ansible-role-conductor-work.../templates/create_system_service.json.j2

124 lines
3.7 KiB
Plaintext
Raw Normal View History

{
"ownerApp" : "Orchestrator",
2021-06-04 09:50:14 +02:00
"name" : "create_system_service",
"createBy" : "Marco Lettere",
"description": "Create a confidential client for software procedures that need to be members of each VO and VRE",
"version" : 1,
"ownerEmail" : "marco.lettere@nubisware.com",
2021-06-04 09:45:44 +02:00
"inputParameters" : ["client_id"],
"tasks" : [
{
2021-06-04 09:36:27 +02:00
"name": "LAMBDA_TASK",
"taskReferenceName": "init",
"type": "LAMBDA",
"inputParameters": {
"keycloak": "{{ keycloak }}/{{ keycloak_realm }}",
"keycloak_admin" : "{{ keycloak_admin }}/{{ keycloak_realm }}",
"scriptExpression": "1 == 1"
}
2021-06-04 09:36:27 +02:00
},
{
"name" : "pyrest",
"taskReferenceName" : "authorize",
"type" : "SIMPLE",
"inputParameters" : {
"url" : "${init.input.keycloak}/protocol/openid-connect/token",
2021-06-04 09:36:27 +02:00
"method" : "POST",
"headers" : {
"Accept" : "application/json"
},
"body" : {
"client_id" : "orchestrator",
"client_secret" : "{{ keycloak_auth }}",
2021-06-04 09:36:27 +02:00
"grant_type" : "client_credentials"
}
}
},
2021-06-04 09:36:27 +02:00
{
"name" : "pyrest",
"taskReferenceName" : "create_client",
"type" : "SIMPLE",
"inputParameters" : {
"url" : "${init.input.keycloak_admin}/clients",
"body" : {
"clientId": "${workflow.input.client_id}",
"name": "${workflow.input.client_id}",
"description": "${workflow.input.client_id}",
"rootUrl": "",
"enabled": true,
"serviceAccountsEnabled": true,
"standardFlowEnabled": true,
"authorizationServicesEnabled": false,
"publicClient": false,
"fullScopeAllowed" : true,
"protocol": "openid-connect"
},
"method" : "POST",
"headers" : {
"Authorization" : "Bearer ${authorize.output.body.access_token}",
"Content-Type" : "application/json"
2021-06-04 12:01:50 +02:00
}
2021-06-04 09:36:27 +02:00
}
},
{
"name": "LAMBDA_TASK",
"taskReferenceName": "extract_client_id",
"type": "LAMBDA",
"inputParameters": {
"client_location" : "${create_client.output.headers.location}",
"scriptExpression": "var client_id = $.client_location.split('/').pop(); return {'client_id' : client_id}"
}
},
2021-06-04 10:12:14 +02:00
{
"name" : "pyrest",
"taskReferenceName" : "get_service_account_user",
"type" : "SIMPLE",
"inputParameters" : {
"url" : "${init.input.keycloak_admin}/clients/${extract_client_id.output.result.client_id}/service-account-user",
"method" : "GET",
"headers" : {
"Authorization" : "Bearer ${authorize.output.body.access_token}",
"Accept" : "application/json"
}
}
},
2021-06-04 09:36:27 +02:00
{
"name" : "pyrest",
"type" : "SIMPLE",
"taskReferenceName": "retrieve_infra_manager_role",
"inputParameters" : {
"url" : "${init.input.keycloak_admin}/roles/Infrastructure-Manager",
"method" :"GET",
2021-06-04 09:36:27 +02:00
"headers" : {
"Authorization" : "Bearer ${authorize.output.body.access_token}",
"Accept" : "application/json"
}
}
2021-06-04 09:36:27 +02:00
},
{
"name": "jq_1",
"taskReferenceName": "to_array",
"type": "JSON_JQ_TRANSFORM",
"inputParameters": {
"role": "${retrieve_infra_manager_role.output.body}",
"queryExpression" : ".role"
}
},
2021-06-04 09:36:27 +02:00
{
"name" : "pyrest",
"type" : "SIMPLE",
"taskReferenceName": "assign_infra_manager_role",
"inputParameters" : {
"url" : "${init.input.keycloak_admin}/users/${get_service_account_user.output.body.id}/role-mappings/${retrieve_infra_manager_role}",
"method" :"POST",
"headers" : {
"Authorization" : "Bearer ${authorize.output.body.access_token}",
"Content-Type" : "application/json",
"Accept":"application/json"
},
"body" : "${to_array.output.resultList}"
}
2021-06-04 09:36:27 +02:00
}
]
}