1.0.0 Release IaaS
This commit is contained in:
78
ansible/roles/auth/tasks/services/set_authelia.yaml
Normal file
78
ansible/roles/auth/tasks/services/set_authelia.yaml
Normal file
@@ -0,0 +1,78 @@
|
||||
---
|
||||
- name: Create authelia directory
|
||||
ansible.builtin.file:
|
||||
path: "{{ node['home_path'] }}/containers/{{ item }}"
|
||||
state: "directory"
|
||||
owner: "{{ ansible_user }}"
|
||||
group: "svadmins"
|
||||
mode: "0770"
|
||||
loop:
|
||||
- "authelia"
|
||||
- "authelia/config"
|
||||
- "authelia/certs"
|
||||
become: true
|
||||
|
||||
- name: Deploy authelia configuration file
|
||||
ansible.builtin.template:
|
||||
src: "{{ hostvars['console']['node']['config_path'] }}/services/containers/auth/authelia/config/authelia.yaml.j2"
|
||||
dest: "{{ node['home_path'] }}/containers/authelia/config/authelia.yaml"
|
||||
owner: "{{ ansible_user }}"
|
||||
group: "svadmins"
|
||||
mode: "0600"
|
||||
become: true
|
||||
notify: "notification_restart_authelia"
|
||||
no_log: true
|
||||
|
||||
- name: Deploy certificates
|
||||
ansible.builtin.copy:
|
||||
content: |
|
||||
{{ hostvars['console']['ca']['root']['crt'] }}
|
||||
dest: "{{ node['home_path'] }}/containers/authelia/certs/ilnmors_root_ca.crt"
|
||||
owner: "{{ ansible_user }}"
|
||||
group: "svadmins"
|
||||
mode: "0440"
|
||||
become: true
|
||||
no_log: true
|
||||
|
||||
- name: Register secret value to podman secret
|
||||
containers.podman.podman_secret:
|
||||
name: "{{ item.name }}"
|
||||
data: "{{ item.value }}"
|
||||
state: "present"
|
||||
force: true
|
||||
loop:
|
||||
- name: "AUTHELIA_JWT_SECRET"
|
||||
value: "{{ hostvars['console']['authelia']['jwt_secret'] }}"
|
||||
- name: "AUTHELIA_SESSION_SECRET"
|
||||
value: "{{ hostvars['console']['authelia']['session_secret'] }}"
|
||||
- name: "AUTHELIA_STORAGE_SECRET"
|
||||
value: "{{ hostvars['console']['authelia']['storage_secret'] }}"
|
||||
- name: "AUTHELIA_HMAC_SECRET"
|
||||
value: "{{ hostvars['console']['authelia']['hmac_secret'] }}"
|
||||
- name: "AUTHELIA_JWKS_RS256"
|
||||
value: "{{ hostvars['console']['authelia']['jwk_rs256'] }}"
|
||||
- name: "AUTHELIA_JWKS_ES256"
|
||||
value: "{{ hostvars['console']['authelia']['jwk_es256'] }}"
|
||||
- name: "AUTHELIA_LDAP_PASSWORD"
|
||||
value: "{{ hostvars['console']['ldap']['password']['authelia'] }}"
|
||||
- name: "POSTGRES_AUTHELIA_PASSWORD"
|
||||
value: "{{ hostvars['console']['postgresql']['password']['authelia'] }}"
|
||||
notify: "notification_restart_authelia"
|
||||
no_log: true
|
||||
|
||||
- name: Deploy container file
|
||||
ansible.builtin.template:
|
||||
src: "{{ hostvars['console']['node']['config_path'] }}/services/containers/auth/authelia/authelia.container.j2"
|
||||
dest: "{{ node['home_path'] }}/.config/containers/systemd/authelia.container"
|
||||
owner: "{{ ansible_user }}"
|
||||
group: "svadmins"
|
||||
mode: "0644"
|
||||
notify: "notification_restart_authelia"
|
||||
|
||||
- name: Enable authelia.service
|
||||
ansible.builtin.systemd:
|
||||
name: "authelia.service"
|
||||
state: "started"
|
||||
enabled: true
|
||||
daemon_reload: true
|
||||
scope: "user"
|
||||
Reference in New Issue
Block a user