Compare commits

...
Sign in to create a new pull request.

54 commits

Author SHA1 Message Date
605737c675 Merge pull request 'Rolle | Tandoor' (#6) from task-230-tandoor into main
Reviewed-on: #6
2025-01-12 10:07:19 +01:00
eaa5f24046 [task-230] [mod] kleine Anpassungen 2025-01-12 10:05:20 +01:00
59ea4e256c [task-230] [fix] role:postgresql-for-tandoor 2025-01-11 15:49:53 +01:00
41ece50aa2 [task-230] [fix] role:postgresql-for-tandoor 2025-01-11 15:47:48 +01:00
9a86117869 [task-230] [fix] role:postgresql-for-tandoor 2025-01-11 15:45:08 +01:00
5a7f10561c [task-230] [fix] tandoor: authelia 2025-01-08 22:56:02 +01:00
52c675f6e3 [task-230] [add] authelia-for-tandoor 2025-01-08 22:00:01 +01:00
f426927df1 [task-230] [mod] tandoor: admin user and auth stuff 2025-01-08 21:59:45 +01:00
46a1a98751 [task-230] [fix] tandoor stuff 2025-01-08 20:10:56 +01:00
6ce4717a45 [taks-230] [fix] tandoor: systemd-unit-Zeilen 2024-12-31 14:21:14 +01:00
173d7790f6 [taks-230] [fix] tandoor: systemd-unit-Einsatz 2024-12-31 13:56:40 +01:00
2971154dba [taks-230] [fix] tandoor: git-Aufruf 2024-12-31 13:40:26 +01:00
e740be07f4 [taks-230] [fix] tandoor: Daten nur holen, falls noch nicht da 2024-12-31 13:37:47 +01:00
f80e6ee661 [task-230] [mod] tandoor: Befehle in Schleife zusammengefasst [fix] yarn-Befehl korrigiert 2024-12-31 13:34:24 +01:00
43c35f0620 [task-230] [mod] tandoor: richtiges Verzeichnis auswählen 2024-12-31 13:23:17 +01:00
8ab3117ba8 [task-230] [mod] tandoor: env-Variablen richtig setzen 2024-12-31 13:21:29 +01:00
9b473372db [task-230] [mod] tandoor: Abhängigkeiten installieren 2024-12-31 13:17:26 +01:00
5d7019fdee [task-230] [mod] become-Parameter ergänzt 2024-12-30 17:04:03 +01:00
a6a7460230 [task-230] [mod] tandoor: create venv 2024-12-30 17:02:04 +01:00
5a1eb1a764 [task-230] [mod] tandoor: fix pip install 2024-12-30 15:09:22 +01:00
b2a6c20c94 [task-230] [mod] tandoor: fix pip install 2024-12-30 14:59:39 +01:00
4319326513 [task-230] [mod] install path 2024-12-30 14:55:58 +01:00
bacbc78b2e [add] tandoor-and-nginx 2024-12-30 13:35:31 +01:00
83fcb5aca2 [add] tandoor 2024-12-30 13:35:21 +01:00
5b9545010a [add] postgresql-for-tandoor 2024-12-30 13:35:11 +01:00
45cd387e99 Merge pull request 'Authelia | scopes richten' (#5) from task-187 into main
Reviewed-on: #5
2024-10-26 13:43:32 +02:00
9002fc9604 [task-187] [mod] authelia-for-hedgedoc:"grant_types" entfernt 2024-10-26 12:15:12 +02:00
62b4aac895 Merge pull request 'Authelia | response types richten' (#4) from task-186 into main
Reviewed-on: #4
2024-10-26 12:13:47 +02:00
9da7a88358 Merge pull request 'Authelia | client-secrets hashen' (#3) from dev-authelia_hashed_client_secrets into main
Reviewed-on: #3
2024-10-26 12:10:57 +02:00
f2766fcf43 [task-183] [mod] authelia-for-owncloud 2024-10-26 11:54:25 +02:00
cef1c0aeda [task-186] [mod] authelia-for-owncloud:"response_types" zu conf-Vorlagen hinzugefügt 2024-10-26 11:45:47 +02:00
b14b80b129 [task-184] [mod] authelia:conf template 2024-10-26 11:13:05 +02:00
cd31cdea2e [task-185] [mod] authelia:conf template 2024-10-26 11:06:20 +02:00
4d4059f294 [task-184] [mod] authelia:conf template 2024-10-26 11:05:48 +02:00
d690a6454a [task-183] [mod] authelia-for-vikunja 2024-10-26 10:33:41 +02:00
0eaf14609c [task-183] [mod] authelia-for-synapse 2024-10-26 10:32:43 +02:00
50b5dd63e2 [task-183] [mod] authelia-for-owncloud 2024-10-26 10:31:15 +02:00
c54ef3281c [task-183] [mod] authelia-for-hedgedoc 2024-10-26 10:25:00 +02:00
40fbc3d001 [task-183] [mod] authelia-for-gitlab 2024-10-26 10:23:55 +02:00
a9e1070d46 [task-183] [mod] authelia-for-forgejo 2024-10-26 10:23:40 +02:00
ff436ae67c [task-183] [mod] authelia-for-dokuwiki 2024-10-26 10:20:55 +02:00
27ac5d7173 [task-183] [mod] authelia-for-wiki_js 2024-10-26 10:13:25 +02:00
05d1c0a8c1 [task-183] [mod] authelia-for-wiki_js 2024-10-26 10:10:47 +02:00
13561a2019 [task-183] [mod] authelia-for-wiki_js 2024-10-26 10:07:49 +02:00
09e667a34d [task-183] [mod] authelia-for-wiki_js 2024-10-26 10:00:34 +02:00
6aa922a20a [fix] role:wiki.js:file:cli client 2024-10-26 01:54:27 +02:00
30313bff2e [fix] role:wiki.js 2024-10-26 01:13:25 +02:00
6378c0dd92 [fix] role:wiki.js 2024-10-26 01:08:52 +02:00
ef84185102 [fix] role:synapse:apt stuff 2024-10-25 10:16:13 +02:00
55d5c57cc2 [mod] hedgedoc:default:auth:changed to "internal" 2024-10-17 18:07:16 +02:00
6a1e9938f8 [mod] synapse:info 2024-10-13 13:16:00 +02:00
359a65d361 [fix] role:wiki_js 2024-10-11 14:19:35 +02:00
2f43ccd173 Merge pull request 'Rolle | Wiki.js' (#1) from dev-wiki.js into main
Reviewed-on: #1
2024-10-11 09:25:20 +02:00
a11d75297e [mod] role:synapse:variable für Benachrichtigungs-Quelle 2024-09-06 09:58:45 +02:00
45 changed files with 612 additions and 39 deletions

View file

@ -1,4 +1,12 @@
[
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_dokuwiki_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_dokuwiki_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_dokuwiki_client_id}}",
"client_secret": "{{var_authelia_for_dokuwiki_client_secret}}",
"client_secret": "{{temp_authelia_for_dokuwiki_client_secret_hashed.stdout}}",
"client_name": "DokuWiki",
"public": false,
"authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_forgejo_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_forgejo_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_forgejo_client_id}}",
"client_secret": "{{var_authelia_for_forgejo_client_secret}}",
"client_secret": "{{temp_authelia_for_forgejo_client_secret_hashed.stdout}}",
"client_name": "Forgejo",
"public": false,
"authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_gitlab_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_gitlab_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_gitlab_client_id}}",
"client_secret": "{{var_authelia_for_gitlab_client_secret}}",
"client_secret": "{{temp_authelia_for_gitlab_client_secret_hashed.stdout}}",
"client_name": "GitLab",
"public": false,
"authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_hedgedoc_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_hedgedoc_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_hedgedoc_client_id}}",
"client_secret": "{{var_authelia_for_hedgedoc_client_secret}}",
"client_secret": "{{temp_authelia_for_hedgedoc_client_secret_hashed.stdout}}",
"client_name": "Hedgedoc",
"public": false,
"authorization_policy": "one_factor",
@ -12,10 +12,6 @@
"redirect_uris": [
"{{var_authelia_for_hedgedoc_hedgedoc_url_base}}/auth/oauth2/callback"
],
"grant_types": [
"refresh_token",
"authorization_code"
],
"response_types": [
"code"
],

View file

@ -4,5 +4,7 @@
"var_authelia_for_owncloud_android_client_id": "owncloud_android",
"var_authelia_for_owncloud_android_client_secret": "REPLACE_ME",
"var_authelia_for_owncloud_ios_client_id": "owncloud_ios",
"var_authelia_for_owncloud_ios_client_secret": "REPLACE_ME"
"var_authelia_for_owncloud_ios_client_secret": "REPLACE_ME",
"var_authelia_for_owncloud_desktop_client_id": "xdXOt13JKxym1B1QcEncf2XDkLAexMBFwiT9j6EfhhHFJhs2KM9jbjTmf8JBXE69",
"var_authelia_for_owncloud_desktop_client_secret": "UBntmLjC2yYCeHwsyj73Uwo9TAaecAetRwMw0xYcvNL9yRdLSUi0hUAHfvCHFeFh"
}

View file

@ -1,4 +1,36 @@
[
{
"name": "configuration | compute client secret hash | web",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_web_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_web_client_secret_hashed"
},
{
"name": "configuration | compute client secret hash | android",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_android_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_android_client_secret_hashed"
},
{
"name": "configuration | compute client secret hash | ios",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_ios_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_ios_client_secret_hashed"
},
{
"name": "configuration | compute client secret hash | desktop",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_owncloud_desktop_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_owncloud_desktop_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_owncloud_android_client_id}}",
"client_secret": "{{var_authelia_for_owncloud_android_client_secret}}",
"client_secret": "{{temp_authelia_for_owncloud_android_client_secret_hashed.stdout}}",
"client_name": "ownCloud | Android Client",
"authorization_policy": "one_factor",
"scopes": [
@ -10,6 +10,9 @@
"email",
"offline_access"
],
"response_types": [
"code"
],
"redirect_uris": [
"oc://android.owncloud.com"
]

View file

@ -1,6 +1,6 @@
{
"client_id": "xdXOt13JKxym1B1QcEncf2XDkLAexMBFwiT9j6EfhhHFJhs2KM9jbjTmf8JBXE69",
"client_secret": "UBntmLjC2yYCeHwsyj73Uwo9TAaecAetRwMw0xYcvNL9yRdLSUi0hUAHfvCHFeFh",
"client_id": "{{var_authelia_for_owncloud_desktop_client_id}}",
"client_secret": "{{temp_authelia_for_owncloud_desktop_client_secret_hashed.stdout}}",
"client_name": "ownCloud | Desktop Client",
"authorization_policy": "one_factor",
"scopes": [
@ -10,6 +10,9 @@
"email",
"offline_access"
],
"response_types": [
"code"
],
"redirect_uris": [
"http://127.0.0.1",
"http://localhost"

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_owncloud_ios_client_id}}",
"client_secret": "{{var_authelia_for_owncloud_ios_client_secret}}",
"client_secret": "{{temp_authelia_for_owncloud_ios_client_secret_hashed.stdout}}",
"client_name": "ownCloud | iOS Client",
"authorization_policy": "one_factor",
"scopes": [
@ -10,6 +10,9 @@
"email",
"offline_access"
],
"response_types": [
"code"
],
"redirect_uris": [
"oc://ios.owncloud.com",
"oc.ios://ios.owncloud.com"

View file

@ -13,13 +13,21 @@
},
"android_client_secret": {
"type": "string",
"mandatory": false
"mandatory": true
},
"ios_client_id": {
"type": "string",
"mandatory": false
},
"ios_client_secret": {
"type": "string",
"mandatory": true
},
"dektop_client_id": {
"type": "string",
"mandatory": false
},
"desktop_client_secret": {
"type": "string",
"mandatory": false
}

View file

@ -1,4 +1,12 @@
[
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_synapse_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_synapse_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_synapse_client_id}}",
"client_secret": "{{var_authelia_for_synapse_client_secret}}",
"client_secret": "{{temp_authelia_for_synapse_client_secret_hashed.stdout}}",
"client_name": "Synapse",
"public": false,
"authorization_policy": "one_factor",

View file

@ -0,0 +1,5 @@
{
"var_authelia_for_tandoor_tandoor_url_base": "https://tandoor.example.org",
"var_authelia_for_tandoor_client_id": "tandoor",
"var_authelia_for_tandoor_client_secret": "REPLACE_ME"
}

View file

@ -0,0 +1,8 @@
## Beschreibung
Um [Tandoor](../tandoor) gegen [Authelia](../authelia) authentifizieren zu lassen
## Verweise
- [allauth-Dokumentation | Authelia](https://django-allauth.readthedocs.io/en/latest/socialaccount/providers/authelia.html)

View file

@ -0,0 +1,33 @@
[
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_tandoor_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_tandoor_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,
"ansible.builtin.template": {
"src": "authelia-client-conf.json.j2",
"dest": "/etc/authelia/conf.d/clients/tandoor.json"
}
},
{
"name": "configuration | apply",
"become": true,
"ansible.builtin.command": {
"cmd": "/usr/bin/authelia-conf-compose"
}
},
{
"name": "restart service",
"become": true,
"ansible.builtin.systemd_service": {
"state": "restarted",
"name": "authelia"
}
}
]

View file

@ -0,0 +1,17 @@
{
"client_id": "{{var_authelia_for_tandoor_client_id}}",
"client_secret": "{{temp_authelia_for_tandoor_client_secret_hashed.stdout}}",
"client_name": "Tandoor",
"public": false,
"authorization_policy": "one_factor",
"redirect_uris": [
"{{var_authelia_for_tandoor_tandoor_url_base}}/accounts/oidc/authelia/login/callback/"
],
"scopes": [
"openid",
"email",
"profile"
],
"userinfo_signed_response_alg": "none",
"token_endpoint_auth_method": "client_secret_basic"
}

View file

@ -1,4 +1,12 @@
[
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_vikunja_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_vikunja_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_vikunja_client_id}}",
"client_secret": "{{var_authelia_for_vikunja_client_secret}}",
"client_secret": "{{temp_authelia_for_vikunja_client_secret_hashed.stdout}}",
"client_name": "Vikunja",
"public": false,
"authorization_policy": "one_factor",

View file

@ -1,4 +1,12 @@
[
{
"name": "configuration | compute client secret hash",
"become": true,
"ansible.builtin.shell": {
"cmd": "authelia crypto hash generate bcrypt --password {{var_authelia_for_wiki_js_client_secret}} | cut --delimiter=' ' --fields='2-'"
},
"register": "temp_authelia_for_wiki_js_client_secret_hashed"
},
{
"name": "configuration | emplace",
"become": true,

View file

@ -1,6 +1,6 @@
{
"client_id": "{{var_authelia_for_wiki_js_client_id}}",
"client_secret": "{{var_authelia_for_wiki_js_client_secret}}",
"client_secret": "{{temp_authelia_for_wiki_js_client_secret_hashed.stdout}}",
"client_name": "Wiki.js",
"public": false,
"authorization_policy": "one_factor",

View file

@ -173,8 +173,7 @@
{% endif %}
{% if var_authelia_notification_mode == "smtp" %}
"smtp": {
"host": "{{var_authelia_notification_smtp_host}}",
"port": {{var_authelia_notification_smtp_port | string}},
"address": "{{var_authelia_notification_smtp_host}}:{{var_authelia_notification_smtp_port | string}}",
"username": "{{var_authelia_notification_smtp_username}}",
"password": "{{var_authelia_notification_smtp_password}}",
"sender": "{{var_authelia_notification_smtp_sender}}",
@ -189,7 +188,12 @@
"identity_providers": {
"oidc": {
"hmac_secret": "{{var_authelia_oidc_hmac_secret}}",
"issuer_private_key": "{{temp_tls_result.privatekey | replace('\n', '\\n')}}",
"jwks": [
{
"algorithm": "RS256",
"key": "{{temp_tls_result.privatekey | replace('\n', '\\n')}}"
}
],
"lifespans": {
"access_token": "{{var_authelia_oidc_lifespan_access_token}}",
"refresh_token": "{{var_authelia_oidc_lifespan_refresh_token}}"

View file

@ -11,7 +11,7 @@
"var_hedgedoc_database_data_postgresql_password": "REPLACE_ME",
"var_hedgedoc_database_data_postgresql_schema": "hedgedoc",
"var_hedgedoc_domain": "hedgedoc.example.org",
"var_hedgedoc_authentication_kind": "authelia",
"var_hedgedoc_authentication_kind": "internal",
"var_hedgedoc_authentication_data_authelia_client_id": "hedgedoc",
"var_hedgedoc_authentication_data_authelia_client_secret": "REPLACE_ME",
"var_hedgedoc_authentication_data_authelia_url_base": "https://authelia.example.org",

View file

@ -0,0 +1,5 @@
{
"var_postgresql_for_tandoor_username": "tandoor_user",
"var_postgresql_for_tandoor_password": "REPLACE_ME",
"var_postgresql_for_tandoor_schema": "tandoor"
}

View file

@ -0,0 +1,50 @@
[
{
"name": "packages",
"become": true,
"ansible.builtin.apt": {
"update_cache": true,
"pkg": [
"acl",
"python3-psycopg2",
"libpq-dev"
]
}
},
{
"name": "user",
"become": true,
"become_user": "postgres",
"community.postgresql.postgresql_user": {
"state": "present",
"name": "{{var_postgresql_for_tandoor_username}}",
"password": "{{var_postgresql_for_tandoor_password}}"
},
"environment": {
"PGOPTIONS": "-c password_encryption=scram-sha-256"
}
},
{
"name": "schema",
"become": true,
"become_user": "postgres",
"community.postgresql.postgresql_db": {
"state": "present",
"name": "{{var_postgresql_for_tandoor_schema}}",
"owner": "{{var_postgresql_for_tandoor_username}}"
}
},
{
"name": "rights",
"become": true,
"become_user": "postgres",
"community.postgresql.postgresql_privs": {
"state": "present",
"db": "{{var_postgresql_for_tandoor_schema}}",
"objs": "ALL_IN_SCHEMA",
"roles": "{{var_postgresql_for_tandoor_username}}",
"privs": "ALL",
"grant_option": true
}
}
]

View file

@ -24,6 +24,7 @@
"var_synapse_smtp_port": 587,
"var_synapse_smtp_username": "synapse@smtp.example.org",
"var_synapse_smtp_password": "REPLACE_ME",
"var_synapse_notifications_source_address": "synapse@example.org",
"var_synapse_notifications_via_email_enabled_by_default": false,
"var_synapse_notifications_via_email_delay": "1h",
"var_synapse_admin_user_define": true,

View file

@ -1,6 +1,6 @@
## Beschreibung
Zur Einrichtung des [matrix.org](https://matrix.org/)-Servers Synapse
Zur Einrichtung des [matrix.org](https://matrix.org/)-Servers [Synapse](https://github.com/element-hq/synapse)
## Verweise

View file

@ -7,6 +7,13 @@
"dest": "/etc/apt/sources.list.d/bullseye-backports-for-synapse.list"
}
},
{
"name": "update sources",
"become": true,
"ansible.builtin.apt": {
"update_cache": true
}
},
{
"name": "prepare package installation | server-name",
"become": true,

View file

@ -170,7 +170,7 @@ email:
smtp_user: "{{var_synapse_smtp_username}}"
smtp_pass: "{{var_synapse_smtp_password}}"
require_transport_security: true
notif_from: "%(app)s | {{var_synapse_title}}"
notif_from: "%(app)s | {{var_synapse_title}} <{{var_synapse_notifications_source_address}}>"
enable_notifs: true
notif_for_new_users: {{var_synapse_notifications_via_email_enabled_by_default | to_yaml}}
notif_delay_before_mail: {{var_synapse_notifications_via_email_delay}}

View file

@ -110,6 +110,10 @@
"type": "string",
"mandatory": true
},
"notifications_source_address": {
"type": "string",
"mandatory": false
},
"notifications_via_email_enabled_by_default": {
"type": "boolean",
"mandatory": false

View file

@ -0,0 +1,5 @@
{
"var_tandoor_and_nginx_domain": "tandoor.example.org",
"var_tandoor_and_nginx_tls_mode": "force",
"var_tandoor_and_nginx_directory": "/opt/tandoor"
}

View file

@ -0,0 +1,4 @@
## Verweise
- [Tandoor-Dokumentation | nginx](https://docs.tandoor.dev/install/manual/#nginx)

View file

@ -0,0 +1,35 @@
[
{
"name": "deactivate default site",
"become": true,
"ansible.builtin.file": {
"state": "absent",
"dest": "/etc/nginx/sites-enabled/default"
}
},
{
"name": "emplace configuration | data",
"become": true,
"ansible.builtin.template": {
"src": "conf.j2",
"dest": "/etc/nginx/sites-available/{{var_tandoor_and_nginx_domain}}"
}
},
{
"name": "emplace configuration | link",
"become": true,
"ansible.builtin.file": {
"state": "link",
"src": "/etc/nginx/sites-available/{{var_tandoor_and_nginx_domain}}",
"dest": "/etc/nginx/sites-enabled/{{var_tandoor_and_nginx_domain}}"
}
},
{
"name": "restart nginx",
"become": true,
"ansible.builtin.systemd_service": {
"state": "restarted",
"name": "nginx"
}
}
]

View file

@ -0,0 +1,43 @@
{% macro tandoor_common() %}
location /static {
alias {{var_tandoor_and_nginx_directory}}/program/staticfiles;
}
location /media {
alias {{var_tandoor_and_nginx_directory}}/program/mediafiles;
}
location / {
proxy_set_header Host $http_host;
proxy_pass http://unix:{{var_tandoor_and_nginx_directory}}/program/recipes.sock;
proxy_set_header X-Forwarded-Proto $scheme;
}
{% endmacro %}
server {
listen 80;
listen [::]:80;
server_name {{var_tandoor_and_nginx_domain}};
{% if var_tandoor_and_nginx_tls_mode == 'force' %}
return 301 https://$http_host$request_uri;
{% else %}
{{ tandoor_common() }}
{% endif %}
}
{% if var_tandoor_and_nginx_tls_mode != 'disable' %}
server {
listen 443 ssl;
listen [::]:443 ssl;
server_name {{var_tandoor_and_nginx_domain}};
ssl_certificate_key /etc/ssl/private/{{var_tandoor_and_nginx_domain}}.pem;
ssl_certificate /etc/ssl/fullchains/{{var_tandoor_and_nginx_domain}}.pem;
include /etc/nginx/ssl-hardening.conf;
{{ tandoor_common() }}
}
{% endif %}

View file

@ -0,0 +1,19 @@
{
"domain": {
"mandatory": false,
"type": "string"
},
"port": {
"mandatory": false,
"type": "integer"
},
"tls_mode": {
"mandatory": false,
"type": "string",
"options": [
"disable",
"enable",
"force"
]
}
}

View file

@ -0,0 +1,27 @@
{
"var_tandoor_user": "tandoor",
"var_tandoor_directory": "/opt/tandoor",
"var_tandoor_repository_url": "https://github.com/vabene1111/recipes.git",
"var_tandoor_repository_reference": "master",
"var_tandoor_database_kind": "sqlite",
"var_tandoor_database_data_postgresql_host": "postgresql.example.org",
"var_tandoor_database_data_postgresql_port": 5432,
"var_tandoor_database_data_postgresql_username": "tandoor_user",
"var_tandoor_database_data_postgresql_password": "REPLACE_ME",
"var_tandoor_database_data_postgresql_schema": "tandoor",
"var_tandoor_authentication_kind": "internal",
"var_tandoor_authentication_data_authelia_client_id": "REPLACE_ME",
"var_tandoor_authentication_data_authelia_client_secret": "REPLACE_ME",
"var_tandoor_authentication_data_authelia_url_base": "https://authelia.example.org",
"var_tandoor_authentication_data_authelia_label": "Authelia",
"var_tandoor_smtp_host": "smtp.example.org",
"var_tandoor_smtp_port": 587,
"var_tandoor_smtp_username": "tandoor@smtp.example.org",
"var_tandoor_smtp_password": "REPLACE_ME",
"var_tandoor_notification_sender": "notification@tandoor.example.org",
"var_tandoor_secret_key": "REPLACE_ME",
"var_tandoor_admin_username": "admin",
"var_tandoor_admin_password": "REPLACE_ME",
"var_tandoor_admin_email": "admin@tandoor.example.org",
"var_tandoor_domain": "tandoor.exmaple.org"
}

18
roles/tandoor/info.md Normal file
View file

@ -0,0 +1,18 @@
## Beschreibung
Für Rezepte-Sammlung [Tandoor](https://tandoor.dev/)
## Verweise
- [Tandoor-Dokumentation | Installation](https://docs.tandoor.dev/install/manual/)
- [Tandoor-Dokumentation | Konfiguration](https://docs.tandoor.dev/system/configuration/)
- [Tandoor-Dokumentation | Allauth](https://docs.tandoor.dev/features/authentication/#allauth)
- [Django-Dokumentation | Variable `DJANGO_SUPERUSER_PASSWORD`](https://docs.djangoproject.com/en/5.1/ref/django-admin/#envvar-DJANGO_SUPERUSER_PASSWORD)
- [allauth-Dokumentation | OpenID Connect](https://docs.allauth.org/en/latest/socialaccount/providers/openid_connect.html)
- [allauth-Dokumentation | Authelia](https://docs.allauth.org/en/latest/socialaccount/providers/authelia.html)
## ToDo
- Idempotenz

View file

@ -0,0 +1,136 @@
[
{
"name": "packages",
"become": true,
"ansible.builtin.apt": {
"update_cache": true,
"pkg": [
"git",
"gcc",
"libpq-dev",
"libldap2-dev",
"libsasl2-dev",
"python3-venv",
"python3-dev",
"nodejs",
"yarnpkg"
]
}
},
{
"name": "user and directory",
"become": true,
"ansible.builtin.user": {
"name": "{{var_tandoor_user}}",
"create_home": true,
"home": "{{var_tandoor_directory}}"
}
},
{
"name": "sources",
"become": true,
"become_user": "{{var_tandoor_user}}",
"ansible.builtin.git": {
"repo": "{{var_tandoor_repository_url}}",
"version": "{{var_tandoor_repository_reference}}",
"single_branch": true,
"dest": "{{var_tandoor_directory}}/program",
"force": true
}
},
{
"name": "venv",
"become": true,
"become_user": "{{var_tandoor_user}}",
"ansible.builtin.command": {
"chdir": "{{var_tandoor_directory}}",
"cmd": "python3 -m venv program"
}
},
{
"name": "python requirements",
"become": true,
"become_user": "{{var_tandoor_user}}",
"ansible.builtin.pip": {
"virtualenv": "{{var_tandoor_directory}}/program",
"virtualenv_python": "python3",
"requirements": "{{var_tandoor_directory}}/program/requirements.txt"
}
},
{
"name": "configuration",
"become": true,
"become_user": "{{var_tandoor_user}}",
"ansible.builtin.template": {
"src": "conf.j2",
"dest": "{{var_tandoor_directory}}/program/.env",
"mode": "644"
}
},
{
"name": "initialize",
"become": true,
"become_user": "{{var_tandoor_user}}",
"environment": {
"VIRTUAL_ENV": "{{var_tandoor_directory}}/program"
},
"loop": [
"migrate",
"collectstatic --no-input",
"collectstatic_js_reverse"
],
"ansible.builtin.shell": {
"chdir": "{{var_tandoor_directory}}/program",
"cmd": "bin/python3 manage.py {{item}}"
}
},
{
"name": "admin account",
"become": true,
"become_user": "{{var_tandoor_user}}",
"environment": {
"VIRTUAL_ENV": "{{var_tandoor_directory}}/program"
},
"ansible.builtin.shell": {
"chdir": "{{var_tandoor_directory}}/program",
"cmd": "DJANGO_SUPERUSER_PASSWORD={{var_tandoor_admin_password}} bin/python3 manage.py createsuperuser --no-input --username {{var_tandoor_admin_username}} --email {{var_tandoor_admin_email}}"
}
},
{
"name": "frontend stuff | core",
"become": true,
"become_user": "{{var_tandoor_user}}",
"ansible.builtin.shell": {
"chdir": "{{var_tandoor_directory}}/program/vue",
"cmd": "yarnpkg install && yarnpkg build"
}
},
{
"name": "frontend stuff | link",
"become": true,
"become_user": "{{var_tandoor_user}}",
"ansible.builtin.file": {
"type": "link",
"src": "{{var_tandoor_directory}}/program/cookbook/static/vue",
"dest": "{{var_tandoor_directory}}/program/staticfiles/vue",
}
},
{
"name": "systemd unit",
"become": true,
"ansible.builtin.template": {
"src": "systemd-unit.j2",
"dest": "/etc/systemd/system/tandoor.service"
}
},
{
"name": "start",
"become": true,
"ansible.builtin.systemd_service": {
"enabled": true,
"state": "started",
"name": "tandoor"
}
}
]

View file

@ -0,0 +1,42 @@
{% if var_tandoor_database_kind == 'sqlite' %}
DB_ENGINE=django.db.backends.sqlite3
{% endif %}
{% if var_tandoor_database_kind == 'postgresql' %}
DB_ENGINE=django.db.backends.postgresql
POSTGRES_HOST={{var_tandoor_database_data_postgresql_host}}
POSTGRES_DB={{var_tandoor_database_data_postgresql_schema}}
POSTGRES_PORT={{var_tandoor_database_data_postgresql_port | string}}
POSTGRES_USER={{var_tandoor_database_data_postgresql_username}}
POSTGRES_PASSWORD={{var_tandoor_database_data_postgresql_password}}
{% endif %}
{% if var_tandoor_authentication_kind == 'internal' %}
ENABLE_SIGNUP=1
REMOTE_USER_AUTH=0
{% endif %}
{% if var_tandoor_authentication_kind == 'authelia' %}
ENABLE_SIGNUP=0
REMOTE_USER_AUTH=1
SOCIAL_PROVIDERS=allauth.socialaccount.providers.openid
# SOCIALACCOUNT_PROVIDERS={"openid_connect": {"OAUTH_PKCE_ENABLED": false, "APPS": [{"provider_id": "authelia", "name": "{{var_tandoor_authentication_data_authelia_label}}", "client_id": "{{var_tandoor_authentication_data_authelia_client_id}}", "secret": "{{var_tandoor_authentication_data_authelia_client_secret}}", "settings": {"server_url":"{{var_tandoor_authentication_data_authelia_url_base}}", "token_auth_method": "client_secret_basic", "oauth_pkce_enabled": false}}]}}
SOCIALACCOUNT_PROVIDERS={"openid_connect": {"APPS": [{"provider_id": "authelia", "name": "{{var_tandoor_authentication_data_authelia_label}}", "client_id": "{{var_tandoor_authentication_data_authelia_client_id}}", "secret": "{{var_tandoor_authentication_data_authelia_client_secret}}", "settings": {"server_url": "{{var_tandoor_authentication_data_authelia_url_base}}/.well-known/openid-configuration"}}]}}
{% endif %}
EMAIL_HOST={{var_tandoor_smtp_host}}
EMAIL_PORT={{var_tandoor_smtp_port | string}}
EMAIL_HOST_USER={{var_tandoor_smtp_username}}
EMAIL_HOST_PASSWORD={{var_tandoor_smtp_password}}
EMAIL_USE_TLS=1
EMAIL_USE_SSL=0
DEFAULT_FROM_EMAIL={{var_tandoor_notification_sender}}
SECRET_KEY={{var_tandoor_secret_key}}
ALLOWED_HOSTS={{var_tandoor_domain}}
ENABLE_METRICS=0
ENABLE_PDF_EXPORT=0
DEBUG=0

View file

@ -0,0 +1,16 @@
[Unit]
Description=Tandoor (gunicorn daemon)
After=network.target
[Service]
Type=simple
Restart=always
RestartSec=3
User={{var_tandoor_user}}
Group=www-data
WorkingDirectory={{var_tandoor_directory}}/program
EnvironmentFile={{var_tandoor_directory}}/program/.env
ExecStart={{var_tandoor_directory}}/program/bin/gunicorn --capture-output --bind unix:{{var_tandoor_directory}}/program/recipes.sock recipes.wsgi:application
[Install]
WantedBy=multi-user.target

View file

@ -288,7 +288,7 @@ var _wiki_js_cli;
*/
async function call_finalize(admin_email, admin_password, site_url, telemetry) {
const http_request = {
"target": (_wiki_js_cli.conf.get().api.url_base + "/finalize"),
"target": (_url_base + "/finalize"),
"method": "POST",
"headers": {
"Content-Type": "application/json",

View file

@ -55,7 +55,8 @@
"ansible.builtin.copy": {
"src": "wiki-js-cli",
"dest": "/usr/local/bin/wiki-js-cli",
"mode": "0700"
"owner": "{{var_wiki_js_user}}",
"mode": "0770"
}
},
{
@ -129,7 +130,7 @@
"become_user": "{{var_wiki_js_user}}",
"ansible.builtin.command": {
"chdir": "{{var_wiki_js_directory}}",
"cmd": "/usr/local/bin/wiki-js-cli -b http://127.0.0.1:{{var_wiki_js_port | string}} -u {{var_wiki_js_admin_email_address}} -p {{var_wiki_js_admin_password}} email-settings-set {{var_wiki_js_smtp_host}} {{var_wiki_js_smtp_port}} {{var_wiki_js_smtp_username}} {{var_wiki_js_smtp_password}} {{email_sending_sender_name}} {{email_sending_sender_email_address}}"
"cmd": "/usr/local/bin/wiki-js-cli -b http://127.0.0.1:{{var_wiki_js_port | string}} -u {{var_wiki_js_admin_email_address}} -p {{var_wiki_js_admin_password}} email-settings-set {{var_wiki_js_smtp_host}} {{var_wiki_js_smtp_port}} {{var_wiki_js_smtp_username}} {{var_wiki_js_smtp_password}} {{var_wiki_js_email_sending_sender_name}} {{var_wiki_js_email_sending_sender_email_address}}"
}
},
{
@ -143,23 +144,13 @@
}
},
{
"name": "setup | set guest access | negative",
"when": "not var_wiki_js_allow_guest_view",
"become": true,
"become_user": "{{var_wiki_js_user}}",
"ansible.builtin.command": {
"chdir": "{{var_wiki_js_directory}}",
"cmd": "/usr/local/bin/wiki-js-cli -b http://127.0.0.1:{{var_wiki_js_port | string}} -u {{var_wiki_js_admin_email_address}} -p {{var_wiki_js_admin_password}} group-modify Guests"
}
},
{
"name": "setup | set guest access | positive",
"name": "setup | set guest access",
"when": "var_wiki_js_allow_guest_view",
"become": true,
"become_user": "{{var_wiki_js_user}}",
"ansible.builtin.command": {
"chdir": "{{var_wiki_js_directory}}",
"cmd": "/usr/local/bin/wiki-js-cli -b http://127.0.0.1:{{var_wiki_js_port | string}} -u {{var_wiki_js_admin_email_address}} -p {{var_wiki_js_admin_password}} group-modify Guests read:pages read:assets read:comments"
"cmd": "/usr/local/bin/wiki-js-cli -b http://127.0.0.1:{{var_wiki_js_port | string}} -u {{var_wiki_js_admin_email_address}} -p {{var_wiki_js_admin_password}} group-modify Guests {{var_wiki_js_allow_guest_view | ternary('read:pages,read:assets,read:comments,write:comments,write:pages,manage:pages,delete:pages,write:styles,write:scripts,read:source,read:history,write:assets,manage:assets,manage:comments','')}}"
}
},
{
@ -168,7 +159,7 @@
"become_user": "{{var_wiki_js_user}}",
"ansible.builtin.command": {
"chdir": "{{var_wiki_js_directory}}",
"cmd": "/usr/local/bin/wiki-js-cli -b http://127.0.0.1:{{var_wiki_js_port | string}} -u {{var_wiki_js_admin_email_address}} -p {{var_wiki_js_admin_password}} group-add {{var_wiki_js_user_group_name}} {{var_wiki_js_allow_guest_view | ternary('read:pages,read:assets,read:comments,write:comments,write:pages,manage:pages,delete:pages,write:styles,write:scripts,read:source,read:history,write:assets,manage:assets,manage:comments','')}}"
"cmd": "/usr/local/bin/wiki-js-cli -b http://127.0.0.1:{{var_wiki_js_port | string}} -u {{var_wiki_js_admin_email_address}} -p {{var_wiki_js_admin_password}} group-add {{var_wiki_js_user_group_name}} 'read:pages,read:assets,read:comments,write:comments,write:pages,manage:pages,delete:pages,write:styles,write:scripts,read:source,read:history,write:assets,manage:assets,manage:comments'"
}
},
{