38 Commits

Author SHA1 Message Date
9054f14223 feat: run hydra migrations if specified 2023-10-25 17:55:54 +02:00
547eb73d6c feat: modularize playbook with tags 2023-10-25 15:13:35 +02:00
2b4e669cc3 reactivate Create hydra clients 2023-10-24 08:26:15 +02:00
e88e45ac91 comment create hydra client so as not to replay them 2023-10-19 16:13:19 +02:00
03cc82f26e set correct separator 2023-10-17 08:03:45 +02:00
2f464faff3 feat(hydra): adding tasks to only update hydra-v1. (#15)
Reviewed-on: #15
2023-10-16 16:35:56 +02:00
a8a1632eb6 feat(hydra): adding tasks to only update hydra-v1. 2023-10-16 13:54:11 +02:00
d259417d47 feat(hydra): configurable ttl_refresh_token (#14)
Reviewed-on: #14
2023-10-09 11:15:33 +02:00
8bc50e1533 feat(hydra): configurable ttl_refresh_token
adding new variable to configure ttl_refresh_token

ref mse project : CNOUS/mse#2591
2023-10-09 10:57:30 +02:00
9261bff896 Hydra-update-client: fix creation of json file 2023-08-17 11:37:55 +02:00
19bc989486 Hydra-update-client: use update command instead of deleting/importing client (#13)
Reviewed-on: #13
Reviewed-by: vfebvre <vfebvre@cadoles.com>
2023-08-10 11:35:02 +02:00
2bbef92ed9 Adding a task to update hydra-dispatcher only (#12)
Reviewed-on: #12
Reviewed-by: vfebvre <vfebvre@cadoles.com>
2023-08-10 11:29:50 +02:00
571c297741 Hydra-update-client: use update command instead of deleting/importing client 2023-08-09 17:38:39 +02:00
7c745e2cf9 Adding a task to update hydra-dispatcher only
We may want to restart this service only.
2023-08-07 18:02:59 +02:00
a9e6253449 Add task to modify 1 client 2023-07-24 16:07:28 +02:00
fe88269c9f Add tasks to create only 1 client (#11)
Rational: adding a client seems inoffensive. Updating a client on the other hand is not (removing then adding a client).
Co-authored-by: Laurent Gourvénec <lgourvenec@cadoles.com>
Reviewed-on: #11
Co-authored-by: Laurent Gourvenec <lgourvenec@cadoles.com>
Co-committed-by: Laurent Gourvenec <lgourvenec@cadoles.com>
2023-07-13 10:19:04 +02:00
08c1bafa68 feat: allow activation of cors headers for spa clients 2023-06-20 13:48:44 -06:00
f1ad86a80d fix: default hydra apps titles/descriptions templating 2023-05-25 15:28:44 +02:00
7e0da81478 feat: add missing default values for templates 2023-05-25 14:53:28 +02:00
5bba8b978e goweb-oidc: get client password 2023-05-03 10:45:09 +02:00
e6f50cc01a update goweb-conf 2023-05-03 10:45:01 +02:00
5187927b61 adding tasks for goweb-oidc 2023-04-18 11:44:34 +02:00
7feec0969b update config dispatcher 2023-04-06 12:18:10 +02:00
dd00e3f079 fix(dispatcher) typo correction for dispatcher template 2023-03-30 11:05:10 +02:00
4fb709f133 update default webhook var 2023-03-28 16:25:55 +02:00
9469a5ec4f remove unused hydra-oidc scope 2023-03-27 14:03:50 +02:00
dda65fb7b4 set default hydra client scope with webhook 2023-03-27 14:02:29 +02:00
9c7773a038 set default rules for webhook 2023-03-27 13:57:42 +02:00
507f292b66 typo 2023-03-27 11:00:08 +02:00
bedf63722d ajout webhook dispatcher 2023-03-27 10:06:35 +02:00
ea6c9925c9 Merge pull request 'fix/shibboleth_entity_id' (#10) from fix/shibboleth_entity_id into master
Reviewed-on: #10
2023-03-02 15:33:50 +01:00
e42d3cf47b Merge branch 'master' into fix/shibboleth_entity_id 2023-02-28 14:36:57 +01:00
67e7b7d275 Merge branch 'hydra_dispatcher_disable_disable_app_auto_select' into fix/shibboleth_entity_id 2023-02-20 10:26:55 +01:00
e57dd36be3 Merge branch 'fix/haproxy-configuration' into fix/shibboleth_entity_id 2023-02-20 10:26:32 +01:00
05bc71e15a fix[hydra] log level 2023-02-20 10:20:56 +01:00
b419226b97 Use haproxy base URL for entity_id in cadoles-pod-shibboleth-sp-v3.conf.j2
We need a common entity_id if we want 2 hydra with a same SAML Metadata
2023-02-16 12:27:29 +01:00
31268f9cd8 feat(hydra-dispatcher): ajout variable hydra_dispatcher_disable_app_auto_select 2023-02-15 15:48:23 +01:00
e6e58a3fd3 fix(haproxy): haproxy needs to be configured after the "services" 2023-02-13 11:42:36 +01:00
17 changed files with 349 additions and 75 deletions

View File

@ -1,4 +1,6 @@
---
install_only: false
# cadoles-pod repository configuration
cadoles_pod_debian_repository_url: https://vulcain.cadoles.com
cadoles_pod_debian_repository: bullseye-dev
@ -15,7 +17,8 @@ cadoles_pod_hydra_oidc_v1_package_version: '*'
cadoles_pod_hydra_ldap_v1_package_version: '*'
# Hydra database configuration
hydra_use_external_database: no
hydra_use_external_database: false
hydra_auto_migrate: false
hydra_database_name: hydra
hydra_database_user: hydra
hydra_database_password: hydra
@ -45,7 +48,7 @@ hydra_urls_login: "{{ haproxy_public_base_url }}{{ haproxy_hydra_dispatcher_base
hydra_urls_logout: "{{ haproxy_public_base_url }}{{ haproxy_hydra_dispatcher_base_path }}/logout"
hydra_url_post_logout: "{{ haproxy_public_base_url }}"
hydra_urls_error: "{{ haproxy_public_base_url }}/erreur"
hydra_public_cors_allowed_origins: []
hydra_log_level: warn
hydra_log_leak_sensitive_values: no
@ -61,6 +64,7 @@ hydra_clients:
# Hydra dispatcher configuration
enable_hydra_dispatcher: true
hydra_dispatcher_cookie_path: "{{ haproxy_hydra_dispatcher_base_path }}"
hydra_dispatcher_debug: no
hydra_dispatcher_admin_authorized_hosts:
@ -74,12 +78,37 @@ hydra_dispatcher_available_locales:
hydra_dispatcher_sentry_dsn:
hydra_dispatcher_sentry_environment:
hydra_dispatcher_mounts: []
hydra_dispatcher_disable_app_auto_select: true
hydra_dispatcher_webhook: false
hydra_dispatcher_webhook_api_url:
hydra_dispatcher_webhook_api_key: YouNeedToChangeMe
hydra_dispatcher_webhook_rules:
email:
required: false
pattern:
family_name:
required: false
given_name:
required: false
birthdate:
required: false
birthplace:
required: false
birthcountry:
required: false
crous:
required: false
idpve:
required: false
sub:
required: false
# Hydra Passwordless configuration
enable_hydra_passwordless: yes
hydra_passwordless_app_title: Adresse courriel
hydra_passwordless_app_description: Authentification via adresse courriel
hydra_passwordless_app_title:
fr: Adresse courriel
hydra_passwordless_app_description:
fr: Authentification via adresse courriel
hydra_passwordless_app_icon_url: https://upload.wikimedia.org/wikipedia/commons/4/48/You%27ve_got_mail.png
hydra_passwordless_identity_provider_id: passwordless
hydra_passwordless_smtp_host: smtp-server
@ -113,13 +142,17 @@ hydra_passwordless_attributes_rewrite_rules:
# Hydra SAML configuration
enable_hydra_saml: yes
hydra_saml_app_title: {}
hydra_saml_app_description: {}
hydra_saml_app_title:
fr: SAML
hydra_saml_app_description:
fr: Authentification via SAML
hydra_saml_app_icon_url:
hydra_saml_identity_provider_id: saml
hydra_saml_idp_entity_id: https://samltest.id/saml/idp
hydra_saml_idp_metadata_url: https://samltest.id/saml/idp
hydra_saml_app_options: {}
hydra_saml_app_options:
icon_url:
fr:
# Liste des URLs autorisées pour la redirection post-login/logout sur le service shibboleth-sp
hydra_saml_allowed_redirects: []
@ -133,6 +166,9 @@ hydra_saml_debug: no
# Niveau de verbosité du service shibboleth-sp
hydra_saml_sp_log_level: WARN
# Durée de vie des "refresh_token"
hydra_ttl_refresh_token: "24h"
# Inclure les règles de cartographie des attributs SAML fournis par défaut par le projet hydra-shibboleth-sp-v3
hydra_saml_include_sp_default_attributes_mapping: "yes"
@ -193,8 +229,10 @@ hydra_oidc_debug: no
hydra_oidc_hydra_url_error:
hydra_oidc_base_url:
hydra_oidc_cookie_path: "{{ haproxy_hydra_oidc_base_path }}"
hydra_oidc_app_title: {}
hydra_oidc_app_description: {}
hydra_oidc_app_title:
fr: OIDC
hydra_oidc_app_description:
fr: Authentification via OIDC
hydra_oidc_app_icon_url: https://openid.net/wordpress-content/uploads/2014/09/openid-r-logo-900x360.png
hydra_oidc_identity_provider_id: oidc
hydra_oidc_authorize_endpoint:
@ -206,7 +244,9 @@ hydra_oidc_scope: openid email
hydra_oidc_client_id:
hydra_oidc_client_secret:
hydra_oidc_additionnal_env: {}
hydra_oidc_app_options: {}
hydra_oidc_app_options:
icon_url:
fr:
hydra_oidc_attributes_rewrite_rules:
email:
- "property_exists(consent.session.id_token, 'email') ? consent.session.id_token.email : null"
@ -230,8 +270,10 @@ hydra_oidc_attributes_rewrite_rules:
# Hydra LDAP configuration
enable_hydra_ldap: no
hydra_ldap_app_title: LDAP
hydra_ldap_app_description: Authentification via LDAP
hydra_ldap_app_title:
fr: LDAP
hydra_ldap_app_description:
fr: Authentification via LDAP
hydra_ldap_app_icon_url:
hydra_ldap_dev_mode: false
hydra_ldap_attributes_rewrite_rules:

View File

@ -4,36 +4,42 @@
name: haproxy
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-v1
service:
name: cadoles-pod-hydra-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-dispatcher-v1
service:
name: cadoles-pod-hydra-dispatcher-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-passwordless-v1
service:
name: cadoles-pod-hydra-passwordless-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-remote-user-v1
service:
name: cadoles-pod-hydra-remote-user-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-shibboleth-sp-v3
service:
name: cadoles-pod-shibboleth-sp-v3
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-oidc-v1
service:
@ -46,7 +52,16 @@
name: cadoles-pod-hydra-ldap-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-goweb-oidc-v1
service:
name: cadoles-pod-goweb-oidc-v1
state: restarted
become: true
when: not install_only
- name: Reload hydra clients
ansible.builtin.include_tasks:
file: hydra-reload-clients.yml
file: hydra-reload-clients.yml
when: not install_only

View File

@ -86,6 +86,9 @@ properties:
hydra_log_leak_sensitive_values:
type: boolean
hydra_ttl_refresh_token:
type: string
# This value should not be changed after first deployment !
hydra_secrets_seed:
type: string
@ -109,9 +112,9 @@ properties:
enable_hydra_passwordless:
type: boolean
hydra_passwordless_app_title:
type: string
type: object
hydra_passwordless_app_description:
type: string
type: object
hydra_passwordless_app_icon_url:
type: string
hydra_passwordless_smtp_host:
@ -134,9 +137,9 @@ properties:
enable_hydra_saml:
type: boolean
hydra_saml_app_title:
type: string
type: object
hydra_saml_app_description:
type: string
type: object
hydra_saml_app_icon_url:
type: string
hydra_saml_idp_entity_id:

22
tasks/goweb-oidc.yml Normal file
View File

@ -0,0 +1,22 @@
---
- name: Install cadoles-pod-goweb-oidc-v1 package
ansible.builtin.apt:
name:
- "cadoles-pod-goweb-oidc-v1={{ cadoles_pod_goweb_oidc_v1_package_version }}"
update_cache: yes
state: present
become: true
- name: Configure cadoles-pod-goweb-oidc-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
with_items:
- src: cadoles-pod-goweb-oidc-v1.conf.j2
dest: /etc/cadoles-pod-goweb-oidc-v1.conf
mode: u=rw,g=r,o=r
notify:
- Restart cadoles-pod-goweb-oidc-v1
become: true

View File

@ -0,0 +1,25 @@
---
# Simple task to create 1 client for hydra. Fails if the client already exists.
# Parameter: client_id
- fail: msg='Error, client does not exist. Please define the client first'
when: hydra_clients|selectattr("client_id", "equalto", client_id)|list|length == 0
# Creating a client which already exists could create problems
- name: Check client doesn't already exists
command: podman exec -t cadoles-pod-hydra-v1 /bin/sh -c "hydra clients get {{ client_id }} --endpoint http://127.0.0.1:4445"
register: command_result
failed_when: command_result.rc == 0
become: true
- name: Create hydra-client
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
when: item.client_id == client_id
become: true
- name: Import client
command: podman exec -t cadoles-pod-hydra-v1 /bin/sh -c "hydra clients import /etc/hydra/clients.d/{{ client_id }}.json --endpoint http://127.0.0.1:4445"
become: true

View File

@ -0,0 +1,33 @@
---
# Simple task to update 1 client for hydra.
# Parameter: client_id
- fail: msg='Error, client does not exist. Please define the client first'
when: hydra_clients|selectattr("client_id", "equalto", client_id)|list|length == 0
- name: Create or overwrite hydra-client
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
when: item.client_id == client_id
become: true
- name: Update client
command: >
podman exec -t cadoles-pod-hydra-v1 /bin/sh -c "hydra clients update '{{ client_id }}'
--endpoint http://127.0.0.1:4445
--name '{{ item.client_name | default(item.client_id) }}'
--secret '{{ item.client_secret | default(lookup('ansible.builtin.password', '/dev/null chars=ascii_lowercase,digits length=32 seed=inventory_hostname')) }}'
--grant-types '{{ ','.join(item.grant_types) if "grant_types" in item else "authorization_code, refresh_token" }}'
--post-logout-callbacks '{{ ','.join(item.post_logout_redirect_uris) if "post_logout_redirect_uris" in item else "" }}'
--callbacks '{{ ','.join(item.redirect_uris) }}'
--response-types '{{ ','.join(item.response_types) if "response_types" in item else "code" }}'
--logo-uri '{{ item.logo_uri if "logo_uri" in item else "" }}'
--scope '{{ ','.join(item.scope) if "scope" in item else "openid profile email webhook" }}'
--token-endpoint-auth-method '{{ item.token_endpoint_auth_method if "token_endpoint_auth_method" in item else "client_secret_post" }}'
"
with_items: "{{ hydra_clients }}"
when: item.client_id == client_id
become: true

45
tasks/install-hydra.yml Normal file
View File

@ -0,0 +1,45 @@
---
- name: Install Hydra
ansible.builtin.apt:
name:
- cadoles-pod-hydra-v1={{ cadoles_pod_hydra_v1_package_version }}
update_cache: yes
state: present
become: true
- name: Configure Hydra local database
ansible.builtin.include_tasks: hydra-database.yml
when: not hydra_use_external_database
- name: Configure cadoles-pod-hydra-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
with_items:
- src: cadoles-pod-hydra-v1.conf.j2
dest: /etc/cadoles-pod-hydra-v1.conf
notify:
- Restart cadoles-pod-hydra-v1
become: true
- name: Check cadoles-pod-hydra-v1 status
service:
name: cadoles-pod-hydra-v1
state: started
become: true
- name: Migrate Hydra database schema
command: podman exec -it cadoles-pod-hydra-v1 migrate-hydra-schema
become: true
when: hydra_auto_migrate
- name: Create hydra-clients
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
notify:
- Reload hydra clients
become: true

View File

@ -9,24 +9,28 @@
update_cache: yes
state: present
become: true
tags: [ hydra-only ]
- name: Add LetsEncrypt missing intermediate certificates
command: "bash -c 'wget -O- --no-check-certificate https://forge.cadoles.com/Cadoles/Jenkins/raw/branch/master/resources/com/cadoles/common/add-letsencrypt-ca.sh | bash'"
args:
creates: /etc/ssl/certs/lets-encrypt-e1.pem.pem
become: true
tags: [ hydra-only ]
- name: Add cadoles-pod debian repository key
ansible.builtin.apt_key:
url: "{{ cadoles_pod_debian_repository_key_url }}"
state: present
become: true
tags: [ hydra-only ]
- name: Configure cadoles-pod debian repository
ansible.builtin.apt_repository:
repo: "deb {{ cadoles_pod_debian_repository_url }} {{ cadoles_pod_debian_repository }} main"
state: present
become: true
tags: [ hydra-only ]
- name: Ensure sysctl configuration
ansible.posix.sysctl:
@ -39,48 +43,30 @@
- name: fs.inotify.max_user_watches
value: 204800
become: true
tags: [ hydra-only ]
- name: Install core packages
- name: Install HAProxy
ansible.builtin.apt:
name:
- haproxy={{ haproxy_package_version }}
- cadoles-pod-hydra-v1={{ cadoles_pod_hydra_v1_package_version }}
- cadoles-pod-hydra-dispatcher-v1={{ cadoles_pod_hydra_dispatcher_v1_package_version }}
update_cache: yes
state: present
become: true
tags: [ hydra-only ]
- name: Configure Hydra local database
ansible.builtin.include_tasks: hydra-database.yml
when: not hydra_use_external_database
- name: Install Hydra
include_tasks:
file: ./install-hydra.yml
apply:
tags: [ hydra-only ]
tags: [ hydra-only ]
- name: Configure HAProxy
template:
src: haproxy.cfg.j2
dest: /etc/haproxy/haproxy.cfg
validate: "haproxy -c -f %s"
notify:
- Restart HAProxy
become: true
- name: Create hydra-clients
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
notify:
- Reload hydra clients
become: true
- name: Configure cadoles-pod-hydra-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
with_items:
- src: cadoles-pod-hydra-v1.conf.j2
dest: /etc/cadoles-pod-hydra-v1.conf
notify:
- Restart cadoles-pod-hydra-v1
- name: Install hydra-dispatcher
ansible.builtin.apt:
name:
- cadoles-pod-hydra-dispatcher-v1={{ cadoles_pod_hydra_dispatcher_v1_package_version }}
update_cache: yes
state: present
become: true
- name: Configure cadoles-pod-hydra-dispatcher-v1
@ -117,8 +103,18 @@
- name: Start OIDC Test app if enabled
ansible.builtin.include_tasks: start-oidc-test.yml
when: enable_oidc_test_app
when: enable_oidc_test_app and not install_only
- name: Stop OIDC Test app if disabled
ansible.builtin.include_tasks: stop-oidc-test.yml
when: not enable_oidc_test_app
when: not enable_oidc_test_app and not install_only
- name: Configure HAProxy
template:
src: haproxy.cfg.j2
dest: /etc/haproxy/haproxy.cfg
validate: "haproxy -c -f %s"
notify:
- Restart HAProxy
become: true
tags: [ hydra-only ]

View File

@ -0,0 +1,25 @@
---
# Simple task to update the package/container cadoles-pod-hydra-dispatcher only.
- name: Install hydra-dispatcher package
ansible.builtin.apt:
name:
- cadoles-pod-hydra-dispatcher-v1={{ cadoles_pod_hydra_dispatcher_v1_package_version }}
update_cache: yes
state: present
become: true
- name: Configure cadoles-pod-hydra-dispatcher-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
with_items:
- src: cadoles-pod-hydra-dispatcher-v1.conf.j2
dest: /etc/cadoles-pod-hydra-dispatcher-v1.conf
mode: u=rw,g=r
- src: hydra-dispatcher-apps.yml.j2
dest: /etc/hydra-dispatcher/conf.d/apps.yml
mode: u=rw,g=r,o=r
notify:
- Restart cadoles-pod-hydra-dispatcher-v1
become: true

31
tasks/update-hydra.yml Normal file
View File

@ -0,0 +1,31 @@
---
# Simple task to update the package/container cadoles-pod-hydra only.
- name: Install hydra package
ansible.builtin.apt:
name:
- cadoles-pod-hydra-v1={{ cadoles_pod_hydra_v1_package_version }}
update_cache: yes
state: present
become: true
- name: Configure cadoles-pod-hydra-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
with_items:
- src: cadoles-pod-hydra-v1.conf.j2
dest: /etc/cadoles-pod-hydra-v1.conf
mode: u=rw,g=r
notify:
- Restart cadoles-pod-hydra-v1
become: true
- name: Create hydra-clients
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
notify:
- Reload hydra clients
become: true

View File

@ -0,0 +1,14 @@
# {{ ansible_managed }}
PODMAN_ARGS="\
--name 'cadoles-pod-goweb-oidc-demo-v1' \
--replace \
-p 80:3002 \
-e LOG_LEVEL=0 \
-e HTTP_ADDRESS=0.0.0.0:3002 \
-e OIDC_CLIENT_ID=mse-demo \
-e OIDC_CLIENT_SECRET={{ hydra_clients|selectattr('client_id', 'equalto', 'mse-demo')|map(attribute='client_secret')|first }} \
-e OIDC_ISSUER_URL=https://pp.messervices.etudiant.gouv.fr/auth/ \
-e OIDC_REDIRECT_URL=https://auth.lescrous.fr/oauth2/callback \
-e OIDC_POST_LOGOUT_REDIRECT_URL=https://auth.lescrous.fr \
-e OIDC_ACR_VALUES= \
"

View File

@ -20,6 +20,7 @@ PODMAN_ARGS="\
-e 'TRUSTED_PROXIES=127.0.0.1,10.0.2.0/24' \
-e 'SENTRY_DSN={{ hydra_dispatcher_sentry_dsn }}' \
-e 'SENTRY_ENVIRONMENT={{ hydra_dispatcher_sentry_environment }}' \
-e 'DISABLE_APP_AUTO_SELECT={{ hydra_dispatcher_disable_app_auto_select }}' \
-v /etc/hydra-dispatcher/conf.d:/var/www/config/hydra \
{% for item in hydra_dispatcher_mounts %}
-v {{ item.host }}:{{ item.container }} \

View File

@ -18,6 +18,11 @@ PODMAN_ARGS="\
-e 'HYDRA_URL_POST_LOGOUT={{ hydra_url_post_logout }}' \
-e 'HYDRA_ALLOW_INSECURE=yes' \
-e 'HYDRA_LEVEL={{ hydra_log_level }}' \
-e 'TTL_REFRESH_TOKEN={{ hydra_ttl_refresh_token }}'\
{% if hydra_public_cors_allowed_origins | default([]) | length > 0 %}
-e 'SERVE_PUBLIC_CORS_ENABLED=true' \
-e 'SERVE_PUBLIC_CORS_ALLOWED_ORIGINS={{ hydra_public_cors_allowed_origins | join(',') }}' \
{% endif %}
-e 'HYDRA_SECRETS_SYSTEM={{ lookup('ansible.builtin.password', '/dev/null length=32 seed=hydra_secrets_seed') }}' \
-e 'HYDRA_OIDC_SUBJECT_IDENTIFIERS_PAIRWISE_SALT={{ lookup('ansible.builtin.password', '/dev/null length=32 seed=hydra_secrets_seed') }}' \
-v /etc/hydra/clients.d:/etc/hydra/clients.d \

View File

@ -4,7 +4,7 @@ PODMAN_ARGS="\
--network=slirp4netns:allow_host_loopback=true \
--replace --name 'cadoles-pod-shibboleth-sp-v3' \
--tz=local \
-e 'SP_ENTITY_ID=http://{{ ansible_fqdn }}{{ haproxy_hydra_saml_base_path }}' \
-e 'SP_ENTITY_ID={{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}' \
-e 'SP_LOG_LEVEL={{ hydra_saml_sp_log_level }}' \
-e 'IDP_ENTITY_ID={{ hydra_saml_idp_entity_id }}' \
-e 'IDP_METADATA_URL={{ hydra_saml_idp_metadata_url }}' \
@ -12,7 +12,7 @@ PODMAN_ARGS="\
-e 'APACHE_FORCE_HTTPS={{ "true" if haproxy_public_base_url.startswith('https') else "false" }}' \
-e 'SP_HANDLER_BASE_PATH={{ haproxy_hydra_saml_base_path }}' \
-e 'SP_SESSIONS_REDIRECT_LIMIT=host+allow' \
-e 'SP_SESSIONS_REDIRECT_ALLOW={{ hydra_saml_allowed_redirects | join(',') }}' \
-e 'SP_SESSIONS_REDIRECT_ALLOW={{ hydra_saml_allowed_redirects | join(' ') }}' \
-e 'SP_INCLUDE_DEFAULT_ATTRIBUTES_MAPPING={{ hydra_saml_include_sp_default_attributes_mapping }}' \
-e 'SP_INCLUDE_DEFAULT_ATTRIBUTES_POLICY={{ hydra_saml_include_sp_default_attributes_policy }}' \
-v '/etc/shibboleth/attribute-map.inc.xml:/etc/shibboleth/attribute-map.inc.xml' \

View File

@ -1,7 +1,7 @@
# {{ ansible_managed }}
global
log /dev/log local0
log /dev/log local1 notice
log /dev/log local0 err
log /dev/log local1 err
chroot /var/lib/haproxy
stats socket /run/haproxy/admin.sock mode 660 level admin expose-fd listeners
stats timeout 30s
@ -39,8 +39,9 @@ frontend http-in
mode http
maxconn 2000
{% if enable_hydra_dispatcher %}
acl login_dispatcher path_beg -i {{ haproxy_hydra_dispatcher_base_path }}
{% endif %}
{% if enable_hydra_passwordless %}
acl login_passwordless path_beg -i {{ haproxy_hydra_passwordless_base_path }}
{% endif %}
@ -57,7 +58,9 @@ frontend http-in
acl oidc_test path_beg -i {{ haproxy_oidc_test_base_path }}
{% endif %}
{% if enable_hydra_dispatcher %}
use_backend hydra_dispatcher if login_dispatcher
{% endif %}
{% if enable_hydra_passwordless %}
use_backend hydra_passwordless if login_passwordless
{% endif %}
@ -86,6 +89,7 @@ backend hydra
http-request set-path %[path,regsub(^{{ haproxy_hydra_base_path }},)]
server hydra 127.0.0.1:4444 check
{% if enable_hydra_dispatcher %}
# Backend Hydra Dispatcher
backend hydra_dispatcher
balance roundrobin
@ -94,6 +98,7 @@ backend hydra_dispatcher
http-request set-header X-Forwarded-Prefix {{ haproxy_hydra_dispatcher_base_path }}
server hydra-login-dispatcher 127.0.0.1:3000 check
{%- endif %}
{% if enable_hydra_passwordless %}
# Backend Hydra Passwordless
@ -141,4 +146,4 @@ backend oidc_test
http-request set-header X-Forwarded-Prefix {{ haproxy_oidc_test_base_path }}
server oidc-test 127.0.0.1:8080 check
{% endif %}
{% endif %}

View File

@ -9,6 +9,6 @@
"redirect_uris": {{ item.redirect_uris | default([]) | to_json }},
"response_types": {{ item.response_types | default(["code"]) | to_json }},
"logo_uri": {{ item.logo_uri | default("") | to_json }},
"scope": {{ item.scope | default("openid profile email roles") | to_json }},
"scope": {{ item.scope | default("openid profile email webhook") | to_json }},
"token_endpoint_auth_method": {{ item.token_endpoint_auth_method | default("client_secret_post") | to_json }}
}
}

View File

@ -4,60 +4,72 @@ hydra:
{% if enable_hydra_passwordless %}
- id: {{ hydra_passwordless_identity_provider_id | default("passwordless") }}
title:
fr: "{{ hydra_passwordless_app_title }}"
fr: "{{ hydra_passwordless_app_title.fr }}"
en: "{{ hydra_passwordless_app_title.en | default(hydra_passwordless_app_title.fr) }}"
description:
fr: "{{ hydra_passwordless_app_description }}"
fr: "{{ hydra_passwordless_app_description.fr }}"
en: "{{ hydra_passwordless_app_description.en | default(hydra_passwordless_app_description.fr) }}"
login_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_passwordless_base_path }}/login"
consent_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_passwordless_base_path }}/consent"
logout_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_passwordless_base_path }}/logout"
attributes_rewrite_rules: {{ hydra_passwordless_attributes_rewrite_rules | to_json }}
attributes_rewrite_configuration: {{ hydra_passwordless_attributes_rewrite_configuration | default({}) | to_json }}
icon_url: "{{ hydra_passwordless_app_icon_url }}"
{% endif %}
{% if enable_hydra_saml %}
- id: {{ hydra_saml_identity_provider_id | default("saml") }}
title:
fr: "{{ hydra_saml_app_title.fr }}"
en: "{{ hydra_saml_app_title.en | default("{{ hydra_saml_app_title.fr }}") }}"
en: "{{ hydra_saml_app_title.en | default(hydra_saml_app_title.fr) }}"
description:
fr: "{{ hydra_saml_app_description.fr }}"
en: "{{ hydra_saml_app_description.en | default("{{ hydra_saml_app_description.fr }}") }}"
en: "{{ hydra_saml_app_description.en | default(hydra_saml_app_description.fr) }}"
login_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}/login"
consent_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}/consent"
logout_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}/logout"
attributes_rewrite_rules: {{ hydra_saml_attributes_rewrite_rules | to_json }}
attributes_rewrite_configuration: {{ hydra_saml_attributes_rewrite_configuration | default({}) | to_json }}
icon_url: "{{ hydra_saml_app_icon_url }}"
options:
icon_url:
fr: "{{ hydra_saml_app_options.icon_url.fr }}"
en: "{{ hydra_saml_app_options.icon_url.en | default("{{ hydra_saml_app_options.icon_url.fr }}") }}"
en: "{{ hydra_saml_app_options.icon_url.en | default( hydra_saml_app_options.icon_url.fr) }}"
{% endif %}
{% if enable_hydra_oidc %}
- id: {{ hydra_oidc_identity_provider_id | default("oidc") }}
title:
fr: "{{ hydra_oidc_app_title.fr }}"
en: "{{ hydra_oidc_app_title.en | default("{{ hydra_oidc_app_title.fr }}") }}"
en: "{{ hydra_oidc_app_title.en | default(hydra_oidc_app_title.fr) }}"
description:
fr: "{{ hydra_oidc_app_description.fr }}"
en: "{{ hydra_oidc_app_description.en | default("{{ hydra_oidc_app_description.fr }}") }}"
en: "{{ hydra_oidc_app_description.en | default(hydra_oidc_app_description.fr) }}"
login_url: "{{ hydra_oidc_base_url }}{{ haproxy_hydra_oidc_base_path }}/login"
consent_url: "{{ hydra_oidc_base_url }}{{ haproxy_hydra_oidc_base_path }}/consent"
logout_url: "{{ hydra_oidc_base_url }}{{ haproxy_hydra_oidc_base_path }}/logout"
attributes_rewrite_rules: {{ hydra_oidc_attributes_rewrite_rules | to_json }}
attributes_rewrite_configuration: {{ hydra_oidc_attributes_rewrite_configuration | default({}) | to_json }}
icon_url: "{{ hydra_oidc_app_icon_url }}"
options:
icon_url:
fr: "{{ hydra_oidc_app_options.icon_url.fr }}"
en: "{{ hydra_oidc_app_options.icon_url.en | default("{{ hydra_oidc_app_options.icon_url.fr }}") }}"
en: "{{ hydra_oidc_app_options.icon_url.en | default(hydra_oidc_app_options.icon_url.fr) }}"
{% endif %}
{% if enable_hydra_ldap %}
- id: ldap
title:
fr: "{{ hydra_ldap_app_title }}"
fr: "{{ hydra_ldap_app_title.fr }}"
en: "{{ hydra_ldap_app_title.en | default(hydra_ldap_app_title.fr) }}"
description:
fr: "{{ hydra_ldap_app_description }}"
fr: "{{ hydra_ldap_app_description.fr }}"
en: "{{ hydra_ldap_app_description.en | default(hydra_ldap_app_description.fr) }}"
login_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_ldap_base_path }}/auth/login"
consent_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_ldap_base_path }}/auth/consent"
logout_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_ldap_base_path }}/auth/logout"
attributes_rewrite_rules: {{ hydra_ldap_attributes_rewrite_rules | to_json }}
attributes_rewrite_configuration: {{ hydra_ldap_attributes_rewrite_configuration | default({}) | to_json }}
icon_url: "{{ hydra_ldap_app_icon_url }}"
{% endif %}
webhook:
enabled: {{ hydra_dispatcher_webhook }}
api_url: {{ hydra_dispatcher_webhook_api_url }}
api_key: {{ hydra_dispatcher_webhook_api_key }}
api_method: POST
firewall:
additional_properties: true
rules: {{ hydra_dispatcher_webhook_rules | to_json }}