Merge branch 'main' into dev-dokuwiki
This commit is contained in:
commit
4e3d0eb32f
36 changed files with 949 additions and 113 deletions
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
"id": "{{var_authelia_for_hedgedoc_client_id}}",
|
"client_id": "{{var_authelia_for_hedgedoc_client_id}}",
|
||||||
"description": "Hedgedoc",
|
"client_secret": "{{var_authelia_for_hedgedoc_client_secret}}",
|
||||||
"secret": "{{var_authelia_for_hedgedoc_client_secret}}",
|
"client_name": "Hedgedoc",
|
||||||
"public": false,
|
"public": false,
|
||||||
"authorization_policy": "one_factor",
|
"authorization_policy": "one_factor",
|
||||||
"scopes": [
|
"scopes": [
|
||||||
|
@ -24,5 +24,5 @@
|
||||||
"query",
|
"query",
|
||||||
"fragment"
|
"fragment"
|
||||||
],
|
],
|
||||||
"userinfo_signing_algorithm": "none"
|
"userinfo_signed_response_alg": "none"
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
{
|
{
|
||||||
"id": "{{var_authelia_for_synapse_client_id}}",
|
"client_id": "{{var_authelia_for_synapse_client_id}}",
|
||||||
"description": "Synapse",
|
"client_secret": "{{var_authelia_for_synapse_client_secret}}",
|
||||||
"secret": "{{var_authelia_for_synapse_client_secret}}",
|
"client_name": "Synapse",
|
||||||
"public": false,
|
"public": false,
|
||||||
"authorization_policy": "one_factor",
|
"authorization_policy": "one_factor",
|
||||||
"redirect_uris": [
|
"redirect_uris": [
|
||||||
|
@ -12,5 +12,5 @@
|
||||||
"email",
|
"email",
|
||||||
"profile"
|
"profile"
|
||||||
],
|
],
|
||||||
"userinfo_signing_algorithm": "none"
|
"userinfo_signed_response_alg": "none"
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,15 +7,27 @@
|
||||||
"var_authelia_log_file_path": "/var/authelia/log.jsonl",
|
"var_authelia_log_file_path": "/var/authelia/log.jsonl",
|
||||||
"var_authelia_session_domain": "example.org",
|
"var_authelia_session_domain": "example.org",
|
||||||
"var_authelia_session_secret": "REPLACE_ME",
|
"var_authelia_session_secret": "REPLACE_ME",
|
||||||
"var_authelia_storage_path": "/var/authelia/state.db",
|
"var_authelia_storage_encryption_key": "REPLACE_ME",
|
||||||
"var_authelia_storage_encryption_key": "storage_encryption_key",
|
"var_authelia_storage_kind": "sqlite",
|
||||||
|
"var_authelia_storage_data_sqlite_path": "/var/authelia/state.db",
|
||||||
|
"var_authelia_storage_data_postgresql_host": "localhost",
|
||||||
|
"var_authelia_storage_data_postgresql_port": 5432,
|
||||||
|
"var_authelia_storage_data_postgresql_username": "authelia_user",
|
||||||
|
"var_authelia_storage_data_postgresql_password": "REPLACE_ME",
|
||||||
|
"var_authelia_storage_data_postgresql_schema": "authelia",
|
||||||
|
"var_authelia_storage_data_mariadb_host": "localhost",
|
||||||
|
"var_authelia_storage_data_mariadb_port": 3306,
|
||||||
|
"var_authelia_storage_data_mariadb_username": "authelia_user",
|
||||||
|
"var_authelia_storage_data_mariadb_password": "REPLACE_ME",
|
||||||
|
"var_authelia_storage_data_mariadb_schema": "authelia",
|
||||||
"var_authelia_ntp_server": "time.cloudflare.com:123",
|
"var_authelia_ntp_server": "time.cloudflare.com:123",
|
||||||
|
"var_authelia_password_reset_enabled": false,
|
||||||
"var_authelia_notification_mode": "smtp",
|
"var_authelia_notification_mode": "smtp",
|
||||||
"var_authelia_notification_file_path": "/var/authelia/notifications",
|
"var_authelia_notification_file_path": "/var/authelia/notifications",
|
||||||
"var_authelia_notification_smtp_host": "smtp.example.org",
|
"var_authelia_notification_smtp_host": "smtp.example.org",
|
||||||
"var_authelia_notification_smtp_port": "465",
|
"var_authelia_notification_smtp_port": 465,
|
||||||
"var_authelia_notification_smtp_username": "authelia",
|
"var_authelia_notification_smtp_username": "authelia",
|
||||||
"var_authelia_notification_smtp_password": "smtp_password",
|
"var_authelia_notification_smtp_password": "REPLACE_ME",
|
||||||
"var_authelia_notification_smtp_sender": "Authelia",
|
"var_authelia_notification_smtp_sender": "authelia@example.org",
|
||||||
"var_authelia_oidc_hmac_secret": "oidc_hmac_secret"
|
"var_authelia_oidc_hmac_secret": "REPLACE_ME"
|
||||||
}
|
}
|
||||||
|
|
|
@ -28,14 +28,18 @@ def file_write(path, content):
|
||||||
return content
|
return content
|
||||||
|
|
||||||
|
|
||||||
def get_password_hash(binary_file_path, conf_file_path, name):
|
def get_password_hash(binary_file_path, conf_file_path, password):
|
||||||
|
# /usr/bin/authelia --config=/etc/authelia/configuration.yml crypto hash generate bcrypt --password=alice
|
||||||
output = _subprocess.check_output([
|
output = _subprocess.check_output([
|
||||||
binary_file_path,
|
binary_file_path,
|
||||||
"--config=%s" % conf_file_path,
|
"--config=%s" % conf_file_path,
|
||||||
"hash-password",
|
"crypto",
|
||||||
name
|
"hash",
|
||||||
|
"generate",
|
||||||
|
"bcrypt",
|
||||||
|
"--password=%s" % password,
|
||||||
])
|
])
|
||||||
return output.decode("utf-8").split("\n")[0][8:]
|
return output.decode("utf-8").split("\n")[0].split(" ")[1]
|
||||||
|
|
||||||
|
|
||||||
def postprocess(binary_file_path, conf_file_path, data):
|
def postprocess(binary_file_path, conf_file_path, data):
|
||||||
|
@ -121,6 +125,14 @@ def main():
|
||||||
default = None,
|
default = None,
|
||||||
help = "e-mail address of the user",
|
help = "e-mail address of the user",
|
||||||
)
|
)
|
||||||
|
argument_parser.add_argument(
|
||||||
|
"-x",
|
||||||
|
"--deactivated",
|
||||||
|
type = str,
|
||||||
|
default = "no",
|
||||||
|
choices = ["no", "yes"],
|
||||||
|
help = "whether the user shall be deactivated",
|
||||||
|
)
|
||||||
args = argument_parser.parse_args()
|
args = argument_parser.parse_args()
|
||||||
|
|
||||||
## exec
|
## exec
|
||||||
|
@ -146,6 +158,7 @@ def main():
|
||||||
raise ValueError("password required")
|
raise ValueError("password required")
|
||||||
else:
|
else:
|
||||||
entry = {
|
entry = {
|
||||||
|
"disabled": (args.deactivated == "yes"),
|
||||||
"displayname": (args.display_name or args.login_name),
|
"displayname": (args.display_name or args.login_name),
|
||||||
"password": get_password_hash(args.binary_file_path, args.conf_file_path, args.login_name),
|
"password": get_password_hash(args.binary_file_path, args.conf_file_path, args.login_name),
|
||||||
"email": args.email,
|
"email": args.email,
|
||||||
|
@ -158,6 +171,10 @@ def main():
|
||||||
raise ValueError("name required")
|
raise ValueError("name required")
|
||||||
else:
|
else:
|
||||||
entry = data["users"][args.login_name]
|
entry = data["users"][args.login_name]
|
||||||
|
if (args.deactivated is None):
|
||||||
|
pass
|
||||||
|
else:
|
||||||
|
entry["disabled"] = (args.deactivated == "yes")
|
||||||
if (args.password is None):
|
if (args.password is None):
|
||||||
pass
|
pass
|
||||||
else:
|
else:
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "packages | prerequisites",
|
"name": "packages | prerequisites",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"apt-transport-https",
|
"apt-transport-https",
|
||||||
"gpg"
|
"gpg"
|
||||||
|
|
|
@ -1,13 +1,17 @@
|
||||||
{
|
{
|
||||||
"theme": "auto",
|
"theme": "auto",
|
||||||
"jwt_secret": "{{var_authelia_jwt_secret}}",
|
"identity_validation": {
|
||||||
|
"reset_password": {
|
||||||
|
"jwt_secret": "{{var_authelia_jwt_secret}}"
|
||||||
|
}
|
||||||
|
},
|
||||||
"default_2fa_method": "totp",
|
"default_2fa_method": "totp",
|
||||||
"server": {
|
"server": {
|
||||||
"host": "{{var_authelia_listen_address}}",
|
"address": "{{var_authelia_listen_address}}:9091",
|
||||||
"port": 9091,
|
"endpoints": {
|
||||||
"path": "",
|
"enable_pprof": false,
|
||||||
"enable_pprof": false,
|
"enable_expvars": false
|
||||||
"enable_expvars": false,
|
},
|
||||||
"disable_healthcheck": false
|
"disable_healthcheck": false
|
||||||
},
|
},
|
||||||
"log": {
|
"log": {
|
||||||
|
@ -47,7 +51,11 @@
|
||||||
},
|
},
|
||||||
"authentication_backend": {
|
"authentication_backend": {
|
||||||
"password_reset": {
|
"password_reset": {
|
||||||
|
{% if var_authelia_password_reset_enabled %}
|
||||||
|
"disable": false,
|
||||||
|
{% else %}
|
||||||
"disable": true,
|
"disable": true,
|
||||||
|
{% endif %}
|
||||||
"custom_url": ""
|
"custom_url": ""
|
||||||
},
|
},
|
||||||
"refresh_interval": "5m",
|
"refresh_interval": "5m",
|
||||||
|
@ -117,7 +125,7 @@
|
||||||
"secret": "{{var_authelia_session_secret}}",
|
"secret": "{{var_authelia_session_secret}}",
|
||||||
"expiration": "1h",
|
"expiration": "1h",
|
||||||
"inactivity": "5m",
|
"inactivity": "5m",
|
||||||
"remember_me_duration": "1M"
|
"remember_me": "1M"
|
||||||
},
|
},
|
||||||
"regulation": {
|
"regulation": {
|
||||||
"max_retries": 3,
|
"max_retries": 3,
|
||||||
|
@ -126,9 +134,29 @@
|
||||||
},
|
},
|
||||||
"storage": {
|
"storage": {
|
||||||
"encryption_key": "{{var_authelia_storage_encryption_key}}",
|
"encryption_key": "{{var_authelia_storage_encryption_key}}",
|
||||||
|
{% if var_authelia_storage_kind == "sqlite" %}
|
||||||
"local": {
|
"local": {
|
||||||
"path": "{{var_authelia_storage_path}}"
|
"path": "{{var_authelia_storage_data_sqlite_path}}"
|
||||||
}
|
}
|
||||||
|
{% endif %}
|
||||||
|
{% if var_authelia_storage_kind == "postgresql" %}
|
||||||
|
"postgres": {
|
||||||
|
"address": "{{var_authelia_storage_data_postgresql_host}}:{{var_authelia_storage_data_postgresql_port | string}}",
|
||||||
|
"schema": "public",
|
||||||
|
"username": "{{var_authelia_storage_data_postgresql_username}}",
|
||||||
|
"password": "{{var_authelia_storage_data_postgresql_password}}",
|
||||||
|
"database": "{{var_authelia_storage_data_postgresql_schema}}"
|
||||||
|
}
|
||||||
|
{% endif %}
|
||||||
|
{% if var_authelia_storage_kind == "mariadb" %}
|
||||||
|
"mysql": {
|
||||||
|
"host": "{{var_authelia_storage_data_mariadb_host}}",
|
||||||
|
"port": {{var_authelia_storage_data_mariadb_port | string}},
|
||||||
|
"username": "{{var_authelia_storage_data_mariadb_username}}",
|
||||||
|
"password": "{{var_authelia_storage_data_mariadb_password}}",
|
||||||
|
"database": "{{var_authelia_storage_data_mariadb_schema}}"
|
||||||
|
}
|
||||||
|
{% endif %}
|
||||||
},
|
},
|
||||||
"notifier": {
|
"notifier": {
|
||||||
"disable_startup_check": true,
|
"disable_startup_check": true,
|
||||||
|
@ -138,18 +166,18 @@
|
||||||
}
|
}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if var_authelia_notification_mode == "smtp" %}
|
{% if var_authelia_notification_mode == "smtp" %}
|
||||||
"smtp": {
|
"smtp": {
|
||||||
"host": "{{var_authelia_notification_smtp_host}}",
|
"host": "{{var_authelia_notification_smtp_host}}",
|
||||||
"port": {{var_authelia_notification_smtp_port}},
|
"port": {{var_authelia_notification_smtp_port | string}},
|
||||||
"username": "{{var_authelia_notification_smtp_username}}",
|
"username": "{{var_authelia_notification_smtp_username}}",
|
||||||
"password": "{{var_authelia_notification_smtp_password}}",
|
"password": "{{var_authelia_notification_smtp_password}}",
|
||||||
"sender": "{{var_authelia_notification_smtp_sender}}",
|
"sender": "{{var_authelia_notification_smtp_sender}}",
|
||||||
"disable_require_tls": false,
|
"disable_require_tls": false,
|
||||||
"disable_html_emails": false,
|
"disable_html_emails": false,
|
||||||
"tls": {
|
"tls": {
|
||||||
"skip_verify": false
|
"skip_verify": false
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
|
||||||
{% endif %}
|
{% endif %}
|
||||||
},
|
},
|
||||||
"identity_providers": {
|
"identity_providers": {
|
||||||
|
|
|
@ -1 +1,5 @@
|
||||||
users: {}
|
users:
|
||||||
|
_dummy:
|
||||||
|
displayname: dummy
|
||||||
|
password: "$2b$12$N5qptdk1VtpSlIlCxspLxeNeRIP6UEho4r1ZCoOlfpAtsIJQIjV/a"
|
||||||
|
email: dummy@example.org
|
||||||
|
|
130
ansible/roles/authelia/vardef.json
Normal file
130
ansible/roles/authelia/vardef.json
Normal file
|
@ -0,0 +1,130 @@
|
||||||
|
{
|
||||||
|
"version": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"architecture": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"listen_address": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"jwt_secret": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": true
|
||||||
|
},
|
||||||
|
"users_file_path": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"log_file_path": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"session_domain": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"session_secret": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": true
|
||||||
|
},
|
||||||
|
"storage_encryption_key": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": true
|
||||||
|
},
|
||||||
|
"storage_kind": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_sqlite_path": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_postgresql_host": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_postgresql_port": {
|
||||||
|
"type": "integer",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_postgresql_username": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_postgresql_password": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_postgresql_schema": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_mariadb_host": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_mariadb_port": {
|
||||||
|
"type": "integer",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_mariadb_username": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_mariadb_password": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"storage_data_mariadb_schema": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"ntp_server": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"password_reset_enabled": {
|
||||||
|
"type": "boolean",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"notification_mode": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false,
|
||||||
|
"options": [
|
||||||
|
"file",
|
||||||
|
"smtp"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"notification_file_path": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"notification_smtp_host": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"notification_smtp_port": {
|
||||||
|
"type": "integer",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"notification_smtp_username": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"notification_smtp_password": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"notification_smtp_sender": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"oidc_hmac_secret": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": true
|
||||||
|
}
|
||||||
|
}
|
|
@ -11,13 +11,10 @@
|
||||||
"var_hedgedoc_database_data_postgresql_password": "REPLACE_ME",
|
"var_hedgedoc_database_data_postgresql_password": "REPLACE_ME",
|
||||||
"var_hedgedoc_database_data_postgresql_schema": "hedgedoc",
|
"var_hedgedoc_database_data_postgresql_schema": "hedgedoc",
|
||||||
"var_hedgedoc_domain": "hedgedoc.example.org",
|
"var_hedgedoc_domain": "hedgedoc.example.org",
|
||||||
"var_hedgedoc_oauth2_enable": false,
|
"var_hedgedoc_authentication_kind": "authelia",
|
||||||
"var_hedgedoc_oauth2_provider_name": "external auth",
|
"var_hedgedoc_authentication_data_authelia_client_id": "hedgedoc",
|
||||||
"var_hedgedoc_oauth2_client_id": "hedgedoc",
|
"var_hedgedoc_authentication_data_authelia_client_secret": "REPLACE_ME",
|
||||||
"var_hedgedoc_oauth2_client_secret": "REPLACE_ME",
|
"var_hedgedoc_authentication_data_authelia_url_base": "https://authelia.linke.sx",
|
||||||
"var_hedgedoc_oauth2_user_profile_url": "https://auth.example.org/profile",
|
|
||||||
"var_hedgedoc_oauth2_token_url": "https://auth.example.org/token",
|
|
||||||
"var_hedgedoc_oauth2_authorization_url": "https://auth.example.org/authorization",
|
|
||||||
"var_hedgedoc_guest_allow_create": false,
|
"var_hedgedoc_guest_allow_create": false,
|
||||||
"var_hedgedoc_guest_allow_change": false,
|
"var_hedgedoc_guest_allow_change": false,
|
||||||
"var_hedgedoc_free_names_mode": "authed"
|
"var_hedgedoc_free_names_mode": "authed"
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "packages",
|
"name": "packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"acl",
|
"acl",
|
||||||
"git",
|
"git",
|
||||||
|
@ -56,24 +57,6 @@
|
||||||
"cmd": "bin/setup"
|
"cmd": "bin/setup"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"name": "var directory",
|
|
||||||
"become": true,
|
|
||||||
"ansible.builtin.file": {
|
|
||||||
"state": "directory",
|
|
||||||
"path": "{{var_hedgedoc_database_path | dirname}}",
|
|
||||||
"owner": "{{var_hedgedoc_user_name}}"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"name": "database",
|
|
||||||
"become": true,
|
|
||||||
"ansible.builtin.file": {
|
|
||||||
"state": "touch",
|
|
||||||
"path": "{{var_hedgedoc_database_path}}",
|
|
||||||
"owner": "{{var_hedgedoc_user_name}}"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"name": "configuration",
|
"name": "configuration",
|
||||||
"become": true,
|
"become": true,
|
||||||
|
|
|
@ -4,7 +4,7 @@
|
||||||
{% if var_hedgedoc_database_kind == 'sqlite' %}
|
{% if var_hedgedoc_database_kind == 'sqlite' %}
|
||||||
"db": {
|
"db": {
|
||||||
"dialect": "sqlite",
|
"dialect": "sqlite",
|
||||||
"storage": "{{var_hedgedoc_database_path}}"
|
"storage": "{{var_hedgedoc_database_data_sqlite_path}}"
|
||||||
},
|
},
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{% if var_hedgedoc_database_kind == 'postgresql' %}
|
{% if var_hedgedoc_database_kind == 'postgresql' %}
|
||||||
|
@ -25,27 +25,28 @@
|
||||||
"domain": "{{var_hedgedoc_domain}}",
|
"domain": "{{var_hedgedoc_domain}}",
|
||||||
"urlAddPort": false,
|
"urlAddPort": false,
|
||||||
"protocolUseSSL": true,
|
"protocolUseSSL": true,
|
||||||
{% if var_hedgedoc_oauth2_enable %}
|
{% if var_hedgedoc_authentication_kind == 'internal' %}
|
||||||
|
"email": true,
|
||||||
|
"allowEmailRegister": true,
|
||||||
|
{% endif %}
|
||||||
|
{% if var_hedgedoc_authentication_kind == 'authelia' %}
|
||||||
"oauth2": {
|
"oauth2": {
|
||||||
"providerName": "{{var_hedgedoc_oauth2_provider_name}}",
|
"providerName": "{{var_hedgedoc_authentication_data_authelia_provider_name}}",
|
||||||
"clientID": "{{var_hedgedoc_oauth2_client_id}}",
|
"clientID": "{{var_hedgedoc_authentication_data_authelia_client_id}}",
|
||||||
"clientSecret": "{{var_hedgedoc_oauth2_client_secret}}",
|
"clientSecret": "{{var_hedgedoc_authentication_data_authelia_client_secret}}",
|
||||||
"scope": "openid email profile",
|
"scope": "openid email profile",
|
||||||
"userProfileUsernameAttr": "sub",
|
"userProfileUsernameAttr": "sub",
|
||||||
"userProfileDisplayNameAttr": "name",
|
"userProfileDisplayNameAttr": "name",
|
||||||
"userProfileEmailAttr": "email",
|
"userProfileEmailAttr": "email",
|
||||||
"userProfileURL": "{{var_hedgedoc_oauth2_user_profile_url}}",
|
"userProfileURL": "{{var_hedgedoc_authentication_data_authelia_url_base}}/profile",
|
||||||
"tokenURL": "{{var_hedgedoc_oauth2_token_url}}",
|
"tokenURL": "{{var_hedgedoc_authentication_data_authelia_url_base}}/token",
|
||||||
"authorizationURL": "{{var_hedgedoc_oauth2_authorization_url}}"
|
"authorizationURL": "{{var_hedgedoc_authentication_data_authelia_url_base}}/authorization"
|
||||||
},
|
},
|
||||||
"email": false,
|
"email": false,
|
||||||
"allowEmailRegister": false,
|
"allowEmailRegister": false,
|
||||||
{% else %}
|
|
||||||
"email": true,
|
|
||||||
"allowEmailRegister": true,
|
|
||||||
{% endif %}
|
{% endif %}
|
||||||
"allowAnonymous": {{var_hedgedoc_guest_allow_create | to_json}},
|
"allowAnonymous": {{var_hedgedoc_guest_allow_create | to_json}},
|
||||||
"allowAnonymousEdits": {{var_hedgedoc_guest_allow_edit | to_json}},
|
"allowAnonymousEdits": {{var_hedgedoc_guest_allow_change | to_json}},
|
||||||
{% if var_hedgedoc_free_names_mode == 'never' %}
|
{% if var_hedgedoc_free_names_mode == 'never' %}
|
||||||
"allowFreeURL": false,
|
"allowFreeURL": false,
|
||||||
"requireFreeURLAuthentication": false,
|
"requireFreeURLAuthentication": false,
|
||||||
|
|
87
ansible/roles/hedgedoc/vardef.json
Normal file
87
ansible/roles/hedgedoc/vardef.json
Normal file
|
@ -0,0 +1,87 @@
|
||||||
|
{
|
||||||
|
"user_name": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"directory": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"version": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"session_secret": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": true
|
||||||
|
},
|
||||||
|
"database_kind": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false,
|
||||||
|
"options": [
|
||||||
|
"sqlite",
|
||||||
|
"postgresql",
|
||||||
|
"mariadb"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"database_data_sqlite_path": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"database_data_postgresql_host": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"database_data_postgresql_port": {
|
||||||
|
"type": "integer",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"database_data_postgresql_username": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"database_data_postgresql_password": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"database_data_postgresql_schema": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"domain": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"authentication_kind": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false,
|
||||||
|
"options": [
|
||||||
|
"internal",
|
||||||
|
"authelia"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"authentication_data_authelia_client_id": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"authentication_data_authelia_client_secret": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"authentication_data_authelia_url_base": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"guest_allow_create": {
|
||||||
|
"type": "boolean",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"guest_allow_change": {
|
||||||
|
"type": "boolean",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"free_names_mode": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
}
|
||||||
|
}
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "install packages",
|
"name": "install packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"lighttpd",
|
"lighttpd",
|
||||||
"lighttpd-mod-openssl"
|
"lighttpd-mod-openssl"
|
||||||
|
|
6
ansible/roles/murmur/defaults/main.json
Normal file
6
ansible/roles/murmur/defaults/main.json
Normal file
|
@ -0,0 +1,6 @@
|
||||||
|
{
|
||||||
|
"var_murmur_database_path": "/var/lib/mumble-server/mumble-server.sqlite",
|
||||||
|
"var_murmur_port": 64738,
|
||||||
|
"var_murmur_welcome_text": "<br />Welcome to this server running <b>Murmur</b>.<br />Enjoy your stay!<br />",
|
||||||
|
"var_murmur_admin_password": "REPLACE_ME"
|
||||||
|
}
|
12
ansible/roles/murmur/info.md
Normal file
12
ansible/roles/murmur/info.md
Normal file
|
@ -0,0 +1,12 @@
|
||||||
|
## Beschreibung
|
||||||
|
|
||||||
|
Server-Implementierung _Murmur_ für den Audiokonferenz-Software [Mumble](https://www.mumble.info/)
|
||||||
|
|
||||||
|
|
||||||
|
## Verweise
|
||||||
|
|
||||||
|
- [Wikipedia-Artikel zu Mumble](https://de.m.wikipedia.org/wiki/Mumblehttps://de.m.wikipedia.org/wiki/Mumble)
|
||||||
|
- [Mumble-Wiki | Hauptseite](https://wiki.mumble.info/wiki/Main_Page)
|
||||||
|
- [Mumble-Wiki | Running Murmur](https://wiki.mumble.info/wiki/Running_Murmur)
|
||||||
|
- [Mumble-Wiki | Murmurguide](https://wiki.mumble.info/wiki/Murmurguide)
|
||||||
|
- [Mumble-Wiki | Authentication](https://wiki.mumble.info/wiki/Authentication)
|
36
ansible/roles/murmur/tasks/main.json
Normal file
36
ansible/roles/murmur/tasks/main.json
Normal file
|
@ -0,0 +1,36 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"name": "packages",
|
||||||
|
"become": true,
|
||||||
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
|
"pkg": [
|
||||||
|
"mumble-server"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "configuration",
|
||||||
|
"become": true,
|
||||||
|
"ansible.builtin.template": {
|
||||||
|
"src": "mumble-server.ini.j2",
|
||||||
|
"dest": "/etc/mumble-server.ini",
|
||||||
|
"group": "mumble-server"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "admin account",
|
||||||
|
"become": true,
|
||||||
|
"ansible.builtin.command": {
|
||||||
|
"cmd": "murmurd -ini /etc/mumble-server.ini -supw {{var_murmur_admin_password}}"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "service",
|
||||||
|
"become": true,
|
||||||
|
"ansible.builtin.systemd_service": {
|
||||||
|
"state": "restarted",
|
||||||
|
"name": "mumble-server"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
380
ansible/roles/murmur/templates/mumble-server.ini.j2
Normal file
380
ansible/roles/murmur/templates/mumble-server.ini.j2
Normal file
|
@ -0,0 +1,380 @@
|
||||||
|
; Murmur configuration file.
|
||||||
|
;
|
||||||
|
; General notes:
|
||||||
|
; * Settings in this file are default settings and many of them can be overridden
|
||||||
|
; with virtual server specific configuration via the Ice or DBus interface.
|
||||||
|
; * Due to the way this configuration file is read some rules have to be
|
||||||
|
; followed when specifying variable values (as in variable = value):
|
||||||
|
; * Make sure to quote the value when using commas in strings or passwords.
|
||||||
|
; NOT variable = super,secret BUT variable = "super,secret"
|
||||||
|
; * Make sure to escape special characters like '\' or '"' correctly
|
||||||
|
; NOT variable = """ BUT variable = "\""
|
||||||
|
; NOT regex = \w* BUT regex = \\w*
|
||||||
|
|
||||||
|
; Path to database. If blank, will search for
|
||||||
|
; murmur.sqlite in default locations or create it if not found.
|
||||||
|
database={{var_murmur_database_path}}
|
||||||
|
|
||||||
|
; Murmur defaults to using SQLite with its default rollback journal.
|
||||||
|
; In some situations, using SQLite's write-ahead log (WAL) can be
|
||||||
|
; advantageous.
|
||||||
|
; If you encounter slowdowns when moving between channels and similar
|
||||||
|
; operations, enabling the SQLite write-ahead log might help.
|
||||||
|
;
|
||||||
|
; To use SQLite's write-ahead log, set sqlite_wal to one of the following
|
||||||
|
; values:
|
||||||
|
;
|
||||||
|
; 0 - Use SQLite's default rollback journal.
|
||||||
|
; 1 - Use write-ahead log with synchronous=NORMAL.
|
||||||
|
; If Murmur crashes, the database will be in a consistent state, but
|
||||||
|
; the most recent changes might be lost if the operating system did
|
||||||
|
; not write them to disk yet. This option can improve Murmur's
|
||||||
|
; interactivity on busy servers, or servers with slow storage.
|
||||||
|
; 2 - Use write-ahead log with synchronous=FULL.
|
||||||
|
; All database writes are synchronized to disk when they are made.
|
||||||
|
; If Murmur crashes, the database will be include all completed writes.
|
||||||
|
;sqlite_wal=0
|
||||||
|
|
||||||
|
; If you wish to use something other than SQLite, you'll need to set the name
|
||||||
|
; of the database above, and also uncomment the below.
|
||||||
|
; Sticking with SQLite is strongly recommended, as it's the most well tested
|
||||||
|
; and by far the fastest solution.
|
||||||
|
;
|
||||||
|
;dbDriver=QMYSQL
|
||||||
|
;dbUsername=
|
||||||
|
;dbPassword=
|
||||||
|
;dbHost=
|
||||||
|
;dbPort=
|
||||||
|
;dbPrefix=murmur_
|
||||||
|
;dbOpts=
|
||||||
|
|
||||||
|
; Murmur defaults to not using D-Bus. If you wish to use dbus, which is one of the
|
||||||
|
; RPC methods available in Murmur, please specify so here.
|
||||||
|
;
|
||||||
|
;dbus=system
|
||||||
|
|
||||||
|
; Alternate D-Bus service name. Only use if you are running distinct
|
||||||
|
; murmurd processes connected to the same D-Bus daemon.
|
||||||
|
;dbusservice=net.sourceforge.mumble.murmur
|
||||||
|
|
||||||
|
; If you want to use ZeroC Ice to communicate with Murmur, you need
|
||||||
|
; to specify the endpoint to use. Since there is no authentication
|
||||||
|
; with ICE, you should only use it if you trust all the users who have
|
||||||
|
; shell access to your machine.
|
||||||
|
; Please see the ICE documentation on how to specify endpoints.
|
||||||
|
#ice="tcp -h 127.0.0.1 -p 6502"
|
||||||
|
|
||||||
|
; Ice primarily uses local sockets. This means anyone who has a
|
||||||
|
; user account on your machine can connect to the Ice services.
|
||||||
|
; You can set a plaintext "secret" on the Ice connection, and
|
||||||
|
; any script attempting to access must then have this secret
|
||||||
|
; (as context with name "secret").
|
||||||
|
; Access is split in read (look only) and write (modify)
|
||||||
|
; operations. Write access always includes read access,
|
||||||
|
; unless read is explicitly denied (see note below).
|
||||||
|
;
|
||||||
|
; Note that if this is uncommented and with empty content,
|
||||||
|
; access will be denied.
|
||||||
|
|
||||||
|
;icesecretread=
|
||||||
|
icesecretwrite=
|
||||||
|
|
||||||
|
; If you want to expose Murmur's experimental gRPC API, you
|
||||||
|
; need to specify an address to bind on.
|
||||||
|
; Note: not all builds of Murmur support gRPC. If gRPC is not
|
||||||
|
; available, Murmur will warn you in its log output.
|
||||||
|
;grpc="127.0.0.1:50051"
|
||||||
|
; Specifying both a certificate and key file below will cause gRPC to use
|
||||||
|
; secured, TLS connections.
|
||||||
|
;grpccert=""
|
||||||
|
;grpckey=""
|
||||||
|
|
||||||
|
; Specifies the file Murmur should log to. By default, Murmur
|
||||||
|
; logs to the file 'murmur.log'. If you leave this field blank
|
||||||
|
; on Unix-like systems, Murmur will force itself into foreground
|
||||||
|
; mode which logs to the console.
|
||||||
|
logfile=/var/log/mumble-server/mumble-server.log
|
||||||
|
|
||||||
|
; If set, Murmur will write its process ID to this file
|
||||||
|
; when running in daemon mode (when the -fg flag is not
|
||||||
|
; specified on the command line). Only available on
|
||||||
|
; Unix-like systems.
|
||||||
|
pidfile=/run/mumble-server/mumble-server.pid
|
||||||
|
|
||||||
|
; The below will be used as defaults for new configured servers.
|
||||||
|
; If you're just running one server (the default), it's easier to
|
||||||
|
; configure it here than through D-Bus or Ice.
|
||||||
|
;
|
||||||
|
; Welcome message sent to clients when they connect.
|
||||||
|
; If the welcome message is set to an empty string,
|
||||||
|
; no welcome message will be sent to clients.
|
||||||
|
welcometext="{{var_murmur_welcome_text}}"
|
||||||
|
|
||||||
|
; Port to bind TCP and UDP sockets to.
|
||||||
|
port={{var_murmur_port | string}}
|
||||||
|
|
||||||
|
; Specific IP or hostname to bind to.
|
||||||
|
; If this is left blank (default), Murmur will bind to all available addresses.
|
||||||
|
;host=
|
||||||
|
|
||||||
|
; Password to join server.
|
||||||
|
serverpassword=
|
||||||
|
|
||||||
|
; Maximum bandwidth (in bits per second) clients are allowed
|
||||||
|
; to send speech at.
|
||||||
|
bandwidth=72000
|
||||||
|
|
||||||
|
; Murmur and Mumble are usually pretty good about cleaning up hung clients, but
|
||||||
|
; occasionally one will get stuck on the server. The timeout setting will cause
|
||||||
|
; a periodic check of all clients who haven't communicated with the server in
|
||||||
|
; this many seconds - causing zombie clients to be disconnected.
|
||||||
|
;
|
||||||
|
; Note that this has no effect on idle clients or people who are AFK. It will
|
||||||
|
; only affect people who are already disconnected, and just haven't told the
|
||||||
|
; server.
|
||||||
|
;timeout=30
|
||||||
|
|
||||||
|
; Maximum number of concurrent clients allowed.
|
||||||
|
users=100
|
||||||
|
|
||||||
|
; Where users sets a blanket limit on the number of clients per virtual server,
|
||||||
|
; usersperchannel sets a limit on the number per channel. The default is 0, for
|
||||||
|
; no limit.
|
||||||
|
;usersperchannel=0
|
||||||
|
|
||||||
|
; Per-user rate limiting
|
||||||
|
;
|
||||||
|
; These two settings allow to configure the per-user rate limiter for some
|
||||||
|
; command messages sent from the client to the server. The messageburst setting
|
||||||
|
; specifies an amount of messages which are allowed in short bursts. The
|
||||||
|
; messagelimit setting specifies the number of messages per second allowed over
|
||||||
|
; a longer period. If a user hits the rate limit, his packages are then ignored
|
||||||
|
; for some time. Both of these settings have a minimum of 1 as setting either to
|
||||||
|
; 0 could render the server unusable.
|
||||||
|
messageburst=5
|
||||||
|
messagelimit=1
|
||||||
|
|
||||||
|
; Respond to UDP ping packets.
|
||||||
|
;
|
||||||
|
; Setting to true exposes the current user count, the maximum user count, and
|
||||||
|
; the server's maximum bandwidth per client to unauthenticated users. In the
|
||||||
|
; Mumble client, this information is shown in the Connect dialog.
|
||||||
|
allowping=true
|
||||||
|
|
||||||
|
; Amount of users with Opus support needed to force Opus usage, in percent.
|
||||||
|
; 0 = Always enable Opus, 100 = enable Opus if it's supported by all clients.
|
||||||
|
;opusthreshold=100
|
||||||
|
|
||||||
|
; Maximum depth of channel nesting. Note that some databases like MySQL using
|
||||||
|
; InnoDB will fail when operating on deeply nested channels.
|
||||||
|
;channelnestinglimit=10
|
||||||
|
|
||||||
|
; Maximum number of channels per server. 0 for unlimited. Note that an
|
||||||
|
; excessive number of channels will impact server performance
|
||||||
|
;channelcountlimit=1000
|
||||||
|
|
||||||
|
; Regular expression used to validate channel names.
|
||||||
|
; (Note that you have to escape backslashes with \ )
|
||||||
|
;channelname=[ \\-=\\w\\#\\[\\]\\{\\}\\(\\)\\@\\|]+
|
||||||
|
|
||||||
|
; Regular expression used to validate user names.
|
||||||
|
; (Note that you have to escape backslashes with \ )
|
||||||
|
;username=[-=\\w\\[\\]\\{\\}\\(\\)\\@\\|\\.]+
|
||||||
|
|
||||||
|
; If a user has no stored channel (they've never been connected to the server
|
||||||
|
; before, or rememberchannel is set to false) and the client hasn't been given
|
||||||
|
; a URL that includes a channel path, the default behavior is that they will
|
||||||
|
; end up in the root channel.
|
||||||
|
;
|
||||||
|
; You can set this setting to a channel ID, and the user will automatically be
|
||||||
|
; moved into that channel instead. Note that this is the numeric ID of the
|
||||||
|
; channel, which can be a little tricky to get (you'll either need to use an
|
||||||
|
; RPC mechanism, watch the console of a debug client, or root around through
|
||||||
|
; the Murmur Database to get it).
|
||||||
|
;
|
||||||
|
;defaultchannel=0
|
||||||
|
|
||||||
|
; When a user connects to a server they've already been on, by default the
|
||||||
|
; server will remember the last channel they were in and move them to it
|
||||||
|
; automatically. Toggling this setting to false will disable that feature.
|
||||||
|
;
|
||||||
|
;rememberchannel=true
|
||||||
|
|
||||||
|
; Maximum length of text messages in characters. 0 for no limit.
|
||||||
|
;textmessagelength=5000
|
||||||
|
|
||||||
|
; Maximum length of text messages in characters, with image data. 0 for no limit.
|
||||||
|
;imagemessagelength=131072
|
||||||
|
|
||||||
|
; Allow clients to use HTML in messages, user comments and channel descriptions?
|
||||||
|
;allowhtml=true
|
||||||
|
|
||||||
|
; Murmur retains the per-server log entries in an internal database which
|
||||||
|
; allows it to be accessed over D-Bus/ICE.
|
||||||
|
; How many days should such entries be kept?
|
||||||
|
; Set to 0 to keep forever, or -1 to disable logging to the DB.
|
||||||
|
;logdays=31
|
||||||
|
|
||||||
|
; To enable public server registration, the serverpassword must be blank, and
|
||||||
|
; this must all be filled out.
|
||||||
|
; The password here is used to create a registry for the server name; subsequent
|
||||||
|
; updates will need the same password. Don't lose your password.
|
||||||
|
; The URL is your own website, and only set the registerHostname for static IP
|
||||||
|
; addresses.
|
||||||
|
; Location is typically the country of typical users of the server, in
|
||||||
|
; two-letter TLD style (ISO 3166-1 alpha-2 country code)
|
||||||
|
;
|
||||||
|
; If you only wish to give your "Root" channel a custom name, then only
|
||||||
|
; uncomment the 'registerName' parameter.
|
||||||
|
;
|
||||||
|
;registerName=Mumble Server
|
||||||
|
;registerPassword=secret
|
||||||
|
;registerUrl=http://www.mumble.info/
|
||||||
|
;registerHostname=
|
||||||
|
;registerLocation=
|
||||||
|
|
||||||
|
; If this option is enabled, the server will announce its presence via the
|
||||||
|
; bonjour service discovery protocol. To change the name announced by bonjour
|
||||||
|
; adjust the registerName variable.
|
||||||
|
; See http://developer.apple.com/networking/bonjour/index.html for more information
|
||||||
|
; about bonjour.
|
||||||
|
;bonjour=True
|
||||||
|
|
||||||
|
; If you have a proper SSL certificate, you can provide the filenames here.
|
||||||
|
; Otherwise, Murmur will create its own certificate automatically.
|
||||||
|
;sslCert=
|
||||||
|
;sslKey=
|
||||||
|
|
||||||
|
; If the keyfile specified above is encrypted with a passphrase, you can enter
|
||||||
|
; it in this setting. It must be plaintext, so you may wish to adjust the
|
||||||
|
; permissions on your murmur.ini file accordingly.
|
||||||
|
;sslPassPhrase=
|
||||||
|
|
||||||
|
; If your certificate is signed by an authority that uses a sub-signed or
|
||||||
|
; "intermediate" certificate, you probably need to bundle it with your
|
||||||
|
; certificate in order to get Murmur to accept it. You can either concatenate
|
||||||
|
; the two certificates into one file, or you can put it in a file by itself and
|
||||||
|
; put the path to that PEM-file in sslCA.
|
||||||
|
;sslCA=
|
||||||
|
|
||||||
|
; The sslDHParams option allows you to specify a PEM-encoded file with
|
||||||
|
; Diffie-Hellman parameters, which will be used as the default Diffie-
|
||||||
|
; Hellman parameters for all virtual servers.
|
||||||
|
;
|
||||||
|
; Instead of pointing sslDHParams to a file, you can also use the option
|
||||||
|
; to specify a named set of Diffie-Hellman parameters for Murmur to use.
|
||||||
|
; Murmur comes bundled with the Diffie-Hellman parameters from RFC 7919.
|
||||||
|
; These parameters are available by using the following names:
|
||||||
|
;
|
||||||
|
; @ffdhe2048, @ffdhe3072, @ffdhe4096, @ffdhe6144, @ffdhe8192
|
||||||
|
;
|
||||||
|
; By default, Murmur uses @ffdhe2048.
|
||||||
|
;sslDHParams=@ffdhe2048
|
||||||
|
|
||||||
|
; The sslCiphers option chooses the cipher suites to make available for use
|
||||||
|
; in SSL/TLS. This option is server-wide, and cannot be set on a
|
||||||
|
; per-virtual-server basis.
|
||||||
|
;
|
||||||
|
; This option is specified using OpenSSL cipher list notation (see
|
||||||
|
; https://www.openssl.org/docs/apps/ciphers.html#CIPHER-LIST-FORMAT).
|
||||||
|
;
|
||||||
|
; It is recommended that you try your cipher string using 'openssl ciphers <string>'
|
||||||
|
; before setting it here, to get a feel for which cipher suites you will get.
|
||||||
|
;
|
||||||
|
; After setting this option, it is recommend that you inspect your Murmur log
|
||||||
|
; to ensure that Murmur is using the cipher suites that you expected it to.
|
||||||
|
;
|
||||||
|
; Note: Changing this option may impact the backwards compatibility of your
|
||||||
|
; Murmur server, and can remove the ability for older Mumble clients to be able
|
||||||
|
; to connect to it.
|
||||||
|
;sslCiphers=EECDH+AESGCM:EDH+aRSA+AESGCM:DHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA:AES256-SHA:AES128-SHA
|
||||||
|
|
||||||
|
; If Murmur is started as root, which user should it switch to?
|
||||||
|
; This option is ignored if Murmur isn't started with root privileges.
|
||||||
|
uname=mumble-server
|
||||||
|
|
||||||
|
; By default, in log files and in the user status window for privileged users,
|
||||||
|
; Mumble will show IP addresses - in some situations you may find this unwanted
|
||||||
|
; behavior. If obfuscate is set to true, Murmur will randomize the IP addresses
|
||||||
|
; of connecting users.
|
||||||
|
;
|
||||||
|
; The obfuscate function only affects the log file and DOES NOT effect the user
|
||||||
|
; information section in the client window.
|
||||||
|
;obfuscate=false
|
||||||
|
|
||||||
|
; If this options is enabled, only clients which have a certificate are allowed
|
||||||
|
; to connect.
|
||||||
|
;certrequired=False
|
||||||
|
|
||||||
|
; If enabled, clients are sent information about the servers version and operating
|
||||||
|
; system.
|
||||||
|
;sendversion=True
|
||||||
|
|
||||||
|
; You can set a recommended minimum version for your server, and clients will
|
||||||
|
; be notified in their log when they connect if their client does not meet the
|
||||||
|
; minimum requirements. suggestVersion expects the version in the format X.X.X.
|
||||||
|
;
|
||||||
|
; Note that the suggest* options appeared after 1.2.3 and will have no effect
|
||||||
|
; on client versions 1.2.3 and earlier.
|
||||||
|
;
|
||||||
|
;suggestVersion=
|
||||||
|
|
||||||
|
; Setting this to "true" will alert any user who does not have positional audio
|
||||||
|
; enabled that the server administrators recommend enabling it. Setting it to
|
||||||
|
; "false" will have the opposite effect - if you do not care whether the user
|
||||||
|
; enables positional audio or not, set it to blank. The message will appear in
|
||||||
|
; the log window upon connection, but only if the user's settings do not match
|
||||||
|
; what the server requests.
|
||||||
|
;
|
||||||
|
; Note that the suggest* options appeared after 1.2.3 and will have no effect
|
||||||
|
; on client versions 1.2.3 and earlier.
|
||||||
|
;
|
||||||
|
;suggestPositional=
|
||||||
|
|
||||||
|
; Setting this to "true" will alert any user who does not have Push-To-Talk
|
||||||
|
; enabled that the server administrators recommend enabling it. Setting it to
|
||||||
|
; "false" will have the opposite effect - if you do not care whether the user
|
||||||
|
; enables PTT or not, set it to blank. The message will appear in the log
|
||||||
|
; window upon connection, but only if the user's settings do not match what the
|
||||||
|
; server requests.
|
||||||
|
;
|
||||||
|
; Note that the suggest* options appeared after 1.2.3 and will have no effect
|
||||||
|
; on client versions 1.2.3 and earlier.
|
||||||
|
;
|
||||||
|
;suggestPushToTalk=
|
||||||
|
|
||||||
|
; This sets password hash storage to legacy mode (1.2.4 and before)
|
||||||
|
; (Note that setting this to true is insecure and should not be used unless absolutely necessary)
|
||||||
|
;legacyPasswordHash=false
|
||||||
|
|
||||||
|
; By default a strong amount of PBKDF2 iterations are chosen automatically. If >0 this setting
|
||||||
|
; overrides the automatic benchmark and forces a specific number of iterations.
|
||||||
|
; (Note that you should only change this value if you know what you are doing)
|
||||||
|
;kdfIterations=-1
|
||||||
|
|
||||||
|
; In order to prevent misconfigured, impolite or malicious clients from
|
||||||
|
; affecting the low-latency of other users, Murmur has a rudimentary global-ban
|
||||||
|
; system. It's configured using the autobanAttempts, autobanTimeframe and
|
||||||
|
; autobanTime settings.
|
||||||
|
;
|
||||||
|
; If a client attempts autobanAttempts connections in autobanTimeframe seconds,
|
||||||
|
; they will be banned for autobanTime seconds. This is a global ban, from all
|
||||||
|
; virtual servers on the Murmur process. It will not show up in any of the
|
||||||
|
; ban-lists on the server, and they can't be removed without restarting the
|
||||||
|
; Murmur process - just let them expire. A single, properly functioning client
|
||||||
|
; should not trip these bans.
|
||||||
|
;
|
||||||
|
; To disable, set autobanAttempts or autobanTimeframe to 0. Commenting these
|
||||||
|
; settings out will cause Murmur to use the defaults:
|
||||||
|
;
|
||||||
|
;autobanAttempts=10
|
||||||
|
;autobanTimeframe=120
|
||||||
|
;autobanTime=300
|
||||||
|
|
||||||
|
; You can configure any of the configuration options for Ice here. We recommend
|
||||||
|
; leave the defaults as they are.
|
||||||
|
; Please note that this section has to be last in the configuration file.
|
||||||
|
;
|
||||||
|
[Ice]
|
||||||
|
Ice.Warn.UnknownProperties=1
|
||||||
|
Ice.MessageSizeMax=65536
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "install packages",
|
"name": "install packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"nginx"
|
"nginx"
|
||||||
]
|
]
|
||||||
|
|
7
ansible/roles/postgresql-for-authelia/defaults/main.json
Normal file
7
ansible/roles/postgresql-for-authelia/defaults/main.json
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
{
|
||||||
|
"var_postgresql_for_authelia_host": "localhost",
|
||||||
|
"var_postgresql_for_authelia_port": 5432,
|
||||||
|
"var_postgresql_for_authelia_username": "authelia_user",
|
||||||
|
"var_postgresql_for_authelia_password": "REPLACE_ME",
|
||||||
|
"var_postgresql_for_authelia_schema": "authelia"
|
||||||
|
}
|
49
ansible/roles/postgresql-for-authelia/tasks/main.json
Normal file
49
ansible/roles/postgresql-for-authelia/tasks/main.json
Normal file
|
@ -0,0 +1,49 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"name": "packages",
|
||||||
|
"become": true,
|
||||||
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
|
"pkg": [
|
||||||
|
"acl",
|
||||||
|
"python3-psycopg2"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "user",
|
||||||
|
"become": true,
|
||||||
|
"become_user": "postgres",
|
||||||
|
"community.postgresql.postgresql_user": {
|
||||||
|
"state": "present",
|
||||||
|
"name": "{{var_postgresql_for_authelia_username}}",
|
||||||
|
"password": "{{var_postgresql_for_authelia_password}}"
|
||||||
|
},
|
||||||
|
"environment": {
|
||||||
|
"PGOPTIONS": "-c password_encryption=scram-sha-256"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "schema",
|
||||||
|
"become": true,
|
||||||
|
"become_user": "postgres",
|
||||||
|
"community.postgresql.postgresql_db": {
|
||||||
|
"state": "present",
|
||||||
|
"name": "{{var_postgresql_for_authelia_schema}}",
|
||||||
|
"owner": "{{var_postgresql_for_authelia_username}}"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "rights",
|
||||||
|
"become": true,
|
||||||
|
"become_user": "postgres",
|
||||||
|
"community.postgresql.postgresql_privs": {
|
||||||
|
"state": "present",
|
||||||
|
"db": "{{var_postgresql_for_authelia_schema}}",
|
||||||
|
"objs": "ALL_IN_SCHEMA",
|
||||||
|
"roles": "{{var_postgresql_for_authelia_username}}",
|
||||||
|
"privs": "ALL",
|
||||||
|
"grant_option": true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
22
ansible/roles/postgresql-for-authelia/vardef.json
Normal file
22
ansible/roles/postgresql-for-authelia/vardef.json
Normal file
|
@ -0,0 +1,22 @@
|
||||||
|
{
|
||||||
|
"host": {
|
||||||
|
"mandatory": false,
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"port": {
|
||||||
|
"mandatory": false,
|
||||||
|
"type": "integer"
|
||||||
|
},
|
||||||
|
"username": {
|
||||||
|
"mandatory": false,
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"password": {
|
||||||
|
"mandatory": true,
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"schema": {
|
||||||
|
"mandatory": false,
|
||||||
|
"type": "string"
|
||||||
|
}
|
||||||
|
}
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "packages",
|
"name": "packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"acl",
|
"acl",
|
||||||
"python3-psycopg2"
|
"python3-psycopg2"
|
||||||
|
@ -17,6 +18,9 @@
|
||||||
"state": "present",
|
"state": "present",
|
||||||
"name": "{{var_postgresql_for_hedgedoc_username}}",
|
"name": "{{var_postgresql_for_hedgedoc_username}}",
|
||||||
"password": "{{var_postgresql_for_hedgedoc_password}}"
|
"password": "{{var_postgresql_for_hedgedoc_password}}"
|
||||||
|
},
|
||||||
|
"environment": {
|
||||||
|
"PGOPTIONS": "-c password_encryption=scram-sha-256"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "packages",
|
"name": "packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"acl",
|
"acl",
|
||||||
"python3-psycopg2"
|
"python3-psycopg2"
|
||||||
|
@ -17,6 +18,9 @@
|
||||||
"state": "present",
|
"state": "present",
|
||||||
"name": "{{var_postgresql_for_synapse_username}}",
|
"name": "{{var_postgresql_for_synapse_username}}",
|
||||||
"password": "{{var_postgresql_for_synapse_password}}"
|
"password": "{{var_postgresql_for_synapse_password}}"
|
||||||
|
},
|
||||||
|
"environment": {
|
||||||
|
"PGOPTIONS": "-c password_encryption=scram-sha-256"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
{
|
{
|
||||||
"var_postgresql_listen_address": "localhost",
|
"var_postgresql_listen_address": "localhost",
|
||||||
"var_postgresql_port": "5432"
|
"var_postgresql_port": 5432
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "install packages",
|
"name": "install packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"postgresql"
|
"postgresql"
|
||||||
]
|
]
|
||||||
|
|
|
@ -61,7 +61,7 @@ listen_addresses = '{{var_postgresql_listen_address}}' # what IP address(es) to
|
||||||
# comma-separated list of addresses;
|
# comma-separated list of addresses;
|
||||||
# defaults to 'localhost'; use '*' for all
|
# defaults to 'localhost'; use '*' for all
|
||||||
# (change requires restart)
|
# (change requires restart)
|
||||||
port = {{var_postgresql_port}} # (change requires restart)
|
port = {{var_postgresql_port | string}} # (change requires restart)
|
||||||
max_connections = 100 # (change requires restart)
|
max_connections = 100 # (change requires restart)
|
||||||
#superuser_reserved_connections = 3 # (change requires restart)
|
#superuser_reserved_connections = 3 # (change requires restart)
|
||||||
unix_socket_directories = '/var/run/postgresql' # comma-separated list of directories
|
unix_socket_directories = '/var/run/postgresql' # comma-separated list of directories
|
||||||
|
|
15
ansible/roles/postgresql/vardef.json
Normal file
15
ansible/roles/postgresql/vardef.json
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
{
|
||||||
|
"listen_address": {
|
||||||
|
"mandatory": false,
|
||||||
|
"type": "string"
|
||||||
|
},
|
||||||
|
"port": {
|
||||||
|
"mandatory": false,
|
||||||
|
"type": "integer"
|
||||||
|
},
|
||||||
|
"allow_md5_auth": {
|
||||||
|
"mandatory": false,
|
||||||
|
"type": "boolean"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "install packages",
|
"name": "install packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"proftpd-core"
|
"proftpd-core"
|
||||||
]
|
]
|
||||||
|
|
4
ansible/roles/sqlite-for-hedgedoc/defaults/main.json
Normal file
4
ansible/roles/sqlite-for-hedgedoc/defaults/main.json
Normal file
|
@ -0,0 +1,4 @@
|
||||||
|
{
|
||||||
|
"var_sqlite_for_hedgedoc_path": "/var/hedgedoc/data.sqlite",
|
||||||
|
"var_sqlite_for_hedgedoc_user_name": "hedgedoc"
|
||||||
|
}
|
20
ansible/roles/sqlite-for-hedgedoc/tasks/main.json
Normal file
20
ansible/roles/sqlite-for-hedgedoc/tasks/main.json
Normal file
|
@ -0,0 +1,20 @@
|
||||||
|
[
|
||||||
|
{
|
||||||
|
"name": "directory",
|
||||||
|
"become": true,
|
||||||
|
"ansible.builtin.file": {
|
||||||
|
"state": "directory",
|
||||||
|
"path": "{{var_sqlite_for_hedgedoc_path | dirname}}",
|
||||||
|
"owner": "{{var_hedgedoc_user_name}}"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"name": "file",
|
||||||
|
"become": true,
|
||||||
|
"ansible.builtin.file": {
|
||||||
|
"state": "touch",
|
||||||
|
"path": "{{var_sqlite_for_hedgedoc_path}}",
|
||||||
|
"owner": "{{var_sqlite_for_hedgedoc_user_name}}"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
10
ansible/roles/sqlite-for-hedgedoc/vardef.json
Normal file
10
ansible/roles/sqlite-for-hedgedoc/vardef.json
Normal file
|
@ -0,0 +1,10 @@
|
||||||
|
{
|
||||||
|
"path": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
},
|
||||||
|
"user_name": {
|
||||||
|
"type": "string",
|
||||||
|
"mandatory": false
|
||||||
|
}
|
||||||
|
}
|
|
@ -1,24 +1,24 @@
|
||||||
{
|
{
|
||||||
"var_synapse_scheme": "https",
|
"var_synapse_scheme": "https",
|
||||||
"var_synapse_domain": "synapse.example.org",
|
"var_synapse_domain": "synapse.example.org",
|
||||||
"var_synaspe_database_kind": "sqlite",
|
"var_synapse_database_kind": "sqlite",
|
||||||
"var_synaspe_database_sqlite_path": "/var/synapse/data.sqlite",
|
"var_synapse_database_data_sqlite_path": "/var/synapse/data.sqlite",
|
||||||
"var_synaspe_database_postgresql_host": "localhost",
|
"var_synapse_database_data_postgresql_host": "localhost",
|
||||||
"var_synaspe_database_postgresql_port": "5432",
|
"var_synapse_database_data_postgresql_port": 5432,
|
||||||
"var_synaspe_database_postgresql_username": "synapse_user",
|
"var_synapse_database_data_postgresql_username": "synapse_user",
|
||||||
"var_synaspe_database_postgresql_password": "REPLACE_ME",
|
"var_synapse_database_data_postgresql_password": "REPLACE_ME",
|
||||||
"var_synaspe_database_postgresql_schema": "synapse",
|
"var_synapse_database_data_postgresql_schema": "synapse",
|
||||||
"var_synapse_element_url": "https://element.example.org",
|
"var_synapse_element_url": "https://element.example.org",
|
||||||
"var_synapse_title": "Example | Matrix",
|
"var_synapse_title": "Example | Matrix",
|
||||||
"var_synapse_federation_whitelist": [],
|
"var_synapse_federation_whitelist": [],
|
||||||
"var_synapse_password_strict_policy": true,
|
"var_synapse_password_strict_policy": true,
|
||||||
"var_synapse_registration_shared_secret": "REPLACE_ME",
|
"var_synapse_registration_shared_secret": "REPLACE_ME",
|
||||||
"var_synapse_oidc_enable": false,
|
"var_synapse_authentication_kind": "internal",
|
||||||
"var_synapse_oidc_provider_id": "external_auth",
|
"var_synapse_authentication_data_authelia_provider_id": "authelia",
|
||||||
"var_synapse_oidc_provider_name": "external auth",
|
"var_synapse_authentication_data_authelia_provider_name": "Authelia",
|
||||||
"var_synapse_oidc_client_id": "synapse",
|
"var_synapse_authentication_data_authelia_client_id": "synapse",
|
||||||
"var_synapse_oidc_client_secret": "REPLACE_ME",
|
"var_synapse_authentication_data_authelia_client_secret": "REPLACE_ME",
|
||||||
"var_synapse_oidc_issuer_url": "https://auth.example.org",
|
"var_synapse_authentication_data_authelia_url_base": "https://authelia.example.org",
|
||||||
"var_synapse_smtp_host": "smtp.example.org",
|
"var_synapse_smtp_host": "smtp.example.org",
|
||||||
"var_synapse_smtp_port": 587,
|
"var_synapse_smtp_port": 587,
|
||||||
"var_synapse_smtp_username": "synapse@smtp.example.org",
|
"var_synapse_smtp_username": "synapse@smtp.example.org",
|
||||||
|
|
|
@ -1,19 +1,19 @@
|
||||||
{% if var_synaspe_database_kind == 'sqlite' %}
|
{% if var_synapse_database_kind == 'sqlite' %}
|
||||||
database:
|
database:
|
||||||
name: sqlite3
|
name: sqlite3
|
||||||
args:
|
args:
|
||||||
database: {{var_synaspe_database_sqlite_path}}
|
database: {{var_synapse_database_sqlite_path}}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if var_synaspe_database_kind == 'postgresql' %}
|
{% if var_synapse_database_kind == 'postgresql' %}
|
||||||
database:
|
database:
|
||||||
name: psycopg2
|
name: psycopg2
|
||||||
args:
|
args:
|
||||||
host: {{var_synapse_database_postgresql_host}}
|
host: {{var_synapse_database_data_postgresql_host}}
|
||||||
port: {{var_synapse_database_postgresql_port}}
|
port: {{var_synapse_database_data_postgresql_port | string}}
|
||||||
database: "{{var_synapse_database_postgresql_schema}}"
|
database: "{{var_synapse_database_data_postgresql_schema}}"
|
||||||
user: "{{var_synapse_database_postgresql_username}}"
|
user: "{{var_synapse_database_data_postgresql_username}}"
|
||||||
password: "{{var_synapse_database_postgresql_password}}"
|
password: "{{var_synapse_database_data_postgresql_password}}"
|
||||||
cp_min: 5
|
cp_min: 5
|
||||||
cp_max: 10
|
cp_max: 10
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
@ -91,29 +91,29 @@ recaptcha_siteverify_api: "https://www.google.com/recaptcha/api/siteverify"
|
||||||
registration_shared_secret: "{{var_synapse_registration_shared_secret}}"
|
registration_shared_secret: "{{var_synapse_registration_shared_secret}}"
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
{% if var_synapse_oidc_enable %}
|
|
||||||
enable_registration: false
|
|
||||||
enable_registration_without_verification: false
|
|
||||||
{% else %}
|
|
||||||
enable_registration: true
|
|
||||||
enable_registration_without_verification: true
|
|
||||||
{% endif %}
|
|
||||||
|
|
||||||
oidc_config:
|
oidc_config:
|
||||||
user_mapping_provider:
|
user_mapping_provider:
|
||||||
config:
|
config:
|
||||||
# NOT an Ansible variable
|
# NOT an Ansible variable
|
||||||
localpart_template: "{{"{{"}} user.preferred_username {{"}}"}}"
|
localpart_template: "{{"{{"}} user.preferred_username {{"}}"}}"
|
||||||
|
|
||||||
{% if var_synapse_oidc_enable %}
|
{% if var_synapse_authentication_kind == 'internal' %}
|
||||||
|
enable_registration: true
|
||||||
|
enable_registration_without_verification: true
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
{% if var_synapse_authentication_kind == 'authelia' %}
|
||||||
|
enable_registration: false
|
||||||
|
enable_registration_without_verification: false
|
||||||
|
|
||||||
oidc_providers:
|
oidc_providers:
|
||||||
- idp_id: "{{var_synapse_oidc_provider_id}}"
|
- idp_id: "{{var_synapse_authentication_data_authelia_provider_id}}"
|
||||||
idp_name: "{{var_synapse_oidc_provider_name}}"
|
idp_name: "{{var_synapse_authentication_data_authelia_provider_name}}"
|
||||||
# idp_icon: "mxc://authelia.com/cKlrTPsGvlpKxAYeHWJsdVHI"
|
idp_icon: "mxc://authelia.com/cKlrTPsGvlpKxAYeHWJsdVHI"
|
||||||
discover: true
|
discover: true
|
||||||
issuer: "{{var_synapse_oidc_issuer_url}}"
|
issuer: "{{var_synapse_authentication_data_authelia_url_base}}"
|
||||||
client_id: "{{var_synapse_oidc_client_id}}"
|
client_id: "{{var_synapse_authentication_data_authelia_client_id}}"
|
||||||
client_secret: "{{var_synapse_oidc_client_secret}}"
|
client_secret: "{{var_synapse_authentication_data_authelia_client_secret}}"
|
||||||
scopes: ["openid", "profile", "email"]
|
scopes: ["openid", "profile", "email"]
|
||||||
allow_existing_users: true
|
allow_existing_users: true
|
||||||
user_mapping_provider:
|
user_mapping_provider:
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "packages",
|
"name": "packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"openssl",
|
"openssl",
|
||||||
"python3-cryptography"
|
"python3-cryptography"
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "packages | debian",
|
"name": "packages | debian",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"openssl",
|
"openssl",
|
||||||
"python3-cryptography",
|
"python3-cryptography",
|
||||||
|
|
|
@ -3,6 +3,7 @@
|
||||||
"name": "install packages",
|
"name": "install packages",
|
||||||
"become": true,
|
"become": true,
|
||||||
"ansible.builtin.apt": {
|
"ansible.builtin.apt": {
|
||||||
|
"update_cache": true,
|
||||||
"pkg": [
|
"pkg": [
|
||||||
"openssl",
|
"openssl",
|
||||||
"python3-cryptography"
|
"python3-cryptography"
|
||||||
|
|
Loading…
Add table
Reference in a new issue