From 1d43c81cd17a92c4713ba25a3544e602319d56bf Mon Sep 17 00:00:00 2001 From: Maarten de Waard <maarten@greenhost.nl> Date: Mon, 18 Mar 2019 16:34:46 +0100 Subject: [PATCH] add nextcloud_password to ansible so we are ready for helmfile!8 --- ansible/group_vars/cluster/settings.yml.example | 3 +++ ansible/roles/setup/tasks/main.yml | 1 + 2 files changed, 4 insertions(+) diff --git a/ansible/group_vars/cluster/settings.yml.example b/ansible/group_vars/cluster/settings.yml.example index 57a25f341..f2133a3e3 100644 --- a/ansible/group_vars/cluster/settings.yml.example +++ b/ansible/group_vars/cluster/settings.yml.example @@ -12,6 +12,9 @@ release_name: "test" # generated and stored in ./secrets/keycloak_admin_password. You can also choose # your own password and fill it in here instead. keycloak_password: "{{ lookup('password', './secrets/keycloak_admin_password') }}" +# Nextcloud administrator password. Works the same as keycloak password, except +# it is stored in `secrets/nextcloud_admin_password`. +nextcloud_password: "{{ lookup('password', './secrets/nextcloud_admin_password') }}" # If this is "true" TLS certificates will be requested at the Let's Encrypt # staging server. If this is "false", you use Let's Encrypt's production server. # Note that LE's production server has stricter rate limits, so set this to diff --git a/ansible/roles/setup/tasks/main.yml b/ansible/roles/setup/tasks/main.yml index 8957cb7b8..57b1c70de 100644 --- a/ansible/roles/setup/tasks/main.yml +++ b/ansible/roles/setup/tasks/main.yml @@ -152,4 +152,5 @@ - keycloak environment: - KEYCLOAK_PASSWORD: "{{ keycloak_password }}" + - NEXTCLOUD_PASSWORD: "{{ nextcloud_password }}" command: '/usr/local/bin/helmfile -b /snap/bin/helm -e oas -f /oas/source/repos/helmfiles/helmfile.d/ apply --suppress-secrets' -- GitLab