Files
computer-playbook/roles/web-app-minio/config/main.yml
Kevin Veen-Birkenbach 5daf3387bf web-app-minio: enable OIDC integration and policy handling
- Added OIDC and LDAP feature flags in config
- Introduced API/Console URL vars for proxy alignment
- Implemented automatic MinIO policy creation for OIDC admin group
- Replaced static env.J2 with dynamic env.j2 (OIDC-aware)
- Added policy.json.j2 template with full admin rights
- Cleaned up tasks to use stdin instead of file for mc policy apply

Ref: https://chatgpt.com/share/68d1d3ef-ca84-800f-abe2-11ab70e20c4e
2025-09-23 00:56:11 +02:00

44 lines
970 B
YAML

features:
matomo: true
css: true
desktop: true
central_database: false
logout: true
javascript: false
local_ai: true
oidc: true
ldap: false # OIDC is already activated so LDAP isn't necessary
server:
domains:
canonical:
console: "console.s3.{{ PRIMARY_DOMAIN }}"
api: "api.s3.{{ PRIMARY_DOMAIN }}"
aliases: []
csp:
flags: {}
#script-src-elem:
# unsafe-inline: true
#script-src:
# unsafe-inline: true
# unsafe-eval: true
#style-src:
# unsafe-inline: true
whitelist:
font-src: []
connect-src: []
docker:
services:
minio:
backup:
no_stop_required: true
image: quay.io/minio/minio
version: latest
name: minio
redis:
enabled: false
database:
enabled: false
volumes:
data: minio_data
credentials: {}