mirror of
				https://github.com/kevinveenbirkenbach/computer-playbook.git
				synced 2025-10-31 10:19:09 +00:00 
			
		
		
		
	Semi bsr for applications[] to prevent heavy to debug bugs in j2 - part 1
This commit is contained in:
		| @@ -1,9 +1,9 @@ | ||||
| {% include 'roles/docker-compose/templates/base.yml.j2' %} | ||||
|  | ||||
|   application: | ||||
|     image: "{{ applications[application_id].images.keycloak }}" | ||||
|     image: "{{ applications | get_app_conf(application_id, 'images.keycloak', True) }}" | ||||
|     container_name: {{container_name}} | ||||
|     command: start {% if applications[application_id].import_realm | bool %}--import-realm{% endif %} | ||||
|     command: start {% if applications | get_app_conf(application_id, 'import_realm', True) | bool %}--import-realm{% endif %} | ||||
|     {% include 'roles/docker-container/templates/base.yml.j2' %} | ||||
|     ports: | ||||
|       - "{{ keycloak_server_host }}:8080" | ||||
|   | ||||
| @@ -11,8 +11,8 @@ KC_HEALTH_ENABLED=              true | ||||
| KC_METRICS_ENABLED=             true | ||||
|  | ||||
| # Administrator | ||||
| KEYCLOAK_ADMIN=                 "{{applications[application_id].users.administrator.username}}" | ||||
| KEYCLOAK_ADMIN_PASSWORD=        "{{applications[application_id].credentials.administrator_password}}" | ||||
| KEYCLOAK_ADMIN=                 "{{applications | get_app_conf(application_id, 'users.administrator.username', True)}}" | ||||
| KEYCLOAK_ADMIN_PASSWORD=        "{{applications | get_app_conf(application_id, 'credentials.administrator_password', True)}}" | ||||
|  | ||||
| # Database | ||||
| KC_DB=                          postgres | ||||
| @@ -21,5 +21,5 @@ KC_DB_USERNAME=                 {{database_username}} | ||||
| KC_DB_PASSWORD=                 {{database_password}} | ||||
|  | ||||
| # If the initial administrator already exists and the environment variables are still present at startup, an error message stating the failed creation of the initial administrator is shown in the logs. Keycloak ignores the values and starts up correctly. | ||||
| KC_BOOTSTRAP_ADMIN_USERNAME=    "{{applications[application_id].users.administrator.username}}" | ||||
| KC_BOOTSTRAP_ADMIN_PASSWORD=    "{{applications[application_id].credentials.administrator_password}}" | ||||
| KC_BOOTSTRAP_ADMIN_USERNAME=    "{{applications | get_app_conf(application_id, 'users.administrator.username', True)}}" | ||||
| KC_BOOTSTRAP_ADMIN_PASSWORD=    "{{applications | get_app_conf(application_id, 'credentials.administrator_password', True)}}" | ||||
| @@ -890,8 +890,8 @@ | ||||
|         "organization", | ||||
|         "offline_access", | ||||
|         "microprofile-jwt", | ||||
|         "{{ applications[application_id].scopes.rbac_roles }}", | ||||
|         "{{ applications[application_id].scopes.nextcloud }}" | ||||
|         "{{ applications | get_app_conf(application_id, 'scopes.rbac_roles', True) }}", | ||||
|         "{{ applications | get_app_conf(application_id, 'scopes.nextcloud', True) }}" | ||||
|  | ||||
|       ] | ||||
|     } | ||||
| @@ -1197,7 +1197,7 @@ | ||||
|     }, | ||||
|     { | ||||
|       "id": "15dd4961-5b4f-4635-a3f1-a21e1fa7bf3a", | ||||
|       "name": "{{ applications[application_id].scopes.nextcloud }}", | ||||
|       "name": "{{ applications | get_app_conf(application_id, 'scopes.nextcloud', True) }}", | ||||
|       "description": "Optimized mappers for nextcloud oidc_login with ldap.", | ||||
|       "protocol": "openid-connect", | ||||
|       "attributes": { | ||||
| @@ -1249,7 +1249,7 @@ | ||||
|     }, | ||||
|     { | ||||
|       "id": "59917c48-a7ef-464a-a8b0-ea24316db18e", | ||||
|       "name": "{{ applications[application_id].scopes.rbac_roles }}", | ||||
|       "name": "{{ applications | get_app_conf(application_id, 'scopes.rbac_roles', True) }}", | ||||
|       "description": "RBAC Groups", | ||||
|       "protocol": "openid-connect", | ||||
|       "attributes": { | ||||
| @@ -1675,8 +1675,8 @@ | ||||
|     "phone", | ||||
|     "microprofile-jwt", | ||||
|     "organization", | ||||
|     "{{ applications[application_id].scopes.rbac_roles }}", | ||||
|     "{{ applications[application_id].scopes.nextcloud }}" | ||||
|     "{{ applications | get_app_conf(application_id, 'scopes.rbac_roles', True) }}", | ||||
|     "{{ applications | get_app_conf(application_id, 'scopes.nextcloud', True) }}" | ||||
|   ], | ||||
|   "browserSecurityHeaders": { | ||||
|     "contentSecurityPolicyReportOnly": "", | ||||
| @@ -1994,7 +1994,7 @@ | ||||
|                   "false" | ||||
|                 ], | ||||
|                 "groups.path": [ | ||||
|                   "{{ applications[application_id].rbac_groups }}" | ||||
|                   "{{ applications | get_app_conf(application_id, 'rbac_groups', True) }}" | ||||
|                 ] | ||||
|               } | ||||
|             }, | ||||
| @@ -2920,8 +2920,8 @@ | ||||
|         "action": "register", | ||||
|         "useRecaptchaNet": "false", | ||||
|         "recaptcha.v3": "true", | ||||
|         "secret.key": "{{ applications[application_id].credentials.recaptcha.secret_key }}", | ||||
|         "site.key": "{{ applications[application_id].credentials.recaptcha.website_key }}" | ||||
|         "secret.key": "{{ applications | get_app_conf(application_id, 'credentials.recaptcha.secret_key', True) }}", | ||||
|         "site.key": "{{ applications | get_app_conf(application_id, 'credentials.recaptcha.website_key', True) }}" | ||||
|       } | ||||
|     }, | ||||
| {%- endif %} | ||||
|   | ||||
		Reference in New Issue
	
	Block a user