mirror of
https://github.com/ansible-middleware/keycloak.git
synced 2026-05-14 13:32:02 +00:00
Compare commits
74 Commits
2.0.0
...
rhbk_mol_s
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
57b3cb380b | ||
|
|
d8286dfca7 | ||
|
|
d74820190f | ||
|
|
6541b5e386 | ||
|
|
1e1665adb0 | ||
|
|
33a839fec6 | ||
|
|
d97ddbde3c | ||
|
|
7f021a849e | ||
|
|
167bf512c5 | ||
|
|
beee25dec2 | ||
|
|
5bd39a0d0e | ||
|
|
7324f48e8d | ||
|
|
b3ca517583 | ||
|
|
b1848046dc | ||
|
|
983a1fb8f2 | ||
|
|
d4fb20b230 | ||
|
|
f7bef0a956 | ||
|
|
f62a97709a | ||
|
|
9593752e62 | ||
|
|
d6c29ed4fc | ||
|
|
df81dc5497 | ||
|
|
4adab64dc0 | ||
|
|
e0d4920a49 | ||
|
|
c2009a0a12 | ||
|
|
0c5047bcc1 | ||
|
|
63f83d7744 | ||
|
|
64fa8bb788 | ||
|
|
688ec956fc | ||
|
|
e866d1f4e4 | ||
|
|
2985f808ea | ||
|
|
30309582f3 | ||
|
|
40229631e6 | ||
|
|
8adc018cb3 | ||
|
|
053d0f9873 | ||
|
|
eb80ed0bd4 | ||
|
|
d138b4b2ff | ||
|
|
922e4c10f5 | ||
|
|
313bd8452a | ||
|
|
b1b31427d5 | ||
|
|
b057f0297a | ||
|
|
bfd9db6703 | ||
|
|
1d5ce87c16 | ||
|
|
83bcb6712a | ||
|
|
dab388d744 | ||
|
|
ed6dbd60fb | ||
|
|
db19fd5d19 | ||
|
|
473fb212c3 | ||
|
|
98b82ccb4f | ||
|
|
0fbf454279 | ||
|
|
d469d5df8b | ||
|
|
a23bf4c540 | ||
|
|
ac0b421456 | ||
|
|
5b8fcb67dc | ||
|
|
acdee7fa63 | ||
|
|
86576de6e8 | ||
|
|
89944a6cd1 | ||
|
|
33e6d428b5 | ||
|
|
f365351abf | ||
|
|
75899dfa77 | ||
|
|
593c4df861 | ||
|
|
4a72e3818c | ||
|
|
72ca9f5dfa | ||
|
|
842e61c43e | ||
|
|
1728b20cd3 | ||
|
|
c01ffed113 | ||
|
|
fea7ae0c6f | ||
|
|
94530640c1 | ||
|
|
d6f020ab44 | ||
|
|
55c02d7fc5 | ||
|
|
5e8e8c67e8 | ||
|
|
88935abb62 | ||
|
|
3a1d9099a7 | ||
|
|
a439ccab5e | ||
|
|
e086ee8d29 |
4
.github/workflows/ci.yml
vendored
4
.github/workflows/ci.yml
vendored
@@ -6,7 +6,7 @@ on:
|
|||||||
- main
|
- main
|
||||||
pull_request:
|
pull_request:
|
||||||
schedule:
|
schedule:
|
||||||
- cron: '0 6 * * *'
|
- cron: '15 6 * * *'
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
ci:
|
ci:
|
||||||
@@ -15,4 +15,4 @@ jobs:
|
|||||||
with:
|
with:
|
||||||
fqcn: 'middleware_automation/keycloak'
|
fqcn: 'middleware_automation/keycloak'
|
||||||
molecule_tests: >-
|
molecule_tests: >-
|
||||||
[ "default", "quarkus", "overridexml", "quarkus-devmode", "https_revproxy" ]
|
[ "default", "overridexml", "https_revproxy", "quarkus", "quarkus-devmode" ]
|
||||||
|
|||||||
@@ -1,11 +1,66 @@
|
|||||||
============================================
|
=============================================
|
||||||
middleware_automation.keycloak Release Notes
|
middleware\_automation.keycloak Release Notes
|
||||||
============================================
|
=============================================
|
||||||
|
|
||||||
.. contents:: Topics
|
.. contents:: Topics
|
||||||
|
|
||||||
This changelog describes changes after version 0.2.6.
|
This changelog describes changes after version 0.2.6.
|
||||||
|
|
||||||
|
v2.1.0
|
||||||
|
======
|
||||||
|
|
||||||
|
Major Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Implement infinispan TCPPING discovery protocol `#159 <https://github.com/ansible-middleware/keycloak/pull/159>`_
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- Set enable-recovery when xa transactions are enabled `#167 <https://github.com/ansible-middleware/keycloak/pull/167>`_
|
||||||
|
- keycloak_quarkus: Allow configuring log rotate options in quarkus configuration `#161 <https://github.com/ansible-middleware/keycloak/pull/161>`_
|
||||||
|
- keycloak_quarkus: ``sticky-session`` for infinispan routes `#163 <https://github.com/ansible-middleware/keycloak/pull/163>`_
|
||||||
|
|
||||||
|
Breaking Changes / Porting Guide
|
||||||
|
--------------------------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: renamed infinispan host list configuration `#157 <https://github.com/ansible-middleware/keycloak/pull/157>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- keycloak_quarkus: fix custom JAVA_HOME parameter name `#171 <https://github.com/ansible-middleware/keycloak/pull/171>`_
|
||||||
|
|
||||||
|
v2.0.2
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: Add support for sqlserver jdbc driver `#148 <https://github.com/ansible-middleware/keycloak/pull/148>`_
|
||||||
|
- keycloak_quarkus: allow configuration of ``hostname-strict-backchannel`` `#152 <https://github.com/ansible-middleware/keycloak/pull/152>`_
|
||||||
|
- keycloak_quarkus: systemd restart behavior `#145 <https://github.com/ansible-middleware/keycloak/pull/145>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- keycloak_quarkus: Use ``keycloak_quarkus_java_opts`` `#154 <https://github.com/ansible-middleware/keycloak/pull/154>`_
|
||||||
|
- keycloak_quarkus: allow ports <1024 (e.g. :443) in systemd unit `#150 <https://github.com/ansible-middleware/keycloak/pull/150>`_
|
||||||
|
|
||||||
|
v2.0.1
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: add hostname-strict parameter `#139 <https://github.com/ansible-middleware/keycloak/pull/139>`_
|
||||||
|
- keycloak_quarkus: update to version 23.0.1 `#133 <https://github.com/ansible-middleware/keycloak/pull/133>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- keycloak_quarkus: template requires lowercase boolean values `#138 <https://github.com/ansible-middleware/keycloak/pull/138>`_
|
||||||
|
|
||||||
v2.0.0
|
v2.0.0
|
||||||
======
|
======
|
||||||
|
|
||||||
@@ -239,7 +294,6 @@ Release Summary
|
|||||||
|
|
||||||
Minor enhancements, bug and documentation fixes.
|
Minor enhancements, bug and documentation fixes.
|
||||||
|
|
||||||
|
|
||||||
Major Changes
|
Major Changes
|
||||||
-------------
|
-------------
|
||||||
|
|
||||||
@@ -257,4 +311,3 @@ Release Summary
|
|||||||
---------------
|
---------------
|
||||||
|
|
||||||
This is the first stable release of the ``middleware_automation.keycloak`` collection.
|
This is the first stable release of the ``middleware_automation.keycloak`` collection.
|
||||||
|
|
||||||
|
|||||||
32
README.md
32
README.md
@@ -3,10 +3,10 @@
|
|||||||
<!--start build_status -->
|
<!--start build_status -->
|
||||||
[](https://github.com/ansible-middleware/keycloak/actions/workflows/ci.yml)
|
[](https://github.com/ansible-middleware/keycloak/actions/workflows/ci.yml)
|
||||||
|
|
||||||
> **_NOTE:_ If you are Red Hat customer, install `redhat.sso` from [Automation Hub](https://console.redhat.com/ansible/ansible-dashboard) as the certified version of this collection.**
|
> **_NOTE:_ If you are Red Hat customer, install `redhat.sso` (for Red Hat Single Sign-On) or `redhat.rhbk` (for Red Hat Build of Keycloak) from [Automation Hub](https://console.redhat.com/ansible/ansible-dashboard) as the certified version of this collection.**
|
||||||
|
|
||||||
<!--end build_status -->
|
<!--end build_status -->
|
||||||
Collection to install and configure [Keycloak](https://www.keycloak.org/) or [Red Hat Single Sign-On](https://access.redhat.com/products/red-hat-single-sign-on).
|
Collection to install and configure [Keycloak](https://www.keycloak.org/) or [Red Hat Single Sign-On](https://access.redhat.com/products/red-hat-single-sign-on) / [Red Hat Build of Keycloak](https://access.redhat.com/products/red-hat-build-of-keycloak).
|
||||||
|
|
||||||
<!--start requires_ansible-->
|
<!--start requires_ansible-->
|
||||||
## Ansible version compatibility
|
## Ansible version compatibility
|
||||||
@@ -47,7 +47,7 @@ A requirement file is provided to install:
|
|||||||
<!--start roles_paths -->
|
<!--start roles_paths -->
|
||||||
### Included roles
|
### Included roles
|
||||||
|
|
||||||
* [`keycloak`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md): role for installing the service.
|
* [`keycloak`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md): role for installing the service (keycloak <= 19.0).
|
||||||
* [`keycloak_realm`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md): role for configuring a realm, user federation(s), clients and users, in an installed service.
|
* [`keycloak_realm`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md): role for configuring a realm, user federation(s), clients and users, in an installed service.
|
||||||
* [`keycloak_quarkus`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_quarkus/README.md): role for installing the quarkus variant of keycloak (>= 17.0.0).
|
* [`keycloak_quarkus`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_quarkus/README.md): role for installing the quarkus variant of keycloak (>= 17.0.0).
|
||||||
<!--end roles_paths -->
|
<!--end roles_paths -->
|
||||||
@@ -56,21 +56,22 @@ A requirement file is provided to install:
|
|||||||
|
|
||||||
|
|
||||||
### Install Playbook
|
### Install Playbook
|
||||||
|
<!--start rhbk_playbook -->
|
||||||
* [`playbooks/keycloak.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak.yml) installs based on the defined variables (using most defaults).
|
* [`playbooks/keycloak.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak.yml) installs keycloak legacy based on the defined variables (using most defaults).
|
||||||
|
* [`playbooks/keycloak_quarkus.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_quarkus.yml) installs keycloak >= 17 based on the defined variables (using most defaults).
|
||||||
|
|
||||||
Both playbooks include the `keycloak` role, with different settings, as described in the following sections.
|
Both playbooks include the `keycloak` role, with different settings, as described in the following sections.
|
||||||
|
|
||||||
For full service configuration details, refer to the [keycloak role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md).
|
For full service configuration details, refer to the [keycloak role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md).
|
||||||
|
<!--end rhbk_playbook -->
|
||||||
|
|
||||||
#### Install from controller node (offline)
|
#### Install from controller node (offline)
|
||||||
|
|
||||||
Making the keycloak zip archive available to the playbook working directory, and setting `keycloak_offline_install` to `True`, allows to skip
|
Making the keycloak zip archive available to the playbook working directory, and setting `keycloak_offline_install` to `true`, allows to skip
|
||||||
the download tasks. The local path for the archive does match the downloaded archive path, so that it is also used as a cache when multiple hosts are provisioned in a cluster.
|
the download tasks. The local path for the archive does match the downloaded archive path, so that it is also used as a cache when multiple hosts are provisioned in a cluster.
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
keycloak_offline_install: True
|
keycloak_offline_install: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
@@ -85,7 +86,7 @@ It is possible to perform downloads from alternate sources, using the `keycloak_
|
|||||||
|
|
||||||
### Example installation command
|
### Example installation command
|
||||||
|
|
||||||
Execute the following command from the source root directory
|
Execute the following command from the source root directory
|
||||||
|
|
||||||
```
|
```
|
||||||
ansible-playbook -i <ansible_hosts> -e @rhn-creds.yml playbooks/keycloak.yml -e keycloak_admin_password=<changeme>
|
ansible-playbook -i <ansible_hosts> -e @rhn-creds.yml playbooks/keycloak.yml -e keycloak_admin_password=<changeme>
|
||||||
@@ -106,9 +107,9 @@ Note: when deploying clustered configurations, all hosts belonging to the cluste
|
|||||||
|
|
||||||
|
|
||||||
### Config Playbook
|
### Config Playbook
|
||||||
|
<!--start rhbk_realm_playbook -->
|
||||||
[`playbooks/keycloak_realm.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_realm.yml) creates or updates provided realm, user federation(s), client(s), client role(s) and client user(s).
|
[`playbooks/keycloak_realm.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_realm.yml) creates or updates provided realm, user federation(s), client(s), client role(s) and client user(s).
|
||||||
|
<!--end rhbk_realm_playbook -->
|
||||||
|
|
||||||
### Example configuration command
|
### Example configuration command
|
||||||
|
|
||||||
@@ -126,9 +127,9 @@ ansible-playbook -i <ansible_hosts> playbooks/keycloak_realm.yml -e keycloak_adm
|
|||||||
[keycloak]
|
[keycloak]
|
||||||
localhost ansible_connection=local
|
localhost ansible_connection=local
|
||||||
```
|
```
|
||||||
|
<!--start rhbk_realm_readme -->
|
||||||
For full configuration details, refer to the [keycloak_realm role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md).
|
For full configuration details, refer to the [keycloak_realm role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md).
|
||||||
|
<!--end rhbk_realm_readme -->
|
||||||
|
|
||||||
<!--start support -->
|
<!--start support -->
|
||||||
<!--end support -->
|
<!--end support -->
|
||||||
@@ -137,6 +138,7 @@ For full configuration details, refer to the [keycloak_realm role README](https:
|
|||||||
## License
|
## License
|
||||||
|
|
||||||
Apache License v2.0 or later
|
Apache License v2.0 or later
|
||||||
|
<!--start license -->
|
||||||
See [LICENSE](LICENSE) to view the full text.
|
See [LICENSE](LICENSE) to view the full text.
|
||||||
|
<!--end license -->
|
||||||
|
|
||||||
|
|||||||
@@ -341,3 +341,81 @@ releases:
|
|||||||
- 122.yaml
|
- 122.yaml
|
||||||
- 124.yaml
|
- 124.yaml
|
||||||
release_date: '2023-11-20'
|
release_date: '2023-11-20'
|
||||||
|
2.0.1:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'keycloak_quarkus: template requires lowercase boolean values `#138 <https://github.com/ansible-middleware/keycloak/pull/138>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'keycloak_quarkus: add hostname-strict parameter `#139 <https://github.com/ansible-middleware/keycloak/pull/139>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: update to version 23.0.1 `#133 <https://github.com/ansible-middleware/keycloak/pull/133>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 133.yaml
|
||||||
|
- 138.yaml
|
||||||
|
- 139.yaml
|
||||||
|
release_date: '2023-12-07'
|
||||||
|
2.0.2:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'keycloak_quarkus: Use ``keycloak_quarkus_java_opts`` `#154 <https://github.com/ansible-middleware/keycloak/pull/154>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: allow ports <1024 (e.g. :443) in systemd unit `#150 <https://github.com/ansible-middleware/keycloak/pull/150>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'keycloak_quarkus: Add support for sqlserver jdbc driver `#148 <https://github.com/ansible-middleware/keycloak/pull/148>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: allow configuration of ``hostname-strict-backchannel``
|
||||||
|
`#152 <https://github.com/ansible-middleware/keycloak/pull/152>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: systemd restart behavior `#145 <https://github.com/ansible-middleware/keycloak/pull/145>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 145.yaml
|
||||||
|
- 148.yaml
|
||||||
|
- 150.yaml
|
||||||
|
- 152.yaml
|
||||||
|
- 154.yaml
|
||||||
|
release_date: '2024-01-17'
|
||||||
|
2.1.0:
|
||||||
|
changes:
|
||||||
|
breaking_changes:
|
||||||
|
- 'keycloak_quarkus: renamed infinispan host list configuration `#157 <https://github.com/ansible-middleware/keycloak/pull/157>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
bugfixes:
|
||||||
|
- 'keycloak_quarkus: fix custom JAVA_HOME parameter name `#171 <https://github.com/ansible-middleware/keycloak/pull/171>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
major_changes:
|
||||||
|
- 'Implement infinispan TCPPING discovery protocol `#159 <https://github.com/ansible-middleware/keycloak/pull/159>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'Set enable-recovery when xa transactions are enabled `#167 <https://github.com/ansible-middleware/keycloak/pull/167>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: Allow configuring log rotate options in quarkus configuration
|
||||||
|
`#161 <https://github.com/ansible-middleware/keycloak/pull/161>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: ``sticky-session`` for infinispan routes `#163 <https://github.com/ansible-middleware/keycloak/pull/163>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 157.yaml
|
||||||
|
- 159.yaml
|
||||||
|
- 161.yaml
|
||||||
|
- 163.yaml
|
||||||
|
- 167.yaml
|
||||||
|
- 171.yaml
|
||||||
|
release_date: '2024-02-28'
|
||||||
|
|||||||
@@ -1,12 +1,13 @@
|
|||||||
---
|
---
|
||||||
namespace: middleware_automation
|
namespace: middleware_automation
|
||||||
name: keycloak
|
name: keycloak
|
||||||
version: "2.0.0"
|
version: "2.1.1"
|
||||||
readme: README.md
|
readme: README.md
|
||||||
authors:
|
authors:
|
||||||
- Romain Pelisse <rpelisse@redhat.com>
|
- Romain Pelisse <rpelisse@redhat.com>
|
||||||
- Guido Grazioli <ggraziol@redhat.com>
|
- Guido Grazioli <ggraziol@redhat.com>
|
||||||
- Pavan Kumar Motaparthi <pmotapar@redhat.com>
|
- Pavan Kumar Motaparthi <pmotapar@redhat.com>
|
||||||
|
- Helmut Wolf <hwo@world-direct.at>
|
||||||
description: Install and configure a keycloak, or Red Hat Single Sign-on, service.
|
description: Install and configure a keycloak, or Red Hat Single Sign-on, service.
|
||||||
license_file: "LICENSE"
|
license_file: "LICENSE"
|
||||||
tags:
|
tags:
|
||||||
|
|||||||
@@ -1,2 +1,2 @@
|
|||||||
---
|
---
|
||||||
requires_ansible: ">=2.14.0"
|
requires_ansible: ">=2.14.0"
|
||||||
|
|||||||
@@ -1,16 +1,9 @@
|
|||||||
---
|
---
|
||||||
- name: Prepare
|
- name: Prepare
|
||||||
hosts: all
|
hosts: all
|
||||||
tasks:
|
gather_facts: yes
|
||||||
- name: Install sudo
|
vars:
|
||||||
ansible.builtin.yum:
|
sudo_pkg_name: sudo
|
||||||
name:
|
|
||||||
- sudo
|
|
||||||
- java-1.8.0-openjdk
|
|
||||||
state: present
|
|
||||||
|
|
||||||
- name: Prepare
|
|
||||||
hosts: all
|
|
||||||
tasks:
|
tasks:
|
||||||
- name: "Run preparation common to all scenario"
|
- name: "Run preparation common to all scenario"
|
||||||
ansible.builtin.include_tasks: ../prepare.yml
|
ansible.builtin.include_tasks: ../prepare.yml
|
||||||
@@ -18,3 +11,12 @@
|
|||||||
assets:
|
assets:
|
||||||
- "{{ assets_server }}/sso/7.6.0/rh-sso-7.6.0-server-dist.zip"
|
- "{{ assets_server }}/sso/7.6.0/rh-sso-7.6.0-server-dist.zip"
|
||||||
- "{{ assets_server }}/sso/7.6.1/rh-sso-7.6.1-patch.zip"
|
- "{{ assets_server }}/sso/7.6.1/rh-sso-7.6.1-patch.zip"
|
||||||
|
|
||||||
|
- name: Install JDK8
|
||||||
|
become: yes
|
||||||
|
ansible.builtin.yum:
|
||||||
|
name:
|
||||||
|
- java-1.8.0-openjdk
|
||||||
|
state: present
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -56,31 +56,34 @@
|
|||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- (keycloak_query_clients.json | selectattr('clientId','equalto','TestClient') | first)["attributes"]["post.logout.redirect.uris"] == '/public/logout'
|
- (keycloak_query_clients.json | selectattr('clientId','equalto','TestClient') | first)["attributes"]["post.logout.redirect.uris"] == '/public/logout'
|
||||||
- name: Check log folder
|
- name: "Privilege escalation as some files/folders may requires it"
|
||||||
ansible.builtin.stat:
|
become: yes
|
||||||
path: "/tmp/keycloak"
|
block:
|
||||||
register: keycloak_log_folder
|
- name: Check log folder
|
||||||
- name: Check that keycloak log folder exists and is a link
|
ansible.builtin.stat:
|
||||||
ansible.builtin.assert:
|
path: "/tmp/keycloak"
|
||||||
that:
|
register: keycloak_log_folder
|
||||||
- keycloak_log_folder.stat.exists
|
- name: Check that keycloak log folder exists and is a link
|
||||||
- not keycloak_log_folder.stat.isdir
|
ansible.builtin.assert:
|
||||||
- keycloak_log_folder.stat.islnk
|
that:
|
||||||
- name: Check log file
|
- keycloak_log_folder.stat.exists
|
||||||
ansible.builtin.stat:
|
- not keycloak_log_folder.stat.isdir
|
||||||
path: "/tmp/keycloak/server.log"
|
- keycloak_log_folder.stat.islnk
|
||||||
register: keycloak_log_file
|
- name: Check log file
|
||||||
- name: Check if keycloak file exists
|
ansible.builtin.stat:
|
||||||
ansible.builtin.assert:
|
path: "/tmp/keycloak/server.log"
|
||||||
that:
|
register: keycloak_log_file
|
||||||
- keycloak_log_file.stat.exists
|
- name: Check if keycloak file exists
|
||||||
- not keycloak_log_file.stat.isdir
|
ansible.builtin.assert:
|
||||||
- name: Check default log folder
|
that:
|
||||||
ansible.builtin.stat:
|
- keycloak_log_file.stat.exists
|
||||||
path: "/var/log/keycloak"
|
- not keycloak_log_file.stat.isdir
|
||||||
register: keycloak_default_log_folder
|
- name: Check default log folder
|
||||||
failed_when: false
|
ansible.builtin.stat:
|
||||||
- name: Check that default keycloak log folder doesn't exist
|
path: "/var/log/keycloak"
|
||||||
ansible.builtin.assert:
|
register: keycloak_default_log_folder
|
||||||
that:
|
failed_when: false
|
||||||
- not keycloak_default_log_folder.stat.exists
|
- name: Check that default keycloak log folder doesn't exist
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- not keycloak_default_log_folder.stat.exists
|
||||||
|
|||||||
@@ -41,8 +41,6 @@ provisioner:
|
|||||||
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
ansible_python_interpreter: "{{ ansible_playbook_python }}"
|
||||||
env:
|
env:
|
||||||
ANSIBLE_FORCE_COLOR: "true"
|
ANSIBLE_FORCE_COLOR: "true"
|
||||||
REDHAT_PRODUCT_DOWNLOAD_CLIENT_ID: "${PROD_JBOSSNETWORK_API_CLIENTID}"
|
|
||||||
REDHAT_PRODUCT_DOWNLOAD_CLIENT_SECRET: "${PROD_JBOSSNETWORK_API_SECRET}"
|
|
||||||
verifier:
|
verifier:
|
||||||
name: ansible
|
name: ansible
|
||||||
scenario:
|
scenario:
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
hosts: all
|
hosts: all
|
||||||
tasks:
|
tasks:
|
||||||
- name: Install sudo
|
- name: Install sudo
|
||||||
ansible.builtin.yum:
|
ansible.builtin.dnf:
|
||||||
name: sudo
|
name: sudo
|
||||||
state: present
|
state: present
|
||||||
|
|
||||||
@@ -14,36 +14,36 @@
|
|||||||
- name: Prepare proxy
|
- name: Prepare proxy
|
||||||
hosts: proxy
|
hosts: proxy
|
||||||
vars:
|
vars:
|
||||||
jbcs_mod_cluster_enable: True
|
nginx_proxy: |
|
||||||
jbcs_configure_firewalld: False
|
location / {
|
||||||
jbcs_offline_install: False
|
proxy_set_header Host $host;
|
||||||
jbcs_bind_address: '*'
|
proxy_set_header X-Real-IP $remote_addr;
|
||||||
jbcs_proxy_pass:
|
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
|
||||||
- path: /
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
url: http://instance:8080/
|
proxy_pass http://instance:8080;
|
||||||
reverse_path: /
|
}
|
||||||
reverse_url: http://instance:8080/
|
|
||||||
external_domain_name: proxy
|
|
||||||
rhn_username: "{{ lookup('env', 'REDHAT_PRODUCT_DOWNLOAD_CLIENT_ID') }}"
|
|
||||||
rhn_password: "{{ lookup('env', 'REDHAT_PRODUCT_DOWNLOAD_CLIENT_SECRET') }}"
|
|
||||||
roles:
|
roles:
|
||||||
- middleware_automation.jbcs.jbcs
|
- elan.simple_nginx_reverse_proxy
|
||||||
pre_tasks:
|
pre_tasks:
|
||||||
- name: Create certificate request
|
- name: Create certificate request
|
||||||
ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=proxy'
|
ansible.builtin.command: openssl req -x509 -newkey rsa:4096 -keyout key.pem -out cert.pem -sha256 -days 365 -nodes -subj '/CN=proxy'
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
changed_when: False
|
changed_when: false
|
||||||
|
- name: Make certificate directory
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /etc/nginx/tls
|
||||||
|
state: directory
|
||||||
|
mode: 0755
|
||||||
- name: Copy certificates
|
- name: Copy certificates
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
src: "{{ item.name }}"
|
src: "{{ item.name }}"
|
||||||
dest: "{{ item.dest }}"
|
dest: "{{ item.dest }}"
|
||||||
mode: 0444
|
mode: 0444
|
||||||
become: True
|
become: true
|
||||||
loop:
|
loop:
|
||||||
- { name: 'cert.pem', dest: '/etc/pki/tls/certs/proxy.crt' }
|
- { name: 'cert.pem', dest: '/etc/nginx/tls/certificate.crt' }
|
||||||
- { name: 'key.pem', dest: '/etc/pki/tls/private/proxy.key' }
|
- { name: 'key.pem', dest: '/etc/nginx/tls/certificate.key' }
|
||||||
|
- name: Update CA trust
|
||||||
- name: update_ca_trust
|
ansible.builtin.command: update-ca-trust
|
||||||
command: update-ca-trust
|
changed_when: false
|
||||||
become: True
|
become: true
|
||||||
|
|||||||
@@ -1,6 +1,9 @@
|
|||||||
---
|
---
|
||||||
- name: Prepare
|
- name: Prepare
|
||||||
hosts: all
|
hosts: all
|
||||||
|
gather_facts: yes
|
||||||
|
vars:
|
||||||
|
sudo_pkg_name: sudo
|
||||||
tasks:
|
tasks:
|
||||||
- name: "Run preparation common to all scenario"
|
- name: "Run preparation common to all scenario"
|
||||||
ansible.builtin.include_tasks: ../prepare.yml
|
ansible.builtin.include_tasks: ../prepare.yml
|
||||||
|
|||||||
@@ -3,9 +3,27 @@
|
|||||||
ansible.builtin.debug:
|
ansible.builtin.debug:
|
||||||
msg: "Ansible version is {{ ansible_version.full }}"
|
msg: "Ansible version is {{ ansible_version.full }}"
|
||||||
|
|
||||||
- name: Install sudo
|
|
||||||
|
- name: "Ensure {{ sudo_pkg_name }} is installed (if user is root)."
|
||||||
ansible.builtin.yum:
|
ansible.builtin.yum:
|
||||||
name:
|
name: "{{ sudo_pkg_name }}"
|
||||||
|
when:
|
||||||
|
- ansible_user_id == 'root'
|
||||||
|
|
||||||
|
|
||||||
|
- name: Gather the package facts
|
||||||
|
ansible.builtin.package_facts:
|
||||||
|
manager: auto
|
||||||
|
|
||||||
|
- name: "Check if {{ sudo_pkg_name }} is installed."
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- sudo_pkg_name in ansible_facts.packages
|
||||||
|
|
||||||
|
- name: Install sudo
|
||||||
|
become: yes
|
||||||
|
ansible.builtin.yum:
|
||||||
|
name:
|
||||||
- sudo
|
- sudo
|
||||||
- iproute
|
- iproute
|
||||||
state: present
|
state: present
|
||||||
@@ -14,22 +32,21 @@
|
|||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
assets_server: "{{ lookup('env','MIDDLEWARE_DOWNLOAD_RELEASE_SERVER_URL') }}"
|
assets_server: "{{ lookup('env','MIDDLEWARE_DOWNLOAD_RELEASE_SERVER_URL') }}"
|
||||||
|
|
||||||
- name: "Set offline when assets server from env is defined"
|
- name: "Download artefacts only if assets_server is set"
|
||||||
ansible.builtin.set_fact:
|
|
||||||
sso_offline_install: True
|
|
||||||
when:
|
when:
|
||||||
- assets_server is defined
|
- assets_server is defined
|
||||||
- assets_server | length > 0
|
- assets_server | length > 0
|
||||||
|
block:
|
||||||
|
- name: "Set offline when assets server from env is defined"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
sso_offline_install: True
|
||||||
|
|
||||||
- name: "Download and deploy zips from {{ assets_server }}"
|
- name: "Download and deploy zips from {{ assets_server }}"
|
||||||
ansible.builtin.get_url:
|
ansible.builtin.get_url:
|
||||||
url: "{{ asset }}"
|
url: "{{ asset }}"
|
||||||
dest: "{{ lookup('env', 'PWD') }}"
|
dest: "{{ lookup('env', 'PWD') }}"
|
||||||
validate_certs: no
|
validate_certs: no
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
loop: "{{ assets }}"
|
loop: "{{ assets }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
loop_var: asset
|
loop_var: asset
|
||||||
when:
|
|
||||||
- assets_server is defined
|
|
||||||
- assets_server | length > 0
|
|
||||||
|
|||||||
@@ -9,6 +9,7 @@
|
|||||||
keycloak_quarkus_frontend_url: 'http://localhost:8080/'
|
keycloak_quarkus_frontend_url: 'http://localhost:8080/'
|
||||||
keycloak_quarkus_start_dev: True
|
keycloak_quarkus_start_dev: True
|
||||||
keycloak_quarkus_proxy_mode: none
|
keycloak_quarkus_proxy_mode: none
|
||||||
|
keycloak_quarkus_java_home: /opt/openjdk/
|
||||||
roles:
|
roles:
|
||||||
- role: keycloak_quarkus
|
- role: keycloak_quarkus
|
||||||
- role: keycloak_realm
|
- role: keycloak_realm
|
||||||
|
|||||||
@@ -1,12 +1,22 @@
|
|||||||
---
|
---
|
||||||
- name: Prepare
|
- name: Prepare
|
||||||
hosts: all
|
hosts: all
|
||||||
|
become: yes
|
||||||
tasks:
|
tasks:
|
||||||
- name: Install sudo
|
- name: Install sudo
|
||||||
ansible.builtin.yum:
|
ansible.builtin.yum:
|
||||||
name: sudo
|
name:
|
||||||
|
- sudo
|
||||||
|
- java-17-openjdk-headless
|
||||||
state: present
|
state: present
|
||||||
|
|
||||||
|
- name: Link default logs directory
|
||||||
|
ansible.builtin.file:
|
||||||
|
state: link
|
||||||
|
src: /usr/lib/jvm/jre-17-openjdk
|
||||||
|
dest: /opt/openjdk
|
||||||
|
force: true
|
||||||
|
|
||||||
- name: "Display hera_home if defined."
|
- name: "Display hera_home if defined."
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|||||||
@@ -11,6 +11,14 @@
|
|||||||
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
- ansible_facts.services["keycloak.service"]["state"] == "running"
|
||||||
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
- ansible_facts.services["keycloak.service"]["status"] == "enabled"
|
||||||
|
|
||||||
|
- name: Verify we are running on requested JAVA_HOME # noqa blocked_modules command-instead-of-module
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
set -o pipefail
|
||||||
|
ps -ef | grep '/opt/openjdk' | grep -v grep
|
||||||
|
args:
|
||||||
|
executable: /bin/bash
|
||||||
|
changed_when: False
|
||||||
|
|
||||||
- name: Set internal envvar
|
- name: Set internal envvar
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
hera_home: "{{ lookup('env', 'HERA_HOME') }}"
|
||||||
|
|||||||
@@ -8,8 +8,8 @@
|
|||||||
keycloak_quarkus_host: instance
|
keycloak_quarkus_host: instance
|
||||||
keycloak_quarkus_log: file
|
keycloak_quarkus_log: file
|
||||||
keycloak_quarkus_https_key_file_enabled: True
|
keycloak_quarkus_https_key_file_enabled: True
|
||||||
keycloak_quarkus_key_file: "{{ keycloak.home }}/conf/key.pem"
|
keycloak_quarkus_key_file: "/opt/keycloak/certs/key.pem"
|
||||||
keycloak_quarkus_cert_file: "{{ keycloak.home }}/conf/cert.pem"
|
keycloak_quarkus_cert_file: "/opt/keycloak/certs/cert.pem"
|
||||||
keycloak_quarkus_log_target: /tmp/keycloak
|
keycloak_quarkus_log_target: /tmp/keycloak
|
||||||
roles:
|
roles:
|
||||||
- role: keycloak_quarkus
|
- role: keycloak_quarkus
|
||||||
|
|||||||
@@ -3,6 +3,7 @@
|
|||||||
hosts: all
|
hosts: all
|
||||||
tasks:
|
tasks:
|
||||||
- name: Install sudo
|
- name: Install sudo
|
||||||
|
become: yes
|
||||||
ansible.builtin.yum:
|
ansible.builtin.yum:
|
||||||
name: sudo
|
name: sudo
|
||||||
state: present
|
state: present
|
||||||
@@ -19,13 +20,14 @@
|
|||||||
- name: Create conf directory # risky-file-permissions in test user account does not exist yet
|
- name: Create conf directory # risky-file-permissions in test user account does not exist yet
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
state: directory
|
state: directory
|
||||||
path: /opt/keycloak/keycloak-22.0.5/conf/
|
path: "/opt/keycloak/certs/"
|
||||||
mode: 0755
|
mode: 0755
|
||||||
|
|
||||||
- name: Copy certificates
|
- name: Copy certificates
|
||||||
|
become: yes
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
src: "{{ item }}"
|
src: "{{ item }}"
|
||||||
dest: "/opt/keycloak/keycloak-22.0.5/conf/{{ item }}"
|
dest: "/opt/keycloak/certs/{{ item }}"
|
||||||
mode: 0444
|
mode: 0444
|
||||||
loop:
|
loop:
|
||||||
- cert.pem
|
- cert.pem
|
||||||
|
|||||||
@@ -6,3 +6,6 @@ collections:
|
|||||||
- name: ansible.posix
|
- name: ansible.posix
|
||||||
- name: community.docker
|
- name: community.docker
|
||||||
version: ">=1.9.1"
|
version: ">=1.9.1"
|
||||||
|
|
||||||
|
roles:
|
||||||
|
- name: elan.simple_nginx_reverse_proxy
|
||||||
|
|||||||
@@ -55,14 +55,14 @@
|
|||||||
- TestClient1Admin
|
- TestClient1Admin
|
||||||
- TestClient1User
|
- TestClient1User
|
||||||
realm: "{{ keycloak_realm }}"
|
realm: "{{ keycloak_realm }}"
|
||||||
public_client: True
|
public_client: true
|
||||||
web_origins:
|
web_origins:
|
||||||
- http://testclient1origin/application
|
- http://testclient1origin/application
|
||||||
- http://testclient1origin/other
|
- http://testclient1origin/other
|
||||||
users:
|
users:
|
||||||
- username: TestUser
|
- username: TestUser
|
||||||
password: password
|
password: password
|
||||||
client_roles:
|
client_roles:
|
||||||
- client: TestClient1
|
- client: TestClient1
|
||||||
role: TestClient1User
|
role: TestClient1User
|
||||||
realm: "{{ keycloak_realm }}"
|
realm: "{{ keycloak_realm }}"
|
||||||
|
|||||||
@@ -5,10 +5,7 @@
|
|||||||
keycloak_quarkus_admin_pass: "remembertochangeme"
|
keycloak_quarkus_admin_pass: "remembertochangeme"
|
||||||
keycloak_quarkus_host: localhost
|
keycloak_quarkus_host: localhost
|
||||||
keycloak_quarkus_port: 8443
|
keycloak_quarkus_port: 8443
|
||||||
keycloak_quarkus_http_relative_path: ''
|
|
||||||
keycloak_quarkus_log: file
|
keycloak_quarkus_log: file
|
||||||
keycloak_quarkus_https_key_file_enabled: True
|
keycloak_quarkus_proxy_mode: none
|
||||||
keycloak_quarkus_key_file: conf/key.pem
|
|
||||||
keycloak_quarkus_cert_file: conf/cert.pem
|
|
||||||
roles:
|
roles:
|
||||||
- middleware_automation.keycloak.keycloak_quarkus
|
- middleware_automation.keycloak.keycloak_quarkus
|
||||||
|
|||||||
@@ -5,7 +5,6 @@
|
|||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_admin_password: "remembertochangeme"
|
||||||
keycloak_quarkus_host: localhost
|
keycloak_quarkus_host: localhost
|
||||||
keycloak_quarkus_port: 8080
|
keycloak_quarkus_port: 8080
|
||||||
keycloak_quarkus_http_relative_path: ''
|
|
||||||
keycloak_quarkus_log: file
|
keycloak_quarkus_log: file
|
||||||
keycloak_quarkus_start_dev: true
|
keycloak_quarkus_start_dev: true
|
||||||
keycloak_quarkus_proxy_mode: none
|
keycloak_quarkus_proxy_mode: none
|
||||||
|
|||||||
@@ -10,17 +10,17 @@
|
|||||||
- TestClient1Admin
|
- TestClient1Admin
|
||||||
- TestClient1User
|
- TestClient1User
|
||||||
realm: TestRealm
|
realm: TestRealm
|
||||||
public_client: True
|
public_client: true
|
||||||
web_origins:
|
web_origins:
|
||||||
- http://testclient1origin/application
|
- http://testclient1origin/application
|
||||||
- http://testclient1origin/other
|
- http://testclient1origin/other
|
||||||
users:
|
users:
|
||||||
- username: TestUser
|
- username: TestUser
|
||||||
password: password
|
password: password
|
||||||
client_roles:
|
client_roles:
|
||||||
- client: TestClient1
|
- client: TestClient1
|
||||||
role: TestClient1User
|
role: TestClient1User
|
||||||
realm: TestRealm
|
realm: TestRealm
|
||||||
roles:
|
roles:
|
||||||
- role: middleware_automation.keycloak.keycloak_realm
|
- role: middleware_automation.keycloak.keycloak_realm
|
||||||
keycloak_realm: TestRealm
|
keycloak_realm: TestRealm
|
||||||
|
|||||||
@@ -3,6 +3,6 @@
|
|||||||
hosts: sso
|
hosts: sso
|
||||||
vars:
|
vars:
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_admin_password: "remembertochangeme"
|
||||||
sso_enable: True
|
sso_enable: true
|
||||||
roles:
|
roles:
|
||||||
- middleware_automation.keycloak.keycloak
|
- middleware_automation.keycloak.keycloak
|
||||||
|
|||||||
@@ -39,7 +39,7 @@ Versions
|
|||||||
Patching
|
Patching
|
||||||
--------
|
--------
|
||||||
|
|
||||||
When variable `keycloak_rhsso_apply_patches` is `True` (default: `False`), the role will automatically apply the latest cumulative patch for the selected base version.
|
When variable `keycloak_rhsso_apply_patches` is `true` (default: `false`), the role will automatically apply the latest cumulative patch for the selected base version.
|
||||||
|
|
||||||
| RH-SSO VERSION | Release Date | RH-SSO LATEST CP | Notes |
|
| RH-SSO VERSION | Release Date | RH-SSO LATEST CP | Notes |
|
||||||
|:---------------|:------------------|:-----------------|:----------------|
|
|:---------------|:------------------|:-----------------|:----------------|
|
||||||
@@ -55,7 +55,7 @@ Role Defaults
|
|||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:---------|
|
|:---------|:------------|:---------|
|
||||||
|`keycloak_ha_enabled`| Enable auto configuration for database backend, clustering and remote caches on infinispan | `False` |
|
|`keycloak_ha_enabled`| Enable auto configuration for database backend, clustering and remote caches on infinispan | `False` |
|
||||||
|`keycloak_ha_discovery`| Discovery protocol for HA cluster members | `JDBC_PING` if keycloak_db_enabled else `TCPPING` |
|
|`keycloak_ha_discovery`| Discovery protocol for HA cluster members | `JDBC_PING` if `keycloak_db_enabled` else `TCPPING` |
|
||||||
|`keycloak_db_enabled`| Enable auto configuration for database backend | `True` if `keycloak_ha_enabled` is True, else `False` |
|
|`keycloak_db_enabled`| Enable auto configuration for database backend | `True` if `keycloak_ha_enabled` is True, else `False` |
|
||||||
|`keycloak_remote_cache_enabled`| Enable remote cache store when in clustered ha configurations | `True` if `keycloak_ha_enabled` else `False` |
|
|`keycloak_remote_cache_enabled`| Enable remote cache store when in clustered ha configurations | `True` if `keycloak_ha_enabled` else `False` |
|
||||||
|`keycloak_admin_user`| Administration console user account | `admin` |
|
|`keycloak_admin_user`| Administration console user account | `admin` |
|
||||||
@@ -68,19 +68,19 @@ Role Defaults
|
|||||||
|`keycloak_jgroups_port`| jgroups cluster tcp port | `7600` |
|
|`keycloak_jgroups_port`| jgroups cluster tcp port | `7600` |
|
||||||
|`keycloak_management_http_port`| Management port | `9990` |
|
|`keycloak_management_http_port`| Management port | `9990` |
|
||||||
|`keycloak_management_https_port`| TLS management port | `9993` |
|
|`keycloak_management_https_port`| TLS management port | `9993` |
|
||||||
|`keycloak_prefer_ipv4`| Prefer IPv4 stack and addresses for port binding | `True` |
|
|`keycloak_prefer_ipv4`| Prefer IPv4 stack and addresses for port binding | `true` |
|
||||||
|`keycloak_config_standalone_xml`| filename for configuration | `keycloak.xml` |
|
|`keycloak_config_standalone_xml`| filename for configuration | `keycloak.xml` |
|
||||||
|`keycloak_service_user`| posix account username | `keycloak` |
|
|`keycloak_service_user`| posix account username | `keycloak` |
|
||||||
|`keycloak_service_group`| posix account group | `keycloak` |
|
|`keycloak_service_group`| posix account group | `keycloak` |
|
||||||
|`keycloak_service_restart_always`| systemd restart always behavior activation | `False`
|
|`keycloak_service_restart_always`| systemd restart always behavior activation | `False` |
|
||||||
|`keycloak_service_restart_on_failure`| systemd restart on-failure behavior activation | `False`
|
|`keycloak_service_restart_on_failure`| systemd restart on-failure behavior activation | `False` |
|
||||||
|`keycloak_service_startlimitintervalsec`| systemd StartLimitIntervalSec | `300` |
|
|`keycloak_service_startlimitintervalsec`| systemd StartLimitIntervalSec | `300` |
|
||||||
|`keycloak_service_startlimitburst`| systemd StartLimitBurst | `5` |
|
|`keycloak_service_startlimitburst`| systemd StartLimitBurst | `5` |
|
||||||
|`keycloak_service_restartsec`| systemd RestartSec | `10s` |
|
|`keycloak_service_restartsec`| systemd RestartSec | `10s` |
|
||||||
|`keycloak_service_pidfile`| pid file path for service | `/run/keycloak/keycloak.pid` |
|
|`keycloak_service_pidfile`| pid file path for service | `/run/keycloak/keycloak.pid` |
|
||||||
|`keycloak_features` | List of `name`/`status` pairs of features (also known as profiles on RH-SSO) to `enable` or `disable`, example: `[ { name: 'docker', status: 'enabled' } ]` | `[]`
|
|`keycloak_features` | List of `name`/`status` pairs of features (also known as profiles on RH-SSO) to `enable` or `disable`, example: `[ { name: 'docker', status: 'enabled' } ]` | `[]`
|
||||||
|`keycloak_jvm_package`| RHEL java package runtime | `java-1.8.0-openjdk-headless` |
|
|`keycloak_jvm_package`| RHEL java package runtime | `java-1.8.0-openjdk-headless` |
|
||||||
|`keycloak_java_home`| JAVA_HOME of installed JRE, leave empty for using specified keycloak_jvm_package RPM path | `None` |
|
|`keycloak_java_home`| `JAVA_HOME` of installed JRE, leave empty for using RPM path at `keycloak_jvm_package` | `None` |
|
||||||
|`keycloak_java_opts`| Additional JVM options | `-Xms1024m -Xmx2048m` |
|
|`keycloak_java_opts`| Additional JVM options | `-Xms1024m -Xmx2048m` |
|
||||||
|
|
||||||
|
|
||||||
@@ -88,12 +88,12 @@ Role Defaults
|
|||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:---------|
|
|:---------|:------------|:---------|
|
||||||
|`keycloak_offline_install` | perform an offline install | `False`|
|
|`keycloak_offline_install` | perform an offline install | `false`|
|
||||||
|`keycloak_download_url`| Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/<version>/<archive>`|
|
|`keycloak_download_url`| Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/<version>/<archive>`|
|
||||||
|`keycloak_version`| keycloak.org package version | `18.0.2` |
|
|`keycloak_version`| keycloak.org package version | `18.0.2` |
|
||||||
|`keycloak_dest`| Installation root path | `/opt/keycloak` |
|
|`keycloak_dest`| Installation root path | `/opt/keycloak` |
|
||||||
|`keycloak_download_url` | Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}` |
|
|`keycloak_download_url` | Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}` |
|
||||||
|`keycloak_configure_firewalld` | Ensure firewalld is running and configure keycloak ports | `False` |
|
|`keycloak_configure_firewalld` | Ensure firewalld is running and configure keycloak ports | `false` |
|
||||||
|
|
||||||
|
|
||||||
* Miscellaneous configuration
|
* Miscellaneous configuration
|
||||||
@@ -110,13 +110,13 @@ Role Defaults
|
|||||||
|`keycloak_config_override_template` | Path to custom template for standalone.xml configuration | `''` |
|
|`keycloak_config_override_template` | Path to custom template for standalone.xml configuration | `''` |
|
||||||
|`keycloak_auth_realm` | Name for rest authentication realm | `master` |
|
|`keycloak_auth_realm` | Name for rest authentication realm | `master` |
|
||||||
|`keycloak_auth_client` | Authentication client for configuration REST calls | `admin-cli` |
|
|`keycloak_auth_client` | Authentication client for configuration REST calls | `admin-cli` |
|
||||||
|`keycloak_force_install` | Remove pre-existing versions of service | `False` |
|
|`keycloak_force_install` | Remove pre-existing versions of service | `false` |
|
||||||
|`keycloak_url` | URL for configuration rest calls | `http://{{ keycloak_host }}:{{ keycloak_http_port + keycloak_jboss_port_offset }}` |
|
|`keycloak_url` | URL for configuration rest calls | `http://{{ keycloak_host }}:{{ keycloak_http_port + keycloak_jboss_port_offset }}` |
|
||||||
|`keycloak_management_url` | URL for management console rest calls | `http://{{ keycloak_host }}:{{ keycloak_management_http_port + keycloak_jboss_port_offset }}` |
|
|`keycloak_management_url` | URL for management console rest calls | `http://{{ keycloak_host }}:{{ keycloak_management_http_port + keycloak_jboss_port_offset }}` |
|
||||||
|`keycloak_frontend_url_force` | Force backend requests to use the frontend URL | `False` |
|
|`keycloak_frontend_url_force` | Force backend requests to use the frontend URL | `false` |
|
||||||
|`keycloak_db_background_validation` | Enable background validation of database connection | `False` |
|
|`keycloak_db_background_validation` | Enable background validation of database connection | `false` |
|
||||||
|`keycloak_db_background_validation_millis`| How frequenly the connection pool is validated in the background | `10000` if background validation enabled |
|
|`keycloak_db_background_validation_millis`| How frequenly the connection pool is validated in the background | `10000` if background validation enabled |
|
||||||
|`keycloak_db_background_validate_on_match` | Enable validate on match for database connections | `False` |
|
|`keycloak_db_background_validate_on_match` | Enable validate on match for database connections | `false` |
|
||||||
|`keycloak_frontend_url` | frontend URL for keycloak endpoint | `http://localhost:8080/auth/` |
|
|`keycloak_frontend_url` | frontend URL for keycloak endpoint | `http://localhost:8080/auth/` |
|
||||||
|`keycloak_log_target`| Set the destination of the keycloak log folder link | `/var/log/keycloak` |
|
|`keycloak_log_target`| Set the destination of the keycloak log folder link | `/var/log/keycloak` |
|
||||||
|
|
||||||
@@ -132,7 +132,7 @@ The following are a set of _required_ variables for the role:
|
|||||||
|`keycloak_frontend_url` | frontend URL for keycloak endpoint | `http://localhost:8080/auth/` |
|
|`keycloak_frontend_url` | frontend URL for keycloak endpoint | `http://localhost:8080/auth/` |
|
||||||
|
|
||||||
|
|
||||||
The following parameters are _required_ only when `keycloak_ha_enabled` is True:
|
The following parameters are _required_ only when `keycloak_ha_enabled` is true:
|
||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
@@ -150,7 +150,7 @@ The following parameters are _required_ only when `keycloak_ha_enabled` is True:
|
|||||||
|`keycloak_infinispan_trust_store_password`| Password for opening truststore | `changeit` |
|
|`keycloak_infinispan_trust_store_password`| Password for opening truststore | `changeit` |
|
||||||
|
|
||||||
|
|
||||||
The following parameters are _required_ only when `keycloak_db_enabled` is True:
|
The following parameters are _required_ only when `keycloak_db_enabled` is true:
|
||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:---------|
|
|:---------|:------------|:---------|
|
||||||
@@ -196,7 +196,7 @@ Example Playbook
|
|||||||
name: keycloak
|
name: keycloak
|
||||||
vars:
|
vars:
|
||||||
keycloak_admin_password: "remembertochangeme"
|
keycloak_admin_password: "remembertochangeme"
|
||||||
keycloak_offline_install: True
|
keycloak_offline_install: true
|
||||||
# This should be the filename of keycloak archive on Ansible node: keycloak-16.1.0.zip
|
# This should be the filename of keycloak archive on Ansible node: keycloak-16.1.0.zip
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ keycloak_archive: "keycloak-legacy-{{ keycloak_version }}.zip"
|
|||||||
keycloak_download_url: "https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}"
|
keycloak_download_url: "https://github.com/keycloak/keycloak/releases/download/{{ keycloak_version }}/{{ keycloak_archive }}"
|
||||||
keycloak_download_url_9x: "https://downloads.jboss.org/keycloak/{{ keycloak_version }}/{{ keycloak_archive }}"
|
keycloak_download_url_9x: "https://downloads.jboss.org/keycloak/{{ keycloak_version }}/{{ keycloak_archive }}"
|
||||||
keycloak_installdir: "{{ keycloak_dest }}/keycloak-{{ keycloak_version }}"
|
keycloak_installdir: "{{ keycloak_dest }}/keycloak-{{ keycloak_version }}"
|
||||||
keycloak_offline_install: False
|
keycloak_offline_install: false
|
||||||
|
|
||||||
### Install location and service settings
|
### Install location and service settings
|
||||||
keycloak_jvm_package: java-1.8.0-openjdk-headless
|
keycloak_jvm_package: java-1.8.0-openjdk-headless
|
||||||
@@ -26,13 +26,13 @@ keycloak_service_name: keycloak
|
|||||||
keycloak_service_desc: Keycloak
|
keycloak_service_desc: Keycloak
|
||||||
keycloak_service_start_delay: 10
|
keycloak_service_start_delay: 10
|
||||||
keycloak_service_start_retries: 25
|
keycloak_service_start_retries: 25
|
||||||
keycloak_service_restart_always: False
|
keycloak_service_restart_always: false
|
||||||
keycloak_service_restart_on_failure: False
|
keycloak_service_restart_on_failure: false
|
||||||
keycloak_service_startlimitintervalsec: "300"
|
keycloak_service_startlimitintervalsec: "300"
|
||||||
keycloak_service_startlimitburst: "5"
|
keycloak_service_startlimitburst: "5"
|
||||||
keycloak_service_restartsec: "10s"
|
keycloak_service_restartsec: "10s"
|
||||||
|
|
||||||
keycloak_configure_firewalld: False
|
keycloak_configure_firewalld: false
|
||||||
|
|
||||||
### administrator console password
|
### administrator console password
|
||||||
keycloak_admin_password: ''
|
keycloak_admin_password: ''
|
||||||
@@ -49,11 +49,11 @@ keycloak_management_port_bind_address: 127.0.0.1
|
|||||||
keycloak_management_http_port: 9990
|
keycloak_management_http_port: 9990
|
||||||
keycloak_management_https_port: 9993
|
keycloak_management_https_port: 9993
|
||||||
keycloak_java_opts: "-Xms1024m -Xmx2048m"
|
keycloak_java_opts: "-Xms1024m -Xmx2048m"
|
||||||
keycloak_prefer_ipv4: True
|
keycloak_prefer_ipv4: true
|
||||||
keycloak_features: []
|
keycloak_features: []
|
||||||
|
|
||||||
### Enable configuration for database backend, clustering and remote caches on infinispan
|
### Enable configuration for database backend, clustering and remote caches on infinispan
|
||||||
keycloak_ha_enabled: False
|
keycloak_ha_enabled: false
|
||||||
### Enable database configuration, must be enabled when HA is configured
|
### Enable database configuration, must be enabled when HA is configured
|
||||||
keycloak_db_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
keycloak_db_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
||||||
### Discovery protocol for ha cluster members, valus [ 'JDBC_PING', 'TCPPING' ]
|
### Discovery protocol for ha cluster members, valus [ 'JDBC_PING', 'TCPPING' ]
|
||||||
@@ -66,7 +66,7 @@ keycloak_admin_user: admin
|
|||||||
keycloak_auth_realm: master
|
keycloak_auth_realm: master
|
||||||
keycloak_auth_client: admin-cli
|
keycloak_auth_client: admin-cli
|
||||||
|
|
||||||
keycloak_force_install: False
|
keycloak_force_install: false
|
||||||
|
|
||||||
### mod_cluster reverse proxy list
|
### mod_cluster reverse proxy list
|
||||||
keycloak_modcluster_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
keycloak_modcluster_enabled: "{{ True if keycloak_ha_enabled else False }}"
|
||||||
@@ -78,7 +78,7 @@ keycloak_modcluster_urls:
|
|||||||
|
|
||||||
### keycloak frontend url
|
### keycloak frontend url
|
||||||
keycloak_frontend_url: http://localhost:8080/auth/
|
keycloak_frontend_url: http://localhost:8080/auth/
|
||||||
keycloak_frontend_url_force: False
|
keycloak_frontend_url_force: false
|
||||||
keycloak_admin_url:
|
keycloak_admin_url:
|
||||||
|
|
||||||
### infinispan remote caches access (hotrod)
|
### infinispan remote caches access (hotrod)
|
||||||
@@ -86,7 +86,7 @@ keycloak_infinispan_user: supervisor
|
|||||||
keycloak_infinispan_pass: supervisor
|
keycloak_infinispan_pass: supervisor
|
||||||
keycloak_infinispan_url: localhost
|
keycloak_infinispan_url: localhost
|
||||||
keycloak_infinispan_sasl_mechanism: SCRAM-SHA-512
|
keycloak_infinispan_sasl_mechanism: SCRAM-SHA-512
|
||||||
keycloak_infinispan_use_ssl: False
|
keycloak_infinispan_use_ssl: false
|
||||||
# if ssl is enabled, import ispn server certificate here
|
# if ssl is enabled, import ispn server certificate here
|
||||||
keycloak_infinispan_trust_store_path: /etc/pki/java/cacerts
|
keycloak_infinispan_trust_store_path: /etc/pki/java/cacerts
|
||||||
keycloak_infinispan_trust_store_password: changeit
|
keycloak_infinispan_trust_store_password: changeit
|
||||||
@@ -97,9 +97,9 @@ keycloak_jdbc_engine: postgres
|
|||||||
keycloak_db_user: keycloak-user
|
keycloak_db_user: keycloak-user
|
||||||
keycloak_db_pass: keycloak-pass
|
keycloak_db_pass: keycloak-pass
|
||||||
## connection validation
|
## connection validation
|
||||||
keycloak_db_background_validation: False
|
keycloak_db_background_validation: false
|
||||||
keycloak_db_background_validation_millis: "{{ 10000 if keycloak_db_background_validation else 0 }}"
|
keycloak_db_background_validation_millis: "{{ 10000 if keycloak_db_background_validation else 0 }}"
|
||||||
keycloak_db_background_validate_on_match: False
|
keycloak_db_background_validate_on_match: false
|
||||||
keycloak_jdbc_url: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].url }}"
|
keycloak_jdbc_url: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].url }}"
|
||||||
keycloak_jdbc_driver_version: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].version }}"
|
keycloak_jdbc_driver_version: "{{ keycloak_default_jdbc[keycloak_jdbc_engine].version }}"
|
||||||
# override the variables above, following defaults show minimum supported versions
|
# override the variables above, following defaults show minimum supported versions
|
||||||
@@ -114,7 +114,7 @@ keycloak_default_jdbc:
|
|||||||
url: 'jdbc:sqlserver://localhost:1433;databaseName=keycloak;'
|
url: 'jdbc:sqlserver://localhost:1433;databaseName=keycloak;'
|
||||||
version: 12.2.0
|
version: 12.2.0
|
||||||
# role specific vars
|
# role specific vars
|
||||||
keycloak_no_log: True
|
keycloak_no_log: true
|
||||||
|
|
||||||
### logging configuration
|
### logging configuration
|
||||||
keycloak_log_target: /var/log/keycloak
|
keycloak_log_target: /var/log/keycloak
|
||||||
|
|||||||
@@ -214,7 +214,7 @@ argument_specs:
|
|||||||
description: "Frontend URL for keycloak endpoints when a reverse proxy is used"
|
description: "Frontend URL for keycloak endpoints when a reverse proxy is used"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_frontend_url_force:
|
keycloak_frontend_url_force:
|
||||||
default: False
|
default: false
|
||||||
description: "Force backend requests to use the frontend URL"
|
description: "Force backend requests to use the frontend URL"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_infinispan_user:
|
keycloak_infinispan_user:
|
||||||
@@ -337,7 +337,7 @@ argument_specs:
|
|||||||
description: "Enable remote cache store when in clustered ha configurations"
|
description: "Enable remote cache store when in clustered ha configurations"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_db_background_validation:
|
keycloak_db_background_validation:
|
||||||
default: False
|
default: false
|
||||||
description: "Enable background validation of database connection"
|
description: "Enable background validation of database connection"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_db_background_validation_millis:
|
keycloak_db_background_validation_millis:
|
||||||
@@ -345,19 +345,19 @@ argument_specs:
|
|||||||
description: "How frequenly the connection pool is validated in the background"
|
description: "How frequenly the connection pool is validated in the background"
|
||||||
type: 'int'
|
type: 'int'
|
||||||
keycloak_db_background_validate_on_match:
|
keycloak_db_background_validate_on_match:
|
||||||
default: False
|
default: false
|
||||||
description: "Enable validate on match for database connections"
|
description: "Enable validate on match for database connections"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_db_valid_conn_sql:
|
keycloak_db_valid_conn_sql:
|
||||||
required: False
|
required: false
|
||||||
description: "Override the default database connection validation query sql"
|
description: "Override the default database connection validation query sql"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_admin_url:
|
keycloak_admin_url:
|
||||||
required: False
|
required: false
|
||||||
description: "Override the default administration endpoint URL"
|
description: "Override the default administration endpoint URL"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_jgroups_subnet:
|
keycloak_jgroups_subnet:
|
||||||
required: False
|
required: false
|
||||||
description: "Override the subnet match for jgroups cluster formation; if not defined, it will be inferred from local machine route configuration"
|
description: "Override the subnet match for jgroups cluster formation; if not defined, it will be inferred from local machine route configuration"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_log_target:
|
keycloak_log_target:
|
||||||
@@ -383,15 +383,15 @@ argument_specs:
|
|||||||
description: "Installation path for Red Hat SSO"
|
description: "Installation path for Red Hat SSO"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_apply_patches:
|
sso_apply_patches:
|
||||||
default: False
|
default: false
|
||||||
description: "Install Red Hat SSO most recent cumulative patch"
|
description: "Install Red Hat SSO most recent cumulative patch"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
sso_enable:
|
sso_enable:
|
||||||
default: True
|
default: true
|
||||||
description: "Enable Red Hat Single Sign-on installation"
|
description: "Enable Red Hat Single Sign-on installation"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_offline_install:
|
sso_offline_install:
|
||||||
default: False
|
default: false
|
||||||
description: "Perform an offline install"
|
description: "Perform an offline install"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
sso_service_name:
|
sso_service_name:
|
||||||
@@ -403,7 +403,7 @@ argument_specs:
|
|||||||
description: "systemd description for Red Hat Single Sign-On"
|
description: "systemd description for Red Hat Single Sign-On"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_patch_version:
|
sso_patch_version:
|
||||||
required: False
|
required: false
|
||||||
description: "Red Hat Single Sign-On latest cumulative patch version to apply; defaults to latest version when sso_apply_patches is True"
|
description: "Red Hat Single Sign-On latest cumulative patch version to apply; defaults to latest version when sso_apply_patches is True"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_patch_bundle:
|
sso_patch_bundle:
|
||||||
|
|||||||
@@ -15,9 +15,9 @@ galaxy_info:
|
|||||||
min_ansible_version: "2.14"
|
min_ansible_version: "2.14"
|
||||||
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: EL
|
- name: EL
|
||||||
versions:
|
versions:
|
||||||
- "8"
|
- "8"
|
||||||
|
|
||||||
galaxy_tags:
|
galaxy_tags:
|
||||||
- keycloak
|
- keycloak
|
||||||
|
|||||||
@@ -2,15 +2,15 @@
|
|||||||
- name: "Check if packages are already installed" # noqa command-instead-of-module this runs faster
|
- name: "Check if packages are already installed" # noqa command-instead-of-module this runs faster
|
||||||
ansible.builtin.command: "rpm -q {{ packages_list | join(' ') }}"
|
ansible.builtin.command: "rpm -q {{ packages_list | join(' ') }}"
|
||||||
register: rpm_info
|
register: rpm_info
|
||||||
changed_when: False
|
changed_when: false
|
||||||
failed_when: False
|
failed_when: false
|
||||||
|
|
||||||
- name: "Add missing packages to the yum install list"
|
- name: "Add missing packages to the yum install list"
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
packages_to_install: "{{ packages_to_install | default([]) + rpm_info.stdout_lines | map('regex_findall', 'package (.+) is not installed$') | default([]) | flatten }}"
|
packages_to_install: "{{ packages_to_install | default([]) + rpm_info.stdout_lines | map('regex_findall', 'package (.+) is not installed$') | default([]) | flatten }}"
|
||||||
|
|
||||||
- name: "Install packages: {{ packages_to_install }}"
|
- name: "Install packages: {{ packages_to_install }}"
|
||||||
become: True
|
become: true
|
||||||
ansible.builtin.yum:
|
ansible.builtin.yum:
|
||||||
name: "{{ packages_to_install }}"
|
name: "{{ packages_to_install }}"
|
||||||
state: present
|
state: present
|
||||||
|
|||||||
@@ -6,19 +6,19 @@
|
|||||||
- firewalld
|
- firewalld
|
||||||
|
|
||||||
- name: Enable and start the firewalld service
|
- name: Enable and start the firewalld service
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: firewalld
|
name: firewalld
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: started
|
state: started
|
||||||
|
|
||||||
- name: "Configure firewall for {{ keycloak.service_name }} ports"
|
- name: "Configure firewall ports for {{ keycloak.service_name }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.posix.firewalld:
|
ansible.posix.firewalld:
|
||||||
port: "{{ item }}"
|
port: "{{ item }}"
|
||||||
permanent: true
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
immediate: yes
|
immediate: true
|
||||||
loop:
|
loop:
|
||||||
- "{{ keycloak_http_port }}/tcp"
|
- "{{ keycloak_http_port }}/tcp"
|
||||||
- "{{ keycloak_https_port }}/tcp"
|
- "{{ keycloak_https_port }}/tcp"
|
||||||
|
|||||||
@@ -11,7 +11,7 @@
|
|||||||
quiet: true
|
quiet: true
|
||||||
|
|
||||||
- name: Check for an existing deployment
|
- name: Check for an existing deployment
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak_jboss_home }}"
|
path: "{{ keycloak_jboss_home }}"
|
||||||
register: existing_deploy
|
register: existing_deploy
|
||||||
@@ -20,32 +20,32 @@
|
|||||||
when: existing_deploy.stat.exists and keycloak_force_install | bool
|
when: existing_deploy.stat.exists and keycloak_force_install | bool
|
||||||
block:
|
block:
|
||||||
- name: "Stop the old {{ keycloak.service_name }} service"
|
- name: "Stop the old {{ keycloak.service_name }} service"
|
||||||
become: yes
|
become: true
|
||||||
ignore_errors: yes
|
failed_when: false
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
state: stopped
|
state: stopped
|
||||||
- name: "Remove the old {{ keycloak.service_name }} deployment"
|
- name: "Remove the old {{ keycloak.service_name }} deployment"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "{{ keycloak_jboss_home }}"
|
path: "{{ keycloak_jboss_home }}"
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Check for an existing deployment after possible forced removal
|
- name: Check for an existing deployment after possible forced removal
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak_jboss_home }}"
|
path: "{{ keycloak_jboss_home }}"
|
||||||
|
|
||||||
- name: "Create {{ keycloak.service_name }} service user/group"
|
- name: "Create service user/group for {{ keycloak.service_name }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.user:
|
ansible.builtin.user:
|
||||||
name: "{{ keycloak_service_user }}"
|
name: "{{ keycloak_service_user }}"
|
||||||
home: /opt/keycloak
|
home: /opt/keycloak
|
||||||
system: yes
|
system: yes
|
||||||
create_home: no
|
create_home: no
|
||||||
|
|
||||||
- name: "Create {{ keycloak.service_name }} install location"
|
- name: "Create install location for {{ keycloak.service_name }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
dest: "{{ keycloak_dest }}"
|
dest: "{{ keycloak_dest }}"
|
||||||
state: directory
|
state: directory
|
||||||
@@ -54,7 +54,7 @@
|
|||||||
mode: 0750
|
mode: 0750
|
||||||
|
|
||||||
- name: Create pidfile folder
|
- name: Create pidfile folder
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
dest: "{{ keycloak_service_pidfile | dirname }}"
|
dest: "{{ keycloak_service_pidfile | dirname }}"
|
||||||
state: directory
|
state: directory
|
||||||
@@ -68,7 +68,7 @@
|
|||||||
archive: "{{ keycloak_dest }}/{{ keycloak.bundle }}"
|
archive: "{{ keycloak_dest }}/{{ keycloak.bundle }}"
|
||||||
|
|
||||||
- name: Check download archive path
|
- name: Check download archive path
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ archive }}"
|
path: "{{ archive }}"
|
||||||
register: archive_path
|
register: archive_path
|
||||||
@@ -86,7 +86,7 @@
|
|||||||
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- archive_path is defined
|
- archive_path is defined
|
||||||
- archive_path.stat is defined
|
- archive_path.stat is defined
|
||||||
@@ -96,7 +96,7 @@
|
|||||||
|
|
||||||
- name: Perform download from RHN using JBoss Network API
|
- name: Perform download from RHN using JBoss Network API
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- archive_path is defined
|
- archive_path is defined
|
||||||
- archive_path.stat is defined
|
- archive_path.stat is defined
|
||||||
@@ -114,13 +114,13 @@
|
|||||||
register: rhn_products
|
register: rhn_products
|
||||||
no_log: "{{ omit_rhn_output | default(true) }}"
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Determine install zipfile from search results
|
- name: Determine install zipfile from search results
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_archive + '$') }}"
|
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + sso_archive + '$') }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Download Red Hat Single Sign-On
|
- name: Download Red Hat Single Sign-On
|
||||||
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
@@ -130,7 +130,7 @@
|
|||||||
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
||||||
no_log: "{{ omit_rhn_output | default(true) }}"
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Download rhsso archive from alternate location
|
- name: Download rhsso archive from alternate location
|
||||||
ansible.builtin.get_url: # noqa risky-file-permissions delegated, uses controller host user
|
ansible.builtin.get_url: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
@@ -138,7 +138,7 @@
|
|||||||
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- archive_path is defined
|
- archive_path is defined
|
||||||
- archive_path.stat is defined
|
- archive_path.stat is defined
|
||||||
@@ -166,23 +166,23 @@
|
|||||||
- not archive_path.stat.exists
|
- not archive_path.stat.exists
|
||||||
- local_archive_path.stat is defined
|
- local_archive_path.stat is defined
|
||||||
- local_archive_path.stat.exists
|
- local_archive_path.stat.exists
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Check target directory: {{ keycloak.home }}"
|
- name: "Check target directory: {{ keycloak.home }}"
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak.home }}"
|
path: "{{ keycloak.home }}"
|
||||||
register: path_to_workdir
|
register: path_to_workdir
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Extract {{ keycloak_service_desc }} archive on target"
|
- name: "Extract {{ keycloak_service_desc }} archive on target"
|
||||||
ansible.builtin.unarchive:
|
ansible.builtin.unarchive:
|
||||||
remote_src: yes
|
remote_src: true
|
||||||
src: "{{ archive }}"
|
src: "{{ archive }}"
|
||||||
dest: "{{ keycloak_dest }}"
|
dest: "{{ keycloak_dest }}"
|
||||||
creates: "{{ keycloak.home }}"
|
creates: "{{ keycloak.home }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
become: yes
|
become: true
|
||||||
when:
|
when:
|
||||||
- new_version_downloaded.changed or not path_to_workdir.stat.exists
|
- new_version_downloaded.changed or not path_to_workdir.stat.exists
|
||||||
notify:
|
notify:
|
||||||
@@ -200,13 +200,13 @@
|
|||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
recurse: true
|
recurse: true
|
||||||
become: yes
|
become: true
|
||||||
changed_when: false
|
changed_when: false
|
||||||
|
|
||||||
- name: Ensure permissions are correct on existing deploy
|
- name: Ensure permissions are correct on existing deploy
|
||||||
ansible.builtin.command: chown -R "{{ keycloak_service_user }}:{{ keycloak_service_group }}" "{{ keycloak.home }}"
|
ansible.builtin.command: chown -R "{{ keycloak_service_user }}:{{ keycloak_service_group }}" "{{ keycloak.home }}"
|
||||||
when: keycloak_service_runas
|
when: keycloak_service_runas
|
||||||
become: yes
|
become: true
|
||||||
changed_when: false
|
changed_when: false
|
||||||
|
|
||||||
# driver and configuration
|
# driver and configuration
|
||||||
@@ -215,7 +215,7 @@
|
|||||||
when: keycloak_jdbc[keycloak_jdbc_engine].enabled
|
when: keycloak_jdbc[keycloak_jdbc_engine].enabled
|
||||||
|
|
||||||
- name: "Deploy custom {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }} from {{ keycloak_config_override_template }}"
|
- name: "Deploy custom {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }} from {{ keycloak_config_override_template }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: "templates/{{ keycloak_config_override_template }}"
|
src: "templates/{{ keycloak_config_override_template }}"
|
||||||
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
||||||
@@ -227,7 +227,7 @@
|
|||||||
when: keycloak_config_override_template | length > 0
|
when: keycloak_config_override_template | length > 0
|
||||||
|
|
||||||
- name: "Deploy standalone {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }}"
|
- name: "Deploy standalone {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: templates/standalone.xml.j2
|
src: templates/standalone.xml.j2
|
||||||
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
||||||
@@ -255,7 +255,7 @@
|
|||||||
when: keycloak_ha_enabled and keycloak_ha_discovery == 'TCPPING'
|
when: keycloak_ha_enabled and keycloak_ha_discovery == 'TCPPING'
|
||||||
|
|
||||||
- name: "Deploy HA {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }}"
|
- name: "Deploy HA {{ keycloak.service_name }} config to {{ keycloak_config_path_to_standalone_xml }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: templates/standalone-ha.xml.j2
|
src: templates/standalone-ha.xml.j2
|
||||||
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
||||||
@@ -270,7 +270,7 @@
|
|||||||
- keycloak_config_override_template | length == 0
|
- keycloak_config_override_template | length == 0
|
||||||
|
|
||||||
- name: "Deploy HA {{ keycloak.service_name }} config with infinispan remote cache store to {{ keycloak_config_path_to_standalone_xml }}"
|
- name: "Deploy HA {{ keycloak.service_name }} config with infinispan remote cache store to {{ keycloak_config_path_to_standalone_xml }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: templates/standalone-infinispan.xml.j2
|
src: templates/standalone-infinispan.xml.j2
|
||||||
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
dest: "{{ keycloak_config_path_to_standalone_xml }}"
|
||||||
@@ -285,7 +285,7 @@
|
|||||||
- keycloak_config_override_template | length == 0
|
- keycloak_config_override_template | length == 0
|
||||||
|
|
||||||
- name: "Deploy profile.properties file to {{ keycloak_config_path_to_properties }}"
|
- name: "Deploy profile.properties file to {{ keycloak_config_path_to_properties }}"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: keycloak-profile.properties.j2
|
src: keycloak-profile.properties.j2
|
||||||
dest: "{{ keycloak_config_path_to_properties }}"
|
dest: "{{ keycloak_config_path_to_properties }}"
|
||||||
|
|||||||
@@ -3,17 +3,17 @@
|
|||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}"
|
path: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}"
|
||||||
register: dest_path
|
register: dest_path
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Set up module dir for JDBC Driver {{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_name }}"
|
- name: "Set up module dir for JDBC Driver {{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_name }}"
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}"
|
path: "{{ keycloak_jdbc[keycloak_jdbc_engine].driver_module_dir }}"
|
||||||
state: directory
|
state: directory
|
||||||
recurse: yes
|
recurse: true
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
mode: 0750
|
mode: 0750
|
||||||
become: yes
|
become: true
|
||||||
when:
|
when:
|
||||||
- not dest_path.stat.exists
|
- not dest_path.stat.exists
|
||||||
|
|
||||||
@@ -24,7 +24,7 @@
|
|||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
mode: 0640
|
mode: 0640
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Deploy module.xml for JDBC Driver"
|
- name: "Deploy module.xml for JDBC Driver"
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
@@ -33,4 +33,4 @@
|
|||||||
group: "{{ keycloak_service_group }}"
|
group: "{{ keycloak_service_group }}"
|
||||||
owner: "{{ keycloak_service_user }}"
|
owner: "{{ keycloak_service_user }}"
|
||||||
mode: 0640
|
mode: 0640
|
||||||
become: yes
|
become: true
|
||||||
|
|||||||
@@ -35,7 +35,7 @@
|
|||||||
state: link
|
state: link
|
||||||
src: "{{ keycloak_jboss_home }}/standalone/log"
|
src: "{{ keycloak_jboss_home }}/standalone/log"
|
||||||
dest: "{{ keycloak_log_target }}"
|
dest: "{{ keycloak_log_target }}"
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: Set admin credentials and restart if not already created
|
- name: Set admin credentials and restart if not already created
|
||||||
block:
|
block:
|
||||||
@@ -44,7 +44,7 @@
|
|||||||
url: "{{ keycloak_url }}/auth/realms/master/protocol/openid-connect/token"
|
url: "{{ keycloak_url }}/auth/realms/master/protocol/openid-connect/token"
|
||||||
method: POST
|
method: POST
|
||||||
body: "client_id={{ keycloak_auth_client }}&username={{ keycloak_admin_user }}&password={{ keycloak_admin_password }}&grant_type=password"
|
body: "client_id={{ keycloak_auth_client }}&username={{ keycloak_admin_user }}&password={{ keycloak_admin_password }}&grant_type=password"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
register: keycloak_auth_response
|
register: keycloak_auth_response
|
||||||
until: keycloak_auth_response.status == 200
|
until: keycloak_auth_response.status == 200
|
||||||
retries: 2
|
retries: 2
|
||||||
@@ -58,8 +58,8 @@
|
|||||||
- "-rmaster"
|
- "-rmaster"
|
||||||
- "-u{{ keycloak_admin_user }}"
|
- "-u{{ keycloak_admin_user }}"
|
||||||
- "-p{{ keycloak_admin_password }}"
|
- "-p{{ keycloak_admin_password }}"
|
||||||
changed_when: yes
|
changed_when: true
|
||||||
become: yes
|
become: true
|
||||||
- name: "Restart {{ keycloak.service_name }}"
|
- name: "Restart {{ keycloak.service_name }}"
|
||||||
ansible.builtin.include_tasks: tasks/restart_keycloak.yml
|
ansible.builtin.include_tasks: tasks/restart_keycloak.yml
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- keycloak_admin_password | length > 12
|
- keycloak_admin_password | length > 12
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "The console administrator password is empty or invalid. Please set the keycloak_admin_password variable to a 12+ char long string"
|
fail_msg: "The console administrator password is empty or invalid. Please set the keycloak_admin_password variable to a 12+ char long string"
|
||||||
success_msg: "{{ 'Console administrator password OK' }}"
|
success_msg: "{{ 'Console administrator password OK' }}"
|
||||||
|
|
||||||
@@ -11,7 +11,7 @@
|
|||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- (keycloak_ha_enabled and keycloak_db_enabled) or (not keycloak_ha_enabled and keycloak_db_enabled) or (not keycloak_ha_enabled and not keycloak_db_enabled)
|
- (keycloak_ha_enabled and keycloak_db_enabled) or (not keycloak_ha_enabled and keycloak_db_enabled) or (not keycloak_ha_enabled and not keycloak_db_enabled)
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "Cannot install HA setup without a backend database service. Check keycloak_ha_enabled and keycloak_db_enabled"
|
fail_msg: "Cannot install HA setup without a backend database service. Check keycloak_ha_enabled and keycloak_db_enabled"
|
||||||
success_msg: "{{ 'Configuring HA' if keycloak_ha_enabled else 'Configuring standalone' }}"
|
success_msg: "{{ 'Configuring HA' if keycloak_ha_enabled else 'Configuring standalone' }}"
|
||||||
|
|
||||||
@@ -20,7 +20,7 @@
|
|||||||
that:
|
that:
|
||||||
- (rhn_username is defined and sso_enable is defined and sso_enable) or not sso_enable is defined or not sso_enable or keycloak_offline_install
|
- (rhn_username is defined and sso_enable is defined and sso_enable) or not sso_enable is defined or not sso_enable or keycloak_offline_install
|
||||||
- (rhn_password is defined and sso_enable is defined and sso_enable) or not sso_enable is defined or not sso_enable or keycloak_offline_install
|
- (rhn_password is defined and sso_enable is defined and sso_enable) or not sso_enable is defined or not sso_enable or keycloak_offline_install
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "Cannot install Red Hat SSO without RHN credentials. Check rhn_username and rhn_password are defined"
|
fail_msg: "Cannot install Red Hat SSO without RHN credentials. Check rhn_username and rhn_password are defined"
|
||||||
success_msg: "Installing {{ keycloak_service_desc }}"
|
success_msg: "Installing {{ keycloak_service_desc }}"
|
||||||
|
|
||||||
@@ -31,7 +31,7 @@
|
|||||||
- keycloak_jdbc_url | length > 0
|
- keycloak_jdbc_url | length > 0
|
||||||
- keycloak_db_user | length > 0
|
- keycloak_db_user | length > 0
|
||||||
- keycloak_db_pass | length > 0
|
- keycloak_db_pass | length > 0
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "Configuration for the JDBC persistence is invalid or incomplete"
|
fail_msg: "Configuration for the JDBC persistence is invalid or incomplete"
|
||||||
success_msg: "Configuring JDBC persistence using {{ keycloak_jdbc_engine }} database"
|
success_msg: "Configuring JDBC persistence using {{ keycloak_jdbc_engine }} database"
|
||||||
when: keycloak_db_enabled
|
when: keycloak_db_enabled
|
||||||
|
|||||||
@@ -2,11 +2,12 @@
|
|||||||
- name: "Restart and enable {{ keycloak.service_name }} service"
|
- name: "Restart and enable {{ keycloak.service_name }} service"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: restarted
|
state: restarted
|
||||||
become: yes
|
daemon_reload: true
|
||||||
|
become: true
|
||||||
delegate_to: "{{ ansible_play_hosts | first }}"
|
delegate_to: "{{ ansible_play_hosts | first }}"
|
||||||
run_once: True
|
run_once: true
|
||||||
|
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
@@ -14,7 +15,7 @@
|
|||||||
register: keycloak_status
|
register: keycloak_status
|
||||||
until: keycloak_status.status == 200
|
until: keycloak_status.status == 200
|
||||||
delegate_to: "{{ ansible_play_hosts | first }}"
|
delegate_to: "{{ ansible_play_hosts | first }}"
|
||||||
run_once: True
|
run_once: true
|
||||||
retries: "{{ keycloak_service_start_retries }}"
|
retries: "{{ keycloak_service_start_retries }}"
|
||||||
delay: "{{ keycloak_service_start_delay }}"
|
delay: "{{ keycloak_service_start_delay }}"
|
||||||
|
|
||||||
@@ -23,5 +24,5 @@
|
|||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: yes
|
||||||
state: restarted
|
state: restarted
|
||||||
become: yes
|
become: true
|
||||||
when: inventory_hostname != ansible_play_hosts | first
|
when: inventory_hostname != ansible_play_hosts | first
|
||||||
|
|||||||
@@ -12,11 +12,11 @@
|
|||||||
path: "{{ patch_archive }}"
|
path: "{{ patch_archive }}"
|
||||||
register: patch_archive_path
|
register: patch_archive_path
|
||||||
when: sso_patch_version is defined
|
when: sso_patch_version is defined
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: Perform patch download from RHN via JBossNetwork API
|
- name: Perform patch download from RHN via JBossNetwork API
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- sso_enable is defined and sso_enable
|
- sso_enable is defined and sso_enable
|
||||||
- not keycloak_offline_install
|
- not keycloak_offline_install
|
||||||
@@ -32,21 +32,21 @@
|
|||||||
register: rhn_products
|
register: rhn_products
|
||||||
no_log: "{{ omit_rhn_output | default(true) }}"
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Determine patch versions list
|
- name: Determine patch versions list
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
filtered_versions: "{{ rhn_products.results | map(attribute='file_path') | select('match', '^[^/]*/rh-sso-.*[0-9]*[.][0-9]*[.][0-9]*.*$') | map('regex_replace','[^/]*/rh-sso-([0-9]*[.][0-9]*[.][0-9]*)-.*','\\1' ) | list | unique }}"
|
filtered_versions: "{{ rhn_products.results | map(attribute='file_path') | select('match', '^[^/]*/rh-sso-.*[0-9]*[.][0-9]*[.][0-9]*.*$') | map('regex_replace', '[^/]*/rh-sso-([0-9]*[.][0-9]*[.][0-9]*)-.*', '\\1') | list | unique }}"
|
||||||
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Determine latest version
|
- name: Determine latest version
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
sso_latest_version: "{{ filtered_versions | middleware_automation.common.version_sort | last }}"
|
sso_latest_version: "{{ filtered_versions | middleware_automation.common.version_sort | last }}"
|
||||||
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Determine install zipfile from search results
|
- name: Determine install zipfile from search results
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
@@ -55,7 +55,7 @@
|
|||||||
patch_version: "{{ sso_latest_version }}"
|
patch_version: "{{ sso_latest_version }}"
|
||||||
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
when: sso_patch_version is not defined or sso_patch_version | length == 0
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: "Determine selected patch from supplied version: {{ sso_patch_version }}"
|
- name: "Determine selected patch from supplied version: {{ sso_patch_version }}"
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
@@ -64,7 +64,7 @@
|
|||||||
patch_version: "{{ sso_patch_version }}"
|
patch_version: "{{ sso_patch_version }}"
|
||||||
when: sso_patch_version is defined
|
when: sso_patch_version is defined
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Download Red Hat Single Sign-On patch
|
- name: Download Red Hat Single Sign-On patch
|
||||||
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
@@ -74,7 +74,7 @@
|
|||||||
dest: "{{ local_path.stat.path }}/{{ patch_bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ patch_bundle }}"
|
||||||
no_log: "{{ omit_rhn_output | default(true) }}"
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
run_once: yes
|
run_once: true
|
||||||
|
|
||||||
- name: Set download patch archive path
|
- name: Set download patch archive path
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
@@ -84,7 +84,7 @@
|
|||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ patch_archive }}"
|
path: "{{ patch_archive }}"
|
||||||
register: patch_archive_path
|
register: patch_archive_path
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
## copy and unpack
|
## copy and unpack
|
||||||
- name: Copy patch archive to target nodes
|
- name: Copy patch archive to target nodes
|
||||||
@@ -99,7 +99,7 @@
|
|||||||
- not patch_archive_path.stat.exists
|
- not patch_archive_path.stat.exists
|
||||||
- local_archive_path.stat is defined
|
- local_archive_path.stat is defined
|
||||||
- local_archive_path.stat.exists
|
- local_archive_path.stat.exists
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Check installed patches"
|
- name: "Check installed patches"
|
||||||
ansible.builtin.include_tasks: rhsso_cli.yml
|
ansible.builtin.include_tasks: rhsso_cli.yml
|
||||||
@@ -107,7 +107,7 @@
|
|||||||
query: "patch info"
|
query: "patch info"
|
||||||
args:
|
args:
|
||||||
apply:
|
apply:
|
||||||
become: yes
|
become: true
|
||||||
become_user: "{{ keycloak_service_user }}"
|
become_user: "{{ keycloak_service_user }}"
|
||||||
|
|
||||||
- name: "Perform patching"
|
- name: "Perform patching"
|
||||||
@@ -122,7 +122,7 @@
|
|||||||
query: "patch apply {{ patch_archive }}"
|
query: "patch apply {{ patch_archive }}"
|
||||||
args:
|
args:
|
||||||
apply:
|
apply:
|
||||||
become: yes
|
become: true
|
||||||
become_user: "{{ keycloak_service_user }}"
|
become_user: "{{ keycloak_service_user }}"
|
||||||
|
|
||||||
- name: "Restart server to ensure patch content is running"
|
- name: "Restart server to ensure patch content is running"
|
||||||
@@ -133,7 +133,7 @@
|
|||||||
- cli_result.rc == 0
|
- cli_result.rc == 0
|
||||||
args:
|
args:
|
||||||
apply:
|
apply:
|
||||||
become: yes
|
become: true
|
||||||
become_user: "{{ keycloak_service_user }}"
|
become_user: "{{ keycloak_service_user }}"
|
||||||
|
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
@@ -150,7 +150,7 @@
|
|||||||
query: "patch info"
|
query: "patch info"
|
||||||
args:
|
args:
|
||||||
apply:
|
apply:
|
||||||
become: yes
|
become: true
|
||||||
become_user: "{{ keycloak_service_user }}"
|
become_user: "{{ keycloak_service_user }}"
|
||||||
|
|
||||||
- name: "Verify installed patch version"
|
- name: "Verify installed patch version"
|
||||||
|
|||||||
@@ -2,9 +2,10 @@
|
|||||||
- name: "Start {{ keycloak.service_name }} service"
|
- name: "Start {{ keycloak.service_name }} service"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: started
|
state: started
|
||||||
become: yes
|
daemon_reload: true
|
||||||
|
become: true
|
||||||
|
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
|
|||||||
@@ -2,6 +2,6 @@
|
|||||||
- name: "Stop {{ keycloak.service_name }}"
|
- name: "Stop {{ keycloak.service_name }}"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: stopped
|
state: stopped
|
||||||
become: yes
|
become: true
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
- name: "Configure {{ keycloak.service_name }} service script wrapper"
|
- name: "Configure {{ keycloak.service_name }} service script wrapper"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: keycloak-service.sh.j2
|
src: keycloak-service.sh.j2
|
||||||
dest: "{{ keycloak_dest }}/keycloak-service.sh"
|
dest: "{{ keycloak_dest }}/keycloak-service.sh"
|
||||||
@@ -15,7 +15,7 @@
|
|||||||
rpm_java_home: "/etc/alternatives/jre_{{ keycloak_jvm_package | regex_search('(?<=java-)[0-9.]+') }}"
|
rpm_java_home: "/etc/alternatives/jre_{{ keycloak_jvm_package | regex_search('(?<=java-)[0-9.]+') }}"
|
||||||
|
|
||||||
- name: "Configure sysconfig file for {{ keycloak.service_name }} service"
|
- name: "Configure sysconfig file for {{ keycloak.service_name }} service"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: keycloak-sysconfig.j2
|
src: keycloak-sysconfig.j2
|
||||||
dest: /etc/sysconfig/keycloak
|
dest: /etc/sysconfig/keycloak
|
||||||
@@ -34,20 +34,14 @@
|
|||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0644
|
mode: 0644
|
||||||
become: yes
|
become: true
|
||||||
register: systemdunit
|
register: systemdunit
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
- name: Reload systemd
|
|
||||||
become: yes
|
|
||||||
ansible.builtin.systemd:
|
|
||||||
daemon_reload: yes
|
|
||||||
when: systemdunit.changed
|
|
||||||
|
|
||||||
- name: "Start and wait for {{ keycloak.service_name }} service (first node db)"
|
- name: "Start and wait for {{ keycloak.service_name }} service (first node db)"
|
||||||
ansible.builtin.include_tasks: start_keycloak.yml
|
ansible.builtin.include_tasks: start_keycloak.yml
|
||||||
run_once: yes
|
run_once: true
|
||||||
when: keycloak_db_enabled
|
when: keycloak_db_enabled
|
||||||
|
|
||||||
- name: "Start and wait for {{ keycloak.service_name }} service (remaining nodes)"
|
- name: "Start and wait for {{ keycloak.service_name }} service (remaining nodes)"
|
||||||
@@ -56,7 +50,7 @@
|
|||||||
- name: Check service status
|
- name: Check service status
|
||||||
ansible.builtin.command: "systemctl status keycloak"
|
ansible.builtin.command: "systemctl status keycloak"
|
||||||
register: keycloak_service_status
|
register: keycloak_service_status
|
||||||
changed_when: False
|
changed_when: false
|
||||||
|
|
||||||
- name: Verify service status
|
- name: Verify service status
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ Role Defaults
|
|||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
|`keycloak_quarkus_version`| keycloak.org package version | `22.0.5` |
|
|`keycloak_quarkus_version`| keycloak.org package version | `23.0.7` |
|
||||||
|
|
||||||
|
|
||||||
* Service configuration
|
* Service configuration
|
||||||
@@ -19,6 +19,7 @@ Role Defaults
|
|||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
|`keycloak_quarkus_ha_enabled`| Enable auto configuration for database backend, clustering and remote caches on infinispan | `False` |
|
|`keycloak_quarkus_ha_enabled`| Enable auto configuration for database backend, clustering and remote caches on infinispan | `False` |
|
||||||
|
|`keycloak_quarkus_ha_discovery`| Discovery protocol for HA cluster members | `TCPPING` |
|
||||||
|`keycloak_quarkus_db_enabled`| Enable auto configuration for database backend | `True` if `keycloak_quarkus_ha_enabled` is True, else `False` |
|
|`keycloak_quarkus_db_enabled`| Enable auto configuration for database backend | `True` if `keycloak_quarkus_ha_enabled` is True, else `False` |
|
||||||
|`keycloak_quarkus_admin_user`| Administration console user account | `admin` |
|
|`keycloak_quarkus_admin_user`| Administration console user account | `admin` |
|
||||||
|`keycloak_quarkus_bind_address`| Address for binding service ports | `0.0.0.0` |
|
|`keycloak_quarkus_bind_address`| Address for binding service ports | `0.0.0.0` |
|
||||||
@@ -28,9 +29,12 @@ Role Defaults
|
|||||||
|`keycloak_quarkus_http_port`| HTTP listening port | `8080` |
|
|`keycloak_quarkus_http_port`| HTTP listening port | `8080` |
|
||||||
|`keycloak_quarkus_https_port`| TLS HTTP listening port | `8443` |
|
|`keycloak_quarkus_https_port`| TLS HTTP listening port | `8443` |
|
||||||
|`keycloak_quarkus_ajp_port`| AJP port | `8009` |
|
|`keycloak_quarkus_ajp_port`| AJP port | `8009` |
|
||||||
|`keycloak_quarkus_jgroups_port`| jgroups cluster tcp port | `7600` |
|
|`keycloak_quarkus_jgroups_port`| jgroups cluster tcp port | `7800` |
|
||||||
|`keycloak_quarkus_service_user`| Posix account username | `keycloak` |
|
|`keycloak_quarkus_service_user`| Posix account username | `keycloak` |
|
||||||
|`keycloak_quarkus_service_group`| Posix account group | `keycloak` |
|
|`keycloak_quarkus_service_group`| Posix account group | `keycloak` |
|
||||||
|
|`keycloak_quarkus_service_restart_always`| systemd restart always behavior activation | `False` |
|
||||||
|
|`keycloak_quarkus_service_restart_on_failure`| systemd restart on-failure behavior activation | `False` |
|
||||||
|
|`keycloak_quarkus_service_restartsec`| systemd RestartSec | `10s` |
|
||||||
|`keycloak_quarkus_service_pidfile`| Pid file path for service | `/run/keycloak.pid` |
|
|`keycloak_quarkus_service_pidfile`| Pid file path for service | `/run/keycloak.pid` |
|
||||||
|`keycloak_quarkus_jvm_package`| RHEL java package runtime | `java-17-openjdk-headless` |
|
|`keycloak_quarkus_jvm_package`| RHEL java package runtime | `java-17-openjdk-headless` |
|
||||||
|`keycloak_quarkus_java_home`| JAVA_HOME of installed JRE, leave empty for using specified keycloak_quarkus_jvm_package RPM path | `None` |
|
|`keycloak_quarkus_java_home`| JAVA_HOME of installed JRE, leave empty for using specified keycloak_quarkus_jvm_package RPM path | `None` |
|
||||||
@@ -50,12 +54,20 @@ Role Defaults
|
|||||||
|`keycloak_quarkus_trust_store_password`| Password for the trust store | `""` |
|
|`keycloak_quarkus_trust_store_password`| Password for the trust store | `""` |
|
||||||
|
|
||||||
|
|
||||||
|
* Hostname configuration
|
||||||
|
|
||||||
|
| Variable | Description | Default |
|
||||||
|
|:---------|:------------|:--------|
|
||||||
|
|`keycloak_quarkus_http_relative_path`| Set the path relative to / for serving resources. The path must start with a / | `/` |
|
||||||
|
|`keycloak_quarkus_hostname_strict`| Disables dynamically resolving the hostname from request headers | `true` |
|
||||||
|
|`keycloak_quarkus_hostname_strict_backchannel`| By default backchannel URLs are dynamically resolved from request headers to allow internal and external applications. If all applications use the public URL this option should be enabled. | `false` |
|
||||||
|
|
||||||
|
|
||||||
* Database configuration
|
* Database configuration
|
||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
|`keycloak_quarkus_jdbc_engine` | Database engine [mariadb,postres] | `postgres` |
|
|`keycloak_quarkus_jdbc_engine` | Database engine [mariadb,postres,mssql] | `postgres` |
|
||||||
|`keycloak_quarkus_db_user` | User for database connection | `keycloak-user` |
|
|`keycloak_quarkus_db_user` | User for database connection | `keycloak-user` |
|
||||||
|`keycloak_quarkus_db_pass` | Password for database connection | `keycloak-pass` |
|
|`keycloak_quarkus_db_pass` | Password for database connection | `keycloak-pass` |
|
||||||
|`keycloak_quarkus_jdbc_url` | JDBC URL for connecting to database | `jdbc:postgresql://localhost:5432/keycloak` |
|
|`keycloak_quarkus_jdbc_url` | JDBC URL for connecting to database | `jdbc:postgresql://localhost:5432/keycloak` |
|
||||||
@@ -68,11 +80,11 @@ Role Defaults
|
|||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
|`keycloak_quarkus_ispn_user` | Username for connecting to infinispan | `supervisor` |
|
|`keycloak_quarkus_ispn_user` | Username for connecting to infinispan | `supervisor` |
|
||||||
|`keycloak_quarkus_ispn_pass` | Password for connecting to infinispan | `supervisor` |
|
|`keycloak_quarkus_ispn_pass` | Password for connecting to infinispan | `supervisor` |
|
||||||
|`keycloak_quarkus_ispn_url` | URL for connecting to infinispan | `localhost` |
|
|`keycloak_quarkus_ispn_hosts` | host name/port for connecting to infinispan, eg. host1:11222;host2:11222 | `localhost:11222` |
|
||||||
|`keycloak_quarkus_ispn_sasl_mechanism` | Infinispan auth mechanism | `SCRAM-SHA-512` |
|
|`keycloak_quarkus_ispn_sasl_mechanism` | Infinispan auth mechanism | `SCRAM-SHA-512` |
|
||||||
|`keycloak_quarkus_ispn_use_ssl` | Whether infinispan uses TLS connection | `false` |
|
|`keycloak_quarkus_ispn_use_ssl` | Whether infinispan uses TLS connection | `false` |
|
||||||
|`keycloak_quarkus_ispn_trust_store_path` | Path to infinispan server trust certificate | `/etc/pki/java/cacerts` |
|
|`keycloak_quarkus_ispn_trust_store_path` | Path to infinispan server trust certificate | `/etc/pki/java/cacerts` |
|
||||||
|`keycloak_quarkus_ispn_trust_store_password` | Password for infinispan certificate keystore | `changeit` |
|
|`keycloak_quarkus_ispn_trust_store_password` | Password for infinispan certificate keystore | `changeit` |
|
||||||
|
|
||||||
|
|
||||||
* Install options
|
* Install options
|
||||||
@@ -80,8 +92,7 @@ Role Defaults
|
|||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:---------|
|
|:---------|:------------|:---------|
|
||||||
|`keycloak_quarkus_offline_install` | Perform an offline install | `False`|
|
|`keycloak_quarkus_offline_install` | Perform an offline install | `False`|
|
||||||
|`keycloak_quarkus_download_url`| Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/<version>/<archive>`|
|
|`keycloak_quarkus_version`| keycloak.org package version | `23.0.7` |
|
||||||
|`keycloak_quarkus_version`| keycloak.org package version | `22.0.5` |
|
|
||||||
|`keycloak_quarkus_dest`| Installation root path | `/opt/keycloak` |
|
|`keycloak_quarkus_dest`| Installation root path | `/opt/keycloak` |
|
||||||
|`keycloak_quarkus_download_url` | Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/{{ keycloak_quarkus_version }}/{{ keycloak_quarkus_archive }}` |
|
|`keycloak_quarkus_download_url` | Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/{{ keycloak_quarkus_version }}/{{ keycloak_quarkus_archive }}` |
|
||||||
|`keycloak_quarkus_configure_firewalld` | Ensure firewalld is running and configure keycloak ports | `False` |
|
|`keycloak_quarkus_configure_firewalld` | Ensure firewalld is running and configure keycloak ports | `False` |
|
||||||
@@ -101,16 +112,18 @@ Role Defaults
|
|||||||
|`keycloak_auth_client` | Authentication client for configuration REST calls | `admin-cli` |
|
|`keycloak_auth_client` | Authentication client for configuration REST calls | `admin-cli` |
|
||||||
|`keycloak_force_install` | Remove pre-existing versions of service | `False` |
|
|`keycloak_force_install` | Remove pre-existing versions of service | `False` |
|
||||||
|`keycloak_url` | URL for configuration rest calls | `http://{{ keycloak_quarkus_host }}:{{ keycloak_http_port }}` |
|
|`keycloak_url` | URL for configuration rest calls | `http://{{ keycloak_quarkus_host }}:{{ keycloak_http_port }}` |
|
||||||
|`keycloak_management_url` | URL for management console rest calls | `http://{{ keycloak_quarkus_host }}:{{ keycloak_management_http_port }}` |
|
|
||||||
|`keycloak_quarkus_log`| Enable one or more log handlers in a comma-separated list | `file` |
|
|`keycloak_quarkus_log`| Enable one or more log handlers in a comma-separated list | `file` |
|
||||||
|`keycloak_quarkus_log_level`| The log level of the root category or a comma-separated list of individual categories and their levels | `info` |
|
|`keycloak_quarkus_log_level`| The log level of the root category or a comma-separated list of individual categories and their levels | `info` |
|
||||||
|`keycloak_quarkus_log_file`| Set the log file path and filename relative to keycloak home | `data/log/keycloak.log` |
|
|`keycloak_quarkus_log_file`| Set the log file path and filename relative to keycloak home | `data/log/keycloak.log` |
|
||||||
|`keycloak_quarkus_log_format`| Set a format specific to file log entries | `%d{yyyy-MM-dd HH:mm:ss,SSS} %-5p [%c] (%t) %s%e%n` |
|
|`keycloak_quarkus_log_format`| Set a format specific to file log entries | `%d{yyyy-MM-dd HH:mm:ss,SSS} %-5p [%c] (%t) %s%e%n` |
|
||||||
|`keycloak_quarkus_log_target`| Set the destination of the keycloak log folder link | `/var/log/keycloak` |
|
|`keycloak_quarkus_log_target`| Set the destination of the keycloak log folder link | `/var/log/keycloak` |
|
||||||
|
|`keycloak_quarkus_log_max_file_size`| Set the maximum log file size before a log rotation happens; A size configuration option recognises string in this format (shown as a regular expression): `[0-9]+[KkMmGgTtPpEeZzYy]?`. If no suffix is given, assume bytes. | `10M` |
|
||||||
|
|`keycloak_quarkus_log_max_backup_index`| Set the maximum number of archived log files to keep" | `10` |
|
||||||
|
|`keycloak_quarkus_log_file_suffix`| Set the log file handler rotation file suffix. When used, the file will be rotated based on its suffix; Note: If the suffix ends with `.zip` or `.gz`, the rotation file will also be compressed. | `.yyyy-MM-dd.zip` |
|
||||||
|`keycloak_quarkus_proxy_mode`| The proxy address forwarding mode if the server is behind a reverse proxy | `edge` |
|
|`keycloak_quarkus_proxy_mode`| The proxy address forwarding mode if the server is behind a reverse proxy | `edge` |
|
||||||
|`keycloak_quarkus_start_dev`| Whether to start the service in development mode (start-dev) | `False` |
|
|`keycloak_quarkus_start_dev`| Whether to start the service in development mode (start-dev) | `False` |
|
||||||
|`keycloak_quarkus_transaction_xa_enabled`| Whether to use XA transactions | `True` |
|
|`keycloak_quarkus_transaction_xa_enabled`| Whether to use XA transactions | `True` |
|
||||||
|
|`keycloak_quarkus_spi_sticky_session_encoder_infinispan_should_attach_route`| If the route should be attached to cookies to reflect the node that owns a particular session. If false, route is not attached to cookies and we rely on the session affinity capabilities from reverse proxy | `True` |
|
||||||
|
|
||||||
Role Variables
|
Role Variables
|
||||||
--------------
|
--------------
|
||||||
@@ -118,6 +131,8 @@ Role Variables
|
|||||||
| Variable | Description | Required |
|
| Variable | Description | Required |
|
||||||
|:---------|:------------|----------|
|
|:---------|:------------|----------|
|
||||||
|`keycloak_quarkus_admin_pass`| Password of console admin account | `yes` |
|
|`keycloak_quarkus_admin_pass`| Password of console admin account | `yes` |
|
||||||
|
|`keycloak_quarkus_frontend_url`| Base URL for frontend URLs, including scheme, host, port and path | `no` |
|
||||||
|
|`keycloak_quarkus_admin_url`| Base URL for accessing the administration console, including scheme, host, port and path | `no` |
|
||||||
|
|
||||||
|
|
||||||
License
|
License
|
||||||
|
|||||||
@@ -1,12 +1,12 @@
|
|||||||
---
|
---
|
||||||
### Configuration specific to keycloak
|
### Configuration specific to keycloak
|
||||||
keycloak_quarkus_version: 22.0.5
|
keycloak_quarkus_version: 23.0.7
|
||||||
keycloak_quarkus_archive: "keycloak-{{ keycloak_quarkus_version }}.zip"
|
keycloak_quarkus_archive: "keycloak-{{ keycloak_quarkus_version }}.zip"
|
||||||
keycloak_quarkus_download_url: "https://github.com/keycloak/keycloak/releases/download/{{ keycloak_quarkus_version }}/{{ keycloak_quarkus_archive }}"
|
keycloak_quarkus_download_url: "https://github.com/keycloak/keycloak/releases/download/{{ keycloak_quarkus_version }}/{{ keycloak_quarkus_archive }}"
|
||||||
keycloak_quarkus_installdir: "{{ keycloak_quarkus_dest }}/keycloak-{{ keycloak_quarkus_version }}"
|
keycloak_quarkus_installdir: "{{ keycloak_quarkus_dest }}/keycloak-{{ keycloak_quarkus_version }}"
|
||||||
|
|
||||||
# whether to install from local archive
|
# whether to install from local archive
|
||||||
keycloak_quarkus_offline_install: False
|
keycloak_quarkus_offline_install: false
|
||||||
|
|
||||||
### Install location and service settings
|
### Install location and service settings
|
||||||
keycloak_quarkus_jvm_package: java-17-openjdk-headless
|
keycloak_quarkus_jvm_package: java-17-openjdk-headless
|
||||||
@@ -14,11 +14,14 @@ keycloak_quarkus_java_home:
|
|||||||
keycloak_quarkus_dest: /opt/keycloak
|
keycloak_quarkus_dest: /opt/keycloak
|
||||||
keycloak_quarkus_home: "{{ keycloak_quarkus_installdir }}"
|
keycloak_quarkus_home: "{{ keycloak_quarkus_installdir }}"
|
||||||
keycloak_quarkus_config_dir: "{{ keycloak_quarkus_home }}/conf"
|
keycloak_quarkus_config_dir: "{{ keycloak_quarkus_home }}/conf"
|
||||||
keycloak_quarkus_start_dev: False
|
keycloak_quarkus_start_dev: false
|
||||||
keycloak_quarkus_service_user: keycloak
|
keycloak_quarkus_service_user: keycloak
|
||||||
keycloak_quarkus_service_group: keycloak
|
keycloak_quarkus_service_group: keycloak
|
||||||
keycloak_quarkus_service_pidfile: "/run/keycloak/keycloak.pid"
|
keycloak_quarkus_service_pidfile: "/run/keycloak/keycloak.pid"
|
||||||
keycloak_quarkus_configure_firewalld: False
|
keycloak_quarkus_configure_firewalld: false
|
||||||
|
keycloak_quarkus_service_restart_always: false
|
||||||
|
keycloak_quarkus_service_restart_on_failure: false
|
||||||
|
keycloak_quarkus_service_restartsec: "10s"
|
||||||
|
|
||||||
### administrator console password
|
### administrator console password
|
||||||
keycloak_quarkus_admin_user: admin
|
keycloak_quarkus_admin_user: admin
|
||||||
@@ -30,28 +33,29 @@ keycloak_quarkus_bind_address: 0.0.0.0
|
|||||||
keycloak_quarkus_host: localhost
|
keycloak_quarkus_host: localhost
|
||||||
keycloak_quarkus_port: -1
|
keycloak_quarkus_port: -1
|
||||||
keycloak_quarkus_path:
|
keycloak_quarkus_path:
|
||||||
keycloak_quarkus_http_enabled: True
|
keycloak_quarkus_http_enabled: true
|
||||||
keycloak_quarkus_http_port: 8080
|
keycloak_quarkus_http_port: 8080
|
||||||
keycloak_quarkus_https_port: 8443
|
keycloak_quarkus_https_port: 8443
|
||||||
keycloak_quarkus_ajp_port: 8009
|
keycloak_quarkus_ajp_port: 8009
|
||||||
keycloak_quarkus_jgroups_port: 7600
|
keycloak_quarkus_jgroups_port: 7800
|
||||||
keycloak_quarkus_java_opts: "-Xms1024m -Xmx2048m"
|
keycloak_quarkus_java_opts: "-Xms1024m -Xmx2048m"
|
||||||
|
|
||||||
### TLS/HTTPS configuration
|
### TLS/HTTPS configuration
|
||||||
keycloak_quarkus_https_key_file_enabled: False
|
keycloak_quarkus_https_key_file_enabled: false
|
||||||
keycloak_quarkus_key_file: "{{ keycloak.home }}/conf/server.key.pem"
|
keycloak_quarkus_key_file: "{{ keycloak.home }}/conf/server.key.pem"
|
||||||
keycloak_quarkus_cert_file: "{{ keycloak.home }}/conf/server.crt.pem"
|
keycloak_quarkus_cert_file: "{{ keycloak.home }}/conf/server.crt.pem"
|
||||||
#### key store configuration
|
#### key store configuration
|
||||||
keycloak_quarkus_https_key_store_enabled: False
|
keycloak_quarkus_https_key_store_enabled: false
|
||||||
keycloak_quarkus_key_store_file: "{{ keycloak.home }}/conf/key_store.p12"
|
keycloak_quarkus_key_store_file: "{{ keycloak.home }}/conf/key_store.p12"
|
||||||
keycloak_quarkus_key_store_password: ''
|
keycloak_quarkus_key_store_password: ''
|
||||||
##### trust store configuration
|
##### trust store configuration
|
||||||
keycloak_quarkus_https_trust_store_enabled: False
|
keycloak_quarkus_https_trust_store_enabled: false
|
||||||
keycloak_quarkus_trust_store_file: "{{ keycloak.home }}/conf/trust_store.p12"
|
keycloak_quarkus_trust_store_file: "{{ keycloak.home }}/conf/trust_store.p12"
|
||||||
keycloak_quarkus_trust_store_password: ''
|
keycloak_quarkus_trust_store_password: ''
|
||||||
|
|
||||||
### Enable configuration for database backend, clustering and remote caches on infinispan
|
### Enable configuration for database backend, clustering and remote caches on infinispan
|
||||||
keycloak_quarkus_ha_enabled: False
|
keycloak_quarkus_ha_enabled: false
|
||||||
|
keycloak_quarkus_ha_discovery: "TCPPING"
|
||||||
### Enable database configuration, must be enabled when HA is configured
|
### Enable database configuration, must be enabled when HA is configured
|
||||||
keycloak_quarkus_db_enabled: "{{ True if keycloak_quarkus_ha_enabled else False }}"
|
keycloak_quarkus_db_enabled: "{{ True if keycloak_quarkus_ha_enabled else False }}"
|
||||||
|
|
||||||
@@ -63,21 +67,31 @@ keycloak_quarkus_admin_url:
|
|||||||
### (set to `/auth` for retrocompatibility with pre-quarkus releases)
|
### (set to `/auth` for retrocompatibility with pre-quarkus releases)
|
||||||
keycloak_quarkus_http_relative_path: /
|
keycloak_quarkus_http_relative_path: /
|
||||||
|
|
||||||
|
# Disables dynamically resolving the hostname from request headers.
|
||||||
|
# Should always be set to true in production, unless proxy verifies the Host header.
|
||||||
|
keycloak_quarkus_hostname_strict: true
|
||||||
|
# By default backchannel URLs are dynamically resolved from request headers to allow internal and external applications.
|
||||||
|
# If all applications use the public URL this option should be enabled.
|
||||||
|
keycloak_quarkus_hostname_strict_backchannel: false
|
||||||
|
|
||||||
# proxy address forwarding mode if the server is behind a reverse proxy. [none, edge, reencrypt, passthrough]
|
# proxy address forwarding mode if the server is behind a reverse proxy. [none, edge, reencrypt, passthrough]
|
||||||
keycloak_quarkus_proxy_mode: edge
|
keycloak_quarkus_proxy_mode: edge
|
||||||
|
|
||||||
# disable xa transactions
|
# disable xa transactions
|
||||||
keycloak_quarkus_transaction_xa_enabled: True
|
keycloak_quarkus_transaction_xa_enabled: true
|
||||||
|
|
||||||
keycloak_quarkus_metrics_enabled: False
|
# If the route should be attached to cookies to reflect the node that owns a particular session. If false, route is not attached to cookies and we rely on the session affinity capabilities from reverse proxy
|
||||||
keycloak_quarkus_health_enabled: True
|
keycloak_quarkus_spi_sticky_session_encoder_infinispan_should_attach_route: true
|
||||||
|
|
||||||
|
keycloak_quarkus_metrics_enabled: false
|
||||||
|
keycloak_quarkus_health_enabled: true
|
||||||
|
|
||||||
### infinispan remote caches access (hotrod)
|
### infinispan remote caches access (hotrod)
|
||||||
keycloak_quarkus_ispn_user: supervisor
|
keycloak_quarkus_ispn_user: supervisor
|
||||||
keycloak_quarkus_ispn_pass: supervisor
|
keycloak_quarkus_ispn_pass: supervisor
|
||||||
keycloak_quarkus_ispn_url: localhost
|
keycloak_quarkus_ispn_hosts: "localhost:11222"
|
||||||
keycloak_quarkus_ispn_sasl_mechanism: SCRAM-SHA-512
|
keycloak_quarkus_ispn_sasl_mechanism: SCRAM-SHA-512
|
||||||
keycloak_quarkus_ispn_use_ssl: False
|
keycloak_quarkus_ispn_use_ssl: false
|
||||||
# if ssl is enabled, import ispn server certificate here
|
# if ssl is enabled, import ispn server certificate here
|
||||||
keycloak_quarkus_ispn_trust_store_path: /etc/pki/java/cacerts
|
keycloak_quarkus_ispn_trust_store_path: /etc/pki/java/cacerts
|
||||||
keycloak_quarkus_ispn_trust_store_password: changeit
|
keycloak_quarkus_ispn_trust_store_password: changeit
|
||||||
@@ -97,10 +111,16 @@ keycloak_quarkus_default_jdbc:
|
|||||||
mariadb:
|
mariadb:
|
||||||
url: 'jdbc:mariadb://localhost:3306/keycloak'
|
url: 'jdbc:mariadb://localhost:3306/keycloak'
|
||||||
version: 2.7.4
|
version: 2.7.4
|
||||||
|
mssql:
|
||||||
|
url: 'jdbc:sqlserver://localhost:1433;databaseName=keycloak;'
|
||||||
|
version: 12.2.0
|
||||||
|
driver_jar_url: "https://repo1.maven.org/maven2/com/microsoft/sqlserver/mssql-jdbc/12.2.0.jre11/mssql-jdbc-12.2.0.jre11.jar" # cf. https://access.redhat.com/documentation/en-us/red_hat_build_of_keycloak/22.0/html/server_guide/db-#db-installing-the-microsoft-sql-server-driver
|
||||||
### logging configuration
|
### logging configuration
|
||||||
keycloak_quarkus_log: file
|
keycloak_quarkus_log: file
|
||||||
keycloak_quarkus_log_level: info
|
keycloak_quarkus_log_level: info
|
||||||
keycloak_quarkus_log_file: data/log/keycloak.log
|
keycloak_quarkus_log_file: data/log/keycloak.log
|
||||||
keycloak_quarkus_log_format: '%d{yyyy-MM-dd HH:mm:ss,SSS} %-5p [%c] (%t) %s%e%n'
|
keycloak_quarkus_log_format: '%d{yyyy-MM-dd HH:mm:ss,SSS} %-5p [%c] (%t) %s%e%n'
|
||||||
keycloak_quarkus_log_target: /var/log/keycloak
|
keycloak_quarkus_log_target: /var/log/keycloak
|
||||||
|
keycloak_quarkus_log_max_file_size: 10M
|
||||||
|
keycloak_quarkus_log_max_backup_index: 10
|
||||||
|
keycloak_quarkus_log_file_suffix: '.yyyy-MM-dd.zip'
|
||||||
|
|||||||
@@ -1,4 +1,8 @@
|
|||||||
---
|
---
|
||||||
|
# handler should be invoked anytime a [build configuration](https://www.keycloak.org/server/all-config?f=build) changes
|
||||||
|
- name: "Rebuild {{ keycloak.service_name }} config"
|
||||||
|
ansible.builtin.include_tasks: rebuild_config.yml
|
||||||
|
listen: "rebuild keycloak config"
|
||||||
- name: "Restart {{ keycloak.service_name }}"
|
- name: "Restart {{ keycloak.service_name }}"
|
||||||
ansible.builtin.include_tasks: restart.yml
|
ansible.builtin.include_tasks: restart.yml
|
||||||
listen: "restart keycloak"
|
listen: "restart keycloak"
|
||||||
@@ -69,6 +69,18 @@ argument_specs:
|
|||||||
default: false
|
default: false
|
||||||
description: "Ensure firewalld is running and configure keycloak ports"
|
description: "Ensure firewalld is running and configure keycloak ports"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
|
keycloak_service_restart_always:
|
||||||
|
default: false
|
||||||
|
description: "systemd restart always behavior of service; takes precedence over keycloak_service_restart_on_failure if true"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_service_restart_on_failure:
|
||||||
|
default: false
|
||||||
|
description: "systemd restart on-failure behavior of service"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_service_restartsec:
|
||||||
|
default: "10s"
|
||||||
|
description: "systemd RestartSec for service"
|
||||||
|
type: "str"
|
||||||
keycloak_quarkus_admin_user:
|
keycloak_quarkus_admin_user:
|
||||||
default: "admin"
|
default: "admin"
|
||||||
description: "Administration console user account"
|
description: "Administration console user account"
|
||||||
@@ -138,12 +150,12 @@ argument_specs:
|
|||||||
type: "bool"
|
type: "bool"
|
||||||
keycloak_quarkus_trust_store_file:
|
keycloak_quarkus_trust_store_file:
|
||||||
default: "{{ keycloak.home }}/conf/trust_store.p12"
|
default: "{{ keycloak.home }}/conf/trust_store.p12"
|
||||||
description: "The file pat to the trust store"
|
description: "The file path to the trust store"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_quarkus_trust_store_password:
|
keycloak_quarkus_trust_store_password:
|
||||||
default: ""
|
default: ""
|
||||||
description: "Password for the trust store"
|
description: "Password for the trust store"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_quarkus_https_port:
|
keycloak_quarkus_https_port:
|
||||||
# line 30 of defaults/main.yml
|
# line 30 of defaults/main.yml
|
||||||
default: 8443
|
default: 8443
|
||||||
@@ -156,7 +168,7 @@ argument_specs:
|
|||||||
type: "int"
|
type: "int"
|
||||||
keycloak_quarkus_jgroups_port:
|
keycloak_quarkus_jgroups_port:
|
||||||
# line 32 of defaults/main.yml
|
# line 32 of defaults/main.yml
|
||||||
default: 7600
|
default: 7800
|
||||||
description: "jgroups cluster tcp port"
|
description: "jgroups cluster tcp port"
|
||||||
type: "int"
|
type: "int"
|
||||||
keycloak_quarkus_java_opts:
|
keycloak_quarkus_java_opts:
|
||||||
@@ -169,6 +181,10 @@ argument_specs:
|
|||||||
default: false
|
default: false
|
||||||
description: "Enable auto configuration for database backend, clustering and remote caches on infinispan"
|
description: "Enable auto configuration for database backend, clustering and remote caches on infinispan"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
|
keycloak_quarkus_ha_discovery:
|
||||||
|
default: "TCPPING"
|
||||||
|
description: "Discovery protocol for HA cluster members"
|
||||||
|
type: "str"
|
||||||
keycloak_quarkus_db_enabled:
|
keycloak_quarkus_db_enabled:
|
||||||
# line 38 of defaults/main.yml
|
# line 38 of defaults/main.yml
|
||||||
default: "{{ True if keycloak_quarkus_ha_enabled else False }}"
|
default: "{{ True if keycloak_quarkus_ha_enabled else False }}"
|
||||||
@@ -206,10 +222,10 @@ argument_specs:
|
|||||||
default: "supervisor"
|
default: "supervisor"
|
||||||
description: "Password for connecting to infinispan"
|
description: "Password for connecting to infinispan"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_quarkus_ispn_url:
|
keycloak_quarkus_ispn_hosts:
|
||||||
# line 48 of defaults/main.yml
|
# line 48 of defaults/main.yml
|
||||||
default: "localhost"
|
default: "localhost:11222"
|
||||||
description: "URL for connecting to infinispan"
|
description: "host name/port for connecting to infinispan, eg. host1:11222;host2:11222"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_quarkus_ispn_sasl_mechanism:
|
keycloak_quarkus_ispn_sasl_mechanism:
|
||||||
# line 49 of defaults/main.yml
|
# line 49 of defaults/main.yml
|
||||||
@@ -234,7 +250,7 @@ argument_specs:
|
|||||||
keycloak_quarkus_jdbc_engine:
|
keycloak_quarkus_jdbc_engine:
|
||||||
# line 56 of defaults/main.yml
|
# line 56 of defaults/main.yml
|
||||||
default: "postgres"
|
default: "postgres"
|
||||||
description: "Database engine [mariadb,postres]"
|
description: "Database engine [mariadb,postres,mssql]"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_quarkus_db_user:
|
keycloak_quarkus_db_user:
|
||||||
# line 58 of defaults/main.yml
|
# line 58 of defaults/main.yml
|
||||||
@@ -276,15 +292,89 @@ argument_specs:
|
|||||||
default: '/var/log/keycloak'
|
default: '/var/log/keycloak'
|
||||||
type: "str"
|
type: "str"
|
||||||
description: "Set the destination of the keycloak log folder link"
|
description: "Set the destination of the keycloak log folder link"
|
||||||
|
keycloak_quarkus_log_max_file_size:
|
||||||
|
default: 10M
|
||||||
|
type: "str"
|
||||||
|
description: "Set the maximum log file size before a log rotation happens; A size configuration option recognises string in this format (shown as a regular expression): [0-9]+[KkMmGgTtPpEeZzYy]?. If no suffix is given, assume bytes."
|
||||||
|
keycloak_quarkus_log_max_backup_index:
|
||||||
|
default: 10
|
||||||
|
type: "str"
|
||||||
|
description: "Set the maximum number of archived log files to keep"
|
||||||
|
keycloak_quarkus_log_file_suffix:
|
||||||
|
default: '.yyyy-MM-dd.zip'
|
||||||
|
type: "str"
|
||||||
|
description: "Set the log file handler rotation file suffix. When used, the file will be rotated based on its suffix; Note: If the suffix ends with .zip or .gz, the rotation file will also be compressed."
|
||||||
keycloak_quarkus_proxy_mode:
|
keycloak_quarkus_proxy_mode:
|
||||||
default: 'edge'
|
default: 'edge'
|
||||||
type: "str"
|
type: "str"
|
||||||
description: "The proxy address forwarding mode if the server is behind a reverse proxy. Set to 'none' if not using a proxy"
|
description: "The proxy address forwarding mode if the server is behind a reverse proxy. Set to 'none' if not using a proxy"
|
||||||
keycloak_quarkus_start_dev:
|
keycloak_quarkus_start_dev:
|
||||||
default: False
|
default: false
|
||||||
type: "bool"
|
type: "bool"
|
||||||
description: "Whether to start the service in development mode (start-dev)"
|
description: "Whether to start the service in development mode (start-dev)"
|
||||||
keycloak_quarkus_transaction_xa_enabled:
|
keycloak_quarkus_transaction_xa_enabled:
|
||||||
default: True
|
default: true
|
||||||
type: "bool"
|
type: "bool"
|
||||||
description: "Enable or disable XA transactions which may not be supported by some DBMS"
|
description: "Enable or disable XA transactions which may not be supported by some DBMS"
|
||||||
|
keycloak_quarkus_hostname_strict:
|
||||||
|
default: true
|
||||||
|
type: "bool"
|
||||||
|
description: "Disables dynamically resolving the hostname from request headers. Should always be set to true in production, unless proxy verifies the Host header."
|
||||||
|
keycloak_quarkus_hostname_strict_backchannel:
|
||||||
|
default: false
|
||||||
|
type: "bool"
|
||||||
|
description: "By default backchannel URLs are dynamically resolved from request headers to allow internal and external applications. If all applications use the public URL this option should be enabled."
|
||||||
|
keycloak_quarkus_spi_sticky_session_encoder_infinispan_should_attach_route:
|
||||||
|
default: true
|
||||||
|
type: "bool"
|
||||||
|
description: "If the route should be attached to cookies to reflect the node that owns a particular session. If false, route is not attached to cookies and we rely on the session affinity capabilities from reverse proxy"
|
||||||
|
downstream:
|
||||||
|
options:
|
||||||
|
rhbk_version:
|
||||||
|
default: "22.0.6"
|
||||||
|
description: "Red Hat Build of Keycloak version"
|
||||||
|
type: "str"
|
||||||
|
rhbk_archive:
|
||||||
|
default: "rhbk-{{ rhbk_version }}.zip"
|
||||||
|
description: "Red Hat Build of Keycloak install archive filename"
|
||||||
|
type: "str"
|
||||||
|
rhbk_dest:
|
||||||
|
default: "/opt/rhbk"
|
||||||
|
description: "Root installation directory"
|
||||||
|
type: "str"
|
||||||
|
rhbk_installdir:
|
||||||
|
default: "{{ rhbk_dest }}/rhbk-{{ rhbk_version }}"
|
||||||
|
description: "Installation path for Red Hat Build of Keycloak"
|
||||||
|
type: "str"
|
||||||
|
rhbk_apply_patches:
|
||||||
|
default: false
|
||||||
|
description: "Install Red Hat Build of Keycloak most recent cumulative patch"
|
||||||
|
type: "bool"
|
||||||
|
rhbk_enable:
|
||||||
|
default: true
|
||||||
|
description: "Enable Red Hat Build of Keycloak installation"
|
||||||
|
type: "str"
|
||||||
|
rhbk_offline_install:
|
||||||
|
default: false
|
||||||
|
description: "Perform an offline install"
|
||||||
|
type: "bool"
|
||||||
|
rhbk_service_name:
|
||||||
|
default: "rhbk"
|
||||||
|
description: "systemd service name for Red Hat Build of Keycloak"
|
||||||
|
type: "str"
|
||||||
|
rhbk_service_desc:
|
||||||
|
default: "Red Hat Build of Keycloak"
|
||||||
|
description: "systemd description for Red Hat Build of Keycloak"
|
||||||
|
type: "str"
|
||||||
|
rhbk_patch_version:
|
||||||
|
required: false
|
||||||
|
description: "Red Hat Build of Keycloak latest cumulative patch version to apply; defaults to latest version when rhbk_apply_patches is True"
|
||||||
|
type: "str"
|
||||||
|
rhbk_patch_bundle:
|
||||||
|
default: "rhbk-{{ rhbk_patch_version | default('[0-9]+[.][0-9]+[.][0-9]+') }}-patch.zip"
|
||||||
|
description: "Red Hat Build of Keycloak patch archive filename"
|
||||||
|
type: "str"
|
||||||
|
rhbk_product_category:
|
||||||
|
default: "rhbk"
|
||||||
|
description: "JBossNetwork API category for Red Hat Build of Keycloak"
|
||||||
|
type: "str"
|
||||||
|
|||||||
@@ -11,9 +11,9 @@ galaxy_info:
|
|||||||
min_ansible_version: "2.14"
|
min_ansible_version: "2.14"
|
||||||
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: EL
|
- name: EL
|
||||||
versions:
|
versions:
|
||||||
- "8"
|
- "8"
|
||||||
|
|
||||||
galaxy_tags:
|
galaxy_tags:
|
||||||
- keycloak
|
- keycloak
|
||||||
@@ -24,3 +24,4 @@ galaxy_info:
|
|||||||
- authentication
|
- authentication
|
||||||
- identity
|
- identity
|
||||||
- security
|
- security
|
||||||
|
- rhbk
|
||||||
|
|||||||
@@ -2,15 +2,15 @@
|
|||||||
- name: "Check if packages are already installed" # noqa command-instead-of-module this runs faster
|
- name: "Check if packages are already installed" # noqa command-instead-of-module this runs faster
|
||||||
ansible.builtin.command: "rpm -q {{ packages_list | join(' ') }}"
|
ansible.builtin.command: "rpm -q {{ packages_list | join(' ') }}"
|
||||||
register: rpm_info
|
register: rpm_info
|
||||||
changed_when: False
|
changed_when: false
|
||||||
failed_when: False
|
failed_when: false
|
||||||
|
|
||||||
- name: "Add missing packages to the yum install list"
|
- name: "Add missing packages to the yum install list"
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
packages_to_install: "{{ packages_to_install | default([]) + rpm_info.stdout_lines | map('regex_findall', 'package (.+) is not installed$') | default([]) | flatten }}"
|
packages_to_install: "{{ packages_to_install | default([]) + rpm_info.stdout_lines | map('regex_findall', 'package (.+) is not installed$') | default([]) | flatten }}"
|
||||||
|
|
||||||
- name: "Install packages: {{ packages_to_install }}"
|
- name: "Install packages: {{ packages_to_install }}"
|
||||||
become: True
|
become: true
|
||||||
ansible.builtin.yum:
|
ansible.builtin.yum:
|
||||||
name: "{{ packages_to_install }}"
|
name: "{{ packages_to_install }}"
|
||||||
state: present
|
state: present
|
||||||
|
|||||||
@@ -6,19 +6,19 @@
|
|||||||
- firewalld
|
- firewalld
|
||||||
|
|
||||||
- name: Enable and start the firewalld service
|
- name: Enable and start the firewalld service
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: firewalld
|
name: firewalld
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: started
|
state: started
|
||||||
|
|
||||||
- name: "Configure firewall for {{ keycloak.service_name }} ports"
|
- name: "Configure firewall for {{ keycloak.service_name }} ports"
|
||||||
become: yes
|
become: true
|
||||||
ansible.posix.firewalld:
|
ansible.posix.firewalld:
|
||||||
port: "{{ item }}"
|
port: "{{ item }}"
|
||||||
permanent: true
|
permanent: true
|
||||||
state: enabled
|
state: enabled
|
||||||
immediate: yes
|
immediate: true
|
||||||
loop:
|
loop:
|
||||||
- "{{ keycloak_quarkus_http_port }}/tcp"
|
- "{{ keycloak_quarkus_http_port }}/tcp"
|
||||||
- "{{ keycloak_quarkus_https_port }}/tcp"
|
- "{{ keycloak_quarkus_https_port }}/tcp"
|
||||||
|
|||||||
@@ -11,21 +11,21 @@
|
|||||||
quiet: true
|
quiet: true
|
||||||
|
|
||||||
- name: Check for an existing deployment
|
- name: Check for an existing deployment
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak.home }}"
|
path: "{{ keycloak.home }}"
|
||||||
register: existing_deploy
|
register: existing_deploy
|
||||||
|
|
||||||
- name: "Create {{ keycloak.service_name }} service user/group"
|
- name: "Create {{ keycloak.service_name }} service user/group"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.user:
|
ansible.builtin.user:
|
||||||
name: "{{ keycloak.service_user }}"
|
name: "{{ keycloak.service_user }}"
|
||||||
home: /opt/keycloak
|
home: /opt/keycloak
|
||||||
system: yes
|
system: true
|
||||||
create_home: no
|
create_home: no
|
||||||
|
|
||||||
- name: "Create {{ keycloak.service_name }} install location"
|
- name: "Create {{ keycloak.service_name }} install location"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
dest: "{{ keycloak_quarkus_dest }}"
|
dest: "{{ keycloak_quarkus_dest }}"
|
||||||
state: directory
|
state: directory
|
||||||
@@ -39,7 +39,7 @@
|
|||||||
archive: "{{ keycloak_quarkus_dest }}/{{ keycloak.bundle }}"
|
archive: "{{ keycloak_quarkus_dest }}/{{ keycloak.bundle }}"
|
||||||
|
|
||||||
- name: Check download archive path
|
- name: Check download archive path
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ archive }}"
|
path: "{{ archive }}"
|
||||||
register: archive_path
|
register: archive_path
|
||||||
@@ -57,11 +57,51 @@
|
|||||||
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
||||||
mode: 0640
|
mode: 0640
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
|
run_once: true
|
||||||
when:
|
when:
|
||||||
- archive_path is defined
|
- archive_path is defined
|
||||||
- archive_path.stat is defined
|
- archive_path.stat is defined
|
||||||
- not archive_path.stat.exists
|
- not archive_path.stat.exists
|
||||||
- not keycloak.offline_install
|
- not keycloak.offline_install
|
||||||
|
- not rhbk_enable is defined or not rhbk_enable
|
||||||
|
|
||||||
|
- name: Perform download from RHN using JBoss Network API
|
||||||
|
delegate_to: localhost
|
||||||
|
run_once: true
|
||||||
|
when:
|
||||||
|
- archive_path is defined
|
||||||
|
- archive_path.stat is defined
|
||||||
|
- not archive_path.stat.exists
|
||||||
|
- rhbk_enable is defined and rhbk_enable
|
||||||
|
- not keycloak.offline_install
|
||||||
|
block:
|
||||||
|
- name: Retrieve product download using JBoss Network API
|
||||||
|
middleware_automation.common.product_search:
|
||||||
|
client_id: "{{ rhn_username }}"
|
||||||
|
client_secret: "{{ rhn_password }}"
|
||||||
|
product_type: DISTRIBUTION
|
||||||
|
product_version: "{{ rhbk_version }}"
|
||||||
|
product_category: "{{ rhbk_product_category }}"
|
||||||
|
register: rhn_products
|
||||||
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
|
delegate_to: localhost
|
||||||
|
run_once: true
|
||||||
|
|
||||||
|
- name: Determine install zipfile from search results
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
rhn_filtered_products: "{{ rhn_products.results | selectattr('file_path', 'match', '[^/]*/' + rhbk_archive + '$') }}"
|
||||||
|
delegate_to: localhost
|
||||||
|
run_once: true
|
||||||
|
|
||||||
|
- name: Download Red Hat Build of Keycloak
|
||||||
|
middleware_automation.common.product_download: # noqa risky-file-permissions delegated, uses controller host user
|
||||||
|
client_id: "{{ rhn_username }}"
|
||||||
|
client_secret: "{{ rhn_password }}"
|
||||||
|
product_id: "{{ (rhn_filtered_products | first).id }}"
|
||||||
|
dest: "{{ local_path.stat.path }}/{{ keycloak.bundle }}"
|
||||||
|
no_log: "{{ omit_rhn_output | default(true) }}"
|
||||||
|
delegate_to: localhost
|
||||||
|
run_once: true
|
||||||
|
|
||||||
- name: Check downloaded archive
|
- name: Check downloaded archive
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
@@ -76,29 +116,29 @@
|
|||||||
dest: "{{ archive }}"
|
dest: "{{ archive }}"
|
||||||
owner: "{{ keycloak.service_user }}"
|
owner: "{{ keycloak.service_user }}"
|
||||||
group: "{{ keycloak.service_group }}"
|
group: "{{ keycloak.service_group }}"
|
||||||
mode: 0750
|
mode: 0640
|
||||||
register: new_version_downloaded
|
register: new_version_downloaded
|
||||||
when:
|
when:
|
||||||
- not archive_path.stat.exists
|
- not archive_path.stat.exists
|
||||||
- local_archive_path.stat is defined
|
- local_archive_path.stat is defined
|
||||||
- local_archive_path.stat.exists
|
- local_archive_path.stat.exists
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Check target directory: {{ keycloak.home }}/bin/"
|
- name: "Check target directory: {{ keycloak.home }}/bin/"
|
||||||
ansible.builtin.stat:
|
ansible.builtin.stat:
|
||||||
path: "{{ keycloak.home }}/bin/"
|
path: "{{ keycloak.home }}/bin/"
|
||||||
register: path_to_workdir
|
register: path_to_workdir
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: "Extract Keycloak archive on target"
|
- name: "Extract Keycloak archive on target"
|
||||||
ansible.builtin.unarchive:
|
ansible.builtin.unarchive:
|
||||||
remote_src: yes
|
remote_src: true
|
||||||
src: "{{ archive }}"
|
src: "{{ archive }}"
|
||||||
dest: "{{ keycloak_quarkus_dest }}"
|
dest: "{{ keycloak_quarkus_dest }}"
|
||||||
creates: "{{ keycloak.home }}/bin/"
|
creates: "{{ keycloak.home }}/bin/"
|
||||||
owner: "{{ keycloak.service_user }}"
|
owner: "{{ keycloak.service_user }}"
|
||||||
group: "{{ keycloak.service_group }}"
|
group: "{{ keycloak.service_group }}"
|
||||||
become: yes
|
become: true
|
||||||
when:
|
when:
|
||||||
- (not path_to_workdir.stat.exists) or new_version_downloaded.changed
|
- (not path_to_workdir.stat.exists) or new_version_downloaded.changed
|
||||||
notify:
|
notify:
|
||||||
@@ -109,3 +149,9 @@
|
|||||||
msg: "{{ keycloak.home }} already exists and version unchanged, skipping decompression"
|
msg: "{{ keycloak.home }} already exists and version unchanged, skipping decompression"
|
||||||
when:
|
when:
|
||||||
- (not new_version_downloaded.changed) and path_to_workdir.stat.exists
|
- (not new_version_downloaded.changed) and path_to_workdir.stat.exists
|
||||||
|
|
||||||
|
- name: "Install {{ keycloak_quarkus_jdbc_engine }} JDBC driver"
|
||||||
|
ansible.builtin.include_tasks: jdbc_driver.yml
|
||||||
|
when:
|
||||||
|
- rhbk_enable is defined and rhbk_enable
|
||||||
|
- keycloak_quarkus_default_jdbc[keycloak_quarkus_jdbc_engine].driver_jar_url is defined
|
||||||
|
|||||||
12
roles/keycloak_quarkus/tasks/jdbc_driver.yml
Normal file
12
roles/keycloak_quarkus/tasks/jdbc_driver.yml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Retrieve JDBC Driver from {{ keycloak_jdbc[keycloak_quarkus_jdbc_engine].driver_jar_url }}"
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: "{{ keycloak_quarkus_default_jdbc[keycloak_quarkus_jdbc_engine].driver_jar_url }}"
|
||||||
|
dest: "{{ keycloak.home }}/providers"
|
||||||
|
owner: "{{ keycloak.service_user }}"
|
||||||
|
group: "{{ keycloak.service_group }}"
|
||||||
|
mode: 0640
|
||||||
|
become: true
|
||||||
|
notify:
|
||||||
|
- restart keycloak
|
||||||
@@ -28,8 +28,9 @@
|
|||||||
owner: "{{ keycloak.service_user }}"
|
owner: "{{ keycloak.service_user }}"
|
||||||
group: "{{ keycloak.service_group }}"
|
group: "{{ keycloak.service_group }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
become: yes
|
become: true
|
||||||
notify:
|
notify:
|
||||||
|
- rebuild keycloak config
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
- name: "Configure quarkus config for keycloak service"
|
- name: "Configure quarkus config for keycloak service"
|
||||||
@@ -39,9 +40,35 @@
|
|||||||
owner: "{{ keycloak.service_user }}"
|
owner: "{{ keycloak.service_user }}"
|
||||||
group: "{{ keycloak.service_group }}"
|
group: "{{ keycloak.service_group }}"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
become: yes
|
become: true
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
|
- name: Create tcpping cluster node list
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
keycloak_quarkus_cluster_nodes: >
|
||||||
|
{{ keycloak_quarkus_cluster_nodes | default([]) + [
|
||||||
|
{
|
||||||
|
"name": item,
|
||||||
|
"address": 'jgroups-' + item,
|
||||||
|
"inventory_host": hostvars[item].ansible_default_ipv4.address | default(item) + '[' + (keycloak_quarkus_jgroups_port | string) + ']',
|
||||||
|
"value": hostvars[item].ansible_default_ipv4.address | default(item)
|
||||||
|
}
|
||||||
|
] }}
|
||||||
|
loop: "{{ ansible_play_batch }}"
|
||||||
|
when: keycloak_quarkus_ha_enabled and keycloak_quarkus_ha_discovery == 'TCPPING'
|
||||||
|
|
||||||
|
- name: "Configure infinispan config for keycloak service"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: cache-ispn.xml.j2
|
||||||
|
dest: "{{ keycloak.home }}/conf/cache-ispn.xml"
|
||||||
|
owner: "{{ keycloak.service_user }}"
|
||||||
|
group: "{{ keycloak.service_group }}"
|
||||||
|
mode: 0644
|
||||||
|
become: true
|
||||||
|
notify:
|
||||||
|
- rebuild keycloak config
|
||||||
|
- restart keycloak
|
||||||
|
|
||||||
- name: Ensure logdirectory exists
|
- name: Ensure logdirectory exists
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
@@ -50,7 +77,7 @@
|
|||||||
owner: "{{ keycloak.service_user }}"
|
owner: "{{ keycloak.service_user }}"
|
||||||
group: "{{ keycloak.service_group }}"
|
group: "{{ keycloak.service_group }}"
|
||||||
mode: 0775
|
mode: 0775
|
||||||
become: yes
|
become: true
|
||||||
|
|
||||||
- name: Flush pending handlers
|
- name: Flush pending handlers
|
||||||
ansible.builtin.meta: flush_handlers
|
ansible.builtin.meta: flush_handlers
|
||||||
@@ -61,12 +88,12 @@
|
|||||||
- name: Check service status
|
- name: Check service status
|
||||||
ansible.builtin.command: "systemctl status keycloak"
|
ansible.builtin.command: "systemctl status keycloak"
|
||||||
register: keycloak_service_status
|
register: keycloak_service_status
|
||||||
changed_when: False
|
changed_when: false
|
||||||
|
|
||||||
- name: Link default logs directory
|
- name: Link default logs directory
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
state: link
|
state: link
|
||||||
src: "{{ keycloak.log.file | dirname }}"
|
src: "{{ keycloak.log.file | dirname }}"
|
||||||
dest: "{{ keycloak_quarkus_log_target }}"
|
dest: "{{ keycloak_quarkus_log_target }}"
|
||||||
force: yes
|
force: true
|
||||||
become: yes
|
become: true
|
||||||
|
|||||||
@@ -3,15 +3,23 @@
|
|||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- keycloak_quarkus_admin_pass | length > 12
|
- keycloak_quarkus_admin_pass | length > 12
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "The console administrator password is empty or invalid. Please set the keycloak_quarkus_admin_pass variable to a 12+ char long string"
|
fail_msg: "The console administrator password is empty or invalid. Please set the keycloak_quarkus_admin_pass variable to a 12+ char long string"
|
||||||
success_msg: "{{ 'Console administrator password OK' }}"
|
success_msg: "{{ 'Console administrator password OK' }}"
|
||||||
|
|
||||||
|
- name: Validate relative path
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- keycloak_quarkus_http_relative_path is regex('^/.*')
|
||||||
|
quiet: true
|
||||||
|
fail_msg: "the relative path must begin with /"
|
||||||
|
success_msg: "{{ 'relative path OK' }}"
|
||||||
|
|
||||||
- name: Validate configuration
|
- name: Validate configuration
|
||||||
ansible.builtin.assert:
|
ansible.builtin.assert:
|
||||||
that:
|
that:
|
||||||
- (keycloak_quarkus_ha_enabled and keycloak_quarkus_db_enabled) or (not keycloak_quarkus_ha_enabled and keycloak_quarkus_db_enabled) or (not keycloak_quarkus_ha_enabled and not keycloak_quarkus_db_enabled)
|
- (keycloak_quarkus_ha_enabled and keycloak_quarkus_db_enabled) or (not keycloak_quarkus_ha_enabled and keycloak_quarkus_db_enabled) or (not keycloak_quarkus_ha_enabled and not keycloak_quarkus_db_enabled)
|
||||||
quiet: True
|
quiet: true
|
||||||
fail_msg: "Cannot install HA setup without a backend database service. Check keycloak_quarkus_ha_enabled and keycloak_quarkus_db_enabled"
|
fail_msg: "Cannot install HA setup without a backend database service. Check keycloak_quarkus_ha_enabled and keycloak_quarkus_db_enabled"
|
||||||
success_msg: "{{ 'Configuring HA' if keycloak_quarkus_ha_enabled else 'Configuring standalone' }}"
|
success_msg: "{{ 'Configuring HA' if keycloak_quarkus_ha_enabled else 'Configuring standalone' }}"
|
||||||
|
|
||||||
|
|||||||
7
roles/keycloak_quarkus/tasks/rebuild_config.yml
Normal file
7
roles/keycloak_quarkus/tasks/rebuild_config.yml
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
---
|
||||||
|
# cf. https://www.keycloak.org/server/configuration#_optimize_the_keycloak_startup
|
||||||
|
- name: "Rebuild {{ keycloak.service_name }} config"
|
||||||
|
ansible.builtin.shell: |
|
||||||
|
{{ keycloak.home }}/bin/kc.sh build
|
||||||
|
become: true
|
||||||
|
changed_when: true
|
||||||
@@ -2,6 +2,7 @@
|
|||||||
- name: "Restart and enable {{ keycloak.service_name }} service"
|
- name: "Restart and enable {{ keycloak.service_name }} service"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: restarted
|
state: restarted
|
||||||
become: yes
|
daemon_reload: true
|
||||||
|
become: true
|
||||||
|
|||||||
@@ -2,9 +2,10 @@
|
|||||||
- name: "Start {{ keycloak.service_name }} service"
|
- name: "Start {{ keycloak.service_name }} service"
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: keycloak
|
name: keycloak
|
||||||
enabled: yes
|
enabled: true
|
||||||
state: started
|
state: started
|
||||||
become: yes
|
daemon_reload: true
|
||||||
|
become: true
|
||||||
|
|
||||||
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
- name: "Wait until {{ keycloak.service_name }} becomes active {{ keycloak.health_url }}"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
rpm_java_home: "/etc/alternatives/jre_{{ keycloak_quarkus_jvm_package | regex_search('(?<=java-)[0-9.]+') }}"
|
rpm_java_home: "/etc/alternatives/jre_{{ keycloak_quarkus_jvm_package | regex_search('(?<=java-)[0-9.]+') }}"
|
||||||
|
|
||||||
- name: "Configure sysconfig file for keycloak service"
|
- name: "Configure sysconfig file for keycloak service"
|
||||||
become: yes
|
become: true
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: keycloak-sysconfig.j2
|
src: keycloak-sysconfig.j2
|
||||||
dest: /etc/sysconfig/keycloak
|
dest: /etc/sysconfig/keycloak
|
||||||
@@ -23,13 +23,7 @@
|
|||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0644
|
mode: 0644
|
||||||
become: yes
|
become: true
|
||||||
register: systemdunit
|
register: systemdunit
|
||||||
notify:
|
notify:
|
||||||
- restart keycloak
|
- restart keycloak
|
||||||
|
|
||||||
- name: Reload systemd
|
|
||||||
become: yes
|
|
||||||
ansible.builtin.systemd:
|
|
||||||
daemon_reload: yes
|
|
||||||
when: systemdunit.changed
|
|
||||||
|
|||||||
101
roles/keycloak_quarkus/templates/cache-ispn.xml.j2
Normal file
101
roles/keycloak_quarkus/templates/cache-ispn.xml.j2
Normal file
@@ -0,0 +1,101 @@
|
|||||||
|
<!-- {{ ansible_managed }} -->
|
||||||
|
<!--
|
||||||
|
~ Copyright 2019 Red Hat, Inc. and/or its affiliates
|
||||||
|
~ and other contributors as indicated by the @author tags.
|
||||||
|
~
|
||||||
|
~ Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
|
~ you may not use this file except in compliance with the License.
|
||||||
|
~ You may obtain a copy of the License at
|
||||||
|
~
|
||||||
|
~ http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
~
|
||||||
|
~ Unless required by applicable law or agreed to in writing, software
|
||||||
|
~ distributed under the License is distributed on an "AS IS" BASIS,
|
||||||
|
~ WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||||
|
~ See the License for the specific language governing permissions and
|
||||||
|
~ limitations under the License.
|
||||||
|
-->
|
||||||
|
|
||||||
|
<infinispan
|
||||||
|
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
|
||||||
|
xsi:schemaLocation="urn:infinispan:config:14.0 http://www.infinispan.org/schemas/infinispan-config-14.0.xsd"
|
||||||
|
xmlns="urn:infinispan:config:14.0">
|
||||||
|
|
||||||
|
{% set stack_expression='' %}
|
||||||
|
{% if keycloak_quarkus_ha_enabled and keycloak_quarkus_ha_discovery == 'TCPPING' %}
|
||||||
|
{% set stack_expression='stack="tcpping"' %}
|
||||||
|
<jgroups>
|
||||||
|
<stack name="tcpping" extends="tcp">
|
||||||
|
<!-- <TCP external_addr="${env.KC_EXTERNAL_ADDR}" bind_addr="{{ keycloak_quarkus_bind_address }}" bind_port="{{ keycloak_quarkus_jgroups_port }}" /> -->
|
||||||
|
<TCPPING
|
||||||
|
initial_hosts="{{ keycloak_quarkus_cluster_nodes | map(attribute='inventory_host') | join (',') }}"
|
||||||
|
port_range="0"
|
||||||
|
stack.combine="REPLACE"
|
||||||
|
stack.position="MPING"
|
||||||
|
/>
|
||||||
|
</stack>
|
||||||
|
</jgroups>
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
<cache-container name="keycloak">
|
||||||
|
<transport lock-timeout="60000" {{ stack_expression }}/>
|
||||||
|
<local-cache name="realms" simple-cache="true">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<memory max-count="10000"/>
|
||||||
|
</local-cache>
|
||||||
|
<local-cache name="users" simple-cache="true">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<memory max-count="10000"/>
|
||||||
|
</local-cache>
|
||||||
|
<distributed-cache name="sessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="authenticationSessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="offlineSessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="clientSessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="offlineClientSessions" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<distributed-cache name="loginFailures" owners="2">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
<local-cache name="authorization" simple-cache="true">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<memory max-count="10000"/>
|
||||||
|
</local-cache>
|
||||||
|
<replicated-cache name="work">
|
||||||
|
<expiration lifespan="-1"/>
|
||||||
|
</replicated-cache>
|
||||||
|
<local-cache name="keys" simple-cache="true">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<expiration max-idle="3600000"/>
|
||||||
|
<memory max-count="1000"/>
|
||||||
|
</local-cache>
|
||||||
|
<distributed-cache name="actionTokens" owners="2">
|
||||||
|
<encoding>
|
||||||
|
<key media-type="application/x-java-object"/>
|
||||||
|
<value media-type="application/x-java-object"/>
|
||||||
|
</encoding>
|
||||||
|
<expiration max-idle="-1" lifespan="-1" interval="300000"/>
|
||||||
|
<memory max-count="-1"/>
|
||||||
|
</distributed-cache>
|
||||||
|
</cache-container>
|
||||||
|
</infinispan>
|
||||||
@@ -1,5 +1,6 @@
|
|||||||
# {{ ansible_managed }}
|
# {{ ansible_managed }}
|
||||||
KEYCLOAK_ADMIN={{ keycloak_quarkus_admin_user }}
|
KEYCLOAK_ADMIN={{ keycloak_quarkus_admin_user }}
|
||||||
KEYCLOAK_ADMIN_PASSWORD='{{ keycloak_quarkus_admin_pass }}'
|
KEYCLOAK_ADMIN_PASSWORD='{{ keycloak_quarkus_admin_pass }}'
|
||||||
PATH={{ keycloak_java_home | default(keycloak_rpm_java_home, true) }}/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
PATH={{ keycloak_quarkus_java_home | default(keycloak_rpm_java_home, true) }}/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
||||||
JAVA_HOME={{ keycloak_java_home | default(keycloak_rpm_java_home, true) }}
|
JAVA_HOME={{ keycloak_quarkus_java_home | default(keycloak_rpm_java_home, true) }}
|
||||||
|
JAVA_OPTS_APPEND={{ keycloak_quarkus_java_opts }}
|
||||||
|
|||||||
@@ -9,11 +9,11 @@ db-password={{ keycloak_quarkus_db_pass }}
|
|||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
# Observability
|
# Observability
|
||||||
metrics-enabled={{ keycloak_quarkus_metrics_enabled }}
|
metrics-enabled={{ keycloak_quarkus_metrics_enabled | lower }}
|
||||||
health-enabled={{ keycloak_quarkus_health_enabled }}
|
health-enabled={{ keycloak_quarkus_health_enabled | lower }}
|
||||||
|
|
||||||
# HTTP
|
# HTTP
|
||||||
http-enabled={{ keycloak_quarkus_http_enabled }}
|
http-enabled={{ keycloak_quarkus_http_enabled | lower }}
|
||||||
http-port={{ keycloak_quarkus_http_port }}
|
http-port={{ keycloak_quarkus_http_port }}
|
||||||
http-relative-path={{ keycloak_quarkus_http_relative_path }}
|
http-relative-path={{ keycloak_quarkus_http_relative_path }}
|
||||||
|
|
||||||
@@ -41,23 +41,26 @@ hostname-port={{ keycloak_quarkus_port }}
|
|||||||
hostname-path={{ keycloak_quarkus_path }}
|
hostname-path={{ keycloak_quarkus_path }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
hostname-admin-url={{ keycloak_quarkus_admin_url }}
|
hostname-admin-url={{ keycloak_quarkus_admin_url }}
|
||||||
|
hostname-strict={{ keycloak_quarkus_hostname_strict | lower }}
|
||||||
|
hostname-strict-backchannel={{ keycloak_quarkus_hostname_strict_backchannel | lower }}
|
||||||
|
|
||||||
# Cluster
|
# Cluster
|
||||||
{% if keycloak_quarkus_ha_enabled %}
|
{% if keycloak_quarkus_ha_enabled %}
|
||||||
cache=ispn
|
cache=ispn
|
||||||
cache-config-file=cache-ispn.xml
|
cache-config-file=cache-ispn.xml
|
||||||
cache-stack=tcp
|
{% if keycloak_quarkus_ha_enabled and keycloak_quarkus_ha_discovery == 'TCPPING' %}
|
||||||
|
# cache-stack=tcp # configured directly in `cache-ispn.xml`
|
||||||
|
{% endif %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if keycloak_quarkus_proxy_mode is defined and keycloak_quarkus_proxy_mode != "none" %}
|
{% if keycloak_quarkus_proxy_mode is defined and keycloak_quarkus_proxy_mode != "none" %}
|
||||||
# Proxy
|
# Proxy
|
||||||
proxy={{ keycloak_quarkus_proxy_mode }}
|
proxy={{ keycloak_quarkus_proxy_mode }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
# Do not attach route to cookies and rely on the session affinity capabilities from reverse proxy
|
spi-sticky-session-encoder-infinispan-should-attach-route={{ keycloak_quarkus_spi_sticky_session_encoder_infinispan_should_attach_route | d(true) | lower }}
|
||||||
#spi-sticky-session-encoder-infinispan-should-attach-route=false
|
|
||||||
|
|
||||||
# Transaction
|
# Transaction
|
||||||
transaction-xa-enabled={{ keycloak_quarkus_transaction_xa_enabled }}
|
transaction-xa-enabled={{ keycloak_quarkus_transaction_xa_enabled | lower }}
|
||||||
|
|
||||||
# Logging
|
# Logging
|
||||||
#log-format=%d{yyyy-MM-dd HH:mm:ss,SSS} %-5p [%c] (%t) %s%e%n
|
#log-format=%d{yyyy-MM-dd HH:mm:ss,SSS} %-5p [%c] (%t) %s%e%n
|
||||||
|
|||||||
@@ -10,9 +10,19 @@ PIDFile={{ keycloak_quarkus_service_pidfile }}
|
|||||||
{% if keycloak_quarkus_start_dev %}
|
{% if keycloak_quarkus_start_dev %}
|
||||||
ExecStart={{ keycloak.home }}/bin/kc.sh start-dev
|
ExecStart={{ keycloak.home }}/bin/kc.sh start-dev
|
||||||
{% else %}
|
{% else %}
|
||||||
ExecStart={{ keycloak.home }}/bin/kc.sh start --log={{ keycloak_quarkus_log }}
|
ExecStart={{ keycloak.home }}/bin/kc.sh start --optimized
|
||||||
{% endif %}
|
{% endif %}
|
||||||
User={{ keycloak.service_user }}
|
User={{ keycloak.service_user }}
|
||||||
|
Group={{ keycloak.service_group }}
|
||||||
|
{% if keycloak_quarkus_service_restart_always %}
|
||||||
|
Restart=always
|
||||||
|
{% elif keycloak_quarkus_service_restart_on_failure %}
|
||||||
|
Restart=on-failure
|
||||||
|
{% endif %}
|
||||||
|
RestartSec={{ keycloak_quarkus_service_restartsec }}
|
||||||
|
{% if keycloak_quarkus_http_port|int < 1024 or keycloak_quarkus_https_port|int < 1024 %}
|
||||||
|
AmbientCapabilities=CAP_NET_BIND_SERVICE
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
|
|||||||
@@ -1,10 +1,16 @@
|
|||||||
# {{ ansible_managed }}
|
# {{ ansible_managed }}
|
||||||
{% if keycloak_quarkus_ha_enabled %}
|
{% if keycloak_quarkus_ha_enabled %}
|
||||||
quarkus.infinispan-client.server-list={{ keycloak_quarkus_ispn_url }}
|
{% if not rhbk_enable or keycloak_quarkus_version.split('.')[0]|int < 22 %}
|
||||||
quarkus.infinispan-client.client-intelligence=HASH_DISTRIBUTION_AWARE
|
quarkus.infinispan-client.server-list={{ keycloak_quarkus_ispn_hosts }}
|
||||||
quarkus.infinispan-client.use-auth=true
|
|
||||||
quarkus.infinispan-client.auth-username={{ keycloak_quarkus_ispn_user }}
|
quarkus.infinispan-client.auth-username={{ keycloak_quarkus_ispn_user }}
|
||||||
quarkus.infinispan-client.auth-password={{ keycloak_quarkus_ispn_pass }}
|
quarkus.infinispan-client.auth-password={{ keycloak_quarkus_ispn_pass }}
|
||||||
|
{% else %}
|
||||||
|
quarkus.infinispan-client.hosts={{ keycloak_quarkus_ispn_hosts }}
|
||||||
|
quarkus.infinispan-client.username={{ keycloak_quarkus_ispn_user }}
|
||||||
|
quarkus.infinispan-client.password={{ keycloak_quarkus_ispn_pass }}
|
||||||
|
{% endif %}
|
||||||
|
quarkus.infinispan-client.client-intelligence=HASH_DISTRIBUTION_AWARE
|
||||||
|
quarkus.infinispan-client.use-auth=true
|
||||||
quarkus.infinispan-client.auth-realm=default
|
quarkus.infinispan-client.auth-realm=default
|
||||||
quarkus.infinispan-client.auth-server-name=infinispan
|
quarkus.infinispan-client.auth-server-name=infinispan
|
||||||
quarkus.infinispan-client.sasl-mechanism={{ keycloak_quarkus_ispn_sasl_mechanism }}
|
quarkus.infinispan-client.sasl-mechanism={{ keycloak_quarkus_ispn_sasl_mechanism }}
|
||||||
@@ -14,6 +20,10 @@ quarkus.infinispan-client.trust-store-password={{ keycloak_quarkus_ispn_trust_st
|
|||||||
quarkus.infinispan-client.trust-store-type=jks
|
quarkus.infinispan-client.trust-store-type=jks
|
||||||
{% endif %}
|
{% endif %}
|
||||||
#quarkus.infinispan-client.use-schema-registration=true
|
#quarkus.infinispan-client.use-schema-registration=true
|
||||||
#quarkus.infinispan-client.auth-client-subject
|
{% endif %}
|
||||||
#quarkus.infinispan-client.auth-callback-handler
|
quarkus.log.file.rotation.max-file-size={{ keycloak_quarkus_log_max_file_size }}
|
||||||
{% endif %}
|
quarkus.log.file.rotation.max-backup-index={{ keycloak_quarkus_log_max_backup_index }}
|
||||||
|
quarkus.log.file.rotation.file-suffix={{ keycloak_quarkus_log_file_suffix }}
|
||||||
|
{% if keycloak_quarkus_db_enabled %}
|
||||||
|
quarkus.transaction-manager.enable-recovery=true
|
||||||
|
{% endif %}
|
||||||
|
|||||||
@@ -40,7 +40,7 @@ keycloak_clients: []
|
|||||||
keycloak_client_default_roles: []
|
keycloak_client_default_roles: []
|
||||||
|
|
||||||
# if True, create a public client; otherwise, a confidetial client
|
# if True, create a public client; otherwise, a confidetial client
|
||||||
keycloak_client_public: True
|
keycloak_client_public: true
|
||||||
|
|
||||||
# allowed web origins for the client
|
# allowed web origins for the client
|
||||||
keycloak_client_web_origins: '+'
|
keycloak_client_web_origins: '+'
|
||||||
|
|||||||
@@ -94,7 +94,7 @@ argument_specs:
|
|||||||
downstream:
|
downstream:
|
||||||
options:
|
options:
|
||||||
sso_version:
|
sso_version:
|
||||||
default: "7.5.0"
|
default: "7.6.0"
|
||||||
description: "Red Hat Single Sign-On version"
|
description: "Red Hat Single Sign-On version"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_dest:
|
sso_dest:
|
||||||
@@ -106,10 +106,30 @@ argument_specs:
|
|||||||
description: "Installation path for Red Hat SSO"
|
description: "Installation path for Red Hat SSO"
|
||||||
type: "str"
|
type: "str"
|
||||||
sso_apply_patches:
|
sso_apply_patches:
|
||||||
default: False
|
default: false
|
||||||
description: "Install Red Hat SSO most recent cumulative patch"
|
description: "Install Red Hat SSO most recent cumulative patch"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
sso_enable:
|
sso_enable:
|
||||||
default: True
|
default: true
|
||||||
description: "Enable Red Hat Single Sign-on installation"
|
description: "Enable Red Hat Single Sign-on installation"
|
||||||
type: "str"
|
type: "str"
|
||||||
|
rhbk_version:
|
||||||
|
default: "22.0.6"
|
||||||
|
description: "Red Hat Build of Keycloak version"
|
||||||
|
type: "str"
|
||||||
|
rhbk_archive:
|
||||||
|
default: "rhbk-{{ rhbk_version }}.zip"
|
||||||
|
description: "Red Hat Build of Keycloak install archive filename"
|
||||||
|
type: "str"
|
||||||
|
rhbk_dest:
|
||||||
|
default: "/opt/rhbk"
|
||||||
|
description: "Root installation directory"
|
||||||
|
type: "str"
|
||||||
|
rhbk_installdir:
|
||||||
|
default: "{{ rhbk_dest }}/rhbk-{{ rhbk_version.split('.')[0] }}.{{ rhbk_version.split('.')[1] }}"
|
||||||
|
description: "Installation path for Red Hat Build of Keycloak"
|
||||||
|
type: "str"
|
||||||
|
rhbk_enable:
|
||||||
|
default: true
|
||||||
|
description: "Enable Red Hat Build of Keycloak installation"
|
||||||
|
type: "str"
|
||||||
|
|||||||
@@ -11,9 +11,9 @@ galaxy_info:
|
|||||||
min_ansible_version: "2.14"
|
min_ansible_version: "2.14"
|
||||||
|
|
||||||
platforms:
|
platforms:
|
||||||
- name: EL
|
- name: EL
|
||||||
versions:
|
versions:
|
||||||
- "8"
|
- "8"
|
||||||
|
|
||||||
galaxy_tags:
|
galaxy_tags:
|
||||||
- keycloak
|
- keycloak
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
url: "{{ keycloak_url }}{{ keycloak_context }}/realms/master/protocol/openid-connect/token"
|
url: "{{ keycloak_url }}{{ keycloak_context }}/realms/master/protocol/openid-connect/token"
|
||||||
method: POST
|
method: POST
|
||||||
body: "client_id={{ keycloak_auth_client }}&username={{ keycloak_admin_user }}&password={{ keycloak_admin_password }}&grant_type=password"
|
body: "client_id={{ keycloak_auth_client }}&username={{ keycloak_admin_user }}&password={{ keycloak_admin_password }}&grant_type=password"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
no_log: "{{ keycloak_no_log | default('True') }}"
|
no_log: "{{ keycloak_no_log | default('True') }}"
|
||||||
register: keycloak_auth_response
|
register: keycloak_auth_response
|
||||||
until: keycloak_auth_response.status == 200
|
until: keycloak_auth_response.status == 200
|
||||||
@@ -28,7 +28,7 @@
|
|||||||
url: "{{ keycloak_url }}{{ keycloak_context }}/admin/realms"
|
url: "{{ keycloak_url }}{{ keycloak_context }}/admin/realms"
|
||||||
method: POST
|
method: POST
|
||||||
body: "{{ lookup('template', 'realm.json.j2') }}"
|
body: "{{ lookup('template', 'realm.json.j2') }}"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
body_format: json
|
body_format: json
|
||||||
headers:
|
headers:
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
@@ -59,7 +59,7 @@
|
|||||||
- item.name is defined and item.name | length > 0
|
- item.name is defined and item.name | length > 0
|
||||||
- (item.client_id is defined and item.client_id | length > 0) or (item.id is defined and item.id | length > 0)
|
- (item.client_id is defined and item.client_id | length > 0) or (item.id is defined and item.id | length > 0)
|
||||||
fail_msg: "For each keycloak client, attributes `name` and either `id` or `client_id` is required"
|
fail_msg: "For each keycloak client, attributes `name` and either `id` or `client_id` is required"
|
||||||
quiet: True
|
quiet: true
|
||||||
loop: "{{ keycloak_clients | flatten }}"
|
loop: "{{ keycloak_clients | flatten }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.name | default('unnamed client') }}"
|
label: "{{ item.name | default('unnamed client') }}"
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
- name: "Check if User Already Exists"
|
- name: "Check if User Already Exists"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "{{ keycloak_url }}{{ keycloak_context }}/admin/realms/{{ keycloak_realm }}/users?username={{ user.username }}"
|
url: "{{ keycloak_url }}{{ keycloak_context }}/admin/realms/{{ keycloak_realm }}/users?username={{ user.username }}"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
headers:
|
headers:
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
register: keycloak_user_search_result
|
register: keycloak_user_search_result
|
||||||
@@ -18,7 +18,7 @@
|
|||||||
email: "{{ user.email | default(omit) }}"
|
email: "{{ user.email | default(omit) }}"
|
||||||
firstName: "{{ user.firstName | default(omit) }}"
|
firstName: "{{ user.firstName | default(omit) }}"
|
||||||
lastName: "{{ user.lastName | default(omit) }}"
|
lastName: "{{ user.lastName | default(omit) }}"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
body_format: json
|
body_format: json
|
||||||
headers:
|
headers:
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
@@ -28,7 +28,7 @@
|
|||||||
- name: "Get User"
|
- name: "Get User"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "{{ keycloak_url }}{{ keycloak_context }}/admin/realms/{{ keycloak_realm }}/users?username={{ user.username }}"
|
url: "{{ keycloak_url }}{{ keycloak_context }}/admin/realms/{{ keycloak_realm }}/users?username={{ user.username }}"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
headers:
|
headers:
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
register: keycloak_user
|
register: keycloak_user
|
||||||
@@ -41,7 +41,7 @@
|
|||||||
type: password
|
type: password
|
||||||
temporary: false
|
temporary: false
|
||||||
value: "{{ user.password }}"
|
value: "{{ user.password }}"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
body_format: json
|
body_format: json
|
||||||
status_code:
|
status_code:
|
||||||
- 200
|
- 200
|
||||||
|
|||||||
@@ -31,7 +31,7 @@
|
|||||||
containerId: "{{ item.containerId }}"
|
containerId: "{{ item.containerId }}"
|
||||||
name: "{{ item.name }}"
|
name: "{{ item.name }}"
|
||||||
composite: "{{ item.composite }}"
|
composite: "{{ item.composite }}"
|
||||||
validate_certs: False
|
validate_certs: false
|
||||||
body_format: json
|
body_format: json
|
||||||
headers:
|
headers:
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "{{ keycloak_url }}{{ keycloak_context }}/admin/realms/{{ keycloak_realm }}/users?username={{ user.username }}"
|
url: "{{ keycloak_url }}{{ keycloak_context }}/admin/realms/{{ keycloak_realm }}/users?username={{ user.username }}"
|
||||||
headers:
|
headers:
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
Authorization: "Bearer {{ keycloak_auth_response.json.access_token }}"
|
||||||
register: keycloak_user
|
register: keycloak_user
|
||||||
|
|
||||||
@@ -12,7 +12,7 @@
|
|||||||
url: "{{ keycloak_url }}{{ keycloak_context }}/realms/master/protocol/openid-connect/token"
|
url: "{{ keycloak_url }}{{ keycloak_context }}/realms/master/protocol/openid-connect/token"
|
||||||
method: POST
|
method: POST
|
||||||
body: "client_id={{ keycloak_auth_client }}&username={{ keycloak_admin_user }}&password={{ keycloak_admin_password }}&grant_type=password"
|
body: "client_id={{ keycloak_auth_client }}&username={{ keycloak_admin_user }}&password={{ keycloak_admin_password }}&grant_type=password"
|
||||||
validate_certs: no
|
validate_certs: false
|
||||||
register: keycloak_auth_response
|
register: keycloak_auth_response
|
||||||
no_log: "{{ keycloak_no_log | default('True') }}"
|
no_log: "{{ keycloak_no_log | default('True') }}"
|
||||||
until: keycloak_auth_response.status == 200
|
until: keycloak_auth_response.status == 200
|
||||||
|
|||||||
@@ -5,5 +5,5 @@
|
|||||||
keycloak_realm:
|
keycloak_realm:
|
||||||
|
|
||||||
# other settings
|
# other settings
|
||||||
keycloak_url: "http://{{ keycloak_host }}:{{ keycloak_http_port + ( keycloak_jboss_port_offset | default(0) ) }}"
|
keycloak_url: "http://{{ keycloak_host }}:{{ keycloak_http_port + (keycloak_jboss_port_offset | default(0)) }}"
|
||||||
keycloak_management_url: "http://{{ keycloak_host }}:{{ keycloak_management_http_port + ( keycloak_jboss_port_offset | default(0) ) }}"
|
keycloak_management_url: "http://{{ keycloak_host }}:{{ keycloak_management_http_port + (keycloak_jboss_port_offset | default(0)) }}"
|
||||||
|
|||||||
Reference in New Issue
Block a user