible-middleware/keycloak/pull/225>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Allow to add extra custom env vars in sysconfig file `#229 <https://github.com/ansible-middleware/keycloak/pull/229>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Download from alternate URL with optional http authentication `#220 <https://github.com/ansible-middleware/keycloak/pull/220>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Update Keycloak to version 24.0.4 `#218 <https://github.com/ansible-middleware/keycloak/pull/218>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- '``proxy-header`` enhancement `#227 <https://github.com/ansible-middleware/keycloak/pull/227>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 211.yaml
|
||||||
|
- 218.yaml
|
||||||
|
- 220.yaml
|
||||||
|
- 223.yaml
|
||||||
|
- 225.yaml
|
||||||
|
- 227.yaml
|
||||||
|
- 229.yaml
|
||||||
|
- 231.yaml
|
||||||
|
release_date: '2024-05-20'
|
||||||
|
2.4.0:
|
||||||
|
changes:
|
||||||
|
major_changes:
|
||||||
|
- 'Enable by default health check on restart `#234 <https://github.com/ansible-middleware/keycloak/pull/234>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'Update minimum ansible-core version > 2.15 `#232 <https://github.com/ansible-middleware/keycloak/pull/232>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 232.yaml
|
||||||
|
- 234.yaml
|
||||||
|
release_date: '2024-06-04'
|
||||||
|
2.4.1:
|
||||||
|
changes:
|
||||||
|
release_summary: Internal release, documentation or test changes only.
|
||||||
|
fragments:
|
||||||
|
- v2.4.1-devel_summary.yaml
|
||||||
|
release_date: '2024-07-02'
|
||||||
|
2.4.2:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'Add wait_for_port number parameter `#237 <https://github.com/ansible-middleware/keycloak/pull/237>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'New parameter ``keycloak_quarkus_download_path`` `#239 <https://github.com/ansible-middleware/keycloak/pull/239>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 237.yaml
|
||||||
|
- 239.yaml
|
||||||
|
release_date: '2024-09-26'
|
||||||
|
2.4.3:
|
||||||
|
changes:
|
||||||
|
minor_changes:
|
||||||
|
- 'Update keycloak to 24.0.5 `#241 <https://github.com/ansible-middleware/keycloak/pull/241>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 241.yaml
|
||||||
|
release_date: '2024-10-16'
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
</div>
|
</div>
|
||||||
<hr/>
|
<hr/>
|
||||||
<div role="contentinfo">
|
<div role="contentinfo">
|
||||||
<p>© Copyright 2022, Red Hat, Inc.</p>
|
<p>© Copyright 2024, Red Hat, Inc.</p>
|
||||||
</div>
|
</div>
|
||||||
Built with <a href="https://www.sphinx-doc.org/">Sphinx</a> using a
|
Built with <a href="https://www.sphinx-doc.org/">Sphinx</a> using a
|
||||||
<a href="https://github.com/readthedocs/sphinx_rtd_theme">theme</a>
|
<a href="https://github.com/readthedocs/sphinx_rtd_theme">theme</a>
|
||||||
|
|
|
@ -24,14 +24,15 @@
|
||||||
<div class="wy-menu wy-menu-vertical" data-spy="affix" role="navigation" aria-label="Navigation menu">
|
<div class="wy-menu wy-menu-vertical" data-spy="affix" role="navigation" aria-label="Navigation menu">
|
||||||
<p class="caption" role="heading"><span class="caption-text">Middleware Automation</span></p>
|
<p class="caption" role="heading"><span class="caption-text">Middleware Automation</span></p>
|
||||||
<ul>
|
<ul>
|
||||||
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/infinispan/">Infinispan / Red Hat Data Grid</a></li>
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/infinispan/main/">Infinispan / Red Hat Data Grid</a></li>
|
||||||
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/keycloak/">Keycloak / Red Hat Single Sign-On</a></li>
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/keycloak/main/">Keycloak / Red Hat Single Sign-On</a></li>
|
||||||
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/wildfly/">Wildfly / Red Hat JBoss EAP</a></li>
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/wildfly/main/">Wildfly / Red Hat JBoss EAP</a></li>
|
||||||
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/jws/">Tomcat / Red Hat JWS</a></li>
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/jws/main/">Tomcat / Red Hat JWS</a></li>
|
||||||
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/amq/">ActiveMQ / Red Hat AMQ Broker</a></li>
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/amq/main/">ActiveMQ / Red Hat AMQ Broker</a></li>
|
||||||
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/amq_streams/">Kafka / Red Hat AMQ Streams</a></li>
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/amq_streams/main/">Kafka / Red Hat AMQ Streams</a></li>
|
||||||
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/redhat-csp-download/">Red Hat CSP Download</a></li>
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/common/main/">Ansible Middleware utilities</a></li>
|
||||||
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/ansible_collections_jcliff/">JCliff</a></li>
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/redhat-csp-download/main/">Red Hat CSP Download</a></li>
|
||||||
|
<li class="toctree-l1"><a class="reference internal" href="https://ansible-middleware.github.io/ansible_collections_jcliff/main/">JCliff</a></li>
|
||||||
</ul>
|
</ul>
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
|
|
|
@ -43,6 +43,7 @@ extensions = [
|
||||||
'myst_parser',
|
'myst_parser',
|
||||||
'sphinx.ext.autodoc',
|
'sphinx.ext.autodoc',
|
||||||
'sphinx.ext.intersphinx',
|
'sphinx.ext.intersphinx',
|
||||||
|
'sphinx_antsibull_ext',
|
||||||
'ansible_basic_sphinx_ext',
|
'ansible_basic_sphinx_ext',
|
||||||
]
|
]
|
||||||
|
|
||||||
|
@ -71,7 +72,7 @@ language = None
|
||||||
exclude_patterns = ['_build', 'Thumbs.db', '.DS_Store', '.tmp']
|
exclude_patterns = ['_build', 'Thumbs.db', '.DS_Store', '.tmp']
|
||||||
|
|
||||||
# The name of the Pygments (syntax highlighting) style to use.
|
# The name of the Pygments (syntax highlighting) style to use.
|
||||||
pygments_style = 'sphinx'
|
pygments_style = 'ansible'
|
||||||
|
|
||||||
highlight_language = 'YAML+Jinja'
|
highlight_language = 'YAML+Jinja'
|
||||||
|
|
||||||
|
|
|
@ -10,30 +10,25 @@ Welcome to Keycloak Collection documentation
|
||||||
README
|
README
|
||||||
plugins/index
|
plugins/index
|
||||||
roles/index
|
roles/index
|
||||||
|
Changelog <CHANGELOG>
|
||||||
|
|
||||||
.. toctree::
|
.. toctree::
|
||||||
:maxdepth: 2
|
:maxdepth: 2
|
||||||
:caption: Developer documentation
|
:caption: Developer documentation
|
||||||
|
|
||||||
testing
|
Developing <developing>
|
||||||
developing
|
Testing <testing>
|
||||||
releasing
|
Releasing <releasing>
|
||||||
|
|
||||||
.. toctree::
|
|
||||||
:maxdepth: 2
|
|
||||||
:caption: General
|
|
||||||
|
|
||||||
Changelog <CHANGELOG>
|
|
||||||
|
|
||||||
.. toctree::
|
.. toctree::
|
||||||
:maxdepth: 2
|
:maxdepth: 2
|
||||||
:caption: Middleware collections
|
:caption: Middleware collections
|
||||||
|
|
||||||
Infinispan / Red Hat Data Grid <https://ansible-middleware.github.io/infinispan/>
|
Keycloak / Red Hat Single Sign-On <https://ansible-middleware.github.io/keycloak/main/>
|
||||||
Keycloak / Red Hat Single Sign-On <https://ansible-middleware.github.io/keycloak/>
|
Infinispan / Red Hat Data Grid <https://ansible-middleware.github.io/infinispan/main/>
|
||||||
Wildfly / Red Hat JBoss EAP <https://ansible-middleware.github.io/wildfly/>
|
Wildfly / Red Hat JBoss EAP <https://ansible-middleware.github.io/wildfly/main/>
|
||||||
Tomcat / Red Hat JWS <https://ansible-middleware.github.io/jws/>
|
Tomcat / Red Hat JWS <https://ansible-middleware.github.io/jws/main/>
|
||||||
ActiveMQ / Red Hat AMQ Broker <https://ansible-middleware.github.io/amq/>
|
ActiveMQ / Red Hat AMQ Broker <https://ansible-middleware.github.io/amq/main/>
|
||||||
Kafka / Red Hat AMQ Streams <https://ansible-middleware.github.io/amq_streams/>
|
Kafka / Red Hat AMQ Streams <https://ansible-middleware.github.io/amq_streams/main/>
|
||||||
Red Hat CSP Download <https://ansible-middleware.github.io/redhat-csp-download/>
|
Ansible Middleware utilities <https://ansible-middleware.github.io/common/main/>
|
||||||
JCliff <https://ansible-middleware.github.io/ansible_collections_jcliff/>
|
JCliff <https://ansible-middleware.github.io/ansible_collections_jcliff/main/>
|
||||||
|
|
|
@ -1,7 +1,8 @@
|
||||||
antsibull>=0.17.0
|
antsibull>=0.17.0
|
||||||
antsibull-docs
|
antsibull-docs
|
||||||
antsibull-changelog
|
antsibull-changelog
|
||||||
ansible-core>=2.14.1
|
ansible-core>=2.16.0
|
||||||
|
ansible-pygments
|
||||||
sphinx-rtd-theme
|
sphinx-rtd-theme
|
||||||
git+https://github.com/felixfontein/ansible-basic-sphinx-ext
|
git+https://github.com/felixfontein/ansible-basic-sphinx-ext
|
||||||
myst-parser
|
myst-parser
|
||||||
|
|
|
@ -4,24 +4,7 @@
|
||||||
|
|
||||||
The collection is tested with a [molecule](https://github.com/ansible-community/molecule) setup covering the included roles and verifying correct installation and idempotency.
|
The collection is tested with a [molecule](https://github.com/ansible-community/molecule) setup covering the included roles and verifying correct installation and idempotency.
|
||||||
In order to run the molecule tests locally with python 3.9 available, after cloning the repository:
|
In order to run the molecule tests locally with python 3.9 available, after cloning the repository:
|
||||||
|
The test scenarios are available on the source code repository each on his own subdirectory under [molecule/](https://github.com/ansible-middleware/keycloak/molecule).
|
||||||
```
|
|
||||||
pip install yamllint 'molecule[docker]~=3.5.2' ansible-core flake8 ansible-lint voluptuous
|
|
||||||
molecule test --all
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
## Integration testing
|
|
||||||
|
|
||||||
Demo repositories which depend on the collection, and aggregate functionality with other middleware_automation collections, are automatically rebuilt
|
|
||||||
at every collection release to ensure non-breaking changes and consistent behaviour.
|
|
||||||
|
|
||||||
The repository are:
|
|
||||||
|
|
||||||
- [Flange demo](https://github.com/ansible-middleware/flange-demo)
|
|
||||||
A deployment of Wildfly cluster integrated with keycloak and infinispan.
|
|
||||||
- [CrossDC keycloak demo](https://github.com/ansible-middleware/cross-dc-rhsso-demo)
|
|
||||||
A clustered multi-regional installation of keycloak with infinispan remote caches.
|
|
||||||
|
|
||||||
|
|
||||||
## Test playbooks
|
## Test playbooks
|
||||||
|
@ -29,15 +12,7 @@ The repository are:
|
||||||
Sample playbooks are provided in the `playbooks/` directory; to run the playbooks locally (requires a rhel system with python 3.9+, ansible, and systemd) the steps are as follows:
|
Sample playbooks are provided in the `playbooks/` directory; to run the playbooks locally (requires a rhel system with python 3.9+, ansible, and systemd) the steps are as follows:
|
||||||
|
|
||||||
```
|
```
|
||||||
# setup environment
|
# setup environment as in developing
|
||||||
pip install ansible-core
|
|
||||||
# clone the repository
|
|
||||||
git clone https://github.com/ansible-middleware/keycloak
|
|
||||||
cd keycloak
|
|
||||||
# install collection dependencies
|
|
||||||
ansible-galaxy collection install -r requirements.yml
|
|
||||||
# install collection python deps
|
|
||||||
pip install -r requirements.txt
|
|
||||||
# create inventory for localhost
|
# create inventory for localhost
|
||||||
cat << EOF > inventory
|
cat << EOF > inventory
|
||||||
[keycloak]
|
[keycloak]
|
||||||
|
|
|
@ -1,12 +1,13 @@
|
||||||
---
|
---
|
||||||
namespace: middleware_automation
|
namespace: middleware_automation
|
||||||
name: keycloak
|
name: keycloak
|
||||||
version: "1.2.0"
|
version: "3.0.0"
|
||||||
readme: README.md
|
readme: README.md
|
||||||
authors:
|
authors:
|
||||||
- Romain Pelisse <rpelisse@redhat.com>
|
- Romain Pelisse <rpelisse@redhat.com>
|
||||||
- Guido Grazioli <ggraziol@redhat.com>
|
- Guido Grazioli <ggraziol@redhat.com>
|
||||||
- Pavan Kumar Motaparthi <pmotapar@redhat.com>
|
- Pavan Kumar Motaparthi <pmotapar@redhat.com>
|
||||||
|
- Helmut Wolf <hwo@world-direct.at>
|
||||||
description: Install and configure a keycloak, or Red Hat Single Sign-on, service.
|
description: Install and configure a keycloak, or Red Hat Single Sign-on, service.
|
||||||
license_file: "LICENSE"
|
license_file: "LICENSE"
|
||||||
tags:
|
tags:
|
||||||
|
@ -21,8 +22,11 @@ tags:
|
||||||
- infrastructure
|
- infrastructure
|
||||||
- authentication
|
- authentication
|
||||||
- java
|
- java
|
||||||
|
- runtimes
|
||||||
|
- middleware
|
||||||
|
- a4mw
|
||||||
dependencies:
|
dependencies:
|
||||||
"middleware_automation.common": ">=1.0.0"
|
"middleware_automation.common": ">=1.2.1"
|
||||||
"ansible.posix": ">=1.4.0"
|
"ansible.posix": ">=1.4.0"
|
||||||
repository: https://github.com/ansible-middleware/keycloak
|
repository: https://github.com/ansible-middleware/keycloak
|
||||||
documentation: https://ansible-middleware.github.io/keycloak
|
documentation: https://ansible-middleware.github.io/keycloak
|
||||||
|
@ -31,7 +35,6 @@ issues: https://github.com/ansible-middleware/keycloak/issues
|
||||||
build_ignore:
|
build_ignore:
|
||||||
- .gitignore
|
- .gitignore
|
||||||
- .github
|
- .github
|
||||||
- .ansible-lint
|
|
||||||
- .yamllint
|
- .yamllint
|
||||||
- '*.tar.gz'
|
- '*.tar.gz'
|
||||||
- '*.zip'
|
- '*.zip'
|
||||||
|
|
|
@ -1,2 +1,2 @@
|
||||||
---
|
---
|
||||||
requires_ansible: ">=2.9.10"
|
requires_ansible: ">=2.16.0"
|
||||||
|
|
44
molecule/debian/converge.yml
Normal file
44
molecule/debian/converge.yml
Normal file
|
@ -0,0 +1,44 @@
|
||||||
|
---
|
||||||
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_show_deprecation_warnings: false
|
||||||
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
|
keycloak_quarkus_hostname: http://instance:8080
|
||||||
|
keycloak_quarkus_log: file
|
||||||
|
keycloak_quarkus_start_dev: true
|
||||||
|
keycloak_quarkus_proxy_mode: none
|
||||||
|
roles:
|
||||||
|
- role: keycloak_quarkus
|
||||||
|
- role: keycloak_realm
|
||||||
|
keycloak_url: "{{ keycloak_quarkus_hostname }}"
|
||||||
|
keycloak_context: ''
|
||||||
|
keycloak_admin_user: "{{ keycloak_quarkus_bootstrap_admin_user }}"
|
||||||
|
keycloak_admin_password: "{{ keycloak_quarkus_bootstrap_admin_password }}"
|
||||||
|
keycloak_client_users:
|
||||||
|
- username: TestUser
|
||||||
|
password: password
|
||||||
|
client_roles:
|
||||||
|
- client: TestClient
|
||||||
|
role: TestRoleUser
|
||||||
|
realm: "{{ keycloak_realm }}"
|
||||||
|
- username: TestAdmin
|
||||||
|
password: password
|
||||||
|
client_roles:
|
||||||
|
- client: TestClient
|
||||||
|
role: TestRoleUser
|
||||||
|
realm: "{{ keycloak_realm }}"
|
||||||
|
- client: TestClient
|
||||||
|
role: TestRoleAdmin
|
||||||
|
realm: "{{ keycloak_realm }}"
|
||||||
|
keycloak_realm: TestRealm
|
||||||
|
keycloak_clients:
|
||||||
|
- name: TestClient
|
||||||
|
realm: "{{ keycloak_realm }}"
|
||||||
|
public_client: "{{ keycloak_client_public }}"
|
||||||
|
web_origins: "{{ keycloak_client_web_origins }}"
|
||||||
|
users: "{{ keycloak_client_users }}"
|
||||||
|
client_id: TestClient
|
||||||
|
attributes:
|
||||||
|
post.logout.redirect.uris: '/public/logout'
|
48
molecule/debian/molecule.yml
Normal file
48
molecule/debian/molecule.yml
Normal file
|
@ -0,0 +1,48 @@
|
||||||
|
---
|
||||||
|
driver:
|
||||||
|
name: docker
|
||||||
|
platforms:
|
||||||
|
- name: instance
|
||||||
|
image: ghcr.io/hspaans/molecule-containers:debian-11
|
||||||
|
pre_build_image: true
|
||||||
|
privileged: true
|
||||||
|
port_bindings:
|
||||||
|
- "8080/tcp"
|
||||||
|
- "8443/tcp"
|
||||||
|
- "8009/tcp"
|
||||||
|
cgroupns_mode: host
|
||||||
|
command: "/lib/systemd/systemd"
|
||||||
|
volumes:
|
||||||
|
- /sys/fs/cgroup:/sys/fs/cgroup:rw
|
||||||
|
provisioner:
|
||||||
|
name: ansible
|
||||||
|
config_options:
|
||||||
|
defaults:
|
||||||
|
interpreter_python: auto_silent
|
||||||
|
ssh_connection:
|
||||||
|
pipelining: false
|
||||||
|
playbooks:
|
||||||
|
prepare: prepare.yml
|
||||||
|
converge: converge.yml
|
||||||
|
verify: verify.yml
|
||||||
|
inventory:
|
||||||
|
host_vars:
|
||||||
|
localhost:
|
||||||
|
ansible_python_interpreter: /usr/bin/python3
|
||||||
|
env:
|
||||||
|
ANSIBLE_FORCE_COLOR: "true"
|
||||||
|
ANSIBLE_REMOTE_TMP: /tmp/.ansible/tmp
|
||||||
|
verifier:
|
||||||
|
name: ansible
|
||||||
|
scenario:
|
||||||
|
test_sequence:
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
||||||
|
- create
|
||||||
|
- prepare
|
||||||
|
- converge
|
||||||
|
- idempotence
|
||||||
|
- side_effect
|
||||||
|
- verify
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
12
molecule/debian/prepare.yml
Normal file
12
molecule/debian/prepare.yml
Normal file
|
@ -0,0 +1,12 @@
|
||||||
|
---
|
||||||
|
- name: Prepare
|
||||||
|
hosts: all
|
||||||
|
gather_facts: yes
|
||||||
|
tasks:
|
||||||
|
- name: Install sudo
|
||||||
|
ansible.builtin.apt:
|
||||||
|
name:
|
||||||
|
- sudo
|
||||||
|
# - openjdk-21-jdk-headless # this is not available in ghcr.io/hspaans/molecule-containers:debian-11 (neither in debian-12) since the images are using outdated package sources
|
||||||
|
- openjdk-17-jdk-headless
|
||||||
|
state: present
|
1
molecule/debian/roles
Symbolic link
1
molecule/debian/roles
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
../../roles
|
40
molecule/debian/verify.yml
Normal file
40
molecule/debian/verify.yml
Normal file
|
@ -0,0 +1,40 @@
|
||||||
|
---
|
||||||
|
- name: Verify
|
||||||
|
hosts: all
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
|
keycloak_uri: "http://localhost:{{ 8080 + ( keycloak_jboss_port_offset | default(0) ) }}"
|
||||||
|
keycloak_management_port: "http://localhost:{{ 9990 + ( keycloak_jboss_port_offset | default(0) ) }}"
|
||||||
|
keycloak_jboss_port_offset: 10
|
||||||
|
tasks:
|
||||||
|
- name: Populate service facts
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
|
- name: Check if keycloak service started
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
|
||||||
|
- name: Verify openid config
|
||||||
|
block:
|
||||||
|
- name: Fetch openID config # noqa blocked_modules command-instead-of-module
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
|
curl http://localhost:8080/realms/master/.well-known/openid-configuration -k | jq .
|
||||||
|
args:
|
||||||
|
executable: /bin/bash
|
||||||
|
delegate_to: localhost
|
||||||
|
register: openid_config
|
||||||
|
changed_when: False
|
||||||
|
- name: Verify endpoint URLs
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- (openid_config.stdout | from_json)["backchannel_authentication_endpoint"] == 'http://localhost:8080/realms/master/protocol/openid-connect/ext/ciba/auth'
|
||||||
|
- (openid_config.stdout | from_json)['issuer'] == 'http://localhost:8080/realms/master'
|
||||||
|
- (openid_config.stdout | from_json)['authorization_endpoint'] == 'http://localhost:8080/realms/master/protocol/openid-connect/auth'
|
||||||
|
- (openid_config.stdout | from_json)['token_endpoint'] == 'http://localhost:8080/realms/master/protocol/openid-connect/token'
|
||||||
|
delegate_to: localhost
|
||||||
|
when:
|
||||||
|
- hera_home is defined
|
||||||
|
- hera_home | length == 0
|
|
@ -2,24 +2,24 @@
|
||||||
- name: Converge
|
- name: Converge
|
||||||
hosts: all
|
hosts: all
|
||||||
vars:
|
vars:
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_quarkus_show_deprecation_warnings: false
|
||||||
keycloak_jvm_package: java-11-openjdk-headless
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
keycloak_modcluster_enabled: True
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
keycloak_modcluster_urls:
|
keycloak_quarkus_hostname: http://instance:8080
|
||||||
- host: myhost1
|
keycloak_quarkus_log: file
|
||||||
port: 16667
|
keycloak_quarkus_log_level: debug
|
||||||
- host: myhost2
|
keycloak_quarkus_log_target: /tmp/keycloak
|
||||||
port: 16668
|
keycloak_quarkus_start_dev: true
|
||||||
|
keycloak_quarkus_proxy_mode: none
|
||||||
|
keycloak_quarkus_offline_install: true
|
||||||
|
keycloak_quarkus_download_path: /tmp/keycloak/
|
||||||
roles:
|
roles:
|
||||||
- role: keycloak
|
- role: keycloak_quarkus
|
||||||
tasks:
|
- role: keycloak_realm
|
||||||
- name: Keycloak Realm Role
|
keycloak_url: "{{ keycloak_quarkus_hostname }}"
|
||||||
ansible.builtin.include_role:
|
keycloak_context: ''
|
||||||
name: keycloak_realm
|
keycloak_admin_user: "{{ keycloak_quarkus_bootstrap_admin_user }}"
|
||||||
vars:
|
keycloak_admin_password: "{{ keycloak_quarkus_bootstrap_admin_password }}"
|
||||||
keycloak_client_default_roles:
|
|
||||||
- TestRoleAdmin
|
|
||||||
- TestRoleUser
|
|
||||||
keycloak_client_users:
|
keycloak_client_users:
|
||||||
- username: TestUser
|
- username: TestUser
|
||||||
password: password
|
password: password
|
||||||
|
@ -39,7 +39,6 @@
|
||||||
keycloak_realm: TestRealm
|
keycloak_realm: TestRealm
|
||||||
keycloak_clients:
|
keycloak_clients:
|
||||||
- name: TestClient
|
- name: TestClient
|
||||||
roles: "{{ keycloak_client_default_roles }}"
|
|
||||||
realm: "{{ keycloak_realm }}"
|
realm: "{{ keycloak_realm }}"
|
||||||
public_client: "{{ keycloak_client_public }}"
|
public_client: "{{ keycloak_client_public }}"
|
||||||
web_origins: "{{ keycloak_client_web_origins }}"
|
web_origins: "{{ keycloak_client_web_origins }}"
|
||||||
|
|
|
@ -1,15 +1,9 @@
|
||||||
---
|
---
|
||||||
dependency:
|
|
||||||
name: shell
|
|
||||||
command: ansible-galaxy collection install -r molecule/requirements.yml -p $HOME/.ansible/collections --force-with-deps
|
|
||||||
driver:
|
driver:
|
||||||
name: docker
|
name: docker
|
||||||
lint: |
|
|
||||||
ansible-lint --version
|
|
||||||
ansible-lint -v
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: instance
|
- name: instance
|
||||||
image: registry.access.redhat.com/ubi8/ubi-init:latest
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
pre_build_image: true
|
pre_build_image: true
|
||||||
privileged: true
|
privileged: true
|
||||||
command: "/usr/sbin/init"
|
command: "/usr/sbin/init"
|
||||||
|
@ -17,6 +11,7 @@ platforms:
|
||||||
- "8080/tcp"
|
- "8080/tcp"
|
||||||
- "8443/tcp"
|
- "8443/tcp"
|
||||||
- "8009/tcp"
|
- "8009/tcp"
|
||||||
|
- "9000/tcp"
|
||||||
provisioner:
|
provisioner:
|
||||||
name: ansible
|
name: ansible
|
||||||
config_options:
|
config_options:
|
||||||
|
@ -38,11 +33,8 @@ verifier:
|
||||||
name: ansible
|
name: ansible
|
||||||
scenario:
|
scenario:
|
||||||
test_sequence:
|
test_sequence:
|
||||||
- dependency
|
|
||||||
- lint
|
|
||||||
- cleanup
|
- cleanup
|
||||||
- destroy
|
- destroy
|
||||||
- syntax
|
|
||||||
- create
|
- create
|
||||||
- prepare
|
- prepare
|
||||||
- converge
|
- converge
|
||||||
|
|
|
@ -1,16 +1,9 @@
|
||||||
---
|
---
|
||||||
- name: Prepare
|
- name: Prepare
|
||||||
hosts: all
|
hosts: all
|
||||||
tasks:
|
gather_facts: yes
|
||||||
- name: Install sudo
|
vars:
|
||||||
ansible.builtin.yum:
|
sudo_pkg_name: sudo
|
||||||
name:
|
|
||||||
- sudo
|
|
||||||
- java-1.8.0-openjdk
|
|
||||||
state: present
|
|
||||||
|
|
||||||
- name: Prepare
|
|
||||||
hosts: all
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: "Run preparation common to all scenario"
|
- name: "Run preparation common to all scenario"
|
||||||
ansible.builtin.include_tasks: ../prepare.yml
|
ansible.builtin.include_tasks: ../prepare.yml
|
||||||
|
@ -18,3 +11,19 @@
|
||||||
assets:
|
assets:
|
||||||
- "{{ assets_server }}/sso/7.6.0/rh-sso-7.6.0-server-dist.zip"
|
- "{{ assets_server }}/sso/7.6.0/rh-sso-7.6.0-server-dist.zip"
|
||||||
- "{{ assets_server }}/sso/7.6.1/rh-sso-7.6.1-patch.zip"
|
- "{{ assets_server }}/sso/7.6.1/rh-sso-7.6.1-patch.zip"
|
||||||
|
|
||||||
|
- name: Create controller directory for downloads
|
||||||
|
ansible.builtin.file: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
|
path: /tmp/keycloak
|
||||||
|
state: directory
|
||||||
|
mode: '0750'
|
||||||
|
delegate_to: localhost
|
||||||
|
run_once: true
|
||||||
|
|
||||||
|
- name: Download keycloak archive to controller directory
|
||||||
|
ansible.builtin.get_url: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
|
url: https://github.com/keycloak/keycloak/releases/download/26.0.7/keycloak-26.0.7.zip
|
||||||
|
dest: /tmp/keycloak
|
||||||
|
mode: '0640'
|
||||||
|
delegate_to: localhost
|
||||||
|
run_once: true
|
||||||
|
|
|
@ -2,10 +2,9 @@
|
||||||
- name: Verify
|
- name: Verify
|
||||||
hosts: all
|
hosts: all
|
||||||
vars:
|
vars:
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
keycloak_jvm_package: java-11-openjdk-headless
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
keycloak_port: http://localhost:8080
|
keycloak_uri: "http://localhost:8080"
|
||||||
keycloak_management_port: http://localhost:9990
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: Populate service facts
|
- name: Populate service facts
|
||||||
ansible.builtin.service_facts:
|
ansible.builtin.service_facts:
|
||||||
|
@ -14,14 +13,11 @@
|
||||||
that:
|
that:
|
||||||
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
- name: Verify we are running on requested jvm
|
|
||||||
shell: |
|
|
||||||
ps -ef | grep /usr/lib/jvm/java-11 | grep -v grep
|
|
||||||
- name: Verify token api call
|
- name: Verify token api call
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "{{ keycloak_port }}/auth/realms/master/protocol/openid-connect/token"
|
url: "{{ keycloak_uri }}/realms/master/protocol/openid-connect/token"
|
||||||
method: POST
|
method: POST
|
||||||
body: "client_id=admin-cli&username=admin&password={{ keycloak_admin_password }}&grant_type=password"
|
body: "client_id=admin-cli&username={{ keycloak_quarkus_bootstrap_admin_user }}&password={{ keycloak_quarkus_bootstrap_admin_user }}&grant_type=password"
|
||||||
validate_certs: no
|
validate_certs: no
|
||||||
register: keycloak_auth_response
|
register: keycloak_auth_response
|
||||||
until: keycloak_auth_response.status == 200
|
until: keycloak_auth_response.status == 200
|
||||||
|
|
16
molecule/https_revproxy/converge.yml
Normal file
16
molecule/https_revproxy/converge.yml
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
---
|
||||||
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_show_deprecation_warnings: false
|
||||||
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
|
keycloak_quarkus_hostname: https://proxy
|
||||||
|
keycloak_quarkus_log: file
|
||||||
|
keycloak_quarkus_http_enabled: True
|
||||||
|
keycloak_quarkus_http_port: 8080
|
||||||
|
keycloak_quarkus_proxy_mode: edge
|
||||||
|
keycloak_quarkus_http_relative_path: /
|
||||||
|
keycloak_quarkus_health_check_url: http://proxy:8080/realms/master/.well-known/openid-configuration
|
||||||
|
roles:
|
||||||
|
- role: keycloak_quarkus
|
57
molecule/https_revproxy/molecule.yml
Normal file
57
molecule/https_revproxy/molecule.yml
Normal file
|
@ -0,0 +1,57 @@
|
||||||
|
---
|
||||||
|
driver:
|
||||||
|
name: docker
|
||||||
|
platforms:
|
||||||
|
- name: instance
|
||||||
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
|
pre_build_image: true
|
||||||
|
privileged: true
|
||||||
|
command: "/usr/sbin/init"
|
||||||
|
networks:
|
||||||
|
- name: keycloak
|
||||||
|
port_bindings:
|
||||||
|
- "8080/tcp"
|
||||||
|
published_ports:
|
||||||
|
- 0.0.0.0:8080:8080/tcp
|
||||||
|
- name: proxy
|
||||||
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
|
pre_build_image: true
|
||||||
|
privileged: true
|
||||||
|
command: "/usr/sbin/init"
|
||||||
|
networks:
|
||||||
|
- name: keycloak
|
||||||
|
port_bindings:
|
||||||
|
- "443/tcp"
|
||||||
|
published_ports:
|
||||||
|
- 0.0.0.0:443:443/tcp
|
||||||
|
provisioner:
|
||||||
|
name: ansible
|
||||||
|
config_options:
|
||||||
|
defaults:
|
||||||
|
interpreter_python: auto_silent
|
||||||
|
ssh_connection:
|
||||||
|
pipelining: false
|
||||||
|
playbooks:
|
||||||
|
prepare: prepare.yml
|
||||||
|
converge: converge.yml
|
||||||
|
verify: verify.yml
|
||||||
|
inventory:
|
||||||
|
host_vars:
|
||||||
|
localhost:
|
||||||
|
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
||||||
|
env:
|
||||||
|
ANSIBLE_FORCE_COLOR: "true"
|
||||||
|
verifier:
|
||||||
|
name: ansible
|
||||||
|
scenario:
|
||||||
|
test_sequence:
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
||||||
|
- create
|
||||||
|
- prepare
|
||||||
|
- converge
|
||||||
|
- idempotence
|
||||||
|
- side_effect
|
||||||
|
- verify
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
49
molecule/https_revproxy/prepare.yml
Normal file
49
molecule/https_revproxy/prepare.yml
Normal file
|
@ -0,0 +1,49 @@
|
||||||
|
---
|
||||||
|
- name: Prepare
|
||||||
|
hosts: all
|
||||||
|
tasks:
|
||||||
|
- name: Install sudo
|
||||||
|
ansible.builtin.dnf:
|
||||||
|
name: sudo
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: "Display hera_home if defined."
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|
||||||
|
- name: Prepare proxy
|
||||||
|
hosts: proxy
|
||||||
|
vars:
|
||||||
|
nginx_proxy: |
|
||||||
|
location / {
|
||||||
|
proxy_set_header Host $host;
|
||||||
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
proxy_pass http://instance:8080;
|
||||||
|
}
|
||||||
|
roles:
|
||||||
|
- elan.simple_nginx_reverse_proxy
|
||||||
|
pre_tasks:
|
||||||
|
- name: Create certificate request
|
||||||
|
ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=proxy'
|
||||||
|
delegate_to: localhost
|
||||||
|
changed_when: false
|
||||||
|
- name: Make certificate directory
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /etc/nginx/tls
|
||||||
|
state: directory
|
||||||
|
mode: 0755
|
||||||
|
- name: Copy certificates
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: "{{ item.name }}"
|
||||||
|
dest: "{{ item.dest }}"
|
||||||
|
mode: 0444
|
||||||
|
become: true
|
||||||
|
loop:
|
||||||
|
- { name: 'cert.pem', dest: '/etc/nginx/tls/certificate.crt' }
|
||||||
|
- { name: 'key.pem', dest: '/etc/nginx/tls/certificate.key' }
|
||||||
|
- name: Update CA trust
|
||||||
|
ansible.builtin.command: update-ca-trust
|
||||||
|
changed_when: false
|
||||||
|
become: true
|
1
molecule/https_revproxy/roles
Symbolic link
1
molecule/https_revproxy/roles
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
../../roles
|
28
molecule/https_revproxy/verify.yml
Normal file
28
molecule/https_revproxy/verify.yml
Normal file
|
@ -0,0 +1,28 @@
|
||||||
|
---
|
||||||
|
- name: Verify
|
||||||
|
hosts: instance
|
||||||
|
tasks:
|
||||||
|
- name: Populate service facts
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
|
- name: Check if keycloak service started
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
|
||||||
|
- name: Verify openid config
|
||||||
|
block:
|
||||||
|
- name: Fetch openID config # noqa blocked_modules command-instead-of-module
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: http://localhost:8080/realms/master/.well-known/openid-configuration
|
||||||
|
validate_certs: false
|
||||||
|
headers:
|
||||||
|
Host: proxy
|
||||||
|
register: openid_config
|
||||||
|
changed_when: False
|
||||||
|
- name: Verify endpoint URLs
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- openid_config.json['issuer'] == 'https://proxy/realms/master'
|
||||||
|
- openid_config.json['authorization_endpoint'] == 'https://proxy/realms/master/protocol/openid-connect/auth'
|
|
@ -6,38 +6,6 @@
|
||||||
keycloak_config_override_template: custom.xml.j2
|
keycloak_config_override_template: custom.xml.j2
|
||||||
keycloak_http_port: 8081
|
keycloak_http_port: 8081
|
||||||
keycloak_management_http_port: 19990
|
keycloak_management_http_port: 19990
|
||||||
|
keycloak_service_runas: True
|
||||||
roles:
|
roles:
|
||||||
- role: keycloak
|
- role: keycloak
|
||||||
tasks:
|
|
||||||
- name: Keycloak Realm Role
|
|
||||||
ansible.builtin.include_role:
|
|
||||||
name: keycloak_realm
|
|
||||||
vars:
|
|
||||||
keycloak_client_default_roles:
|
|
||||||
- TestRoleAdmin
|
|
||||||
- TestRoleUser
|
|
||||||
keycloak_client_users:
|
|
||||||
- username: TestUser
|
|
||||||
password: password
|
|
||||||
client_roles:
|
|
||||||
- client: TestClient
|
|
||||||
role: TestRoleUser
|
|
||||||
realm: "{{ keycloak_realm }}"
|
|
||||||
- username: TestAdmin
|
|
||||||
password: password
|
|
||||||
client_roles:
|
|
||||||
- client: TestClient
|
|
||||||
role: TestRoleUser
|
|
||||||
realm: "{{ keycloak_realm }}"
|
|
||||||
- client: TestClient
|
|
||||||
role: TestRoleAdmin
|
|
||||||
realm: "{{ keycloak_realm }}"
|
|
||||||
keycloak_realm: TestRealm
|
|
||||||
keycloak_clients:
|
|
||||||
- name: TestClient
|
|
||||||
roles: "{{ keycloak_client_default_roles }}"
|
|
||||||
realm: "{{ keycloak_realm }}"
|
|
||||||
public_client: "{{ keycloak_client_public }}"
|
|
||||||
web_origins: "{{ keycloak_client_web_origins }}"
|
|
||||||
users: "{{ keycloak_client_users }}"
|
|
||||||
client_id: TestClient
|
|
||||||
|
|
|
@ -1,15 +1,9 @@
|
||||||
---
|
---
|
||||||
dependency:
|
|
||||||
name: shell
|
|
||||||
command: ansible-galaxy collection install -r molecule/requirements.yml -p $HOME/.ansible/collections --force-with-deps
|
|
||||||
driver:
|
driver:
|
||||||
name: docker
|
name: docker
|
||||||
lint: |
|
|
||||||
ansible-lint --version
|
|
||||||
ansible-lint -v
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: instance
|
- name: instance
|
||||||
image: registry.access.redhat.com/ubi8/ubi-init:latest
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
pre_build_image: true
|
pre_build_image: true
|
||||||
privileged: true
|
privileged: true
|
||||||
command: "/usr/sbin/init"
|
command: "/usr/sbin/init"
|
||||||
|
@ -17,6 +11,7 @@ platforms:
|
||||||
- "8080/tcp"
|
- "8080/tcp"
|
||||||
- "8443/tcp"
|
- "8443/tcp"
|
||||||
- "8009/tcp"
|
- "8009/tcp"
|
||||||
|
- "9000/tcp"
|
||||||
provisioner:
|
provisioner:
|
||||||
name: ansible
|
name: ansible
|
||||||
config_options:
|
config_options:
|
||||||
|
@ -38,11 +33,8 @@ verifier:
|
||||||
name: ansible
|
name: ansible
|
||||||
scenario:
|
scenario:
|
||||||
test_sequence:
|
test_sequence:
|
||||||
- dependency
|
|
||||||
- lint
|
|
||||||
- cleanup
|
- cleanup
|
||||||
- destroy
|
- destroy
|
||||||
- syntax
|
|
||||||
- create
|
- create
|
||||||
- prepare
|
- prepare
|
||||||
- converge
|
- converge
|
||||||
|
|
|
@ -1,6 +1,9 @@
|
||||||
---
|
---
|
||||||
- name: Prepare
|
- name: Prepare
|
||||||
hosts: all
|
hosts: all
|
||||||
|
gather_facts: yes
|
||||||
|
vars:
|
||||||
|
sudo_pkg_name: sudo
|
||||||
tasks:
|
tasks:
|
||||||
- name: "Run preparation common to all scenario"
|
- name: "Run preparation common to all scenario"
|
||||||
ansible.builtin.include_tasks: ../prepare.yml
|
ansible.builtin.include_tasks: ../prepare.yml
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
<?xml version='1.0' encoding='UTF-8'?>
|
<?xml version='1.0' encoding='UTF-8'?>
|
||||||
<!-- {{ ansible_managed }} -->
|
<!-- this is a custom file -->
|
||||||
<server xmlns="urn:jboss:domain:16.0">
|
<server xmlns="urn:jboss:domain:16.0">
|
||||||
<extensions>
|
<extensions>
|
||||||
<extension module="org.jboss.as.clustering.infinispan"/>
|
<extension module="org.jboss.as.clustering.infinispan"/>
|
||||||
|
@ -44,7 +44,7 @@
|
||||||
</audit-log>
|
</audit-log>
|
||||||
<management-interfaces>
|
<management-interfaces>
|
||||||
<http-interface http-authentication-factory="management-http-authentication">
|
<http-interface http-authentication-factory="management-http-authentication">
|
||||||
<http-upgrade enabled="true"/>
|
<http-upgrade enabled="true" sasl-authentication-factory="management-sasl-authentication"/>
|
||||||
<socket-binding http="management-http"/>
|
<socket-binding http="management-http"/>
|
||||||
</http-interface>
|
</http-interface>
|
||||||
</management-interfaces>
|
</management-interfaces>
|
||||||
|
@ -481,8 +481,8 @@
|
||||||
<default-provider>default</default-provider>
|
<default-provider>default</default-provider>
|
||||||
<provider name="default" enabled="true">
|
<provider name="default" enabled="true">
|
||||||
<properties>
|
<properties>
|
||||||
<property name="frontendUrl" value="{{ keycloak_modcluster.frontend_url }}"/>
|
<property name="frontendUrl" value="${keycloak.frontendUrl:}"/>
|
||||||
<property name="forceBackendUrlToFrontendUrl" value="true"/>
|
<property name="forceBackendUrlToFrontendUrl" value="false"/>
|
||||||
</properties>
|
</properties>
|
||||||
</provider>
|
</provider>
|
||||||
</spi>
|
</spi>
|
||||||
|
@ -520,7 +520,8 @@
|
||||||
<subsystem xmlns="urn:jboss:domain:undertow:12.0" default-server="default-server" default-virtual-host="default-host" default-servlet-container="default" default-security-domain="other" statistics-enabled="${wildfly.undertow.statistics-enabled:${wildfly.statistics-enabled:false}}">
|
<subsystem xmlns="urn:jboss:domain:undertow:12.0" default-server="default-server" default-virtual-host="default-host" default-servlet-container="default" default-security-domain="other" statistics-enabled="${wildfly.undertow.statistics-enabled:${wildfly.statistics-enabled:false}}">
|
||||||
<buffer-cache name="default"/>
|
<buffer-cache name="default"/>
|
||||||
<server name="default-server">
|
<server name="default-server">
|
||||||
<http-listener name="default" socket-binding="http"/>
|
<http-listener name="default" socket-binding="http" redirect-socket="https" enable-http2="true"/>
|
||||||
|
<https-listener name="https" socket-binding="https" ssl-context="applicationSSC" enable-http2="true"/>
|
||||||
<host name="default-host" alias="localhost">
|
<host name="default-host" alias="localhost">
|
||||||
<location name="/" handler="welcome-content"/>
|
<location name="/" handler="welcome-content"/>
|
||||||
<http-invoker http-authentication-factory="application-http-authentication"/>
|
<http-invoker http-authentication-factory="application-http-authentication"/>
|
||||||
|
@ -533,20 +534,25 @@
|
||||||
<handlers>
|
<handlers>
|
||||||
<file name="welcome-content" path="${jboss.home.dir}/welcome-content"/>
|
<file name="welcome-content" path="${jboss.home.dir}/welcome-content"/>
|
||||||
</handlers>
|
</handlers>
|
||||||
|
<application-security-domains>
|
||||||
|
<application-security-domain name="other" security-domain="ApplicationDomain"/>
|
||||||
|
</application-security-domains>
|
||||||
</subsystem>
|
</subsystem>
|
||||||
<subsystem xmlns="urn:jboss:domain:weld:4.0"/>
|
<subsystem xmlns="urn:jboss:domain:weld:4.0"/>
|
||||||
</profile>
|
</profile>
|
||||||
<interfaces>
|
<interfaces>
|
||||||
<interface name="management">
|
<interface name="management">
|
||||||
<inet-address value="${jboss.bind.address.management:127.0.0.1}"/>
|
<inet-address value="127.0.0.1"/>
|
||||||
</interface>
|
</interface>
|
||||||
<interface name="public">
|
<interface name="public">
|
||||||
<inet-address value="${jboss.bind.address:127.0.0.1}"/>
|
<inet-address value="127.0.0.1"/>
|
||||||
</interface>
|
</interface>
|
||||||
</interfaces>
|
</interfaces>
|
||||||
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:0}">
|
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:0}">
|
||||||
<socket-binding name="http" port="8081"/>
|
<socket-binding name="http" port="8081"/>
|
||||||
|
<socket-binding name="https" port="8443"/>
|
||||||
<socket-binding name="management-http" interface="management" port="19990"/>
|
<socket-binding name="management-http" interface="management" port="19990"/>
|
||||||
|
<socket-binding name="management-https" interface="management" port="19991"/>
|
||||||
<socket-binding name="txn-recovery-environment" port="4712"/>
|
<socket-binding name="txn-recovery-environment" port="4712"/>
|
||||||
<socket-binding name="txn-status-manager" port="4713"/>
|
<socket-binding name="txn-status-manager" port="4713"/>
|
||||||
<outbound-socket-binding name="mail-smtp">
|
<outbound-socket-binding name="mail-smtp">
|
||||||
|
|
|
@ -1,6 +1,10 @@
|
||||||
---
|
---
|
||||||
- name: Verify
|
- name: Verify
|
||||||
hosts: all
|
hosts: all
|
||||||
|
vars:
|
||||||
|
keycloak_uri: "http://localhost:8081"
|
||||||
|
keycloak_management_port: "http://localhost:19990"
|
||||||
|
keycloak_admin_password: "remembertochangeme"
|
||||||
tasks:
|
tasks:
|
||||||
- name: Populate service facts
|
- name: Populate service facts
|
||||||
ansible.builtin.service_facts:
|
ansible.builtin.service_facts:
|
||||||
|
@ -9,3 +13,20 @@
|
||||||
that:
|
that:
|
||||||
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
- name: Verify we are running on requested jvm # noqa blocked_modules command-instead-of-module
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
|
ps -ef | grep '/etc/alternatives/jre_1.8.0/' | grep -v grep
|
||||||
|
args:
|
||||||
|
executable: /bin/bash
|
||||||
|
changed_when: no
|
||||||
|
- name: Verify token api call
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "{{ keycloak_uri }}/auth/realms/master/protocol/openid-connect/token"
|
||||||
|
method: POST
|
||||||
|
body: "client_id=admin-cli&username=admin&password={{ keycloak_admin_password }}&grant_type=password"
|
||||||
|
validate_certs: no
|
||||||
|
register: keycloak_auth_response
|
||||||
|
until: keycloak_auth_response.status == 200
|
||||||
|
retries: 2
|
||||||
|
delay: 2
|
||||||
|
|
|
@ -3,10 +3,31 @@
|
||||||
ansible.builtin.debug:
|
ansible.builtin.debug:
|
||||||
msg: "Ansible version is {{ ansible_version.full }}"
|
msg: "Ansible version is {{ ansible_version.full }}"
|
||||||
|
|
||||||
- name: Install sudo
|
- name: "Set package name for sudo"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
sudo_pkg_name: sudo
|
||||||
|
|
||||||
|
- name: "Ensure {{ sudo_pkg_name }} is installed (if user is root)."
|
||||||
|
ansible.builtin.yum:
|
||||||
|
name: "{{ sudo_pkg_name }}"
|
||||||
|
state: present
|
||||||
|
when:
|
||||||
|
- ansible_user_id == 'root'
|
||||||
|
|
||||||
|
- name: Gather the package facts
|
||||||
|
ansible.builtin.package_facts:
|
||||||
|
manager: auto
|
||||||
|
|
||||||
|
- name: "Check if sudo is installed."
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- sudo_pkg_name in ansible_facts.packages
|
||||||
|
fail_msg: "sudo is not installed on target system"
|
||||||
|
|
||||||
|
- name: "Install iproute"
|
||||||
|
become: true
|
||||||
ansible.builtin.yum:
|
ansible.builtin.yum:
|
||||||
name:
|
name:
|
||||||
- sudo
|
|
||||||
- iproute
|
- iproute
|
||||||
state: present
|
state: present
|
||||||
|
|
||||||
|
@ -14,15 +35,24 @@
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
assets_server: "{{ lookup('env', 'MIDDLEWARE_DOWNLOAD_RELEASE_SERVER_URL') }}"
|
assets_server: "{{ lookup('env', 'MIDDLEWARE_DOWNLOAD_RELEASE_SERVER_URL') }}"
|
||||||
|
|
||||||
- name: "Download and deploy jws zips from {{ assets_server }}"
|
- name: "Download artefacts only if assets_server is set"
|
||||||
|
when:
|
||||||
|
- assets_server is defined
|
||||||
|
- assets_server | length > 0
|
||||||
|
- assets is defined
|
||||||
|
- assets | length > 0
|
||||||
|
block:
|
||||||
|
- name: "Set offline when assets server from env is defined"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
sso_offline_install: True
|
||||||
|
|
||||||
|
- name: "Download and deploy zips from {{ assets_server }}"
|
||||||
ansible.builtin.get_url:
|
ansible.builtin.get_url:
|
||||||
url: "{{ asset }}"
|
url: "{{ asset }}"
|
||||||
dest: "{{ lookup('env', 'PWD') }}"
|
dest: "{{ lookup('env', 'PWD') }}"
|
||||||
validate_certs: no
|
validate_certs: no
|
||||||
|
mode: '0644'
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
loop: "{{ assets }}"
|
loop: "{{ assets }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
loop_var: asset
|
loop_var: asset
|
||||||
when:
|
|
||||||
- assets_server is defined
|
|
||||||
- assets_server | length > 0
|
|
||||||
|
|
48
molecule/quarkus-devmode/converge.yml
Normal file
48
molecule/quarkus-devmode/converge.yml
Normal file
|
@ -0,0 +1,48 @@
|
||||||
|
---
|
||||||
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_show_deprecation_warnings: false
|
||||||
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
|
keycloak_realm: TestRealm
|
||||||
|
keycloak_quarkus_log: file
|
||||||
|
keycloak_quarkus_hostname: 'http://localhost:8080'
|
||||||
|
keycloak_quarkus_start_dev: True
|
||||||
|
keycloak_quarkus_proxy_mode: none
|
||||||
|
keycloak_quarkus_java_home: /opt/openjdk/
|
||||||
|
roles:
|
||||||
|
- role: keycloak_quarkus
|
||||||
|
- role: keycloak_realm
|
||||||
|
keycloak_url: "{{ keycloak_quarkus_hostname }}"
|
||||||
|
keycloak_context: ''
|
||||||
|
keycloak_admin_user: "{{ keycloak_quarkus_bootstrap_admin_user }}"
|
||||||
|
keycloak_admin_password: "{{ keycloak_quarkus_bootstrap_admin_password }}"
|
||||||
|
keycloak_client_default_roles:
|
||||||
|
- TestRoleAdmin
|
||||||
|
- TestRoleUser
|
||||||
|
keycloak_client_users:
|
||||||
|
- username: TestUser
|
||||||
|
password: password
|
||||||
|
client_roles:
|
||||||
|
- client: TestClient
|
||||||
|
role: TestRoleUser
|
||||||
|
realm: "{{ keycloak_realm }}"
|
||||||
|
- username: TestAdmin
|
||||||
|
password: password
|
||||||
|
client_roles:
|
||||||
|
- client: TestClient
|
||||||
|
role: TestRoleUser
|
||||||
|
realm: "{{ keycloak_realm }}"
|
||||||
|
- client: TestClient
|
||||||
|
role: TestRoleAdmin
|
||||||
|
realm: "{{ keycloak_realm }}"
|
||||||
|
keycloak_realm: TestRealm
|
||||||
|
keycloak_clients:
|
||||||
|
- name: TestClient
|
||||||
|
roles: "{{ keycloak_client_default_roles }}"
|
||||||
|
realm: "{{ keycloak_realm }}"
|
||||||
|
public_client: "{{ keycloak_client_public }}"
|
||||||
|
web_origins: "{{ keycloak_client_web_origins }}"
|
||||||
|
users: "{{ keycloak_client_users }}"
|
||||||
|
client_id: TestClient
|
47
molecule/quarkus-devmode/molecule.yml
Normal file
47
molecule/quarkus-devmode/molecule.yml
Normal file
|
@ -0,0 +1,47 @@
|
||||||
|
---
|
||||||
|
driver:
|
||||||
|
name: docker
|
||||||
|
platforms:
|
||||||
|
- name: instance
|
||||||
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
|
pre_build_image: true
|
||||||
|
privileged: true
|
||||||
|
command: "/usr/sbin/init"
|
||||||
|
port_bindings:
|
||||||
|
- "8080/tcp"
|
||||||
|
- "8009/tcp"
|
||||||
|
- "9000/tcp"
|
||||||
|
published_ports:
|
||||||
|
- 0.0.0.0:8080:8080/tcp
|
||||||
|
- 0.0.0.0:9000:9000/TCP
|
||||||
|
provisioner:
|
||||||
|
name: ansible
|
||||||
|
config_options:
|
||||||
|
defaults:
|
||||||
|
interpreter_python: auto_silent
|
||||||
|
ssh_connection:
|
||||||
|
pipelining: false
|
||||||
|
playbooks:
|
||||||
|
prepare: prepare.yml
|
||||||
|
converge: converge.yml
|
||||||
|
verify: verify.yml
|
||||||
|
inventory:
|
||||||
|
host_vars:
|
||||||
|
localhost:
|
||||||
|
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
||||||
|
env:
|
||||||
|
ANSIBLE_FORCE_COLOR: "true"
|
||||||
|
verifier:
|
||||||
|
name: ansible
|
||||||
|
scenario:
|
||||||
|
test_sequence:
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
||||||
|
- create
|
||||||
|
- prepare
|
||||||
|
- converge
|
||||||
|
- idempotence
|
||||||
|
- side_effect
|
||||||
|
- verify
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
49
molecule/quarkus-devmode/prepare.yml
Normal file
49
molecule/quarkus-devmode/prepare.yml
Normal file
|
@ -0,0 +1,49 @@
|
||||||
|
---
|
||||||
|
- name: Prepare
|
||||||
|
hosts: all
|
||||||
|
tasks:
|
||||||
|
- name: Install sudo
|
||||||
|
ansible.builtin.apt:
|
||||||
|
name:
|
||||||
|
- sudo
|
||||||
|
- openjdk-17-jdk-headless
|
||||||
|
state: present
|
||||||
|
when:
|
||||||
|
- ansible_facts.os_family == 'Debian'
|
||||||
|
|
||||||
|
- name: "Ensure common prepare phase are set."
|
||||||
|
ansible.builtin.include_tasks: ../prepare.yml
|
||||||
|
|
||||||
|
- name: Install JDK17
|
||||||
|
become: yes
|
||||||
|
ansible.builtin.yum:
|
||||||
|
name:
|
||||||
|
- java-17-openjdk-headless
|
||||||
|
state: present
|
||||||
|
when:
|
||||||
|
- ansible_facts.os_family == 'RedHat'
|
||||||
|
|
||||||
|
- name: Link default logs directory
|
||||||
|
become: yes
|
||||||
|
ansible.builtin.file:
|
||||||
|
state: link
|
||||||
|
src: "{{ item }}"
|
||||||
|
dest: /opt/openjdk
|
||||||
|
force: true
|
||||||
|
with_fileglob:
|
||||||
|
- /usr/lib/jvm/java-17-openjdk*
|
||||||
|
when:
|
||||||
|
- ansible_facts.os_family == "Debian"
|
||||||
|
|
||||||
|
- name: Link default logs directory
|
||||||
|
ansible.builtin.file:
|
||||||
|
state: link
|
||||||
|
src: /usr/lib/jvm/jre-17-openjdk
|
||||||
|
dest: /opt/openjdk
|
||||||
|
force: true
|
||||||
|
when:
|
||||||
|
- ansible_facts.os_family == "RedHat"
|
||||||
|
|
||||||
|
- name: "Display hera_home if defined."
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
1
molecule/quarkus-devmode/roles
Symbolic link
1
molecule/quarkus-devmode/roles
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
../../roles
|
47
molecule/quarkus-devmode/verify.yml
Normal file
47
molecule/quarkus-devmode/verify.yml
Normal file
|
@ -0,0 +1,47 @@
|
||||||
|
---
|
||||||
|
- name: Verify
|
||||||
|
hosts: all
|
||||||
|
tasks:
|
||||||
|
- name: Populate service facts
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
|
- name: Check if keycloak service started
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
|
||||||
|
- name: Verify we are running on requested JAVA_HOME # noqa blocked_modules command-instead-of-module
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
|
ps -ef | grep '/opt/openjdk' | grep -v grep
|
||||||
|
args:
|
||||||
|
executable: /bin/bash
|
||||||
|
changed_when: False
|
||||||
|
|
||||||
|
- name: Set internal envvar
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|
||||||
|
- name: Verify openid config
|
||||||
|
block:
|
||||||
|
- name: Fetch openID config # noqa blocked_modules command-instead-of-module
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
|
curl http://localhost:8080/realms/master/.well-known/openid-configuration -k | jq .
|
||||||
|
args:
|
||||||
|
executable: /bin/bash
|
||||||
|
delegate_to: localhost
|
||||||
|
register: openid_config
|
||||||
|
changed_when: False
|
||||||
|
- name: Verify endpoint URLs
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- (openid_config.stdout | from_json)["backchannel_authentication_endpoint"] == 'http://localhost:8080/realms/master/protocol/openid-connect/ext/ciba/auth'
|
||||||
|
- (openid_config.stdout | from_json)['issuer'] == 'http://localhost:8080/realms/master'
|
||||||
|
- (openid_config.stdout | from_json)['authorization_endpoint'] == 'http://localhost:8080/realms/master/protocol/openid-connect/auth'
|
||||||
|
- (openid_config.stdout | from_json)['token_endpoint'] == 'http://localhost:8080/realms/master/protocol/openid-connect/token'
|
||||||
|
delegate_to: localhost
|
||||||
|
when:
|
||||||
|
- hera_home is defined
|
||||||
|
- hera_home | length == 0
|
|
@ -2,19 +2,60 @@
|
||||||
- name: Converge
|
- name: Converge
|
||||||
hosts: all
|
hosts: all
|
||||||
vars:
|
vars:
|
||||||
keycloak_quarkus_admin_pass: "remembertochangeme"
|
keycloak_quarkus_show_deprecation_warnings: false
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
keycloak_realm: TestRealm
|
keycloak_realm: TestRealm
|
||||||
keycloak_quarkus_host: instance
|
keycloak_quarkus_hostname: https://instance:8443
|
||||||
keycloak_quarkus_http_relative_path: ''
|
|
||||||
keycloak_quarkus_log: file
|
keycloak_quarkus_log: file
|
||||||
keycloak_quarkus_https_enabled: True
|
keycloak_quarkus_log_level: debug # needed for the verify step
|
||||||
keycloak_quarkus_key_file: "{{ keycloak.home }}/conf/key.pem"
|
keycloak_quarkus_https_key_file_enabled: true
|
||||||
keycloak_quarkus_cert_file: "{{ keycloak.home }}/conf/cert.pem"
|
keycloak_quarkus_key_file_copy_enabled: true
|
||||||
|
keycloak_quarkus_key_content: "{{ lookup('file', 'key.pem') }}"
|
||||||
|
keycloak_quarkus_cert_file_copy_enabled: true
|
||||||
|
keycloak_quarkus_cert_file_src: cert.pem
|
||||||
|
keycloak_quarkus_log_target: /tmp/keycloak
|
||||||
|
keycloak_quarkus_ks_vault_enabled: true
|
||||||
|
keycloak_quarkus_ks_vault_file: "/opt/keycloak/vault/keystore.p12"
|
||||||
|
keycloak_quarkus_ks_vault_pass: keystorepassword
|
||||||
|
keycloak_quarkus_systemd_wait_for_port: true
|
||||||
|
keycloak_quarkus_systemd_wait_for_timeout: 20
|
||||||
|
keycloak_quarkus_systemd_wait_for_delay: 2
|
||||||
|
keycloak_quarkus_systemd_wait_for_log: true
|
||||||
|
keycloak_quarkus_restart_health_check: false # would fail because of self-signed cert
|
||||||
|
keycloak_quarkus_providers:
|
||||||
|
- id: http-client
|
||||||
|
spi: connections
|
||||||
|
default: true
|
||||||
|
restart: true
|
||||||
|
properties:
|
||||||
|
- key: default-connection-pool-size
|
||||||
|
value: 10
|
||||||
|
- id: spid-saml
|
||||||
|
url: https://github.com/italia/spid-keycloak-provider/releases/download/24.0.2/spid-provider.jar
|
||||||
|
- id: keycloak-kerberos-federation
|
||||||
|
maven:
|
||||||
|
repository_url: https://repo1.maven.org/maven2/ # https://mvnrepository.com/artifact/org.keycloak/keycloak-kerberos-federation/24.0.4
|
||||||
|
group_id: org.keycloak
|
||||||
|
artifact_id: keycloak-kerberos-federation
|
||||||
|
version: 26.0.7 # optional
|
||||||
|
# username: myUser # optional
|
||||||
|
# password: myPAT # optional
|
||||||
|
# - id: my-static-theme
|
||||||
|
# local_path: /tmp/my-static-theme.jar
|
||||||
|
keycloak_quarkus_policies:
|
||||||
|
- name: "xato-net-10-million-passwords.txt"
|
||||||
|
url: "https://github.com/danielmiessler/SecLists/raw/master/Passwords/xato-net-10-million-passwords.txt"
|
||||||
|
- name: "xato-net-10-million-passwords-10.txt"
|
||||||
|
url: "https://github.com/danielmiessler/SecLists/raw/master/Passwords/xato-net-10-million-passwords-10.txt"
|
||||||
|
type: password-blacklists
|
||||||
roles:
|
roles:
|
||||||
- role: keycloak_quarkus
|
- role: keycloak_quarkus
|
||||||
- role: keycloak_realm
|
- role: keycloak_realm
|
||||||
|
keycloak_url: http://instance:8080
|
||||||
keycloak_context: ''
|
keycloak_context: ''
|
||||||
|
keycloak_admin_user: "{{ keycloak_quarkus_bootstrap_admin_user }}"
|
||||||
|
keycloak_admin_password: "{{ keycloak_quarkus_bootstrap_admin_password }}"
|
||||||
keycloak_client_default_roles:
|
keycloak_client_default_roles:
|
||||||
- TestRoleAdmin
|
- TestRoleAdmin
|
||||||
- TestRoleUser
|
- TestRoleUser
|
||||||
|
|
|
@ -1,15 +1,9 @@
|
||||||
---
|
---
|
||||||
dependency:
|
|
||||||
name: shell
|
|
||||||
command: ansible-galaxy collection install -r molecule/requirements.yml -p $HOME/.ansible/collections --force-with-deps
|
|
||||||
driver:
|
driver:
|
||||||
name: docker
|
name: docker
|
||||||
lint: |
|
|
||||||
ansible-lint --version
|
|
||||||
ansible-lint -v
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: instance
|
- name: instance
|
||||||
image: registry.access.redhat.com/ubi8/ubi-init:latest
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
pre_build_image: true
|
pre_build_image: true
|
||||||
privileged: true
|
privileged: true
|
||||||
command: "/usr/sbin/init"
|
command: "/usr/sbin/init"
|
||||||
|
@ -17,6 +11,7 @@ platforms:
|
||||||
- "8080/tcp"
|
- "8080/tcp"
|
||||||
- "8443/tcp"
|
- "8443/tcp"
|
||||||
- "8009/tcp"
|
- "8009/tcp"
|
||||||
|
- "9000/tcp"
|
||||||
published_ports:
|
published_ports:
|
||||||
- 0.0.0.0:8443:8443/tcp
|
- 0.0.0.0:8443:8443/tcp
|
||||||
provisioner:
|
provisioner:
|
||||||
|
@ -36,15 +31,13 @@ provisioner:
|
||||||
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
||||||
env:
|
env:
|
||||||
ANSIBLE_FORCE_COLOR: "true"
|
ANSIBLE_FORCE_COLOR: "true"
|
||||||
|
PYTHONHTTPSVERIFY: 0
|
||||||
verifier:
|
verifier:
|
||||||
name: ansible
|
name: ansible
|
||||||
scenario:
|
scenario:
|
||||||
test_sequence:
|
test_sequence:
|
||||||
- dependency
|
|
||||||
- lint
|
|
||||||
- cleanup
|
- cleanup
|
||||||
- destroy
|
- destroy
|
||||||
- syntax
|
|
||||||
- create
|
- create
|
||||||
- prepare
|
- prepare
|
||||||
- converge
|
- converge
|
||||||
|
|
|
@ -2,37 +2,43 @@
|
||||||
- name: Prepare
|
- name: Prepare
|
||||||
hosts: all
|
hosts: all
|
||||||
tasks:
|
tasks:
|
||||||
- name: Install sudo
|
|
||||||
ansible.builtin.yum:
|
|
||||||
name: sudo
|
|
||||||
state: present
|
|
||||||
|
|
||||||
- name: "Display hera_home if defined."
|
- name: "Display hera_home if defined."
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|
||||||
- ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=instance'
|
- name: "Ensure common prepare phase are set."
|
||||||
delegate_to: localhost
|
ansible.builtin.include_tasks: ../prepare.yml
|
||||||
|
|
||||||
- block:
|
- name: Create certificate request
|
||||||
- ansible.builtin.lineinfile:
|
ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=instance'
|
||||||
dest: /etc/hosts
|
|
||||||
line: "127.0.0.1 instance"
|
|
||||||
state: present
|
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
become: yes
|
changed_when: false
|
||||||
when:
|
|
||||||
- hera_home is defined
|
|
||||||
- hera_home | length == 0
|
|
||||||
|
|
||||||
- ansible.builtin.file:
|
- name: Create vault directory
|
||||||
|
become: true
|
||||||
|
ansible.builtin.file:
|
||||||
state: directory
|
state: directory
|
||||||
path: /opt/keycloak/keycloak-18.0.0/conf/
|
path: "/opt/keycloak/vault"
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
- ansible.builtin.copy:
|
- name: Make sure a jre is available (for keytool to prepare keystore)
|
||||||
src: "{{ item }}"
|
delegate_to: localhost
|
||||||
dest: "/opt/keycloak/keycloak-18.0.0/conf/{{ item }}"
|
ansible.builtin.package:
|
||||||
mode: 0444
|
name: "{{ 'java-21-openjdk-headless' if hera_home | length > 0 else 'openjdk-21-jdk-headless' }}"
|
||||||
loop:
|
state: present
|
||||||
- cert.pem
|
become: true
|
||||||
- key.pem
|
failed_when: false
|
||||||
|
|
||||||
|
- name: Create vault keystore
|
||||||
|
ansible.builtin.command: keytool -importpass -alias TestRealm_testalias -keystore keystore.p12 -storepass keystorepassword
|
||||||
|
delegate_to: localhost
|
||||||
|
register: keytool_cmd
|
||||||
|
changed_when: False
|
||||||
|
failed_when: not 'already exists' in keytool_cmd.stdout and keytool_cmd.rc != 0
|
||||||
|
|
||||||
|
- name: Copy certificates and vault
|
||||||
|
become: true
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: keystore.p12
|
||||||
|
dest: /opt/keycloak/vault/keystore.p12
|
||||||
|
mode: '0444'
|
||||||
|
|
|
@ -1,35 +1,128 @@
|
||||||
---
|
---
|
||||||
- name: Verify
|
- name: Verify
|
||||||
hosts: all
|
hosts: all
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
tasks:
|
tasks:
|
||||||
- name: Populate service facts
|
- name: Populate service facts
|
||||||
ansible.builtin.service_facts:
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
- name: Check if keycloak service started
|
- name: Check if keycloak service started
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
fail_msg: "Service not running"
|
||||||
|
|
||||||
- set_fact:
|
- name: Set internal envvar
|
||||||
|
ansible.builtin.set_fact:
|
||||||
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|
||||||
- block:
|
- name: Verify openid config
|
||||||
- name: Fetch openID config
|
|
||||||
shell: |
|
|
||||||
curl https://instance:8443/realms/master/.well-known/openid-configuration -k | jq .
|
|
||||||
delegate_to: localhost
|
|
||||||
register: openid_config
|
|
||||||
- debug:
|
|
||||||
msg: " {{ openid_config.stdout | from_json }}"
|
|
||||||
delegate_to: localhost
|
|
||||||
- name: Verify endpoint URLs
|
|
||||||
assert:
|
|
||||||
that:
|
|
||||||
- (openid_config.stdout | from_json)["backchannel_authentication_endpoint"] == 'https://instance/realms/master/protocol/openid-connect/ext/ciba/auth'
|
|
||||||
- (openid_config.stdout | from_json)['issuer'] == 'https://instance/realms/master'
|
|
||||||
- (openid_config.stdout | from_json)['authorization_endpoint'] == 'https://instance/realms/master/protocol/openid-connect/auth'
|
|
||||||
- (openid_config.stdout | from_json)['token_endpoint'] == 'https://instance/realms/master/protocol/openid-connect/token'
|
|
||||||
delegate_to: localhost
|
|
||||||
when:
|
when:
|
||||||
- hera_home is defined
|
- hera_home is defined
|
||||||
- hera_home | length == 0
|
- hera_home | length == 0
|
||||||
|
block:
|
||||||
|
- name: Fetch openID config # noqa blocked_modules command-instead-of-module
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
|
curl -H 'Host: instance' https://localhost:8443/realms/master/.well-known/openid-configuration -k | jq .
|
||||||
|
args:
|
||||||
|
executable: /bin/bash
|
||||||
|
delegate_to: localhost
|
||||||
|
register: openid_config
|
||||||
|
changed_when: False
|
||||||
|
- name: Verify endpoint URLs
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- (openid_config.stdout | from_json)["backchannel_authentication_endpoint"] == 'https://instance:8443/realms/master/protocol/openid-connect/ext/ciba/auth'
|
||||||
|
- (openid_config.stdout | from_json)['issuer'] == 'https://instance:8443/realms/master'
|
||||||
|
- (openid_config.stdout | from_json)['authorization_endpoint'] == 'https://instance:8443/realms/master/protocol/openid-connect/auth'
|
||||||
|
- (openid_config.stdout | from_json)['token_endpoint'] == 'https://instance:8443/realms/master/protocol/openid-connect/token'
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: Check log folder
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: /tmp/keycloak
|
||||||
|
register: keycloak_log_folder
|
||||||
|
|
||||||
|
- name: Check that keycloak log folder exists and is a link
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- keycloak_log_folder.stat.exists
|
||||||
|
- not keycloak_log_folder.stat.isdir
|
||||||
|
- keycloak_log_folder.stat.islnk
|
||||||
|
fail_msg: "Service log symlink not correctly created"
|
||||||
|
|
||||||
|
- name: Check log file
|
||||||
|
become: true
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: /tmp/keycloak/keycloak.log
|
||||||
|
register: keycloak_log_file
|
||||||
|
|
||||||
|
- name: Check if keycloak file exists
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- keycloak_log_file.stat.exists
|
||||||
|
- not keycloak_log_file.stat.isdir
|
||||||
|
|
||||||
|
- name: Check default log folder
|
||||||
|
become: yes
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: /var/log/keycloak
|
||||||
|
register: keycloak_default_log_folder
|
||||||
|
failed_when: false
|
||||||
|
|
||||||
|
- name: Check that default keycloak log folder doesn't exist
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- not keycloak_default_log_folder.stat.exists
|
||||||
|
|
||||||
|
- name: Verify vault SPI in logfile
|
||||||
|
become: true
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
|
zgrep 'Configured KeystoreVaultProviderFactory with the keystore file' /opt/keycloak/keycloak-*/data/log/keycloak.log*zip
|
||||||
|
changed_when: false
|
||||||
|
failed_when: slurped_log.rc != 0
|
||||||
|
register: slurped_log
|
||||||
|
|
||||||
|
- name: Verify token api call
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "https://instance:8443/realms/master/protocol/openid-connect/token"
|
||||||
|
method: POST
|
||||||
|
body: "client_id=admin-cli&username={{ keycloak_quarkus_bootstrap_admin_user }}&password={{ keycloak_quarkus_bootstrap_admin_password}}&grant_type=password"
|
||||||
|
validate_certs: no
|
||||||
|
register: keycloak_auth_response
|
||||||
|
until: keycloak_auth_response.status == 200
|
||||||
|
retries: 2
|
||||||
|
delay: 2
|
||||||
|
|
||||||
|
- name: "Get Clients"
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "https://instance:8443/admin/realms/TestRealm/clients"
|
||||||
|
validate_certs: false
|
||||||
|
headers:
|
||||||
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
|
register: keycloak_clients
|
||||||
|
|
||||||
|
- name: Get client uuid
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
keycloak_client_uuid: "{{ ((keycloak_clients.json | selectattr('clientId', '==', 'TestClient')) | first).id }}"
|
||||||
|
|
||||||
|
- name: "Get Client {{ keycloak_client_uuid }}"
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}"
|
||||||
|
validate_certs: false
|
||||||
|
headers:
|
||||||
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
|
register: keycloak_test_client
|
||||||
|
|
||||||
|
- name: "Get Client roles"
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "https://instance:8443/admin/realms/TestRealm/clients/{{ keycloak_client_uuid }}/roles"
|
||||||
|
validate_certs: false
|
||||||
|
headers:
|
||||||
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
|
register: keycloak_test_client_roles
|
||||||
|
|
29
molecule/quarkus_ha/converge.yml
Normal file
29
molecule/quarkus_ha/converge.yml
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
---
|
||||||
|
- name: Converge
|
||||||
|
hosts: keycloak
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_show_deprecation_warnings: false
|
||||||
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_bootstrap_admin_user: "remembertochangeme"
|
||||||
|
keycloak_quarkus_hostname: "http://{{ inventory_hostname }}:8080"
|
||||||
|
keycloak_quarkus_log: file
|
||||||
|
keycloak_quarkus_log_level: info
|
||||||
|
keycloak_quarkus_https_key_file_enabled: true
|
||||||
|
keycloak_quarkus_key_file_copy_enabled: true
|
||||||
|
keycloak_quarkus_key_content: "{{ lookup('file', inventory_hostname + '.key') }}"
|
||||||
|
keycloak_quarkus_cert_file_copy_enabled: true
|
||||||
|
keycloak_quarkus_cert_file_src: "{{ inventory_hostname }}.pem"
|
||||||
|
keycloak_quarkus_ks_vault_enabled: true
|
||||||
|
keycloak_quarkus_ks_vault_file: "/opt/keycloak/vault/keystore.p12"
|
||||||
|
keycloak_quarkus_ks_vault_pass: keystorepassword
|
||||||
|
keycloak_quarkus_systemd_wait_for_port: true
|
||||||
|
keycloak_quarkus_systemd_wait_for_timeout: 20
|
||||||
|
keycloak_quarkus_systemd_wait_for_delay: 2
|
||||||
|
keycloak_quarkus_systemd_wait_for_log: true
|
||||||
|
keycloak_quarkus_ha_enabled: true
|
||||||
|
keycloak_quarkus_restart_strategy: restart/serial.yml
|
||||||
|
keycloak_quarkus_db_user: keycloak
|
||||||
|
keycloak_quarkus_db_pass: mysecretpass
|
||||||
|
keycloak_quarkus_db_url: jdbc:postgresql://postgres:5432/keycloak
|
||||||
|
roles:
|
||||||
|
- role: keycloak_quarkus
|
82
molecule/quarkus_ha/molecule.yml
Normal file
82
molecule/quarkus_ha/molecule.yml
Normal file
|
@ -0,0 +1,82 @@
|
||||||
|
---
|
||||||
|
driver:
|
||||||
|
name: docker
|
||||||
|
platforms:
|
||||||
|
- name: instance1
|
||||||
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
|
pre_build_image: true
|
||||||
|
privileged: true
|
||||||
|
command: "/usr/sbin/init"
|
||||||
|
groups:
|
||||||
|
- keycloak
|
||||||
|
networks:
|
||||||
|
- name: rhbk
|
||||||
|
port_bindings:
|
||||||
|
- "8080/tcp"
|
||||||
|
- "8443/tcp"
|
||||||
|
- "9000/tcp"
|
||||||
|
- name: instance2
|
||||||
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
|
pre_build_image: true
|
||||||
|
privileged: true
|
||||||
|
command: "/usr/sbin/init"
|
||||||
|
groups:
|
||||||
|
- keycloak
|
||||||
|
networks:
|
||||||
|
- name: rhbk
|
||||||
|
port_bindings:
|
||||||
|
- "8080/tcp"
|
||||||
|
- "8443/tcp"
|
||||||
|
- "9000/tcp"
|
||||||
|
- name: postgres
|
||||||
|
image: ubuntu/postgres:14-22.04_beta
|
||||||
|
pre_build_image: true
|
||||||
|
privileged: true
|
||||||
|
command: postgres
|
||||||
|
groups:
|
||||||
|
- database
|
||||||
|
networks:
|
||||||
|
- name: rhbk
|
||||||
|
port_bindings:
|
||||||
|
- "5432/tcp"
|
||||||
|
mounts:
|
||||||
|
- type: bind
|
||||||
|
target: /etc/postgresql/postgresql.conf
|
||||||
|
source: ${PWD}/molecule/quarkus_ha/postgresql/postgresql.conf
|
||||||
|
env:
|
||||||
|
POSTGRES_USER: keycloak
|
||||||
|
POSTGRES_PASSWORD: mysecretpass
|
||||||
|
POSTGRES_DB: keycloak
|
||||||
|
POSTGRES_HOST_AUTH_METHOD: trust
|
||||||
|
provisioner:
|
||||||
|
name: ansible
|
||||||
|
config_options:
|
||||||
|
defaults:
|
||||||
|
interpreter_python: auto_silent
|
||||||
|
ssh_connection:
|
||||||
|
pipelining: false
|
||||||
|
playbooks:
|
||||||
|
prepare: prepare.yml
|
||||||
|
converge: converge.yml
|
||||||
|
verify: verify.yml
|
||||||
|
inventory:
|
||||||
|
host_vars:
|
||||||
|
localhost:
|
||||||
|
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
||||||
|
env:
|
||||||
|
ANSIBLE_FORCE_COLOR: "true"
|
||||||
|
PYTHONHTTPSVERIFY: 0
|
||||||
|
verifier:
|
||||||
|
name: ansible
|
||||||
|
scenario:
|
||||||
|
test_sequence:
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
||||||
|
- create
|
||||||
|
- prepare
|
||||||
|
- converge
|
||||||
|
- idempotence
|
||||||
|
- side_effect
|
||||||
|
- verify
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
750
molecule/quarkus_ha/postgresql/postgresql.conf
Normal file
750
molecule/quarkus_ha/postgresql/postgresql.conf
Normal file
|
@ -0,0 +1,750 @@
|
||||||
|
# -----------------------------
|
||||||
|
# PostgreSQL configuration file
|
||||||
|
# -----------------------------
|
||||||
|
#
|
||||||
|
# This file consists of lines of the form:
|
||||||
|
#
|
||||||
|
# name = value
|
||||||
|
#
|
||||||
|
# (The "=" is optional.) Whitespace may be used. Comments are introduced with
|
||||||
|
# "#" anywhere on a line. The complete list of parameter names and allowed
|
||||||
|
# values can be found in the PostgreSQL documentation.
|
||||||
|
#
|
||||||
|
# The commented-out settings shown in this file represent the default values.
|
||||||
|
# Re-commenting a setting is NOT sufficient to revert it to the default value;
|
||||||
|
# you need to reload the server.
|
||||||
|
#
|
||||||
|
# This file is read on server startup and when the server receives a SIGHUP
|
||||||
|
# signal. If you edit the file on a running system, you have to SIGHUP the
|
||||||
|
# server for the changes to take effect, run "pg_ctl reload", or execute
|
||||||
|
# "SELECT pg_reload_conf()". Some parameters, which are marked below,
|
||||||
|
# require a server shutdown and restart to take effect.
|
||||||
|
#
|
||||||
|
# Any parameter can also be given as a command-line option to the server, e.g.,
|
||||||
|
# "postgres -c log_connections=on". Some parameters can be changed at run time
|
||||||
|
# with the "SET" SQL command.
|
||||||
|
#
|
||||||
|
# Memory units: kB = kilobytes Time units: ms = milliseconds
|
||||||
|
# MB = megabytes s = seconds
|
||||||
|
# GB = gigabytes min = minutes
|
||||||
|
# TB = terabytes h = hours
|
||||||
|
# d = days
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# FILE LOCATIONS
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# The default values of these variables are driven from the -D command-line
|
||||||
|
# option or PGDATA environment variable, represented here as ConfigDir.
|
||||||
|
|
||||||
|
#data_directory = 'ConfigDir' # use data in another directory
|
||||||
|
# (change requires restart)
|
||||||
|
#hba_file = 'ConfigDir/pg_hba.conf' # host-based authentication file
|
||||||
|
# (change requires restart)
|
||||||
|
#ident_file = 'ConfigDir/pg_ident.conf' # ident configuration file
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
# If external_pid_file is not explicitly set, no extra PID file is written.
|
||||||
|
#external_pid_file = '' # write an extra PID file
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# CONNECTIONS AND AUTHENTICATION
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Connection Settings -
|
||||||
|
|
||||||
|
listen_addresses = '*' # what IP address(es) to listen on;
|
||||||
|
# comma-separated list of addresses;
|
||||||
|
# defaults to 'localhost'; use '*' for all
|
||||||
|
# (change requires restart)
|
||||||
|
#port = 5432 # (change requires restart)
|
||||||
|
#max_connections = 100 # (change requires restart)
|
||||||
|
#superuser_reserved_connections = 3 # (change requires restart)
|
||||||
|
#unix_socket_directories = '/tmp' # comma-separated list of directories
|
||||||
|
# (change requires restart)
|
||||||
|
#unix_socket_group = '' # (change requires restart)
|
||||||
|
#unix_socket_permissions = 0777 # begin with 0 to use octal notation
|
||||||
|
# (change requires restart)
|
||||||
|
#bonjour = off # advertise server via Bonjour
|
||||||
|
# (change requires restart)
|
||||||
|
#bonjour_name = '' # defaults to the computer name
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
# - TCP settings -
|
||||||
|
# see "man 7 tcp" for details
|
||||||
|
|
||||||
|
#tcp_keepalives_idle = 0 # TCP_KEEPIDLE, in seconds;
|
||||||
|
# 0 selects the system default
|
||||||
|
#tcp_keepalives_interval = 0 # TCP_KEEPINTVL, in seconds;
|
||||||
|
# 0 selects the system default
|
||||||
|
#tcp_keepalives_count = 0 # TCP_KEEPCNT;
|
||||||
|
# 0 selects the system default
|
||||||
|
#tcp_user_timeout = 0 # TCP_USER_TIMEOUT, in milliseconds;
|
||||||
|
# 0 selects the system default
|
||||||
|
|
||||||
|
# - Authentication -
|
||||||
|
|
||||||
|
#authentication_timeout = 1min # 1s-600s
|
||||||
|
#password_encryption = md5 # md5 or scram-sha-256
|
||||||
|
#db_user_namespace = off
|
||||||
|
|
||||||
|
# GSSAPI using Kerberos
|
||||||
|
#krb_server_keyfile = ''
|
||||||
|
#krb_caseins_users = off
|
||||||
|
|
||||||
|
# - SSL -
|
||||||
|
|
||||||
|
#ssl = off
|
||||||
|
#ssl_ca_file = ''
|
||||||
|
#ssl_cert_file = 'server.crt'
|
||||||
|
#ssl_crl_file = ''
|
||||||
|
#ssl_key_file = 'server.key'
|
||||||
|
#ssl_ciphers = 'HIGH:MEDIUM:+3DES:!aNULL' # allowed SSL ciphers
|
||||||
|
#ssl_prefer_server_ciphers = on
|
||||||
|
#ssl_ecdh_curve = 'prime256v1'
|
||||||
|
#ssl_min_protocol_version = 'TLSv1'
|
||||||
|
#ssl_max_protocol_version = ''
|
||||||
|
#ssl_dh_params_file = ''
|
||||||
|
#ssl_passphrase_command = ''
|
||||||
|
#ssl_passphrase_command_supports_reload = off
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# RESOURCE USAGE (except WAL)
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Memory -
|
||||||
|
|
||||||
|
#shared_buffers = 32MB # min 128kB
|
||||||
|
# (change requires restart)
|
||||||
|
#huge_pages = try # on, off, or try
|
||||||
|
# (change requires restart)
|
||||||
|
#temp_buffers = 8MB # min 800kB
|
||||||
|
#max_prepared_transactions = 0 # zero disables the feature
|
||||||
|
# (change requires restart)
|
||||||
|
# Caution: it is not advisable to set max_prepared_transactions nonzero unless
|
||||||
|
# you actively intend to use prepared transactions.
|
||||||
|
#work_mem = 4MB # min 64kB
|
||||||
|
#maintenance_work_mem = 64MB # min 1MB
|
||||||
|
#autovacuum_work_mem = -1 # min 1MB, or -1 to use maintenance_work_mem
|
||||||
|
#max_stack_depth = 2MB # min 100kB
|
||||||
|
#shared_memory_type = mmap # the default is the first option
|
||||||
|
# supported by the operating system:
|
||||||
|
# mmap
|
||||||
|
# sysv
|
||||||
|
# windows
|
||||||
|
# (change requires restart)
|
||||||
|
#dynamic_shared_memory_type = posix # the default is the first option
|
||||||
|
# supported by the operating system:
|
||||||
|
# posix
|
||||||
|
# sysv
|
||||||
|
# windows
|
||||||
|
# mmap
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
# - Disk -
|
||||||
|
|
||||||
|
#temp_file_limit = -1 # limits per-process temp file space
|
||||||
|
# in kB, or -1 for no limit
|
||||||
|
|
||||||
|
# - Kernel Resources -
|
||||||
|
|
||||||
|
#max_files_per_process = 1000 # min 25
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
# - Cost-Based Vacuum Delay -
|
||||||
|
|
||||||
|
#vacuum_cost_delay = 0 # 0-100 milliseconds (0 disables)
|
||||||
|
#vacuum_cost_page_hit = 1 # 0-10000 credits
|
||||||
|
#vacuum_cost_page_miss = 10 # 0-10000 credits
|
||||||
|
#vacuum_cost_page_dirty = 20 # 0-10000 credits
|
||||||
|
#vacuum_cost_limit = 200 # 1-10000 credits
|
||||||
|
|
||||||
|
# - Background Writer -
|
||||||
|
|
||||||
|
#bgwriter_delay = 200ms # 10-10000ms between rounds
|
||||||
|
#bgwriter_lru_maxpages = 100 # max buffers written/round, 0 disables
|
||||||
|
#bgwriter_lru_multiplier = 2.0 # 0-10.0 multiplier on buffers scanned/round
|
||||||
|
#bgwriter_flush_after = 0 # measured in pages, 0 disables
|
||||||
|
|
||||||
|
# - Asynchronous Behavior -
|
||||||
|
|
||||||
|
#effective_io_concurrency = 1 # 1-1000; 0 disables prefetching
|
||||||
|
#max_worker_processes = 8 # (change requires restart)
|
||||||
|
#max_parallel_maintenance_workers = 2 # taken from max_parallel_workers
|
||||||
|
#max_parallel_workers_per_gather = 2 # taken from max_parallel_workers
|
||||||
|
#parallel_leader_participation = on
|
||||||
|
#max_parallel_workers = 8 # maximum number of max_worker_processes that
|
||||||
|
# can be used in parallel operations
|
||||||
|
#old_snapshot_threshold = -1 # 1min-60d; -1 disables; 0 is immediate
|
||||||
|
# (change requires restart)
|
||||||
|
#backend_flush_after = 0 # measured in pages, 0 disables
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# WRITE-AHEAD LOG
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Settings -
|
||||||
|
|
||||||
|
#wal_level = replica # minimal, replica, or logical
|
||||||
|
# (change requires restart)
|
||||||
|
#fsync = on # flush data to disk for crash safety
|
||||||
|
# (turning this off can cause
|
||||||
|
# unrecoverable data corruption)
|
||||||
|
#synchronous_commit = on # synchronization level;
|
||||||
|
# off, local, remote_write, remote_apply, or on
|
||||||
|
#wal_sync_method = fsync # the default is the first option
|
||||||
|
# supported by the operating system:
|
||||||
|
# open_datasync
|
||||||
|
# fdatasync (default on Linux)
|
||||||
|
# fsync
|
||||||
|
# fsync_writethrough
|
||||||
|
# open_sync
|
||||||
|
#full_page_writes = on # recover from partial page writes
|
||||||
|
#wal_compression = off # enable compression of full-page writes
|
||||||
|
#wal_log_hints = off # also do full page writes of non-critical updates
|
||||||
|
# (change requires restart)
|
||||||
|
#wal_init_zero = on # zero-fill new WAL files
|
||||||
|
#wal_recycle = on # recycle WAL files
|
||||||
|
#wal_buffers = -1 # min 32kB, -1 sets based on shared_buffers
|
||||||
|
# (change requires restart)
|
||||||
|
#wal_writer_delay = 200ms # 1-10000 milliseconds
|
||||||
|
#wal_writer_flush_after = 1MB # measured in pages, 0 disables
|
||||||
|
|
||||||
|
#commit_delay = 0 # range 0-100000, in microseconds
|
||||||
|
#commit_siblings = 5 # range 1-1000
|
||||||
|
|
||||||
|
# - Checkpoints -
|
||||||
|
|
||||||
|
#checkpoint_timeout = 5min # range 30s-1d
|
||||||
|
#max_wal_size = 1GB
|
||||||
|
#min_wal_size = 80MB
|
||||||
|
#checkpoint_completion_target = 0.5 # checkpoint target duration, 0.0 - 1.0
|
||||||
|
#checkpoint_flush_after = 0 # measured in pages, 0 disables
|
||||||
|
#checkpoint_warning = 30s # 0 disables
|
||||||
|
|
||||||
|
# - Archiving -
|
||||||
|
|
||||||
|
#archive_mode = off # enables archiving; off, on, or always
|
||||||
|
# (change requires restart)
|
||||||
|
#archive_command = '' # command to use to archive a logfile segment
|
||||||
|
# placeholders: %p = path of file to archive
|
||||||
|
# %f = file name only
|
||||||
|
# e.g. 'test ! -f /mnt/server/archivedir/%f && cp %p /mnt/server/archivedir/%f'
|
||||||
|
#archive_timeout = 0 # force a logfile segment switch after this
|
||||||
|
# number of seconds; 0 disables
|
||||||
|
|
||||||
|
# - Archive Recovery -
|
||||||
|
|
||||||
|
# These are only used in recovery mode.
|
||||||
|
|
||||||
|
#restore_command = '' # command to use to restore an archived logfile segment
|
||||||
|
# placeholders: %p = path of file to restore
|
||||||
|
# %f = file name only
|
||||||
|
# e.g. 'cp /mnt/server/archivedir/%f %p'
|
||||||
|
# (change requires restart)
|
||||||
|
#archive_cleanup_command = '' # command to execute at every restartpoint
|
||||||
|
#recovery_end_command = '' # command to execute at completion of recovery
|
||||||
|
|
||||||
|
# - Recovery Target -
|
||||||
|
|
||||||
|
# Set these only when performing a targeted recovery.
|
||||||
|
|
||||||
|
#recovery_target = '' # 'immediate' to end recovery as soon as a
|
||||||
|
# consistent state is reached
|
||||||
|
# (change requires restart)
|
||||||
|
#recovery_target_name = '' # the named restore point to which recovery will proceed
|
||||||
|
# (change requires restart)
|
||||||
|
#recovery_target_time = '' # the time stamp up to which recovery will proceed
|
||||||
|
# (change requires restart)
|
||||||
|
#recovery_target_xid = '' # the transaction ID up to which recovery will proceed
|
||||||
|
# (change requires restart)
|
||||||
|
#recovery_target_lsn = '' # the WAL LSN up to which recovery will proceed
|
||||||
|
# (change requires restart)
|
||||||
|
#recovery_target_inclusive = on # Specifies whether to stop:
|
||||||
|
# just after the specified recovery target (on)
|
||||||
|
# just before the recovery target (off)
|
||||||
|
# (change requires restart)
|
||||||
|
#recovery_target_timeline = 'latest' # 'current', 'latest', or timeline ID
|
||||||
|
# (change requires restart)
|
||||||
|
#recovery_target_action = 'pause' # 'pause', 'promote', 'shutdown'
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# REPLICATION
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Sending Servers -
|
||||||
|
|
||||||
|
# Set these on the master and on any standby that will send replication data.
|
||||||
|
|
||||||
|
#max_wal_senders = 10 # max number of walsender processes
|
||||||
|
# (change requires restart)
|
||||||
|
#wal_keep_segments = 0 # in logfile segments; 0 disables
|
||||||
|
#wal_sender_timeout = 60s # in milliseconds; 0 disables
|
||||||
|
|
||||||
|
#max_replication_slots = 10 # max number of replication slots
|
||||||
|
# (change requires restart)
|
||||||
|
#track_commit_timestamp = off # collect timestamp of transaction commit
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
# - Master Server -
|
||||||
|
|
||||||
|
# These settings are ignored on a standby server.
|
||||||
|
|
||||||
|
#synchronous_standby_names = '' # standby servers that provide sync rep
|
||||||
|
# method to choose sync standbys, number of sync standbys,
|
||||||
|
# and comma-separated list of application_name
|
||||||
|
# from standby(s); '*' = all
|
||||||
|
#vacuum_defer_cleanup_age = 0 # number of xacts by which cleanup is delayed
|
||||||
|
|
||||||
|
# - Standby Servers -
|
||||||
|
|
||||||
|
# These settings are ignored on a master server.
|
||||||
|
|
||||||
|
#primary_conninfo = '' # connection string to sending server
|
||||||
|
# (change requires restart)
|
||||||
|
#primary_slot_name = '' # replication slot on sending server
|
||||||
|
# (change requires restart)
|
||||||
|
#promote_trigger_file = '' # file name whose presence ends recovery
|
||||||
|
#hot_standby = on # "off" disallows queries during recovery
|
||||||
|
# (change requires restart)
|
||||||
|
#max_standby_archive_delay = 30s # max delay before canceling queries
|
||||||
|
# when reading WAL from archive;
|
||||||
|
# -1 allows indefinite delay
|
||||||
|
#max_standby_streaming_delay = 30s # max delay before canceling queries
|
||||||
|
# when reading streaming WAL;
|
||||||
|
# -1 allows indefinite delay
|
||||||
|
#wal_receiver_status_interval = 10s # send replies at least this often
|
||||||
|
# 0 disables
|
||||||
|
#hot_standby_feedback = off # send info from standby to prevent
|
||||||
|
# query conflicts
|
||||||
|
#wal_receiver_timeout = 60s # time that receiver waits for
|
||||||
|
# communication from master
|
||||||
|
# in milliseconds; 0 disables
|
||||||
|
#wal_retrieve_retry_interval = 5s # time to wait before retrying to
|
||||||
|
# retrieve WAL after a failed attempt
|
||||||
|
#recovery_min_apply_delay = 0 # minimum delay for applying changes during recovery
|
||||||
|
|
||||||
|
# - Subscribers -
|
||||||
|
|
||||||
|
# These settings are ignored on a publisher.
|
||||||
|
|
||||||
|
#max_logical_replication_workers = 4 # taken from max_worker_processes
|
||||||
|
# (change requires restart)
|
||||||
|
#max_sync_workers_per_subscription = 2 # taken from max_logical_replication_workers
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# QUERY TUNING
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Planner Method Configuration -
|
||||||
|
|
||||||
|
#enable_bitmapscan = on
|
||||||
|
#enable_hashagg = on
|
||||||
|
#enable_hashjoin = on
|
||||||
|
#enable_indexscan = on
|
||||||
|
#enable_indexonlyscan = on
|
||||||
|
#enable_material = on
|
||||||
|
#enable_mergejoin = on
|
||||||
|
#enable_nestloop = on
|
||||||
|
#enable_parallel_append = on
|
||||||
|
#enable_seqscan = on
|
||||||
|
#enable_sort = on
|
||||||
|
#enable_tidscan = on
|
||||||
|
#enable_partitionwise_join = off
|
||||||
|
#enable_partitionwise_aggregate = off
|
||||||
|
#enable_parallel_hash = on
|
||||||
|
#enable_partition_pruning = on
|
||||||
|
|
||||||
|
# - Planner Cost Constants -
|
||||||
|
|
||||||
|
#seq_page_cost = 1.0 # measured on an arbitrary scale
|
||||||
|
#random_page_cost = 4.0 # same scale as above
|
||||||
|
#cpu_tuple_cost = 0.01 # same scale as above
|
||||||
|
#cpu_index_tuple_cost = 0.005 # same scale as above
|
||||||
|
#cpu_operator_cost = 0.0025 # same scale as above
|
||||||
|
#parallel_tuple_cost = 0.1 # same scale as above
|
||||||
|
#parallel_setup_cost = 1000.0 # same scale as above
|
||||||
|
|
||||||
|
#jit_above_cost = 100000 # perform JIT compilation if available
|
||||||
|
# and query more expensive than this;
|
||||||
|
# -1 disables
|
||||||
|
#jit_inline_above_cost = 500000 # inline small functions if query is
|
||||||
|
# more expensive than this; -1 disables
|
||||||
|
#jit_optimize_above_cost = 500000 # use expensive JIT optimizations if
|
||||||
|
# query is more expensive than this;
|
||||||
|
# -1 disables
|
||||||
|
|
||||||
|
#min_parallel_table_scan_size = 8MB
|
||||||
|
#min_parallel_index_scan_size = 512kB
|
||||||
|
#effective_cache_size = 4GB
|
||||||
|
|
||||||
|
# - Genetic Query Optimizer -
|
||||||
|
|
||||||
|
#geqo = on
|
||||||
|
#geqo_threshold = 12
|
||||||
|
#geqo_effort = 5 # range 1-10
|
||||||
|
#geqo_pool_size = 0 # selects default based on effort
|
||||||
|
#geqo_generations = 0 # selects default based on effort
|
||||||
|
#geqo_selection_bias = 2.0 # range 1.5-2.0
|
||||||
|
#geqo_seed = 0.0 # range 0.0-1.0
|
||||||
|
|
||||||
|
# - Other Planner Options -
|
||||||
|
|
||||||
|
#default_statistics_target = 100 # range 1-10000
|
||||||
|
#constraint_exclusion = partition # on, off, or partition
|
||||||
|
#cursor_tuple_fraction = 0.1 # range 0.0-1.0
|
||||||
|
#from_collapse_limit = 8
|
||||||
|
#join_collapse_limit = 8 # 1 disables collapsing of explicit
|
||||||
|
# JOIN clauses
|
||||||
|
#force_parallel_mode = off
|
||||||
|
#jit = on # allow JIT compilation
|
||||||
|
#plan_cache_mode = auto # auto, force_generic_plan or
|
||||||
|
# force_custom_plan
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# REPORTING AND LOGGING
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Where to Log -
|
||||||
|
|
||||||
|
#log_destination = 'stderr' # Valid values are combinations of
|
||||||
|
# stderr, csvlog, syslog, and eventlog,
|
||||||
|
# depending on platform. csvlog
|
||||||
|
# requires logging_collector to be on.
|
||||||
|
|
||||||
|
# This is used when logging to stderr:
|
||||||
|
#logging_collector = off # Enable capturing of stderr and csvlog
|
||||||
|
# into log files. Required to be on for
|
||||||
|
# csvlogs.
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
# These are only used if logging_collector is on:
|
||||||
|
#log_directory = 'log' # directory where log files are written,
|
||||||
|
# can be absolute or relative to PGDATA
|
||||||
|
#log_filename = 'postgresql-%Y-%m-%d_%H%M%S.log' # log file name pattern,
|
||||||
|
# can include strftime() escapes
|
||||||
|
#log_file_mode = 0600 # creation mode for log files,
|
||||||
|
# begin with 0 to use octal notation
|
||||||
|
#log_truncate_on_rotation = off # If on, an existing log file with the
|
||||||
|
# same name as the new log file will be
|
||||||
|
# truncated rather than appended to.
|
||||||
|
# But such truncation only occurs on
|
||||||
|
# time-driven rotation, not on restarts
|
||||||
|
# or size-driven rotation. Default is
|
||||||
|
# off, meaning append to existing files
|
||||||
|
# in all cases.
|
||||||
|
#log_rotation_age = 1d # Automatic rotation of logfiles will
|
||||||
|
# happen after that time. 0 disables.
|
||||||
|
#log_rotation_size = 10MB # Automatic rotation of logfiles will
|
||||||
|
# happen after that much log output.
|
||||||
|
# 0 disables.
|
||||||
|
|
||||||
|
# These are relevant when logging to syslog:
|
||||||
|
#syslog_facility = 'LOCAL0'
|
||||||
|
#syslog_ident = 'postgres'
|
||||||
|
#syslog_sequence_numbers = on
|
||||||
|
#syslog_split_messages = on
|
||||||
|
|
||||||
|
# This is only relevant when logging to eventlog (win32):
|
||||||
|
# (change requires restart)
|
||||||
|
#event_source = 'PostgreSQL'
|
||||||
|
|
||||||
|
# - When to Log -
|
||||||
|
|
||||||
|
#log_min_messages = warning # values in order of decreasing detail:
|
||||||
|
# debug5
|
||||||
|
# debug4
|
||||||
|
# debug3
|
||||||
|
# debug2
|
||||||
|
# debug1
|
||||||
|
# info
|
||||||
|
# notice
|
||||||
|
# warning
|
||||||
|
# error
|
||||||
|
# log
|
||||||
|
# fatal
|
||||||
|
# panic
|
||||||
|
|
||||||
|
#log_min_error_statement = error # values in order of decreasing detail:
|
||||||
|
# debug5
|
||||||
|
# debug4
|
||||||
|
# debug3
|
||||||
|
# debug2
|
||||||
|
# debug1
|
||||||
|
# info
|
||||||
|
# notice
|
||||||
|
# warning
|
||||||
|
# error
|
||||||
|
# log
|
||||||
|
# fatal
|
||||||
|
# panic (effectively off)
|
||||||
|
|
||||||
|
#log_min_duration_statement = -1 # -1 is disabled, 0 logs all statements
|
||||||
|
# and their durations, > 0 logs only
|
||||||
|
# statements running at least this number
|
||||||
|
# of milliseconds
|
||||||
|
|
||||||
|
#log_transaction_sample_rate = 0.0 # Fraction of transactions whose statements
|
||||||
|
# are logged regardless of their duration. 1.0 logs all
|
||||||
|
# statements from all transactions, 0.0 never logs.
|
||||||
|
|
||||||
|
# - What to Log -
|
||||||
|
|
||||||
|
#debug_print_parse = off
|
||||||
|
#debug_print_rewritten = off
|
||||||
|
#debug_print_plan = off
|
||||||
|
#debug_pretty_print = on
|
||||||
|
#log_checkpoints = off
|
||||||
|
#log_connections = off
|
||||||
|
#log_disconnections = off
|
||||||
|
#log_duration = off
|
||||||
|
#log_error_verbosity = default # terse, default, or verbose messages
|
||||||
|
#log_hostname = off
|
||||||
|
#log_line_prefix = '%m [%p] ' # special values:
|
||||||
|
# %a = application name
|
||||||
|
# %u = user name
|
||||||
|
# %d = database name
|
||||||
|
# %r = remote host and port
|
||||||
|
# %h = remote host
|
||||||
|
# %p = process ID
|
||||||
|
# %t = timestamp without milliseconds
|
||||||
|
# %m = timestamp with milliseconds
|
||||||
|
# %n = timestamp with milliseconds (as a Unix epoch)
|
||||||
|
# %i = command tag
|
||||||
|
# %e = SQL state
|
||||||
|
# %c = session ID
|
||||||
|
# %l = session line number
|
||||||
|
# %s = session start timestamp
|
||||||
|
# %v = virtual transaction ID
|
||||||
|
# %x = transaction ID (0 if none)
|
||||||
|
# %q = stop here in non-session
|
||||||
|
# processes
|
||||||
|
# %% = '%'
|
||||||
|
# e.g. '<%u%%%d> '
|
||||||
|
#log_lock_waits = off # log lock waits >= deadlock_timeout
|
||||||
|
#log_statement = 'none' # none, ddl, mod, all
|
||||||
|
#log_replication_commands = off
|
||||||
|
#log_temp_files = -1 # log temporary files equal or larger
|
||||||
|
# than the specified size in kilobytes;
|
||||||
|
# -1 disables, 0 logs all temp files
|
||||||
|
#log_timezone = 'GMT'
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# PROCESS TITLE
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
#cluster_name = '' # added to process titles if nonempty
|
||||||
|
# (change requires restart)
|
||||||
|
#update_process_title = on
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# STATISTICS
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Query and Index Statistics Collector -
|
||||||
|
|
||||||
|
#track_activities = on
|
||||||
|
#track_counts = on
|
||||||
|
#track_io_timing = off
|
||||||
|
#track_functions = none # none, pl, all
|
||||||
|
#track_activity_query_size = 1024 # (change requires restart)
|
||||||
|
#stats_temp_directory = 'pg_stat_tmp'
|
||||||
|
|
||||||
|
|
||||||
|
# - Monitoring -
|
||||||
|
|
||||||
|
#log_parser_stats = off
|
||||||
|
#log_planner_stats = off
|
||||||
|
#log_executor_stats = off
|
||||||
|
#log_statement_stats = off
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# AUTOVACUUM
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
#autovacuum = on # Enable autovacuum subprocess? 'on'
|
||||||
|
# requires track_counts to also be on.
|
||||||
|
#log_autovacuum_min_duration = -1 # -1 disables, 0 logs all actions and
|
||||||
|
# their durations, > 0 logs only
|
||||||
|
# actions running at least this number
|
||||||
|
# of milliseconds.
|
||||||
|
#autovacuum_max_workers = 3 # max number of autovacuum subprocesses
|
||||||
|
# (change requires restart)
|
||||||
|
#autovacuum_naptime = 1min # time between autovacuum runs
|
||||||
|
#autovacuum_vacuum_threshold = 50 # min number of row updates before
|
||||||
|
# vacuum
|
||||||
|
#autovacuum_analyze_threshold = 50 # min number of row updates before
|
||||||
|
# analyze
|
||||||
|
#autovacuum_vacuum_scale_factor = 0.2 # fraction of table size before vacuum
|
||||||
|
#autovacuum_analyze_scale_factor = 0.1 # fraction of table size before analyze
|
||||||
|
#autovacuum_freeze_max_age = 200000000 # maximum XID age before forced vacuum
|
||||||
|
# (change requires restart)
|
||||||
|
#autovacuum_multixact_freeze_max_age = 400000000 # maximum multixact age
|
||||||
|
# before forced vacuum
|
||||||
|
# (change requires restart)
|
||||||
|
#autovacuum_vacuum_cost_delay = 2ms # default vacuum cost delay for
|
||||||
|
# autovacuum, in milliseconds;
|
||||||
|
# -1 means use vacuum_cost_delay
|
||||||
|
#autovacuum_vacuum_cost_limit = -1 # default vacuum cost limit for
|
||||||
|
# autovacuum, -1 means use
|
||||||
|
# vacuum_cost_limit
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# CLIENT CONNECTION DEFAULTS
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Statement Behavior -
|
||||||
|
|
||||||
|
#client_min_messages = notice # values in order of decreasing detail:
|
||||||
|
# debug5
|
||||||
|
# debug4
|
||||||
|
# debug3
|
||||||
|
# debug2
|
||||||
|
# debug1
|
||||||
|
# log
|
||||||
|
# notice
|
||||||
|
# warning
|
||||||
|
# error
|
||||||
|
#search_path = '"$user", public' # schema names
|
||||||
|
#row_security = on
|
||||||
|
#default_tablespace = '' # a tablespace name, '' uses the default
|
||||||
|
#temp_tablespaces = '' # a list of tablespace names, '' uses
|
||||||
|
# only default tablespace
|
||||||
|
#default_table_access_method = 'heap'
|
||||||
|
#check_function_bodies = on
|
||||||
|
#default_transaction_isolation = 'read committed'
|
||||||
|
#default_transaction_read_only = off
|
||||||
|
#default_transaction_deferrable = off
|
||||||
|
#session_replication_role = 'origin'
|
||||||
|
#statement_timeout = 0 # in milliseconds, 0 is disabled
|
||||||
|
#lock_timeout = 0 # in milliseconds, 0 is disabled
|
||||||
|
#idle_in_transaction_session_timeout = 0 # in milliseconds, 0 is disabled
|
||||||
|
#vacuum_freeze_min_age = 50000000
|
||||||
|
#vacuum_freeze_table_age = 150000000
|
||||||
|
#vacuum_multixact_freeze_min_age = 5000000
|
||||||
|
#vacuum_multixact_freeze_table_age = 150000000
|
||||||
|
#vacuum_cleanup_index_scale_factor = 0.1 # fraction of total number of tuples
|
||||||
|
# before index cleanup, 0 always performs
|
||||||
|
# index cleanup
|
||||||
|
#bytea_output = 'hex' # hex, escape
|
||||||
|
#xmlbinary = 'base64'
|
||||||
|
#xmloption = 'content'
|
||||||
|
#gin_fuzzy_search_limit = 0
|
||||||
|
#gin_pending_list_limit = 4MB
|
||||||
|
|
||||||
|
# - Locale and Formatting -
|
||||||
|
|
||||||
|
#datestyle = 'iso, mdy'
|
||||||
|
#intervalstyle = 'postgres'
|
||||||
|
#timezone = 'GMT'
|
||||||
|
#timezone_abbreviations = 'Default' # Select the set of available time zone
|
||||||
|
# abbreviations. Currently, there are
|
||||||
|
# Default
|
||||||
|
# Australia (historical usage)
|
||||||
|
# India
|
||||||
|
# You can create your own file in
|
||||||
|
# share/timezonesets/.
|
||||||
|
#extra_float_digits = 1 # min -15, max 3; any value >0 actually
|
||||||
|
# selects precise output mode
|
||||||
|
#client_encoding = sql_ascii # actually, defaults to database
|
||||||
|
# encoding
|
||||||
|
|
||||||
|
# These settings are initialized by initdb, but they can be changed.
|
||||||
|
#lc_messages = 'C' # locale for system error message
|
||||||
|
# strings
|
||||||
|
#lc_monetary = 'C' # locale for monetary formatting
|
||||||
|
#lc_numeric = 'C' # locale for number formatting
|
||||||
|
#lc_time = 'C' # locale for time formatting
|
||||||
|
|
||||||
|
# default configuration for text search
|
||||||
|
#default_text_search_config = 'pg_catalog.simple'
|
||||||
|
|
||||||
|
# - Shared Library Preloading -
|
||||||
|
|
||||||
|
#shared_preload_libraries = '' # (change requires restart)
|
||||||
|
#local_preload_libraries = ''
|
||||||
|
#session_preload_libraries = ''
|
||||||
|
#jit_provider = 'llvmjit' # JIT library to use
|
||||||
|
|
||||||
|
# - Other Defaults -
|
||||||
|
|
||||||
|
#dynamic_library_path = '$libdir'
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# LOCK MANAGEMENT
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
#deadlock_timeout = 1s
|
||||||
|
#max_locks_per_transaction = 64 # min 10
|
||||||
|
# (change requires restart)
|
||||||
|
#max_pred_locks_per_transaction = 64 # min 10
|
||||||
|
# (change requires restart)
|
||||||
|
#max_pred_locks_per_relation = -2 # negative values mean
|
||||||
|
# (max_pred_locks_per_transaction
|
||||||
|
# / -max_pred_locks_per_relation) - 1
|
||||||
|
#max_pred_locks_per_page = 2 # min 0
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# VERSION AND PLATFORM COMPATIBILITY
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# - Previous PostgreSQL Versions -
|
||||||
|
|
||||||
|
#array_nulls = on
|
||||||
|
#backslash_quote = safe_encoding # on, off, or safe_encoding
|
||||||
|
#escape_string_warning = on
|
||||||
|
#lo_compat_privileges = off
|
||||||
|
#operator_precedence_warning = off
|
||||||
|
#quote_all_identifiers = off
|
||||||
|
#standard_conforming_strings = on
|
||||||
|
#synchronize_seqscans = on
|
||||||
|
|
||||||
|
# - Other Platforms and Clients -
|
||||||
|
|
||||||
|
#transform_null_equals = off
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# ERROR HANDLING
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
#exit_on_error = off # terminate session on any error?
|
||||||
|
#restart_after_crash = on # reinitialize after backend crash?
|
||||||
|
#data_sync_retry = off # retry or panic on failure to fsync
|
||||||
|
# data?
|
||||||
|
# (change requires restart)
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# CONFIG FILE INCLUDES
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# These options allow settings to be loaded from files other than the
|
||||||
|
# default postgresql.conf. Note that these are directives, not variable
|
||||||
|
# assignments, so they can usefully be given more than once.
|
||||||
|
|
||||||
|
#include_dir = '...' # include files ending in '.conf' from
|
||||||
|
# a directory, e.g., 'conf.d'
|
||||||
|
#include_if_exists = '...' # include file only if it exists
|
||||||
|
#include = '...' # include file
|
||||||
|
|
||||||
|
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
# CUSTOMIZED OPTIONS
|
||||||
|
#------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
# Add settings for extensions here
|
44
molecule/quarkus_ha/prepare.yml
Normal file
44
molecule/quarkus_ha/prepare.yml
Normal file
|
@ -0,0 +1,44 @@
|
||||||
|
---
|
||||||
|
- name: Prepare
|
||||||
|
hosts: keycloak
|
||||||
|
tasks:
|
||||||
|
- name: "Display hera_home if defined."
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|
||||||
|
- name: "Ensure common prepare phase are set."
|
||||||
|
ansible.builtin.include_tasks: ../prepare.yml
|
||||||
|
|
||||||
|
- name: Create certificate request
|
||||||
|
ansible.builtin.command: "openssl req -x509 -newkey rsa:4096 -keyout {{ inventory_hostname }}.key -out {{ inventory_hostname }}.pem -sha256 -days 365 -nodes -subj '/CN={{ inventory_hostname }}'"
|
||||||
|
delegate_to: localhost
|
||||||
|
changed_when: False
|
||||||
|
|
||||||
|
- name: Create vault directory
|
||||||
|
become: true
|
||||||
|
ansible.builtin.file:
|
||||||
|
state: directory
|
||||||
|
path: "/opt/keycloak/vault"
|
||||||
|
mode: 0755
|
||||||
|
|
||||||
|
- name: Make sure a jre is available (for keytool to prepare keystore)
|
||||||
|
delegate_to: localhost
|
||||||
|
ansible.builtin.package:
|
||||||
|
name: "{{ 'java-17-openjdk-headless' if hera_home | length > 0 else 'openjdk-17-jdk-headless' }}"
|
||||||
|
state: present
|
||||||
|
become: true
|
||||||
|
failed_when: false
|
||||||
|
|
||||||
|
- name: Create vault keystore
|
||||||
|
ansible.builtin.command: keytool -importpass -alias TestRealm_testalias -keystore keystore.p12 -storepass keystorepassword
|
||||||
|
delegate_to: localhost
|
||||||
|
register: keytool_cmd
|
||||||
|
changed_when: False
|
||||||
|
failed_when: not 'already exists' in keytool_cmd.stdout and keytool_cmd.rc != 0
|
||||||
|
|
||||||
|
- name: Copy certificates and vault
|
||||||
|
become: true
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: keystore.p12
|
||||||
|
dest: /opt/keycloak/vault/keystore.p12
|
||||||
|
mode: 0444
|
1
molecule/quarkus_ha/roles
Symbolic link
1
molecule/quarkus_ha/roles
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
../../roles
|
29
molecule/quarkus_ha/verify.yml
Normal file
29
molecule/quarkus_ha/verify.yml
Normal file
|
@ -0,0 +1,29 @@
|
||||||
|
---
|
||||||
|
- name: Verify
|
||||||
|
hosts: keycloak
|
||||||
|
tasks:
|
||||||
|
- name: Populate service facts
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
|
- name: Check if keycloak service started
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
fail_msg: "Service not running"
|
||||||
|
|
||||||
|
- name: Set internal envvar
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|
||||||
|
- name: Check log file
|
||||||
|
become: true
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: /var/log/keycloak/keycloak.log
|
||||||
|
register: keycloak_log_file
|
||||||
|
|
||||||
|
- name: Check if keycloak file exists
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- keycloak_log_file.stat.exists
|
||||||
|
- not keycloak_log_file.stat.isdir
|
10
molecule/quarkus_upgrade/converge.yml
Normal file
10
molecule/quarkus_upgrade/converge.yml
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
---
|
||||||
|
- name: Converge
|
||||||
|
hosts: all
|
||||||
|
vars_files:
|
||||||
|
- vars.yml
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_show_deprecation_warnings: false
|
||||||
|
keycloak_quarkus_version: 26.0.7
|
||||||
|
roles:
|
||||||
|
- role: keycloak_quarkus
|
45
molecule/quarkus_upgrade/molecule.yml
Normal file
45
molecule/quarkus_upgrade/molecule.yml
Normal file
|
@ -0,0 +1,45 @@
|
||||||
|
---
|
||||||
|
dependency:
|
||||||
|
name: galaxy
|
||||||
|
options:
|
||||||
|
requirements-file: molecule/requirements.yml
|
||||||
|
driver:
|
||||||
|
name: docker
|
||||||
|
platforms:
|
||||||
|
- name: instance
|
||||||
|
image: registry.access.redhat.com/ubi9/ubi-init:latest
|
||||||
|
command: "/usr/sbin/init"
|
||||||
|
pre_build_image: true
|
||||||
|
privileged: true
|
||||||
|
port_bindings:
|
||||||
|
- 8080:8080
|
||||||
|
- "9000/tcp"
|
||||||
|
published_ports:
|
||||||
|
- 0.0.0.0:8080:8080/TCP
|
||||||
|
- 0.0.0.0:9000:9000/TCP
|
||||||
|
provisioner:
|
||||||
|
name: ansible
|
||||||
|
playbooks:
|
||||||
|
prepare: prepare.yml
|
||||||
|
converge: converge.yml
|
||||||
|
verify: verify.yml
|
||||||
|
inventory:
|
||||||
|
host_vars:
|
||||||
|
localhost:
|
||||||
|
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
||||||
|
verifier:
|
||||||
|
name: ansible
|
||||||
|
scenario:
|
||||||
|
test_sequence:
|
||||||
|
- dependency
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
||||||
|
- syntax
|
||||||
|
- create
|
||||||
|
- prepare
|
||||||
|
- converge
|
||||||
|
- idempotence
|
||||||
|
- side_effect
|
||||||
|
- verify
|
||||||
|
- cleanup
|
||||||
|
- destroy
|
52
molecule/quarkus_upgrade/prepare.yml
Normal file
52
molecule/quarkus_upgrade/prepare.yml
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
---
|
||||||
|
- name: Prepare
|
||||||
|
hosts: all
|
||||||
|
vars_files:
|
||||||
|
- vars.yml
|
||||||
|
vars:
|
||||||
|
sudo_pkg_name: sudo
|
||||||
|
keycloak_quarkus_version: 24.0.5
|
||||||
|
pre_tasks:
|
||||||
|
- name: Install sudo
|
||||||
|
ansible.builtin.apt:
|
||||||
|
name:
|
||||||
|
- sudo
|
||||||
|
- openjdk-17-jdk-headless
|
||||||
|
state: present
|
||||||
|
when:
|
||||||
|
- ansible_facts.os_family == 'Debian'
|
||||||
|
|
||||||
|
- name: "Ensure common prepare phase are set."
|
||||||
|
ansible.builtin.include_tasks: ../prepare.yml
|
||||||
|
|
||||||
|
- name: Display Ansible version
|
||||||
|
ansible.builtin.debug:
|
||||||
|
msg: "Ansible version is {{ ansible_version.full }}"
|
||||||
|
|
||||||
|
- name: "Ensure {{ sudo_pkg_name }} is installed (if user is root)."
|
||||||
|
ansible.builtin.dnf:
|
||||||
|
name: "{{ sudo_pkg_name }}"
|
||||||
|
when:
|
||||||
|
- ansible_user_id == 'root'
|
||||||
|
|
||||||
|
- name: Gather the package facts
|
||||||
|
ansible.builtin.package_facts:
|
||||||
|
manager: auto
|
||||||
|
|
||||||
|
- name: "Check if {{ sudo_pkg_name }} is installed."
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- sudo_pkg_name in ansible_facts.packages
|
||||||
|
|
||||||
|
- name: Create certificate request
|
||||||
|
ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=instance'
|
||||||
|
delegate_to: localhost
|
||||||
|
changed_when: false
|
||||||
|
roles:
|
||||||
|
- role: keycloak_quarkus
|
||||||
|
post_tasks:
|
||||||
|
- name: "Delete custom fact"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /etc/ansible/facts.d/keycloak.fact
|
||||||
|
state: absent
|
||||||
|
become: true
|
1
molecule/quarkus_upgrade/roles
Symbolic link
1
molecule/quarkus_upgrade/roles
Symbolic link
|
@ -0,0 +1 @@
|
||||||
|
../../roles
|
13
molecule/quarkus_upgrade/vars.yml
Normal file
13
molecule/quarkus_upgrade/vars.yml
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
---
|
||||||
|
keycloak_quarkus_offline_install: false
|
||||||
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_realm: TestRealm
|
||||||
|
keycloak_quarkus_hostname: http://instance:8080
|
||||||
|
keycloak_quarkus_log: file
|
||||||
|
keycloak_quarkus_https_key_file_enabled: true
|
||||||
|
keycloak_quarkus_log_target: /tmp/keycloak
|
||||||
|
keycloak_quarkus_hostname_strict: false
|
||||||
|
keycloak_quarkus_cert_file_copy_enabled: true
|
||||||
|
keycloak_quarkus_key_file_copy_enabled: true
|
||||||
|
keycloak_quarkus_key_content: "{{ lookup('file', 'key.pem') }}"
|
||||||
|
keycloak_quarkus_cert_file_src: cert.pem
|
32
molecule/quarkus_upgrade/verify.yml
Normal file
32
molecule/quarkus_upgrade/verify.yml
Normal file
|
@ -0,0 +1,32 @@
|
||||||
|
---
|
||||||
|
- name: Verify
|
||||||
|
hosts: instance
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_port: http://localhost:8080
|
||||||
|
tasks:
|
||||||
|
- name: Populate service facts
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
|
||||||
|
- name: Check if keycloak service started
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
|
||||||
|
- name: Verify we are running on requested jvm
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -eo pipefail
|
||||||
|
ps -ef | grep 'etc/alternatives/.*21' | grep -v grep
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: Verify token api call
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "{{ keycloak_quarkus_port }}/realms/master/protocol/openid-connect/token"
|
||||||
|
method: POST
|
||||||
|
body: "client_id=admin-cli&username=admin&password={{ keycloak_quarkus_bootstrap_admin_password }}&grant_type=password"
|
||||||
|
validate_certs: no
|
||||||
|
register: keycloak_auth_response
|
||||||
|
until: keycloak_auth_response.status == 200
|
||||||
|
retries: 2
|
||||||
|
delay: 2
|
|
@ -1,8 +1,11 @@
|
||||||
---
|
---
|
||||||
collections:
|
collections:
|
||||||
- name: middleware_automation.common
|
- name: middleware_automation.common
|
||||||
|
- name: middleware_automation.jbcs
|
||||||
- name: community.general
|
- name: community.general
|
||||||
- name: ansible.posix
|
- name: ansible.posix
|
||||||
- name: community.docker
|
- name: community.docker
|
||||||
version: ">=1.9.1"
|
version: ">=3.8.0"
|
||||||
|
|
||||||
|
roles:
|
||||||
|
- name: elan.simple_nginx_reverse_proxy
|
||||||
|
|
|
@ -55,7 +55,7 @@
|
||||||
- TestClient1Admin
|
- TestClient1Admin
|
||||||
- TestClient1User
|
- TestClient1User
|
||||||
realm: "{{ keycloak_realm }}"
|
realm: "{{ keycloak_realm }}"
|
||||||
public_client: True
|
public_client: true
|
||||||
web_origins:
|
web_origins:
|
||||||
- http://testclient1origin/application
|
- http://testclient1origin/application
|
||||||
- http://testclient1origin/other
|
- http://testclient1origin/other
|
||||||
|
|
|
@ -1,13 +1,11 @@
|
||||||
---
|
---
|
||||||
- name: Playbook for Keycloak X Hosts
|
- name: Playbook for Keycloak X Hosts with HTTPS enabled
|
||||||
hosts: all
|
hosts: all
|
||||||
vars:
|
vars:
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
keycloak_quarkus_host: localhost:8443
|
keycloak_quarkus_hostname: http://localhost
|
||||||
keycloak_quarkus_http_relative_path: ''
|
keycloak_quarkus_port: 8443
|
||||||
keycloak_quarkus_log: file
|
keycloak_quarkus_log: file
|
||||||
keycloak_quarkus_https_enabled: True
|
keycloak_quarkus_proxy_mode: none
|
||||||
keycloak_quarkus_key_file: conf/key.pem
|
|
||||||
keycloak_quarkus_cert_file: conf/cert.pem
|
|
||||||
roles:
|
roles:
|
||||||
- middleware_automation.keycloak.keycloak_quarkus
|
- middleware_automation.keycloak.keycloak_quarkus
|
||||||
|
|
12
playbooks/keycloak_quarkus_dev.yml
Normal file
12
playbooks/keycloak_quarkus_dev.yml
Normal file
|
@ -0,0 +1,12 @@
|
||||||
|
---
|
||||||
|
- name: Playbook for Keycloak X Hosts in develop mode
|
||||||
|
hosts: all
|
||||||
|
vars:
|
||||||
|
keycloak_quarkus_bootstrap_admin_password: "remembertochangeme"
|
||||||
|
keycloak_quarkus_hostname: http://localhost
|
||||||
|
keycloak_quarkus_port: 8080
|
||||||
|
keycloak_quarkus_log: file
|
||||||
|
keycloak_quarkus_start_dev: true
|
||||||
|
keycloak_quarkus_proxy_mode: none
|
||||||
|
roles:
|
||||||
|
- middleware_automation.keycloak.keycloak_quarkus
|
|
@ -10,7 +10,7 @@
|
||||||
- TestClient1Admin
|
- TestClient1Admin
|
||||||
- TestClient1User
|
- TestClient1User
|
||||||
realm: TestRealm
|
realm: TestRealm
|
||||||
public_client: True
|
public_client: true
|
||||||
web_origins:
|
web_origins:
|
||||||
- http://testclient1origin/application
|
- http://testclient1origin/application
|
||||||
- http://testclient1origin/other
|
- http://testclient1origin/other
|
||||||
|
|
|
@ -3,6 +3,6 @@
|
||||||
hosts: sso
|
hosts: sso
|
||||||
vars:
|
vars:
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_admin_password: "remembertochangeme"
|
||||||
sso_enable: True
|
sso_enable: true
|
||||||
roles:
|
roles:
|
||||||
- middleware_automation.keycloak.keycloak
|
- middleware_automation.keycloak.keycloak
|
||||||
|
|
|
@ -1,52 +0,0 @@
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
# Copyright (C) 2021 Eric Lavarde <elavarde@redhat.com>
|
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
|
|
||||||
from __future__ import (absolute_import, division, print_function)
|
|
||||||
__metaclass__ = type
|
|
||||||
|
|
||||||
DOCUMENTATION = '''
|
|
||||||
name: version_sort
|
|
||||||
short_description: Sort a list according to version order instead of pure alphabetical one
|
|
||||||
version_added: 2.2.0
|
|
||||||
author: Eric L. (@ericzolf)
|
|
||||||
description:
|
|
||||||
- Sort a list according to version order instead of pure alphabetical one.
|
|
||||||
options:
|
|
||||||
_input:
|
|
||||||
description: A list of strings to sort.
|
|
||||||
type: list
|
|
||||||
elements: string
|
|
||||||
required: true
|
|
||||||
'''
|
|
||||||
|
|
||||||
EXAMPLES = '''
|
|
||||||
- name: Convert list of tuples into dictionary
|
|
||||||
ansible.builtin.set_fact:
|
|
||||||
dictionary: "{{ ['2.1', '2.10', '2.9'] | middleware_automation.keycloak.version_sort }}"
|
|
||||||
# Result is ['2.1', '2.9', '2.10']
|
|
||||||
'''
|
|
||||||
|
|
||||||
RETURN = '''
|
|
||||||
_value:
|
|
||||||
description: The list of strings sorted by version.
|
|
||||||
type: list
|
|
||||||
elements: string
|
|
||||||
'''
|
|
||||||
|
|
||||||
from ansible_collections.middleware_automation.keycloak.plugins.module_utils.version import LooseVersion
|
|
||||||
|
|
||||||
|
|
||||||
def version_sort(value, reverse=False):
|
|
||||||
'''Sort a list according to loose versions so that e.g. 2.9 is smaller than 2.10'''
|
|
||||||
return sorted(value, key=LooseVersion, reverse=reverse)
|
|
||||||
|
|
||||||
|
|
||||||
class FilterModule(object):
|
|
||||||
''' Version sort filter '''
|
|
||||||
|
|
||||||
def filters(self):
|
|
||||||
return {
|
|
||||||
'version_sort': version_sort
|
|
||||||
}
|
|
File diff suppressed because it is too large
Load diff
|
@ -1,22 +0,0 @@
|
||||||
# -*- coding: utf-8 -*-
|
|
||||||
|
|
||||||
# Copyright (c) 2021, Felix Fontein <felix@fontein.de>
|
|
||||||
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
||||||
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
||||||
|
|
||||||
"""Provide version object to compare version numbers."""
|
|
||||||
|
|
||||||
from __future__ import absolute_import, division, print_function
|
|
||||||
__metaclass__ = type
|
|
||||||
|
|
||||||
|
|
||||||
from ansible.module_utils.six import raise_from
|
|
||||||
|
|
||||||
try:
|
|
||||||
from ansible.module_utils.compat.version import LooseVersion # noqa: F401, pylint: disable=unused-import
|
|
||||||
except ImportError:
|
|
||||||
try:
|
|
||||||
from distutils.version import LooseVersion # noqa: F401, pylint: disable=unused-import
|
|
||||||
except ImportError as exc:
|
|
||||||
msg = 'To use this plugin or module with ansible-core 2.11, you need to use Python < 3.12 with distutils.version present'
|
|
||||||
raise_from(ImportError(msg), exc)
|
|
|
@ -40,8 +40,8 @@ options:
|
||||||
state:
|
state:
|
||||||
description:
|
description:
|
||||||
- State of the client
|
- State of the client
|
||||||
- On C(present), the client will be created (or updated if it exists already).
|
- On V(present), the client will be created (or updated if it exists already).
|
||||||
- On C(absent), the client will be removed if it exists
|
- On V(absent), the client will be removed if it exists
|
||||||
choices: ['present', 'absent']
|
choices: ['present', 'absent']
|
||||||
default: 'present'
|
default: 'present'
|
||||||
type: str
|
type: str
|
||||||
|
@ -55,7 +55,7 @@ options:
|
||||||
client_id:
|
client_id:
|
||||||
description:
|
description:
|
||||||
- Client id of client to be worked on. This is usually an alphanumeric name chosen by
|
- Client id of client to be worked on. This is usually an alphanumeric name chosen by
|
||||||
you. Either this or I(id) is required. If you specify both, I(id) takes precedence.
|
you. Either this or O(id) is required. If you specify both, O(id) takes precedence.
|
||||||
This is 'clientId' in the Keycloak REST API.
|
This is 'clientId' in the Keycloak REST API.
|
||||||
aliases:
|
aliases:
|
||||||
- clientId
|
- clientId
|
||||||
|
@ -63,13 +63,13 @@ options:
|
||||||
|
|
||||||
id:
|
id:
|
||||||
description:
|
description:
|
||||||
- Id of client to be worked on. This is usually an UUID. Either this or I(client_id)
|
- Id of client to be worked on. This is usually an UUID. Either this or O(client_id)
|
||||||
is required. If you specify both, this takes precedence.
|
is required. If you specify both, this takes precedence.
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
name:
|
name:
|
||||||
description:
|
description:
|
||||||
- Name of the client (this is not the same as I(client_id)).
|
- Name of the client (this is not the same as O(client_id)).
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
description:
|
description:
|
||||||
|
@ -108,20 +108,21 @@ options:
|
||||||
|
|
||||||
client_authenticator_type:
|
client_authenticator_type:
|
||||||
description:
|
description:
|
||||||
- How do clients authenticate with the auth server? Either C(client-secret) or
|
- How do clients authenticate with the auth server? Either V(client-secret),
|
||||||
C(client-jwt) can be chosen. When using C(client-secret), the module parameter
|
V(client-jwt), or V(client-x509) can be chosen. When using V(client-secret), the module parameter
|
||||||
I(secret) can set it, while for C(client-jwt), you can use the keys C(use.jwks.url),
|
O(secret) can set it, for V(client-jwt), you can use the keys C(use.jwks.url),
|
||||||
C(jwks.url), and C(jwt.credential.certificate) in the I(attributes) module parameter
|
C(jwks.url), and C(jwt.credential.certificate) in the O(attributes) module parameter
|
||||||
to configure its behavior.
|
to configure its behavior. For V(client-x509) you can use the keys C(x509.allow.regex.pattern.comparison)
|
||||||
This is 'clientAuthenticatorType' in the Keycloak REST API.
|
and C(x509.subjectdn) in the O(attributes) module parameter to configure which certificate(s) to accept.
|
||||||
choices: ['client-secret', 'client-jwt']
|
- This is 'clientAuthenticatorType' in the Keycloak REST API.
|
||||||
|
choices: ['client-secret', 'client-jwt', 'client-x509']
|
||||||
aliases:
|
aliases:
|
||||||
- clientAuthenticatorType
|
- clientAuthenticatorType
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
secret:
|
secret:
|
||||||
description:
|
description:
|
||||||
- When using I(client_authenticator_type) C(client-secret) (the default), you can
|
- When using O(client_authenticator_type=client-secret) (the default), you can
|
||||||
specify a secret here (otherwise one will be generated if it does not exit). If
|
specify a secret here (otherwise one will be generated if it does not exit). If
|
||||||
changing this secret, the module will not register a change currently (but the
|
changing this secret, the module will not register a change currently (but the
|
||||||
changed secret will be saved).
|
changed secret will be saved).
|
||||||
|
@ -246,9 +247,11 @@ options:
|
||||||
|
|
||||||
protocol:
|
protocol:
|
||||||
description:
|
description:
|
||||||
- Type of client (either C(openid-connect) or C(saml).
|
- Type of client.
|
||||||
|
- At creation only, default value will be V(openid-connect) if O(protocol) is omitted.
|
||||||
|
- The V(docker-v2) value was added in community.general 8.6.0.
|
||||||
type: str
|
type: str
|
||||||
choices: ['openid-connect', 'saml']
|
choices: ['openid-connect', 'saml', 'docker-v2']
|
||||||
|
|
||||||
full_scope_allowed:
|
full_scope_allowed:
|
||||||
description:
|
description:
|
||||||
|
@ -286,7 +289,7 @@ options:
|
||||||
|
|
||||||
use_template_config:
|
use_template_config:
|
||||||
description:
|
description:
|
||||||
- Whether or not to use configuration from the I(client_template).
|
- Whether or not to use configuration from the O(client_template).
|
||||||
This is 'useTemplateConfig' in the Keycloak REST API.
|
This is 'useTemplateConfig' in the Keycloak REST API.
|
||||||
aliases:
|
aliases:
|
||||||
- useTemplateConfig
|
- useTemplateConfig
|
||||||
|
@ -294,7 +297,7 @@ options:
|
||||||
|
|
||||||
use_template_scope:
|
use_template_scope:
|
||||||
description:
|
description:
|
||||||
- Whether or not to use scope configuration from the I(client_template).
|
- Whether or not to use scope configuration from the O(client_template).
|
||||||
This is 'useTemplateScope' in the Keycloak REST API.
|
This is 'useTemplateScope' in the Keycloak REST API.
|
||||||
aliases:
|
aliases:
|
||||||
- useTemplateScope
|
- useTemplateScope
|
||||||
|
@ -302,7 +305,7 @@ options:
|
||||||
|
|
||||||
use_template_mappers:
|
use_template_mappers:
|
||||||
description:
|
description:
|
||||||
- Whether or not to use mapper configuration from the I(client_template).
|
- Whether or not to use mapper configuration from the O(client_template).
|
||||||
This is 'useTemplateMappers' in the Keycloak REST API.
|
This is 'useTemplateMappers' in the Keycloak REST API.
|
||||||
aliases:
|
aliases:
|
||||||
- useTemplateMappers
|
- useTemplateMappers
|
||||||
|
@ -338,6 +341,42 @@ options:
|
||||||
description:
|
description:
|
||||||
- Override realm authentication flow bindings.
|
- Override realm authentication flow bindings.
|
||||||
type: dict
|
type: dict
|
||||||
|
suboptions:
|
||||||
|
browser:
|
||||||
|
description:
|
||||||
|
- Flow ID of the browser authentication flow.
|
||||||
|
- O(authentication_flow_binding_overrides.browser)
|
||||||
|
and O(authentication_flow_binding_overrides.browser_name) are mutually exclusive.
|
||||||
|
type: str
|
||||||
|
|
||||||
|
browser_name:
|
||||||
|
description:
|
||||||
|
- Flow name of the browser authentication flow.
|
||||||
|
- O(authentication_flow_binding_overrides.browser)
|
||||||
|
and O(authentication_flow_binding_overrides.browser_name) are mutually exclusive.
|
||||||
|
aliases:
|
||||||
|
- browserName
|
||||||
|
type: str
|
||||||
|
version_added: 9.1.0
|
||||||
|
|
||||||
|
direct_grant:
|
||||||
|
description:
|
||||||
|
- Flow ID of the direct grant authentication flow.
|
||||||
|
- O(authentication_flow_binding_overrides.direct_grant)
|
||||||
|
and O(authentication_flow_binding_overrides.direct_grant_name) are mutually exclusive.
|
||||||
|
aliases:
|
||||||
|
- directGrant
|
||||||
|
type: str
|
||||||
|
|
||||||
|
direct_grant_name:
|
||||||
|
description:
|
||||||
|
- Flow name of the direct grant authentication flow.
|
||||||
|
- O(authentication_flow_binding_overrides.direct_grant)
|
||||||
|
and O(authentication_flow_binding_overrides.direct_grant_name) are mutually exclusive.
|
||||||
|
aliases:
|
||||||
|
- directGrantName
|
||||||
|
type: str
|
||||||
|
version_added: 9.1.0
|
||||||
aliases:
|
aliases:
|
||||||
- authenticationFlowBindingOverrides
|
- authenticationFlowBindingOverrides
|
||||||
version_added: 3.4.0
|
version_added: 3.4.0
|
||||||
|
@ -391,38 +430,37 @@ options:
|
||||||
|
|
||||||
protocol:
|
protocol:
|
||||||
description:
|
description:
|
||||||
- This is either C(openid-connect) or C(saml), this specifies for which protocol this protocol mapper.
|
- This specifies for which protocol this protocol mapper is active.
|
||||||
is active.
|
choices: ['openid-connect', 'saml', 'docker-v2']
|
||||||
choices: ['openid-connect', 'saml']
|
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
protocolMapper:
|
protocolMapper:
|
||||||
description:
|
description:
|
||||||
- The Keycloak-internal name of the type of this protocol-mapper. While an exhaustive list is
|
- "The Keycloak-internal name of the type of this protocol-mapper. While an exhaustive list is
|
||||||
impossible to provide since this may be extended through SPIs by the user of Keycloak,
|
impossible to provide since this may be extended through SPIs by the user of Keycloak,
|
||||||
by default Keycloak as of 3.4 ships with at least
|
by default Keycloak as of 3.4 ships with at least:"
|
||||||
- C(docker-v2-allow-all-mapper)
|
- V(docker-v2-allow-all-mapper)
|
||||||
- C(oidc-address-mapper)
|
- V(oidc-address-mapper)
|
||||||
- C(oidc-full-name-mapper)
|
- V(oidc-full-name-mapper)
|
||||||
- C(oidc-group-membership-mapper)
|
- V(oidc-group-membership-mapper)
|
||||||
- C(oidc-hardcoded-claim-mapper)
|
- V(oidc-hardcoded-claim-mapper)
|
||||||
- C(oidc-hardcoded-role-mapper)
|
- V(oidc-hardcoded-role-mapper)
|
||||||
- C(oidc-role-name-mapper)
|
- V(oidc-role-name-mapper)
|
||||||
- C(oidc-script-based-protocol-mapper)
|
- V(oidc-script-based-protocol-mapper)
|
||||||
- C(oidc-sha256-pairwise-sub-mapper)
|
- V(oidc-sha256-pairwise-sub-mapper)
|
||||||
- C(oidc-usermodel-attribute-mapper)
|
- V(oidc-usermodel-attribute-mapper)
|
||||||
- C(oidc-usermodel-client-role-mapper)
|
- V(oidc-usermodel-client-role-mapper)
|
||||||
- C(oidc-usermodel-property-mapper)
|
- V(oidc-usermodel-property-mapper)
|
||||||
- C(oidc-usermodel-realm-role-mapper)
|
- V(oidc-usermodel-realm-role-mapper)
|
||||||
- C(oidc-usersessionmodel-note-mapper)
|
- V(oidc-usersessionmodel-note-mapper)
|
||||||
- C(saml-group-membership-mapper)
|
- V(saml-group-membership-mapper)
|
||||||
- C(saml-hardcode-attribute-mapper)
|
- V(saml-hardcode-attribute-mapper)
|
||||||
- C(saml-hardcode-role-mapper)
|
- V(saml-hardcode-role-mapper)
|
||||||
- C(saml-role-list-mapper)
|
- V(saml-role-list-mapper)
|
||||||
- C(saml-role-name-mapper)
|
- V(saml-role-name-mapper)
|
||||||
- C(saml-user-attribute-mapper)
|
- V(saml-user-attribute-mapper)
|
||||||
- C(saml-user-property-mapper)
|
- V(saml-user-property-mapper)
|
||||||
- C(saml-user-session-note-mapper)
|
- V(saml-user-session-note-mapper)
|
||||||
- An exhaustive list of available mappers on your installation can be obtained on
|
- An exhaustive list of available mappers on your installation can be obtained on
|
||||||
the admin console by going to Server Info -> Providers and looking under
|
the admin console by going to Server Info -> Providers and looking under
|
||||||
'protocol-mapper'.
|
'protocol-mapper'.
|
||||||
|
@ -431,10 +469,10 @@ options:
|
||||||
config:
|
config:
|
||||||
description:
|
description:
|
||||||
- Dict specifying the configuration options for the protocol mapper; the
|
- Dict specifying the configuration options for the protocol mapper; the
|
||||||
contents differ depending on the value of I(protocolMapper) and are not documented
|
contents differ depending on the value of O(protocol_mappers[].protocolMapper) and are not documented
|
||||||
other than by the source of the mappers and its parent class(es). An example is given
|
other than by the source of the mappers and its parent class(es). An example is given
|
||||||
below. It is easiest to obtain valid config values by dumping an already-existing
|
below. It is easiest to obtain valid config values by dumping an already-existing
|
||||||
protocol mapper configuration through check-mode in the I(existing) field.
|
protocol mapper configuration through check-mode in the RV(existing) field.
|
||||||
type: dict
|
type: dict
|
||||||
|
|
||||||
attributes:
|
attributes:
|
||||||
|
@ -478,7 +516,7 @@ options:
|
||||||
|
|
||||||
saml.signature.algorithm:
|
saml.signature.algorithm:
|
||||||
description:
|
description:
|
||||||
- Signature algorithm used to sign SAML documents. One of C(RSA_SHA256), C(RSA_SHA1), C(RSA_SHA512), or C(DSA_SHA1).
|
- Signature algorithm used to sign SAML documents. One of V(RSA_SHA256), V(RSA_SHA1), V(RSA_SHA512), or V(DSA_SHA1).
|
||||||
|
|
||||||
saml.signing.certificate:
|
saml.signing.certificate:
|
||||||
description:
|
description:
|
||||||
|
@ -496,22 +534,21 @@ options:
|
||||||
description:
|
description:
|
||||||
- SAML Redirect Binding URL for the client's assertion consumer service (login responses).
|
- SAML Redirect Binding URL for the client's assertion consumer service (login responses).
|
||||||
|
|
||||||
|
|
||||||
saml_force_name_id_format:
|
saml_force_name_id_format:
|
||||||
description:
|
description:
|
||||||
- For SAML clients, Boolean specifying whether to ignore requested NameID subject format and using the configured one instead.
|
- For SAML clients, Boolean specifying whether to ignore requested NameID subject format and using the configured one instead.
|
||||||
|
|
||||||
saml_name_id_format:
|
saml_name_id_format:
|
||||||
description:
|
description:
|
||||||
- For SAML clients, the NameID format to use (one of C(username), C(email), C(transient), or C(persistent))
|
- For SAML clients, the NameID format to use (one of V(username), V(email), V(transient), or V(persistent))
|
||||||
|
|
||||||
saml_signature_canonicalization_method:
|
saml_signature_canonicalization_method:
|
||||||
description:
|
description:
|
||||||
- SAML signature canonicalization method. This is one of four values, namely
|
- SAML signature canonicalization method. This is one of four values, namely
|
||||||
C(http://www.w3.org/2001/10/xml-exc-c14n#) for EXCLUSIVE,
|
V(http://www.w3.org/2001/10/xml-exc-c14n#) for EXCLUSIVE,
|
||||||
C(http://www.w3.org/2001/10/xml-exc-c14n#WithComments) for EXCLUSIVE_WITH_COMMENTS,
|
V(http://www.w3.org/2001/10/xml-exc-c14n#WithComments) for EXCLUSIVE_WITH_COMMENTS,
|
||||||
C(http://www.w3.org/TR/2001/REC-xml-c14n-20010315) for INCLUSIVE, and
|
V(http://www.w3.org/TR/2001/REC-xml-c14n-20010315) for INCLUSIVE, and
|
||||||
C(http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments) for INCLUSIVE_WITH_COMMENTS.
|
V(http://www.w3.org/TR/2001/REC-xml-c14n-20010315#WithComments) for INCLUSIVE_WITH_COMMENTS.
|
||||||
|
|
||||||
saml_single_logout_service_url_post:
|
saml_single_logout_service_url_post:
|
||||||
description:
|
description:
|
||||||
|
@ -523,12 +560,12 @@ options:
|
||||||
|
|
||||||
user.info.response.signature.alg:
|
user.info.response.signature.alg:
|
||||||
description:
|
description:
|
||||||
- For OpenID-Connect clients, JWA algorithm for signed UserInfo-endpoint responses. One of C(RS256) or C(unsigned).
|
- For OpenID-Connect clients, JWA algorithm for signed UserInfo-endpoint responses. One of V(RS256) or V(unsigned).
|
||||||
|
|
||||||
request.object.signature.alg:
|
request.object.signature.alg:
|
||||||
description:
|
description:
|
||||||
- For OpenID-Connect clients, JWA algorithm which the client needs to use when sending
|
- For OpenID-Connect clients, JWA algorithm which the client needs to use when sending
|
||||||
OIDC request object. One of C(any), C(none), C(RS256).
|
OIDC request object. One of V(any), V(none), V(RS256).
|
||||||
|
|
||||||
use.jwks.url:
|
use.jwks.url:
|
||||||
description:
|
description:
|
||||||
|
@ -544,6 +581,18 @@ options:
|
||||||
- For OpenID-Connect clients, client certificate for validating JWT issued by
|
- For OpenID-Connect clients, client certificate for validating JWT issued by
|
||||||
client and signed by its key, base64-encoded.
|
client and signed by its key, base64-encoded.
|
||||||
|
|
||||||
|
x509.subjectdn:
|
||||||
|
description:
|
||||||
|
- For OpenID-Connect clients, subject which will be used to authenticate the client.
|
||||||
|
type: str
|
||||||
|
version_added: 9.5.0
|
||||||
|
|
||||||
|
x509.allow.regex.pattern.comparison:
|
||||||
|
description:
|
||||||
|
- For OpenID-Connect clients, boolean specifying whether to allow C(x509.subjectdn) as regular expression.
|
||||||
|
type: bool
|
||||||
|
version_added: 9.5.0
|
||||||
|
|
||||||
extends_documentation_fragment:
|
extends_documentation_fragment:
|
||||||
- middleware_automation.keycloak.keycloak
|
- middleware_automation.keycloak.keycloak
|
||||||
- middleware_automation.keycloak.attributes
|
- middleware_automation.keycloak.attributes
|
||||||
|
@ -587,6 +636,22 @@ EXAMPLES = '''
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
|
|
||||||
|
|
||||||
|
- name: Create or update a Keycloak client (minimal example), with x509 authentication
|
||||||
|
middleware_automation.keycloak.keycloak_client:
|
||||||
|
auth_client_id: admin-cli
|
||||||
|
auth_keycloak_url: https://auth.example.com/auth
|
||||||
|
auth_realm: master
|
||||||
|
auth_username: USERNAME
|
||||||
|
auth_password: PASSWORD
|
||||||
|
realm: master
|
||||||
|
state: present
|
||||||
|
client_id: test
|
||||||
|
client_authenticator_type: client-x509
|
||||||
|
attributes:
|
||||||
|
x509.subjectdn: "CN=client"
|
||||||
|
x509.allow.regex.pattern.comparison: false
|
||||||
|
|
||||||
|
|
||||||
- name: Create or update a Keycloak client (with all the bells and whistles)
|
- name: Create or update a Keycloak client (with all the bells and whistles)
|
||||||
middleware_automation.keycloak.keycloak_client:
|
middleware_automation.keycloak.keycloak_client:
|
||||||
auth_client_id: admin-cli
|
auth_client_id: admin-cli
|
||||||
|
@ -717,11 +782,17 @@ end_state:
|
||||||
'''
|
'''
|
||||||
|
|
||||||
from ansible_collections.middleware_automation.keycloak.plugins.module_utils.identity.keycloak.keycloak import KeycloakAPI, camel, \
|
from ansible_collections.middleware_automation.keycloak.plugins.module_utils.identity.keycloak.keycloak import KeycloakAPI, camel, \
|
||||||
keycloak_argument_spec, get_token, KeycloakError
|
keycloak_argument_spec, get_token, KeycloakError, is_struct_included
|
||||||
from ansible.module_utils.basic import AnsibleModule
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
import copy
|
import copy
|
||||||
|
|
||||||
|
|
||||||
|
PROTOCOL_OPENID_CONNECT = 'openid-connect'
|
||||||
|
PROTOCOL_SAML = 'saml'
|
||||||
|
PROTOCOL_DOCKER_V2 = 'docker-v2'
|
||||||
|
CLIENT_META_DATA = ['authorizationServicesEnabled']
|
||||||
|
|
||||||
|
|
||||||
def normalise_cr(clientrep, remove_ids=False):
|
def normalise_cr(clientrep, remove_ids=False):
|
||||||
""" Re-sorts any properties where the order so that diff's is minimised, and adds default values where appropriate so that the
|
""" Re-sorts any properties where the order so that diff's is minimised, and adds default values where appropriate so that the
|
||||||
the change detection is more effective.
|
the change detection is more effective.
|
||||||
|
@ -737,6 +808,12 @@ def normalise_cr(clientrep, remove_ids=False):
|
||||||
if 'attributes' in clientrep:
|
if 'attributes' in clientrep:
|
||||||
clientrep['attributes'] = list(sorted(clientrep['attributes']))
|
clientrep['attributes'] = list(sorted(clientrep['attributes']))
|
||||||
|
|
||||||
|
if 'defaultClientScopes' in clientrep:
|
||||||
|
clientrep['defaultClientScopes'] = list(sorted(clientrep['defaultClientScopes']))
|
||||||
|
|
||||||
|
if 'optionalClientScopes' in clientrep:
|
||||||
|
clientrep['optionalClientScopes'] = list(sorted(clientrep['optionalClientScopes']))
|
||||||
|
|
||||||
if 'redirectUris' in clientrep:
|
if 'redirectUris' in clientrep:
|
||||||
clientrep['redirectUris'] = list(sorted(clientrep['redirectUris']))
|
clientrep['redirectUris'] = list(sorted(clientrep['redirectUris']))
|
||||||
|
|
||||||
|
@ -762,11 +839,70 @@ def sanitize_cr(clientrep):
|
||||||
if 'secret' in result:
|
if 'secret' in result:
|
||||||
result['secret'] = 'no_log'
|
result['secret'] = 'no_log'
|
||||||
if 'attributes' in result:
|
if 'attributes' in result:
|
||||||
if 'saml.signing.private.key' in result['attributes']:
|
attributes = result['attributes']
|
||||||
result['attributes']['saml.signing.private.key'] = 'no_log'
|
if isinstance(attributes, dict) and 'saml.signing.private.key' in attributes:
|
||||||
|
attributes['saml.signing.private.key'] = 'no_log'
|
||||||
return normalise_cr(result)
|
return normalise_cr(result)
|
||||||
|
|
||||||
|
|
||||||
|
def get_authentication_flow_id(flow_name, realm, kc):
|
||||||
|
""" Get the authentication flow ID based on the flow name, realm, and Keycloak client.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
flow_name (str): The name of the authentication flow.
|
||||||
|
realm (str): The name of the realm.
|
||||||
|
kc (KeycloakClient): The Keycloak client instance.
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
str: The ID of the authentication flow.
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
KeycloakAPIException: If the authentication flow with the given name is not found in the realm.
|
||||||
|
"""
|
||||||
|
flow = kc.get_authentication_flow_by_alias(flow_name, realm)
|
||||||
|
if flow:
|
||||||
|
return flow["id"]
|
||||||
|
kc.module.fail_json(msg='Authentification flow %s not found in realm %s' % (flow_name, realm))
|
||||||
|
|
||||||
|
|
||||||
|
def flow_binding_from_dict_to_model(newClientFlowBinding, realm, kc):
|
||||||
|
""" Convert a dictionary representing client flow bindings to a model representation.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
newClientFlowBinding (dict): A dictionary containing client flow bindings.
|
||||||
|
realm (str): The name of the realm.
|
||||||
|
kc (KeycloakClient): An instance of the KeycloakClient class.
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
dict: A dictionary representing the model flow bindings. The dictionary has two keys:
|
||||||
|
- "browser" (str or None): The ID of the browser authentication flow binding, or None if not provided.
|
||||||
|
- "direct_grant" (str or None): The ID of the direct grant authentication flow binding, or None if not provided.
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
KeycloakAPIException: If the authentication flow with the given name is not found in the realm.
|
||||||
|
|
||||||
|
"""
|
||||||
|
|
||||||
|
modelFlow = {
|
||||||
|
"browser": None,
|
||||||
|
"direct_grant": None
|
||||||
|
}
|
||||||
|
|
||||||
|
for k, v in newClientFlowBinding.items():
|
||||||
|
if not v:
|
||||||
|
continue
|
||||||
|
if k == "browser":
|
||||||
|
modelFlow["browser"] = v
|
||||||
|
elif k == "browser_name":
|
||||||
|
modelFlow["browser"] = get_authentication_flow_id(v, realm, kc)
|
||||||
|
elif k == "direct_grant":
|
||||||
|
modelFlow["direct_grant"] = v
|
||||||
|
elif k == "direct_grant_name":
|
||||||
|
modelFlow["direct_grant"] = get_authentication_flow_id(v, realm, kc)
|
||||||
|
|
||||||
|
return modelFlow
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
"""
|
"""
|
||||||
Module execution
|
Module execution
|
||||||
|
@ -780,11 +916,18 @@ def main():
|
||||||
consentText=dict(type='str'),
|
consentText=dict(type='str'),
|
||||||
id=dict(type='str'),
|
id=dict(type='str'),
|
||||||
name=dict(type='str'),
|
name=dict(type='str'),
|
||||||
protocol=dict(type='str', choices=['openid-connect', 'saml']),
|
protocol=dict(type='str', choices=[PROTOCOL_OPENID_CONNECT, PROTOCOL_SAML, PROTOCOL_DOCKER_V2]),
|
||||||
protocolMapper=dict(type='str'),
|
protocolMapper=dict(type='str'),
|
||||||
config=dict(type='dict'),
|
config=dict(type='dict'),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
authentication_flow_spec = dict(
|
||||||
|
browser=dict(type='str'),
|
||||||
|
browser_name=dict(type='str', aliases=['browserName']),
|
||||||
|
direct_grant=dict(type='str', aliases=['directGrant']),
|
||||||
|
direct_grant_name=dict(type='str', aliases=['directGrantName']),
|
||||||
|
)
|
||||||
|
|
||||||
meta_args = dict(
|
meta_args = dict(
|
||||||
state=dict(default='present', choices=['present', 'absent']),
|
state=dict(default='present', choices=['present', 'absent']),
|
||||||
realm=dict(type='str', default='master'),
|
realm=dict(type='str', default='master'),
|
||||||
|
@ -798,7 +941,7 @@ def main():
|
||||||
base_url=dict(type='str', aliases=['baseUrl']),
|
base_url=dict(type='str', aliases=['baseUrl']),
|
||||||
surrogate_auth_required=dict(type='bool', aliases=['surrogateAuthRequired']),
|
surrogate_auth_required=dict(type='bool', aliases=['surrogateAuthRequired']),
|
||||||
enabled=dict(type='bool'),
|
enabled=dict(type='bool'),
|
||||||
client_authenticator_type=dict(type='str', choices=['client-secret', 'client-jwt'], aliases=['clientAuthenticatorType']),
|
client_authenticator_type=dict(type='str', choices=['client-secret', 'client-jwt', 'client-x509'], aliases=['clientAuthenticatorType']),
|
||||||
secret=dict(type='str', no_log=True),
|
secret=dict(type='str', no_log=True),
|
||||||
registration_access_token=dict(type='str', aliases=['registrationAccessToken'], no_log=True),
|
registration_access_token=dict(type='str', aliases=['registrationAccessToken'], no_log=True),
|
||||||
default_roles=dict(type='list', elements='str', aliases=['defaultRoles']),
|
default_roles=dict(type='list', elements='str', aliases=['defaultRoles']),
|
||||||
|
@ -814,7 +957,7 @@ def main():
|
||||||
authorization_services_enabled=dict(type='bool', aliases=['authorizationServicesEnabled']),
|
authorization_services_enabled=dict(type='bool', aliases=['authorizationServicesEnabled']),
|
||||||
public_client=dict(type='bool', aliases=['publicClient']),
|
public_client=dict(type='bool', aliases=['publicClient']),
|
||||||
frontchannel_logout=dict(type='bool', aliases=['frontchannelLogout']),
|
frontchannel_logout=dict(type='bool', aliases=['frontchannelLogout']),
|
||||||
protocol=dict(type='str', choices=['openid-connect', 'saml']),
|
protocol=dict(type='str', choices=[PROTOCOL_OPENID_CONNECT, PROTOCOL_SAML, PROTOCOL_DOCKER_V2]),
|
||||||
attributes=dict(type='dict'),
|
attributes=dict(type='dict'),
|
||||||
full_scope_allowed=dict(type='bool', aliases=['fullScopeAllowed']),
|
full_scope_allowed=dict(type='bool', aliases=['fullScopeAllowed']),
|
||||||
node_re_registration_timeout=dict(type='int', aliases=['nodeReRegistrationTimeout']),
|
node_re_registration_timeout=dict(type='int', aliases=['nodeReRegistrationTimeout']),
|
||||||
|
@ -824,7 +967,13 @@ def main():
|
||||||
use_template_scope=dict(type='bool', aliases=['useTemplateScope']),
|
use_template_scope=dict(type='bool', aliases=['useTemplateScope']),
|
||||||
use_template_mappers=dict(type='bool', aliases=['useTemplateMappers']),
|
use_template_mappers=dict(type='bool', aliases=['useTemplateMappers']),
|
||||||
always_display_in_console=dict(type='bool', aliases=['alwaysDisplayInConsole']),
|
always_display_in_console=dict(type='bool', aliases=['alwaysDisplayInConsole']),
|
||||||
authentication_flow_binding_overrides=dict(type='dict', aliases=['authenticationFlowBindingOverrides']),
|
authentication_flow_binding_overrides=dict(
|
||||||
|
type='dict',
|
||||||
|
aliases=['authenticationFlowBindingOverrides'],
|
||||||
|
options=authentication_flow_spec,
|
||||||
|
required_one_of=[['browser', 'direct_grant', 'browser_name', 'direct_grant_name']],
|
||||||
|
mutually_exclusive=[['browser', 'browser_name'], ['direct_grant', 'direct_grant_name']],
|
||||||
|
),
|
||||||
protocol_mappers=dict(type='list', elements='dict', options=protmapper_spec, aliases=['protocolMappers']),
|
protocol_mappers=dict(type='list', elements='dict', options=protmapper_spec, aliases=['protocolMappers']),
|
||||||
authorization_settings=dict(type='dict', aliases=['authorizationSettings']),
|
authorization_settings=dict(type='dict', aliases=['authorizationSettings']),
|
||||||
default_client_scopes=dict(type='list', elements='str', aliases=['defaultClientScopes']),
|
default_client_scopes=dict(type='list', elements='str', aliases=['defaultClientScopes']),
|
||||||
|
@ -885,7 +1034,9 @@ def main():
|
||||||
# Unfortunately, the ansible argument spec checker introduces variables with null values when
|
# Unfortunately, the ansible argument spec checker introduces variables with null values when
|
||||||
# they are not specified
|
# they are not specified
|
||||||
if client_param == 'protocol_mappers':
|
if client_param == 'protocol_mappers':
|
||||||
new_param_value = [dict((k, v) for k, v in x.items() if x[k] is not None) for x in new_param_value]
|
new_param_value = [{k: v for k, v in x.items() if v is not None} for x in new_param_value]
|
||||||
|
elif client_param == 'authentication_flow_binding_overrides':
|
||||||
|
new_param_value = flow_binding_from_dict_to_model(new_param_value, realm, kc)
|
||||||
|
|
||||||
changeset[camel(client_param)] = new_param_value
|
changeset[camel(client_param)] = new_param_value
|
||||||
|
|
||||||
|
@ -912,6 +1063,8 @@ def main():
|
||||||
|
|
||||||
if 'clientId' not in desired_client:
|
if 'clientId' not in desired_client:
|
||||||
module.fail_json(msg='client_id needs to be specified when creating a new client')
|
module.fail_json(msg='client_id needs to be specified when creating a new client')
|
||||||
|
if 'protocol' not in desired_client:
|
||||||
|
desired_client['protocol'] = PROTOCOL_OPENID_CONNECT
|
||||||
|
|
||||||
if module._diff:
|
if module._diff:
|
||||||
result['diff'] = dict(before='', after=sanitize_cr(desired_client))
|
result['diff'] = dict(before='', after=sanitize_cr(desired_client))
|
||||||
|
@ -940,7 +1093,7 @@ def main():
|
||||||
if module._diff:
|
if module._diff:
|
||||||
result['diff'] = dict(before=sanitize_cr(before_norm),
|
result['diff'] = dict(before=sanitize_cr(before_norm),
|
||||||
after=sanitize_cr(desired_norm))
|
after=sanitize_cr(desired_norm))
|
||||||
result['changed'] = (before_norm != desired_norm)
|
result['changed'] = not is_struct_included(desired_norm, before_norm, CLIENT_META_DATA)
|
||||||
|
|
||||||
module.exit_json(**result)
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
|
848
plugins/modules/keycloak_realm.py
Normal file
848
plugins/modules/keycloak_realm.py
Normal file
|
@ -0,0 +1,848 @@
|
||||||
|
#!/usr/bin/python
|
||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
|
||||||
|
# Copyright (c) 2017, Eike Frost <ei@kefro.st>
|
||||||
|
# Copyright (c) 2021, Christophe Gilles <christophe.gilles54@gmail.com>
|
||||||
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
||||||
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
||||||
|
|
||||||
|
from __future__ import absolute_import, division, print_function
|
||||||
|
__metaclass__ = type
|
||||||
|
|
||||||
|
DOCUMENTATION = '''
|
||||||
|
---
|
||||||
|
module: keycloak_realm
|
||||||
|
|
||||||
|
short_description: Allows administration of Keycloak realm via Keycloak API
|
||||||
|
|
||||||
|
version_added: 3.0.0
|
||||||
|
|
||||||
|
description:
|
||||||
|
- This module allows the administration of Keycloak realm via the Keycloak REST API. It
|
||||||
|
requires access to the REST API via OpenID Connect; the user connecting and the realm being
|
||||||
|
used must have the requisite access rights. In a default Keycloak installation, admin-cli
|
||||||
|
and an admin user would work, as would a separate realm definition with the scope tailored
|
||||||
|
to your needs and a user having the expected roles.
|
||||||
|
|
||||||
|
- The names of module options are snake_cased versions of the camelCase ones found in the
|
||||||
|
Keycloak API and its documentation at U(https://www.keycloak.org/docs-api/8.0/rest-api/index.html).
|
||||||
|
Aliases are provided so camelCased versions can be used as well.
|
||||||
|
|
||||||
|
- The Keycloak API does not always sanity check inputs e.g. you can set
|
||||||
|
SAML-specific settings on an OpenID Connect client for instance and vice versa. Be careful.
|
||||||
|
If you do not specify a setting, usually a sensible default is chosen.
|
||||||
|
|
||||||
|
attributes:
|
||||||
|
check_mode:
|
||||||
|
support: full
|
||||||
|
diff_mode:
|
||||||
|
support: full
|
||||||
|
|
||||||
|
options:
|
||||||
|
state:
|
||||||
|
description:
|
||||||
|
- State of the realm.
|
||||||
|
- On V(present), the realm will be created (or updated if it exists already).
|
||||||
|
- On V(absent), the realm will be removed if it exists.
|
||||||
|
choices: ['present', 'absent']
|
||||||
|
default: 'present'
|
||||||
|
type: str
|
||||||
|
|
||||||
|
id:
|
||||||
|
description:
|
||||||
|
- The realm to create.
|
||||||
|
type: str
|
||||||
|
realm:
|
||||||
|
description:
|
||||||
|
- The realm name.
|
||||||
|
type: str
|
||||||
|
access_code_lifespan:
|
||||||
|
description:
|
||||||
|
- The realm access code lifespan.
|
||||||
|
aliases:
|
||||||
|
- accessCodeLifespan
|
||||||
|
type: int
|
||||||
|
access_code_lifespan_login:
|
||||||
|
description:
|
||||||
|
- The realm access code lifespan login.
|
||||||
|
aliases:
|
||||||
|
- accessCodeLifespanLogin
|
||||||
|
type: int
|
||||||
|
access_code_lifespan_user_action:
|
||||||
|
description:
|
||||||
|
- The realm access code lifespan user action.
|
||||||
|
aliases:
|
||||||
|
- accessCodeLifespanUserAction
|
||||||
|
type: int
|
||||||
|
access_token_lifespan:
|
||||||
|
description:
|
||||||
|
- The realm access token lifespan.
|
||||||
|
aliases:
|
||||||
|
- accessTokenLifespan
|
||||||
|
type: int
|
||||||
|
access_token_lifespan_for_implicit_flow:
|
||||||
|
description:
|
||||||
|
- The realm access token lifespan for implicit flow.
|
||||||
|
aliases:
|
||||||
|
- accessTokenLifespanForImplicitFlow
|
||||||
|
type: int
|
||||||
|
account_theme:
|
||||||
|
description:
|
||||||
|
- The realm account theme.
|
||||||
|
aliases:
|
||||||
|
- accountTheme
|
||||||
|
type: str
|
||||||
|
action_token_generated_by_admin_lifespan:
|
||||||
|
description:
|
||||||
|
- The realm action token generated by admin lifespan.
|
||||||
|
aliases:
|
||||||
|
- actionTokenGeneratedByAdminLifespan
|
||||||
|
type: int
|
||||||
|
action_token_generated_by_user_lifespan:
|
||||||
|
description:
|
||||||
|
- The realm action token generated by user lifespan.
|
||||||
|
aliases:
|
||||||
|
- actionTokenGeneratedByUserLifespan
|
||||||
|
type: int
|
||||||
|
admin_events_details_enabled:
|
||||||
|
description:
|
||||||
|
- The realm admin events details enabled.
|
||||||
|
aliases:
|
||||||
|
- adminEventsDetailsEnabled
|
||||||
|
type: bool
|
||||||
|
admin_events_enabled:
|
||||||
|
description:
|
||||||
|
- The realm admin events enabled.
|
||||||
|
aliases:
|
||||||
|
- adminEventsEnabled
|
||||||
|
type: bool
|
||||||
|
admin_theme:
|
||||||
|
description:
|
||||||
|
- The realm admin theme.
|
||||||
|
aliases:
|
||||||
|
- adminTheme
|
||||||
|
type: str
|
||||||
|
attributes:
|
||||||
|
description:
|
||||||
|
- The realm attributes.
|
||||||
|
type: dict
|
||||||
|
browser_flow:
|
||||||
|
description:
|
||||||
|
- The realm browser flow.
|
||||||
|
aliases:
|
||||||
|
- browserFlow
|
||||||
|
type: str
|
||||||
|
browser_security_headers:
|
||||||
|
description:
|
||||||
|
- The realm browser security headers.
|
||||||
|
aliases:
|
||||||
|
- browserSecurityHeaders
|
||||||
|
type: dict
|
||||||
|
brute_force_protected:
|
||||||
|
description:
|
||||||
|
- The realm brute force protected.
|
||||||
|
aliases:
|
||||||
|
- bruteForceProtected
|
||||||
|
type: bool
|
||||||
|
client_authentication_flow:
|
||||||
|
description:
|
||||||
|
- The realm client authentication flow.
|
||||||
|
aliases:
|
||||||
|
- clientAuthenticationFlow
|
||||||
|
type: str
|
||||||
|
client_scope_mappings:
|
||||||
|
description:
|
||||||
|
- The realm client scope mappings.
|
||||||
|
aliases:
|
||||||
|
- clientScopeMappings
|
||||||
|
type: dict
|
||||||
|
default_default_client_scopes:
|
||||||
|
description:
|
||||||
|
- The realm default default client scopes.
|
||||||
|
aliases:
|
||||||
|
- defaultDefaultClientScopes
|
||||||
|
type: list
|
||||||
|
elements: str
|
||||||
|
default_groups:
|
||||||
|
description:
|
||||||
|
- The realm default groups.
|
||||||
|
aliases:
|
||||||
|
- defaultGroups
|
||||||
|
type: list
|
||||||
|
elements: str
|
||||||
|
default_locale:
|
||||||
|
description:
|
||||||
|
- The realm default locale.
|
||||||
|
aliases:
|
||||||
|
- defaultLocale
|
||||||
|
type: str
|
||||||
|
default_optional_client_scopes:
|
||||||
|
description:
|
||||||
|
- The realm default optional client scopes.
|
||||||
|
aliases:
|
||||||
|
- defaultOptionalClientScopes
|
||||||
|
type: list
|
||||||
|
elements: str
|
||||||
|
default_roles:
|
||||||
|
description:
|
||||||
|
- The realm default roles.
|
||||||
|
aliases:
|
||||||
|
- defaultRoles
|
||||||
|
type: list
|
||||||
|
elements: str
|
||||||
|
default_signature_algorithm:
|
||||||
|
description:
|
||||||
|
- The realm default signature algorithm.
|
||||||
|
aliases:
|
||||||
|
- defaultSignatureAlgorithm
|
||||||
|
type: str
|
||||||
|
direct_grant_flow:
|
||||||
|
description:
|
||||||
|
- The realm direct grant flow.
|
||||||
|
aliases:
|
||||||
|
- directGrantFlow
|
||||||
|
type: str
|
||||||
|
display_name:
|
||||||
|
description:
|
||||||
|
- The realm display name.
|
||||||
|
aliases:
|
||||||
|
- displayName
|
||||||
|
type: str
|
||||||
|
display_name_html:
|
||||||
|
description:
|
||||||
|
- The realm display name HTML.
|
||||||
|
aliases:
|
||||||
|
- displayNameHtml
|
||||||
|
type: str
|
||||||
|
docker_authentication_flow:
|
||||||
|
description:
|
||||||
|
- The realm docker authentication flow.
|
||||||
|
aliases:
|
||||||
|
- dockerAuthenticationFlow
|
||||||
|
type: str
|
||||||
|
duplicate_emails_allowed:
|
||||||
|
description:
|
||||||
|
- The realm duplicate emails allowed option.
|
||||||
|
aliases:
|
||||||
|
- duplicateEmailsAllowed
|
||||||
|
type: bool
|
||||||
|
edit_username_allowed:
|
||||||
|
description:
|
||||||
|
- The realm edit username allowed option.
|
||||||
|
aliases:
|
||||||
|
- editUsernameAllowed
|
||||||
|
type: bool
|
||||||
|
email_theme:
|
||||||
|
description:
|
||||||
|
- The realm email theme.
|
||||||
|
aliases:
|
||||||
|
- emailTheme
|
||||||
|
type: str
|
||||||
|
enabled:
|
||||||
|
description:
|
||||||
|
- The realm enabled option.
|
||||||
|
type: bool
|
||||||
|
enabled_event_types:
|
||||||
|
description:
|
||||||
|
- The realm enabled event types.
|
||||||
|
aliases:
|
||||||
|
- enabledEventTypes
|
||||||
|
type: list
|
||||||
|
elements: str
|
||||||
|
events_enabled:
|
||||||
|
description:
|
||||||
|
- Enables or disables login events for this realm.
|
||||||
|
aliases:
|
||||||
|
- eventsEnabled
|
||||||
|
type: bool
|
||||||
|
version_added: 3.6.0
|
||||||
|
events_expiration:
|
||||||
|
description:
|
||||||
|
- The realm events expiration.
|
||||||
|
aliases:
|
||||||
|
- eventsExpiration
|
||||||
|
type: int
|
||||||
|
events_listeners:
|
||||||
|
description:
|
||||||
|
- The realm events listeners.
|
||||||
|
aliases:
|
||||||
|
- eventsListeners
|
||||||
|
type: list
|
||||||
|
elements: str
|
||||||
|
failure_factor:
|
||||||
|
description:
|
||||||
|
- The realm failure factor.
|
||||||
|
aliases:
|
||||||
|
- failureFactor
|
||||||
|
type: int
|
||||||
|
internationalization_enabled:
|
||||||
|
description:
|
||||||
|
- The realm internationalization enabled option.
|
||||||
|
aliases:
|
||||||
|
- internationalizationEnabled
|
||||||
|
type: bool
|
||||||
|
login_theme:
|
||||||
|
description:
|
||||||
|
- The realm login theme.
|
||||||
|
aliases:
|
||||||
|
- loginTheme
|
||||||
|
type: str
|
||||||
|
login_with_email_allowed:
|
||||||
|
description:
|
||||||
|
- The realm login with email allowed option.
|
||||||
|
aliases:
|
||||||
|
- loginWithEmailAllowed
|
||||||
|
type: bool
|
||||||
|
max_delta_time_seconds:
|
||||||
|
description:
|
||||||
|
- The realm max delta time in seconds.
|
||||||
|
aliases:
|
||||||
|
- maxDeltaTimeSeconds
|
||||||
|
type: int
|
||||||
|
max_failure_wait_seconds:
|
||||||
|
description:
|
||||||
|
- The realm max failure wait in seconds.
|
||||||
|
aliases:
|
||||||
|
- maxFailureWaitSeconds
|
||||||
|
type: int
|
||||||
|
minimum_quick_login_wait_seconds:
|
||||||
|
description:
|
||||||
|
- The realm minimum quick login wait in seconds.
|
||||||
|
aliases:
|
||||||
|
- minimumQuickLoginWaitSeconds
|
||||||
|
type: int
|
||||||
|
not_before:
|
||||||
|
description:
|
||||||
|
- The realm not before.
|
||||||
|
aliases:
|
||||||
|
- notBefore
|
||||||
|
type: int
|
||||||
|
offline_session_idle_timeout:
|
||||||
|
description:
|
||||||
|
- The realm offline session idle timeout.
|
||||||
|
aliases:
|
||||||
|
- offlineSessionIdleTimeout
|
||||||
|
type: int
|
||||||
|
offline_session_max_lifespan:
|
||||||
|
description:
|
||||||
|
- The realm offline session max lifespan.
|
||||||
|
aliases:
|
||||||
|
- offlineSessionMaxLifespan
|
||||||
|
type: int
|
||||||
|
offline_session_max_lifespan_enabled:
|
||||||
|
description:
|
||||||
|
- The realm offline session max lifespan enabled option.
|
||||||
|
aliases:
|
||||||
|
- offlineSessionMaxLifespanEnabled
|
||||||
|
type: bool
|
||||||
|
otp_policy_algorithm:
|
||||||
|
description:
|
||||||
|
- The realm otp policy algorithm.
|
||||||
|
aliases:
|
||||||
|
- otpPolicyAlgorithm
|
||||||
|
type: str
|
||||||
|
otp_policy_digits:
|
||||||
|
description:
|
||||||
|
- The realm otp policy digits.
|
||||||
|
aliases:
|
||||||
|
- otpPolicyDigits
|
||||||
|
type: int
|
||||||
|
otp_policy_initial_counter:
|
||||||
|
description:
|
||||||
|
- The realm otp policy initial counter.
|
||||||
|
aliases:
|
||||||
|
- otpPolicyInitialCounter
|
||||||
|
type: int
|
||||||
|
otp_policy_look_ahead_window:
|
||||||
|
description:
|
||||||
|
- The realm otp policy look ahead window.
|
||||||
|
aliases:
|
||||||
|
- otpPolicyLookAheadWindow
|
||||||
|
type: int
|
||||||
|
otp_policy_period:
|
||||||
|
description:
|
||||||
|
- The realm otp policy period.
|
||||||
|
aliases:
|
||||||
|
- otpPolicyPeriod
|
||||||
|
type: int
|
||||||
|
otp_policy_type:
|
||||||
|
description:
|
||||||
|
- The realm otp policy type.
|
||||||
|
aliases:
|
||||||
|
- otpPolicyType
|
||||||
|
type: str
|
||||||
|
otp_supported_applications:
|
||||||
|
description:
|
||||||
|
- The realm otp supported applications.
|
||||||
|
aliases:
|
||||||
|
- otpSupportedApplications
|
||||||
|
type: list
|
||||||
|
elements: str
|
||||||
|
password_policy:
|
||||||
|
description:
|
||||||
|
- The realm password policy.
|
||||||
|
aliases:
|
||||||
|
- passwordPolicy
|
||||||
|
type: str
|
||||||
|
permanent_lockout:
|
||||||
|
description:
|
||||||
|
- The realm permanent lockout.
|
||||||
|
aliases:
|
||||||
|
- permanentLockout
|
||||||
|
type: bool
|
||||||
|
quick_login_check_milli_seconds:
|
||||||
|
description:
|
||||||
|
- The realm quick login check in milliseconds.
|
||||||
|
aliases:
|
||||||
|
- quickLoginCheckMilliSeconds
|
||||||
|
type: int
|
||||||
|
refresh_token_max_reuse:
|
||||||
|
description:
|
||||||
|
- The realm refresh token max reuse.
|
||||||
|
aliases:
|
||||||
|
- refreshTokenMaxReuse
|
||||||
|
type: int
|
||||||
|
registration_allowed:
|
||||||
|
description:
|
||||||
|
- The realm registration allowed option.
|
||||||
|
aliases:
|
||||||
|
- registrationAllowed
|
||||||
|
type: bool
|
||||||
|
registration_email_as_username:
|
||||||
|
description:
|
||||||
|
- The realm registration email as username option.
|
||||||
|
aliases:
|
||||||
|
- registrationEmailAsUsername
|
||||||
|
type: bool
|
||||||
|
registration_flow:
|
||||||
|
description:
|
||||||
|
- The realm registration flow.
|
||||||
|
aliases:
|
||||||
|
- registrationFlow
|
||||||
|
type: str
|
||||||
|
remember_me:
|
||||||
|
description:
|
||||||
|
- The realm remember me option.
|
||||||
|
aliases:
|
||||||
|
- rememberMe
|
||||||
|
type: bool
|
||||||
|
reset_credentials_flow:
|
||||||
|
description:
|
||||||
|
- The realm reset credentials flow.
|
||||||
|
aliases:
|
||||||
|
- resetCredentialsFlow
|
||||||
|
type: str
|
||||||
|
reset_password_allowed:
|
||||||
|
description:
|
||||||
|
- The realm reset password allowed option.
|
||||||
|
aliases:
|
||||||
|
- resetPasswordAllowed
|
||||||
|
type: bool
|
||||||
|
revoke_refresh_token:
|
||||||
|
description:
|
||||||
|
- The realm revoke refresh token option.
|
||||||
|
aliases:
|
||||||
|
- revokeRefreshToken
|
||||||
|
type: bool
|
||||||
|
smtp_server:
|
||||||
|
description:
|
||||||
|
- The realm smtp server.
|
||||||
|
aliases:
|
||||||
|
- smtpServer
|
||||||
|
type: dict
|
||||||
|
ssl_required:
|
||||||
|
description:
|
||||||
|
- The realm ssl required option.
|
||||||
|
choices: ['all', 'external', 'none']
|
||||||
|
aliases:
|
||||||
|
- sslRequired
|
||||||
|
type: str
|
||||||
|
sso_session_idle_timeout:
|
||||||
|
description:
|
||||||
|
- The realm sso session idle timeout.
|
||||||
|
aliases:
|
||||||
|
- ssoSessionIdleTimeout
|
||||||
|
type: int
|
||||||
|
sso_session_idle_timeout_remember_me:
|
||||||
|
description:
|
||||||
|
- The realm sso session idle timeout remember me.
|
||||||
|
aliases:
|
||||||
|
- ssoSessionIdleTimeoutRememberMe
|
||||||
|
type: int
|
||||||
|
sso_session_max_lifespan:
|
||||||
|
description:
|
||||||
|
- The realm sso session max lifespan.
|
||||||
|
aliases:
|
||||||
|
- ssoSessionMaxLifespan
|
||||||
|
type: int
|
||||||
|
sso_session_max_lifespan_remember_me:
|
||||||
|
description:
|
||||||
|
- The realm sso session max lifespan remember me.
|
||||||
|
aliases:
|
||||||
|
- ssoSessionMaxLifespanRememberMe
|
||||||
|
type: int
|
||||||
|
supported_locales:
|
||||||
|
description:
|
||||||
|
- The realm supported locales.
|
||||||
|
aliases:
|
||||||
|
- supportedLocales
|
||||||
|
type: list
|
||||||
|
elements: str
|
||||||
|
user_managed_access_allowed:
|
||||||
|
description:
|
||||||
|
- The realm user managed access allowed option.
|
||||||
|
aliases:
|
||||||
|
- userManagedAccessAllowed
|
||||||
|
type: bool
|
||||||
|
verify_email:
|
||||||
|
description:
|
||||||
|
- The realm verify email option.
|
||||||
|
aliases:
|
||||||
|
- verifyEmail
|
||||||
|
type: bool
|
||||||
|
wait_increment_seconds:
|
||||||
|
description:
|
||||||
|
- The realm wait increment in seconds.
|
||||||
|
aliases:
|
||||||
|
- waitIncrementSeconds
|
||||||
|
type: int
|
||||||
|
|
||||||
|
extends_documentation_fragment:
|
||||||
|
- middleware_automation.keycloak.keycloak
|
||||||
|
- middleware_automation.keycloak.attributes
|
||||||
|
|
||||||
|
author:
|
||||||
|
- Christophe Gilles (@kris2kris)
|
||||||
|
'''
|
||||||
|
|
||||||
|
EXAMPLES = '''
|
||||||
|
- name: Create or update Keycloak realm (minimal example)
|
||||||
|
middleware_automation.keycloak.keycloak_realm:
|
||||||
|
auth_client_id: admin-cli
|
||||||
|
auth_keycloak_url: https://auth.example.com/auth
|
||||||
|
auth_realm: master
|
||||||
|
auth_username: USERNAME
|
||||||
|
auth_password: PASSWORD
|
||||||
|
id: realm
|
||||||
|
realm: realm
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: Delete a Keycloak realm
|
||||||
|
middleware_automation.keycloak.keycloak_realm:
|
||||||
|
auth_client_id: admin-cli
|
||||||
|
auth_keycloak_url: https://auth.example.com/auth
|
||||||
|
auth_realm: master
|
||||||
|
auth_username: USERNAME
|
||||||
|
auth_password: PASSWORD
|
||||||
|
id: test
|
||||||
|
state: absent
|
||||||
|
'''
|
||||||
|
|
||||||
|
RETURN = '''
|
||||||
|
msg:
|
||||||
|
description: Message as to what action was taken.
|
||||||
|
returned: always
|
||||||
|
type: str
|
||||||
|
sample: "Realm testrealm has been updated"
|
||||||
|
|
||||||
|
proposed:
|
||||||
|
description: Representation of proposed realm.
|
||||||
|
returned: always
|
||||||
|
type: dict
|
||||||
|
sample: {
|
||||||
|
id: "test"
|
||||||
|
}
|
||||||
|
|
||||||
|
existing:
|
||||||
|
description: Representation of existing realm (sample is truncated).
|
||||||
|
returned: always
|
||||||
|
type: dict
|
||||||
|
sample: {
|
||||||
|
"adminUrl": "http://www.example.com/admin_url",
|
||||||
|
"attributes": {
|
||||||
|
"request.object.signature.alg": "RS256",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
end_state:
|
||||||
|
description: Representation of realm after module execution (sample is truncated).
|
||||||
|
returned: on success
|
||||||
|
type: dict
|
||||||
|
sample: {
|
||||||
|
"adminUrl": "http://www.example.com/admin_url",
|
||||||
|
"attributes": {
|
||||||
|
"request.object.signature.alg": "RS256",
|
||||||
|
}
|
||||||
|
}
|
||||||
|
'''
|
||||||
|
|
||||||
|
from ansible_collections.middleware_automation.keycloak.plugins.module_utils.identity.keycloak.keycloak import KeycloakAPI, camel, \
|
||||||
|
keycloak_argument_spec, get_token, KeycloakError
|
||||||
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
|
|
||||||
|
|
||||||
|
def normalise_cr(realmrep):
|
||||||
|
""" Re-sorts any properties where the order is important so that diff's is minimised and the change detection is more effective.
|
||||||
|
|
||||||
|
:param realmrep: the realmrep dict to be sanitized
|
||||||
|
:return: normalised realmrep dict
|
||||||
|
"""
|
||||||
|
# Avoid the dict passed in to be modified
|
||||||
|
realmrep = realmrep.copy()
|
||||||
|
|
||||||
|
if 'enabledEventTypes' in realmrep:
|
||||||
|
realmrep['enabledEventTypes'] = list(sorted(realmrep['enabledEventTypes']))
|
||||||
|
|
||||||
|
if 'otpSupportedApplications' in realmrep:
|
||||||
|
realmrep['otpSupportedApplications'] = list(sorted(realmrep['otpSupportedApplications']))
|
||||||
|
|
||||||
|
if 'supportedLocales' in realmrep:
|
||||||
|
realmrep['supportedLocales'] = list(sorted(realmrep['supportedLocales']))
|
||||||
|
|
||||||
|
return realmrep
|
||||||
|
|
||||||
|
|
||||||
|
def sanitize_cr(realmrep):
|
||||||
|
""" Removes probably sensitive details from a realm representation.
|
||||||
|
|
||||||
|
:param realmrep: the realmrep dict to be sanitized
|
||||||
|
:return: sanitized realmrep dict
|
||||||
|
"""
|
||||||
|
result = realmrep.copy()
|
||||||
|
if 'secret' in result:
|
||||||
|
result['secret'] = '********'
|
||||||
|
if 'attributes' in result:
|
||||||
|
if 'saml.signing.private.key' in result['attributes']:
|
||||||
|
result['attributes'] = result['attributes'].copy()
|
||||||
|
result['attributes']['saml.signing.private.key'] = '********'
|
||||||
|
return normalise_cr(result)
|
||||||
|
|
||||||
|
|
||||||
|
def main():
|
||||||
|
"""
|
||||||
|
Module execution
|
||||||
|
|
||||||
|
:return:
|
||||||
|
"""
|
||||||
|
argument_spec = keycloak_argument_spec()
|
||||||
|
|
||||||
|
meta_args = dict(
|
||||||
|
state=dict(default='present', choices=['present', 'absent']),
|
||||||
|
|
||||||
|
id=dict(type='str'),
|
||||||
|
realm=dict(type='str'),
|
||||||
|
access_code_lifespan=dict(type='int', aliases=['accessCodeLifespan']),
|
||||||
|
access_code_lifespan_login=dict(type='int', aliases=['accessCodeLifespanLogin']),
|
||||||
|
access_code_lifespan_user_action=dict(type='int', aliases=['accessCodeLifespanUserAction']),
|
||||||
|
access_token_lifespan=dict(type='int', aliases=['accessTokenLifespan'], no_log=False),
|
||||||
|
access_token_lifespan_for_implicit_flow=dict(type='int', aliases=['accessTokenLifespanForImplicitFlow'], no_log=False),
|
||||||
|
account_theme=dict(type='str', aliases=['accountTheme']),
|
||||||
|
action_token_generated_by_admin_lifespan=dict(type='int', aliases=['actionTokenGeneratedByAdminLifespan'], no_log=False),
|
||||||
|
action_token_generated_by_user_lifespan=dict(type='int', aliases=['actionTokenGeneratedByUserLifespan'], no_log=False),
|
||||||
|
admin_events_details_enabled=dict(type='bool', aliases=['adminEventsDetailsEnabled']),
|
||||||
|
admin_events_enabled=dict(type='bool', aliases=['adminEventsEnabled']),
|
||||||
|
admin_theme=dict(type='str', aliases=['adminTheme']),
|
||||||
|
attributes=dict(type='dict'),
|
||||||
|
browser_flow=dict(type='str', aliases=['browserFlow']),
|
||||||
|
browser_security_headers=dict(type='dict', aliases=['browserSecurityHeaders']),
|
||||||
|
brute_force_protected=dict(type='bool', aliases=['bruteForceProtected']),
|
||||||
|
client_authentication_flow=dict(type='str', aliases=['clientAuthenticationFlow']),
|
||||||
|
client_scope_mappings=dict(type='dict', aliases=['clientScopeMappings']),
|
||||||
|
default_default_client_scopes=dict(type='list', elements='str', aliases=['defaultDefaultClientScopes']),
|
||||||
|
default_groups=dict(type='list', elements='str', aliases=['defaultGroups']),
|
||||||
|
default_locale=dict(type='str', aliases=['defaultLocale']),
|
||||||
|
default_optional_client_scopes=dict(type='list', elements='str', aliases=['defaultOptionalClientScopes']),
|
||||||
|
default_roles=dict(type='list', elements='str', aliases=['defaultRoles']),
|
||||||
|
default_signature_algorithm=dict(type='str', aliases=['defaultSignatureAlgorithm']),
|
||||||
|
direct_grant_flow=dict(type='str', aliases=['directGrantFlow']),
|
||||||
|
display_name=dict(type='str', aliases=['displayName']),
|
||||||
|
display_name_html=dict(type='str', aliases=['displayNameHtml']),
|
||||||
|
docker_authentication_flow=dict(type='str', aliases=['dockerAuthenticationFlow']),
|
||||||
|
duplicate_emails_allowed=dict(type='bool', aliases=['duplicateEmailsAllowed']),
|
||||||
|
edit_username_allowed=dict(type='bool', aliases=['editUsernameAllowed']),
|
||||||
|
email_theme=dict(type='str', aliases=['emailTheme']),
|
||||||
|
enabled=dict(type='bool'),
|
||||||
|
enabled_event_types=dict(type='list', elements='str', aliases=['enabledEventTypes']),
|
||||||
|
events_enabled=dict(type='bool', aliases=['eventsEnabled']),
|
||||||
|
events_expiration=dict(type='int', aliases=['eventsExpiration']),
|
||||||
|
events_listeners=dict(type='list', elements='str', aliases=['eventsListeners']),
|
||||||
|
failure_factor=dict(type='int', aliases=['failureFactor']),
|
||||||
|
internationalization_enabled=dict(type='bool', aliases=['internationalizationEnabled']),
|
||||||
|
login_theme=dict(type='str', aliases=['loginTheme']),
|
||||||
|
login_with_email_allowed=dict(type='bool', aliases=['loginWithEmailAllowed']),
|
||||||
|
max_delta_time_seconds=dict(type='int', aliases=['maxDeltaTimeSeconds']),
|
||||||
|
max_failure_wait_seconds=dict(type='int', aliases=['maxFailureWaitSeconds']),
|
||||||
|
minimum_quick_login_wait_seconds=dict(type='int', aliases=['minimumQuickLoginWaitSeconds']),
|
||||||
|
not_before=dict(type='int', aliases=['notBefore']),
|
||||||
|
offline_session_idle_timeout=dict(type='int', aliases=['offlineSessionIdleTimeout']),
|
||||||
|
offline_session_max_lifespan=dict(type='int', aliases=['offlineSessionMaxLifespan']),
|
||||||
|
offline_session_max_lifespan_enabled=dict(type='bool', aliases=['offlineSessionMaxLifespanEnabled']),
|
||||||
|
otp_policy_algorithm=dict(type='str', aliases=['otpPolicyAlgorithm']),
|
||||||
|
otp_policy_digits=dict(type='int', aliases=['otpPolicyDigits']),
|
||||||
|
otp_policy_initial_counter=dict(type='int', aliases=['otpPolicyInitialCounter']),
|
||||||
|
otp_policy_look_ahead_window=dict(type='int', aliases=['otpPolicyLookAheadWindow']),
|
||||||
|
otp_policy_period=dict(type='int', aliases=['otpPolicyPeriod']),
|
||||||
|
otp_policy_type=dict(type='str', aliases=['otpPolicyType']),
|
||||||
|
otp_supported_applications=dict(type='list', elements='str', aliases=['otpSupportedApplications']),
|
||||||
|
password_policy=dict(type='str', aliases=['passwordPolicy'], no_log=False),
|
||||||
|
permanent_lockout=dict(type='bool', aliases=['permanentLockout']),
|
||||||
|
quick_login_check_milli_seconds=dict(type='int', aliases=['quickLoginCheckMilliSeconds']),
|
||||||
|
refresh_token_max_reuse=dict(type='int', aliases=['refreshTokenMaxReuse'], no_log=False),
|
||||||
|
registration_allowed=dict(type='bool', aliases=['registrationAllowed']),
|
||||||
|
registration_email_as_username=dict(type='bool', aliases=['registrationEmailAsUsername']),
|
||||||
|
registration_flow=dict(type='str', aliases=['registrationFlow']),
|
||||||
|
remember_me=dict(type='bool', aliases=['rememberMe']),
|
||||||
|
reset_credentials_flow=dict(type='str', aliases=['resetCredentialsFlow']),
|
||||||
|
reset_password_allowed=dict(type='bool', aliases=['resetPasswordAllowed'], no_log=False),
|
||||||
|
revoke_refresh_token=dict(type='bool', aliases=['revokeRefreshToken']),
|
||||||
|
smtp_server=dict(type='dict', aliases=['smtpServer']),
|
||||||
|
ssl_required=dict(choices=["external", "all", "none"], aliases=['sslRequired']),
|
||||||
|
sso_session_idle_timeout=dict(type='int', aliases=['ssoSessionIdleTimeout']),
|
||||||
|
sso_session_idle_timeout_remember_me=dict(type='int', aliases=['ssoSessionIdleTimeoutRememberMe']),
|
||||||
|
sso_session_max_lifespan=dict(type='int', aliases=['ssoSessionMaxLifespan']),
|
||||||
|
sso_session_max_lifespan_remember_me=dict(type='int', aliases=['ssoSessionMaxLifespanRememberMe']),
|
||||||
|
supported_locales=dict(type='list', elements='str', aliases=['supportedLocales']),
|
||||||
|
user_managed_access_allowed=dict(type='bool', aliases=['userManagedAccessAllowed']),
|
||||||
|
verify_email=dict(type='bool', aliases=['verifyEmail']),
|
||||||
|
wait_increment_seconds=dict(type='int', aliases=['waitIncrementSeconds']),
|
||||||
|
)
|
||||||
|
|
||||||
|
argument_spec.update(meta_args)
|
||||||
|
|
||||||
|
module = AnsibleModule(argument_spec=argument_spec,
|
||||||
|
supports_check_mode=True,
|
||||||
|
required_one_of=([['id', 'realm', 'enabled'],
|
||||||
|
['token', 'auth_realm', 'auth_username', 'auth_password']]),
|
||||||
|
required_together=([['auth_realm', 'auth_username', 'auth_password']]))
|
||||||
|
|
||||||
|
result = dict(changed=False, msg='', diff={}, proposed={}, existing={}, end_state={})
|
||||||
|
|
||||||
|
# Obtain access token, initialize API
|
||||||
|
try:
|
||||||
|
connection_header = get_token(module.params)
|
||||||
|
except KeycloakError as e:
|
||||||
|
module.fail_json(msg=str(e))
|
||||||
|
|
||||||
|
kc = KeycloakAPI(module, connection_header)
|
||||||
|
|
||||||
|
realm = module.params.get('realm')
|
||||||
|
state = module.params.get('state')
|
||||||
|
|
||||||
|
# convert module parameters to realm representation parameters (if they belong in there)
|
||||||
|
params_to_ignore = list(keycloak_argument_spec().keys()) + ['state']
|
||||||
|
|
||||||
|
# Filter and map the parameters names that apply to the role
|
||||||
|
realm_params = [x for x in module.params
|
||||||
|
if x not in params_to_ignore and
|
||||||
|
module.params.get(x) is not None]
|
||||||
|
|
||||||
|
# See whether the realm already exists in Keycloak
|
||||||
|
before_realm = kc.get_realm_by_id(realm=realm)
|
||||||
|
|
||||||
|
if before_realm is None:
|
||||||
|
before_realm = {}
|
||||||
|
|
||||||
|
# Build a proposed changeset from parameters given to this module
|
||||||
|
changeset = {}
|
||||||
|
|
||||||
|
for realm_param in realm_params:
|
||||||
|
new_param_value = module.params.get(realm_param)
|
||||||
|
changeset[camel(realm_param)] = new_param_value
|
||||||
|
|
||||||
|
# Prepare the desired values using the existing values (non-existence results in a dict that is save to use as a basis)
|
||||||
|
desired_realm = before_realm.copy()
|
||||||
|
desired_realm.update(changeset)
|
||||||
|
|
||||||
|
result['proposed'] = sanitize_cr(changeset)
|
||||||
|
before_realm_sanitized = sanitize_cr(before_realm)
|
||||||
|
result['existing'] = before_realm_sanitized
|
||||||
|
|
||||||
|
# Cater for when it doesn't exist (an empty dict)
|
||||||
|
if not before_realm:
|
||||||
|
if state == 'absent':
|
||||||
|
# Do nothing and exit
|
||||||
|
if module._diff:
|
||||||
|
result['diff'] = dict(before='', after='')
|
||||||
|
result['changed'] = False
|
||||||
|
result['end_state'] = {}
|
||||||
|
result['msg'] = 'Realm does not exist, doing nothing.'
|
||||||
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
# Process a creation
|
||||||
|
result['changed'] = True
|
||||||
|
|
||||||
|
if 'id' not in desired_realm:
|
||||||
|
module.fail_json(msg='id needs to be specified when creating a new realm')
|
||||||
|
|
||||||
|
if module._diff:
|
||||||
|
result['diff'] = dict(before='', after=sanitize_cr(desired_realm))
|
||||||
|
|
||||||
|
if module.check_mode:
|
||||||
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
# create it
|
||||||
|
kc.create_realm(desired_realm)
|
||||||
|
after_realm = kc.get_realm_by_id(desired_realm['id'])
|
||||||
|
|
||||||
|
result['end_state'] = sanitize_cr(after_realm)
|
||||||
|
|
||||||
|
result['msg'] = 'Realm %s has been created.' % desired_realm['id']
|
||||||
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
else:
|
||||||
|
if state == 'present':
|
||||||
|
# Process an update
|
||||||
|
|
||||||
|
# doing an update
|
||||||
|
result['changed'] = True
|
||||||
|
if module.check_mode:
|
||||||
|
# We can only compare the current realm with the proposed updates we have
|
||||||
|
before_norm = normalise_cr(before_realm)
|
||||||
|
desired_norm = normalise_cr(desired_realm)
|
||||||
|
if module._diff:
|
||||||
|
result['diff'] = dict(before=sanitize_cr(before_norm),
|
||||||
|
after=sanitize_cr(desired_norm))
|
||||||
|
result['changed'] = (before_norm != desired_norm)
|
||||||
|
|
||||||
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
# do the update
|
||||||
|
kc.update_realm(desired_realm, realm=realm)
|
||||||
|
|
||||||
|
after_realm = kc.get_realm_by_id(realm=realm)
|
||||||
|
|
||||||
|
if before_realm == after_realm:
|
||||||
|
result['changed'] = False
|
||||||
|
|
||||||
|
result['end_state'] = sanitize_cr(after_realm)
|
||||||
|
|
||||||
|
if module._diff:
|
||||||
|
result['diff'] = dict(before=before_realm_sanitized,
|
||||||
|
after=sanitize_cr(after_realm))
|
||||||
|
|
||||||
|
result['msg'] = 'Realm %s has been updated.' % desired_realm['id']
|
||||||
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
else:
|
||||||
|
# Process a deletion (because state was not 'present')
|
||||||
|
result['changed'] = True
|
||||||
|
|
||||||
|
if module._diff:
|
||||||
|
result['diff'] = dict(before=before_realm_sanitized, after='')
|
||||||
|
|
||||||
|
if module.check_mode:
|
||||||
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
# delete it
|
||||||
|
kc.delete_realm(realm=realm)
|
||||||
|
|
||||||
|
result['proposed'] = {}
|
||||||
|
result['end_state'] = {}
|
||||||
|
|
||||||
|
result['msg'] = 'Realm %s has been deleted.' % before_realm['id']
|
||||||
|
|
||||||
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
|
||||||
|
if __name__ == '__main__':
|
||||||
|
main()
|
|
@ -40,8 +40,8 @@ options:
|
||||||
state:
|
state:
|
||||||
description:
|
description:
|
||||||
- State of the role.
|
- State of the role.
|
||||||
- On C(present), the role will be created if it does not yet exist, or updated with the parameters you provide.
|
- On V(present), the role will be created if it does not yet exist, or updated with the parameters you provide.
|
||||||
- On C(absent), the role will be removed if it exists.
|
- On V(absent), the role will be removed if it exists.
|
||||||
default: 'present'
|
default: 'present'
|
||||||
type: str
|
type: str
|
||||||
choices:
|
choices:
|
||||||
|
@ -77,6 +77,42 @@ options:
|
||||||
description:
|
description:
|
||||||
- A dict of key/value pairs to set as custom attributes for the role.
|
- A dict of key/value pairs to set as custom attributes for the role.
|
||||||
- Values may be single values (e.g. a string) or a list of strings.
|
- Values may be single values (e.g. a string) or a list of strings.
|
||||||
|
composite:
|
||||||
|
description:
|
||||||
|
- If V(true), the role is a composition of other realm and/or client role.
|
||||||
|
default: false
|
||||||
|
type: bool
|
||||||
|
version_added: 7.1.0
|
||||||
|
composites:
|
||||||
|
description:
|
||||||
|
- List of roles to include to the composite realm role.
|
||||||
|
- If the composite role is a client role, the C(clientId) (not ID of the client) must be specified.
|
||||||
|
default: []
|
||||||
|
type: list
|
||||||
|
elements: dict
|
||||||
|
version_added: 7.1.0
|
||||||
|
suboptions:
|
||||||
|
name:
|
||||||
|
description:
|
||||||
|
- Name of the role. This can be the name of a REALM role or a client role.
|
||||||
|
type: str
|
||||||
|
required: true
|
||||||
|
client_id:
|
||||||
|
description:
|
||||||
|
- Client ID if the role is a client role. Do not include this option for a REALM role.
|
||||||
|
- Use the client ID you can see in the Keycloak console, not the technical ID of the client.
|
||||||
|
type: str
|
||||||
|
required: false
|
||||||
|
aliases:
|
||||||
|
- clientId
|
||||||
|
state:
|
||||||
|
description:
|
||||||
|
- Create the composite if present, remove it if absent.
|
||||||
|
type: str
|
||||||
|
choices:
|
||||||
|
- present
|
||||||
|
- absent
|
||||||
|
default: present
|
||||||
|
|
||||||
extends_documentation_fragment:
|
extends_documentation_fragment:
|
||||||
- middleware_automation.keycloak.keycloak
|
- middleware_automation.keycloak.keycloak
|
||||||
|
@ -198,8 +234,9 @@ end_state:
|
||||||
'''
|
'''
|
||||||
|
|
||||||
from ansible_collections.middleware_automation.keycloak.plugins.module_utils.identity.keycloak.keycloak import KeycloakAPI, camel, \
|
from ansible_collections.middleware_automation.keycloak.plugins.module_utils.identity.keycloak.keycloak import KeycloakAPI, camel, \
|
||||||
keycloak_argument_spec, get_token, KeycloakError
|
keycloak_argument_spec, get_token, KeycloakError, is_struct_included
|
||||||
from ansible.module_utils.basic import AnsibleModule
|
from ansible.module_utils.basic import AnsibleModule
|
||||||
|
import copy
|
||||||
|
|
||||||
|
|
||||||
def main():
|
def main():
|
||||||
|
@ -210,6 +247,12 @@ def main():
|
||||||
"""
|
"""
|
||||||
argument_spec = keycloak_argument_spec()
|
argument_spec = keycloak_argument_spec()
|
||||||
|
|
||||||
|
composites_spec = dict(
|
||||||
|
name=dict(type='str', required=True),
|
||||||
|
client_id=dict(type='str', aliases=['clientId'], required=False),
|
||||||
|
state=dict(type='str', default='present', choices=['present', 'absent'])
|
||||||
|
)
|
||||||
|
|
||||||
meta_args = dict(
|
meta_args = dict(
|
||||||
state=dict(type='str', default='present', choices=['present', 'absent']),
|
state=dict(type='str', default='present', choices=['present', 'absent']),
|
||||||
name=dict(type='str', required=True),
|
name=dict(type='str', required=True),
|
||||||
|
@ -217,6 +260,8 @@ def main():
|
||||||
realm=dict(type='str', default='master'),
|
realm=dict(type='str', default='master'),
|
||||||
client_id=dict(type='str'),
|
client_id=dict(type='str'),
|
||||||
attributes=dict(type='dict'),
|
attributes=dict(type='dict'),
|
||||||
|
composites=dict(type='list', default=[], options=composites_spec, elements='dict'),
|
||||||
|
composite=dict(type='bool', default=False),
|
||||||
)
|
)
|
||||||
|
|
||||||
argument_spec.update(meta_args)
|
argument_spec.update(meta_args)
|
||||||
|
@ -250,7 +295,7 @@ def main():
|
||||||
|
|
||||||
# Filter and map the parameters names that apply to the role
|
# Filter and map the parameters names that apply to the role
|
||||||
role_params = [x for x in module.params
|
role_params = [x for x in module.params
|
||||||
if x not in list(keycloak_argument_spec().keys()) + ['state', 'realm', 'client_id', 'composites'] and
|
if x not in list(keycloak_argument_spec().keys()) + ['state', 'realm', 'client_id'] and
|
||||||
module.params.get(x) is not None]
|
module.params.get(x) is not None]
|
||||||
|
|
||||||
# See if it already exists in Keycloak
|
# See if it already exists in Keycloak
|
||||||
|
@ -269,10 +314,10 @@ def main():
|
||||||
new_param_value = module.params.get(param)
|
new_param_value = module.params.get(param)
|
||||||
old_value = before_role[param] if param in before_role else None
|
old_value = before_role[param] if param in before_role else None
|
||||||
if new_param_value != old_value:
|
if new_param_value != old_value:
|
||||||
changeset[camel(param)] = new_param_value
|
changeset[camel(param)] = copy.deepcopy(new_param_value)
|
||||||
|
|
||||||
# Prepare the desired values using the existing values (non-existence results in a dict that is save to use as a basis)
|
# Prepare the desired values using the existing values (non-existence results in a dict that is save to use as a basis)
|
||||||
desired_role = before_role.copy()
|
desired_role = copy.deepcopy(before_role)
|
||||||
desired_role.update(changeset)
|
desired_role.update(changeset)
|
||||||
|
|
||||||
result['proposed'] = changeset
|
result['proposed'] = changeset
|
||||||
|
@ -309,6 +354,9 @@ def main():
|
||||||
kc.create_client_role(desired_role, clientid, realm)
|
kc.create_client_role(desired_role, clientid, realm)
|
||||||
after_role = kc.get_client_role(name, clientid, realm)
|
after_role = kc.get_client_role(name, clientid, realm)
|
||||||
|
|
||||||
|
if after_role['composite']:
|
||||||
|
after_role['composites'] = kc.get_role_composites(rolerep=after_role, clientid=clientid, realm=realm)
|
||||||
|
|
||||||
result['end_state'] = after_role
|
result['end_state'] = after_role
|
||||||
|
|
||||||
result['msg'] = 'Role {name} has been created'.format(name=name)
|
result['msg'] = 'Role {name} has been created'.format(name=name)
|
||||||
|
@ -316,10 +364,25 @@ def main():
|
||||||
|
|
||||||
else:
|
else:
|
||||||
if state == 'present':
|
if state == 'present':
|
||||||
|
compare_exclude = []
|
||||||
|
if 'composites' in desired_role and isinstance(desired_role['composites'], list) and len(desired_role['composites']) > 0:
|
||||||
|
composites = kc.get_role_composites(rolerep=before_role, clientid=clientid, realm=realm)
|
||||||
|
before_role['composites'] = []
|
||||||
|
for composite in composites:
|
||||||
|
before_composite = {}
|
||||||
|
if composite['clientRole']:
|
||||||
|
composite_client = kc.get_client_by_id(id=composite['containerId'], realm=realm)
|
||||||
|
before_composite['client_id'] = composite_client['clientId']
|
||||||
|
else:
|
||||||
|
before_composite['client_id'] = None
|
||||||
|
before_composite['name'] = composite['name']
|
||||||
|
before_composite['state'] = 'present'
|
||||||
|
before_role['composites'].append(before_composite)
|
||||||
|
else:
|
||||||
|
compare_exclude.append('composites')
|
||||||
# Process an update
|
# Process an update
|
||||||
|
|
||||||
# no changes
|
# no changes
|
||||||
if desired_role == before_role:
|
if is_struct_included(desired_role, before_role, exclude=compare_exclude):
|
||||||
result['changed'] = False
|
result['changed'] = False
|
||||||
result['end_state'] = desired_role
|
result['end_state'] = desired_role
|
||||||
result['msg'] = "No changes required to role {name}.".format(name=name)
|
result['msg'] = "No changes required to role {name}.".format(name=name)
|
||||||
|
@ -341,6 +404,8 @@ def main():
|
||||||
else:
|
else:
|
||||||
kc.update_client_role(desired_role, clientid, realm)
|
kc.update_client_role(desired_role, clientid, realm)
|
||||||
after_role = kc.get_client_role(name, clientid, realm)
|
after_role = kc.get_client_role(name, clientid, realm)
|
||||||
|
if after_role['composite']:
|
||||||
|
after_role['composites'] = kc.get_role_composites(rolerep=after_role, clientid=clientid, realm=realm)
|
||||||
|
|
||||||
result['end_state'] = after_role
|
result['end_state'] = after_role
|
||||||
|
|
||||||
|
|
|
@ -36,9 +36,9 @@ options:
|
||||||
state:
|
state:
|
||||||
description:
|
description:
|
||||||
- State of the user federation.
|
- State of the user federation.
|
||||||
- On C(present), the user federation will be created if it does not yet exist, or updated with
|
- On V(present), the user federation will be created if it does not yet exist, or updated with
|
||||||
the parameters you provide.
|
the parameters you provide.
|
||||||
- On C(absent), the user federation will be removed if it exists.
|
- On V(absent), the user federation will be removed if it exists.
|
||||||
default: 'present'
|
default: 'present'
|
||||||
type: str
|
type: str
|
||||||
choices:
|
choices:
|
||||||
|
@ -54,7 +54,7 @@ options:
|
||||||
id:
|
id:
|
||||||
description:
|
description:
|
||||||
- The unique ID for this user federation. If left empty, the user federation will be searched
|
- The unique ID for this user federation. If left empty, the user federation will be searched
|
||||||
by its I(name).
|
by its O(name).
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
name:
|
name:
|
||||||
|
@ -64,18 +64,15 @@ options:
|
||||||
|
|
||||||
provider_id:
|
provider_id:
|
||||||
description:
|
description:
|
||||||
- Provider for this user federation.
|
- Provider for this user federation. Built-in providers are V(ldap), V(kerberos), and V(sssd).
|
||||||
|
Custom user storage providers can also be used.
|
||||||
aliases:
|
aliases:
|
||||||
- providerId
|
- providerId
|
||||||
type: str
|
type: str
|
||||||
choices:
|
|
||||||
- ldap
|
|
||||||
- kerberos
|
|
||||||
- sssd
|
|
||||||
|
|
||||||
provider_type:
|
provider_type:
|
||||||
description:
|
description:
|
||||||
- Component type for user federation (only supported value is C(org.keycloak.storage.UserStorageProvider)).
|
- Component type for user federation (only supported value is V(org.keycloak.storage.UserStorageProvider)).
|
||||||
aliases:
|
aliases:
|
||||||
- providerType
|
- providerType
|
||||||
default: org.keycloak.storage.UserStorageProvider
|
default: org.keycloak.storage.UserStorageProvider
|
||||||
|
@ -88,13 +85,37 @@ options:
|
||||||
- parentId
|
- parentId
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
|
remove_unspecified_mappers:
|
||||||
|
description:
|
||||||
|
- Remove mappers that are not specified in the configuration for this federation.
|
||||||
|
- Set to V(false) to keep mappers that are not listed in O(mappers).
|
||||||
|
type: bool
|
||||||
|
default: true
|
||||||
|
|
||||||
|
bind_credential_update_mode:
|
||||||
|
description:
|
||||||
|
- The value of the config parameter O(config.bindCredential) is redacted in the Keycloak responses.
|
||||||
|
Comparing the redacted value with the desired value always evaluates to not equal. This means
|
||||||
|
the before and desired states are never equal if the parameter is set.
|
||||||
|
- Set to V(always) to include O(config.bindCredential) in the comparison of before and desired state.
|
||||||
|
Because of the redacted value returned by Keycloak the module will always detect a change
|
||||||
|
and make an update if a O(config.bindCredential) value is set.
|
||||||
|
- Set to V(only_indirect) to exclude O(config.bindCredential) when comparing the before state with the
|
||||||
|
desired state. The value of O(config.bindCredential) will only be updated if there are other changes
|
||||||
|
to the user federation that require an update.
|
||||||
|
type: str
|
||||||
|
default: always
|
||||||
|
choices:
|
||||||
|
- always
|
||||||
|
- only_indirect
|
||||||
|
|
||||||
config:
|
config:
|
||||||
description:
|
description:
|
||||||
- Dict specifying the configuration options for the provider; the contents differ depending on
|
- Dict specifying the configuration options for the provider; the contents differ depending on
|
||||||
the value of I(provider_id). Examples are given below for C(ldap), C(kerberos) and C(sssd).
|
the value of O(provider_id). Examples are given below for V(ldap), V(kerberos) and V(sssd).
|
||||||
It is easiest to obtain valid config values by dumping an already-existing user federation
|
It is easiest to obtain valid config values by dumping an already-existing user federation
|
||||||
configuration through check-mode in the I(existing) field.
|
configuration through check-mode in the RV(existing) field.
|
||||||
- The value C(sssd) has been supported since middleware_automation.keycloak 1.0.0.
|
- The value V(sssd) has been supported since middleware_automation.keycloak 2.0.0.
|
||||||
type: dict
|
type: dict
|
||||||
suboptions:
|
suboptions:
|
||||||
enabled:
|
enabled:
|
||||||
|
@ -111,15 +132,15 @@ options:
|
||||||
|
|
||||||
importEnabled:
|
importEnabled:
|
||||||
description:
|
description:
|
||||||
- If C(true), LDAP users will be imported into Keycloak DB and synced by the configured
|
- If V(true), LDAP users will be imported into Keycloak DB and synced by the configured
|
||||||
sync policies.
|
sync policies.
|
||||||
default: true
|
default: true
|
||||||
type: bool
|
type: bool
|
||||||
|
|
||||||
editMode:
|
editMode:
|
||||||
description:
|
description:
|
||||||
- C(READ_ONLY) is a read-only LDAP store. C(WRITABLE) means data will be synced back to LDAP
|
- V(READ_ONLY) is a read-only LDAP store. V(WRITABLE) means data will be synced back to LDAP
|
||||||
on demand. C(UNSYNCED) means user data will be imported, but not synced back to LDAP.
|
on demand. V(UNSYNCED) means user data will be imported, but not synced back to LDAP.
|
||||||
type: str
|
type: str
|
||||||
choices:
|
choices:
|
||||||
- READ_ONLY
|
- READ_ONLY
|
||||||
|
@ -136,13 +157,13 @@ options:
|
||||||
vendor:
|
vendor:
|
||||||
description:
|
description:
|
||||||
- LDAP vendor (provider).
|
- LDAP vendor (provider).
|
||||||
- Use short name. For instance, write C(rhds) for "Red Hat Directory Server".
|
- Use short name. For instance, write V(rhds) for "Red Hat Directory Server".
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
usernameLDAPAttribute:
|
usernameLDAPAttribute:
|
||||||
description:
|
description:
|
||||||
- Name of LDAP attribute, which is mapped as Keycloak username. For many LDAP server
|
- Name of LDAP attribute, which is mapped as Keycloak username. For many LDAP server
|
||||||
vendors it can be C(uid). For Active directory it can be C(sAMAccountName) or C(cn).
|
vendors it can be V(uid). For Active directory it can be V(sAMAccountName) or V(cn).
|
||||||
The attribute should be filled for all LDAP user records you want to import from
|
The attribute should be filled for all LDAP user records you want to import from
|
||||||
LDAP to Keycloak.
|
LDAP to Keycloak.
|
||||||
type: str
|
type: str
|
||||||
|
@ -151,15 +172,15 @@ options:
|
||||||
description:
|
description:
|
||||||
- Name of LDAP attribute, which is used as RDN (top attribute) of typical user DN.
|
- Name of LDAP attribute, which is used as RDN (top attribute) of typical user DN.
|
||||||
Usually it's the same as Username LDAP attribute, however it is not required. For
|
Usually it's the same as Username LDAP attribute, however it is not required. For
|
||||||
example for Active directory, it is common to use C(cn) as RDN attribute when
|
example for Active directory, it is common to use V(cn) as RDN attribute when
|
||||||
username attribute might be C(sAMAccountName).
|
username attribute might be V(sAMAccountName).
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
uuidLDAPAttribute:
|
uuidLDAPAttribute:
|
||||||
description:
|
description:
|
||||||
- Name of LDAP attribute, which is used as unique object identifier (UUID) for objects
|
- Name of LDAP attribute, which is used as unique object identifier (UUID) for objects
|
||||||
in LDAP. For many LDAP server vendors, it is C(entryUUID); however some are different.
|
in LDAP. For many LDAP server vendors, it is V(entryUUID); however some are different.
|
||||||
For example for Active directory it should be C(objectGUID). If your LDAP server does
|
For example for Active directory it should be V(objectGUID). If your LDAP server does
|
||||||
not support the notion of UUID, you can use any other attribute that is supposed to
|
not support the notion of UUID, you can use any other attribute that is supposed to
|
||||||
be unique among LDAP users in tree.
|
be unique among LDAP users in tree.
|
||||||
type: str
|
type: str
|
||||||
|
@ -167,7 +188,7 @@ options:
|
||||||
userObjectClasses:
|
userObjectClasses:
|
||||||
description:
|
description:
|
||||||
- All values of LDAP objectClass attribute for users in LDAP divided by comma.
|
- All values of LDAP objectClass attribute for users in LDAP divided by comma.
|
||||||
For example C(inetOrgPerson, organizationalPerson). Newly created Keycloak users
|
For example V(inetOrgPerson, organizationalPerson). Newly created Keycloak users
|
||||||
will be written to LDAP with all those object classes and existing LDAP user records
|
will be written to LDAP with all those object classes and existing LDAP user records
|
||||||
are found just if they contain all those object classes.
|
are found just if they contain all those object classes.
|
||||||
type: str
|
type: str
|
||||||
|
@ -251,8 +272,8 @@ options:
|
||||||
useTruststoreSpi:
|
useTruststoreSpi:
|
||||||
description:
|
description:
|
||||||
- Specifies whether LDAP connection will use the truststore SPI with the truststore
|
- Specifies whether LDAP connection will use the truststore SPI with the truststore
|
||||||
configured in standalone.xml/domain.xml. C(Always) means that it will always use it.
|
configured in standalone.xml/domain.xml. V(always) means that it will always use it.
|
||||||
C(Never) means that it will not use it. C(Only for ldaps) means that it will use if
|
V(never) means that it will not use it. V(ldapsOnly) means that it will use if
|
||||||
your connection URL use ldaps. Note even if standalone.xml/domain.xml is not
|
your connection URL use ldaps. Note even if standalone.xml/domain.xml is not
|
||||||
configured, the default Java cacerts or certificate specified by
|
configured, the default Java cacerts or certificate specified by
|
||||||
C(javax.net.ssl.trustStore) property will be used.
|
C(javax.net.ssl.trustStore) property will be used.
|
||||||
|
@ -297,7 +318,7 @@ options:
|
||||||
connectionPoolingDebug:
|
connectionPoolingDebug:
|
||||||
description:
|
description:
|
||||||
- A string that indicates the level of debug output to produce. Example valid values are
|
- A string that indicates the level of debug output to produce. Example valid values are
|
||||||
C(fine) (trace connection creation and removal) and C(all) (all debugging information).
|
V(fine) (trace connection creation and removal) and V(all) (all debugging information).
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
connectionPoolingInitSize:
|
connectionPoolingInitSize:
|
||||||
|
@ -321,7 +342,7 @@ options:
|
||||||
connectionPoolingProtocol:
|
connectionPoolingProtocol:
|
||||||
description:
|
description:
|
||||||
- A list of space-separated protocol types of connections that may be pooled.
|
- A list of space-separated protocol types of connections that may be pooled.
|
||||||
Valid types are C(plain) and C(ssl).
|
Valid types are V(plain) and V(ssl).
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
connectionPoolingTimeout:
|
connectionPoolingTimeout:
|
||||||
|
@ -342,17 +363,26 @@ options:
|
||||||
- Name of kerberos realm.
|
- Name of kerberos realm.
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
|
krbPrincipalAttribute:
|
||||||
|
description:
|
||||||
|
- Name of the LDAP attribute, which refers to Kerberos principal.
|
||||||
|
This is used to lookup appropriate LDAP user after successful Kerberos/SPNEGO authentication in Keycloak.
|
||||||
|
When this is empty, the LDAP user will be looked based on LDAP username corresponding
|
||||||
|
to the first part of his Kerberos principal. For instance, for principal C(john@KEYCLOAK.ORG),
|
||||||
|
it will assume that LDAP username is V(john).
|
||||||
|
type: str
|
||||||
|
|
||||||
serverPrincipal:
|
serverPrincipal:
|
||||||
description:
|
description:
|
||||||
- Full name of server principal for HTTP service including server and domain name. For
|
- Full name of server principal for HTTP service including server and domain name. For
|
||||||
example C(HTTP/host.foo.org@FOO.ORG). Use C(*) to accept any service principal in the
|
example V(HTTP/host.foo.org@FOO.ORG). Use V(*) to accept any service principal in the
|
||||||
KeyTab file.
|
KeyTab file.
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
keyTab:
|
keyTab:
|
||||||
description:
|
description:
|
||||||
- Location of Kerberos KeyTab file containing the credentials of server principal. For
|
- Location of Kerberos KeyTab file containing the credentials of server principal. For
|
||||||
example C(/etc/krb5.keytab).
|
example V(/etc/krb5.keytab).
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
debug:
|
debug:
|
||||||
|
@ -427,6 +457,16 @@ options:
|
||||||
- Max lifespan of cache entry in milliseconds.
|
- Max lifespan of cache entry in milliseconds.
|
||||||
type: int
|
type: int
|
||||||
|
|
||||||
|
referral:
|
||||||
|
description:
|
||||||
|
- Specifies if LDAP referrals should be followed or ignored. Please note that enabling
|
||||||
|
referrals can slow down authentication as it allows the LDAP server to decide which other
|
||||||
|
LDAP servers to use. This could potentially include untrusted servers.
|
||||||
|
type: str
|
||||||
|
choices:
|
||||||
|
- ignore
|
||||||
|
- follow
|
||||||
|
|
||||||
mappers:
|
mappers:
|
||||||
description:
|
description:
|
||||||
- A list of dicts defining mappers associated with this Identity Provider.
|
- A list of dicts defining mappers associated with this Identity Provider.
|
||||||
|
@ -451,7 +491,7 @@ options:
|
||||||
|
|
||||||
providerId:
|
providerId:
|
||||||
description:
|
description:
|
||||||
- The mapper type for this mapper (for instance C(user-attribute-ldap-mapper)).
|
- The mapper type for this mapper (for instance V(user-attribute-ldap-mapper)).
|
||||||
type: str
|
type: str
|
||||||
|
|
||||||
providerType:
|
providerType:
|
||||||
|
@ -568,7 +608,6 @@ EXAMPLES = '''
|
||||||
realm: my-realm
|
realm: my-realm
|
||||||
name: my-federation
|
name: my-federation
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
'''
|
'''
|
||||||
|
|
||||||
RETURN = '''
|
RETURN = '''
|
||||||
|
@ -705,16 +744,27 @@ from ansible.module_utils.six.moves.urllib.parse import urlencode
|
||||||
from copy import deepcopy
|
from copy import deepcopy
|
||||||
|
|
||||||
|
|
||||||
|
def normalize_kc_comp(comp):
|
||||||
|
if 'config' in comp:
|
||||||
|
# kc completely removes the parameter `krbPrincipalAttribute` if it is set to `''`; the unset kc parameter is equivalent to `''`;
|
||||||
|
# to make change detection and diff more accurate we set it again in the kc responses
|
||||||
|
if 'krbPrincipalAttribute' not in comp['config']:
|
||||||
|
comp['config']['krbPrincipalAttribute'] = ['']
|
||||||
|
|
||||||
|
# kc stores a timestamp of the last sync in `lastSync` to time the periodic sync, it is removed to minimize diff/changes
|
||||||
|
comp['config'].pop('lastSync', None)
|
||||||
|
|
||||||
|
|
||||||
def sanitize(comp):
|
def sanitize(comp):
|
||||||
compcopy = deepcopy(comp)
|
compcopy = deepcopy(comp)
|
||||||
if 'config' in compcopy:
|
if 'config' in compcopy:
|
||||||
compcopy['config'] = dict((k, v[0]) for k, v in compcopy['config'].items())
|
compcopy['config'] = {k: v[0] for k, v in compcopy['config'].items()}
|
||||||
if 'bindCredential' in compcopy['config']:
|
if 'bindCredential' in compcopy['config']:
|
||||||
compcopy['config']['bindCredential'] = '**********'
|
compcopy['config']['bindCredential'] = '**********'
|
||||||
if 'mappers' in compcopy:
|
if 'mappers' in compcopy:
|
||||||
for mapper in compcopy['mappers']:
|
for mapper in compcopy['mappers']:
|
||||||
if 'config' in mapper:
|
if 'config' in mapper:
|
||||||
mapper['config'] = dict((k, v[0]) for k, v in mapper['config'].items())
|
mapper['config'] = {k: v[0] for k, v in mapper['config'].items()}
|
||||||
return compcopy
|
return compcopy
|
||||||
|
|
||||||
|
|
||||||
|
@ -761,8 +811,10 @@ def main():
|
||||||
priority=dict(type='int', default=0),
|
priority=dict(type='int', default=0),
|
||||||
rdnLDAPAttribute=dict(type='str'),
|
rdnLDAPAttribute=dict(type='str'),
|
||||||
readTimeout=dict(type='int'),
|
readTimeout=dict(type='int'),
|
||||||
|
referral=dict(type='str', choices=['ignore', 'follow']),
|
||||||
searchScope=dict(type='str', choices=['1', '2'], default='1'),
|
searchScope=dict(type='str', choices=['1', '2'], default='1'),
|
||||||
serverPrincipal=dict(type='str'),
|
serverPrincipal=dict(type='str'),
|
||||||
|
krbPrincipalAttribute=dict(type='str'),
|
||||||
startTls=dict(type='bool', default=False),
|
startTls=dict(type='bool', default=False),
|
||||||
syncRegistrations=dict(type='bool', default=False),
|
syncRegistrations=dict(type='bool', default=False),
|
||||||
trustEmail=dict(type='bool', default=False),
|
trustEmail=dict(type='bool', default=False),
|
||||||
|
@ -793,9 +845,11 @@ def main():
|
||||||
realm=dict(type='str', default='master'),
|
realm=dict(type='str', default='master'),
|
||||||
id=dict(type='str'),
|
id=dict(type='str'),
|
||||||
name=dict(type='str'),
|
name=dict(type='str'),
|
||||||
provider_id=dict(type='str', aliases=['providerId'], choices=['ldap', 'kerberos', 'sssd']),
|
provider_id=dict(type='str', aliases=['providerId']),
|
||||||
provider_type=dict(type='str', aliases=['providerType'], default='org.keycloak.storage.UserStorageProvider'),
|
provider_type=dict(type='str', aliases=['providerType'], default='org.keycloak.storage.UserStorageProvider'),
|
||||||
parent_id=dict(type='str', aliases=['parentId']),
|
parent_id=dict(type='str', aliases=['parentId']),
|
||||||
|
remove_unspecified_mappers=dict(type='bool', default=True),
|
||||||
|
bind_credential_update_mode=dict(type='str', default='always', choices=['always', 'only_indirect']),
|
||||||
mappers=dict(type='list', elements='dict', options=mapper_spec),
|
mappers=dict(type='list', elements='dict', options=mapper_spec),
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -826,19 +880,26 @@ def main():
|
||||||
|
|
||||||
# Keycloak API expects config parameters to be arrays containing a single string element
|
# Keycloak API expects config parameters to be arrays containing a single string element
|
||||||
if config is not None:
|
if config is not None:
|
||||||
module.params['config'] = dict((k, [str(v).lower() if not isinstance(v, str) else v])
|
module.params['config'] = {
|
||||||
for k, v in config.items() if config[k] is not None)
|
k: [str(v).lower() if not isinstance(v, str) else v]
|
||||||
|
for k, v in config.items()
|
||||||
|
if config[k] is not None
|
||||||
|
}
|
||||||
|
|
||||||
if mappers is not None:
|
if mappers is not None:
|
||||||
for mapper in mappers:
|
for mapper in mappers:
|
||||||
if mapper.get('config') is not None:
|
if mapper.get('config') is not None:
|
||||||
mapper['config'] = dict((k, [str(v).lower() if not isinstance(v, str) else v])
|
mapper['config'] = {
|
||||||
for k, v in mapper['config'].items() if mapper['config'][k] is not None)
|
k: [str(v).lower() if not isinstance(v, str) else v]
|
||||||
|
for k, v in mapper['config'].items()
|
||||||
|
if mapper['config'][k] is not None
|
||||||
|
}
|
||||||
|
|
||||||
# Filter and map the parameters names that apply
|
# Filter and map the parameters names that apply
|
||||||
comp_params = [x for x in module.params
|
comp_params = [x for x in module.params
|
||||||
if x not in list(keycloak_argument_spec().keys()) + ['state', 'realm', 'mappers'] and
|
if x not in list(keycloak_argument_spec().keys())
|
||||||
module.params.get(x) is not None]
|
+ ['state', 'realm', 'mappers', 'remove_unspecified_mappers', 'bind_credential_update_mode']
|
||||||
|
and module.params.get(x) is not None]
|
||||||
|
|
||||||
# See if it already exists in Keycloak
|
# See if it already exists in Keycloak
|
||||||
if cid is None:
|
if cid is None:
|
||||||
|
@ -856,7 +917,9 @@ def main():
|
||||||
|
|
||||||
# if user federation exists, get associated mappers
|
# if user federation exists, get associated mappers
|
||||||
if cid is not None and before_comp:
|
if cid is not None and before_comp:
|
||||||
before_comp['mappers'] = sorted(kc.get_components(urlencode(dict(parent=cid)), realm), key=lambda x: x.get('name'))
|
before_comp['mappers'] = sorted(kc.get_components(urlencode(dict(parent=cid)), realm), key=lambda x: x.get('name') or '')
|
||||||
|
|
||||||
|
normalize_kc_comp(before_comp)
|
||||||
|
|
||||||
# Build a proposed changeset from parameters given to this module
|
# Build a proposed changeset from parameters given to this module
|
||||||
changeset = {}
|
changeset = {}
|
||||||
|
@ -865,7 +928,7 @@ def main():
|
||||||
new_param_value = module.params.get(param)
|
new_param_value = module.params.get(param)
|
||||||
old_value = before_comp[camel(param)] if camel(param) in before_comp else None
|
old_value = before_comp[camel(param)] if camel(param) in before_comp else None
|
||||||
if param == 'mappers':
|
if param == 'mappers':
|
||||||
new_param_value = [dict((k, v) for k, v in x.items() if x[k] is not None) for x in new_param_value]
|
new_param_value = [{k: v for k, v in x.items() if v is not None} for x in new_param_value]
|
||||||
if new_param_value != old_value:
|
if new_param_value != old_value:
|
||||||
changeset[camel(param)] = new_param_value
|
changeset[camel(param)] = new_param_value
|
||||||
|
|
||||||
|
@ -874,17 +937,17 @@ def main():
|
||||||
if module.params['provider_id'] in ['kerberos', 'sssd']:
|
if module.params['provider_id'] in ['kerberos', 'sssd']:
|
||||||
module.fail_json(msg='Cannot configure mappers for {type} provider.'.format(type=module.params['provider_id']))
|
module.fail_json(msg='Cannot configure mappers for {type} provider.'.format(type=module.params['provider_id']))
|
||||||
for change in module.params['mappers']:
|
for change in module.params['mappers']:
|
||||||
change = dict((k, v) for k, v in change.items() if change[k] is not None)
|
change = {k: v for k, v in change.items() if v is not None}
|
||||||
if change.get('id') is None and change.get('name') is None:
|
if change.get('id') is None and change.get('name') is None:
|
||||||
module.fail_json(msg='Either `name` or `id` has to be specified on each mapper.')
|
module.fail_json(msg='Either `name` or `id` has to be specified on each mapper.')
|
||||||
if cid is None:
|
if cid is None:
|
||||||
old_mapper = {}
|
old_mapper = {}
|
||||||
elif change.get('id') is not None:
|
elif change.get('id') is not None:
|
||||||
old_mapper = kc.get_component(change['id'], realm)
|
old_mapper = next((before_mapper for before_mapper in before_comp.get('mappers', []) if before_mapper["id"] == change['id']), None)
|
||||||
if old_mapper is None:
|
if old_mapper is None:
|
||||||
old_mapper = {}
|
old_mapper = {}
|
||||||
else:
|
else:
|
||||||
found = kc.get_components(urlencode(dict(parent=cid, name=change['name'])), realm)
|
found = [before_mapper for before_mapper in before_comp.get('mappers', []) if before_mapper['name'] == change['name']]
|
||||||
if len(found) > 1:
|
if len(found) > 1:
|
||||||
module.fail_json(msg='Found multiple mappers with name `{name}`. Cannot continue.'.format(name=change['name']))
|
module.fail_json(msg='Found multiple mappers with name `{name}`. Cannot continue.'.format(name=change['name']))
|
||||||
if len(found) == 1:
|
if len(found) == 1:
|
||||||
|
@ -893,10 +956,16 @@ def main():
|
||||||
old_mapper = {}
|
old_mapper = {}
|
||||||
new_mapper = old_mapper.copy()
|
new_mapper = old_mapper.copy()
|
||||||
new_mapper.update(change)
|
new_mapper.update(change)
|
||||||
if new_mapper != old_mapper:
|
# changeset contains all desired mappers: those existing, to update or to create
|
||||||
if changeset.get('mappers') is None:
|
if changeset.get('mappers') is None:
|
||||||
changeset['mappers'] = list()
|
changeset['mappers'] = list()
|
||||||
changeset['mappers'].append(new_mapper)
|
changeset['mappers'].append(new_mapper)
|
||||||
|
changeset['mappers'] = sorted(changeset['mappers'], key=lambda x: x.get('name') or '')
|
||||||
|
|
||||||
|
# to keep unspecified existing mappers we add them to the desired mappers list, unless they're already present
|
||||||
|
if not module.params['remove_unspecified_mappers'] and 'mappers' in before_comp:
|
||||||
|
changeset_mapper_ids = [mapper['id'] for mapper in changeset['mappers'] if 'id' in mapper]
|
||||||
|
changeset['mappers'].extend([mapper for mapper in before_comp['mappers'] if mapper['id'] not in changeset_mapper_ids])
|
||||||
|
|
||||||
# Prepare the desired values using the existing values (non-existence results in a dict that is save to use as a basis)
|
# Prepare the desired values using the existing values (non-existence results in a dict that is save to use as a basis)
|
||||||
desired_comp = before_comp.copy()
|
desired_comp = before_comp.copy()
|
||||||
|
@ -919,50 +988,68 @@ def main():
|
||||||
# Process a creation
|
# Process a creation
|
||||||
result['changed'] = True
|
result['changed'] = True
|
||||||
|
|
||||||
|
if module.check_mode:
|
||||||
if module._diff:
|
if module._diff:
|
||||||
result['diff'] = dict(before='', after=sanitize(desired_comp))
|
result['diff'] = dict(before='', after=sanitize(desired_comp))
|
||||||
|
|
||||||
if module.check_mode:
|
|
||||||
module.exit_json(**result)
|
module.exit_json(**result)
|
||||||
|
|
||||||
# create it
|
# create it
|
||||||
desired_comp = desired_comp.copy()
|
desired_mappers = desired_comp.pop('mappers', [])
|
||||||
updated_mappers = desired_comp.pop('mappers', [])
|
|
||||||
after_comp = kc.create_component(desired_comp, realm)
|
after_comp = kc.create_component(desired_comp, realm)
|
||||||
|
|
||||||
cid = after_comp['id']
|
cid = after_comp['id']
|
||||||
|
updated_mappers = []
|
||||||
|
# when creating a user federation, keycloak automatically creates default mappers
|
||||||
|
default_mappers = kc.get_components(urlencode(dict(parent=cid)), realm)
|
||||||
|
|
||||||
for mapper in updated_mappers:
|
# create new mappers or update existing default mappers
|
||||||
found = kc.get_components(urlencode(dict(parent=cid, name=mapper['name'])), realm)
|
for desired_mapper in desired_mappers:
|
||||||
|
found = [default_mapper for default_mapper in default_mappers if default_mapper['name'] == desired_mapper['name']]
|
||||||
if len(found) > 1:
|
if len(found) > 1:
|
||||||
module.fail_json(msg='Found multiple mappers with name `{name}`. Cannot continue.'.format(name=mapper['name']))
|
module.fail_json(msg='Found multiple mappers with name `{name}`. Cannot continue.'.format(name=desired_mapper['name']))
|
||||||
if len(found) == 1:
|
if len(found) == 1:
|
||||||
old_mapper = found[0]
|
old_mapper = found[0]
|
||||||
else:
|
else:
|
||||||
old_mapper = {}
|
old_mapper = {}
|
||||||
|
|
||||||
new_mapper = old_mapper.copy()
|
new_mapper = old_mapper.copy()
|
||||||
new_mapper.update(mapper)
|
new_mapper.update(desired_mapper)
|
||||||
|
|
||||||
if new_mapper.get('id') is not None:
|
if new_mapper.get('id') is not None:
|
||||||
kc.update_component(new_mapper, realm)
|
kc.update_component(new_mapper, realm)
|
||||||
|
updated_mappers.append(new_mapper)
|
||||||
else:
|
else:
|
||||||
if new_mapper.get('parentId') is None:
|
if new_mapper.get('parentId') is None:
|
||||||
new_mapper['parentId'] = after_comp['id']
|
new_mapper['parentId'] = cid
|
||||||
mapper = kc.create_component(new_mapper, realm)
|
updated_mappers.append(kc.create_component(new_mapper, realm))
|
||||||
|
|
||||||
after_comp['mappers'] = updated_mappers
|
if module.params['remove_unspecified_mappers']:
|
||||||
|
# we remove all unwanted default mappers
|
||||||
|
# we use ids so we dont accidently remove one of the previously updated default mapper
|
||||||
|
for default_mapper in default_mappers:
|
||||||
|
if not default_mapper['id'] in [x['id'] for x in updated_mappers]:
|
||||||
|
kc.delete_component(default_mapper['id'], realm)
|
||||||
|
|
||||||
|
after_comp['mappers'] = kc.get_components(urlencode(dict(parent=cid)), realm)
|
||||||
|
normalize_kc_comp(after_comp)
|
||||||
|
if module._diff:
|
||||||
|
result['diff'] = dict(before='', after=sanitize(after_comp))
|
||||||
result['end_state'] = sanitize(after_comp)
|
result['end_state'] = sanitize(after_comp)
|
||||||
|
result['msg'] = "User federation {id} has been created".format(id=cid)
|
||||||
result['msg'] = "User federation {id} has been created".format(id=after_comp['id'])
|
|
||||||
module.exit_json(**result)
|
module.exit_json(**result)
|
||||||
|
|
||||||
else:
|
else:
|
||||||
if state == 'present':
|
if state == 'present':
|
||||||
# Process an update
|
# Process an update
|
||||||
|
|
||||||
|
desired_copy = deepcopy(desired_comp)
|
||||||
|
before_copy = deepcopy(before_comp)
|
||||||
|
# exclude bindCredential when checking wether an update is required, therefore
|
||||||
|
# updating it only if there are other changes
|
||||||
|
if module.params['bind_credential_update_mode'] == 'only_indirect':
|
||||||
|
desired_copy.get('config', []).pop('bindCredential', None)
|
||||||
|
before_copy.get('config', []).pop('bindCredential', None)
|
||||||
# no changes
|
# no changes
|
||||||
if desired_comp == before_comp:
|
if desired_copy == before_copy:
|
||||||
result['changed'] = False
|
result['changed'] = False
|
||||||
result['end_state'] = sanitize(desired_comp)
|
result['end_state'] = sanitize(desired_comp)
|
||||||
result['msg'] = "No changes required to user federation {id}.".format(id=cid)
|
result['msg'] = "No changes required to user federation {id}.".format(id=cid)
|
||||||
|
@ -978,22 +1065,33 @@ def main():
|
||||||
module.exit_json(**result)
|
module.exit_json(**result)
|
||||||
|
|
||||||
# do the update
|
# do the update
|
||||||
desired_comp = desired_comp.copy()
|
desired_mappers = desired_comp.pop('mappers', [])
|
||||||
updated_mappers = desired_comp.pop('mappers', [])
|
|
||||||
kc.update_component(desired_comp, realm)
|
kc.update_component(desired_comp, realm)
|
||||||
after_comp = kc.get_component(cid, realm)
|
|
||||||
|
|
||||||
for mapper in updated_mappers:
|
for before_mapper in before_comp.get('mappers', []):
|
||||||
|
# remove unwanted existing mappers that will not be updated
|
||||||
|
if not before_mapper['id'] in [x['id'] for x in desired_mappers if 'id' in x]:
|
||||||
|
kc.delete_component(before_mapper['id'], realm)
|
||||||
|
|
||||||
|
for mapper in desired_mappers:
|
||||||
|
if mapper in before_comp.get('mappers', []):
|
||||||
|
continue
|
||||||
if mapper.get('id') is not None:
|
if mapper.get('id') is not None:
|
||||||
kc.update_component(mapper, realm)
|
kc.update_component(mapper, realm)
|
||||||
else:
|
else:
|
||||||
if mapper.get('parentId') is None:
|
if mapper.get('parentId') is None:
|
||||||
mapper['parentId'] = desired_comp['id']
|
mapper['parentId'] = desired_comp['id']
|
||||||
mapper = kc.create_component(mapper, realm)
|
kc.create_component(mapper, realm)
|
||||||
|
|
||||||
after_comp['mappers'] = updated_mappers
|
|
||||||
result['end_state'] = sanitize(after_comp)
|
|
||||||
|
|
||||||
|
after_comp = kc.get_component(cid, realm)
|
||||||
|
after_comp['mappers'] = sorted(kc.get_components(urlencode(dict(parent=cid)), realm), key=lambda x: x.get('name') or '')
|
||||||
|
normalize_kc_comp(after_comp)
|
||||||
|
after_comp_sanitized = sanitize(after_comp)
|
||||||
|
before_comp_sanitized = sanitize(before_comp)
|
||||||
|
result['end_state'] = after_comp_sanitized
|
||||||
|
if module._diff:
|
||||||
|
result['diff'] = dict(before=before_comp_sanitized, after=after_comp_sanitized)
|
||||||
|
result['changed'] = before_comp_sanitized != after_comp_sanitized
|
||||||
result['msg'] = "User federation {id} has been updated".format(id=cid)
|
result['msg'] = "User federation {id} has been updated".format(id=cid)
|
||||||
module.exit_json(**result)
|
module.exit_json(**result)
|
||||||
|
|
||||||
|
|
|
@ -4,3 +4,4 @@
|
||||||
# pip install -r requirements.txt
|
# pip install -r requirements.txt
|
||||||
#
|
#
|
||||||
netaddr
|
netaddr
|
||||||
|
lxml # for middleware_automation.common.maven_artifact
|
|
@ -1,4 +1,5 @@
|
||||||
---
|
---
|
||||||
collections:
|
collections:
|
||||||
- name: middleware_automation.common
|
- name: middleware_automation.common
|
||||||
|
version: ">=1.2.1"
|
||||||
- name: ansible.posix
|
- name: ansible.posix
|
||||||
|
|
|
@ -10,6 +10,7 @@ Requirements
|
||||||
This role requires the `python3-netaddr` library installed on the controller node.
|
This role requires the `python3-netaddr` library installed on the controller node.
|
||||||
|
|
||||||
* to install via yum/dnf: `dnf install python3-netaddr`
|
* to install via yum/dnf: `dnf install python3-netaddr`
|
||||||
|
* to install via apt: `apt install python3-netaddr`
|
||||||
* or via pip: `pip install netaddr==0.8.0`
|
* or via pip: `pip install netaddr==0.8.0`
|
||||||
* or via the collection: `pip install -r requirements.txt`
|
* or via the collection: `pip install -r requirements.txt`
|
||||||
|
|
||||||
|
@ -39,7 +40,7 @@ Versions
|
||||||
Patching
|
Patching
|
||||||
--------
|
--------
|
||||||
|
|
||||||
When variable `keycloak_rhsso_apply_patches` is `True` (default: `False`), the role will automatically apply the latest cumulative patch for the selected base version.
|
When variable `keycloak_rhsso_apply_patches` is `true` (default: `false`), the role will automatically apply the latest cumulative patch for the selected base version.
|
||||||
|
|
||||||
| RH-SSO VERSION | Release Date | RH-SSO LATEST CP | Notes |
|
| RH-SSO VERSION | Release Date | RH-SSO LATEST CP | Notes |
|
||||||
|:---------------|:------------------|:-----------------|:----------------|
|
|:---------------|:------------------|:-----------------|:----------------|
|
||||||
|
@ -55,8 +56,9 @@ Role Defaults
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:---------|
|
|:---------|:------------|:---------|
|
||||||
|`keycloak_ha_enabled`| Enable auto configuration for database backend, clustering and remote caches on infinispan | `False` |
|
|`keycloak_ha_enabled`| Enable auto configuration for database backend, clustering and remote caches on infinispan | `False` |
|
||||||
|`keycloak_ha_discovery`| Discovery protocol for HA cluster members | `JDBC_PING` if keycloak_db_enabled else `TCPPING` |
|
|`keycloak_ha_discovery`| Discovery protocol for HA cluster members | `JDBC_PING` if `keycloak_db_enabled` else `TCPPING` |
|
||||||
|`keycloak_db_enabled`| Enable auto configuration for database backend | `True` if `keycloak_ha_enabled` is True, else `False` |
|
|`keycloak_db_enabled`| Enable auto configuration for database backend | `True` if `keycloak_ha_enabled` is True, else `False` |
|
||||||
|
|`keycloak_remote_cache_enabled`| Enable remote cache store when in clustered ha configurations | `True` if `keycloak_ha_enabled` else `False` |
|
||||||
|`keycloak_admin_user`| Administration console user account | `admin` |
|
|`keycloak_admin_user`| Administration console user account | `admin` |
|
||||||
|`keycloak_bind_address`| Address for binding service ports | `0.0.0.0` |
|
|`keycloak_bind_address`| Address for binding service ports | `0.0.0.0` |
|
||||||
|`keycloak_management_port_bind_address`| Address for binding management ports | `127.0.0.1` |
|
|`keycloak_management_port_bind_address`| Address for binding management ports | `127.0.0.1` |
|
||||||
|
@ -67,13 +69,19 @@ Role Defaults
|
||||||
|`keycloak_jgroups_port`| jgroups cluster tcp port | `7600` |
|
|`keycloak_jgroups_port`| jgroups cluster tcp port | `7600` |
|
||||||
|`keycloak_management_http_port`| Management port | `9990` |
|
|`keycloak_management_http_port`| Management port | `9990` |
|
||||||
|`keycloak_management_https_port`| TLS management port | `9993` |
|
|`keycloak_management_https_port`| TLS management port | `9993` |
|
||||||
|`keycloak_prefer_ipv4`| Prefer IPv4 stack and addresses for port binding | `True` |
|
|`keycloak_prefer_ipv4`| Prefer IPv4 stack and addresses for port binding | `true` |
|
||||||
|`keycloak_config_standalone_xml`| filename for configuration | `keycloak.xml` |
|
|`keycloak_config_standalone_xml`| filename for configuration | `keycloak.xml` |
|
||||||
|`keycloak_service_user`| posix account username | `keycloak` |
|
|`keycloak_service_user`| posix account username | `keycloak` |
|
||||||
|`keycloak_service_group`| posix account group | `keycloak` |
|
|`keycloak_service_group`| posix account group | `keycloak` |
|
||||||
|`keycloak_service_pidfile`| pid file path for service | `/run/keycloak.pid` |
|
|`keycloak_service_restart_always`| systemd restart always behavior activation | `False` |
|
||||||
|
|`keycloak_service_restart_on_failure`| systemd restart on-failure behavior activation | `False` |
|
||||||
|
|`keycloak_service_startlimitintervalsec`| systemd StartLimitIntervalSec | `300` |
|
||||||
|
|`keycloak_service_startlimitburst`| systemd StartLimitBurst | `5` |
|
||||||
|
|`keycloak_service_restartsec`| systemd RestartSec | `10s` |
|
||||||
|
|`keycloak_service_pidfile`| pid file path for service | `/run/keycloak/keycloak.pid` |
|
||||||
|
|`keycloak_features` | List of `name`/`status` pairs of features (also known as profiles on RH-SSO) to `enable` or `disable`, example: `[ { name: 'docker', status: 'enabled' } ]` | `[]`
|
||||||
|`keycloak_jvm_package`| RHEL java package runtime | `java-1.8.0-openjdk-headless` |
|
|`keycloak_jvm_package`| RHEL java package runtime | `java-1.8.0-openjdk-headless` |
|
||||||
|`keycloak_java_home`| JAVA_HOME of installed JRE, leave empty for using specified keycloak_jvm_package RPM path | `None` |
|
|`keycloak_java_home`| `JAVA_HOME` of installed JRE, leave empty for using RPM path at `keycloak_jvm_package` | `None` |
|
||||||
|`keycloak_java_opts`| Additional JVM options | `-Xms1024m -Xmx2048m` |
|
|`keycloak_java_opts`| Additional JVM options | `-Xms1024m -Xmx2048m` |
|
||||||
|
|
||||||
|
|
||||||
|
@ -81,12 +89,12 @@ Role Defaults
|
||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:---------|
|
|:---------|:------------|:---------|
|
||||||
|`keycloak_offline_install` | perform an offline install | `False`|
|
|`keycloak_offline_install` | perform an offline install | `false`|
|
||||||
|`keycloak_download_url`| Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/<version>/<archive>`|
|
|`keycloak_download_url`| Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/<version>/<archive>`|
|
||||||
|`keycloak_version`| keycloak.org package version | `18.0.2` |
|
|`keycloak_version`| keycloak.org package version | `18.0.2` |
|
||||||
|`keycloak_dest`| Installation root path | `/opt/keycloak` |
|
|`keycloak_dest`| Installation root path | `/opt/keycloak` |
|
||||||
|`keycloak_download_url` | Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}` |
|
|`keycloak_download_url` | Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}` |
|
||||||
|`keycloak_configure_firewalld` | Ensure firewalld is running and configure keycloak ports | `False` |
|
|`keycloak_configure_firewalld` | Ensure firewalld is running and configure keycloak ports | `false` |
|
||||||
|
|
||||||
|
|
||||||
* Miscellaneous configuration
|
* Miscellaneous configuration
|
||||||
|
@ -97,14 +105,21 @@ Role Defaults
|
||||||
|`keycloak_download_url_9x` | Download URL for keycloak (deprecated) | `https://downloads.jboss.org/keycloak/{{ keycloak_version }}/{{ keycloak_archive }}` |
|
|`keycloak_download_url_9x` | Download URL for keycloak (deprecated) | `https://downloads.jboss.org/keycloak/{{ keycloak_version }}/{{ keycloak_archive }}` |
|
||||||
|`keycloak_installdir` | Installation path | `{{ keycloak_dest }}/keycloak-{{ keycloak_version }}` |
|
|`keycloak_installdir` | Installation path | `{{ keycloak_dest }}/keycloak-{{ keycloak_version }}` |
|
||||||
|`keycloak_jboss_home` | Installation work directory | `{{ keycloak_rhsso_installdir }}` |
|
|`keycloak_jboss_home` | Installation work directory | `{{ keycloak_rhsso_installdir }}` |
|
||||||
|
|`keycloak_jboss_port_offset` | Port offset for the JBoss socket binding | `0` |
|
||||||
|`keycloak_config_dir` | Path for configuration | `{{ keycloak_jboss_home }}/standalone/configuration` |
|
|`keycloak_config_dir` | Path for configuration | `{{ keycloak_jboss_home }}/standalone/configuration` |
|
||||||
|`keycloak_config_path_to_standalone_xml` | Custom path for configuration | `{{ keycloak_jboss_home }}/standalone/configuration/{{ keycloak_config_standalone_xml }}` |
|
|`keycloak_config_path_to_standalone_xml` | Custom path for configuration | `{{ keycloak_jboss_home }}/standalone/configuration/{{ keycloak_config_standalone_xml }}` |
|
||||||
|`keycloak_config_override_template` | Path to custom template for standalone.xml configuration | `''` |
|
|`keycloak_config_override_template` | Path to custom template for standalone.xml configuration | `''` |
|
||||||
|`keycloak_auth_realm` | Name for rest authentication realm | `master` |
|
|`keycloak_auth_realm` | Name for rest authentication realm | `master` |
|
||||||
|`keycloak_auth_client` | Authentication client for configuration REST calls | `admin-cli` |
|
|`keycloak_auth_client` | Authentication client for configuration REST calls | `admin-cli` |
|
||||||
|`keycloak_force_install` | Remove pre-existing versions of service | `False` |
|
|`keycloak_force_install` | Remove pre-existing versions of service | `false` |
|
||||||
|`keycloak_url` | URL for configuration rest calls | `http://{{ keycloak_host }}:{{ keycloak_http_port }}` |
|
|`keycloak_url` | URL for configuration rest calls | `http://{{ keycloak_host }}:{{ keycloak_http_port + keycloak_jboss_port_offset }}` |
|
||||||
|`keycloak_management_url` | URL for management console rest calls | `http://{{ keycloak_host }}:{{ keycloak_management_http_port }}` |
|
|`keycloak_management_url` | URL for management console rest calls | `http://{{ keycloak_host }}:{{ keycloak_management_http_port + keycloak_jboss_port_offset }}` |
|
||||||
|
|`keycloak_frontend_url_force` | Force backend requests to use the frontend URL | `false` |
|
||||||
|
|`keycloak_db_background_validation` | Enable background validation of database connection | `false` |
|
||||||
|
|`keycloak_db_background_validation_millis`| How frequenly the connection pool is validated in the background | `10000` if background validation enabled |
|
||||||
|
|`keycloak_db_background_validate_on_match` | Enable validate on match for database connections | `false` |
|
||||||
|
|`keycloak_frontend_url` | frontend URL for keycloak endpoint | `http://localhost:8080/auth/` |
|
||||||
|
|`keycloak_log_target`| Set the destination of the keycloak log folder link | `/var/log/keycloak` |
|
||||||
|
|
||||||
|
|
||||||
Role Variables
|
Role Variables
|
||||||
|
@ -115,10 +130,10 @@ The following are a set of _required_ variables for the role:
|
||||||
| Variable | Description |
|
| Variable | Description |
|
||||||
|:---------|:------------|
|
|:---------|:------------|
|
||||||
|`keycloak_admin_password`| Password for the administration console user account (minimum 12 characters) |
|
|`keycloak_admin_password`| Password for the administration console user account (minimum 12 characters) |
|
||||||
|`keycloak_frontend_url` | frontend URL for keycloak endpoint | `http://localhost:8080/auth` |
|
|`keycloak_frontend_url` | frontend URL for keycloak endpoint | `http://localhost:8080/auth/` |
|
||||||
|
|
||||||
|
|
||||||
The following variables are _required_ only when `keycloak_ha_enabled` is True:
|
The following parameters are _required_ only when `keycloak_ha_enabled` is true:
|
||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
|
@ -126,7 +141,7 @@ The following variables are _required_ only when `keycloak_ha_enabled` is True:
|
||||||
|`keycloak_modcluster_url` | _deprecated_ Host for the modcluster reverse proxy | `localhost` |
|
|`keycloak_modcluster_url` | _deprecated_ Host for the modcluster reverse proxy | `localhost` |
|
||||||
|`keycloak_modcluster_port` | _deprecated_ Port for the modcluster reverse proxy | `6666` |
|
|`keycloak_modcluster_port` | _deprecated_ Port for the modcluster reverse proxy | `6666` |
|
||||||
|`keycloak_modcluster_urls` | List of {host,port} dicts for the modcluster reverse proxies | `[ { localhost:6666 } ]` |
|
|`keycloak_modcluster_urls` | List of {host,port} dicts for the modcluster reverse proxies | `[ { localhost:6666 } ]` |
|
||||||
|`keycloak_jdbc_engine` | backend database engine when db is enabled: [ postgres, mariadb ] | `postgres` |
|
|`keycloak_jdbc_engine` | backend database engine when db is enabled: [ postgres, mariadb, sqlserver ] | `postgres` |
|
||||||
|`keycloak_infinispan_url` | URL for the infinispan remote-cache server | `localhost:11122` |
|
|`keycloak_infinispan_url` | URL for the infinispan remote-cache server | `localhost:11122` |
|
||||||
|`keycloak_infinispan_user` | username for connecting to infinispan | `supervisor` |
|
|`keycloak_infinispan_user` | username for connecting to infinispan | `supervisor` |
|
||||||
|`keycloak_infinispan_pass` | password for connecting to infinispan | `supervisor` |
|
|`keycloak_infinispan_pass` | password for connecting to infinispan | `supervisor` |
|
||||||
|
@ -136,7 +151,7 @@ The following variables are _required_ only when `keycloak_ha_enabled` is True:
|
||||||
|`keycloak_infinispan_trust_store_password`| Password for opening truststore | `changeit` |
|
|`keycloak_infinispan_trust_store_password`| Password for opening truststore | `changeit` |
|
||||||
|
|
||||||
|
|
||||||
The following variables are _required_ only when `keycloak_db_enabled` is True:
|
The following parameters are _required_ only when `keycloak_db_enabled` is true:
|
||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:---------|
|
|:---------|:------------|:---------|
|
||||||
|
@ -146,6 +161,14 @@ The following variables are _required_ only when `keycloak_db_enabled` is True:
|
||||||
|`keycloak_db_pass` | password for connecting to postgres | `keycloak-pass` |
|
|`keycloak_db_pass` | password for connecting to postgres | `keycloak-pass` |
|
||||||
|
|
||||||
|
|
||||||
|
The following variables are _optional_:
|
||||||
|
|
||||||
|
| Variable | Description |
|
||||||
|
|:---------|:------------|
|
||||||
|
|`keycloak_db_valid_conn_sql` | Override the default database connection validation query sql |
|
||||||
|
|`keycloak_admin_url` | Override the default administration endpoint URL |
|
||||||
|
|`keycloak_jgroups_subnet`| Override the subnet match for jgroups cluster formation; if not defined, it will be inferred from local machine route configuration |
|
||||||
|
|
||||||
Example Playbook
|
Example Playbook
|
||||||
-----------------
|
-----------------
|
||||||
|
|
||||||
|
@ -156,8 +179,6 @@ Example Playbook
|
||||||
- hosts: ...
|
- hosts: ...
|
||||||
vars:
|
vars:
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_admin_password: "remembertochangeme"
|
||||||
collections:
|
|
||||||
- middleware_automation.keycloak
|
|
||||||
roles:
|
roles:
|
||||||
- middleware_automation.keycloak.keycloak
|
- middleware_automation.keycloak.keycloak
|
||||||
```
|
```
|
||||||
|
@ -176,7 +197,7 @@ Example Playbook
|
||||||
name: keycloak
|
name: keycloak
|
||||||
vars:
|
vars:
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_admin_password: "remembertochangeme"
|
||||||
keycloak_offline_install: True
|
keycloak_offline_install: true
|
||||||
# This should be the filename of keycloak archive on Ansible node: keycloak-16.1.0.zip
|
# This should be the filename of keycloak archive on Ansible node: keycloak-16.1.0.zip
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
|
@ -5,26 +5,34 @@ keycloak_archive: "keycloak-legacy-{{ keycloak_version }}.zip"
|
||||||
keycloak_download_url: "https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}"
|
keycloak_download_url: "https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}"
|
||||||
keycloak_download_url_9x: "https://downloads.jboss.org/keycloak/{{ keycloak_version }}/{{ keycloak_archive }}"
|
keycloak_download_url_9x: "https://downloads.jboss.org/keycloak/{{ keycloak_version }}/{{ keycloak_archive }}"
|
||||||
keycloak_installdir: "{{ keycloak_dest }}/keycloak-{{ keycloak_version }}"
|
keycloak_installdir: "{{ keycloak_dest }}/keycloak-{{ keycloak_version }}"
|
||||||
keycloak_offline_install: False
|
keycloak_offline_install: false
|
||||||
|
|
||||||
### Install location and service settings
|
### Install location and service settings
|
||||||
keycloak_jvm_package: java-1.8.0-openjdk-headless
|
|
||||||
keycloak_java_home:
|
keycloak_java_home:
|
||||||
keycloak_dest: /opt/keycloak
|
keycloak_dest: /opt/keycloak
|
||||||
keycloak_jboss_home: "{{ keycloak_installdir }}"
|
keycloak_jboss_home: "{{ keycloak_installdir }}"
|
||||||
|
keycloak_jboss_port_offset: 0
|
||||||
keycloak_config_dir: "{{ keycloak_jboss_home }}/standalone/configuration"
|
keycloak_config_dir: "{{ keycloak_jboss_home }}/standalone/configuration"
|
||||||
keycloak_config_standalone_xml: "keycloak.xml"
|
keycloak_config_standalone_xml: "keycloak.xml"
|
||||||
keycloak_config_path_to_standalone_xml: "{{ keycloak_jboss_home }}/standalone/configuration/{{ keycloak_config_standalone_xml }}"
|
keycloak_config_path_to_standalone_xml: "{{ keycloak_jboss_home }}/standalone/configuration/{{ keycloak_config_standalone_xml }}"
|
||||||
keycloak_config_override_template: ''
|
keycloak_config_override_template: ''
|
||||||
|
keycloak_config_path_to_properties: "{{ keycloak_jboss_home }}/standalone/configuration/profile.properties"
|
||||||
|
keycloak_service_runas: false
|
||||||
keycloak_service_user: keycloak
|
keycloak_service_user: keycloak
|
||||||
keycloak_service_group: keycloak
|
keycloak_service_group: keycloak
|
||||||
keycloak_service_pidfile: "/run/keycloak.pid"
|
keycloak_service_pidfile: "/run/keycloak/keycloak.pid"
|
||||||
keycloak_service_name: keycloak
|
keycloak_service_name: keycloak
|
||||||
keycloak_service_desc: Keycloak
|
keycloak_service_desc: Keycloak
|
||||||
keycloak_service_start_delay: 10
|
keycloak_service_start_delay: 10
|
||||||
keycloak_service_start_retries: 25
|
keycloak_service_start_retries: 25
|
||||||
|
keycloak_service_restart_always: false
|
||||||
|
keycloak_service_restart_on_failure: false
|
||||||
|
keycloak_service_startlimitintervalsec: "300"
|
||||||
|
keycloak_service_startlimitburst: "5"
|
||||||
|
keycloak_service_restartsec: "10s"
|
||||||
|
|
||||||
keycloak_configure_firewalld: False
|
keycloak_configure_firewalld: false
|
||||||
|
keycloak_configure_iptables: false
|
||||||
|
|
||||||
### administrator console password
|
### administrator console password
|
||||||
keycloak_admin_password: ''
|
keycloak_admin_password: ''
|
||||||
|
@ -36,25 +44,29 @@ keycloak_http_port: 8080
|
||||||
keycloak_https_port: 8443
|
keycloak_https_port: 8443
|
||||||
keycloak_ajp_port: 8009
|
keycloak_ajp_port: 8009
|
||||||
keycloak_jgroups_port: 7600
|
keycloak_jgroups_port: 7600
|
||||||
|
keycloak_jgroups_subnet:
|
||||||
keycloak_management_port_bind_address: 127.0.0.1
|
keycloak_management_port_bind_address: 127.0.0.1
|
||||||
keycloak_management_http_port: 9990
|
keycloak_management_http_port: 9990
|
||||||
keycloak_management_https_port: 9993
|
keycloak_management_https_port: 9993
|
||||||
keycloak_java_opts: "-Xms1024m -Xmx2048m"
|
keycloak_java_opts: "-Xms1024m -Xmx2048m"
|
||||||
keycloak_prefer_ipv4: True
|
keycloak_prefer_ipv4: true
|
||||||
|
keycloak_features: []
|
||||||
|
|
||||||
### Enable configuration for database backend, clustering and remote caches on infinispan
|
### Enable configuration for database backend, clustering and remote caches on infinispan
|
||||||
keycloak_ha_enabled: False
|
keycloak_ha_enabled: false
|
||||||
### Enable database configuration, must be enabled when HA is configured
|
### Enable database configuration, must be enabled when HA is configured
|
||||||
keycloak_db_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
keycloak_db_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
||||||
### Discovery protocol for ha cluster members, valus [ 'JDBC_PING', 'TCPPING' ]
|
### Discovery protocol for ha cluster members, valus [ 'JDBC_PING', 'TCPPING' ]
|
||||||
keycloak_ha_discovery: "{{ 'JDBC_PING' if keycloak_db_enabled else 'TCPPING' }}"
|
keycloak_ha_discovery: "{{ 'JDBC_PING' if keycloak_db_enabled else 'TCPPING' }}"
|
||||||
|
### Remote cache store on infinispan cluster
|
||||||
|
keycloak_remote_cache_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
||||||
|
|
||||||
### Keycloak administration console user
|
### Keycloak administration console user
|
||||||
keycloak_admin_user: admin
|
keycloak_admin_user: admin
|
||||||
keycloak_auth_realm: master
|
keycloak_auth_realm: master
|
||||||
keycloak_auth_client: admin-cli
|
keycloak_auth_client: admin-cli
|
||||||
|
|
||||||
keycloak_force_install: False
|
keycloak_force_install: false
|
||||||
|
|
||||||
### mod_cluster reverse proxy list
|
### mod_cluster reverse proxy list
|
||||||
keycloak_modcluster_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
keycloak_modcluster_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
||||||
|
@ -65,23 +77,29 @@ keycloak_modcluster_urls:
|
||||||
port: "{{ keycloak_modcluster_port }}"
|
port: "{{ keycloak_modcluster_port }}"
|
||||||
|
|
||||||
### keycloak frontend url
|
### keycloak frontend url
|
||||||
keycloak_frontend_url: http://localhost:8080/auth
|
keycloak_frontend_url: http://localhost:8080/auth/
|
||||||
|
keycloak_frontend_url_force: false
|
||||||
|
keycloak_admin_url:
|
||||||
|
|
||||||
### infinispan remote caches access (hotrod)
|
### infinispan remote caches access (hotrod)
|
||||||
keycloak_infinispan_user: supervisor
|
keycloak_infinispan_user: supervisor
|
||||||
keycloak_infinispan_pass: supervisor
|
keycloak_infinispan_pass: supervisor
|
||||||
keycloak_infinispan_url: localhost
|
keycloak_infinispan_url: localhost
|
||||||
keycloak_infinispan_sasl_mechanism: SCRAM-SHA-512
|
keycloak_infinispan_sasl_mechanism: SCRAM-SHA-512
|
||||||
keycloak_infinispan_use_ssl: False
|
keycloak_infinispan_use_ssl: false
|
||||||
# if ssl is enabled, import ispn server certificate here
|
# if ssl is enabled, import ispn server certificate here
|
||||||
keycloak_infinispan_trust_store_path: /etc/pki/java/cacerts
|
keycloak_infinispan_trust_store_path: /etc/pki/java/cacerts
|
||||||
keycloak_infinispan_trust_store_password: changeit
|
keycloak_infinispan_trust_store_password: changeit
|
||||||
|
|
||||||
### database backend engine: values [ 'postgres', 'mariadb' ]
|
### database backend engine: values [ 'postgres', 'mariadb', 'sqlserver' ]
|
||||||
keycloak_jdbc_engine: postgres
|
keycloak_jdbc_engine: postgres
|
||||||
### database backend credentials
|
### database backend credentials
|
||||||
keycloak_db_user: keycloak-user
|
keycloak_db_user: keycloak-user
|
||||||
keycloak_db_pass: keycloak-pass
|
keycloak_db_pass: keycloak-pass
|
||||||
|
## connection validation
|
||||||
|
keycloak_db_background_validation: false
|
||||||
|
keycloak_db_background_validation_millis: "{{ 10000 if keycloak_db_background_validation else 0 }}"
|
||||||
|
keycloak_db_background_validate_on_match: false
|
||||||
keycloak_jdbc_url: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].url }}"
|
keycloak_jdbc_url: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].url }}"
|
||||||
keycloak_jdbc_driver_version: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].version }}"
|
keycloak_jdbc_driver_version: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].version }}"
|
||||||
# override the variables above, following defaults show minimum supported versions
|
# override the variables above, following defaults show minimum supported versions
|
||||||
|
@ -92,5 +110,15 @@ keycloak_default_jdbc:
|
||||||
mariadb:
|
mariadb:
|
||||||
url: 'jdbc:mariadb://localhost:3306/keycloak'
|
url: 'jdbc:mariadb://localhost:3306/keycloak'
|
||||||
version: 2.7.4
|
version: 2.7.4
|
||||||
|
sqlserver:
|
||||||
|
url: 'jdbc:sqlserver://localhost:1433;databaseName=keycloak;'
|
||||||
|
version: 12.2.0
|
||||||
# role specific vars
|
# role specific vars
|
||||||
keycloak_no_log: True
|
keycloak_no_log: true
|
||||||
|
|
||||||
|
### logging configuration
|
||||||
|
keycloak_log_target: /var/log/keycloak
|
||||||
|
|
||||||
|
# locations
|
||||||
|
keycloak_url: "http://{{ keycloak_host }}:{{ keycloak_http_port + keycloak_jboss_port_offset }}"
|
||||||
|
keycloak_management_url: "http://{{ keycloak_host }}:{{ keycloak_management_http_port + keycloak_jboss_port_offset }}"
|
||||||
|
|
|
@ -2,42 +2,38 @@ argument_specs:
|
||||||
main:
|
main:
|
||||||
options:
|
options:
|
||||||
keycloak_version:
|
keycloak_version:
|
||||||
# line 3 of keycloak/defaults/main.yml
|
|
||||||
default: "18.0.2"
|
default: "18.0.2"
|
||||||
description: "keycloak.org package version"
|
description: "keycloak.org package version"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_archive:
|
keycloak_archive:
|
||||||
# line 4 of keycloak/defaults/main.yml
|
|
||||||
default: "keycloak-legacy-{{ keycloak_version }}.zip"
|
default: "keycloak-legacy-{{ keycloak_version }}.zip"
|
||||||
description: "keycloak install archive filename"
|
description: "keycloak install archive filename"
|
||||||
type: "str"
|
type: "str"
|
||||||
|
keycloak_configure_iptables:
|
||||||
|
default: false
|
||||||
|
description: "Ensure iptables is running and configure keycloak ports"
|
||||||
|
type: "bool"
|
||||||
keycloak_configure_firewalld:
|
keycloak_configure_firewalld:
|
||||||
# line 33 of keycloak/defaults/main.yml
|
|
||||||
default: false
|
default: false
|
||||||
description: "Ensure firewalld is running and configure keycloak ports"
|
description: "Ensure firewalld is running and configure keycloak ports"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_download_url:
|
keycloak_download_url:
|
||||||
# line 5 of keycloak/defaults/main.yml
|
|
||||||
default: "https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}"
|
default: "https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}"
|
||||||
description: "Download URL for keycloak"
|
description: "Download URL for keycloak"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_download_url_9x:
|
keycloak_download_url_9x:
|
||||||
# line 6 of keycloak/defaults/main.yml
|
|
||||||
default: "https://downloads.jboss.org/keycloak/{{ keycloak_version }}/{{ keycloak_archive }}"
|
default: "https://downloads.jboss.org/keycloak/{{ keycloak_version }}/{{ keycloak_archive }}"
|
||||||
description: "Download URL for keycloak (deprecated)"
|
description: "Download URL for keycloak (deprecated)"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_installdir:
|
keycloak_installdir:
|
||||||
# line 7 of keycloak/defaults/main.yml
|
|
||||||
default: "{{ keycloak_dest }}/keycloak-{{ keycloak_version }}"
|
default: "{{ keycloak_dest }}/keycloak-{{ keycloak_version }}"
|
||||||
description: "Installation path"
|
description: "Installation path"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_offline_install:
|
keycloak_offline_install:
|
||||||
# line 20 of keycloak/defaults/main.yml
|
|
||||||
default: false
|
default: false
|
||||||
description: "Perform an offline install"
|
description: "Perform an offline install"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_jvm_package:
|
keycloak_jvm_package:
|
||||||
# line 23 of keycloak/defaults/main.yml
|
|
||||||
default: "java-1.8.0-openjdk-headless"
|
default: "java-1.8.0-openjdk-headless"
|
||||||
description: "RHEL java package runtime rpm"
|
description: "RHEL java package runtime rpm"
|
||||||
type: "str"
|
type: "str"
|
||||||
|
@ -45,106 +41,100 @@ argument_specs:
|
||||||
description: "JAVA_HOME of installed JRE, leave empty for using specified keycloak_jvm_package RPM path"
|
description: "JAVA_HOME of installed JRE, leave empty for using specified keycloak_jvm_package RPM path"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_dest:
|
keycloak_dest:
|
||||||
# line 24 of keycloak/defaults/main.yml
|
|
||||||
default: "/opt/keycloak"
|
default: "/opt/keycloak"
|
||||||
description: "Root installation directory"
|
description: "Root installation directory"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_jboss_home:
|
keycloak_jboss_home:
|
||||||
# line 25 of keycloak/defaults/main.yml
|
|
||||||
default: "{{ keycloak_installdir }}"
|
default: "{{ keycloak_installdir }}"
|
||||||
description: "Installation work directory"
|
description: "Installation work directory"
|
||||||
type: "str"
|
type: "str"
|
||||||
|
keycloak_jboss_port_offset:
|
||||||
|
default: 0
|
||||||
|
description: "Port offset for the JBoss socket binding"
|
||||||
|
type: "int"
|
||||||
keycloak_config_dir:
|
keycloak_config_dir:
|
||||||
# line 26 of keycloak/defaults/main.yml
|
|
||||||
default: "{{ keycloak_jboss_home }}/standalone/configuration"
|
default: "{{ keycloak_jboss_home }}/standalone/configuration"
|
||||||
description: "Path for configuration"
|
description: "Path for configuration"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_config_standalone_xml:
|
keycloak_config_standalone_xml:
|
||||||
# line 27 of keycloak/defaults/main.yml
|
|
||||||
default: "keycloak.xml"
|
default: "keycloak.xml"
|
||||||
description: "Service configuration filename"
|
description: "Service configuration filename"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_config_path_to_standalone_xml:
|
keycloak_config_path_to_standalone_xml:
|
||||||
# line 28 of keycloak/defaults/main.yml
|
|
||||||
default: "{{ keycloak_jboss_home }}/standalone/configuration/{{ keycloak_config_standalone_xml }}"
|
default: "{{ keycloak_jboss_home }}/standalone/configuration/{{ keycloak_config_standalone_xml }}"
|
||||||
description: "Custom path for configuration"
|
description: "Custom path for configuration"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_config_override_template:
|
keycloak_config_override_template:
|
||||||
# line 30 of keycloak/defaults/main.yml
|
|
||||||
default: ""
|
default: ""
|
||||||
description: "Path to custom template for standalone.xml configuration"
|
description: "Path to custom template for standalone.xml configuration"
|
||||||
type: "str"
|
type: "str"
|
||||||
|
keycloak_service_runas:
|
||||||
|
default: false
|
||||||
|
description: "Enable execution of service as `keycloak_service_user`"
|
||||||
|
type: "bool"
|
||||||
keycloak_service_user:
|
keycloak_service_user:
|
||||||
# line 29 of keycloak/defaults/main.yml
|
|
||||||
default: "keycloak"
|
default: "keycloak"
|
||||||
description: "posix account username"
|
description: "posix account username"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_service_group:
|
keycloak_service_group:
|
||||||
# line 30 of keycloak/defaults/main.yml
|
|
||||||
default: "keycloak"
|
default: "keycloak"
|
||||||
description: "posix account group"
|
description: "posix account group"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_service_pidfile:
|
keycloak_service_pidfile:
|
||||||
# line 31 of keycloak/defaults/main.yml
|
default: "/run/keycloak/keycloak.pid"
|
||||||
default: "/run/keycloak.pid"
|
|
||||||
description: "PID file path for service"
|
description: "PID file path for service"
|
||||||
type: "str"
|
type: "str"
|
||||||
|
keycloak_features:
|
||||||
|
default: "[]"
|
||||||
|
description: >
|
||||||
|
List of `name`/`status` pairs of features (also known as profiles on RH-SSO) to `enable` or `disable`,
|
||||||
|
example: `[ { name: 'docker', status: 'enabled' } ]`
|
||||||
|
type: "list"
|
||||||
keycloak_bind_address:
|
keycloak_bind_address:
|
||||||
# line 34 of keycloak/defaults/main.yml
|
|
||||||
default: "0.0.0.0"
|
default: "0.0.0.0"
|
||||||
description: "Address for binding service ports"
|
description: "Address for binding service ports"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_management_port_bind_address:
|
keycloak_management_port_bind_address:
|
||||||
default: "127.0.0.1"
|
default: "127.0.0.1"
|
||||||
description: "Address for binding the managemnt ports"
|
description: "Address for binding the management ports"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_host:
|
keycloak_host:
|
||||||
# line 35 of keycloak/defaults/main.yml
|
|
||||||
default: "localhost"
|
default: "localhost"
|
||||||
description: "Hostname for service"
|
description: "Hostname for service"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_http_port:
|
keycloak_http_port:
|
||||||
# line 36 of keycloak/defaults/main.yml
|
|
||||||
default: 8080
|
default: 8080
|
||||||
description: "Listening HTTP port"
|
description: "Listening HTTP port"
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_https_port:
|
keycloak_https_port:
|
||||||
# line 37 of keycloak/defaults/main.yml
|
|
||||||
default: 8443
|
default: 8443
|
||||||
description: "Listening HTTPS port"
|
description: "Listening HTTPS port"
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_ajp_port:
|
keycloak_ajp_port:
|
||||||
# line 38 of keycloak/defaults/main.yml
|
|
||||||
default: 8009
|
default: 8009
|
||||||
description: "Listening AJP port"
|
description: "Listening AJP port"
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_jgroups_port:
|
keycloak_jgroups_port:
|
||||||
# line 39 of keycloak/defaults/main.yml
|
|
||||||
default: 7600
|
default: 7600
|
||||||
description: "jgroups cluster tcp port"
|
description: "jgroups cluster tcp port"
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_management_http_port:
|
keycloak_management_http_port:
|
||||||
# line 40 of keycloak/defaults/main.yml
|
|
||||||
default: 9990
|
default: 9990
|
||||||
description: "Management port (http)"
|
description: "Management port (http)"
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_management_https_port:
|
keycloak_management_https_port:
|
||||||
# line 41 of keycloak/defaults/main.yml
|
|
||||||
default: 9993
|
default: 9993
|
||||||
description: "Management port (https)"
|
description: "Management port (https)"
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_java_opts:
|
keycloak_java_opts:
|
||||||
# line 42 of keycloak/defaults/main.yml
|
|
||||||
default: "-Xms1024m -Xmx2048m"
|
default: "-Xms1024m -Xmx2048m"
|
||||||
description: "Additional JVM options"
|
description: "Additional JVM options"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_prefer_ipv4:
|
keycloak_prefer_ipv4:
|
||||||
# line 43 of keycloak/defaults/main.yml
|
|
||||||
default: true
|
default: true
|
||||||
description: "Prefer IPv4 stack and addresses for port binding"
|
description: "Prefer IPv4 stack and addresses for port binding"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_ha_enabled:
|
keycloak_ha_enabled:
|
||||||
# line 46 of keycloak/defaults/main.yml
|
|
||||||
default: false
|
default: false
|
||||||
description: "Enable auto configuration for database backend, clustering and remote caches on infinispan"
|
description: "Enable auto configuration for database backend, clustering and remote caches on infinispan"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
|
@ -153,27 +143,22 @@ argument_specs:
|
||||||
description: "Discovery protocol for HA cluster members"
|
description: "Discovery protocol for HA cluster members"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_db_enabled:
|
keycloak_db_enabled:
|
||||||
# line 48 of keycloak/defaults/main.yml
|
|
||||||
default: "{{ True if keycloak_ha_enabled else False }}"
|
default: "{{ True if keycloak_ha_enabled else False }}"
|
||||||
description: "Enable auto configuration for database backend"
|
description: "Enable auto configuration for database backend"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_admin_user:
|
keycloak_admin_user:
|
||||||
# line 51 of keycloak/defaults/main.yml
|
|
||||||
default: "admin"
|
default: "admin"
|
||||||
description: "Administration console user account"
|
description: "Administration console user account"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_auth_realm:
|
keycloak_auth_realm:
|
||||||
# line 52 of keycloak/defaults/main.yml
|
|
||||||
default: "master"
|
default: "master"
|
||||||
description: "Name for rest authentication realm"
|
description: "Name for rest authentication realm"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_auth_client:
|
keycloak_auth_client:
|
||||||
# line 53 of keycloak/defaults/main.yml
|
|
||||||
default: "admin-cli"
|
default: "admin-cli"
|
||||||
description: "Authentication client for configuration REST calls"
|
description: "Authentication client for configuration REST calls"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_force_install:
|
keycloak_force_install:
|
||||||
# line 55 of keycloak/defaults/main.yml
|
|
||||||
default: false
|
default: false
|
||||||
description: "Remove pre-existing versions of service"
|
description: "Remove pre-existing versions of service"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
|
@ -182,7 +167,6 @@ argument_specs:
|
||||||
description: "Enable configuration for modcluster subsystem"
|
description: "Enable configuration for modcluster subsystem"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_modcluster_url:
|
keycloak_modcluster_url:
|
||||||
# line 58 of keycloak/defaults/main.yml
|
|
||||||
default: "localhost"
|
default: "localhost"
|
||||||
description: "URL for the modcluster reverse proxy"
|
description: "URL for the modcluster reverse proxy"
|
||||||
type: "str"
|
type: "str"
|
||||||
|
@ -195,83 +179,71 @@ argument_specs:
|
||||||
description: "List of modproxy node URLs in the format { host, port } for the modcluster reverse proxy"
|
description: "List of modproxy node URLs in the format { host, port } for the modcluster reverse proxy"
|
||||||
type: "list"
|
type: "list"
|
||||||
keycloak_frontend_url:
|
keycloak_frontend_url:
|
||||||
# line 59 of keycloak/defaults/main.yml
|
|
||||||
default: "http://localhost"
|
default: "http://localhost"
|
||||||
description: "Frontend URL for keycloak endpoints when a reverse proxy is used"
|
description: "Frontend URL for keycloak endpoints when a reverse proxy is used"
|
||||||
type: "str"
|
type: "str"
|
||||||
|
keycloak_frontend_url_force:
|
||||||
|
default: false
|
||||||
|
description: "Force backend requests to use the frontend URL"
|
||||||
|
type: "bool"
|
||||||
keycloak_infinispan_user:
|
keycloak_infinispan_user:
|
||||||
# line 62 of keycloak/defaults/main.yml
|
|
||||||
default: "supervisor"
|
default: "supervisor"
|
||||||
description: "Username for connecting to infinispan"
|
description: "Username for connecting to infinispan"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_infinispan_pass:
|
keycloak_infinispan_pass:
|
||||||
# line 63 of keycloak/defaults/main.yml
|
|
||||||
default: "supervisor"
|
default: "supervisor"
|
||||||
description: "Password for connecting to infinispan"
|
description: "Password for connecting to infinispan"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_infinispan_url:
|
keycloak_infinispan_url:
|
||||||
# line 64 of keycloak/defaults/main.yml
|
|
||||||
default: "localhost"
|
default: "localhost"
|
||||||
description: "URL for the infinispan remote-cache server"
|
description: "URL for the infinispan remote-cache server"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_infinispan_sasl_mechanism:
|
keycloak_infinispan_sasl_mechanism:
|
||||||
# line 65 of keycloak/defaults/main.yml
|
|
||||||
default: "SCRAM-SHA-512"
|
default: "SCRAM-SHA-512"
|
||||||
description: "Authentication type to infinispan server"
|
description: "Authentication type to infinispan server"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_infinispan_use_ssl:
|
keycloak_infinispan_use_ssl:
|
||||||
# line 66 of keycloak/defaults/main.yml
|
|
||||||
default: false
|
default: false
|
||||||
description: "Enable hotrod client TLS communication"
|
description: "Enable hotrod client TLS communication"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_infinispan_trust_store_path:
|
keycloak_infinispan_trust_store_path:
|
||||||
# line 68 of keycloak/defaults/main.yml
|
|
||||||
default: "/etc/pki/java/cacerts"
|
default: "/etc/pki/java/cacerts"
|
||||||
description: "TODO document argument"
|
description: "TODO document argument"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_infinispan_trust_store_password:
|
keycloak_infinispan_trust_store_password:
|
||||||
# line 69 of keycloak/defaults/main.yml
|
|
||||||
default: "changeit"
|
default: "changeit"
|
||||||
description: "Path to truststore containing infinispan server certificate"
|
description: "Path to truststore containing infinispan server certificate"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_jdbc_engine:
|
keycloak_jdbc_engine:
|
||||||
# line 72 of keycloak/defaults/main.yml
|
|
||||||
default: "postgres"
|
default: "postgres"
|
||||||
description: "Backend database flavour when db is enabled: [ postgres, mariadb ]"
|
description: "Backend database flavour when db is enabled: [ postgres, mariadb, sqlserver ]"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_db_user:
|
keycloak_db_user:
|
||||||
# line 74 of keycloak/defaults/main.yml
|
|
||||||
default: "keycloak-user"
|
default: "keycloak-user"
|
||||||
description: "Username for connecting to database"
|
description: "Username for connecting to database"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_db_pass:
|
keycloak_db_pass:
|
||||||
# line 75 of keycloak/defaults/main.yml
|
|
||||||
default: "keycloak-pass"
|
default: "keycloak-pass"
|
||||||
description: "Password for connecting to database"
|
description: "Password for connecting to database"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_jdbc_url:
|
keycloak_jdbc_url:
|
||||||
# line 76 of keycloak/defaults/main.yml
|
|
||||||
default: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].url }}"
|
default: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].url }}"
|
||||||
description: "URL for connecting to backend database"
|
description: "URL for connecting to backend database"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_jdbc_driver_version:
|
keycloak_jdbc_driver_version:
|
||||||
# line 77 of keycloak/defaults/main.yml
|
|
||||||
default: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].version }}"
|
default: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].version }}"
|
||||||
description: "Version for the JDBC driver to download"
|
description: "Version for the JDBC driver to download"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_admin_password:
|
keycloak_admin_password:
|
||||||
# line 4 of keycloak/vars/main.yml
|
|
||||||
required: true
|
required: true
|
||||||
description: "Password for the administration console user account"
|
description: "Password for the administration console user account"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_url:
|
keycloak_url:
|
||||||
# line 12 of keycloak/vars/main.yml
|
default: "http://{{ keycloak_host }}:{{ keycloak_http_port + keycloak_jboss_port_offset }}"
|
||||||
default: "http://{{ keycloak_host }}:{{ keycloak_http_port }}"
|
|
||||||
description: "URL for configuration rest calls"
|
description: "URL for configuration rest calls"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_management_url:
|
keycloak_management_url:
|
||||||
# line 13 of keycloak/vars/main.yml
|
default: "http://{{ keycloak_host }}:{{ keycloak_management_http_port + keycloak_jboss_port_offset }}"
|
||||||
default: "http://{{ keycloak_host }}:{{ keycloak_management_http_port }}"
|
|
||||||
description: "URL for management console rest calls"
|
description: "URL for management console rest calls"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_service_name:
|
keycloak_service_name:
|
||||||
|
@ -290,10 +262,77 @@ argument_specs:
|
||||||
default: "25"
|
default: "25"
|
||||||
description: "How many time should Ansible retry to connect to the service after it was started, before failing."
|
description: "How many time should Ansible retry to connect to the service after it was started, before failing."
|
||||||
type: "int"
|
type: "int"
|
||||||
|
keycloak_service_restart_always:
|
||||||
|
default: false
|
||||||
|
description: "systemd restart always behavior activation for keycloak"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_service_restart_on_failure:
|
||||||
|
default: false
|
||||||
|
description: "systemd restart on-failure behavior activation for keycloak"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_service_startlimitintervalsec:
|
||||||
|
default: 300
|
||||||
|
description: "systemd StartLimitIntervalSec for keycloak"
|
||||||
|
type: "int"
|
||||||
|
keycloak_service_startlimitburst:
|
||||||
|
default: 5
|
||||||
|
description: "systemd StartLimitBurst for keycloak"
|
||||||
|
type: "int"
|
||||||
|
keycloak_service_restartsec:
|
||||||
|
default: "5s"
|
||||||
|
description: "systemd RestartSec for keycloak"
|
||||||
|
type: "str"
|
||||||
keycloak_no_log:
|
keycloak_no_log:
|
||||||
default: true
|
default: true
|
||||||
type: "bool"
|
type: "bool"
|
||||||
description: "Changes default behavior for no_log for debugging purpose, do not change for production system."
|
description: "Changes default behavior for no_log for debugging purpose, do not change for production system."
|
||||||
|
keycloak_remote_cache_enabled:
|
||||||
|
default: "{{ True if keycloak_ha_enabled else False }}"
|
||||||
|
description: "Enable remote cache store when in clustered ha configurations"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_db_background_validation:
|
||||||
|
default: false
|
||||||
|
description: "Enable background validation of database connection"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_db_background_validation_millis:
|
||||||
|
default: "{{ 10000 if keycloak_db_background_validation else 0 }}"
|
||||||
|
description: "How frequenly the connection pool is validated in the background"
|
||||||
|
type: 'int'
|
||||||
|
keycloak_db_background_validate_on_match:
|
||||||
|
default: false
|
||||||
|
description: "Enable validate on match for database connections"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_db_valid_conn_sql:
|
||||||
|
required: false
|
||||||
|
description: "Override the default database connection validation query sql"
|
||||||
|
type: "str"
|
||||||
|
keycloak_admin_url:
|
||||||
|
required: false
|
||||||
|
description: "Override the default administration endpoint URL"
|
||||||
|
type: "str"
|
||||||
|
keycloak_jgroups_subnet:
|
||||||
|
required: false
|
||||||
|
description: >
|
||||||
|
Override the subnet match for jgroups cluster formation; if not defined, it will be inferred from local machine route configuration
|
||||||
|
type: "str"
|
||||||
|
keycloak_log_target:
|
||||||
|
default: '/var/log/keycloak'
|
||||||
|
type: "str"
|
||||||
|
description: "Set the destination of the keycloak log folder link"
|
||||||
|
keycloak_jdbc_download_url:
|
||||||
|
description: "Override the default Maven Central download URL for the JDBC driver"
|
||||||
|
type: "str"
|
||||||
|
keycloak_jdbc_download_user:
|
||||||
|
description: "Set a username with which to authenticate when downloading JDBC drivers from an alternative location"
|
||||||
|
type: "str"
|
||||||
|
keycloak_jdbc_download_pass:
|
||||||
|
description: >
|
||||||
|
Set a password with which to authenticate when downloading JDBC drivers from an alternative location (requires keycloak_jdbc_download_user)
|
||||||
|
type: "str"
|
||||||
|
keycloak_jdbc_download_validate_certs:
|
||||||
|
default: true
|
||||||
|
description: "Allow the option to ignore invalid certificates when downloading JDBC drivers from a custom URL"
|
||||||
|
type: "bool"
|
||||||
downstream:
|
downstream:
|
||||||
options:
|
options:
|
||||||
sso_version:
|
sso_version:
|
||||||
|
@ -313,15 +352,15 @@ argument_specs:
|
||||||
description: "Installation path for Red Hat SSO"
|
description: "Installation path for Red Hat SSO"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_apply_patches:
|
sso_apply_patches:
|
||||||
default: False
|
default: false
|
||||||
description: "Install Red Hat SSO most recent cumulative patch"
|
description: "Install Red Hat SSO most recent cumulative patch"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
sso_enable:
|
sso_enable:
|
||||||
default: True
|
default: true
|
||||||
description: "Enable Red Hat Single Sign-on installation"
|
description: "Enable Red Hat Single Sign-on installation"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_offline_install:
|
sso_offline_install:
|
||||||
default: False
|
default: false
|
||||||
description: "Perform an offline install"
|
description: "Perform an offline install"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
sso_service_name:
|
sso_service_name:
|
||||||
|
@ -333,7 +372,7 @@ argument_specs:
|
||||||
description: "systemd description for Red Hat Single Sign-On"
|
description: "systemd description for Red Hat Single Sign-On"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_patch_version:
|
sso_patch_version:
|
||||||
required: False
|
required: false
|
||||||
description: "Red Hat Single Sign-On latest cumulative patch version to apply; defaults to latest version when sso_apply_patches is True"
|
description: "Red Hat Single Sign-On latest cumulative patch version to apply; defaults to latest version when sso_apply_patches is True"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_patch_bundle:
|
sso_patch_bundle:
|
||||||
|
|
|
@ -12,12 +12,12 @@ galaxy_info:
|
||||||
|
|
||||||
license: Apache License 2.0
|
license: Apache License 2.0
|
||||||
|
|
||||||
min_ansible_version: "2.9"
|
min_ansible_version: "2.16"
|
||||||
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: EL
|
- name: EL
|
||||||
versions:
|
versions:
|
||||||
- 8
|
- "8"
|
||||||
|
|
||||||
galaxy_tags:
|
galaxy_tags:
|
||||||
- keycloak
|
- keycloak
|
||||||
|
|
6
roles/keycloak/tasks/debian.yml
Normal file
6
roles/keycloak/tasks/debian.yml
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
---
|
||||||
|
- name: Include firewall config tasks
|
||||||
|
ansible.builtin.include_tasks: iptables.yml
|
||||||
|
when: keycloak_configure_iptables
|
||||||
|
tags:
|
||||||
|
- firewall
|
|
@ -1,20 +1,31 @@
|
||||||
---
|
---
|
||||||
- name: Check packages to be installed
|
|
||||||
block:
|
|
||||||
- name: "Check if packages are already installed" # noqa command-instead-of-module this runs faster
|
- name: "Check if packages are already installed" # noqa command-instead-of-module this runs faster
|
||||||
ansible.builtin.command: "rpm -q {{ packages_list | join(' ') }}"
|
ansible.builtin.command: "rpm -q {{ packages_list | join(' ') }}"
|
||||||
register: rpm_info
|
register: rpm_info
|
||||||
changed_when: rpm_info.failed
|
changed_when: false
|
||||||
|
failed_when: false
|
||||||
|
when: ansible_facts.os_family == "RedHat"
|
||||||
|
|
||||||
rescue:
|
|
||||||
- name: "Add missing packages to the yum install list"
|
- name: "Add missing packages to the yum install list"
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
packages_to_install: "{{ packages_to_install | default([]) + rpm_info.stdout_lines | map('regex_findall', 'package (.+) is not installed$') | flatten }}"
|
packages_to_install: "{{ packages_to_install | default([]) + rpm_info.stdout_lines | \
|
||||||
when: rpm_info.failed
|
map('regex_findall', 'package (.+) is not installed$') | default([]) | flatten }}"
|
||||||
|
when: ansible_facts.os_family == "RedHat"
|
||||||
|
|
||||||
- name: "Install packages: {{ packages_to_install }}"
|
- name: "Install packages: {{ packages_to_install }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.yum:
|
ansible.builtin.dnf:
|
||||||
name: "{{ packages_to_install }}"
|
name: "{{ packages_to_install }}"
|
||||||
state: present
|
state: present
|
||||||
when: packages_to_install | default([]) | length > 0
|
when:
|
||||||
|
- packages_to_install | default([]) | length > 0
|
||||||
|
- ansible_facts.os_family == "RedHat"
|
||||||
|
|
||||||
|
- name: "Install packages: {{ packages_list }}"
|
||||||
|
become: true
|
||||||
|
ansible.builtin.package:
|
||||||
|
name: "{{ packages_list }}"
|
||||||
|
state: present
|
||||||
|
when:
|
||||||
|
- packages_list | default([]) | length > 0
|
||||||
|
- ansible_facts.os_family == "Debian"
|
||||||
|
|
|
@ -6,19 +6,19 @@
|
||||||
- firewalld
|
- firewalld
|
||||||
|
|
||||||
- name: Enable and start the firewalld service
|
- name: Enable and start the firewalld service
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: firewalld
|
name: firewalld
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: started
|
state: started
|
||||||
|
|
||||||
- name: "Configure firewall for {{ keycloak.service_name }} ports"
|
- name: "Configure firewall ports for {{ keycloak.service_name }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.posix.firewalld:
|
ansible.posix.firewalld:
|
||||||
port: "{{ item }}"
|
port: "{{ item }}"
|
||||||
permanent: true
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
immediate: yes
|
immediate: true
|
||||||
loop:
|
loop:
|
||||||
- "{{ keycloak_http_port }}/tcp"
|
- "{{ keycloak_http_port }}/tcp"
|
||||||
- "{{ keycloak_https_port }}/tcp"
|
- "{{ keycloak_https_port }}/tcp"
|
||||||
|
|
|
@ -11,7 +11,7 @@
|
||||||
quiet: true
|
quiet: true
|
||||||
|
|
||||||
- name: Check for an existing deployment
|
- name: Check for an existing deployment
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak_jboss_home }}"
|
path: "{{ keycloak_jboss_home }}"
|
||||||
register: existing_deploy
|
register: existing_deploy
|
||||||
|
@ -20,38 +20,47 @@
|
||||||
when: existing_deploy.stat.exists and keycloak_force_install | bool
|
when: existing_deploy.stat.exists and keycloak_force_install | bool
|
||||||
block:
|
block:
|
||||||
- name: "Stop the old {{ keycloak.service_name }} service"
|
- name: "Stop the old {{ keycloak.service_name }} service"
|
||||||
become: yes
|
become: true
|
||||||
ignore_errors: yes
|
failed_when: false
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
state: stopped
|
state: stopped
|
||||||
- name: "Remove the old {{ keycloak.service_name }} deployment"
|
- name: "Remove the old {{ keycloak.service_name }} deployment"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "{{ keycloak_jboss_home }}"
|
path: "{{ keycloak_jboss_home }}"
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Check for an existing deployment after possible forced removal
|
- name: Check for an existing deployment after possible forced removal
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak_jboss_home }}"
|
path: "{{ keycloak_jboss_home }}"
|
||||||
|
|
||||||
- name: "Create {{ keycloak.service_name }} service user/group"
|
- name: "Create service user/group for {{ keycloak.service_name }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.user:
|
ansible.builtin.user:
|
||||||
name: "{{ keycloak_service_user }}"
|
name: "{{ keycloak_service_user }}"
|
||||||
home: /opt/keycloak
|
home: /opt/keycloak
|
||||||
system: yes
|
system: true
|
||||||
create_home: no
|
create_home: false
|
||||||
|
|
||||||
- name: "Create {{ keycloak.service_name }} install location"
|
- name: "Create install location for {{ keycloak.service_name }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
dest: "{{ keycloak_dest }}"
|
dest: "{{ keycloak_dest }}"
|
||||||
state: directory
|
state: directory
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
mode: 0750
|
mode: '0750'
|
||||||
|
|
||||||
|
- name: Create pidfile folder
|
||||||
|
become: true
|
||||||
|
ansible.builtin.file:
|
||||||
|
dest: "{{ keycloak_service_pidfile | dirname }}"
|
||||||
|
state: directory
|
||||||
|
owner: "{{ keycloak_service_user if keycloak_service_runas else omit }}"
|
||||||
|
group: "{{ keycloak_service_group if keycloak_service_runas else omit }}"
|
||||||
|
mode: '0750'
|
||||||
|
|
||||||
## check remote archive
|
## check remote archive
|
||||||
- name: Set download archive path
|
- name: Set download archive path
|
||||||
|
@ -59,7 +68,7 @@
|
||||||
archive: "{{ keycloak_dest }}/{{ keycloak.bundle }}"
|
archive: "{{ keycloak_dest }}/{{ keycloak.bundle }}"
|
||||||
|
|
||||||
- name: Check download archive path
|
- name: Check download archive path
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ archive }}"
|
path: "{{ archive }}"
|
||||||
register: archive_path
|
register: archive_path
|
||||||
|
@ -75,9 +84,9 @@
|
||||||
ansible.builtin.get_url: # noqa risky-file-permissions delegated, uses controller host user
|
ansible.builtin.get_url: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
url: "{{ keycloak_download_url }}"
|
url: "{{ keycloak_download_url }}"
|
||||||
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
||||||
mode: 0644
|
mode: '0644'
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- archive_path is defined
|
- archive_path is defined
|
||||||
- archive_path.stat is defined
|
- archive_path.stat is defined
|
||||||
|
@ -87,7 +96,7 @@
|
||||||
|
|
||||||
- name: Perform download from RHN using JBoss Network API
|
- name: Perform download from RHN using JBoss Network API
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- archive_path is defined
|
- archive_path is defined
|
||||||
- archive_path.stat is defined
|
- archive_path.stat is defined
|
||||||
|
@ -105,13 +114,13 @@
|
||||||
register: rhn_products
|
register: rhn_products
|
||||||
no_log: "{{ omit_rhn_output | default(true) }}"
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Determine install zipfile from search results
|
- name: Determine install zipfile from search results
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_archive + '$') }}"
|
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_archive + '$') }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Download Red Hat Single Sign-On
|
- name: Download Red Hat Single Sign-On
|
||||||
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
|
@ -121,15 +130,15 @@
|
||||||
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
||||||
no_log: "{{ omit_rhn_output | default(true) }}"
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Download rhsso archive from alternate location
|
- name: Download rhsso archive from alternate location
|
||||||
ansible.builtin.get_url: # noqa risky-file-permissions delegated, uses controller host user
|
ansible.builtin.get_url: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
url: "{{ keycloak_rhsso_download_url }}"
|
url: "{{ keycloak_rhsso_download_url }}"
|
||||||
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
||||||
mode: 0644
|
mode: '0644'
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- archive_path is defined
|
- archive_path is defined
|
||||||
- archive_path.stat is defined
|
- archive_path.stat is defined
|
||||||
|
@ -151,29 +160,29 @@
|
||||||
dest: "{{ archive }}"
|
dest: "{{ archive }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
mode: 0640
|
mode: '0640'
|
||||||
register: new_version_downloaded
|
register: new_version_downloaded
|
||||||
when:
|
when:
|
||||||
- not archive_path.stat.exists
|
- not archive_path.stat.exists
|
||||||
- local_archive_path.stat is defined
|
- local_archive_path.stat is defined
|
||||||
- local_archive_path.stat.exists
|
- local_archive_path.stat.exists
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Check target directory: {{ keycloak.home }}"
|
- name: "Check target directory: {{ keycloak.home }}"
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak.home }}"
|
path: "{{ keycloak.home }}"
|
||||||
register: path_to_workdir
|
register: path_to_workdir
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Extract {{ keycloak_service_desc }} archive on target"
|
- name: "Extract {{ keycloak_service_desc }} archive on target"
|
||||||
ansible.builtin.unarchive:
|
ansible.builtin.unarchive:
|
||||||
remote_src: yes
|
remote_src: true
|
||||||
src: "{{ archive }}"
|
src: "{{ archive }}"
|
||||||
dest: "{{ keycloak_dest }}"
|
dest: "{{ keycloak_dest }}"
|
||||||
creates: "{{ keycloak.home }}"
|
creates: "{{ keycloak.home }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
become: yes
|
become: true
|
||||||
when:
|
when:
|
||||||
- new_version_downloaded.changed or not path_to_workdir.stat.exists
|
- new_version_downloaded.changed or not path_to_workdir.stat.exists
|
||||||
notify:
|
notify:
|
||||||
|
@ -191,7 +200,13 @@
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
recurse: true
|
recurse: true
|
||||||
become: yes
|
become: true
|
||||||
|
changed_when: false
|
||||||
|
|
||||||
|
- name: Ensure permissions are correct on existing deploy
|
||||||
|
ansible.builtin.command: chown -R "{{ keycloak_service_user }}:{{ keycloak_service_group }}" "{{ keycloak.home }}"
|
||||||
|
when: keycloak_service_runas
|
||||||
|
become: true
|
||||||
changed_when: false
|
changed_when: false
|
||||||
|
|
||||||
# driver and configuration
|
# driver and configuration
|
||||||
|
@ -199,17 +214,31 @@
|
||||||
ansible.builtin.include_tasks: jdbc_driver.yml
|
ansible.builtin.include_tasks: jdbc_driver.yml
|
||||||
when: keycloak_jdbc[keycloak_jdbc_engine].enabled
|
when: keycloak_jdbc[keycloak_jdbc_engine].enabled
|
||||||
|
|
||||||
- name: "Deploy {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }} from {{ keycloak.config_template_source }}"
|
- name: "Deploy custom {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }} from {{ keycloak_config_override_template }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: "templates/{{ keycloak.config_template_source }}"
|
src: "templates/{{ keycloak_config_override_template }}"
|
||||||
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
mode: 0640
|
mode: '0640'
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
when: not keycloak_remotecache.enabled or keycloak_config_override_template | length > 0
|
when: keycloak_config_override_template | length > 0
|
||||||
|
|
||||||
|
- name: "Deploy standalone {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }}"
|
||||||
|
become: true
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: templates/standalone.xml.j2
|
||||||
|
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
||||||
|
owner: "{{ keycloak_service_user }}"
|
||||||
|
group: "{{ keycloak_service_group }}"
|
||||||
|
mode: '0640'
|
||||||
|
notify:
|
||||||
|
- restart keycloak
|
||||||
|
when:
|
||||||
|
- not keycloak_ha_enabled
|
||||||
|
- keycloak_config_override_template | length == 0
|
||||||
|
|
||||||
- name: Create tcpping cluster node list
|
- name: Create tcpping cluster node list
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
|
@ -218,21 +247,51 @@
|
||||||
{
|
{
|
||||||
"name": item,
|
"name": item,
|
||||||
"address": 'jgroups-' + item,
|
"address": 'jgroups-' + item,
|
||||||
"inventory_host": hostvars[item].ansible_default_ipv4.address | default(item) + '[' + keycloak_jgroups_port + ']',
|
"inventory_host": hostvars[item].ansible_default_ipv4.address | default(item) + '[' + (keycloak_jgroups_port | string) + ']',
|
||||||
"value": hostvars[item].ansible_default_ipv4.address | default(item)
|
"value": hostvars[item].ansible_default_ipv4.address | default(item)
|
||||||
}
|
}
|
||||||
] }}
|
] }}
|
||||||
loop: "{{ ansible_play_batch }}"
|
loop: "{{ ansible_play_batch }}"
|
||||||
when: keycloak_ha_enabled and keycloak_ha_discovery == 'TCPPING'
|
when: keycloak_ha_enabled and keycloak_ha_discovery == 'TCPPING'
|
||||||
|
|
||||||
- name: "Deploy {{ keycloak.service_name }} config with remote cache store to {{ keycloak_config_path_to_standalone_xml }}"
|
- name: "Deploy HA {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }}"
|
||||||
become: yes
|
become: true
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: templates/standalone-ha.xml.j2
|
||||||
|
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
||||||
|
owner: "{{ keycloak_service_user }}"
|
||||||
|
group: "{{ keycloak_service_group }}"
|
||||||
|
mode: '0640'
|
||||||
|
notify:
|
||||||
|
- restart keycloak
|
||||||
|
when:
|
||||||
|
- keycloak_ha_enabled
|
||||||
|
- not keycloak_remote_cache_enabled
|
||||||
|
- keycloak_config_override_template | length == 0
|
||||||
|
|
||||||
|
- name: "Deploy HA {{ keycloak.service_name }} config with infinispan remote cache store to {{ keycloak_config_path_to_standalone_xml }}"
|
||||||
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: templates/standalone-infinispan.xml.j2
|
src: templates/standalone-infinispan.xml.j2
|
||||||
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
mode: 0640
|
mode: '0640'
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
when: keycloak_remotecache.enabled
|
when:
|
||||||
|
- keycloak_ha_enabled
|
||||||
|
- keycloak_remote_cache_enabled
|
||||||
|
- keycloak_config_override_template | length == 0
|
||||||
|
|
||||||
|
- name: "Deploy profile.properties file to {{ keycloak_config_path_to_properties }}"
|
||||||
|
become: true
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: keycloak-profile.properties.j2
|
||||||
|
dest: "{{ keycloak_config_path_to_properties }}"
|
||||||
|
owner: "{{ keycloak_service_user }}"
|
||||||
|
group: "{{ keycloak_service_group }}"
|
||||||
|
mode: '0640'
|
||||||
|
notify:
|
||||||
|
- restart keycloak
|
||||||
|
when: keycloak_features | length > 0
|
||||||
|
|
23
roles/keycloak/tasks/iptables.yml
Normal file
23
roles/keycloak/tasks/iptables.yml
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
---
|
||||||
|
- name: Ensure required package iptables are installed
|
||||||
|
ansible.builtin.include_tasks: fastpackages.yml
|
||||||
|
vars:
|
||||||
|
packages_list:
|
||||||
|
- iptables
|
||||||
|
|
||||||
|
- name: "Configure firewall ports for {{ keycloak.service_name }}"
|
||||||
|
become: true
|
||||||
|
ansible.builtin.iptables:
|
||||||
|
destination_port: "{{ item }}"
|
||||||
|
action: "insert"
|
||||||
|
rule_num: 6 # magic number I forget why
|
||||||
|
chain: "INPUT"
|
||||||
|
policy: "ACCEPT"
|
||||||
|
protocol: tcp
|
||||||
|
loop:
|
||||||
|
- "{{ keycloak_http_port }}"
|
||||||
|
- "{{ keycloak_https_port }}"
|
||||||
|
- "{{ keycloak_management_http_port }}"
|
||||||
|
- "{{ keycloak_management_https_port }}"
|
||||||
|
- "{{ keycloak_jgroups_port }}"
|
||||||
|
- "{{ keycloak_ajp_port }}"
|
|
@ -3,19 +3,26 @@
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}"
|
path: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}"
|
||||||
register: dest_path
|
register: dest_path
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Set up module dir for JDBC Driver {{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_name }}"
|
- name: "Set up module dir for JDBC Driver {{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_name }}"
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}"
|
path: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}"
|
||||||
state: directory
|
state: directory
|
||||||
recurse: yes
|
recurse: true
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
mode: 0750
|
mode: '0750'
|
||||||
become: yes
|
become: true
|
||||||
when:
|
when:
|
||||||
- not dest_path.stat.exists
|
- not dest_path.stat.exists
|
||||||
|
- name: "Verify valid parameters for download credentials when specified"
|
||||||
|
ansible.builtin.fail:
|
||||||
|
msg: >-
|
||||||
|
When JDBC driver download credentials are set, both the username and the password MUST be set
|
||||||
|
when: >
|
||||||
|
(keycloak_jdbc_download_user is undefined and keycloak_jdbc_download_pass is not undefined) or
|
||||||
|
(keycloak_jdbc_download_pass is undefined and keycloak_jdbc_download_user is not undefined)
|
||||||
|
|
||||||
- name: "Retrieve JDBC Driver from {{ keycloak_jdbc[keycloak_jdbc_engine].driver_jar_url }}"
|
- name: "Retrieve JDBC Driver from {{ keycloak_jdbc[keycloak_jdbc_engine].driver_jar_url }}"
|
||||||
ansible.builtin.get_url:
|
ansible.builtin.get_url:
|
||||||
|
@ -23,8 +30,11 @@
|
||||||
dest: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}/{{ keycloak_jdbc[keycloak_jdbc_engine].driver_jar_filename }}"
|
dest: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}/{{ keycloak_jdbc[keycloak_jdbc_engine].driver_jar_filename }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
mode: 0640
|
url_username: "{{ keycloak_jdbc_download_user | default(omit) }}"
|
||||||
become: yes
|
url_password: "{{ keycloak_jdbc_download_pass | default(omit) }}"
|
||||||
|
validate_certs: "{{ keycloak_jdbc_download_validate_certs | default(omit) }}"
|
||||||
|
mode: '0640'
|
||||||
|
become: true
|
||||||
|
|
||||||
- name: "Deploy module.xml for JDBC Driver"
|
- name: "Deploy module.xml for JDBC Driver"
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
|
@ -32,5 +42,5 @@
|
||||||
dest: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}/module.xml"
|
dest: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}/module.xml"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
mode: 0640
|
mode: '0640'
|
||||||
become: yes
|
become: true
|
||||||
|
|
|
@ -5,11 +5,10 @@
|
||||||
tags:
|
tags:
|
||||||
- prereqs
|
- prereqs
|
||||||
|
|
||||||
- name: Include firewall config tasks
|
- name: Distro specific tasks
|
||||||
ansible.builtin.include_tasks: firewalld.yml
|
ansible.builtin.include_tasks: "{{ ansible_os_family | lower }}.yml"
|
||||||
when: keycloak_configure_firewalld
|
|
||||||
tags:
|
tags:
|
||||||
- firewall
|
- unbound
|
||||||
|
|
||||||
- name: Include install tasks
|
- name: Include install tasks
|
||||||
ansible.builtin.include_tasks: install.yml
|
ansible.builtin.include_tasks: install.yml
|
||||||
|
@ -26,6 +25,7 @@
|
||||||
when:
|
when:
|
||||||
- sso_apply_patches is defined and sso_apply_patches
|
- sso_apply_patches is defined and sso_apply_patches
|
||||||
- sso_enable is defined and sso_enable
|
- sso_enable is defined and sso_enable
|
||||||
|
- ansible_facts.os_family == "RedHat"
|
||||||
tags:
|
tags:
|
||||||
- install
|
- install
|
||||||
- patch
|
- patch
|
||||||
|
@ -34,8 +34,8 @@
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
state: link
|
state: link
|
||||||
src: "{{ keycloak_jboss_home }}/standalone/log"
|
src: "{{ keycloak_jboss_home }}/standalone/log"
|
||||||
dest: /var/log/keycloak
|
dest: "{{ keycloak_log_target }}"
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: Set admin credentials and restart if not already created
|
- name: Set admin credentials and restart if not already created
|
||||||
block:
|
block:
|
||||||
|
@ -44,7 +44,7 @@
|
||||||
url: "{{ keycloak_url }}/auth/realms/master/protocol/openid-connect/token"
|
url: "{{ keycloak_url }}/auth/realms/master/protocol/openid-connect/token"
|
||||||
method: POST
|
method: POST
|
||||||
body: "client_id={{ keycloak_auth_client }}&username={{ keycloak_admin_user }}&password={{ keycloak_admin_password }}&grant_type=password"
|
body: "client_id={{ keycloak_auth_client }}&username={{ keycloak_admin_user }}&password={{ keycloak_admin_password }}&grant_type=password"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
register: keycloak_auth_response
|
register: keycloak_auth_response
|
||||||
until: keycloak_auth_response.status == 200
|
until: keycloak_auth_response.status == 200
|
||||||
retries: 2
|
retries: 2
|
||||||
|
@ -58,8 +58,8 @@
|
||||||
- "-rmaster"
|
- "-rmaster"
|
||||||
- "-u{{ keycloak_admin_user }}"
|
- "-u{{ keycloak_admin_user }}"
|
||||||
- "-p{{ keycloak_admin_password }}"
|
- "-p{{ keycloak_admin_password }}"
|
||||||
changed_when: yes
|
changed_when: true
|
||||||
become: yes
|
become: true
|
||||||
- name: "Restart {{ keycloak.service_name }}"
|
- name: "Restart {{ keycloak.service_name }}"
|
||||||
ansible.builtin.include_tasks: tasks/restart_keycloak.yml
|
ansible.builtin.include_tasks: tasks/restart_keycloak.yml
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
|
|
|
@ -3,15 +3,18 @@
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- keycloak_admin_password | length > 12
|
- keycloak_admin_password | length > 12
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "The console administrator password is empty or invalid. Please set the keycloak_admin_password variable to a 12+ char long string"
|
fail_msg: >
|
||||||
|
The console administrator password is empty or invalid. Please set the keycloak_admin_password variable to a 12+ char long string
|
||||||
success_msg: "{{ 'Console administrator password OK' }}"
|
success_msg: "{{ 'Console administrator password OK' }}"
|
||||||
|
|
||||||
- name: Validate configuration
|
- name: Validate configuration
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that: >
|
||||||
- (keycloak_ha_enabled and keycloak_db_enabled) or (not keycloak_ha_enabled and keycloak_db_enabled) or (not keycloak_ha_enabled and not keycloak_db_enabled)
|
(keycloak_ha_enabled and keycloak_db_enabled) or
|
||||||
quiet: True
|
(not keycloak_ha_enabled and keycloak_db_enabled) or
|
||||||
|
(not keycloak_ha_enabled and not keycloak_db_enabled)
|
||||||
|
quiet: true
|
||||||
fail_msg: "Cannot install HA setup without a backend database service. Check keycloak_ha_enabled and keycloak_db_enabled"
|
fail_msg: "Cannot install HA setup without a backend database service. Check keycloak_ha_enabled and keycloak_db_enabled"
|
||||||
success_msg: "{{ 'Configuring HA' if keycloak_ha_enabled else 'Configuring standalone' }}"
|
success_msg: "{{ 'Configuring HA' if keycloak_ha_enabled else 'Configuring standalone' }}"
|
||||||
|
|
||||||
|
@ -20,27 +23,36 @@
|
||||||
that:
|
that:
|
||||||
- (rhn_username is defined and sso_enable is defined and sso_enable) or not sso_enable is defined or not sso_enable or keycloak_offline_install
|
- (rhn_username is defined and sso_enable is defined and sso_enable) or not sso_enable is defined or not sso_enable or keycloak_offline_install
|
||||||
- (rhn_password is defined and sso_enable is defined and sso_enable) or not sso_enable is defined or not sso_enable or keycloak_offline_install
|
- (rhn_password is defined and sso_enable is defined and sso_enable) or not sso_enable is defined or not sso_enable or keycloak_offline_install
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "Cannot install Red Hat SSO without RHN credentials. Check rhn_username and rhn_password are defined"
|
fail_msg: "Cannot install Red Hat SSO without RHN credentials. Check rhn_username and rhn_password are defined"
|
||||||
success_msg: "Installing {{ keycloak_service_desc }}"
|
success_msg: "Installing {{ keycloak_service_desc }}"
|
||||||
|
|
||||||
- name: Validate persistence configuration
|
- name: Validate persistence configuration
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- keycloak_jdbc_engine is defined and keycloak_jdbc_engine in [ 'postgres', 'mariadb' ]
|
- keycloak_jdbc_engine is defined and keycloak_jdbc_engine in [ 'postgres', 'mariadb', 'sqlserver' ]
|
||||||
- keycloak_jdbc_url | length > 0
|
- keycloak_jdbc_url | length > 0
|
||||||
- keycloak_db_user | length > 0
|
- keycloak_db_user | length > 0
|
||||||
- keycloak_db_pass | length > 0
|
- keycloak_db_pass | length > 0
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "Configuration for the JDBC persistence is invalid or incomplete"
|
fail_msg: "Configuration for the JDBC persistence is invalid or incomplete"
|
||||||
success_msg: "Configuring JDBC persistence using {{ keycloak_jdbc_engine }} database"
|
success_msg: "Configuring JDBC persistence using {{ keycloak_jdbc_engine }} database"
|
||||||
when: keycloak_db_enabled
|
when: keycloak_db_enabled
|
||||||
|
|
||||||
|
- name: Validate OS family
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- ansible_os_family in ["RedHat", "Debian"]
|
||||||
|
quiet: true
|
||||||
|
fail_msg: "Can only install on RedHat or Debian OS families; found {{ ansible_os_family }}"
|
||||||
|
success_msg: "Installing on {{ ansible_os_family }}"
|
||||||
|
|
||||||
|
- name: Load OS specific variables
|
||||||
|
ansible.builtin.include_vars: "vars/{{ ansible_os_family | lower }}.yml"
|
||||||
|
tags:
|
||||||
|
- always
|
||||||
|
|
||||||
- name: Ensure required packages are installed
|
- name: Ensure required packages are installed
|
||||||
ansible.builtin.include_tasks: fastpackages.yml
|
ansible.builtin.include_tasks: fastpackages.yml
|
||||||
vars:
|
vars:
|
||||||
packages_list:
|
packages_list: "{{ keycloak_prereq_package_list }}"
|
||||||
- "{{ keycloak_jvm_package }}"
|
|
||||||
- unzip
|
|
||||||
- procps-ng
|
|
||||||
- initscripts
|
|
||||||
|
|
6
roles/keycloak/tasks/redhat.yml
Normal file
6
roles/keycloak/tasks/redhat.yml
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
---
|
||||||
|
- name: Include firewall config tasks
|
||||||
|
ansible.builtin.include_tasks: firewalld.yml
|
||||||
|
when: keycloak_configure_firewalld
|
||||||
|
tags:
|
||||||
|
- firewall
|
|
@ -2,11 +2,12 @@
|
||||||
- name: "Restart and enable {{ keycloak.service_name }} service"
|
- name: "Restart and enable {{ keycloak.service_name }} service"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: restarted
|
state: restarted
|
||||||
become: yes
|
daemon_reload: true
|
||||||
|
become: true
|
||||||
delegate_to: "{{ ansible_play_hosts | first }}"
|
delegate_to: "{{ ansible_play_hosts | first }}"
|
||||||
run_once: True
|
run_once: true
|
||||||
|
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
|
@ -14,14 +15,14 @@
|
||||||
register: keycloak_status
|
register: keycloak_status
|
||||||
until: keycloak_status.status == 200
|
until: keycloak_status.status == 200
|
||||||
delegate_to: "{{ ansible_play_hosts | first }}"
|
delegate_to: "{{ ansible_play_hosts | first }}"
|
||||||
run_once: True
|
run_once: true
|
||||||
retries: "{{ keycloak_service_start_retries }}"
|
retries: "{{ keycloak_service_start_retries }}"
|
||||||
delay: "{{ keycloak_service_start_delay }}"
|
delay: "{{ keycloak_service_start_delay }}"
|
||||||
|
|
||||||
- name: "Restart and enable {{ keycloak.service_name }} service"
|
- name: "Restart and enable {{ keycloak.service_name }} service"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: restarted
|
state: restarted
|
||||||
become: yes
|
become: true
|
||||||
when: inventory_hostname != ansible_play_hosts | first
|
when: inventory_hostname != ansible_play_hosts | first
|
||||||
|
|
|
@ -2,12 +2,12 @@
|
||||||
- name: Ensure required params for CLI have been provided
|
- name: Ensure required params for CLI have been provided
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- query is defined
|
- cli_query is defined
|
||||||
fail_msg: "Missing required parameters to execute CLI."
|
fail_msg: "Missing required parameters to execute CLI."
|
||||||
quiet: true
|
quiet: true
|
||||||
|
|
||||||
- name: "Execute CLI query: {{ query }}"
|
- name: "Execute CLI query: {{ cli_query }}"
|
||||||
ansible.builtin.command: >
|
ansible.builtin.command: >
|
||||||
{{ keycloak.cli_path }} --connect --command='{{ query }}' --controller={{ keycloak_host }}:{{ keycloak_management_http_port }}
|
{{ keycloak.cli_path }} --connect --command='{{ cli_query }}' --controller={{ keycloak_host }}:{{ keycloak_management_http_port }}
|
||||||
changed_when: false
|
changed_when: false
|
||||||
register: cli_result
|
register: cli_result
|
|
@ -3,6 +3,8 @@
|
||||||
- name: Set download patch archive path
|
- name: Set download patch archive path
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
patch_archive: "{{ keycloak_dest }}/{{ sso_patch_bundle }}"
|
patch_archive: "{{ keycloak_dest }}/{{ sso_patch_bundle }}"
|
||||||
|
patch_bundle: "{{ sso_patch_bundle }}"
|
||||||
|
patch_version: "{{ sso_patch_version }}"
|
||||||
when: sso_patch_version is defined
|
when: sso_patch_version is defined
|
||||||
|
|
||||||
- name: Check download patch archive path
|
- name: Check download patch archive path
|
||||||
|
@ -10,10 +12,11 @@
|
||||||
path: "{{ patch_archive }}"
|
path: "{{ patch_archive }}"
|
||||||
register: patch_archive_path
|
register: patch_archive_path
|
||||||
when: sso_patch_version is defined
|
when: sso_patch_version is defined
|
||||||
|
become: true
|
||||||
|
|
||||||
- name: Perform patch download from RHN via JBossNetwork API
|
- name: Perform patch download from RHN via JBossNetwork API
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- sso_enable is defined and sso_enable
|
- sso_enable is defined and sso_enable
|
||||||
- not keycloak_offline_install
|
- not keycloak_offline_install
|
||||||
|
@ -29,21 +32,23 @@
|
||||||
register: rhn_products
|
register: rhn_products
|
||||||
no_log: "{{ omit_rhn_output | default(true) }}"
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Determine patch versions list
|
- name: Determine patch versions list
|
||||||
set_fact:
|
ansible.builtin.set_fact:
|
||||||
filtered_versions: "{{ rhn_products.results | map(attribute='file_path') | select('match', '^[^/]*/rh-sso-.*[0-9]*[.][0-9]*[.][0-9]*.*$') | map('regex_replace','[^/]*/rh-sso-([0-9]*[.][0-9]*[.][0-9]*)-.*','\\1' ) | list | unique }}"
|
filtered_versions: "{{ rhn_products.results | map(attribute='file_path') | \
|
||||||
|
select('match', '^[^/]*/rh-sso-.*[0-9]*[.][0-9]*[.][0-9]*.*$') | \
|
||||||
|
map('regex_replace', '[^/]*/rh-sso-([0-9]*[.][0-9]*[.][0-9]*(-[0-9])?)-.*', '\\1') | list | unique }}"
|
||||||
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Determine latest version
|
- name: Determine latest version
|
||||||
set_fact:
|
ansible.builtin.set_fact:
|
||||||
sso_latest_version: "{{ filtered_versions | middleware_automation.keycloak.version_sort | last }}"
|
sso_latest_version: "{{ filtered_versions | middleware_automation.common.version_sort | last }}"
|
||||||
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Determine install zipfile from search results
|
- name: Determine install zipfile from search results
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
|
@ -52,26 +57,26 @@
|
||||||
patch_version: "{{ sso_latest_version }}"
|
patch_version: "{{ sso_latest_version }}"
|
||||||
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: "Determine selected patch from supplied version: {{ sso_patch_version }}"
|
- name: "Determine selected patch from supplied version: {{ sso_patch_version }}"
|
||||||
set_fact:
|
ansible.builtin.set_fact:
|
||||||
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_patch_bundle + '$') }}"
|
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_patch_bundle + '$') }}"
|
||||||
patch_bundle: "{{ sso_patch_bundle }}"
|
patch_bundle: "{{ sso_patch_bundle }}"
|
||||||
patch_version: "{{ sso_patch_version }}"
|
patch_version: "{{ sso_patch_version }}"
|
||||||
when: sso_patch_version is defined
|
when: sso_patch_version is defined
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Download Red Hat Single Sign-On patch
|
- name: Download Red Hat Single Sign-On patch
|
||||||
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
client_id: "{{ rhn_username }}"
|
client_id: "{{ rhn_username }}"
|
||||||
client_secret: "{{ rhn_password }}"
|
client_secret: "{{ rhn_password }}"
|
||||||
product_id: "{{ (rhn_filtered_products | first).id }}"
|
product_id: "{{ (rhn_filtered_products | sort | last).id }}"
|
||||||
dest: "{{ local_path.stat.path }}/{{ patch_bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ patch_bundle }}"
|
||||||
no_log: "{{ omit_rhn_output | default(true) }}"
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Set download patch archive path
|
- name: Set download patch archive path
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
|
@ -81,7 +86,7 @@
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ patch_archive }}"
|
path: "{{ patch_archive }}"
|
||||||
register: patch_archive_path
|
register: patch_archive_path
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
## copy and unpack
|
## copy and unpack
|
||||||
- name: Copy patch archive to target nodes
|
- name: Copy patch archive to target nodes
|
||||||
|
@ -90,47 +95,47 @@
|
||||||
dest: "{{ patch_archive }}"
|
dest: "{{ patch_archive }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
mode: 0640
|
mode: '0640'
|
||||||
register: new_version_downloaded
|
register: new_version_downloaded
|
||||||
when:
|
when:
|
||||||
- not patch_archive_path.stat.exists
|
- not patch_archive_path.stat.exists
|
||||||
- local_archive_path.stat is defined
|
- local_archive_path.stat is defined
|
||||||
- local_archive_path.stat.exists
|
- local_archive_path.stat.exists
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Check installed patches"
|
- name: "Check installed patches"
|
||||||
ansible.builtin.include_tasks: rhsso_cli.yml
|
ansible.builtin.include_tasks: rhsso_cli.yml
|
||||||
vars:
|
vars:
|
||||||
query: "patch info"
|
cli_query: "patch info"
|
||||||
args:
|
args:
|
||||||
apply:
|
apply:
|
||||||
become: yes
|
become: true
|
||||||
become_user: "{{ keycloak_service_user }}"
|
become_user: "{{ keycloak_service_user }}"
|
||||||
|
|
||||||
- name: "Perform patching"
|
- name: "Perform patching"
|
||||||
when:
|
when:
|
||||||
- cli_result is defined
|
- cli_result is defined
|
||||||
- cli_result.stdout is defined
|
- cli_result.stdout is defined
|
||||||
- patch_version not in cli_result.stdout
|
- patch_version | regex_replace('-[0-9]$', '') not in cli_result.stdout
|
||||||
block:
|
block:
|
||||||
- name: "Apply patch {{ patch_version }} to server"
|
- name: "Apply patch {{ patch_version }} to server"
|
||||||
ansible.builtin.include_tasks: rhsso_cli.yml
|
ansible.builtin.include_tasks: rhsso_cli.yml
|
||||||
vars:
|
vars:
|
||||||
query: "patch apply {{ patch_archive }}"
|
cli_query: "patch apply {{ patch_archive }}"
|
||||||
args:
|
args:
|
||||||
apply:
|
apply:
|
||||||
become: yes
|
become: true
|
||||||
become_user: "{{ keycloak_service_user }}"
|
become_user: "{{ keycloak_service_user }}"
|
||||||
|
|
||||||
- name: "Restart server to ensure patch content is running"
|
- name: "Restart server to ensure patch content is running"
|
||||||
ansible.builtin.include_tasks: rhsso_cli.yml
|
ansible.builtin.include_tasks: rhsso_cli.yml
|
||||||
vars:
|
vars:
|
||||||
query: "shutdown --restart"
|
cli_query: "shutdown --restart"
|
||||||
when:
|
when:
|
||||||
- cli_result.rc == 0
|
- cli_result.rc == 0
|
||||||
args:
|
args:
|
||||||
apply:
|
apply:
|
||||||
become: yes
|
become: true
|
||||||
become_user: "{{ keycloak_service_user }}"
|
become_user: "{{ keycloak_service_user }}"
|
||||||
|
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
|
@ -144,10 +149,10 @@
|
||||||
- name: "Query installed patch after restart"
|
- name: "Query installed patch after restart"
|
||||||
ansible.builtin.include_tasks: rhsso_cli.yml
|
ansible.builtin.include_tasks: rhsso_cli.yml
|
||||||
vars:
|
vars:
|
||||||
query: "patch info"
|
cli_query: "patch info"
|
||||||
args:
|
args:
|
||||||
apply:
|
apply:
|
||||||
become: yes
|
become: true
|
||||||
become_user: "{{ keycloak_service_user }}"
|
become_user: "{{ keycloak_service_user }}"
|
||||||
|
|
||||||
- name: "Verify installed patch version"
|
- name: "Verify installed patch version"
|
||||||
|
|
|
@ -2,9 +2,10 @@
|
||||||
- name: "Start {{ keycloak.service_name }} service"
|
- name: "Start {{ keycloak.service_name }} service"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: started
|
state: started
|
||||||
become: yes
|
daemon_reload: true
|
||||||
|
become: true
|
||||||
|
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
- name: "Stop {{ keycloak.service_name }}"
|
- name: "Stop {{ keycloak.service_name }}"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: stopped
|
state: stopped
|
||||||
become: yes
|
become: true
|
||||||
|
|
|
@ -1,34 +1,23 @@
|
||||||
---
|
---
|
||||||
- name: "Configure {{ keycloak.service_name }} service script wrapper"
|
- name: "Configure {{ keycloak.service_name }} service script wrapper"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: keycloak-service.sh.j2
|
src: keycloak-service.sh.j2
|
||||||
dest: "{{ keycloak_dest }}/keycloak-service.sh"
|
dest: "{{ keycloak_dest }}/keycloak-service.sh"
|
||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0755
|
mode: '0755'
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
- name: Determine JAVA_HOME for selected JVM RPM # noqa blocked_modules
|
|
||||||
ansible.builtin.shell: |
|
|
||||||
set -o pipefail
|
|
||||||
rpm -ql {{ keycloak_jvm_package }} | grep -Po '/usr/lib/jvm/.*(?=/bin/java$)'
|
|
||||||
args:
|
|
||||||
executable: /bin/bash
|
|
||||||
changed_when: False
|
|
||||||
register: rpm_java_home
|
|
||||||
|
|
||||||
- name: "Configure sysconfig file for {{ keycloak.service_name }} service"
|
- name: "Configure sysconfig file for {{ keycloak.service_name }} service"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: keycloak-sysconfig.j2
|
src: keycloak-sysconfig.j2
|
||||||
dest: /etc/sysconfig/keycloak
|
dest: "{{ keycloak_sysconf_file }}"
|
||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0644
|
mode: '0644'
|
||||||
vars:
|
|
||||||
keycloak_rpm_java_home: "{{ rpm_java_home.stdout }}"
|
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
|
@ -38,21 +27,15 @@
|
||||||
dest: /etc/systemd/system/keycloak.service
|
dest: /etc/systemd/system/keycloak.service
|
||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0644
|
mode: '0644'
|
||||||
become: yes
|
become: true
|
||||||
register: systemdunit
|
register: systemdunit
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
- name: Reload systemd
|
|
||||||
become: yes
|
|
||||||
ansible.builtin.systemd:
|
|
||||||
daemon_reload: yes
|
|
||||||
when: systemdunit.changed
|
|
||||||
|
|
||||||
- name: "Start and wait for {{ keycloak.service_name }} service (first node db)"
|
- name: "Start and wait for {{ keycloak.service_name }} service (first node db)"
|
||||||
ansible.builtin.include_tasks: start_keycloak.yml
|
ansible.builtin.include_tasks: start_keycloak.yml
|
||||||
run_once: yes
|
run_once: true
|
||||||
when: keycloak_db_enabled
|
when: keycloak_db_enabled
|
||||||
|
|
||||||
- name: "Start and wait for {{ keycloak.service_name }} service (remaining nodes)"
|
- name: "Start and wait for {{ keycloak.service_name }} service (remaining nodes)"
|
||||||
|
@ -61,7 +44,7 @@
|
||||||
- name: Check service status
|
- name: Check service status
|
||||||
ansible.builtin.command: "systemctl status keycloak"
|
ansible.builtin.command: "systemctl status keycloak"
|
||||||
register: keycloak_service_status
|
register: keycloak_service_status
|
||||||
changed_when: False
|
changed_when: false
|
||||||
|
|
||||||
- name: Verify service status
|
- name: Verify service status
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
<?xml version='1.0' encoding='UTF-8'?>
|
<?xml version='1.0' encoding='UTF-8'?>
|
||||||
<!-- {{ ansible_managed }} -->
|
{{ ansible_managed | comment('xml') }}
|
||||||
<server xmlns="urn:jboss:domain:16.0">
|
<server xmlns="urn:jboss:domain:16.0">
|
||||||
<extensions>
|
<extensions>
|
||||||
<extension module="org.jboss.as.clustering.infinispan"/>
|
<extension module="org.jboss.as.clustering.infinispan"/>
|
||||||
|
@ -728,7 +728,7 @@
|
||||||
</interface>
|
</interface>
|
||||||
<interface name="jgroups">
|
<interface name="jgroups">
|
||||||
{% if ansible_default_ipv4 is defined %}
|
{% if ansible_default_ipv4 is defined %}
|
||||||
<subnet-match value="{{ (ansible_default_ipv4.network + '/' + ansible_default_ipv4.netmask) | ipaddr('net') }}"/>
|
<subnet-match value="{{ (ansible_default_ipv4.network + '/' + ansible_default_ipv4.netmask) | ansible.utils.ipaddr('net') }}"/>
|
||||||
{% else %}
|
{% else %}
|
||||||
<any-address />
|
<any-address />
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -737,7 +737,7 @@
|
||||||
<inet-address value="{{ keycloak_bind_address }}"/>
|
<inet-address value="{{ keycloak_bind_address }}"/>
|
||||||
</interface>
|
</interface>
|
||||||
</interfaces>
|
</interfaces>
|
||||||
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:0}">
|
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:{{ keycloak_jboss_port_offset }}}">
|
||||||
<socket-binding name="ajp" port="{{ keycloak_ajp_port }}"/>
|
<socket-binding name="ajp" port="{{ keycloak_ajp_port }}"/>
|
||||||
<socket-binding name="http" port="{{ keycloak_http_port }}"/>
|
<socket-binding name="http" port="{{ keycloak_http_port }}"/>
|
||||||
<socket-binding name="https" port="{{ keycloak_https_port }}"/>
|
<socket-binding name="https" port="{{ keycloak_https_port }}"/>
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
<?xml version='1.0' encoding='UTF-8'?>
|
<?xml version='1.0' encoding='UTF-8'?>
|
||||||
<!-- {{ ansible_managed }} -->
|
{{ ansible_managed | comment('xml') }}
|
||||||
<server xmlns="urn:jboss:domain:16.0">
|
<server xmlns="urn:jboss:domain:16.0">
|
||||||
<extensions>
|
<extensions>
|
||||||
<extension module="org.jboss.as.clustering.infinispan"/>
|
<extension module="org.jboss.as.clustering.infinispan"/>
|
||||||
|
@ -638,7 +638,7 @@
|
||||||
<inet-address value="{{ keycloak_bind_address }}"/>
|
<inet-address value="{{ keycloak_bind_address }}"/>
|
||||||
</interface>
|
</interface>
|
||||||
</interfaces>
|
</interfaces>
|
||||||
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:0}">
|
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:{{ keycloak_jboss_port_offset }}}">
|
||||||
<socket-binding name="ajp" port="{{ keycloak_ajp_port }}"/>
|
<socket-binding name="ajp" port="{{ keycloak_ajp_port }}"/>
|
||||||
<socket-binding name="http" port="{{ keycloak_http_port }}"/>
|
<socket-binding name="http" port="{{ keycloak_http_port }}"/>
|
||||||
<socket-binding name="https" port="{{ keycloak_https_port }}"/>
|
<socket-binding name="https" port="{{ keycloak_https_port }}"/>
|
||||||
|
|
|
@ -725,7 +725,7 @@
|
||||||
</interface>
|
</interface>
|
||||||
<interface name="jgroups">
|
<interface name="jgroups">
|
||||||
{% if ansible_default_ipv4 is defined %}
|
{% if ansible_default_ipv4 is defined %}
|
||||||
<subnet-match value="{{ (ansible_default_ipv4.network + '/' + ansible_default_ipv4.netmask) | ipaddr('net') }}"/>
|
<subnet-match value="{{ (ansible_default_ipv4.network + '/' + ansible_default_ipv4.netmask) | ansible.utils.ipaddr('net') }}"/>
|
||||||
{% else %}
|
{% else %}
|
||||||
<any-address />
|
<any-address />
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -734,7 +734,7 @@
|
||||||
<inet-address value="${jboss.bind.address:127.0.0.1}"/>
|
<inet-address value="${jboss.bind.address:127.0.0.1}"/>
|
||||||
</interface>
|
</interface>
|
||||||
</interfaces>
|
</interfaces>
|
||||||
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:0}">
|
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:{{ keycloak_jboss_port_offset }}}">
|
||||||
<socket-binding name="ajp" port="${jboss.ajp.port:8009}"/>
|
<socket-binding name="ajp" port="${jboss.ajp.port:8009}"/>
|
||||||
<socket-binding name="http" port="${jboss.http.port:8080}"/>
|
<socket-binding name="http" port="${jboss.http.port:8080}"/>
|
||||||
<socket-binding name="https" port="${jboss.https.port:8443}"/>
|
<socket-binding name="https" port="${jboss.https.port:8443}"/>
|
||||||
|
|
|
@ -598,7 +598,7 @@
|
||||||
<inet-address value="${jboss.bind.address:127.0.0.1}"/>
|
<inet-address value="${jboss.bind.address:127.0.0.1}"/>
|
||||||
</interface>
|
</interface>
|
||||||
</interfaces>
|
</interfaces>
|
||||||
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:0}">
|
<socket-binding-group name="standard-sockets" default-interface="public" port-offset="${jboss.socket.binding.port-offset:{{ keycloak_jboss_port_offset }}}">
|
||||||
<socket-binding name="ajp" port="${jboss.ajp.port:8009}"/>
|
<socket-binding name="ajp" port="${jboss.ajp.port:8009}"/>
|
||||||
<socket-binding name="http" port="${jboss.http.port:8080}"/>
|
<socket-binding name="http" port="${jboss.http.port:8080}"/>
|
||||||
<socket-binding name="https" port="${jboss.https.port:8443}"/>
|
<socket-binding name="https" port="${jboss.https.port:8443}"/>
|
||||||
|
|
3
roles/keycloak/templates/keycloak-profile.properties.j2
Normal file
3
roles/keycloak/templates/keycloak-profile.properties.j2
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
{% for feature in keycloak.features %}
|
||||||
|
feature.{{ feature.name }}={{ feature.status | default('enabled') }}
|
||||||
|
{% endfor %}
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue