Decouple users from podman

This commit is contained in:
Albert Stefanov 2024-02-20 09:48:10 +02:00
parent dc997a359e
commit df6b81bd6b
6 changed files with 46 additions and 20 deletions

View File

@ -0,0 +1 @@
firewall:

View File

@ -0,0 +1,5 @@
---
users:
auth:
matrix:

View File

@ -3,7 +3,7 @@
- name: Check parameters - name: Check parameters
ansible.builtin.assert: ansible.builtin.assert:
that: that:
- keycloak.podman.user is defined - keycloak.podman_user is defined
- keycloak.db.password is defined - keycloak.db.password is defined
- name: Create PostgreSQL database - name: Create PostgreSQL database
@ -21,9 +21,7 @@
ansible.builtin.include_role: ansible.builtin.include_role:
name: container-user name: container-user
vars: vars:
user: "{{ keycloak.podman.user }}" user: "{{ keycloak.podman_user }}"
home: "{{ keycloak.podman.home | default(omit) }}"
uid: "{{ keycloak.podman.uid | default(omit) }}"
- name: Create data directories - name: Create data directories
ansible.builtin.file: ansible.builtin.file:
@ -39,7 +37,7 @@
dest: ~/.config/containers/systemd/sso-keycloak.container dest: ~/.config/containers/systemd/sso-keycloak.container
mode: "644" mode: "644"
become: true become: true
become_user: "{{ keycloak.podman.user }}" become_user: "{{ keycloak.podman_user }}"
- name: Set up podman secrets - name: Set up podman secrets
containers.podman.podman_secret: containers.podman.podman_secret:
@ -60,7 +58,7 @@
no_log: true no_log: true
become: true become: true
become_user: "{{ keycloak.podman.user }}" become_user: "{{ keycloak.podman_user }}"
# Note: enabled in the unit file # Note: enabled in the unit file
- name: Start Keycloak - name: Start Keycloak
@ -70,7 +68,7 @@
daemon_reload: true daemon_reload: true
state: started state: started
become: true become: true
become_user: "{{ keycloak.podman.user }}" become_user: "{{ keycloak.podman_user }}"
- name: Set up reverse proxy - name: Set up reverse proxy
ansible.builtin.include_tasks: tasks/create_vhost.yml ansible.builtin.include_tasks: tasks/create_vhost.yml

View File

@ -11,3 +11,13 @@
- name: Setup firewall - name: Setup firewall
ansible.builtin.include_tasks: firewall.yml ansible.builtin.include_tasks: firewall.yml
when: firewall is defined when: firewall is defined
- name: Provision users
ansible.builtin.include_role:
name: user
vars:
user: "{{ user_item.key }}" # noqa:var-naming[no-role-prefix]
loop_control:
loop_var: user_item
with_items:
- "{{ users | dict2items }}"

View File

@ -10,19 +10,8 @@
name: container-host name: container-host
- name: Create user - name: Create user
ansible.builtin.user: ansible.builtin.include_role:
name: "{{ user }}" name: user
home: "{{ home | default(omit) }}"
uid: "{{ uid | default(omit) }}"
state: present
- name: Add public keys for user '{{ user }}'
ansible.posix.authorized_key:
user: "{{ user }}"
key: "{{ lookup('file', '../../access/keys/' + item + '.pub') }}"
state: present # Note: we don't remove other/existing keys
with_items: "{{ global_ssh_keys + (ssh_keys[user] | default([])) + (ssh_keys['*'] | default([])) }}"
- name: Create unit files dir - name: Create unit files dir
ansible.builtin.file: ansible.builtin.file:

View File

@ -0,0 +1,23 @@
---
- name: Check if required parameters are set
ansible.builtin.assert:
that:
- user is defined
- name: Create user
ansible.builtin.user:
name: "{{ user }}"
home: "{{ users[user].home | default(omit) }}"
uid: "{{ users[user].uid | default(omit) }}"
state: present
- name: Add public keys for user '{{ user }}'
ansible.posix.authorized_key:
user: "{{ user }}"
key: "{{ lookup('file', '../../access/keys/' + item + '.pub') }}"
state: present # Note: we don't remove other/existing keys
with_items: >-
{{ global_ssh_keys +
(ssh_keys[user] | default([])) +
(ssh_keys['*'] | default([])) }}