middleware_automation.keycloak Release Notes
+middleware_automation.keycloak Release Notes
Topics
-
-
- +
middleware_automation.keycloak Release Notes
-
-
- +
- -
- +
- -
- +
- -
- -
- +
- +
- -
- +
- -
- +
- -
- +
This changelog describes changes after version 0.2.6.
v1.0.7
+v1.0.7
Breaking Changes / Porting Guide
+Breaking Changes / Porting Guide
Bugfixes
+Bugfixes
keycloak_quarkus: use become for tasks that will otherwise fail #38
v1.0.6
-Bugfixes
+v1.0.6
+Bugfixes
v1.0.5
+v1.0.5
Minor Changes
+Minor Changes
Update config options: keycloak and quarkus #32
v1.0.4
+v1.0.4
v1.0.3
+v1.0.3
Major Changes
+Major Changes
New role for installing keycloak >= 17.0.0 (quarkus) #29
Minor Changes
+Minor Changes
Add
keycloak_config_override_templateparameter for passing a custom xml config template #30
Bugfixes
+Bugfixes
Make sure systemd unit starts with selected java JVM #31
v1.0.2
-Minor Changes
+v1.0.2
+Minor Changes
Bugfixes
+Bugfixes
Set
keycloak_frontend_urldefault according to other defaults #25
v1.0.1
+v1.0.1
Release Summary
+Release Summary
Minor enhancements, bug and documentation fixes.
Major Changes
+Major Changes
Apply latest cumulative patch of RH-SSO automatically when new parameter
keycloak_rhsso_apply_patchesistrue#18
Minor Changes
+Minor Changes
Clustered installs now perform database initialization on first node to avoid locking issues #17
v1.0.0
-Release Summary
+v1.0.0
+Release Summary
This is the first stable release of the middleware_automation.keycloak collection.
-
-
- Install Playbook -
- Choosing between upstream project (Keycloak) and Red Hat Single Sign-On (RHSSO) +
- Middleware_Automation.Keycloak
- Role Index
Developer documentation
@@ -159,24 +157,6 @@Both playbooks include the keycloak role, with different settings, as described in the following sections.
For full service configuration details, refer to the keycloak role README.
-Choosing between upstream project (Keycloak) and Red Hat Single Sign-On (RHSSO)
-The general flag keycloak_rhsso_enable controls what to install between upstream (Keycloak, when False) or Red Hat Single Sign-On (when True).
-The default value for the flag if True when Red Hat Network credentials are defined, False otherwise.
Install upstream (Keycloak) from keycloak releases
-This is the default approach when RHN credentials are not defined. Keycloak is downloaded from keycloak builds (hosted on github.com) locally, and distributed to target nodes.
-Install RHSSO from the Red Hat Customer Support Portal
-Define the credentials as follows, and the default behaviour is to download a fresh archive of RHSSO on the controller node, then distribute to target nodes.
-rhn_username: '<customer_portal_username>'
-rhn_password: '<customer_portal_password>'
-# (keycloak_rhsso_enable defaults to True)
-Install from controller node (local source)
Making the keycloak zip archive (or the RHSSO zip archive), available to the playbook repository root directory, and setting For RHSSO: For keycloak: User documentation Enable Red Hat Single Sign-on installation perform an offline install Download URL for keycloak Download URL for RHSSO keycloak.org package version RHSSO version Install RHSSO more recent cumulative patch Installation root path Download URL for keycloak Base download URI for customer portal Ensure firewalld is running and configure keycloak ports Installation path Red Hat SSO install archive filename Installation path for Red Hat SSO `{{ keycloak_dest }}/rh-sso-{{ keycloak_rhsso_version Full download URI for Red Hat SSO Installation work directory Path for configuration Custom path for configuration Path to custom template for standalone.xml configuration Name for rest authentication realm Authentication client for configuration REST calls Remove pre-existing versions of service URL for configuration rest calls URL for management console rest calls Customer Portal product ID for Red Hat SSO backend database engine when db is enabled: [ postgres, mariadb ] URL for the infinispan remote-cache server username for connecting to infinispan password for connecting to infinispan Authentication type Enable hotrod TLS communication Path to truststore with infinispan server certificate Password for opening truststore NOTE: use ansible vaults or other security systems for storing credentials. The following is an example playbook that makes use of the role to install keycloak from remote:keycloak_offline_install to True, allows to skip
@@ -193,13 +173,11 @@ the download tasks. The local path for the archive matches the downloaded archiv
Install from alternate sources (like corporate Nexus, artifactory, proxy, etc)
keycloak_rhsso_enable: True
-keycloak_rhsso_download_url: "https://<internal-nexus.private.net>/<path>/<to>/rh-sso-x.y.z-server-dist.zip"
+
sso_download_url: "https://<internal-nexus.private.net>/<path>/<to>/rh-sso-x.y.z-server-dist.zip"
keycloak_rhsso_enable: False
-keycloak_download_url: "https://<internal-nexus.private.net>/<path>/<to>/keycloak-x.y.zip"
+
keycloak_download_url: "https://<internal-nexus.private.net>/<path>/<to>/keycloak-x.y.zip"
@@ -259,34 +260,18 @@
-
-
-keycloak_rhsso_enable
-
-False
+keycloak_offline_install
-keycloak_offline_installFalse
+keycloak_download_url
-keycloak_download_urlhttps://github.com/keycloak/keycloak/releases/download/<version>/<archive>
-keycloak_rhsso_download_url
-
-https://access.redhat.com/jbossnetwork/restricted/softwareDownload.html?softwareId=<productID>
-keycloak_version15.0.2
-
-keycloak_rhsso_version
-
-7.5.0
-keycloak_rhsso_apply_patches
-
-False
-keycloak_dest
@@ -295,11 +280,7 @@
/opt/keycloakhttps://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}
-
-keycloak_rhn_url
-
-https://access.redhat.com/jbossnetwork/restricted/softwareDownload.html?softwareId=
+keycloak_configure_firewalld
@@ -328,58 +309,42 @@
keycloak_configure_firewalldFalse
-{{ keycloak_dest }}/keycloak-{{ keycloak_version }}
-
-keycloak_rhsso_archive
-
-rh-sso-{{ keycloak_rhsso_version }}-server-dist.zip
-
-keycloak_rhsso_installdir
-
-
-
-keycloak_rhsso_download_url
-
-{{ keycloak_rhn_url }}{{ rhsso_rhn_id }}
+keycloak_jboss_home
-keycloak_jboss_home{{ keycloak_rhsso_installdir if keycloak_rhsso_enable else keycloak_installdir }}
+keycloak_config_dir
-keycloak_config_dir{{ keycloak_jboss_home }}/standalone/configuration
+keycloak_config_path_to_standalone_xml
-keycloak_config_path_to_standalone_xml{{ keycloak_jboss_home }}/standalone/configuration/{{ keycloak_config_standalone_xml }}
+keycloak_config_override_template
-keycloak_config_override_template''
+keycloak_auth_realm
-keycloak_auth_realmmaster
+keycloak_auth_client
-keycloak_auth_clientadmin-cli
+keycloak_force_install
-keycloak_force_installFalse
+keycloak_url
-keycloak_urlhttp://{{ keycloak_host }}:{{ keycloak_http_port }}
+keycloak_management_url
-keycloak_management_urlhttp://{{ keycloak_host }}:{{ keycloak_management_http_port }}
@@ -418,31 +383,31 @@
-rhsso_rhn_id
-
-{{ rhsso_rhn_ids[keycloak_rhsso_version].id }}
-postgres
+infinispan_url
-keycloak_infinispan_urllocalhost:11122
+infinispan_user
-keycloak_infinispan_usersupervisor
+infinispan_pass
-keycloak_infinispan_passsupervisor
+infinispan_sasl_mechanism
-keycloak_infinispan_sasl_mechanismSCRAM-SHA-512
+infinispan_use_ssl
-keycloak_infinispan_use_sslFalse
+infinispan_trust_store_path
-keycloak_infinispan_trust_store_path/etc/pki/java/cacerts
+infinispan_trust_store_password
@@ -476,9 +441,8 @@
-keycloak_infinispan_trust_store_passwordchangeitExample Playbooks
-Example Playbook
@@ -493,27 +457,6 @@