103 lines
4 KiB
YAML
Executable file
103 lines
4 KiB
YAML
Executable file
---
|
|
|
|
- name: Record ma1sd variables locally on AWX
|
|
delegate_to: 127.0.0.1
|
|
lineinfile:
|
|
path: '{{ awx_cached_matrix_vars }}'
|
|
regexp: "^#? *{{ item.key | regex_escape() }}:"
|
|
line: "{{ item.key }}: {{ item.value }}"
|
|
insertafter: '# ma1sd Settings Start'
|
|
with_dict:
|
|
'matrix_ma1sd_enabled': '{{ matrix_ma1sd_enabled }}'
|
|
|
|
- name: Disable REST auth (matrix-corporal/ma1sd) if using internal auth
|
|
delegate_to: 127.0.0.1
|
|
lineinfile:
|
|
path: '{{ awx_cached_matrix_vars }}'
|
|
regexp: "^#? *{{ item.key | regex_escape() }}:"
|
|
line: "{{ item.key }}: {{ item.value }}"
|
|
insertafter: '# Synapse Extension Start'
|
|
with_dict:
|
|
'matrix_synapse_awx_password_provider_rest_auth_enabled': 'false'
|
|
when: awx_matrix_ma1sd_auth_store == 'Synapse Internal'
|
|
|
|
- name: Enable REST auth if using external LDAP/AD with ma1sd
|
|
delegate_to: 127.0.0.1
|
|
lineinfile:
|
|
path: '{{ awx_cached_matrix_vars }}'
|
|
regexp: "^#? *{{ item.key | regex_escape() }}:"
|
|
line: "{{ item.key }}: {{ item.value }}"
|
|
insertafter: '# Synapse Extension Start'
|
|
with_dict:
|
|
'matrix_synapse_awx_password_provider_rest_auth_enabled': 'true'
|
|
'matrix_synapse_awx_password_provider_rest_auth_endpoint': '"http://matrix-ma1sd:{{ matrix_ma1sd_container_port }}"'
|
|
when: awx_matrix_ma1sd_auth_store == 'LDAP/AD'
|
|
|
|
- name: Remove entire ma1sd configuration extension
|
|
delegate_to: 127.0.0.1
|
|
replace:
|
|
path: '{{ awx_cached_matrix_vars }}'
|
|
regexp: '^.*\n'
|
|
after: '# ma1sd Extension Start'
|
|
before: '# ma1sd Extension End'
|
|
|
|
- name: Replace conjoined ma1sd configuration extension limiters
|
|
delegate_to: 127.0.0.1
|
|
replace:
|
|
path: '{{ awx_cached_matrix_vars }}'
|
|
regexp: '^# ma1sd Extension Start# ma1sd Extension End'
|
|
replace: '# ma1sd Extension Start\n# ma1sd Extension End'
|
|
|
|
- name: Insert/Update ma1sd configuration extension variables
|
|
delegate_to: 127.0.0.1
|
|
blockinfile:
|
|
path: '{{ awx_cached_matrix_vars }}'
|
|
marker: "# {mark} ma1sd ANSIBLE MANAGED BLOCK"
|
|
insertafter: '# ma1sd Extension Start'
|
|
block: '{{ awx_matrix_ma1sd_configuration_extension_yaml }}'
|
|
|
|
- name: Record ma1sd Custom variables locally on AWX
|
|
delegate_to: 127.0.0.1
|
|
lineinfile:
|
|
path: '{{ awx_cached_matrix_vars }}'
|
|
regexp: "^#? *{{ item.key | regex_escape() }}:"
|
|
line: "{{ item.key }}: {{ item.value }}"
|
|
insertbefore: '# ma1sd Settings End'
|
|
with_dict:
|
|
'awx_matrix_ma1sd_auth_store': '{{ awx_matrix_ma1sd_auth_store }}'
|
|
'awx_matrix_ma1sd_configuration_extension_yaml': '{{ awx_matrix_ma1sd_configuration_extension_yaml.splitlines() | to_json }}'
|
|
no_log: true
|
|
|
|
- name: Save new 'Configure ma1sd' survey.json to the AWX tower, template
|
|
delegate_to: 127.0.0.1
|
|
template:
|
|
src: 'roles/matrix-awx/surveys/configure_ma1sd.json.j2'
|
|
dest: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/configure_ma1sd.json'
|
|
|
|
- name: Copy new 'Configure ma1sd' survey.json to target machine
|
|
copy:
|
|
src: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/configure_ma1sd.json'
|
|
dest: '/matrix/awx/configure_ma1sd.json'
|
|
mode: '0660'
|
|
|
|
- name: Recreate 'Configure ma1sd (Advanced)' job template
|
|
delegate_to: 127.0.0.1
|
|
awx.awx.tower_job_template:
|
|
name: "{{ matrix_domain }} - 1 - Configure ma1sd (Advanced)"
|
|
description: "Configure Jitsi conferencing settings."
|
|
extra_vars: "{{ lookup('file', '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/extra_vars.json') }}"
|
|
job_type: run
|
|
job_tags: "start,setup-ma1sd"
|
|
inventory: "{{ member_id }}"
|
|
project: "{{ member_id }} - Matrix Docker Ansible Deploy"
|
|
playbook: setup.yml
|
|
credential: "{{ member_id }} - AWX SSH Key"
|
|
survey_enabled: true
|
|
survey_spec: "{{ lookup('file', '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/configure_ma1sd.json') }}"
|
|
become_enabled: true
|
|
state: present
|
|
verbosity: 1
|
|
tower_host: "https://{{ awx_host }}"
|
|
tower_oauthtoken: "{{ awx_session_token.ansible_facts.tower_token.token }}"
|
|
validate_certs: true
|