Compare commits

..

No commits in common. "d690a6454ad4c6ac4878a6865af9119339cae449" and "27ac5d717374cf906f45f289caccb42b65cdf11f" have entirely different histories.

15 changed files with 8 additions and 80 deletions

View file

@ -1,12 +1,4 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_dokuwiki_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_dokuwiki_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_dokuwiki_client_id}}", "client_id": "{{var_authelia_for_dokuwiki_client_id}}",
"client_secret": "{{temp_authelia_for_dokuwiki_client_secret_hashed.stdout}}", "client_secret": "{{var_authelia_for_dokuwiki_client_secret}}",
"client_name": "DokuWiki", "client_name": "DokuWiki",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,12 +1,4 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_forgejo_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_forgejo_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_forgejo_client_id}}", "client_id": "{{var_authelia_for_forgejo_client_id}}",
"client_secret": "{{temp_authelia_for_forgejo_client_secret_hashed.stdout}}", "client_secret": "{{var_authelia_for_forgejo_client_secret}}",
"client_name": "Forgejo", "client_name": "Forgejo",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,12 +1,4 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_gitlab_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_gitlab_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_gitlab_client_id}}", "client_id": "{{var_authelia_for_gitlab_client_id}}",
"client_secret": "{{temp_authelia_for_gitlab_client_secret_hashed.stdout}}", "client_secret": "{{var_authelia_for_gitlab_client_secret}}",
"client_name": "GitLab", "client_name": "GitLab",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,12 +1,4 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_hedgedoc_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_hedgedoc_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_hedgedoc_client_id}}", "client_id": "{{var_authelia_for_hedgedoc_client_id}}",
"client_secret": "{{temp_authelia_for_hedgedoc_client_secret_hashed.stdout}}", "client_secret": "{{var_authelia_for_hedgedoc_client_secret}}",
"client_name": "Hedgedoc", "client_name": "Hedgedoc",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,28 +1,4 @@
[ [
{
"name": "configuration | compute client secret hash | web",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_web_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_web_client_secret_hashed"
},
{
"name": "configuration | compute client secret hash | android",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_android_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_android_client_secret_hashed"
},
{
"name": "configuration | compute client secret hash | ios",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_ios_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_ios_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_owncloud_android_client_id}}", "client_id": "{{var_authelia_for_owncloud_android_client_id}}",
"client_secret": "{{temp_authelia_for_owncloud_android_client_secret_hashed.stdout}}", "client_secret": "{{var_authelia_for_owncloud_android_client_secret}}",
"client_name": "ownCloud | Android Client", "client_name": "ownCloud | Android Client",
"authorization_policy": "one_factor", "authorization_policy": "one_factor",
"scopes": [ "scopes": [

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_owncloud_ios_client_id}}", "client_id": "{{var_authelia_for_owncloud_ios_client_id}}",
"client_secret": "{{temp_authelia_for_owncloud_ios_client_secret_hashed.stdout}}", "client_secret": "{{var_authelia_for_owncloud_ios_client_secret}}",
"client_name": "ownCloud | iOS Client", "client_name": "ownCloud | iOS Client",
"authorization_policy": "one_factor", "authorization_policy": "one_factor",
"scopes": [ "scopes": [

View file

@ -1,12 +1,4 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_synapse_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_synapse_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_synapse_client_id}}", "client_id": "{{var_authelia_for_synapse_client_id}}",
"client_secret": "{{temp_authelia_for_synapse_client_secret_hashed.stdout}}", "client_secret": "{{var_authelia_for_synapse_client_secret}}",
"client_name": "Synapse", "client_name": "Synapse",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",

View file

@ -1,12 +1,4 @@
[ [
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_vikunja_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_vikunja_client_secret_hashed"
},
{ {
"name": "configuration | emplace", "name": "configuration | emplace",
"become": true, "become": true,

View file

@ -1,6 +1,6 @@
{ {
"client_id": "{{var_authelia_for_vikunja_client_id}}", "client_id": "{{var_authelia_for_vikunja_client_id}}",
"client_secret": "{{temp_authelia_for_vikunja_client_secret_hashed.stdout}}", "client_secret": "{{var_authelia_for_vikunja_client_secret}}",
"client_name": "Vikunja", "client_name": "Vikunja",
"public": false, "public": false,
"authorization_policy": "one_factor", "authorization_policy": "one_factor",