51 Commits

Author SHA1 Message Date
c9b6f359be Allow roll-back for hydra-dispatcher 2024-07-24 16:20:57 +02:00
f1f7570864 WIP: Hotfix liés à MSE2 2024-07-24 16:20:54 +02:00
3d11c50b0a feat: add redis dns parameter for hydra-dispatcher
Used by the cache when available
2024-07-12 14:25:57 +02:00
6c008bb053 refacto: split creation of config files from general update of hydra sp 2024-05-23 10:38:14 +02:00
6ae24ccf81 feat: allow changing hydra oidc internal port (default 8080) 2024-01-10 14:48:51 +01:00
8d3ca8fe91 feat: do not restart hydra-oidc when install_only 2024-01-09 16:35:29 +01:00
bb1c734c2c fix: update ports mapping for hydra-dispatcher and hydra-oidc 2023-12-04 09:23:28 +01:00
554d79b3b7 f/fix_update_sp (#17)
Reviewed-on: #17
Reviewed-by: vfebvre <vfebvre@cadoles.com>
2023-11-28 13:43:13 +01:00
d365d2ec50 fix: update all shibboleth config files when updating shibboleth-sp 2023-11-14 12:30:22 +01:00
9fb1118961 feat(hydra): add variable HYDRA_BCRYPT_COST 2023-11-13 11:12:03 +01:00
daa8612bae cosmetic: move hydra_ttl_refresh_token option 2023-11-13 11:09:48 +01:00
793582e621 Adding a task to update hydra-remote-user only 2023-11-09 09:10:15 +01:00
e6f973805b Update pod Shibboleth SP only 2023-10-26 13:50:32 +02:00
9054f14223 feat: run hydra migrations if specified 2023-10-25 17:55:54 +02:00
547eb73d6c feat: modularize playbook with tags 2023-10-25 15:13:35 +02:00
2b4e669cc3 reactivate Create hydra clients 2023-10-24 08:26:15 +02:00
e88e45ac91 comment create hydra client so as not to replay them 2023-10-19 16:13:19 +02:00
03cc82f26e set correct separator 2023-10-17 08:03:45 +02:00
2f464faff3 feat(hydra): adding tasks to only update hydra-v1. (#15)
Reviewed-on: #15
2023-10-16 16:35:56 +02:00
a8a1632eb6 feat(hydra): adding tasks to only update hydra-v1. 2023-10-16 13:54:11 +02:00
d259417d47 feat(hydra): configurable ttl_refresh_token (#14)
Reviewed-on: #14
2023-10-09 11:15:33 +02:00
8bc50e1533 feat(hydra): configurable ttl_refresh_token
adding new variable to configure ttl_refresh_token

ref mse project : CNOUS/mse#2591
2023-10-09 10:57:30 +02:00
9261bff896 Hydra-update-client: fix creation of json file 2023-08-17 11:37:55 +02:00
19bc989486 Hydra-update-client: use update command instead of deleting/importing client (#13)
Reviewed-on: #13
Reviewed-by: vfebvre <vfebvre@cadoles.com>
2023-08-10 11:35:02 +02:00
2bbef92ed9 Adding a task to update hydra-dispatcher only (#12)
Reviewed-on: #12
Reviewed-by: vfebvre <vfebvre@cadoles.com>
2023-08-10 11:29:50 +02:00
571c297741 Hydra-update-client: use update command instead of deleting/importing client 2023-08-09 17:38:39 +02:00
7c745e2cf9 Adding a task to update hydra-dispatcher only
We may want to restart this service only.
2023-08-07 18:02:59 +02:00
a9e6253449 Add task to modify 1 client 2023-07-24 16:07:28 +02:00
fe88269c9f Add tasks to create only 1 client (#11)
Rational: adding a client seems inoffensive. Updating a client on the other hand is not (removing then adding a client).
Co-authored-by: Laurent Gourvénec <lgourvenec@cadoles.com>
Reviewed-on: #11
Co-authored-by: Laurent Gourvenec <lgourvenec@cadoles.com>
Co-committed-by: Laurent Gourvenec <lgourvenec@cadoles.com>
2023-07-13 10:19:04 +02:00
08c1bafa68 feat: allow activation of cors headers for spa clients 2023-06-20 13:48:44 -06:00
f1ad86a80d fix: default hydra apps titles/descriptions templating 2023-05-25 15:28:44 +02:00
7e0da81478 feat: add missing default values for templates 2023-05-25 14:53:28 +02:00
5bba8b978e goweb-oidc: get client password 2023-05-03 10:45:09 +02:00
e6f50cc01a update goweb-conf 2023-05-03 10:45:01 +02:00
5187927b61 adding tasks for goweb-oidc 2023-04-18 11:44:34 +02:00
7feec0969b update config dispatcher 2023-04-06 12:18:10 +02:00
dd00e3f079 fix(dispatcher) typo correction for dispatcher template 2023-03-30 11:05:10 +02:00
4fb709f133 update default webhook var 2023-03-28 16:25:55 +02:00
9469a5ec4f remove unused hydra-oidc scope 2023-03-27 14:03:50 +02:00
dda65fb7b4 set default hydra client scope with webhook 2023-03-27 14:02:29 +02:00
9c7773a038 set default rules for webhook 2023-03-27 13:57:42 +02:00
507f292b66 typo 2023-03-27 11:00:08 +02:00
bedf63722d ajout webhook dispatcher 2023-03-27 10:06:35 +02:00
ea6c9925c9 Merge pull request 'fix/shibboleth_entity_id' (#10) from fix/shibboleth_entity_id into master
Reviewed-on: #10
2023-03-02 15:33:50 +01:00
e42d3cf47b Merge branch 'master' into fix/shibboleth_entity_id 2023-02-28 14:36:57 +01:00
67e7b7d275 Merge branch 'hydra_dispatcher_disable_disable_app_auto_select' into fix/shibboleth_entity_id 2023-02-20 10:26:55 +01:00
e57dd36be3 Merge branch 'fix/haproxy-configuration' into fix/shibboleth_entity_id 2023-02-20 10:26:32 +01:00
05bc71e15a fix[hydra] log level 2023-02-20 10:20:56 +01:00
b419226b97 Use haproxy base URL for entity_id in cadoles-pod-shibboleth-sp-v3.conf.j2
We need a common entity_id if we want 2 hydra with a same SAML Metadata
2023-02-16 12:27:29 +01:00
31268f9cd8 feat(hydra-dispatcher): ajout variable hydra_dispatcher_disable_app_auto_select 2023-02-15 15:48:23 +01:00
e6e58a3fd3 fix(haproxy): haproxy needs to be configured after the "services" 2023-02-13 11:42:36 +01:00
25 changed files with 507 additions and 81 deletions

View File

@ -1,4 +1,6 @@
---
install_only: false
# cadoles-pod repository configuration
cadoles_pod_debian_repository_url: https://vulcain.cadoles.com
cadoles_pod_debian_repository: bullseye-dev
@ -15,7 +17,8 @@ cadoles_pod_hydra_oidc_v1_package_version: '*'
cadoles_pod_hydra_ldap_v1_package_version: '*'
# Hydra database configuration
hydra_use_external_database: no
hydra_use_external_database: false
hydra_auto_migrate: false
hydra_database_name: hydra
hydra_database_user: hydra
hydra_database_password: hydra
@ -45,11 +48,16 @@ hydra_urls_login: "{{ haproxy_public_base_url }}{{ haproxy_hydra_dispatcher_base
hydra_urls_logout: "{{ haproxy_public_base_url }}{{ haproxy_hydra_dispatcher_base_path }}/logout"
hydra_url_post_logout: "{{ haproxy_public_base_url }}"
hydra_urls_error: "{{ haproxy_public_base_url }}/erreur"
hydra_public_cors_allowed_origins: []
hydra_log_level: warn
hydra_log_leak_sensitive_values: no
# Durée de vie des "refresh_token"
hydra_ttl_refresh_token: "24h"
hydra_bcrypt_cost: 8
# This value should not be changed after first deployment !
hydra_secrets_seed: "{{ inventory_hostname }}"
@ -61,6 +69,7 @@ hydra_clients:
# Hydra dispatcher configuration
enable_hydra_dispatcher: true
hydra_dispatcher_cookie_path: "{{ haproxy_hydra_dispatcher_base_path }}"
hydra_dispatcher_debug: no
hydra_dispatcher_admin_authorized_hosts:
@ -73,13 +82,39 @@ hydra_dispatcher_available_locales:
- en
hydra_dispatcher_sentry_dsn:
hydra_dispatcher_sentry_environment:
hydra_dispatcher_redis_dsn:
hydra_dispatcher_mounts: []
hydra_dispatcher_disable_app_auto_select: true
hydra_dispatcher_webhook: false
hydra_dispatcher_webhook_api_url:
hydra_dispatcher_webhook_api_key: YouNeedToChangeMe
hydra_dispatcher_webhook_rules:
email:
required: false
pattern:
family_name:
required: false
given_name:
required: false
birthdate:
required: false
birthplace:
required: false
birthcountry:
required: false
crous:
required: false
idpve:
required: false
sub:
required: false
# Hydra Passwordless configuration
enable_hydra_passwordless: yes
hydra_passwordless_app_title: Adresse courriel
hydra_passwordless_app_description: Authentification via adresse courriel
hydra_passwordless_app_title:
fr: Adresse courriel
hydra_passwordless_app_description:
fr: Authentification via adresse courriel
hydra_passwordless_app_icon_url: https://upload.wikimedia.org/wikipedia/commons/4/48/You%27ve_got_mail.png
hydra_passwordless_identity_provider_id: passwordless
hydra_passwordless_smtp_host: smtp-server
@ -113,13 +148,17 @@ hydra_passwordless_attributes_rewrite_rules:
# Hydra SAML configuration
enable_hydra_saml: yes
hydra_saml_app_title: {}
hydra_saml_app_description: {}
hydra_saml_app_title:
fr: SAML
hydra_saml_app_description:
fr: Authentification via SAML
hydra_saml_app_icon_url:
hydra_saml_identity_provider_id: saml
hydra_saml_idp_entity_id: https://samltest.id/saml/idp
hydra_saml_idp_metadata_url: https://samltest.id/saml/idp
hydra_saml_app_options: {}
hydra_saml_app_options:
icon_url:
fr:
# Liste des URLs autorisées pour la redirection post-login/logout sur le service shibboleth-sp
hydra_saml_allowed_redirects: []
@ -190,11 +229,14 @@ oidc_test_app_public_base_url: "{{ haproxy_public_base_url }}{{ haproxy_oidc_tes
enable_hydra_oidc: no
hydra_oidc_debug: no
hydra_oidc_internal_port: 8080
hydra_oidc_hydra_url_error:
hydra_oidc_base_url:
hydra_oidc_cookie_path: "{{ haproxy_hydra_oidc_base_path }}"
hydra_oidc_app_title: {}
hydra_oidc_app_description: {}
hydra_oidc_app_title:
fr: OIDC
hydra_oidc_app_description:
fr: Authentification via OIDC
hydra_oidc_app_icon_url: https://openid.net/wordpress-content/uploads/2014/09/openid-r-logo-900x360.png
hydra_oidc_identity_provider_id: oidc
hydra_oidc_authorize_endpoint:
@ -206,7 +248,9 @@ hydra_oidc_scope: openid email
hydra_oidc_client_id:
hydra_oidc_client_secret:
hydra_oidc_additionnal_env: {}
hydra_oidc_app_options: {}
hydra_oidc_app_options:
icon_url:
fr:
hydra_oidc_attributes_rewrite_rules:
email:
- "property_exists(consent.session.id_token, 'email') ? consent.session.id_token.email : null"
@ -230,8 +274,10 @@ hydra_oidc_attributes_rewrite_rules:
# Hydra LDAP configuration
enable_hydra_ldap: no
hydra_ldap_app_title: LDAP
hydra_ldap_app_description: Authentification via LDAP
hydra_ldap_app_title:
fr: LDAP
hydra_ldap_app_description:
fr: Authentification via LDAP
hydra_ldap_app_icon_url:
hydra_ldap_dev_mode: false
hydra_ldap_attributes_rewrite_rules:

10
files/mpm_prefork.conf Normal file
View File

@ -0,0 +1,10 @@
# prefork MPM
<IfModule mpm_prefork_module>
StartServers 10
MinSpareServers 10
MaxSpareServers 20
MaxRequestWorkers 128
MaxConnectionsPerChild 2000
</IfModule>

24
files/www.conf.gotmpl Normal file
View File

@ -0,0 +1,24 @@
{%- raw -%}
[www]
user = www-data
group = www-data
listen = {{ env.Getenv "PHP_FPM_LISTEN" "/tmp/php-fpm.sock" }}
listen.owner = www-data
listen.group = www-data
listen.mode = 0660
pm = dynamic
pm.max_children = {{ env.Getenv "PHP_FPM_MAX_CHILDREN" "5" }}
pm.start_servers = {{ env.Getenv "PHP_FPM_START_SERVERS" "2" }}
pm.min_spare_servers = {{ env.Getenv "PHP_FPM_MIN_SPARE_SERVERS" "1" }}
pm.max_spare_servers = {{ env.Getenv "PHP_FPM_MAX_SPARE_SERVERS" "3" }}
pm.status_path = /healthcheck
pm.status_listen = 127.0.0.1:8091
clear_env = no
php_admin_value[display_errors] = {{ env.Getenv "PHP_FPM_DISPLAY_ERRORS" "off" }}
php_admin_value[memory_limit] = {{ env.Getenv "PHP_FPM_MEMORY_LIMIT" "32m" }}
{% endraw %}

View File

@ -4,49 +4,65 @@
name: haproxy
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-v1
service:
name: cadoles-pod-hydra-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-dispatcher-v1
service:
name: cadoles-pod-hydra-dispatcher-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-passwordless-v1
service:
name: cadoles-pod-hydra-passwordless-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-remote-user-v1
service:
name: cadoles-pod-hydra-remote-user-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-shibboleth-sp-v3
service:
name: cadoles-pod-shibboleth-sp-v3
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-oidc-v1
service:
name: cadoles-pod-hydra-oidc-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-hydra-ldap-v1
service:
name: cadoles-pod-hydra-ldap-v1
state: restarted
become: true
when: not install_only
- name: Restart cadoles-pod-goweb-oidc-v1
service:
name: cadoles-pod-goweb-oidc-v1
state: restarted
become: true
when: not install_only
- name: Reload hydra clients
ansible.builtin.include_tasks:
file: hydra-reload-clients.yml
file: hydra-reload-clients.yml
when: not install_only

View File

@ -86,6 +86,13 @@ properties:
hydra_log_leak_sensitive_values:
type: boolean
hydra_ttl_refresh_token:
type: string
hydra_brypt_cost:
type: number
description: Coût CPU pour calculer des hachages de secret (4-31)
# This value should not be changed after first deployment !
hydra_secrets_seed:
type: string
@ -109,9 +116,9 @@ properties:
enable_hydra_passwordless:
type: boolean
hydra_passwordless_app_title:
type: string
type: object
hydra_passwordless_app_description:
type: string
type: object
hydra_passwordless_app_icon_url:
type: string
hydra_passwordless_smtp_host:
@ -134,9 +141,9 @@ properties:
enable_hydra_saml:
type: boolean
hydra_saml_app_title:
type: string
type: object
hydra_saml_app_description:
type: string
type: object
hydra_saml_app_icon_url:
type: string
hydra_saml_idp_entity_id:

View File

@ -0,0 +1,21 @@
---
# Simple task to update the config files of cadoles-pod-shibboleth-sp only.
- name: Configure cadoles-pod-shibboleth-sp-v3
ansible.builtin.template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
with_items:
- src: cadoles-pod-shibboleth-sp-v3.conf.j2
dest: /etc/cadoles-pod-shibboleth-sp-v3.conf
mode: u=rw,g=r
- src: shibboleth-attribute-map.inc.xml.j2
dest: /etc/shibboleth/attribute-map.inc.xml
mode: u=rw,g=r,o=r
- src: shibboleth-attribute-policy.inc.xml.j2
dest: /etc/shibboleth/attribute-policy.inc.xml
mode: u=rw,g=r,o=r
notify:
- Restart cadoles-pod-shibboleth-sp-v3
become: true

22
tasks/goweb-oidc.yml Normal file
View File

@ -0,0 +1,22 @@
---
- name: Install cadoles-pod-goweb-oidc-v1 package
ansible.builtin.apt:
name:
- "cadoles-pod-goweb-oidc-v1={{ cadoles_pod_goweb_oidc_v1_package_version }}"
update_cache: yes
state: present
become: true
- name: Configure cadoles-pod-goweb-oidc-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
with_items:
- src: cadoles-pod-goweb-oidc-v1.conf.j2
dest: /etc/cadoles-pod-goweb-oidc-v1.conf
mode: u=rw,g=r,o=r
notify:
- Restart cadoles-pod-goweb-oidc-v1
become: true

View File

@ -0,0 +1,25 @@
---
# Simple task to create 1 client for hydra. Fails if the client already exists.
# Parameter: client_id
- fail: msg='Error, client does not exist. Please define the client first'
when: hydra_clients|selectattr("client_id", "equalto", client_id)|list|length == 0
# Creating a client which already exists could create problems
- name: Check client doesn't already exists
command: podman exec -t cadoles-pod-hydra-v1 /bin/sh -c "hydra clients get {{ client_id }} --endpoint http://127.0.0.1:4445"
register: command_result
failed_when: command_result.rc == 0
become: true
- name: Create hydra-client
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
when: item.client_id == client_id
become: true
- name: Import client
command: podman exec -t cadoles-pod-hydra-v1 /bin/sh -c "hydra clients import /etc/hydra/clients.d/{{ client_id }}.json --endpoint http://127.0.0.1:4445"
become: true

View File

@ -27,8 +27,13 @@
- name: Configure cadoles-pod-hydra-remote-user-v1 (2)
ansible.builtin.copy:
src: hydra-remote-user-v1-apache.conf
dest: /etc/hydra-remote-user/apache.conf
src: "{{ item.src }}"
dest: "{{ item.dest }}"
with_items:
- src: hydra-remote-user-v1-apache.conf
dest: /etc/hydra-remote-user/apache.conf
- src: mpm_prefork.conf
dest: /etc/hydra-remote-user/mpm_prefork.conf
notify:
- Restart cadoles-pod-hydra-remote-user-v1
become: true

View File

@ -0,0 +1,33 @@
---
# Simple task to update 1 client for hydra.
# Parameter: client_id
- fail: msg='Error, client does not exist. Please define the client first'
when: hydra_clients|selectattr("client_id", "equalto", client_id)|list|length == 0
- name: Create or overwrite hydra-client
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
when: item.client_id == client_id
become: true
- name: Update client
command: >
podman exec -t cadoles-pod-hydra-v1 /bin/sh -c "hydra clients update '{{ client_id }}'
--endpoint http://127.0.0.1:4445
--name '{{ item.client_name | default(item.client_id) }}'
--secret '{{ item.client_secret | default(lookup('ansible.builtin.password', '/dev/null chars=ascii_lowercase,digits length=32 seed=inventory_hostname')) }}'
--grant-types '{{ ','.join(item.grant_types) if "grant_types" in item else "authorization_code, refresh_token" }}'
--post-logout-callbacks '{{ ','.join(item.post_logout_redirect_uris) if "post_logout_redirect_uris" in item else "" }}'
--callbacks '{{ ','.join(item.redirect_uris) }}'
--response-types '{{ ','.join(item.response_types) if "response_types" in item else "code" }}'
--logo-uri '{{ item.logo_uri if "logo_uri" in item else "" }}'
--scope '{{ ','.join(item.scope) if "scope" in item else "openid profile email webhook" }}'
--token-endpoint-auth-method '{{ item.token_endpoint_auth_method if "token_endpoint_auth_method" in item else "client_secret_post" }}'
"
with_items: "{{ hydra_clients }}"
when: item.client_id == client_id
become: true

45
tasks/install-hydra.yml Normal file
View File

@ -0,0 +1,45 @@
---
- name: Install Hydra
ansible.builtin.apt:
name:
- cadoles-pod-hydra-v1={{ cadoles_pod_hydra_v1_package_version }}
update_cache: yes
state: present
become: true
- name: Configure Hydra local database
ansible.builtin.include_tasks: hydra-database.yml
when: not hydra_use_external_database
- name: Configure cadoles-pod-hydra-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
with_items:
- src: cadoles-pod-hydra-v1.conf.j2
dest: /etc/cadoles-pod-hydra-v1.conf
notify:
- Restart cadoles-pod-hydra-v1
become: true
- name: Check cadoles-pod-hydra-v1 status
service:
name: cadoles-pod-hydra-v1
state: started
become: true
- name: Migrate Hydra database schema
command: podman exec -it cadoles-pod-hydra-v1 migrate-hydra-schema
become: true
when: hydra_auto_migrate
- name: Create hydra-clients
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
notify:
- Reload hydra clients
become: true

View File

@ -9,24 +9,28 @@
update_cache: yes
state: present
become: true
tags: [ hydra-only ]
- name: Add LetsEncrypt missing intermediate certificates
command: "bash -c 'wget -O- --no-check-certificate https://forge.cadoles.com/Cadoles/Jenkins/raw/branch/master/resources/com/cadoles/common/add-letsencrypt-ca.sh | bash'"
args:
creates: /etc/ssl/certs/lets-encrypt-e1.pem.pem
become: true
tags: [ hydra-only ]
- name: Add cadoles-pod debian repository key
ansible.builtin.apt_key:
url: "{{ cadoles_pod_debian_repository_key_url }}"
state: present
become: true
tags: [ hydra-only ]
- name: Configure cadoles-pod debian repository
ansible.builtin.apt_repository:
repo: "deb {{ cadoles_pod_debian_repository_url }} {{ cadoles_pod_debian_repository }} main"
state: present
become: true
tags: [ hydra-only ]
- name: Ensure sysctl configuration
ansible.posix.sysctl:
@ -39,48 +43,30 @@
- name: fs.inotify.max_user_watches
value: 204800
become: true
tags: [ hydra-only ]
- name: Install core packages
- name: Install HAProxy
ansible.builtin.apt:
name:
- haproxy={{ haproxy_package_version }}
- cadoles-pod-hydra-v1={{ cadoles_pod_hydra_v1_package_version }}
- cadoles-pod-hydra-dispatcher-v1={{ cadoles_pod_hydra_dispatcher_v1_package_version }}
update_cache: yes
state: present
become: true
tags: [ hydra-only ]
- name: Configure Hydra local database
ansible.builtin.include_tasks: hydra-database.yml
when: not hydra_use_external_database
- name: Install Hydra
include_tasks:
file: ./install-hydra.yml
apply:
tags: [ hydra-only ]
tags: [ hydra-only ]
- name: Configure HAProxy
template:
src: haproxy.cfg.j2
dest: /etc/haproxy/haproxy.cfg
validate: "haproxy -c -f %s"
notify:
- Restart HAProxy
become: true
- name: Create hydra-clients
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
notify:
- Reload hydra clients
become: true
- name: Configure cadoles-pod-hydra-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
with_items:
- src: cadoles-pod-hydra-v1.conf.j2
dest: /etc/cadoles-pod-hydra-v1.conf
notify:
- Restart cadoles-pod-hydra-v1
- name: Install hydra-dispatcher
ansible.builtin.apt:
name:
- cadoles-pod-hydra-dispatcher-v1={{ cadoles_pod_hydra_dispatcher_v1_package_version }}
update_cache: yes
state: present
become: true
- name: Configure cadoles-pod-hydra-dispatcher-v1
@ -99,6 +85,17 @@
- Restart cadoles-pod-hydra-dispatcher-v1
become: true
- name: Configure cadoles-pod-hydra-dispatcher-v1 (2)
ansible.builtin.copy:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
with_items:
- src: www.conf.gotmpl
dest: /etc/hydra-dispatcher/www.conf.gotmpl
notify:
- Restart cadoles-pod-hydra-dispatcher-v1
become: true
- name: Configure passwordless authentification if enabled
ansible.builtin.include_tasks: hydra-passwordless.yml
when: enable_hydra_passwordless
@ -117,8 +114,18 @@
- name: Start OIDC Test app if enabled
ansible.builtin.include_tasks: start-oidc-test.yml
when: enable_oidc_test_app
when: enable_oidc_test_app and not install_only
- name: Stop OIDC Test app if disabled
ansible.builtin.include_tasks: stop-oidc-test.yml
when: not enable_oidc_test_app
when: not enable_oidc_test_app and not install_only
- name: Configure HAProxy
template:
src: haproxy.cfg.j2
dest: /etc/haproxy/haproxy.cfg
validate: "haproxy -c -f %s"
notify:
- Restart HAProxy
become: true
tags: [ hydra-only ]

View File

@ -0,0 +1,37 @@
---
# Simple task to update the package/container cadoles-pod-hydra-dispatcher only.
- name: Install hydra-dispatcher package
ansible.builtin.apt:
name:
- cadoles-pod-hydra-dispatcher-v1={{ cadoles_pod_hydra_dispatcher_v1_package_version }}
update_cache: yes
allow_downgrade: true
state: present
become: true
- name: Configure cadoles-pod-hydra-dispatcher-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
with_items:
- src: cadoles-pod-hydra-dispatcher-v1.conf.j2
dest: /etc/cadoles-pod-hydra-dispatcher-v1.conf
mode: u=rw,g=r
- src: hydra-dispatcher-apps.yml.j2
dest: /etc/hydra-dispatcher/conf.d/apps.yml
mode: u=rw,g=r,o=r
notify:
- Restart cadoles-pod-hydra-dispatcher-v1
become: true
- name: Configure cadoles-pod-hydra-dispatcher-v1 (2)
ansible.builtin.copy:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
with_items:
- src: www.conf.gotmpl
dest: /etc/hydra-dispatcher/www.conf.gotmpl
notify:
- Restart cadoles-pod-hydra-dispatcher-v1
become: true

View File

@ -0,0 +1,38 @@
---
# Simple task to update the package/container cadoles-pod-hydra-remote-user only.
- name: Install hydra-remote-user package
ansible.builtin.apt:
name:
- cadoles-pod-hydra-remote-user-v1={{ cadoles_pod_hydra_remote_user_v1_package_version }}
update_cache: yes
state: present
become: true
- name: Configure cadoles-pod-hydra-remote-user-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
with_items:
- src: cadoles-pod-hydra-remote-user-v1.conf.j2
dest: /etc/cadoles-pod-hydra-remote-user-v1.conf
mode: u=rw,g=r
- src: hydra-remote-user.yml.j2
dest: /etc/hydra-remote-user/conf.d/remote-user.yml
mode: u=rw,g=r,o=r
notify:
- Restart cadoles-pod-hydra-remote-user-v1
become: true
- name: Configure cadoles-pod-hydra-remote-user-v1 (2)
ansible.builtin.copy:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
with_items:
- src: hydra-remote-user-v1-apache.conf
dest: /etc/hydra-remote-user/apache.conf
- src: mpm_prefork.conf
dest: /etc/hydra-remote-user/mpm_prefork.conf
notify:
- Restart cadoles-pod-hydra-remote-user-v1
become: true

12
tasks/update-hydra-sp.yml Normal file
View File

@ -0,0 +1,12 @@
---
# Simple task to update the package/container cadoles-pod-shibboleth-sp only.
- name: Install hydra-shibboleth package
ansible.builtin.apt:
name:
- cadoles-pod-shibboleth-sp-v3={{ cadoles_pod_shibboleth_sp_v3_package_version }}
update_cache: yes
state: present
become: true
- name: Configure hydra SP
ansible.builtin.include_tasks: configure-hydra-sp.yml

31
tasks/update-hydra.yml Normal file
View File

@ -0,0 +1,31 @@
---
# Simple task to update the package/container cadoles-pod-hydra only.
- name: Install hydra package
ansible.builtin.apt:
name:
- cadoles-pod-hydra-v1={{ cadoles_pod_hydra_v1_package_version }}
update_cache: yes
state: present
become: true
- name: Configure cadoles-pod-hydra-v1
template:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode }}"
with_items:
- src: cadoles-pod-hydra-v1.conf.j2
dest: /etc/cadoles-pod-hydra-v1.conf
mode: u=rw,g=r
notify:
- Restart cadoles-pod-hydra-v1
become: true
- name: Create hydra-clients
template:
src: hydra-client.json.j2
dest: "/etc/hydra/clients.d/{{ item.client_id }}.json"
with_items: "{{ hydra_clients }}"
notify:
- Reload hydra clients
become: true

View File

@ -0,0 +1,14 @@
# {{ ansible_managed }}
PODMAN_ARGS="\
--name 'cadoles-pod-goweb-oidc-demo-v1' \
--replace \
-p 80:3002 \
-e LOG_LEVEL=0 \
-e HTTP_ADDRESS=0.0.0.0:3002 \
-e OIDC_CLIENT_ID=mse-demo \
-e OIDC_CLIENT_SECRET={{ hydra_clients|selectattr('client_id', 'equalto', 'mse-demo')|map(attribute='client_secret')|first }} \
-e OIDC_ISSUER_URL=https://pp.messervices.etudiant.gouv.fr/auth/ \
-e OIDC_REDIRECT_URL=https://auth.lescrous.fr/oauth2/callback \
-e OIDC_POST_LOGOUT_REDIRECT_URL=https://auth.lescrous.fr \
-e OIDC_ACR_VALUES= \
"

View File

@ -4,7 +4,7 @@ PODMAN_ARGS="\
--replace \
--network=slirp4netns:allow_host_loopback=true \
--tz=local \
-p 127.0.0.1:3000:80 \
-p 127.0.0.1:3000:8080 \
-e APP_ENV=prod \
-e 'APP_DEBUG={{ hydra_dispatcher_debug }}' \
-e HYDRA_ADMIN_BASE_URL=http://10.0.2.2:4445 \
@ -20,7 +20,16 @@ PODMAN_ARGS="\
-e 'TRUSTED_PROXIES=127.0.0.1,10.0.2.0/24' \
-e 'SENTRY_DSN={{ hydra_dispatcher_sentry_dsn }}' \
-e 'SENTRY_ENVIRONMENT={{ hydra_dispatcher_sentry_environment }}' \
-v /etc/hydra-dispatcher/conf.d:/var/www/config/hydra \
-e 'REDIS_DSN={{ hydra_dispatcher_redis_dsn }}' \
--mount type=tmpfs,tmpfs-size=512M,destination=/app/var/cache \
-e 'DISABLE_APP_AUTO_SELECT={{ hydra_dispatcher_disable_app_auto_select }}' \
-e 'PHP_FPM_MEMORY_LIMIT=128m' \
-e 'PHP_FPM_MAX_CHILDREN=128' \
-e 'PHP_FPM_START_SERVERS=42' \
-e 'PHP_FPM_MIN_SPARE_SERVERS=24' \
-e 'PHP_FPM_MAX_SPARE_SERVERS=64' \
-v /etc/hydra-dispatcher/www.conf.gotmpl:/etc/php81/php-fpm.d/www.conf.gotmpl \
-v /etc/hydra-dispatcher/conf.d:/app/config/hydra \
{% for item in hydra_dispatcher_mounts %}
-v {{ item.host }}:{{ item.container }} \
{% endfor %}

View File

@ -4,7 +4,7 @@ PODMAN_ARGS="\
--replace \
--network=slirp4netns:allow_host_loopback=true \
--tz=local \
-p 127.0.0.1:3004:80 \
-p 127.0.0.1:3004:{{ hydra_oidc_internal_port | default(8080) }} \
-e APP_ENV=prod \
-e 'APP_DEBUG={{ hydra_oidc_debug }}' \
-e 'HYDRA_ADMIN_BASE_URL=http://10.0.2.2:3000' \

View File

@ -6,6 +6,7 @@ PODMAN_ARGS="\
--tz=local \
-v /etc/hydra-remote-user/conf.d:/var/www/config/remote_user \
-v /etc/hydra-remote-user/apache.conf:/etc/apache2/sites-available/000-default.conf \
-v /etc/hydra-remote-user/mpm_prefork.conf:/etc/apache2/mods-available/mpm_prefork.conf \
-v /etc/hosts:/etc/hosts:ro \
-e APP_ENV=prod \
-e 'APP_DEBUG={{ hydra_saml_debug }}' \
@ -14,4 +15,4 @@ PODMAN_ARGS="\
-e HYDRA_ADMIN_BASE_URL=http://10.0.2.2:3000 \
-e 'TRUSTED_PROXIES=127.0.0.1,10.0.2.0/24' \
-e 'LOGOUT_REDIRECT_URL_PATTERN={{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}/Shibboleth.sso/Logout?return=%s' \
"
"

View File

@ -18,7 +18,13 @@ PODMAN_ARGS="\
-e 'HYDRA_URL_POST_LOGOUT={{ hydra_url_post_logout }}' \
-e 'HYDRA_ALLOW_INSECURE=yes' \
-e 'HYDRA_LEVEL={{ hydra_log_level }}' \
-e 'TTL_REFRESH_TOKEN={{ hydra_ttl_refresh_token }}'\
{% if hydra_public_cors_allowed_origins | default([]) | length > 0 %}
-e 'SERVE_PUBLIC_CORS_ENABLED=true' \
-e 'SERVE_PUBLIC_CORS_ALLOWED_ORIGINS={{ hydra_public_cors_allowed_origins | join(',') }}' \
{% endif %}
-e 'HYDRA_SECRETS_SYSTEM={{ lookup('ansible.builtin.password', '/dev/null length=32 seed=hydra_secrets_seed') }}' \
-e 'HYDRA_OIDC_SUBJECT_IDENTIFIERS_PAIRWISE_SALT={{ lookup('ansible.builtin.password', '/dev/null length=32 seed=hydra_secrets_seed') }}' \
-e 'HYDRA_BCRYPT_COST={{ hydra_bcrypt_cost }}' \
-v /etc/hydra/clients.d:/etc/hydra/clients.d \
"

View File

@ -4,7 +4,7 @@ PODMAN_ARGS="\
--network=slirp4netns:allow_host_loopback=true \
--replace --name 'cadoles-pod-shibboleth-sp-v3' \
--tz=local \
-e 'SP_ENTITY_ID=http://{{ ansible_fqdn }}{{ haproxy_hydra_saml_base_path }}' \
-e 'SP_ENTITY_ID={{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}' \
-e 'SP_LOG_LEVEL={{ hydra_saml_sp_log_level }}' \
-e 'IDP_ENTITY_ID={{ hydra_saml_idp_entity_id }}' \
-e 'IDP_METADATA_URL={{ hydra_saml_idp_metadata_url }}' \
@ -12,7 +12,7 @@ PODMAN_ARGS="\
-e 'APACHE_FORCE_HTTPS={{ "true" if haproxy_public_base_url.startswith('https') else "false" }}' \
-e 'SP_HANDLER_BASE_PATH={{ haproxy_hydra_saml_base_path }}' \
-e 'SP_SESSIONS_REDIRECT_LIMIT=host+allow' \
-e 'SP_SESSIONS_REDIRECT_ALLOW={{ hydra_saml_allowed_redirects | join(',') }}' \
-e 'SP_SESSIONS_REDIRECT_ALLOW={{ hydra_saml_allowed_redirects | join(' ') }}' \
-e 'SP_INCLUDE_DEFAULT_ATTRIBUTES_MAPPING={{ hydra_saml_include_sp_default_attributes_mapping }}' \
-e 'SP_INCLUDE_DEFAULT_ATTRIBUTES_POLICY={{ hydra_saml_include_sp_default_attributes_policy }}' \
-v '/etc/shibboleth/attribute-map.inc.xml:/etc/shibboleth/attribute-map.inc.xml' \

View File

@ -1,7 +1,7 @@
# {{ ansible_managed }}
global
log /dev/log local0
log /dev/log local1 notice
log /dev/log local0 err
log /dev/log local1 err
chroot /var/lib/haproxy
stats socket /run/haproxy/admin.sock mode 660 level admin expose-fd listeners
stats timeout 30s
@ -39,8 +39,9 @@ frontend http-in
mode http
maxconn 2000
{% if enable_hydra_dispatcher %}
acl login_dispatcher path_beg -i {{ haproxy_hydra_dispatcher_base_path }}
{% endif %}
{% if enable_hydra_passwordless %}
acl login_passwordless path_beg -i {{ haproxy_hydra_passwordless_base_path }}
{% endif %}
@ -57,7 +58,9 @@ frontend http-in
acl oidc_test path_beg -i {{ haproxy_oidc_test_base_path }}
{% endif %}
{% if enable_hydra_dispatcher %}
use_backend hydra_dispatcher if login_dispatcher
{% endif %}
{% if enable_hydra_passwordless %}
use_backend hydra_passwordless if login_passwordless
{% endif %}
@ -86,6 +89,7 @@ backend hydra
http-request set-path %[path,regsub(^{{ haproxy_hydra_base_path }},)]
server hydra 127.0.0.1:4444 check
{% if enable_hydra_dispatcher %}
# Backend Hydra Dispatcher
backend hydra_dispatcher
balance roundrobin
@ -94,6 +98,7 @@ backend hydra_dispatcher
http-request set-header X-Forwarded-Prefix {{ haproxy_hydra_dispatcher_base_path }}
server hydra-login-dispatcher 127.0.0.1:3000 check
{%- endif %}
{% if enable_hydra_passwordless %}
# Backend Hydra Passwordless
@ -141,4 +146,4 @@ backend oidc_test
http-request set-header X-Forwarded-Prefix {{ haproxy_oidc_test_base_path }}
server oidc-test 127.0.0.1:8080 check
{% endif %}
{% endif %}

View File

@ -9,6 +9,6 @@
"redirect_uris": {{ item.redirect_uris | default([]) | to_json }},
"response_types": {{ item.response_types | default(["code"]) | to_json }},
"logo_uri": {{ item.logo_uri | default("") | to_json }},
"scope": {{ item.scope | default("openid profile email roles") | to_json }},
"scope": {{ item.scope | default("openid profile email webhook") | to_json }},
"token_endpoint_auth_method": {{ item.token_endpoint_auth_method | default("client_secret_post") | to_json }}
}
}

View File

@ -4,60 +4,72 @@ hydra:
{% if enable_hydra_passwordless %}
- id: {{ hydra_passwordless_identity_provider_id | default("passwordless") }}
title:
fr: "{{ hydra_passwordless_app_title }}"
fr: "{{ hydra_passwordless_app_title.fr }}"
en: "{{ hydra_passwordless_app_title.en | default(hydra_passwordless_app_title.fr) }}"
description:
fr: "{{ hydra_passwordless_app_description }}"
fr: "{{ hydra_passwordless_app_description.fr }}"
en: "{{ hydra_passwordless_app_description.en | default(hydra_passwordless_app_description.fr) }}"
login_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_passwordless_base_path }}/login"
consent_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_passwordless_base_path }}/consent"
logout_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_passwordless_base_path }}/logout"
attributes_rewrite_rules: {{ hydra_passwordless_attributes_rewrite_rules | to_json }}
attributes_rewrite_configuration: {{ hydra_passwordless_attributes_rewrite_configuration | default({}) | to_json }}
icon_url: "{{ hydra_passwordless_app_icon_url }}"
{% endif %}
{% if enable_hydra_saml %}
- id: {{ hydra_saml_identity_provider_id | default("saml") }}
title:
fr: "{{ hydra_saml_app_title.fr }}"
en: "{{ hydra_saml_app_title.en | default("{{ hydra_saml_app_title.fr }}") }}"
en: "{{ hydra_saml_app_title.en | default(hydra_saml_app_title.fr) }}"
description:
fr: "{{ hydra_saml_app_description.fr }}"
en: "{{ hydra_saml_app_description.en | default("{{ hydra_saml_app_description.fr }}") }}"
en: "{{ hydra_saml_app_description.en | default(hydra_saml_app_description.fr) }}"
login_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}/login"
consent_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}/consent"
logout_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_saml_base_path }}/logout"
attributes_rewrite_rules: {{ hydra_saml_attributes_rewrite_rules | to_json }}
attributes_rewrite_configuration: {{ hydra_saml_attributes_rewrite_configuration | default({}) | to_json }}
icon_url: "{{ hydra_saml_app_icon_url }}"
options:
icon_url:
fr: "{{ hydra_saml_app_options.icon_url.fr }}"
en: "{{ hydra_saml_app_options.icon_url.en | default("{{ hydra_saml_app_options.icon_url.fr }}") }}"
en: "{{ hydra_saml_app_options.icon_url.en | default( hydra_saml_app_options.icon_url.fr) }}"
{% endif %}
{% if enable_hydra_oidc %}
- id: {{ hydra_oidc_identity_provider_id | default("oidc") }}
title:
fr: "{{ hydra_oidc_app_title.fr }}"
en: "{{ hydra_oidc_app_title.en | default("{{ hydra_oidc_app_title.fr }}") }}"
en: "{{ hydra_oidc_app_title.en | default(hydra_oidc_app_title.fr) }}"
description:
fr: "{{ hydra_oidc_app_description.fr }}"
en: "{{ hydra_oidc_app_description.en | default("{{ hydra_oidc_app_description.fr }}") }}"
en: "{{ hydra_oidc_app_description.en | default(hydra_oidc_app_description.fr) }}"
login_url: "{{ hydra_oidc_base_url }}{{ haproxy_hydra_oidc_base_path }}/login"
consent_url: "{{ hydra_oidc_base_url }}{{ haproxy_hydra_oidc_base_path }}/consent"
logout_url: "{{ hydra_oidc_base_url }}{{ haproxy_hydra_oidc_base_path }}/logout"
attributes_rewrite_rules: {{ hydra_oidc_attributes_rewrite_rules | to_json }}
attributes_rewrite_configuration: {{ hydra_oidc_attributes_rewrite_configuration | default({}) | to_json }}
icon_url: "{{ hydra_oidc_app_icon_url }}"
options:
icon_url:
fr: "{{ hydra_oidc_app_options.icon_url.fr }}"
en: "{{ hydra_oidc_app_options.icon_url.en | default("{{ hydra_oidc_app_options.icon_url.fr }}") }}"
en: "{{ hydra_oidc_app_options.icon_url.en | default(hydra_oidc_app_options.icon_url.fr) }}"
{% endif %}
{% if enable_hydra_ldap %}
- id: ldap
title:
fr: "{{ hydra_ldap_app_title }}"
fr: "{{ hydra_ldap_app_title.fr }}"
en: "{{ hydra_ldap_app_title.en | default(hydra_ldap_app_title.fr) }}"
description:
fr: "{{ hydra_ldap_app_description }}"
fr: "{{ hydra_ldap_app_description.fr }}"
en: "{{ hydra_ldap_app_description.en | default(hydra_ldap_app_description.fr) }}"
login_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_ldap_base_path }}/auth/login"
consent_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_ldap_base_path }}/auth/consent"
logout_url: "{{ haproxy_public_base_url }}{{ haproxy_hydra_ldap_base_path }}/auth/logout"
attributes_rewrite_rules: {{ hydra_ldap_attributes_rewrite_rules | to_json }}
attributes_rewrite_configuration: {{ hydra_ldap_attributes_rewrite_configuration | default({}) | to_json }}
icon_url: "{{ hydra_ldap_app_icon_url }}"
{% endif %}
webhook:
enabled: {{ hydra_dispatcher_webhook }}
api_url: {{ hydra_dispatcher_webhook_api_url }}
api_key: {{ hydra_dispatcher_webhook_api_key }}
api_method: POST
firewall:
additional_properties: true
rules: {{ hydra_dispatcher_webhook_rules | to_json }}