From 1d43c81cd17a92c4713ba25a3544e602319d56bf Mon Sep 17 00:00:00 2001
From: Maarten de Waard <maarten@greenhost.nl>
Date: Mon, 18 Mar 2019 16:34:46 +0100
Subject: [PATCH] add nextcloud_password to ansible so we are ready for
 helmfile!8

---
 ansible/group_vars/cluster/settings.yml.example | 3 +++
 ansible/roles/setup/tasks/main.yml              | 1 +
 2 files changed, 4 insertions(+)

diff --git a/ansible/group_vars/cluster/settings.yml.example b/ansible/group_vars/cluster/settings.yml.example
index 57a25f341..f2133a3e3 100644
--- a/ansible/group_vars/cluster/settings.yml.example
+++ b/ansible/group_vars/cluster/settings.yml.example
@@ -12,6 +12,9 @@ release_name: "test"
 # generated and stored in ./secrets/keycloak_admin_password. You can also choose
 # your own password and fill it in here instead.
 keycloak_password: "{{ lookup('password', './secrets/keycloak_admin_password') }}"
+# Nextcloud administrator password. Works the same as keycloak password, except
+# it is stored in `secrets/nextcloud_admin_password`.
+nextcloud_password: "{{ lookup('password', './secrets/nextcloud_admin_password') }}"
 # If this is "true" TLS certificates will be requested at the Let's Encrypt
 # staging server. If this is "false", you use Let's Encrypt's production server.
 # Note that LE's production server has stricter rate limits, so set this to
diff --git a/ansible/roles/setup/tasks/main.yml b/ansible/roles/setup/tasks/main.yml
index 8957cb7b8..57b1c70de 100644
--- a/ansible/roles/setup/tasks/main.yml
+++ b/ansible/roles/setup/tasks/main.yml
@@ -152,4 +152,5 @@
     - keycloak
   environment:
     - KEYCLOAK_PASSWORD: "{{ keycloak_password }}"
+    - NEXTCLOUD_PASSWORD: "{{ nextcloud_password }}"
   command: '/usr/local/bin/helmfile -b /snap/bin/helm -e oas -f /oas/source/repos/helmfiles/helmfile.d/ apply --suppress-secrets'
-- 
GitLab