Merge pull request 'Authelia | client-secrets hashen' (#3) from dev-authelia_hashed_client_secrets into main

Reviewed-on: #3
This commit is contained in:
roydfalk 2024-10-26 12:10:57 +02:00
commit 9da7a88358
20 changed files with 111 additions and 13 deletions

View file

@ -1,4 +1,12 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_dokuwiki_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_dokuwiki_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_dokuwiki_client_id}}", "client_id": "{{var_authelia_for_dokuwiki_client_id}}",
"client_secret": "{{var_authelia_for_dokuwiki_client_secret}}", "client_secret": "{{temp_authelia_for_dokuwiki_client_secret_hashed.stdout}}",
"client_name": "DokuWiki", "client_name": "DokuWiki",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_forgejo_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_forgejo_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_forgejo_client_id}}", "client_id": "{{var_authelia_for_forgejo_client_id}}",
"client_secret": "{{var_authelia_for_forgejo_client_secret}}", "client_secret": "{{temp_authelia_for_forgejo_client_secret_hashed.stdout}}",
"client_name": "Forgejo", "client_name": "Forgejo",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_gitlab_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_gitlab_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_gitlab_client_id}}", "client_id": "{{var_authelia_for_gitlab_client_id}}",
"client_secret": "{{var_authelia_for_gitlab_client_secret}}", "client_secret": "{{temp_authelia_for_gitlab_client_secret_hashed.stdout}}",
"client_name": "GitLab", "client_name": "GitLab",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_hedgedoc_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_hedgedoc_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_hedgedoc_client_id}}", "client_id": "{{var_authelia_for_hedgedoc_client_id}}",
"client_secret": "{{var_authelia_for_hedgedoc_client_secret}}", "client_secret": "{{temp_authelia_for_hedgedoc_client_secret_hashed.stdout}}",
"client_name": "Hedgedoc", "client_name": "Hedgedoc",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -4,5 +4,7 @@
"var_authelia_for_owncloud_android_client_id": "owncloud_android", "var_authelia_for_owncloud_android_client_id": "owncloud_android",
"var_authelia_for_owncloud_android_client_secret": "REPLACE_ME", "var_authelia_for_owncloud_android_client_secret": "REPLACE_ME",
"var_authelia_for_owncloud_ios_client_id": "owncloud_ios", "var_authelia_for_owncloud_ios_client_id": "owncloud_ios",
"var_authelia_for_owncloud_ios_client_secret": "REPLACE_ME" "var_authelia_for_owncloud_ios_client_secret": "REPLACE_ME",
"var_authelia_for_owncloud_desktop_client_id": "xdXOt13JKxym1B1QcEncf2XDkLAexMBFwiT9j6EfhhHFJhs2KM9jbjTmf8JBXE69",
"var_authelia_for_owncloud_desktop_client_secret": "UBntmLjC2yYCeHwsyj73Uwo9TAaecAetRwMw0xYcvNL9yRdLSUi0hUAHfvCHFeFh"
} }

View file

@ -1,4 +1,36 @@
[ [
{
"name": "configuration | compute client secret hash | web",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_web_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_web_client_secret_hashed"
},
{
"name": "configuration | compute client secret hash | android",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_android_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_android_client_secret_hashed"
},
{
"name": "configuration | compute client secret hash | ios",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_ios_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_ios_client_secret_hashed"
},
{
"name": "configuration | compute client secret hash | desktop",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_desktop_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_desktop_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_owncloud_android_client_id}}", "client_id": "{{var_authelia_for_owncloud_android_client_id}}",
"client_secret": "{{var_authelia_for_owncloud_android_client_secret}}", "client_secret": "{{temp_authelia_for_owncloud_android_client_secret_hashed.stdout}}",
"client_name": "ownCloud | Android Client", "client_name": "ownCloud | Android Client",
"authorization_policy": "one_factor", "authorization_policy": "one_factor",
"scopes": [ "scopes": [

View file

@ -1,6 +1,6 @@
{ {
"client_id": "xdXOt13JKxym1B1QcEncf2XDkLAexMBFwiT9j6EfhhHFJhs2KM9jbjTmf8JBXE69", "client_id": "{{var_authelia_for_owncloud_desktop_client_id}}",
"client_secret": "UBntmLjC2yYCeHwsyj73Uwo9TAaecAetRwMw0xYcvNL9yRdLSUi0hUAHfvCHFeFh", "client_secret": "{{temp_authelia_for_owncloud_desktop_client_secret_hashed.stdout}}",
"client_name": "ownCloud | Desktop Client", "client_name": "ownCloud | Desktop Client",
"authorization_policy": "one_factor", "authorization_policy": "one_factor",
"scopes": [ "scopes": [

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_owncloud_ios_client_id}}", "client_id": "{{var_authelia_for_owncloud_ios_client_id}}",
"client_secret": "{{var_authelia_for_owncloud_ios_client_secret}}", "client_secret": "{{temp_authelia_for_owncloud_ios_client_secret_hashed.stdout}}",
"client_name": "ownCloud | iOS Client", "client_name": "ownCloud | iOS Client",
"authorization_policy": "one_factor", "authorization_policy": "one_factor",
"scopes": [ "scopes": [

View file

@ -13,13 +13,21 @@
}, },
"android_client_secret": { "android_client_secret": {
"type": "string", "type": "string",
"mandatory": false "mandatory": true
}, },
"ios_client_id": { "ios_client_id": {
"type": "string", "type": "string",
"mandatory": false "mandatory": false
}, },
"ios_client_secret": { "ios_client_secret": {
"type": "string",
"mandatory": true
},
"dektop_client_id": {
"type": "string",
"mandatory": false
},
"desktop_client_secret": {
"type": "string", "type": "string",
"mandatory": false "mandatory": false
} }

View file

@ -1,4 +1,12 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_synapse_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_synapse_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_synapse_client_id}}", "client_id": "{{var_authelia_for_synapse_client_id}}",
"client_secret": "{{var_authelia_for_synapse_client_secret}}", "client_secret": "{{temp_authelia_for_synapse_client_secret_hashed.stdout}}",
"client_name": "Synapse", "client_name": "Synapse",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_vikunja_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_vikunja_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_vikunja_client_id}}", "client_id": "{{var_authelia_for_vikunja_client_id}}",
"client_secret": "{{var_authelia_for_vikunja_client_secret}}", "client_secret": "{{temp_authelia_for_vikunja_client_secret_hashed.stdout}}",
"client_name": "Vikunja", "client_name": "Vikunja",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_wiki_js_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_wiki_js_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_wiki_js_client_id}}", "client_id": "{{var_authelia_for_wiki_js_client_id}}",
"client_secret": "{{var_authelia_for_wiki_js_client_secret}}", "client_secret": "{{temp_authelia_for_wiki_js_client_secret_hashed.stdout}}",
"client_name": "Wiki.js", "client_name": "Wiki.js",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",