Compare commits
17 commits
450666aca5
...
21d340de05
| Author | SHA1 | Date | |
|---|---|---|---|
| 21d340de05 | |||
| a63da2a29e | |||
| f1f8406c7e | |||
| fe31369f8c | |||
| 7f639e8191 | |||
| 5ed12c64d0 | |||
| b00a051b9d | |||
| 3d3a09025a | |||
| f8b9975ae4 | |||
| 8828436adf | |||
| d800d43c71 | |||
| 359622d17a | |||
| 0106e8801f | |||
| 438a41356a | |||
| 3f8afa12ef | |||
| f814496049 | |||
| 43327b47f3 |
18 changed files with 700 additions and 1 deletions
28
roles/authentik/README.md
Normal file
28
roles/authentik/README.md
Normal file
|
|
@ -0,0 +1,28 @@
|
||||||
|
# Authentik
|
||||||
|
|
||||||
|
Deploys Authentik identity provider with Docker Compose.
|
||||||
|
|
||||||
|
## Variables
|
||||||
|
|
||||||
|
See `defaults/main.yml` for all available variables.
|
||||||
|
|
||||||
|
## Blueprints
|
||||||
|
|
||||||
|
The role renders blueprints for:
|
||||||
|
- Local users (`authentik_local_users`)
|
||||||
|
- OIDC applications (`authentik_oidc_apps`)
|
||||||
|
- Proxy applications (`authentik_proxy_apps`)
|
||||||
|
- Proxy outposts (`authentik_proxy_outposts`)
|
||||||
|
- Entra ID sources (`authentik_entra_sources`)
|
||||||
|
- Login screen sources (`authentik_login_source_ids`)
|
||||||
|
|
||||||
|
Secrets are passed via `authentik_blueprint_env` using environment variable references.
|
||||||
|
|
||||||
|
## Removing resources
|
||||||
|
|
||||||
|
To remove resources from Authentik, move slugs to the removal lists:
|
||||||
|
- `authentik_removed_oidc_apps`
|
||||||
|
- `authentik_removed_proxy_apps`
|
||||||
|
- `authentik_removed_local_users`
|
||||||
|
|
||||||
|
After confirming deletion, remove the slug from the list.
|
||||||
130
roles/authentik/defaults/main.yml
Normal file
130
roles/authentik/defaults/main.yml
Normal file
|
|
@ -0,0 +1,130 @@
|
||||||
|
#SPDX-License-Identifier: MIT-0
|
||||||
|
---
|
||||||
|
# defaults file for authentik
|
||||||
|
|
||||||
|
# Base directory configuration (inherited from base role or defined here)
|
||||||
|
docker_compose_base_dir: /etc/docker/compose
|
||||||
|
docker_volume_base_dir: /srv/data
|
||||||
|
|
||||||
|
# Authentik-specific configuration
|
||||||
|
authentik_service_name: authentik
|
||||||
|
authentik_docker_compose_dir: "{{ docker_compose_base_dir }}/{{ authentik_service_name }}"
|
||||||
|
authentik_docker_volume_dir: "{{ docker_volume_base_dir }}/{{ authentik_service_name }}"
|
||||||
|
|
||||||
|
# Authentik service configuration
|
||||||
|
authentik_domain: "authentik.local.test"
|
||||||
|
authentik_image: "ghcr.io/goauthentik/server:2025.12.0"
|
||||||
|
authentik_port: 9000
|
||||||
|
authentik_secret_key: "changeme-generate-a-random-string"
|
||||||
|
|
||||||
|
# PostgreSQL configuration
|
||||||
|
authentik_postgres_image: "postgres:16-alpine"
|
||||||
|
authentik_postgres_db: authentik
|
||||||
|
authentik_postgres_user: authentik
|
||||||
|
authentik_postgres_password: "changeme"
|
||||||
|
|
||||||
|
# Traefik configuration
|
||||||
|
authentik_traefik_network: "proxy"
|
||||||
|
authentik_backend_network: "backend"
|
||||||
|
authentik_use_ssl: true
|
||||||
|
|
||||||
|
# Authentik environment settings
|
||||||
|
authentik_log_level: "info"
|
||||||
|
authentik_error_reporting_enabled: false
|
||||||
|
|
||||||
|
# Blueprints
|
||||||
|
authentik_proxy_apps: []
|
||||||
|
# - slug: whoami
|
||||||
|
# name: whoami
|
||||||
|
# internal_host: "http://whoami:80"
|
||||||
|
# external_host: "https://whoami.example.com"
|
||||||
|
# skip_path_regex: |
|
||||||
|
# ^/healthz$
|
||||||
|
# flows:
|
||||||
|
# authentication_slug: default-authentication-flow
|
||||||
|
# authorization_slug: default-provider-authorization-implicit-consent
|
||||||
|
# invalidation_slug: default-provider-invalidation-flow
|
||||||
|
|
||||||
|
authentik_proxy_outposts: []
|
||||||
|
# - name: "proxy-main"
|
||||||
|
# type: "proxy"
|
||||||
|
# service_connection: null
|
||||||
|
# providers:
|
||||||
|
# - whoami
|
||||||
|
# - nextcloud-proxy
|
||||||
|
# config:
|
||||||
|
# authentik_host: "https://authentik.local.test/"
|
||||||
|
# authentik_host_browser: "https://authentik.local.test/"
|
||||||
|
# log_level: "info"
|
||||||
|
|
||||||
|
authentik_oidc_apps: []
|
||||||
|
# - slug: grafana
|
||||||
|
# name: Grafana
|
||||||
|
# client_id_env: GRAFANA_OIDC_CLIENT_ID
|
||||||
|
# client_secret_env: GRAFANA_OIDC_CLIENT_SECRET
|
||||||
|
# redirect_uris:
|
||||||
|
# - url: "https://grafana.example.com/login/generic_oauth"
|
||||||
|
# matching_mode: strict
|
||||||
|
# signing_key_name: "authentik Self-signed Certificate"
|
||||||
|
# flows:
|
||||||
|
# authorization_slug: default-provider-authorization-implicit-consent
|
||||||
|
# invalidation_slug: default-provider-invalidation-flow
|
||||||
|
# scopes: [openid, email, profile, offline_access]
|
||||||
|
|
||||||
|
authentik_blueprint_env: []
|
||||||
|
# GRAFANA_OIDC_CLIENT_ID: "grafana"
|
||||||
|
# GRAFANA_OIDC_CLIENT_SECRET: "{{ vault_grafana_oidc_secret }}"
|
||||||
|
# ENTRA_TENANT_ID: "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
|
||||||
|
# ENTRA_CLIENT_ID: "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
|
||||||
|
# ENTRA_CLIENT_SECRET: "{{ vault_entra_client_secret }}"
|
||||||
|
|
||||||
|
# Oauth sources
|
||||||
|
authentik_entra_sources: []
|
||||||
|
# - slug: entra-id
|
||||||
|
# name: "Login with Entra"
|
||||||
|
# tenant_mode: single # single | common
|
||||||
|
# tenant_id_env: ENTRA_TENANT_ID
|
||||||
|
# client_id_env: ENTRA_CLIENT_ID
|
||||||
|
# client_secret_env: ENTRA_CLIENT_SECRET
|
||||||
|
# scopes:
|
||||||
|
# - openid
|
||||||
|
# - profile
|
||||||
|
# - email
|
||||||
|
# # add only if you really need group sync on login:
|
||||||
|
# # - https://graph.microsoft.com/GroupMember.Read.All
|
||||||
|
|
||||||
|
|
||||||
|
# Show OAuth sources on login screen (list of source slugs):
|
||||||
|
authentik_login_sources: []
|
||||||
|
# - slug: entra-id
|
||||||
|
authentik_identification_stage_name: default-authentication-identification
|
||||||
|
|
||||||
|
# Local login fields to show on login screen (username, email, upn)
|
||||||
|
# Set to empty list to hide local login form entirely
|
||||||
|
authentik_login_user_fields:
|
||||||
|
- username
|
||||||
|
- email
|
||||||
|
|
||||||
|
# Local users to provision
|
||||||
|
authentik_local_users: []
|
||||||
|
# - username: admin
|
||||||
|
# name: "Admin User"
|
||||||
|
# email: "admin@example.com"
|
||||||
|
# password_env: AUTHENTIK_ADMIN_PASSWORD # reference env var in authentik_blueprint_env
|
||||||
|
# is_active: true
|
||||||
|
# groups:
|
||||||
|
# - authentik Admins
|
||||||
|
# attributes:
|
||||||
|
# settings:
|
||||||
|
# locale: en
|
||||||
|
|
||||||
|
# Resources to remove from Authentik (cleanup)
|
||||||
|
# Add slugs/names here when removing from the lists above
|
||||||
|
authentik_removed_oidc_apps: []
|
||||||
|
# - grafana
|
||||||
|
|
||||||
|
authentik_removed_proxy_apps: []
|
||||||
|
# - whoami
|
||||||
|
|
||||||
|
authentik_removed_local_users: []
|
||||||
|
# - olduser
|
||||||
3
roles/authentik/handlers/main.yml
Normal file
3
roles/authentik/handlers/main.yml
Normal file
|
|
@ -0,0 +1,3 @@
|
||||||
|
#SPDX-License-Identifier: MIT-0
|
||||||
|
---
|
||||||
|
# handlers file for authentik
|
||||||
35
roles/authentik/meta/main.yml
Normal file
35
roles/authentik/meta/main.yml
Normal file
|
|
@ -0,0 +1,35 @@
|
||||||
|
#SPDX-License-Identifier: MIT-0
|
||||||
|
galaxy_info:
|
||||||
|
author: your name
|
||||||
|
description: your role description
|
||||||
|
company: your company (optional)
|
||||||
|
|
||||||
|
# If the issue tracker for your role is not on github, uncomment the
|
||||||
|
# next line and provide a value
|
||||||
|
# issue_tracker_url: http://example.com/issue/tracker
|
||||||
|
|
||||||
|
# Choose a valid license ID from https://spdx.org - some suggested licenses:
|
||||||
|
# - BSD-3-Clause (default)
|
||||||
|
# - MIT
|
||||||
|
# - GPL-2.0-or-later
|
||||||
|
# - GPL-3.0-only
|
||||||
|
# - Apache-2.0
|
||||||
|
# - CC-BY-4.0
|
||||||
|
license: license (GPL-2.0-or-later, MIT, etc)
|
||||||
|
|
||||||
|
min_ansible_version: 2.2
|
||||||
|
|
||||||
|
# If this a Container Enabled role, provide the minimum Ansible Container version.
|
||||||
|
# min_ansible_container_version:
|
||||||
|
|
||||||
|
galaxy_tags: []
|
||||||
|
# List tags for your role here, one per line. A tag is a keyword that describes
|
||||||
|
# and categorizes the role. Users find roles by searching for tags. Be sure to
|
||||||
|
# remove the '[]' above, if you add tags to this list.
|
||||||
|
#
|
||||||
|
# NOTE: A tag is limited to a single word comprised of alphanumeric characters.
|
||||||
|
# Maximum 20 tags per role.
|
||||||
|
|
||||||
|
dependencies: []
|
||||||
|
# List your role dependencies here, one per line. Be sure to remove the '[]' above,
|
||||||
|
# if you add dependencies to this list.
|
||||||
97
roles/authentik/tasks/blueprints.yml
Normal file
97
roles/authentik/tasks/blueprints.yml
Normal file
|
|
@ -0,0 +1,97 @@
|
||||||
|
#SPDX-License-Identifier: MIT-0
|
||||||
|
---
|
||||||
|
# Blueprint rendering tasks for authentik
|
||||||
|
|
||||||
|
- name: Find existing blueprint files
|
||||||
|
find:
|
||||||
|
paths: "{{ authentik_docker_volume_dir }}/blueprints"
|
||||||
|
patterns: "*.yaml"
|
||||||
|
register: existing_blueprints
|
||||||
|
|
||||||
|
- name: Build list of expected blueprint files
|
||||||
|
set_fact:
|
||||||
|
expected_blueprints: >-
|
||||||
|
{{
|
||||||
|
(authentik_oidc_apps | map(attribute='slug') | map('regex_replace', '^(.*)$', '50-oidc-\1.yaml') | list) +
|
||||||
|
(authentik_proxy_apps | map(attribute='slug') | map('regex_replace', '^(.*)$', '60-proxy-\1.yaml') | list) +
|
||||||
|
(authentik_proxy_outposts | map(attribute='name') | map('regex_replace', '^(.*)$', '70-outpost-\1.yaml') | list) +
|
||||||
|
(authentik_entra_sources | map(attribute='slug') | map('regex_replace', '^(.*)$', '40-source-entra-\1.yaml') | list) +
|
||||||
|
['45-login-sources.yaml'] +
|
||||||
|
((authentik_local_users | length > 0) | ternary(['10-local-users.yaml'], [])) +
|
||||||
|
(((authentik_removed_oidc_apps | length > 0) or (authentik_removed_proxy_apps | length > 0) or (authentik_removed_local_users | length > 0)) | ternary(['00-cleanup.yaml'], []))
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Remove stale blueprint files
|
||||||
|
file:
|
||||||
|
path: "{{ item.path }}"
|
||||||
|
state: absent
|
||||||
|
loop: "{{ existing_blueprints.files }}"
|
||||||
|
when: item.path | basename not in expected_blueprints
|
||||||
|
|
||||||
|
- name: Render OIDC blueprints
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: blueprints/blueprint-oidc-app.yaml.j2
|
||||||
|
dest: "{{ authentik_docker_volume_dir }}/blueprints/50-oidc-{{ item.slug }}.yaml"
|
||||||
|
mode: "0644"
|
||||||
|
loop: "{{ authentik_oidc_apps }}"
|
||||||
|
register: oidc_templates
|
||||||
|
|
||||||
|
- name: Render Proxy blueprints
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: blueprints/blueprint-proxy-app.yaml.j2
|
||||||
|
dest: "{{ authentik_docker_volume_dir }}/blueprints/60-proxy-{{ item.slug }}.yaml"
|
||||||
|
mode: "0644"
|
||||||
|
loop: "{{ authentik_proxy_apps }}"
|
||||||
|
register: proxy_templates
|
||||||
|
|
||||||
|
- name: Render outpost blueprints
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: blueprints/outpost-proxy.yaml.j2
|
||||||
|
dest: "{{ authentik_docker_volume_dir }}/blueprints/70-outpost-{{ item.name }}.yaml"
|
||||||
|
mode: "0644"
|
||||||
|
loop: "{{ authentik_proxy_outposts }}"
|
||||||
|
register: outpost_bp
|
||||||
|
|
||||||
|
- name: Render Entra source blueprints
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: blueprints/blueprint-source-entra.yaml.j2
|
||||||
|
dest: "{{ authentik_docker_volume_dir }}/blueprints/40-source-entra-{{ item.slug }}.yaml"
|
||||||
|
mode: "0644"
|
||||||
|
loop: "{{ authentik_entra_sources }}"
|
||||||
|
register: entra_bp
|
||||||
|
|
||||||
|
- name: Render login stage sources blueprint
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: blueprints/blueprint-login-sources.yaml.j2
|
||||||
|
dest: "{{ authentik_docker_volume_dir }}/blueprints/45-login-sources.yaml"
|
||||||
|
mode: "0644"
|
||||||
|
register: login_bp
|
||||||
|
|
||||||
|
- name: Render local users blueprint
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: blueprints/blueprint-local-users.yaml.j2
|
||||||
|
dest: "{{ authentik_docker_volume_dir }}/blueprints/10-local-users.yaml"
|
||||||
|
mode: "0644"
|
||||||
|
when: authentik_local_users | length > 0
|
||||||
|
register: local_users_bp
|
||||||
|
|
||||||
|
- name: Render cleanup blueprint
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: blueprints/blueprint-cleanup.yaml.j2
|
||||||
|
dest: "{{ authentik_docker_volume_dir }}/blueprints/00-cleanup.yaml"
|
||||||
|
mode: "0644"
|
||||||
|
when: (authentik_removed_oidc_apps | length > 0) or (authentik_removed_proxy_apps | length > 0) or (authentik_removed_local_users | length > 0)
|
||||||
|
register: cleanup_bp
|
||||||
|
|
||||||
|
- name: Set blueprints_changed fact
|
||||||
|
set_fact:
|
||||||
|
blueprints_changed: >-
|
||||||
|
{{
|
||||||
|
(oidc_templates is defined and (oidc_templates.results | selectattr('changed') | list | length > 0))
|
||||||
|
or (proxy_templates is defined and (proxy_templates.results | selectattr('changed') | list | length > 0))
|
||||||
|
or (outpost_bp is defined and (outpost_bp.results | selectattr('changed') | list | length > 0))
|
||||||
|
or (entra_bp is defined and (entra_bp.results | selectattr('changed') | list | length > 0))
|
||||||
|
or (login_bp is defined and login_bp.changed)
|
||||||
|
or (local_users_bp.changed | default(false))
|
||||||
|
or (cleanup_bp.changed | default(false))
|
||||||
|
}}
|
||||||
56
roles/authentik/tasks/main.yml
Normal file
56
roles/authentik/tasks/main.yml
Normal file
|
|
@ -0,0 +1,56 @@
|
||||||
|
#SPDX-License-Identifier: MIT-0
|
||||||
|
---
|
||||||
|
# tasks file for authentik
|
||||||
|
|
||||||
|
- name: Create docker compose directory
|
||||||
|
file:
|
||||||
|
path: "{{ authentik_docker_compose_dir }}"
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
|
- name: Create authentik data directory
|
||||||
|
file:
|
||||||
|
path: "{{ authentik_docker_volume_dir }}/data"
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
|
- name: Create authentik certs directory
|
||||||
|
file:
|
||||||
|
path: "{{ authentik_docker_volume_dir }}/certs"
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
|
- name: Create authentik templates directory
|
||||||
|
file:
|
||||||
|
path: "{{ authentik_docker_volume_dir }}/templates"
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
|
- name: Create postgres data directory
|
||||||
|
file:
|
||||||
|
path: "{{ authentik_docker_volume_dir }}/postgresql"
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
|
- name: Create blueprints directory
|
||||||
|
file:
|
||||||
|
path: "{{ authentik_docker_volume_dir }}/blueprints"
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
|
||||||
|
- name: Render blueprints
|
||||||
|
import_tasks: blueprints.yml
|
||||||
|
|
||||||
|
- name: Create docker-compose file for authentik
|
||||||
|
template:
|
||||||
|
src: docker-compose.yml.j2
|
||||||
|
dest: "{{ authentik_docker_compose_dir }}/docker-compose.yml"
|
||||||
|
mode: '0644'
|
||||||
|
|
||||||
|
- name: Start authentik containers
|
||||||
|
community.docker.docker_compose_v2:
|
||||||
|
project_src: "{{ authentik_docker_compose_dir }}"
|
||||||
|
state: present
|
||||||
|
recreate: "{{ blueprints_changed | ternary('always', 'auto') }}"
|
||||||
|
wait: true
|
||||||
|
wait_timeout: 300
|
||||||
|
|
@ -0,0 +1,38 @@
|
||||||
|
# yaml-language-server: $schema=https://goauthentik.io/blueprints/schema.json
|
||||||
|
version: 1
|
||||||
|
metadata:
|
||||||
|
name: "cleanup"
|
||||||
|
labels:
|
||||||
|
blueprints.goauthentik.io/instantiate: "true"
|
||||||
|
blueprints.goauthentik.io/description: "Remove stale resources"
|
||||||
|
|
||||||
|
entries:
|
||||||
|
{% for slug in authentik_removed_oidc_apps %}
|
||||||
|
# Remove OIDC app: {{ slug }}
|
||||||
|
- model: authentik_core.application
|
||||||
|
state: absent
|
||||||
|
identifiers:
|
||||||
|
slug: {{ slug }}
|
||||||
|
- model: authentik_providers_oauth2.oauth2provider
|
||||||
|
state: absent
|
||||||
|
identifiers:
|
||||||
|
name: {{ slug }}
|
||||||
|
{% endfor %}
|
||||||
|
{% for slug in authentik_removed_proxy_apps %}
|
||||||
|
# Remove proxy app: {{ slug }}
|
||||||
|
- model: authentik_core.application
|
||||||
|
state: absent
|
||||||
|
identifiers:
|
||||||
|
slug: {{ slug }}
|
||||||
|
- model: authentik_providers_proxy.proxyprovider
|
||||||
|
state: absent
|
||||||
|
identifiers:
|
||||||
|
name: {{ slug }}
|
||||||
|
{% endfor %}
|
||||||
|
{% for username in authentik_removed_local_users %}
|
||||||
|
# Remove user: {{ username }}
|
||||||
|
- model: authentik_core.user
|
||||||
|
state: absent
|
||||||
|
identifiers:
|
||||||
|
username: {{ username }}
|
||||||
|
{% endfor %}
|
||||||
|
|
@ -0,0 +1,34 @@
|
||||||
|
# yaml-language-server: $schema=https://goauthentik.io/blueprints/schema.json
|
||||||
|
version: 1
|
||||||
|
metadata:
|
||||||
|
name: "local-users"
|
||||||
|
labels:
|
||||||
|
blueprints.goauthentik.io/instantiate: "true"
|
||||||
|
blueprints.goauthentik.io/description: "Local user accounts"
|
||||||
|
|
||||||
|
entries:
|
||||||
|
{% for user in authentik_local_users %}
|
||||||
|
- model: authentik_core.user
|
||||||
|
id: user-{{ user.username }}
|
||||||
|
identifiers:
|
||||||
|
username: {{ user.username }}
|
||||||
|
attrs:
|
||||||
|
username: {{ user.username }}
|
||||||
|
name: "{{ user.name | default(user.username) }}"
|
||||||
|
email: "{{ user.email | default('') }}"
|
||||||
|
is_active: {{ user.is_active | default(true) | lower }}
|
||||||
|
{% if user.password_env is defined %}
|
||||||
|
password: !Env {{ user.password_env }}
|
||||||
|
{% endif %}
|
||||||
|
{% if user.groups is defined and user.groups | length > 0 %}
|
||||||
|
groups:
|
||||||
|
{% for group in user.groups %}
|
||||||
|
- !Find [authentik_core.group, [name, {{ group }}]]
|
||||||
|
{% endfor %}
|
||||||
|
{% endif %}
|
||||||
|
{% if user.attributes is defined %}
|
||||||
|
attributes:
|
||||||
|
{{ user.attributes | to_nice_yaml(indent=2) | indent(8, first=true) }}
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
{% endfor %}
|
||||||
|
|
@ -0,0 +1,23 @@
|
||||||
|
# yaml-language-server: $schema=https://goauthentik.io/blueprints/schema.json
|
||||||
|
version: 1
|
||||||
|
metadata:
|
||||||
|
name: "login-sources"
|
||||||
|
labels:
|
||||||
|
blueprints.goauthentik.io/instantiate: "true"
|
||||||
|
blueprints.goauthentik.io/description: "Set sources and user fields on the identification stage"
|
||||||
|
|
||||||
|
entries:
|
||||||
|
- model: authentik_stages_identification.identificationstage
|
||||||
|
identifiers:
|
||||||
|
name: "{{ authentik_identification_stage_name }}"
|
||||||
|
attrs:
|
||||||
|
# Local login fields (username, email, upn)
|
||||||
|
user_fields:
|
||||||
|
{% for field in authentik_login_user_fields %}
|
||||||
|
- {{ field }}
|
||||||
|
{% endfor %}
|
||||||
|
# OAuth/social login sources (use !Find to reference sources from other blueprints)
|
||||||
|
sources:
|
||||||
|
{% for src in authentik_login_sources %}
|
||||||
|
- !Find [authentik_sources_oauth.oauthsource, [slug, {{ src.slug }}]]
|
||||||
|
{% endfor %}
|
||||||
|
|
@ -0,0 +1,43 @@
|
||||||
|
# yaml-language-server: $schema=https://goauthentik.io/blueprints/schema.json
|
||||||
|
version: 1
|
||||||
|
metadata:
|
||||||
|
name: "oidc-{{ item.slug }}"
|
||||||
|
labels:
|
||||||
|
blueprints.goauthentik.io/instantiate: "true"
|
||||||
|
blueprints.goauthentik.io/description: "OIDC provider + application for {{ item.slug }}"
|
||||||
|
|
||||||
|
entries:
|
||||||
|
- model: authentik_providers_oauth2.oauth2provider
|
||||||
|
id: oidc-provider-{{ item.slug }}
|
||||||
|
identifiers:
|
||||||
|
name: {{ item.slug }}
|
||||||
|
attrs:
|
||||||
|
name: {{ item.slug }}
|
||||||
|
client_type: confidential
|
||||||
|
client_id: !Env {{ item.client_id_env }}
|
||||||
|
client_secret: !Env {{ item.client_secret_env }}
|
||||||
|
|
||||||
|
redirect_uris:
|
||||||
|
{% for ru in item.redirect_uris %}
|
||||||
|
- url: "{{ ru.url }}"
|
||||||
|
matching_mode: {{ ru.matching_mode | default('strict') }}
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
authorization_flow: !Find [authentik_flows.flow, [slug, {{ item.flows.authorization_slug | default('default-provider-authorization-implicit-consent') }}]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, {{ item.flows.invalidation_slug | default('default-provider-invalidation-flow') }}]]
|
||||||
|
|
||||||
|
property_mappings:
|
||||||
|
{% for s in (item.scopes | default(['openid','email','profile','offline_access'])) %}
|
||||||
|
- !Find [authentik_providers_oauth2.scopemapping, [scope_name, {{ s }}]]
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
signing_key: !Find [authentik_crypto.certificatekeypair, [name, {{ item.signing_key_name | default('authentik Self-signed Certificate') }}]]
|
||||||
|
|
||||||
|
- model: authentik_core.application
|
||||||
|
id: app-{{ item.slug }}
|
||||||
|
identifiers:
|
||||||
|
slug: {{ item.slug }}
|
||||||
|
attrs:
|
||||||
|
name: "{{ item.name | default(item.slug) }}"
|
||||||
|
slug: {{ item.slug }}
|
||||||
|
provider: !KeyOf oidc-provider-{{ item.slug }}
|
||||||
|
|
@ -0,0 +1,36 @@
|
||||||
|
# yaml-language-server: $schema=https://goauthentik.io/blueprints/schema.json
|
||||||
|
version: 1
|
||||||
|
metadata:
|
||||||
|
name: "proxy-{{ item.slug }}"
|
||||||
|
labels:
|
||||||
|
blueprints.goauthentik.io/instantiate: "true"
|
||||||
|
blueprints.goauthentik.io/description: "Proxy provider + application for {{ item.slug }}"
|
||||||
|
|
||||||
|
entries:
|
||||||
|
- model: authentik_providers_proxy.proxyprovider
|
||||||
|
id: proxy-provider-{{ item.slug }}
|
||||||
|
identifiers:
|
||||||
|
name: {{ item.slug }}
|
||||||
|
attrs:
|
||||||
|
name: {{ item.slug }}
|
||||||
|
|
||||||
|
authentication_flow: !Find [authentik_flows.flow, [slug, {{ item.flows.authentication_slug | default('default-authentication-flow') }}]]
|
||||||
|
authorization_flow: !Find [authentik_flows.flow, [slug, {{ item.flows.authorization_slug | default('default-provider-authorization-implicit-consent') }}]]
|
||||||
|
invalidation_flow: !Find [authentik_flows.flow, [slug, {{ item.flows.invalidation_slug | default('default-provider-invalidation-flow') }}]]
|
||||||
|
|
||||||
|
internal_host: "{{ item.internal_host }}"
|
||||||
|
external_host: "{{ item.external_host }}"
|
||||||
|
|
||||||
|
{% if item.skip_path_regex is defined and item.skip_path_regex|length > 0 %}
|
||||||
|
skip_path_regex: |
|
||||||
|
{{ item.skip_path_regex | indent(8, true) }}
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
- model: authentik_core.application
|
||||||
|
id: app-{{ item.slug }}
|
||||||
|
identifiers:
|
||||||
|
slug: {{ item.slug }}
|
||||||
|
attrs:
|
||||||
|
name: "{{ item.name | default(item.slug) }}"
|
||||||
|
slug: {{ item.slug }}
|
||||||
|
provider: !KeyOf proxy-provider-{{ item.slug }}
|
||||||
|
|
@ -0,0 +1,40 @@
|
||||||
|
# yaml-language-server: $schema=https://goauthentik.io/blueprints/schema.json
|
||||||
|
version: 1
|
||||||
|
metadata:
|
||||||
|
name: "source-entra-{{ item.slug }}"
|
||||||
|
labels:
|
||||||
|
blueprints.goauthentik.io/instantiate: "true"
|
||||||
|
blueprints.goauthentik.io/description: "Microsoft Entra ID OAuth source ({{ item.slug }})"
|
||||||
|
|
||||||
|
entries:
|
||||||
|
- model: authentik_sources_oauth.oauthsource
|
||||||
|
id: source-entra-{{ item.slug }}
|
||||||
|
identifiers:
|
||||||
|
slug: {{ item.slug }}
|
||||||
|
attrs:
|
||||||
|
name: "{{ item.name | default('Microsoft Entra ID') }}"
|
||||||
|
slug: {{ item.slug }}
|
||||||
|
|
||||||
|
# Authentik’s OAuth sources support vendor-specific types.
|
||||||
|
# Entra guide calls it “Entra ID OAuth Source”.
|
||||||
|
provider_type: entraid
|
||||||
|
|
||||||
|
consumer_key: !Env {{ item.client_id_env }}
|
||||||
|
consumer_secret: !Env {{ item.client_secret_env }}
|
||||||
|
|
||||||
|
scopes:
|
||||||
|
{% for s in (item.scopes | default(['openid','profile','email'])) %}
|
||||||
|
- {{ s }}
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
{% if (item.tenant_mode | default('single')) == 'single' %}
|
||||||
|
authorization_url: !Format ["https://login.microsoftonline.com/%s/oauth2/v2.0/authorize", !Env {{ item.tenant_id_env }}]
|
||||||
|
access_token_url: !Format ["https://login.microsoftonline.com/%s/oauth2/v2.0/token", !Env {{ item.tenant_id_env }}]
|
||||||
|
profile_url: "https://graph.microsoft.com/v1.0/me"
|
||||||
|
oidc_jwks_url: !Format ["https://login.microsoftonline.com/%s/discovery/v2.0/keys", !Env {{ item.tenant_id_env }}]
|
||||||
|
{% else %}
|
||||||
|
authorization_url: "https://login.microsoftonline.com/common/oauth2/v2.0/authorize"
|
||||||
|
access_token_url: "https://login.microsoftonline.com/common/oauth2/v2.0/token"
|
||||||
|
profile_url: "https://graph.microsoft.com/v1.0/me"
|
||||||
|
oidc_jwks_url: "https://login.microsoftonline.com/common/discovery/v2.0/keys"
|
||||||
|
{% endif %}
|
||||||
27
roles/authentik/templates/blueprints/outpost-proxy.yaml.j2
Normal file
27
roles/authentik/templates/blueprints/outpost-proxy.yaml.j2
Normal file
|
|
@ -0,0 +1,27 @@
|
||||||
|
# yaml-language-server: $schema=https://goauthentik.io/blueprints/schema.json
|
||||||
|
version: 1
|
||||||
|
metadata:
|
||||||
|
name: "outpost-{{ item.name }}"
|
||||||
|
labels:
|
||||||
|
blueprints.goauthentik.io/instantiate: "true"
|
||||||
|
|
||||||
|
entries:
|
||||||
|
- model: authentik_outposts.outpost
|
||||||
|
identifiers:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
attrs:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
type: {{ item.type | default('proxy') }}
|
||||||
|
service_connection: {{ item.service_connection | default('null') }}
|
||||||
|
|
||||||
|
providers:
|
||||||
|
{% for p in item.providers %}
|
||||||
|
- !Find [authentik_providers_proxy.proxyprovider, [name, {{ p }}]]
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
{% if item.config is defined %}
|
||||||
|
config:
|
||||||
|
{% for k, v in item.config.items() %}
|
||||||
|
{{ k }}: {{ v | tojson }}
|
||||||
|
{% endfor %}
|
||||||
|
{% endif %}
|
||||||
97
roles/authentik/templates/docker-compose.yml.j2
Normal file
97
roles/authentik/templates/docker-compose.yml.j2
Normal file
|
|
@ -0,0 +1,97 @@
|
||||||
|
services:
|
||||||
|
postgres:
|
||||||
|
image: {{ authentik_postgres_image }}
|
||||||
|
restart: unless-stopped
|
||||||
|
environment:
|
||||||
|
POSTGRES_DB: {{ authentik_postgres_db }}
|
||||||
|
POSTGRES_USER: {{ authentik_postgres_user }}
|
||||||
|
POSTGRES_PASSWORD: {{ authentik_postgres_password }}
|
||||||
|
volumes:
|
||||||
|
- {{ authentik_docker_volume_dir }}/postgresql:/var/lib/postgresql/data
|
||||||
|
networks:
|
||||||
|
- {{ authentik_backend_network }}
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD-SHELL", "pg_isready -d {{ authentik_postgres_db }} -U {{ authentik_postgres_user }}"]
|
||||||
|
start_period: 20s
|
||||||
|
interval: 30s
|
||||||
|
retries: 5
|
||||||
|
timeout: 5s
|
||||||
|
|
||||||
|
server:
|
||||||
|
image: {{ authentik_image }}
|
||||||
|
restart: unless-stopped
|
||||||
|
command: server
|
||||||
|
healthcheck:
|
||||||
|
test: ["CMD", "ak", "healthcheck"]
|
||||||
|
start_period: 30s
|
||||||
|
interval: 10s
|
||||||
|
retries: 5
|
||||||
|
timeout: 5s
|
||||||
|
environment:
|
||||||
|
AUTHENTIK_SECRET_KEY: {{ authentik_secret_key }}
|
||||||
|
AUTHENTIK_POSTGRESQL__HOST: postgres
|
||||||
|
AUTHENTIK_POSTGRESQL__NAME: {{ authentik_postgres_db }}
|
||||||
|
AUTHENTIK_POSTGRESQL__USER: {{ authentik_postgres_user }}
|
||||||
|
AUTHENTIK_POSTGRESQL__PASSWORD: {{ authentik_postgres_password }}
|
||||||
|
AUTHENTIK_LOG_LEVEL: {{ authentik_log_level }}
|
||||||
|
AUTHENTIK_ERROR_REPORTING__ENABLED: "{{ authentik_error_reporting_enabled | lower }}"
|
||||||
|
{% if authentik_blueprint_env|length > 0 %}
|
||||||
|
{% for k, v in authentik_blueprint_env.items() %}
|
||||||
|
{{ k }}: "{{ v }}"
|
||||||
|
{% endfor %}
|
||||||
|
{% endif %}
|
||||||
|
volumes:
|
||||||
|
- {{ authentik_docker_volume_dir }}/blueprints:/blueprints/custom
|
||||||
|
- {{ authentik_docker_volume_dir }}/data:/data
|
||||||
|
- {{ authentik_docker_volume_dir }}/templates:/templates
|
||||||
|
depends_on:
|
||||||
|
postgres:
|
||||||
|
condition: service_healthy
|
||||||
|
networks:
|
||||||
|
- {{ authentik_backend_network }}
|
||||||
|
- {{ authentik_traefik_network }}
|
||||||
|
labels:
|
||||||
|
- traefik.enable=true
|
||||||
|
- traefik.docker.network={{ authentik_traefik_network }}
|
||||||
|
- traefik.http.routers.{{ authentik_service_name }}.rule=Host(`{{ authentik_domain }}`)
|
||||||
|
{% if authentik_use_ssl %}
|
||||||
|
- traefik.http.routers.{{ authentik_service_name }}.entrypoints=websecure
|
||||||
|
- traefik.http.routers.{{ authentik_service_name }}.tls=true
|
||||||
|
{% else %}
|
||||||
|
- traefik.http.routers.{{ authentik_service_name }}.entrypoints=web
|
||||||
|
{% endif %}
|
||||||
|
- traefik.http.services.{{ authentik_service_name }}.loadbalancer.server.port={{ authentik_port }}
|
||||||
|
|
||||||
|
worker:
|
||||||
|
image: {{ authentik_image }}
|
||||||
|
restart: unless-stopped
|
||||||
|
command: worker
|
||||||
|
user: root
|
||||||
|
environment:
|
||||||
|
AUTHENTIK_SECRET_KEY: {{ authentik_secret_key }}
|
||||||
|
AUTHENTIK_POSTGRESQL__HOST: postgres
|
||||||
|
AUTHENTIK_POSTGRESQL__NAME: {{ authentik_postgres_db }}
|
||||||
|
AUTHENTIK_POSTGRESQL__USER: {{ authentik_postgres_user }}
|
||||||
|
AUTHENTIK_POSTGRESQL__PASSWORD: {{ authentik_postgres_password }}
|
||||||
|
AUTHENTIK_LOG_LEVEL: {{ authentik_log_level }}
|
||||||
|
AUTHENTIK_ERROR_REPORTING__ENABLED: "{{ authentik_error_reporting_enabled | lower }}"
|
||||||
|
{% if authentik_blueprint_env|length > 0 %}
|
||||||
|
{% for k, v in authentik_blueprint_env.items() %}
|
||||||
|
{{ k }}: "{{ v }}"
|
||||||
|
{% endfor %}
|
||||||
|
{% endif %}
|
||||||
|
volumes:
|
||||||
|
- {{ authentik_docker_volume_dir }}/data:/data
|
||||||
|
- {{ authentik_docker_volume_dir }}/certs:/certs
|
||||||
|
- {{ authentik_docker_volume_dir }}/templates:/templates
|
||||||
|
- {{ authentik_docker_volume_dir }}/blueprints:/blueprints/custom
|
||||||
|
depends_on:
|
||||||
|
postgres:
|
||||||
|
condition: service_healthy
|
||||||
|
networks:
|
||||||
|
- {{ authentik_backend_network }}
|
||||||
|
|
||||||
|
networks:
|
||||||
|
{{ authentik_backend_network }}:
|
||||||
|
{{ authentik_traefik_network }}:
|
||||||
|
external: true
|
||||||
3
roles/authentik/tests/inventory
Normal file
3
roles/authentik/tests/inventory
Normal file
|
|
@ -0,0 +1,3 @@
|
||||||
|
#SPDX-License-Identifier: MIT-0
|
||||||
|
localhost
|
||||||
|
|
||||||
6
roles/authentik/tests/test.yml
Normal file
6
roles/authentik/tests/test.yml
Normal file
|
|
@ -0,0 +1,6 @@
|
||||||
|
#SPDX-License-Identifier: MIT-0
|
||||||
|
---
|
||||||
|
- hosts: localhost
|
||||||
|
remote_user: root
|
||||||
|
roles:
|
||||||
|
- authentik
|
||||||
3
roles/authentik/vars/main.yml
Normal file
3
roles/authentik/vars/main.yml
Normal file
|
|
@ -0,0 +1,3 @@
|
||||||
|
#SPDX-License-Identifier: MIT-0
|
||||||
|
---
|
||||||
|
# vars file for authentik
|
||||||
|
|
@ -6,6 +6,7 @@
|
||||||
ansible.builtin.apt:
|
ansible.builtin.apt:
|
||||||
update_cache: true
|
update_cache: true
|
||||||
cache_valid_time: 3600
|
cache_valid_time: 3600
|
||||||
|
lock_timeout: 180
|
||||||
when: ansible_facts["os_family"] == "Debian"
|
when: ansible_facts["os_family"] == "Debian"
|
||||||
|
|
||||||
- name: Install required packages for Docker
|
- name: Install required packages for Docker
|
||||||
|
|
@ -20,7 +21,6 @@
|
||||||
state: present
|
state: present
|
||||||
when: ansible_facts["os_family"] == "Debian"
|
when: ansible_facts["os_family"] == "Debian"
|
||||||
|
|
||||||
|
|
||||||
- name: Install convenience packages
|
- name: Install convenience packages
|
||||||
ansible.builtin.apt:
|
ansible.builtin.apt:
|
||||||
name:
|
name:
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue