mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-15 08:30:46 +02:00
Highlights - Quote all file modes as strings ("0755"/"0770") across multiple roles to avoid YAML octal quirks and improve portability. - Keycloak: introduce actions.{import_realm,update_ldap_bind} feature flags and wire them via vars/config. - Implement idempotent LDAP bind updater (tasks/03_update-ldap-bind.yml): * kcadm login with no_log protection, * fetch LDAP UserStorage component by name, * compare current bindDn/bindCredential and update only when changed. - Keycloak realm import template: keep providerId="ldap" and set name from keycloak_ldap_component_name. - Centralize Keycloak readiness check in tasks/main.yml; remove duplicate waits from 02_update_client_redirects.yml and 04_ssh_public_key.yml. - 01_import.yml: fix typo (keycloak), quote modes, tidy spacing, and replace Jinja-in-Jinja fileglob with concatenation. - 02_update_client_redirects.yml: correct assert fail_msg filename; keep login-first flow. - Minor template/vars tidy-ups (spacing, comments, consistent variable usage). Files touched (excerpt) - roles/*/*: replace 0755/0770 → "0755"/"0770" - roles/web-app-keycloak/config/main.yml: add actions map - roles/web-app-keycloak/vars/main.yml: unify Keycloak vars and feature flags - roles/web-app-keycloak/tasks/{01_import,02_update_client_redirects,03_update-ldap-bind,04_ssh_public_key,main}.yml - roles/web-app-keycloak/templates/{docker-compose.yml.j2,import/realm.json.j2} https://chatgpt.com/share/689bda16-b138-800f-8258-e13f6d7d8239
72 lines
2.7 KiB
YAML
72 lines
2.7 KiB
YAML
# Configure Credentials
|
|
- name: Ensure Keycloak CLI credentials are configured
|
|
shell: |
|
|
{{ keycloak_kcadm_path }} config credentials \
|
|
--server {{ keycloak_server_internal_url }} \
|
|
--realm master \
|
|
--user {{ keycloak_master_api_user_name }} \
|
|
--password {{ keycloak_master_api_user_password }}
|
|
|
|
# LDAP Source
|
|
- name: Get ID of LDAP storage provider
|
|
shell: |
|
|
{{ keycloak_kcadm_path }} get components \
|
|
-r {{ keycloak_realm }} \
|
|
--query 'providerId=ldap' \
|
|
--fields id,name \
|
|
--format json
|
|
register: ldap_components
|
|
|
|
- name: Extract LDAP component ID
|
|
set_fact:
|
|
ldap_component_id: "{{ (ldap_components.stdout | from_json)[0].id }}"
|
|
|
|
- name: Ensure {{ ldap.user.attributes.ssh_public_key }} LDAP Mapper exists
|
|
shell: |
|
|
docker exec -i keycloak_application bash -c '
|
|
/opt/keycloak/bin/kcadm.sh get components -r {{ keycloak_realm }} \
|
|
| grep -q "\"name\" : \"{{ ldap.user.attributes.ssh_public_key }}\"" \
|
|
|| printf "%s\n" "{
|
|
\"name\": \"{{ ldap.user.attributes.ssh_public_key }}\",
|
|
\"parentId\": \"{{ ldap_component_id }}\",
|
|
\"providerId\": \"user-attribute-ldap-mapper\",
|
|
\"providerType\": \"org.keycloak.storage.ldap.mappers.LDAPStorageMapper\",
|
|
\"config\": {
|
|
\"user.model.attribute\": [\"{{ ldap.user.attributes.ssh_public_key }}\"],
|
|
\"ldap.attribute\": [\"{{ ldap.user.attributes.ssh_public_key }}\"],
|
|
\"read.only\": [\"false\"],
|
|
\"write.only\": [\"true\"],
|
|
\"always.read.value.from.ldap\": [\"false\"],
|
|
\"multivalued\": [\"true\"]
|
|
}
|
|
}" | /opt/keycloak/bin/kcadm.sh create components -r {{ keycloak_realm }} -f -'
|
|
register: mapper_create
|
|
changed_when: mapper_create.rc == 0 and mapper_create.stdout != ""
|
|
|
|
# GUI
|
|
|
|
- name: Enable user profile in realm
|
|
shell: >
|
|
{{ keycloak_kcadm_path }} update realms/{{ keycloak_realm }}
|
|
-s 'attributes.userProfileEnabled=true'
|
|
|
|
- name: Re-authenticate to Keycloak after enabling user profile
|
|
shell: |
|
|
{{ keycloak_kcadm_path }} config credentials \
|
|
--server {{ keycloak_server_internal_url }} \
|
|
--realm master \
|
|
--user {{ keycloak_master_api_user_name }} \
|
|
--password {{ keycloak_master_api_user_password }}
|
|
|
|
- name: Render user-profile JSON for SSH key
|
|
template:
|
|
src: import/user-profile.json.j2
|
|
dest: "{{ keycloak_host_import_directory }}/user-profile.json"
|
|
mode: '0644'
|
|
notify: docker compose up
|
|
|
|
- name: Apply SSH Public Key to user-profile via kcadm
|
|
shell: |
|
|
docker exec -i {{ keycloak_container }} \
|
|
/opt/keycloak/bin/kcadm.sh update realms/{{ keycloak_realm }} -f {{ keycloak_docker_import_directory }}user-profile.json
|