mirror of
https://github.com/ansible-middleware/keycloak.git
synced 2026-05-07 05:43:12 +00:00
Compare commits
17 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
2985f808ea | ||
|
|
30309582f3 | ||
|
|
40229631e6 | ||
|
|
8adc018cb3 | ||
|
|
053d0f9873 | ||
|
|
eb80ed0bd4 | ||
|
|
d138b4b2ff | ||
|
|
922e4c10f5 | ||
|
|
313bd8452a | ||
|
|
b1b31427d5 | ||
|
|
b057f0297a | ||
|
|
bfd9db6703 | ||
|
|
1d5ce87c16 | ||
|
|
83bcb6712a | ||
|
|
dab388d744 | ||
|
|
ed6dbd60fb | ||
|
|
db19fd5d19 |
@@ -6,6 +6,22 @@ middleware_automation.keycloak Release Notes
|
|||||||
|
|
||||||
This changelog describes changes after version 0.2.6.
|
This changelog describes changes after version 0.2.6.
|
||||||
|
|
||||||
|
v2.0.2
|
||||||
|
======
|
||||||
|
|
||||||
|
Minor Changes
|
||||||
|
-------------
|
||||||
|
|
||||||
|
- keycloak_quarkus: Add support for sqlserver jdbc driver `#148 <https://github.com/ansible-middleware/keycloak/pull/148>`_
|
||||||
|
- keycloak_quarkus: allow configuration of ``hostname-strict-backchannel`` `#152 <https://github.com/ansible-middleware/keycloak/pull/152>`_
|
||||||
|
- keycloak_quarkus: systemd restart behavior `#145 <https://github.com/ansible-middleware/keycloak/pull/145>`_
|
||||||
|
|
||||||
|
Bugfixes
|
||||||
|
--------
|
||||||
|
|
||||||
|
- keycloak_quarkus: Use ``keycloak_quarkus_java_opts`` `#154 <https://github.com/ansible-middleware/keycloak/pull/154>`_
|
||||||
|
- keycloak_quarkus: allow ports <1024 (e.g. :443) in systemd unit `#150 <https://github.com/ansible-middleware/keycloak/pull/150>`_
|
||||||
|
|
||||||
v2.0.1
|
v2.0.1
|
||||||
======
|
======
|
||||||
|
|
||||||
|
|||||||
24
README.md
24
README.md
@@ -3,10 +3,10 @@
|
|||||||
<!--start build_status -->
|
<!--start build_status -->
|
||||||
[](https://github.com/ansible-middleware/keycloak/actions/workflows/ci.yml)
|
[](https://github.com/ansible-middleware/keycloak/actions/workflows/ci.yml)
|
||||||
|
|
||||||
> **_NOTE:_ If you are Red Hat customer, install `redhat.sso` from [Automation Hub](https://console.redhat.com/ansible/ansible-dashboard) as the certified version of this collection.**
|
> **_NOTE:_ If you are Red Hat customer, install `redhat.sso` (for Red Hat Single Sign-On) or `redhat.rhbk` (for Red Hat Build of Keycloak) from [Automation Hub](https://console.redhat.com/ansible/ansible-dashboard) as the certified version of this collection.**
|
||||||
|
|
||||||
<!--end build_status -->
|
<!--end build_status -->
|
||||||
Collection to install and configure [Keycloak](https://www.keycloak.org/) or [Red Hat Single Sign-On](https://access.redhat.com/products/red-hat-single-sign-on).
|
Collection to install and configure [Keycloak](https://www.keycloak.org/) or [Red Hat Single Sign-On](https://access.redhat.com/products/red-hat-single-sign-on) / [Red Hat Build of Keycloak](https://access.redhat.com/products/red-hat-build-of-keycloak).
|
||||||
|
|
||||||
<!--start requires_ansible-->
|
<!--start requires_ansible-->
|
||||||
## Ansible version compatibility
|
## Ansible version compatibility
|
||||||
@@ -47,7 +47,7 @@ A requirement file is provided to install:
|
|||||||
<!--start roles_paths -->
|
<!--start roles_paths -->
|
||||||
### Included roles
|
### Included roles
|
||||||
|
|
||||||
* [`keycloak`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md): role for installing the service.
|
* [`keycloak`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md): role for installing the service (keycloak <= 19.0).
|
||||||
* [`keycloak_realm`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md): role for configuring a realm, user federation(s), clients and users, in an installed service.
|
* [`keycloak_realm`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md): role for configuring a realm, user federation(s), clients and users, in an installed service.
|
||||||
* [`keycloak_quarkus`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_quarkus/README.md): role for installing the quarkus variant of keycloak (>= 17.0.0).
|
* [`keycloak_quarkus`](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_quarkus/README.md): role for installing the quarkus variant of keycloak (>= 17.0.0).
|
||||||
<!--end roles_paths -->
|
<!--end roles_paths -->
|
||||||
@@ -56,13 +56,14 @@ A requirement file is provided to install:
|
|||||||
|
|
||||||
|
|
||||||
### Install Playbook
|
### Install Playbook
|
||||||
|
<!--start rhbk_playbook -->
|
||||||
* [`playbooks/keycloak.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak.yml) installs based on the defined variables (using most defaults).
|
* [`playbooks/keycloak.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak.yml) installs keycloak legacy based on the defined variables (using most defaults).
|
||||||
|
* [`playbooks/keycloak_quarkus.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_quarkus.yml) installs keycloak >= 17 based on the defined variables (using most defaults).
|
||||||
|
|
||||||
Both playbooks include the `keycloak` role, with different settings, as described in the following sections.
|
Both playbooks include the `keycloak` role, with different settings, as described in the following sections.
|
||||||
|
|
||||||
For full service configuration details, refer to the [keycloak role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md).
|
For full service configuration details, refer to the [keycloak role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak/README.md).
|
||||||
|
<!--end rhbk_playbook -->
|
||||||
|
|
||||||
#### Install from controller node (offline)
|
#### Install from controller node (offline)
|
||||||
|
|
||||||
@@ -106,9 +107,9 @@ Note: when deploying clustered configurations, all hosts belonging to the cluste
|
|||||||
|
|
||||||
|
|
||||||
### Config Playbook
|
### Config Playbook
|
||||||
|
<!--start rhbk_realm_playbook -->
|
||||||
[`playbooks/keycloak_realm.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_realm.yml) creates or updates provided realm, user federation(s), client(s), client role(s) and client user(s).
|
[`playbooks/keycloak_realm.yml`](https://github.com/ansible-middleware/keycloak/blob/main/playbooks/keycloak_realm.yml) creates or updates provided realm, user federation(s), client(s), client role(s) and client user(s).
|
||||||
|
<!--end rhbk_realm_playbook -->
|
||||||
|
|
||||||
### Example configuration command
|
### Example configuration command
|
||||||
|
|
||||||
@@ -126,9 +127,9 @@ ansible-playbook -i <ansible_hosts> playbooks/keycloak_realm.yml -e keycloak_adm
|
|||||||
[keycloak]
|
[keycloak]
|
||||||
localhost ansible_connection=local
|
localhost ansible_connection=local
|
||||||
```
|
```
|
||||||
|
<!--start rhbk_realm_readme -->
|
||||||
For full configuration details, refer to the [keycloak_realm role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md).
|
For full configuration details, refer to the [keycloak_realm role README](https://github.com/ansible-middleware/keycloak/blob/main/roles/keycloak_realm/README.md).
|
||||||
|
<!--end rhbk_realm_readme -->
|
||||||
|
|
||||||
<!--start support -->
|
<!--start support -->
|
||||||
<!--end support -->
|
<!--end support -->
|
||||||
@@ -137,6 +138,7 @@ For full configuration details, refer to the [keycloak_realm role README](https:
|
|||||||
## License
|
## License
|
||||||
|
|
||||||
Apache License v2.0 or later
|
Apache License v2.0 or later
|
||||||
|
<!--start license -->
|
||||||
See [LICENSE](LICENSE) to view the full text.
|
See [LICENSE](LICENSE) to view the full text.
|
||||||
|
<!--end license -->
|
||||||
|
|
||||||
|
|||||||
@@ -359,3 +359,30 @@ releases:
|
|||||||
- 138.yaml
|
- 138.yaml
|
||||||
- 139.yaml
|
- 139.yaml
|
||||||
release_date: '2023-12-07'
|
release_date: '2023-12-07'
|
||||||
|
2.0.2:
|
||||||
|
changes:
|
||||||
|
bugfixes:
|
||||||
|
- 'keycloak_quarkus: Use ``keycloak_quarkus_java_opts`` `#154 <https://github.com/ansible-middleware/keycloak/pull/154>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: allow ports <1024 (e.g. :443) in systemd unit `#150 <https://github.com/ansible-middleware/keycloak/pull/150>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
minor_changes:
|
||||||
|
- 'keycloak_quarkus: Add support for sqlserver jdbc driver `#148 <https://github.com/ansible-middleware/keycloak/pull/148>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: allow configuration of ``hostname-strict-backchannel``
|
||||||
|
`#152 <https://github.com/ansible-middleware/keycloak/pull/152>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
- 'keycloak_quarkus: systemd restart behavior `#145 <https://github.com/ansible-middleware/keycloak/pull/145>`_
|
||||||
|
|
||||||
|
'
|
||||||
|
fragments:
|
||||||
|
- 145.yaml
|
||||||
|
- 148.yaml
|
||||||
|
- 150.yaml
|
||||||
|
- 152.yaml
|
||||||
|
- 154.yaml
|
||||||
|
release_date: '2024-01-17'
|
||||||
|
|||||||
@@ -1,12 +1,13 @@
|
|||||||
---
|
---
|
||||||
namespace: middleware_automation
|
namespace: middleware_automation
|
||||||
name: keycloak
|
name: keycloak
|
||||||
version: "2.0.1"
|
version: "2.0.2"
|
||||||
readme: README.md
|
readme: README.md
|
||||||
authors:
|
authors:
|
||||||
- Romain Pelisse <rpelisse@redhat.com>
|
- Romain Pelisse <rpelisse@redhat.com>
|
||||||
- Guido Grazioli <ggraziol@redhat.com>
|
- Guido Grazioli <ggraziol@redhat.com>
|
||||||
- Pavan Kumar Motaparthi <pmotapar@redhat.com>
|
- Pavan Kumar Motaparthi <pmotapar@redhat.com>
|
||||||
|
- Helmut Wolf <hwo@world-direct.at>
|
||||||
description: Install and configure a keycloak, or Red Hat Single Sign-on, service.
|
description: Install and configure a keycloak, or Red Hat Single Sign-on, service.
|
||||||
license_file: "LICENSE"
|
license_file: "LICENSE"
|
||||||
tags:
|
tags:
|
||||||
|
|||||||
@@ -31,6 +31,9 @@ Role Defaults
|
|||||||
|`keycloak_quarkus_jgroups_port`| jgroups cluster tcp port | `7600` |
|
|`keycloak_quarkus_jgroups_port`| jgroups cluster tcp port | `7600` |
|
||||||
|`keycloak_quarkus_service_user`| Posix account username | `keycloak` |
|
|`keycloak_quarkus_service_user`| Posix account username | `keycloak` |
|
||||||
|`keycloak_quarkus_service_group`| Posix account group | `keycloak` |
|
|`keycloak_quarkus_service_group`| Posix account group | `keycloak` |
|
||||||
|
|`keycloak_quarkus_service_restart_always`| systemd restart always behavior activation | `False` |
|
||||||
|
|`keycloak_quarkus_service_restart_on_failure`| systemd restart on-failure behavior activation | `False` |
|
||||||
|
|`keycloak_quarkus_service_restartsec`| systemd RestartSec | `10s` |
|
||||||
|`keycloak_quarkus_service_pidfile`| Pid file path for service | `/run/keycloak.pid` |
|
|`keycloak_quarkus_service_pidfile`| Pid file path for service | `/run/keycloak.pid` |
|
||||||
|`keycloak_quarkus_jvm_package`| RHEL java package runtime | `java-17-openjdk-headless` |
|
|`keycloak_quarkus_jvm_package`| RHEL java package runtime | `java-17-openjdk-headless` |
|
||||||
|`keycloak_quarkus_java_home`| JAVA_HOME of installed JRE, leave empty for using specified keycloak_quarkus_jvm_package RPM path | `None` |
|
|`keycloak_quarkus_java_home`| JAVA_HOME of installed JRE, leave empty for using specified keycloak_quarkus_jvm_package RPM path | `None` |
|
||||||
@@ -56,13 +59,14 @@ Role Defaults
|
|||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
|`keycloak_quarkus_http_relative_path`| Set the path relative to / for serving resources. The path must start with a / | `/` |
|
|`keycloak_quarkus_http_relative_path`| Set the path relative to / for serving resources. The path must start with a / | `/` |
|
||||||
|`keycloak_quarkus_hostname_strict`| Disables dynamically resolving the hostname from request headers | `true` |
|
|`keycloak_quarkus_hostname_strict`| Disables dynamically resolving the hostname from request headers | `true` |
|
||||||
|
|`keycloak_quarkus_hostname_strict_backchannel`| By default backchannel URLs are dynamically resolved from request headers to allow internal and external applications. If all applications use the public URL this option should be enabled. | `false` |
|
||||||
|
|
||||||
|
|
||||||
* Database configuration
|
* Database configuration
|
||||||
|
|
||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:--------|
|
|:---------|:------------|:--------|
|
||||||
|`keycloak_quarkus_jdbc_engine` | Database engine [mariadb,postres] | `postgres` |
|
|`keycloak_quarkus_jdbc_engine` | Database engine [mariadb,postres,mssql] | `postgres` |
|
||||||
|`keycloak_quarkus_db_user` | User for database connection | `keycloak-user` |
|
|`keycloak_quarkus_db_user` | User for database connection | `keycloak-user` |
|
||||||
|`keycloak_quarkus_db_pass` | Password for database connection | `keycloak-pass` |
|
|`keycloak_quarkus_db_pass` | Password for database connection | `keycloak-pass` |
|
||||||
|`keycloak_quarkus_jdbc_url` | JDBC URL for connecting to database | `jdbc:postgresql://localhost:5432/keycloak` |
|
|`keycloak_quarkus_jdbc_url` | JDBC URL for connecting to database | `jdbc:postgresql://localhost:5432/keycloak` |
|
||||||
@@ -87,7 +91,6 @@ Role Defaults
|
|||||||
| Variable | Description | Default |
|
| Variable | Description | Default |
|
||||||
|:---------|:------------|:---------|
|
|:---------|:------------|:---------|
|
||||||
|`keycloak_quarkus_offline_install` | Perform an offline install | `False`|
|
|`keycloak_quarkus_offline_install` | Perform an offline install | `False`|
|
||||||
|`keycloak_quarkus_download_url`| Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/<version>/<archive>`|
|
|
||||||
|`keycloak_quarkus_version`| keycloak.org package version | `23.0.1` |
|
|`keycloak_quarkus_version`| keycloak.org package version | `23.0.1` |
|
||||||
|`keycloak_quarkus_dest`| Installation root path | `/opt/keycloak` |
|
|`keycloak_quarkus_dest`| Installation root path | `/opt/keycloak` |
|
||||||
|`keycloak_quarkus_download_url` | Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/{{ keycloak_quarkus_version }}/{{ keycloak_quarkus_archive }}` |
|
|`keycloak_quarkus_download_url` | Download URL for keycloak | `https://github.com/keycloak/keycloak/releases/download/{{ keycloak_quarkus_version }}/{{ keycloak_quarkus_archive }}` |
|
||||||
@@ -108,7 +111,6 @@ Role Defaults
|
|||||||
|`keycloak_auth_client` | Authentication client for configuration REST calls | `admin-cli` |
|
|`keycloak_auth_client` | Authentication client for configuration REST calls | `admin-cli` |
|
||||||
|`keycloak_force_install` | Remove pre-existing versions of service | `False` |
|
|`keycloak_force_install` | Remove pre-existing versions of service | `False` |
|
||||||
|`keycloak_url` | URL for configuration rest calls | `http://{{ keycloak_quarkus_host }}:{{ keycloak_http_port }}` |
|
|`keycloak_url` | URL for configuration rest calls | `http://{{ keycloak_quarkus_host }}:{{ keycloak_http_port }}` |
|
||||||
|`keycloak_management_url` | URL for management console rest calls | `http://{{ keycloak_quarkus_host }}:{{ keycloak_management_http_port }}` |
|
|
||||||
|`keycloak_quarkus_log`| Enable one or more log handlers in a comma-separated list | `file` |
|
|`keycloak_quarkus_log`| Enable one or more log handlers in a comma-separated list | `file` |
|
||||||
|`keycloak_quarkus_log_level`| The log level of the root category or a comma-separated list of individual categories and their levels | `info` |
|
|`keycloak_quarkus_log_level`| The log level of the root category or a comma-separated list of individual categories and their levels | `info` |
|
||||||
|`keycloak_quarkus_log_file`| Set the log file path and filename relative to keycloak home | `data/log/keycloak.log` |
|
|`keycloak_quarkus_log_file`| Set the log file path and filename relative to keycloak home | `data/log/keycloak.log` |
|
||||||
|
|||||||
@@ -19,6 +19,9 @@ keycloak_quarkus_service_user: keycloak
|
|||||||
keycloak_quarkus_service_group: keycloak
|
keycloak_quarkus_service_group: keycloak
|
||||||
keycloak_quarkus_service_pidfile: "/run/keycloak/keycloak.pid"
|
keycloak_quarkus_service_pidfile: "/run/keycloak/keycloak.pid"
|
||||||
keycloak_quarkus_configure_firewalld: false
|
keycloak_quarkus_configure_firewalld: false
|
||||||
|
keycloak_quarkus_service_restart_always: false
|
||||||
|
keycloak_quarkus_service_restart_on_failure: false
|
||||||
|
keycloak_quarkus_service_restartsec: "10s"
|
||||||
|
|
||||||
### administrator console password
|
### administrator console password
|
||||||
keycloak_quarkus_admin_user: admin
|
keycloak_quarkus_admin_user: admin
|
||||||
@@ -66,6 +69,9 @@ keycloak_quarkus_http_relative_path: /
|
|||||||
# Disables dynamically resolving the hostname from request headers.
|
# Disables dynamically resolving the hostname from request headers.
|
||||||
# Should always be set to true in production, unless proxy verifies the Host header.
|
# Should always be set to true in production, unless proxy verifies the Host header.
|
||||||
keycloak_quarkus_hostname_strict: true
|
keycloak_quarkus_hostname_strict: true
|
||||||
|
# By default backchannel URLs are dynamically resolved from request headers to allow internal and external applications.
|
||||||
|
# If all applications use the public URL this option should be enabled.
|
||||||
|
keycloak_quarkus_hostname_strict_backchannel: false
|
||||||
|
|
||||||
# proxy address forwarding mode if the server is behind a reverse proxy. [none, edge, reencrypt, passthrough]
|
# proxy address forwarding mode if the server is behind a reverse proxy. [none, edge, reencrypt, passthrough]
|
||||||
keycloak_quarkus_proxy_mode: edge
|
keycloak_quarkus_proxy_mode: edge
|
||||||
@@ -101,7 +107,10 @@ keycloak_quarkus_default_jdbc:
|
|||||||
mariadb:
|
mariadb:
|
||||||
url: 'jdbc:mariadb://localhost:3306/keycloak'
|
url: 'jdbc:mariadb://localhost:3306/keycloak'
|
||||||
version: 2.7.4
|
version: 2.7.4
|
||||||
|
mssql:
|
||||||
|
url: 'jdbc:sqlserver://localhost:1433;databaseName=keycloak;'
|
||||||
|
version: 12.2.0
|
||||||
|
driver_jar_url: "https://repo1.maven.org/maven2/com/microsoft/sqlserver/mssql-jdbc/12.2.0.jre11/mssql-jdbc-12.2.0.jre11.jar" # cf. https://access.redhat.com/documentation/en-us/red_hat_build_of_keycloak/22.0/html/server_guide/db-#db-installing-the-microsoft-sql-server-driver
|
||||||
### logging configuration
|
### logging configuration
|
||||||
keycloak_quarkus_log: file
|
keycloak_quarkus_log: file
|
||||||
keycloak_quarkus_log_level: info
|
keycloak_quarkus_log_level: info
|
||||||
|
|||||||
@@ -69,6 +69,18 @@ argument_specs:
|
|||||||
default: false
|
default: false
|
||||||
description: "Ensure firewalld is running and configure keycloak ports"
|
description: "Ensure firewalld is running and configure keycloak ports"
|
||||||
type: "bool"
|
type: "bool"
|
||||||
|
keycloak_service_restart_always:
|
||||||
|
default: false
|
||||||
|
description: "systemd restart always behavior of service; takes precedence over keycloak_service_restart_on_failure if true"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_service_restart_on_failure:
|
||||||
|
default: false
|
||||||
|
description: "systemd restart on-failure behavior of service"
|
||||||
|
type: "bool"
|
||||||
|
keycloak_service_restartsec:
|
||||||
|
default: "10s"
|
||||||
|
description: "systemd RestartSec for service"
|
||||||
|
type: "str"
|
||||||
keycloak_quarkus_admin_user:
|
keycloak_quarkus_admin_user:
|
||||||
default: "admin"
|
default: "admin"
|
||||||
description: "Administration console user account"
|
description: "Administration console user account"
|
||||||
@@ -234,7 +246,7 @@ argument_specs:
|
|||||||
keycloak_quarkus_jdbc_engine:
|
keycloak_quarkus_jdbc_engine:
|
||||||
# line 56 of defaults/main.yml
|
# line 56 of defaults/main.yml
|
||||||
default: "postgres"
|
default: "postgres"
|
||||||
description: "Database engine [mariadb,postres]"
|
description: "Database engine [mariadb,postres,mssql]"
|
||||||
type: "str"
|
type: "str"
|
||||||
keycloak_quarkus_db_user:
|
keycloak_quarkus_db_user:
|
||||||
# line 58 of defaults/main.yml
|
# line 58 of defaults/main.yml
|
||||||
@@ -292,6 +304,10 @@ argument_specs:
|
|||||||
default: true
|
default: true
|
||||||
type: "bool"
|
type: "bool"
|
||||||
description: "Disables dynamically resolving the hostname from request headers. Should always be set to true in production, unless proxy verifies the Host header."
|
description: "Disables dynamically resolving the hostname from request headers. Should always be set to true in production, unless proxy verifies the Host header."
|
||||||
|
keycloak_quarkus_hostname_strict_backchannel:
|
||||||
|
default: false
|
||||||
|
type: "bool"
|
||||||
|
description: "By default backchannel URLs are dynamically resolved from request headers to allow internal and external applications. If all applications use the public URL this option should be enabled."
|
||||||
downstream:
|
downstream:
|
||||||
options:
|
options:
|
||||||
rhbk_version:
|
rhbk_version:
|
||||||
|
|||||||
@@ -149,3 +149,9 @@
|
|||||||
msg: "{{ keycloak.home }} already exists and version unchanged, skipping decompression"
|
msg: "{{ keycloak.home }} already exists and version unchanged, skipping decompression"
|
||||||
when:
|
when:
|
||||||
- (not new_version_downloaded.changed) and path_to_workdir.stat.exists
|
- (not new_version_downloaded.changed) and path_to_workdir.stat.exists
|
||||||
|
|
||||||
|
- name: "Install {{ keycloak_quarkus_jdbc_engine }} JDBC driver"
|
||||||
|
ansible.builtin.include_tasks: jdbc_driver.yml
|
||||||
|
when:
|
||||||
|
- rhbk_enable is defined and rhbk_enable
|
||||||
|
- keycloak_quarkus_default_jdbc[keycloak_quarkus_jdbc_engine].driver_jar_url is defined
|
||||||
|
|||||||
12
roles/keycloak_quarkus/tasks/jdbc_driver.yml
Normal file
12
roles/keycloak_quarkus/tasks/jdbc_driver.yml
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Retrieve JDBC Driver from {{ keycloak_jdbc[keycloak_quarkus_jdbc_engine].driver_jar_url }}"
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: "{{ keycloak_quarkus_default_jdbc[keycloak_quarkus_jdbc_engine].driver_jar_url }}"
|
||||||
|
dest: "{{ keycloak.home }}/providers"
|
||||||
|
owner: "{{ keycloak.service_user }}"
|
||||||
|
group: "{{ keycloak.service_group }}"
|
||||||
|
mode: 0640
|
||||||
|
become: true
|
||||||
|
notify:
|
||||||
|
- restart keycloak
|
||||||
@@ -3,3 +3,4 @@ KEYCLOAK_ADMIN={{ keycloak_quarkus_admin_user }}
|
|||||||
KEYCLOAK_ADMIN_PASSWORD='{{ keycloak_quarkus_admin_pass }}'
|
KEYCLOAK_ADMIN_PASSWORD='{{ keycloak_quarkus_admin_pass }}'
|
||||||
PATH={{ keycloak_java_home | default(keycloak_rpm_java_home, true) }}/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
PATH={{ keycloak_java_home | default(keycloak_rpm_java_home, true) }}/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
||||||
JAVA_HOME={{ keycloak_java_home | default(keycloak_rpm_java_home, true) }}
|
JAVA_HOME={{ keycloak_java_home | default(keycloak_rpm_java_home, true) }}
|
||||||
|
JAVA_OPTS_APPEND={{ keycloak_quarkus_java_opts }}
|
||||||
@@ -42,6 +42,7 @@ hostname-path={{ keycloak_quarkus_path }}
|
|||||||
{% endif %}
|
{% endif %}
|
||||||
hostname-admin-url={{ keycloak_quarkus_admin_url }}
|
hostname-admin-url={{ keycloak_quarkus_admin_url }}
|
||||||
hostname-strict={{ keycloak_quarkus_hostname_strict | lower }}
|
hostname-strict={{ keycloak_quarkus_hostname_strict | lower }}
|
||||||
|
hostname-strict-backchannel={{ keycloak_quarkus_hostname_strict_backchannel | lower }}
|
||||||
|
|
||||||
# Cluster
|
# Cluster
|
||||||
{% if keycloak_quarkus_ha_enabled %}
|
{% if keycloak_quarkus_ha_enabled %}
|
||||||
|
|||||||
@@ -13,6 +13,16 @@ ExecStart={{ keycloak.home }}/bin/kc.sh start-dev
|
|||||||
ExecStart={{ keycloak.home }}/bin/kc.sh start --log={{ keycloak_quarkus_log }}
|
ExecStart={{ keycloak.home }}/bin/kc.sh start --log={{ keycloak_quarkus_log }}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
User={{ keycloak.service_user }}
|
User={{ keycloak.service_user }}
|
||||||
|
Group={{ keycloak.service_group }}
|
||||||
|
{% if keycloak_quarkus_service_restart_always %}
|
||||||
|
Restart=always
|
||||||
|
{% elif keycloak_quarkus_service_restart_on_failure %}
|
||||||
|
Restart=on-failure
|
||||||
|
{% endif %}
|
||||||
|
RestartSec={{ keycloak_quarkus_service_restartsec }}
|
||||||
|
{% if keycloak_quarkus_http_port|int < 1024 or keycloak_quarkus_https_port|int < 1024 %}
|
||||||
|
AmbientCapabilities=CAP_NET_BIND_SERVICE
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
|
|||||||
Reference in New Issue
Block a user