update..
This commit is contained in:
parent
2339cdd6e8
commit
d22a65ad9a
@ -680,6 +680,12 @@ insert_ssh_keypair_backup_server: false
|
||||
|
||||
ssh_keypair_backup_server: []
|
||||
|
||||
|
||||
insert_keypair_backup_client: false
|
||||
|
||||
ssh_keypair_backup_client: []
|
||||
|
||||
|
||||
insert_root_ssh_keypair: false
|
||||
|
||||
root_ssh_keypair: []
|
||||
@ -692,6 +698,12 @@ sudo_users: []
|
||||
|
||||
extra_system_user: []
|
||||
|
||||
|
||||
entries_authorized_key: []
|
||||
#entries_authorized_key:
|
||||
# - user: root
|
||||
# - key: 'ssh-rsa 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 root@b.ns'
|
||||
|
||||
create_sftp_group: false
|
||||
|
||||
|
||||
@ -1176,6 +1188,126 @@ git_jitsi_meet_repositories:
|
||||
git_other_repositories: []
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/copy_files.yml
|
||||
# ---
|
||||
|
||||
copy_plain_files: []
|
||||
|
||||
copy_template_files: []
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/symlink_files.yml
|
||||
# ---
|
||||
|
||||
symlink_files: []
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml
|
||||
# ---
|
||||
|
||||
hostname:
|
||||
ipv4_address:
|
||||
ipv6_address:
|
||||
|
||||
# postfix_db_type
|
||||
#
|
||||
# possible values are 'PostgreSQL' and 'MySQL'
|
||||
postfix_db_type:
|
||||
postfix_db_name:
|
||||
postfix_db_user:
|
||||
postfix_db_host:
|
||||
postfix_db_pass:
|
||||
|
||||
# -
|
||||
# install_amavis.conf
|
||||
# -
|
||||
|
||||
# mp_receipt_number
|
||||
#
|
||||
# O.OPEN/IL/Warenform: 106015125438
|
||||
#
|
||||
mp_receipt_number:
|
||||
|
||||
# si_authorisation_signature
|
||||
#
|
||||
# O.OPEN/IL: b0b7e94d3fcc8f3b1f128edd5830392361868cf0174723a9924ac25bf8b1b588cb974b50234e1bc1d9839dfe0ca6e1627733d90daf1399347b1046d20c2e3a89
|
||||
#
|
||||
# Warenform: 76ed7ca6670dbee497e1a0397a7e178c4caa25888bc26d7327d1eab0195342a4cfa522dcf10382623d57dbc2a79bd37627b9a52def4d4bfe617d26e35405ce3b
|
||||
#
|
||||
si_authorisation_signature:
|
||||
|
||||
# -
|
||||
# install_postfixadmin.conf
|
||||
# -
|
||||
|
||||
website_name_postfixadmin:
|
||||
|
||||
#email_welcome_message: "\n
|
||||
#Hallo,\n
|
||||
#
|
||||
#Ihre/Deine neue E-Mail Adresse ist eingerichtet.\n
|
||||
#
|
||||
#O.OPEN\n
|
||||
#
|
||||
#--\n
|
||||
#O.OPEN | Phone: +49 30 / 290 484 91\n
|
||||
#Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n
|
||||
#D-10999 Berlin | E-MAIL: oo@oopen.de\n
|
||||
#"
|
||||
email_welcome_message:
|
||||
|
||||
# -
|
||||
# install_update_dovecot.conf
|
||||
# -
|
||||
|
||||
dovecot_from_address:
|
||||
dovecot_reply_to:
|
||||
webmailer_address:
|
||||
|
||||
#salutation: "O.OPEN\n
|
||||
#
|
||||
#--\n
|
||||
#O.OPEN | Phone: +49 30 / 290 484 91\n
|
||||
#Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n
|
||||
#D-10999 Berlin | http://oopen.de"
|
||||
salutation:
|
||||
|
||||
# -
|
||||
# install_upgrade_roundcube-webmail.conf
|
||||
# -
|
||||
|
||||
# First Webmailer
|
||||
webmail_site_name:
|
||||
autoreply_hostname:
|
||||
# possible values: 'pgsql' or 'mysql'
|
||||
roundcube_db_type:
|
||||
roundcube_db_name:
|
||||
roundcube_db_user:
|
||||
roundcube_db_host:
|
||||
roundcube_db_pass:
|
||||
|
||||
roundcube_product_name:
|
||||
roundcube_support_url:
|
||||
roundcube_skin_logo:
|
||||
|
||||
# 2 Webmailer
|
||||
webmaili_2_site_name:
|
||||
autoreply_2_hostname:
|
||||
# possible values: 'pgsql' or 'mysql'
|
||||
roundcube_2_db_type:
|
||||
roundcube_2_db_name:
|
||||
roundcube_2_db_user:
|
||||
roundcube_2_db_host:
|
||||
roundcube_2_db_pass:
|
||||
|
||||
roundcube_2_product_name:
|
||||
roundcube_2_support_url:
|
||||
roundcube_2_skin_logo:
|
||||
|
||||
|
||||
# ==============================
|
||||
|
||||
|
||||
|
@ -28,6 +28,8 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
insert_ssh_keypair_backup_server: false
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
@ -36,18 +38,15 @@ ssh_keypair_backup_server:
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
insert_keypair_backup_client: true
|
||||
ssh_keypair_backup_client:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
- name: chris
|
||||
|
@ -28,6 +28,8 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
insert_ssh_keypair_backup_server: false
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
@ -36,11 +38,9 @@ ssh_keypair_backup_server:
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
insert_keypair_backup_client: true
|
||||
ssh_keypair_backup_client:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
|
@ -28,6 +28,8 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
insert_ssh_keypair_backup_server: false
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
@ -36,11 +38,9 @@ ssh_keypair_backup_server:
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
insert_keypair_backup_client: true
|
||||
ssh_keypair_backup_client:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
|
@ -37,9 +37,8 @@ ssh_keypair_backup_server:
|
||||
pub_key_src: root/.ssh/id_rsa.devel-root.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
insert_keypair_backup_client: true
|
||||
ssh_keypair_backup_client:
|
||||
- name: backup
|
||||
priv_key_src: root/.ssh/id_ed25519.warenform-office
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
|
@ -29,6 +29,7 @@
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
insert_ssh_keypair_backup_server: false
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
@ -37,11 +38,9 @@ ssh_keypair_backup_server:
|
||||
pub_key_src: root/.ssh/id_rsa.backup.warenform.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
insert_keypair_backup_client: true
|
||||
ssh_keypair_backup_client:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.warenform-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.warenform-server.pub
|
||||
|
224
host_vars/95.217.204.247.yml
Normal file
224
host_vars/95.217.204.247.yml
Normal file
@ -0,0 +1,224 @@
|
||||
---
|
||||
|
||||
# ---
|
||||
# vars used by roles/ansible_dependencies
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/ansible_user
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/basic.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/sshd.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/apt.yml
|
||||
# ---
|
||||
|
||||
apt_install_compiler_pkgs: true
|
||||
|
||||
apt_install_postgresql_pkgs: true
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: id-rsa-dehydrated
|
||||
priv_key_src: root/.ssh/a.mx-id_rsa-dehydrated
|
||||
priv_key_dest: /root/.ssh/id_rsa-dehydrated
|
||||
pub_key_src: root/.ssh/a.mx-id_rsa-dehydrated.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa-dehydrated.pub
|
||||
- name: id-rsa-opendkim
|
||||
priv_key_src: root/.ssh/a.mx-id_rsa-opendkim
|
||||
priv_key_dest: /root/.ssh/id_rsa-opendkim
|
||||
pub_key_src: root/.ssh/a.mx-id_rsa-opendkim.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa-opendkim.pub
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users-systemfiles.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/webadmin-user.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/sudoers.yml
|
||||
# ---
|
||||
#
|
||||
# see: roles/common/tasks/vars
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/caching-nameserver.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/git.yml
|
||||
# ---
|
||||
#
|
||||
# see: roles/common/tasks/vars
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/copy_files.yml
|
||||
# ---
|
||||
|
||||
copy_plain_files:
|
||||
|
||||
- name: monitoring_check_cert_for_dovecot.conf
|
||||
src_path: a.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf
|
||||
dest_path: /root/bin/monitoring/conf/check_cert_for_dovecot.conf
|
||||
|
||||
- name: monitoring_check_webservice_load.conf
|
||||
src_path: a.mx/root/bin/monitoring/conf/check_webservice_load.conf
|
||||
dest_path: /root/bin/monitoring/conf/check_webservice_load.conf
|
||||
|
||||
- name: postfix_create_opendkim_key.conf
|
||||
src_path: a.mx/root/bin/postfix/conf/create_opendkim_key.conf
|
||||
dest_path: /root/bin/postfix/conf/create_opendkim_key.conf
|
||||
|
||||
- name: postfix_postfix_add_mailboxes.conf
|
||||
src_path: a.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf
|
||||
dest_path: /root/bin/postfix/conf/postfix_add_mailboxes.conf
|
||||
|
||||
- name: postfix_sent_userinfo_postfix.conf
|
||||
src_path: a.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf
|
||||
dest_path: /root/bin/postfix/conf/sent_userinfo_postfix.conf
|
||||
|
||||
- name: postfix_whitelist_mb_sigs.conf
|
||||
src_path: a.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf
|
||||
dest_path: /root/bin/postfix/conf/whitelist_mb_sigs.conf
|
||||
|
||||
|
||||
copy_template_files: []
|
||||
#
|
||||
# - name: mailsystem_install_amavis.conf
|
||||
# src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2
|
||||
# dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf
|
||||
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml
|
||||
# ---
|
||||
|
||||
hostname: a.mx.oopen.de
|
||||
ipv4_address: 95.217.204.247
|
||||
ipv6_address: 2a01:4f9:4a:47e5::247
|
||||
|
||||
admin_email: argus@oopen.de
|
||||
is_relay_host: false
|
||||
|
||||
# postfix_db_type
|
||||
#
|
||||
# possible values are 'PostgreSQL' and 'MySQL'
|
||||
postfix_db_type: PostgreSQL
|
||||
postfix_db_name: postfix
|
||||
postfix_db_user: postfix
|
||||
postfix_db_host: localhost
|
||||
postfix_db_pass: FKt4z55FxMZp
|
||||
|
||||
# install_amavis.conf
|
||||
#
|
||||
mp_receipt_number: 106015125438
|
||||
si_authorisation_signature: b0b7e94d3fcc8f3b1f128edd5830392361868cf0174723a9924ac25bf8b1b588cb974b50234e1bc1d9839dfe0ca6e1627733d90daf1399347b1046d20c2e3a89
|
||||
|
||||
# install_postfixadmin.conf
|
||||
#
|
||||
website_name_postfixadmin: adm.oopen.de
|
||||
|
||||
email_welcome_message: "\n
|
||||
Hallo,\n
|
||||
|
||||
Ihre/Deine neue E-Mail Adresse ist eingerichtet.\n
|
||||
|
||||
O.OPEN\n
|
||||
|
||||
--\n
|
||||
O.OPEN | Phone: +49 30 / 290 484 91\n
|
||||
Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n
|
||||
D-10999 Berlin | E-MAIL: oo@oopen.de\n
|
||||
"
|
||||
|
||||
# install_update_dovecot.conf
|
||||
#
|
||||
dovecot_from_address: "o.open <oo@oopen.de>"
|
||||
dovecot_reply_to: "oo@oopen.de"
|
||||
webmailer_address: "https://webmail.oopen.de"
|
||||
salutation: "O.OPEN\n
|
||||
|
||||
--\n
|
||||
O.OPEN | Phone: +49 30 / 290 484 91\n
|
||||
Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n
|
||||
D-10999 Berlin | http://oopen.de"
|
||||
|
||||
# install_upgrade_roundcube-webmail.conf
|
||||
#
|
||||
# Webmailer
|
||||
webmail_site_name: webmail.oopen.de
|
||||
autoreply_hostname: autoreply.oopen.de
|
||||
# possible values: 'pgsql' or 'mysql'
|
||||
roundcube_db_type: pgsql
|
||||
roundcube_db_name: roundcubemail
|
||||
roundcube_db_user: roundcube
|
||||
roundcube_db_host: localhost
|
||||
roundcube_db_pass: '3Dsz3j5R'
|
||||
|
||||
roundcube_product_name: O.OPEN - Webmailer
|
||||
roundcube_support_url: https://www.oopen.de
|
||||
roundcube_skin_logo: "images/oopen-logo.png"
|
||||
|
||||
# 2 Webmailer
|
||||
webmaili_2_site_name: webmail2.oopen.de
|
||||
autoreply_2_hostname: autoreply.oopen.de
|
||||
# possible values: 'pgsql' or 'mysql'
|
||||
roundcube_2_db_type: pgsql
|
||||
roundcube_2_db_name: roundcubemail2
|
||||
roundcube_2_db_user: roundcube
|
||||
roundcube_2_db_host: localhost
|
||||
roundcube_2_db_pass: '3Dsz3j5R'
|
||||
|
||||
roundcube_2_product_name: O.OPEN - Webmailer
|
||||
roundcube_2_support_url: https://www.oopen.de
|
||||
roundcube_2_skin_logo: "images/oopen-logo.png"
|
||||
|
||||
|
||||
template_files_mailsystem_script:
|
||||
|
||||
- name: mailsystem_install_amavis.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf
|
||||
|
||||
- name: mailsystem_install_postfixadmin.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_postfixadmin.conf
|
||||
|
||||
- name: mailsystem_install_update_dovecot.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_update_dovecot.conf
|
||||
|
||||
- name: mailsystem_install_upgrade_roundcube-webmail.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf
|
||||
|
||||
- name: mailsystem_install_upgrade_roundcube-webmail2.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf
|
228
host_vars/a.mx.oopen.de.yml
Normal file
228
host_vars/a.mx.oopen.de.yml
Normal file
@ -0,0 +1,228 @@
|
||||
---
|
||||
|
||||
# ---
|
||||
# vars used by roles/ansible_dependencies
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/ansible_user
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/basic.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/sshd.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/apt.yml
|
||||
# ---
|
||||
|
||||
apt_install_compiler_pkgs: true
|
||||
|
||||
apt_install_postgresql_pkgs: true
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: id-rsa-dehydrated
|
||||
priv_key_src: root/.ssh/a.mx-id_rsa-dehydrated
|
||||
priv_key_dest: /root/.ssh/id_rsa-dehydrated
|
||||
pub_key_src: root/.ssh/a.mx-id_rsa-dehydrated.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa-dehydrated.pub
|
||||
- name: id-rsa-opendkim
|
||||
priv_key_src: root/.ssh/a.mx-id_rsa-opendkim
|
||||
priv_key_dest: /root/.ssh/id_rsa-opendkim
|
||||
pub_key_src: root/.ssh/a.mx-id_rsa-opendkim.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa-opendkim.pub
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users-systemfiles.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/webadmin-user.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/sudoers.yml
|
||||
# ---
|
||||
#
|
||||
# see: roles/common/tasks/vars
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/caching-nameserver.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/git.yml
|
||||
# ---
|
||||
#
|
||||
# see: roles/common/tasks/vars
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/copy_files.yml
|
||||
# ---
|
||||
|
||||
copy_plain_files:
|
||||
|
||||
- name: monitoring_check_cert_for_dovecot.conf
|
||||
src_path: a.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf
|
||||
dest_path: /root/bin/monitoring/conf/check_cert_for_dovecot.conf
|
||||
|
||||
- name: monitoring_check_webservice_load.conf
|
||||
src_path: a.mx/root/bin/monitoring/conf/check_webservice_load.conf
|
||||
dest_path: /root/bin/monitoring/conf/check_webservice_load.conf
|
||||
|
||||
- name: mysql_mysql_credetials.conf
|
||||
src_path: a.mx/root/bin/mysql/conf/mysql_credetials.conf
|
||||
dest_path: /root/bin/mysql/conf/mysql_credetials.conf
|
||||
|
||||
- name: postfix_create_opendkim_key.conf
|
||||
src_path: a.mx/root/bin/postfix/conf/create_opendkim_key.conf
|
||||
dest_path: /root/bin/postfix/conf/create_opendkim_key.conf
|
||||
|
||||
- name: postfix_postfix_add_mailboxes.conf
|
||||
src_path: a.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf
|
||||
dest_path: /root/bin/postfix/conf/postfix_add_mailboxes.conf
|
||||
|
||||
- name: postfix_sent_userinfo_postfix.conf
|
||||
src_path: a.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf
|
||||
dest_path: /root/bin/postfix/conf/sent_userinfo_postfix.conf
|
||||
|
||||
- name: postfix_whitelist_mb_sigs.conf
|
||||
src_path: a.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf
|
||||
dest_path: /root/bin/postfix/conf/whitelist_mb_sigs.conf
|
||||
|
||||
|
||||
copy_template_files: []
|
||||
#
|
||||
# - name: mailsystem_install_amavis.conf
|
||||
# src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2
|
||||
# dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf
|
||||
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml
|
||||
# ---
|
||||
|
||||
hostname: a.mx.oopen.de
|
||||
ipv4_address: 83.223.86.91
|
||||
ipv6_address: 2a01:30:0:13:2f7:50ff:fed2:cef7
|
||||
|
||||
admin_email: argus@oopen.de
|
||||
is_relay_host: false
|
||||
|
||||
# postfix_db_type
|
||||
#
|
||||
# possible values are 'PostgreSQL' and 'MySQL'
|
||||
postfix_db_type: PostgreSQL
|
||||
postfix_db_name: postfix
|
||||
postfix_db_user: postfix
|
||||
postfix_db_host: localhost
|
||||
postfix_db_pass: FKt4z55FxMZp
|
||||
|
||||
# install_amavis.conf
|
||||
#
|
||||
mp_receipt_number: 106015125438
|
||||
si_authorisation_signature: b0b7e94d3fcc8f3b1f128edd5830392361868cf0174723a9924ac25bf8b1b588cb974b50234e1bc1d9839dfe0ca6e1627733d90daf1399347b1046d20c2e3a89
|
||||
|
||||
# install_postfixadmin.conf
|
||||
#
|
||||
website_name_postfixadmin: adm.oopen.de
|
||||
|
||||
email_welcome_message: "\n
|
||||
Hallo,\n
|
||||
|
||||
Ihre/Deine neue E-Mail Adresse ist eingerichtet.\n
|
||||
|
||||
O.OPEN\n
|
||||
|
||||
--\n
|
||||
O.OPEN | Phone: +49 30 / 290 484 91\n
|
||||
Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n
|
||||
D-10999 Berlin | E-MAIL: oo@oopen.de\n
|
||||
"
|
||||
|
||||
# install_update_dovecot.conf
|
||||
#
|
||||
dovecot_from_address: "o.open <oo@oopen.de>"
|
||||
dovecot_reply_to: "oo@oopen.de"
|
||||
webmailer_address: "https://webmail.oopen.de"
|
||||
salutation: "O.OPEN\n
|
||||
|
||||
--\n
|
||||
O.OPEN | Phone: +49 30 / 290 484 91\n
|
||||
Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n
|
||||
D-10999 Berlin | http://oopen.de"
|
||||
|
||||
# install_upgrade_roundcube-webmail.conf
|
||||
#
|
||||
# Webmailer
|
||||
webmail_site_name: webmail.oopen.de
|
||||
autoreply_hostname: autoreply.oopen.de
|
||||
# possible values: 'pgsql' or 'mysql'
|
||||
roundcube_db_type: pgsql
|
||||
roundcube_db_name: roundcubemail
|
||||
roundcube_db_user: roundcube
|
||||
roundcube_db_host: localhost
|
||||
roundcube_db_pass: '3Dsz3j5R'
|
||||
|
||||
roundcube_product_name: O.OPEN - Webmailer
|
||||
roundcube_support_url: https://www.oopen.de
|
||||
roundcube_skin_logo: "images/oopen-logo.png"
|
||||
|
||||
# 2 Webmailer
|
||||
webmaili_2_site_name: webmail2.oopen.de
|
||||
autoreply_2_hostname: autoreply.oopen.de
|
||||
# possible values: 'pgsql' or 'mysql'
|
||||
roundcube_2_db_type: pgsql
|
||||
roundcube_2_db_name: roundcubemail2
|
||||
roundcube_2_db_user: roundcube
|
||||
roundcube_2_db_host: localhost
|
||||
roundcube_2_db_pass: '3Dsz3j5R'
|
||||
|
||||
roundcube_2_product_name: O.OPEN - Webmailer
|
||||
roundcube_2_support_url: https://www.oopen.de
|
||||
roundcube_2_skin_logo: "images/oopen-logo.png"
|
||||
|
||||
|
||||
template_files_mailsystem_script:
|
||||
|
||||
- name: mailsystem_install_amavis.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf
|
||||
|
||||
- name: mailsystem_install_postfixadmin.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_postfixadmin.conf
|
||||
|
||||
- name: mailsystem_install_update_dovecot.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_update_dovecot.conf
|
||||
|
||||
- name: mailsystem_install_upgrade_roundcube-webmail.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf
|
||||
|
||||
- name: mailsystem_install_upgrade_roundcube-webmail2.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf
|
@ -9,34 +9,41 @@
|
||||
# vars used by roles/ansible_user
|
||||
# ---
|
||||
|
||||
entries_authorized_key:
|
||||
- user: root
|
||||
key: 'ssh-rsa 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 root@b.ns'
|
||||
|
||||
|
||||
extra_user:
|
||||
- name: manage-bind
|
||||
password: $6$8JdviMM8$WkGw8N8AV0W/KbOMLBlDt25NLZ0Mpyz6gcPwfRCZ.m5yZGIJyP3F8YaSd77b.Tj.TGBAYvwQ7TP655P1ry2li/
|
||||
shell: /bin/bash
|
||||
group_id: 1011
|
||||
user_id: 1011
|
||||
ssh_keys:
|
||||
- 'ssh-rsa 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 root@b.mx.oopen.de'
|
||||
- 'ssh-rsa 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 root@d.mx.oopen.de'
|
||||
- 'ssh-rsa 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 root@cloud'
|
||||
- 'ssh-rsa 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 root@a.mx-dehydrated'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC1U2pLN20C1IPh9oLfhAsFhFTaG6gFdruqeORDFdLN8ZGy8lxAeC+/42H5XO1dJU3XYvVU3L/NVwtk8NStVuYkkxn3MO148mJzZTwAdTENlUnH5u6Dn6Uzs6lqzygyfMAAVbj895KbmatsAYboElG5FbYla1QIbEwjVkWk9+bxZyLOZPPeuChMlaeOBbRxLubT5UMIQiZTNTiE1ZfgQxVANcge4MK+zYhhd7X59JuFX/5nB3P1EykWnPE6QN2jeC0Lor78uvll9fHs0xq0FfhJ9Ut5hUqq1nCtuB1ToGV1QcbgBhO0APK94wA9Bu3Oy9nqTXZ40PmObMikDKi8Pbltxo12xBnddCWo1XEkxAiR3DYVlvf7PCykBiQ8Nv3qoMSelpK9hE/tewA1wS5Ilshj1IfRU3dcY+YNG4fzPGU0EYhKzqWFzyobM9F8iYegmkgaGJ3ShXLudoecmoEEduwHqGztrn3Io5K1Z8P46kSTVgjENKVCbimCtZx+X9c6zotKSp9ftl4mAA0UziKml7d2KnVyD++YNgBr0qAcaBXG4KkPFZ6dG2h97APacqb5id4483YA51/Itu00/3WPawXxWphWNOOCUBC9jpFpjdtTopjX6DL8xZaR4o+ediP3vnKXuFmwBQ2l5pGYw3PjIvq7xyQRHepCW5nYGGkNHhW8eQ== root@a.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@c.mx'
|
||||
- 'ssh-rsa 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 root@mail.cadus.org-dehydrated'
|
||||
- 'ssh-rsa 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 root@test.mx'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCyWbdnjnN/xfy1F6kPbsRXp8zvJEh8uHfTZuZKyaRV/iRuhsvqRiDB+AhUAlIaPwgQ8itaI6t5hijD+sZf+2oXXbNy3hkOHTrCDKCoVAWfMRKPuA1m8RqS4ZXXgayaeCzVnPEq6UrC5z0wO/XBwAktT37RRSQ/Hq2zCHy36NQEQYrhF3+ytX7ayb10pJAMVGRctYmr5YnLEVMSIREbPxZTNc80H1zqNPVJwYZhl8Ox61U4MoNhJmJwbKWPRPZsJpbTh9W2EU37tdwRBVQP6yxhua3TR6C7JnNPVY0IK23BYlNtQEDY4PHcIuewkamEWpP0+jhEjtwy1TqjRPdU/y+2uQjC6FSOVMsSPxgd8mw4cSsfp+Ard7P+YOevUXD81+jFZ3Wz0PRXbWMWAm2OCe7n8jVvkXMz+KxSYtrsvKNw1WugJq1z//bJNMTK6ISWpqaXDevGYQRJJ8dPbMmbey40WpS5CA/l29P7fj/cOl59w3LZGshrMOm7lVz9qysVV0ylfE3OpfKCGitkpY0Asw4lSkuLHoNZnDo6I5/ulRuKi6gsLk27LO5LYS8Zm1VOis/qHk1Gg1+QY47C4RzdTUxlU1CGesPIiQ1uUX2Z4bD7ebTrrOuEFcmNs3Wu5nif21Qq0ELEWhWby6ChFrbFHPn+hWlDwNM0Nr11ftwg0+sqVw== root@luna'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC5IhVprsvVOcFPbZzD9xR0nCjZ/9qVG6RhLJ7QBSts81nRvLwnmvcMBHSf5Rfaigey7Ff5dLHfJnxRE0KDATn6n2yd/5mXpn2GAA8hDVfhdsmsb5U7bROjZNr8MmIUrP7c3msUGx1FtvzhwxtyvIWOFQpWx+W5biBa6hFjIxT1pkUJqe6fclp7xbGYKZiqZRBS4qKG5CpKnisuOYDsqYPND+OkU+PShoxGVzp1JywIVze7qeKv6GyYbRA9SP9Np+5Mit6B21Io4zOI81c2Rz6sPX7mwEAQEs7iCm2hzG8qJws45Lb4ERqDkVEVhGNUyHjHgGebS1sZx1mLExdurXlPm1l/EamkncDFDCutHXtLP7lsFFiym7fKUjSEgiiLmyu5Xm+mwZvesKa1FYNaeiFWfYZpCJrNzIk+ffs+mgg3kmL4Sd4Ooy7jXPX+WJe5Xyh1KLU/+Wj2TVrhN+LbmupYAti/Wgd3DA1v601svmG82aLmyJRtKC0rGMePH3kDbtqU72kYpzI8mXERe1TIQ00Z77kQBR/7BF/9y5/0YmYDcXt1wNCoSie+mzz3xYcEdLAc7T+DhYpd4M6VgWnuz/exzRzhQwoSdEKkEED8CpEoBrEWEiMdrlElGmlkVomLU7P9i9j1rshX/pAq0asnqeSoPdC3vNbU3keiJQnhIHECvw== chris@luna'
|
||||
- 'ssh-rsa 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 root@www.oopen.de'
|
||||
- 'ssh-rsa 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 root@www2.oopen.de'
|
||||
- 'ssh-rsa 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 root@www3.oopen.de'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQClupkurU+acJRtp2s9GgiC+rANqlup8SfhtulV0a/8z6nobjcpQWrfVq+MNjM7VghnlMAwMjz7tccFGyCmJoSS11RcnFtPmqnSNj0/TI8zyYOZUvZCczPBSeqs/IxawyYz91e3RlPWbpv71Nj+/EHUZApZkkdTkpYHduSJYWtKYA2l2Glzmjd2d2u/IFIkqXhvl1bT3RUMLZJqYdEwYAvlW2JB84EIWNf4ytcGcu6rakXCRP9o62BbRza3AfMgSfa45PLodPi5VpqDiTHSCIBll+VOuLqTgQCBYeANRPClMLbueVXXcMrmEwrDXeC0dpqTdgaF2Tz3xYsrAzTe6bcNJsGgGCQyTtDKpsAgoKb31agsyy68CoZto13Ea4WYsNVx0T3KaRlaDm98KqnUJXHJvXnLegqfXiURL5BpxXmAnFvZ0duHrtRkVpzeu5n5vz41RLnFHyLln2VE6a+IYdiLlPl2hC+7pswb+nBP9yNn6T4WQZNtHp4YssANuYKO+/gJaHpMJ1TqgL/Ip66erK+372M1T/6ibiU3+qHbwW7FbXVfn3Dz2abJGyNkoaZGpQIXtx0UxWYZHF8E35Z0ll9NQo1CnDvV3jA1aMnYVTv9DuSYxqLY34oHWXEFzMyStCRWup4Tfrp3pT61GRhb2h8kZi5dqQur9KrqWmA6HF9D+Q== root@lists.mx'
|
||||
- 'ssh-rsa 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 root@d.mx'
|
||||
- 'ssh-rsa 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 root@c.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@mail.cadus.org-opendkim'
|
||||
- 'ssh-rsa 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 root@b.mx.oopen.de'
|
||||
- 'ssh-rsa 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 root@b.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@www.oopen.de-opendkim'
|
||||
- 'ssh-rsa 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 root@c.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@c.mx-dehydrated'
|
||||
- 'ssh-rsa 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 root@c.mx'
|
||||
- 'ssh-rsa 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 root@d.mx-dehydrated'
|
||||
- 'ssh-rsa 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 root@d.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@e.mx-dehydrated'
|
||||
- 'ssh-rsa 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 root@e.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@mail.cadus.org-dehydrated'
|
||||
- 'ssh-rsa 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 root@mail.cadus.org-opendkim'
|
||||
- 'ssh-rsa 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 root@mail.faire-mobilitaet.de'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCv2rDahAeQBR9NcQkHG5VHbMNGlOzHJPbh5V34ogloAtW0VVO7xnes3Ak3Q/eM0tFbFMG4MRti1M3Un0GJzTV9H2bqN02TmUp5MnDVDcHNfG4L7hqLH2KtwniKeB41IKIeJUdhpKxdFFqM8Z78Xn5EASO5Fu33lQcH+RTbmoYikEr1WrSbQB3wcqtXS+lNveyFUlJD9XJ0MLzanBePQh9boc93CfOa3yFTb90grfB5QjnpL7167MpSH6Oq/DVh5NcnMzvoYjZf9gsMTHuOAUyUKGeUdg2K89gFjkBq2r3S3ouKpDQxPSRXHuNDBSeHJEHy8DP6rOd+0qZVOaPEv3Qi/BRPO9LWcc2aUg8ydI7w1oMd/STaK54PaUJJ7uXV3ZTQsxGyziwZlx+Gq0PNAMjKFdYXAcuGPnlYxDGhVcJJElEuu7DJQqpWfzofov2VEniQQ8Ekknpxd5MFYka0NP038lpIZyMzy13DFJ6KUchbTGfzkHcwKmFX+3vZFEBqq5rZWOuY303qe5gP7eKhsBV/iu47Ne1OtTS2N0QFPTElshk3CLbZKerQo+XLxo3Z15cRDxDsgkdAHtY1PiMjXeX8ZahwXC2vs1ZfBoN4kK2iIH1Gtor4QG+g7chjKa+kZDKqFd4y0EZzeR0IjYCyWt2mNd3hMbEjBtZp75drYmRlqQ== root@ga-st-mail-opendkim'
|
||||
- 'ssh-rsa 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 root@ga-st-mail-dehydrated'
|
||||
- 'ssh-rsa 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 root@www.oopen.de-ns'
|
||||
- 'ssh-rsa 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 root@lists.mx'
|
||||
- 'ssh-rsa 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 root@test.mx'
|
||||
- 'ssh-rsa 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 root@web-01-de-ns'
|
||||
- 'ssh-rsa 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 root@web-01-opendkim'
|
||||
- 'ssh-rsa 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 root@luna'
|
||||
- 'ssh-rsa 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 chris@luna'
|
||||
|
||||
|
||||
|
||||
# ---
|
||||
@ -86,7 +93,74 @@ extra_user:
|
||||
# vars used by scripts/install-update-firewall.yml
|
||||
# ---
|
||||
|
||||
git_firewall_repository: {}
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/copy_files.yml
|
||||
# ---
|
||||
|
||||
copy_plain_files:
|
||||
|
||||
- name: bind
|
||||
src_path: a.ns/root/bin/bind/conf/bind.conf
|
||||
dest_path: /root/bin/bind/conf/bind.conf
|
||||
|
||||
- name: bind_add_dkim_zone_slave
|
||||
src_path: a.ns/root/bin/bind/conf/bind_add_dkim_zone_slave.conf
|
||||
dest_path: /root/bin/bind/conf/bind_add_dkim_zone_slave.conf
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/symlink_files.yml
|
||||
# ---
|
||||
|
||||
symlink_files:
|
||||
- name: bind_get_domain_by_hostname
|
||||
src_path: /root/bin/bind/bind_get_domain_by_hostname.sh
|
||||
dest_path: /usr/local/bin/bind_get_domain_by_hostname.sh
|
||||
|
||||
- name: bind_get_zonefile_by_hostname
|
||||
src_path: /root/bin/bind/bind_get_zonefile_by_hostname.sh
|
||||
dest_path: /usr/local/bin/bind_get_zonefile_by_hostname.sh
|
||||
|
||||
- name: bind_rndc_sync_clean
|
||||
src_path: /root/bin/bind/bind_rndc_sync_clean.sh
|
||||
dest_path: /usr/local/bin/bind_rndc_sync_clean.sh
|
||||
|
||||
- name: /bind_set_new_serial
|
||||
src_path: /root/bin/bind/bind_set_new_serial.sh
|
||||
dest_path: /usr/local/bin/bind_set_new_serial.sh
|
||||
|
||||
- name: bind_set_renew_tlsa
|
||||
src_path: /root/bin/bind/bind_set_renew_tlsa.sh
|
||||
dest_path: /usr/local/bin/bind_set_renew_tlsa.sh
|
||||
|
||||
- name: bind_add_dkim_zone_master
|
||||
src_path: /root/bin/bind/bind_add_dkim_zone_master.sh
|
||||
dest_path: /usr/local/bin/bind_add_dkim_zone_master.sh
|
||||
|
||||
- name: bind_add_dkim_zone_slave
|
||||
src_path: /root/bin/bind/bind_add_dkim_zone_slave.sh
|
||||
dest_path: /usr/local/bin/bind_add_dkim_zone_slave.sh
|
||||
|
||||
- name: bind_reload_all_zones
|
||||
src_path: /root/bin/bind/bind_reload_all_zones.sh
|
||||
dest_path: /usr/local/bin/bind_reload_all_zones.sh
|
||||
|
||||
- name: bind_remove_domain_on_master
|
||||
src_path: /root/bin/bind/bind_remove_domain_on_master.sh
|
||||
dest_path: /usr/local/bin/bind_remove_domain_on_master.sh
|
||||
|
||||
- name: bind_remove_domain_on_slave
|
||||
src_path: /root/bin/bind/bind_remove_domain_on_slave.sh
|
||||
dest_path: /usr/local/bin/bind_remove_domain_on_slave.sh
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml
|
||||
# ---
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
# ==============================
|
||||
|
@ -16,29 +16,28 @@ extra_user:
|
||||
group_id: 1011
|
||||
user_id: 1011
|
||||
ssh_keys:
|
||||
- 'ssh-rsa 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 root@b.mx.oopen.de'
|
||||
- 'ssh-rsa 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 root@d.mx.oopen.de'
|
||||
- 'ssh-rsa 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 root@cloud'
|
||||
- 'ssh-rsa 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 root@a.mx-dehydrated'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC1U2pLN20C1IPh9oLfhAsFhFTaG6gFdruqeORDFdLN8ZGy8lxAeC+/42H5XO1dJU3XYvVU3L/NVwtk8NStVuYkkxn3MO148mJzZTwAdTENlUnH5u6Dn6Uzs6lqzygyfMAAVbj895KbmatsAYboElG5FbYla1QIbEwjVkWk9+bxZyLOZPPeuChMlaeOBbRxLubT5UMIQiZTNTiE1ZfgQxVANcge4MK+zYhhd7X59JuFX/5nB3P1EykWnPE6QN2jeC0Lor78uvll9fHs0xq0FfhJ9Ut5hUqq1nCtuB1ToGV1QcbgBhO0APK94wA9Bu3Oy9nqTXZ40PmObMikDKi8Pbltxo12xBnddCWo1XEkxAiR3DYVlvf7PCykBiQ8Nv3qoMSelpK9hE/tewA1wS5Ilshj1IfRU3dcY+YNG4fzPGU0EYhKzqWFzyobM9F8iYegmkgaGJ3ShXLudoecmoEEduwHqGztrn3Io5K1Z8P46kSTVgjENKVCbimCtZx+X9c6zotKSp9ftl4mAA0UziKml7d2KnVyD++YNgBr0qAcaBXG4KkPFZ6dG2h97APacqb5id4483YA51/Itu00/3WPawXxWphWNOOCUBC9jpFpjdtTopjX6DL8xZaR4o+ediP3vnKXuFmwBQ2l5pGYw3PjIvq7xyQRHepCW5nYGGkNHhW8eQ== root@a.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@c.mx'
|
||||
- 'ssh-rsa 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 root@mail.cadus.org-mail.cadus.org-dehydrated'
|
||||
- 'ssh-rsa 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 root@test.mx'
|
||||
- 'ssh-rsa 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 root@luna'
|
||||
- 'ssh-rsa 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 chris@luna'
|
||||
- 'ssh-rsa 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 root@www.oopen.de'
|
||||
- 'ssh-rsa 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 root@www2.oopen.de'
|
||||
- 'ssh-rsa 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 root@www3.oopen.de'
|
||||
- 'ssh-rsa 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 root@lists.mx'
|
||||
- 'ssh-rsa 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 root@d.mx'
|
||||
- 'ssh-rsa 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 root@c.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@mail.cadus.org-opendkim'
|
||||
- 'ssh-rsa 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 root@b.mx.oopen.de'
|
||||
- 'ssh-rsa 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 root@b.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@www.oopen.de-opendkim'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC2Sr4nKzKTslYcqGiORwbtlvz1ghQkIuWiOGYry2BXobexesDeSX8RacJqg8YPC7w3eNaNM0Nb1BZniiXn/Ga1KNgkVws9eo9LrvpSv7ntFNBjDqci6wQuiTkKW94FVaH7c5eaoyN7Ukid0P07nze42ghgJBhv7/u1ZJ3Pgl5Ie0R+0YDUbG5Ns0M2yfMi6KiOVx3Kvxd1Havrrrtpv30ZhqWo48OLT1KN5qajgjVsm/GVLp8AOE+E2xyROXAWfJhpq2sU7Eqc7oIR9ReN3QX0TDMNJGlrTKW5CRt0dQDuzPyLZpFSwygOKfG9pmewU+mo0XASUW50sZATUxzNrXp6tuc/4i7vMhtcQxrc5m9/KSkXS1M6dherxyaX4oH70K09400ma3RORAMnunnFgJsiRtk6UoSTRWY2WMC82mX2z8Bv8sr19d+90W1ztEAWCSvxEFy+qPIr8LKHv+EjDzDZsho5mOlMDrpGqPU+tMG/pn318apoWW7nORvTwqmeJBdF7TkX00S4SvPcOMv48FJIonSq2cctP6VNgwGQmp8h2+Lyp85hnOdHpXOZvgaXlHt6DlMcS8MrJthl6J171x4j4AVGpu6h9h9Y0yJY3L+v59d70WCkO1KlJ/7OC84HxPb68fAYNVqaydke/LEApEyUz9Zm7mFk+HyzXVyQG2EhGw== root@c.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@c.mx-dehydrated'
|
||||
- 'ssh-rsa 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 root@c.mx'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC31CHZ0pkdmcUVo64LeUfN/QbYyzGXihsAIYSmjRrsxhwwh30Ceu8VNukDKVrQfu7hO5sRIa8Vj/8Dr1FnLZznIva7dRqnCJ6WHFsTLFoDuBU53qxegE+fEDfoYEVJpRD6EzSAy/XJQUfkNYIPFM3f2igmTx2GjGtkg+jKGDu/UHEoa07RoqKM4eHvRI9bjOiAYr5j87Gkyzf05C6nTk3D8CXX/6MIG2tC0vyKaNgcFgP4VyMh1Fb8nVr5gHiDSavK71Y+9N3yGRy8QBS/a/ArsD3R3VH/tj1ReaABiXccJ+SrdzT89wE3tV8qZDKymbEm6mFz8z0pFXxisG3F19mU4vraZvK4df5E/SnY6qHpVrgDNXIUpXx0UDR2IVsvvFsxFzPfhDCK10e3Yk1/ctRkZZaY5x+4l4WibjH2BJxpYAxriGjP1xWicLUywba1PpJG6dTQSi2fuwKBxXw+Y/XGRA+2yXGYe687WB5pkh8y5WVVQZbCeTixIVlewHirMOqCdw+vFT7S+HOZdXA4UIM8nHAzufxQVssxbGZD3r813YcSbVymoXzte7uGQS24ofu2u1h1FLvnPDjCrKNdkr6ArhVvbDch3yPtzPG0dYX5h/fySjVZPOAPxwaVDkWyXSckeGnYxPIhY5H4yCX1vLR7XaiIfM7zLNYCkOjG3fEf7Q== root@d.mx-dehydrated'
|
||||
- 'ssh-rsa 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 root@d.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@e.mx-dehydrated'
|
||||
- 'ssh-rsa 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 root@e.mx-opendkim'
|
||||
- 'ssh-rsa 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 root@mail.cadus.org-dehydrated'
|
||||
- 'ssh-rsa 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 root@mail.cadus.org-opendkim'
|
||||
- 'ssh-rsa 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 root@mail.faire-mobilitaet.de'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCv2rDahAeQBR9NcQkHG5VHbMNGlOzHJPbh5V34ogloAtW0VVO7xnes3Ak3Q/eM0tFbFMG4MRti1M3Un0GJzTV9H2bqN02TmUp5MnDVDcHNfG4L7hqLH2KtwniKeB41IKIeJUdhpKxdFFqM8Z78Xn5EASO5Fu33lQcH+RTbmoYikEr1WrSbQB3wcqtXS+lNveyFUlJD9XJ0MLzanBePQh9boc93CfOa3yFTb90grfB5QjnpL7167MpSH6Oq/DVh5NcnMzvoYjZf9gsMTHuOAUyUKGeUdg2K89gFjkBq2r3S3ouKpDQxPSRXHuNDBSeHJEHy8DP6rOd+0qZVOaPEv3Qi/BRPO9LWcc2aUg8ydI7w1oMd/STaK54PaUJJ7uXV3ZTQsxGyziwZlx+Gq0PNAMjKFdYXAcuGPnlYxDGhVcJJElEuu7DJQqpWfzofov2VEniQQ8Ekknpxd5MFYka0NP038lpIZyMzy13DFJ6KUchbTGfzkHcwKmFX+3vZFEBqq5rZWOuY303qe5gP7eKhsBV/iu47Ne1OtTS2N0QFPTElshk3CLbZKerQo+XLxo3Z15cRDxDsgkdAHtY1PiMjXeX8ZahwXC2vs1ZfBoN4kK2iIH1Gtor4QG+g7chjKa+kZDKqFd4y0EZzeR0IjYCyWt2mNd3hMbEjBtZp75drYmRlqQ== root@ga-st-mail-opendkim'
|
||||
- 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDF7Sx0YJlLjjg3Sm8uiXJyBeKKmZFum3D8Mw2VQZrXJgYOrVB/SVDXO4N5I6NOT5bvxs8c5DLV/4J4ewGP5dGSYiepRnkrRSBUUS6ICwkYfyXremHJ31uREfODRBA4Vnsmpw0SlbQ2I9IpYwsaD3/IDZehDgaCKu4D0/LIprZh0/u+WX7kOGb8Tkm/PBu2SSbAzURaMXn/UtGsUyrickAmEK9qXZDsNYgcwOqZaPtkMZP3mAdix/gKaWV07oU49zxBrouD8gRWAs/yOLvxOe1JDcH2ZExXl81jJYlUffKarBHsWNNE79hUInnH9YTfxP1AEC+MyFXxqKwz3Lk1dQyUo1TFtJTYY+/IHsXT/6KhbOi6twhj7U7uZEqaIWyo6N+WVL9fFhgmbSoVIE6KrBM5VtOdr33A3a+XeNAQGjW6mqOcv3iNUDipTnDTKkEAWQWWnK5YRuaJw1eUCoii/FDp0hRTWIqn+RVCgkOGgEjMIRC8tiQouCXxwfukfcq9zD8S8UCyyQY0uWRHm3uM5GHTmvIJHBXfXBSX/B+PgesSZVwICCiS/6ZSWT+6D5ObBdKGkz12A797YyaMsN7RtJn6OBhPRrGfqQLCIM7lpxJHAoQmTSMiuQp/TjHLedjAm3FvxET2ZvqPWg9QtvSzIoz2JOdKysZHGgbBdC7q6Cssvw== root@ga-st-mail-dehydrated'
|
||||
- 'ssh-rsa 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 root@www.oopen.de-ns'
|
||||
- 'ssh-rsa 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 root@lists.mx'
|
||||
- 'ssh-rsa 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 root@test.mx'
|
||||
- 'ssh-rsa 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 root@web-01-de-ns'
|
||||
- 'ssh-rsa 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 root@web-01-opendkim'
|
||||
- 'ssh-rsa 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 root@luna'
|
||||
- 'ssh-rsa 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 chris@luna'
|
||||
|
||||
|
||||
# ---
|
||||
@ -89,6 +88,68 @@ extra_user:
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/config_files.yml
|
||||
# ---
|
||||
|
||||
copy_plain_files:
|
||||
|
||||
- name: bind_add_dkim_zone_slave
|
||||
src_path: b.ns/root/bin/bind/conf/bind_add_dkim_zone_master.conf
|
||||
dest_path: /root/bin/bind/conf/bind_add_dkim_zone_master.conf
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/symlink_files.yml
|
||||
# ---
|
||||
|
||||
symlink_files:
|
||||
- name: bind_get_domain_by_hostname
|
||||
src_path: /root/bin/bind/bind_get_domain_by_hostname.sh
|
||||
dest_path: /usr/local/bin/bind_get_domain_by_hostname.sh
|
||||
|
||||
- name: bind_get_zonefile_by_hostname
|
||||
src_path: /root/bin/bind/bind_get_zonefile_by_hostname.sh
|
||||
dest_path: /usr/local/bin/bind_get_zonefile_by_hostname.sh
|
||||
|
||||
- name: bind_rndc_sync_clean
|
||||
src_path: /root/bin/bind/bind_rndc_sync_clean.sh
|
||||
dest_path: /usr/local/bin/bind_rndc_sync_clean.sh
|
||||
|
||||
- name: /bind_set_new_serial
|
||||
src_path: /root/bin/bind/bind_set_new_serial.sh
|
||||
dest_path: /usr/local/bin/bind_set_new_serial.sh
|
||||
|
||||
- name: bind_set_renew_tlsa
|
||||
src_path: /root/bin/bind/bind_set_renew_tlsa.sh
|
||||
dest_path: /usr/local/bin/bind_set_renew_tlsa.sh
|
||||
|
||||
- name: bind_add_dkim_zone_master
|
||||
src_path: /root/bin/bind/bind_add_dkim_zone_master.sh
|
||||
dest_path: /usr/local/bin/bind_add_dkim_zone_master.sh
|
||||
|
||||
- name: bind_add_dkim_zone_slave
|
||||
src_path: /root/bin/bind/bind_add_dkim_zone_slave.sh
|
||||
dest_path: /usr/local/bin/bind_add_dkim_zone_slave.sh
|
||||
|
||||
- name: bind_reload_all_zones
|
||||
src_path: /root/bin/bind/bind_reload_all_zones.sh
|
||||
dest_path: /usr/local/bin/bind_reload_all_zones.sh
|
||||
|
||||
- name: bind_remove_domain_on_master
|
||||
src_path: /root/bin/bind/bind_remove_domain_on_master.sh
|
||||
dest_path: /usr/local/bin/bind_remove_domain_on_master.sh
|
||||
|
||||
- name: bind_remove_domain_on_slave
|
||||
src_path: /root/bin/bind/bind_remove_domain_on_slave.sh
|
||||
dest_path: /usr/local/bin/bind_remove_domain_on_slave.sh
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ==============================
|
||||
|
||||
|
||||
|
83
host_vars/c.mx.oopen.de.yml
Normal file
83
host_vars/c.mx.oopen.de.yml
Normal file
@ -0,0 +1,83 @@
|
||||
---
|
||||
|
||||
# ---
|
||||
# vars used by roles/ansible_dependencies
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/ansible_user
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/basic.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/sshd.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/apt.yml
|
||||
# ---
|
||||
|
||||
apt_install_compiler_pkgs: true
|
||||
|
||||
apt_install_postgresql_pkgs: true
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: id-rsa-dehydrated
|
||||
priv_key_src: root/.ssh/c.mx-id_rsa-dehydrated
|
||||
priv_key_dest: /root/.ssh/id_rsa-dehydrated
|
||||
pub_key_src: root/.ssh/c.mx-id_rsa-dehydrated.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa-dehydrated.pub
|
||||
- name: id-rsa-opendkim
|
||||
priv_key_src: root/.ssh/c.mx-id_rsa-opendkim
|
||||
priv_key_dest: /root/.ssh/id_rsa-opendkim
|
||||
pub_key_src: root/.ssh/c.mx-id_rsa-opendkim.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa-opendkim.pub
|
||||
- name: id-rsa
|
||||
priv_key_src: root/.ssh/c.mx-id_rsa
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/c.mx-id_rsa.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users-systemfiles.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/webadmin-user.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/sudoers.yml
|
||||
# ---
|
||||
#
|
||||
# see: roles/common/tasks/vars
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/caching-nameserver.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/git.yml
|
||||
# ---
|
||||
#
|
||||
# see: roles/common/tasks/vars
|
@ -29,26 +29,6 @@
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.devel-root
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.devel-root.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
priv_key_src: root/.ssh/id_ed25519.warenform-office
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.warenform-office.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: devel-root.wf.netz
|
||||
|
||||
|
||||
|
||||
extra_user:
|
||||
|
||||
- name: kaya
|
||||
|
206
host_vars/e.mx.oopen.de.yml
Normal file
206
host_vars/e.mx.oopen.de.yml
Normal file
@ -0,0 +1,206 @@
|
||||
---
|
||||
|
||||
# ---
|
||||
# vars used by roles/ansible_dependencies
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/ansible_user
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/basic.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/sshd.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/apt.yml
|
||||
# ---
|
||||
|
||||
apt_install_compiler_pkgs: true
|
||||
|
||||
apt_install_postgresql_pkgs: true
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: id-rsa-dehydrated
|
||||
priv_key_src: root/.ssh/e.mx-id_rsa-dehydrated
|
||||
priv_key_dest: /root/.ssh/id_rsa-dehydrated
|
||||
pub_key_src: root/.ssh/e.mx-id_rsa-dehydrated.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa-dehydrated.pub
|
||||
- name: id-rsa-opendkim
|
||||
priv_key_src: root/.ssh/e.mx-id_rsa-opendkim
|
||||
priv_key_dest: /root/.ssh/id_rsa-opendkim
|
||||
pub_key_src: root/.ssh/e.mx-id_rsa-opendkim.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa-opendkim.pub
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users-systemfiles.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/webadmin-user.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/sudoers.yml
|
||||
# ---
|
||||
#
|
||||
# see: roles/common/tasks/vars
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/caching-nameserver.yml
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/git.yml
|
||||
# ---
|
||||
#
|
||||
# see: roles/common/tasks/vars
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/copy_files.yml
|
||||
# ---
|
||||
|
||||
copy_plain_files:
|
||||
|
||||
- name: monitoring_check_cert_for_dovecot.conf
|
||||
src_path: e.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf
|
||||
dest_path: /root/bin/monitoring/conf/check_cert_for_dovecot.conf
|
||||
|
||||
- name: monitoring_check_webservice_load.conf
|
||||
src_path: e.mx/root/bin/monitoring/conf/check_webservice_load.conf
|
||||
dest_path: /root/bin/monitoring/conf/check_webservice_load.conf
|
||||
|
||||
- name: postfix_create_opendkim_key.conf
|
||||
src_path: e.mx/root/bin/postfix/conf/create_opendkim_key.conf
|
||||
dest_path: /root/bin/postfix/conf/create_opendkim_key.conf
|
||||
|
||||
- name: postfix_postfix_add_mailboxes.conf
|
||||
src_path: e.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf
|
||||
dest_path: /root/bin/postfix/conf/postfix_add_mailboxes.conf
|
||||
|
||||
- name: postfix_sent_userinfo_postfix.conf
|
||||
src_path: e.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf
|
||||
dest_path: /root/bin/postfix/conf/sent_userinfo_postfix.conf
|
||||
|
||||
- name: postfix_whitelist_mb_sigs.conf
|
||||
src_path: e.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf
|
||||
dest_path: /root/bin/postfix/conf/whitelist_mb_sigs.conf
|
||||
|
||||
|
||||
copy_template_files: []
|
||||
#
|
||||
# - name: mailsystem_install_amavis.conf
|
||||
# src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2
|
||||
# dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf
|
||||
|
||||
|
||||
|
||||
# ---
|
||||
# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml
|
||||
# ---
|
||||
|
||||
hostname: e.mx.oopen.de
|
||||
ipv4_address: 95.217.204.205
|
||||
ipv6_address: 2a01:4f9:4a:47e5::205
|
||||
|
||||
admin_email: argus@oopen.de
|
||||
is_relay_host: false
|
||||
|
||||
# postfix_db_type
|
||||
#
|
||||
# possible values are 'PostgreSQL' and 'MySQL'
|
||||
postfix_db_type: PostgreSQL
|
||||
postfix_db_name: postfix
|
||||
postfix_db_user: postfix
|
||||
postfix_db_host: localhost
|
||||
postfix_db_pass: W/w-musi9cr5Gg%U
|
||||
|
||||
# install_amavis.conf
|
||||
#
|
||||
mp_receipt_number: 106015125438
|
||||
si_authorisation_signature: b0b7e94d3fcc8f3b1f128edd5830392361868cf0174723a9924ac25bf8b1b588cb974b50234e1bc1d9839dfe0ca6e1627733d90daf1399347b1046d20c2e3a89
|
||||
|
||||
# install_postfixadmin.conf
|
||||
#
|
||||
website_name_postfixadmin: adm-e.oopen.de
|
||||
|
||||
email_welcome_message: "\n
|
||||
Hallo,\n
|
||||
|
||||
Ihre/Deine neue E-Mail Adresse ist eingerichtet.\n
|
||||
|
||||
O.OPEN\n
|
||||
|
||||
--\n
|
||||
O.OPEN | Phone: +49 30 / 290 484 91\n
|
||||
Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n
|
||||
D-10999 Berlin | E-MAIL: oo@oopen.de\n
|
||||
"
|
||||
|
||||
# install_update_dovecot.conf
|
||||
#
|
||||
dovecot_from_address: "o.open <oo@oopen.de>"
|
||||
dovecot_reply_to: "oo@oopen.de"
|
||||
webmailer_address: "https://webmail-e.oopen.de"
|
||||
salutation: "O.OPEN\n
|
||||
|
||||
--\n
|
||||
O.OPEN | Phone: +49 30 / 290 484 91\n
|
||||
Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n
|
||||
D-10999 Berlin | http://oopen.de"
|
||||
|
||||
# install_upgrade_roundcube-webmail.conf
|
||||
#
|
||||
# Webmailer
|
||||
webmail_site_name: webmail-e.oopen.de
|
||||
autoreply_hostname: autoreply.oopen.de
|
||||
# possible values: 'pgsql' or 'mysql'
|
||||
roundcube_db_type: pgsql
|
||||
roundcube_db_name: roundcubemail
|
||||
roundcube_db_user: roundcube
|
||||
roundcube_db_host: localhost
|
||||
roundcube_db_pass: 'mfeV-64e.VQRfR7x'
|
||||
|
||||
roundcube_product_name: O.OPEN - Webmailer
|
||||
roundcube_support_url: https://www.oopen.de
|
||||
roundcube_skin_logo: "images/oopen-logo.png"
|
||||
|
||||
|
||||
template_files_mailsystem_script:
|
||||
|
||||
- name: mailsystem_install_amavis.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf
|
||||
|
||||
- name: mailsystem_install_postfixadmin.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_postfixadmin.conf
|
||||
|
||||
- name: mailsystem_install_update_dovecot.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_update_dovecot.conf
|
||||
|
||||
- name: mailsystem_install_upgrade_roundcube-webmail.conf
|
||||
src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2
|
||||
dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf
|
@ -28,25 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -28,25 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -28,25 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -30,25 +30,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -30,25 +30,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -23,25 +23,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -28,25 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
|
||||
default_user:
|
||||
|
@ -28,26 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -28,26 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -28,26 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -28,26 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -28,26 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -28,25 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
|
||||
default_user:
|
||||
|
@ -28,25 +28,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -30,25 +30,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -123,25 +123,6 @@ network_interfaces:
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -33,25 +33,6 @@
|
||||
|
||||
create_sftp_group: true
|
||||
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -123,25 +123,6 @@ network_interfaces:
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -30,25 +30,6 @@
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -33,25 +33,6 @@
|
||||
|
||||
create_sftp_group: true
|
||||
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
@ -30,25 +30,6 @@ create_sftp_group: true
|
||||
# ---
|
||||
# vars used by roles/common/tasks/users.yml
|
||||
# ---
|
||||
ssh_keypair_backup_server:
|
||||
- name: backup
|
||||
backup_user: back
|
||||
priv_key_src: root/.ssh/id_rsa.backup.oopen.de
|
||||
priv_key_dest: /root/.ssh/id_rsa
|
||||
pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub
|
||||
pub_key_dest: /root/.ssh/id_rsa.pub
|
||||
|
||||
insert_root_ssh_keypair: true
|
||||
|
||||
root_ssh_keypair:
|
||||
- name: backup
|
||||
login: root
|
||||
priv_key_src: root/.ssh/id_ed25519.oopen-server
|
||||
priv_key_dest: /root/.ssh/id_ed25519
|
||||
pub_key_src: root/.ssh/id_ed25519.oopen-server.pub
|
||||
pub_key_dest: /root/.ssh/id_ed25519.pub
|
||||
target: backup.oopen.de
|
||||
|
||||
|
||||
default_user:
|
||||
|
||||
|
59
hosts
59
hosts
@ -1,7 +1,6 @@
|
||||
[dns_sinma]
|
||||
|
||||
dns1.warenform.de
|
||||
a.ns.oopen.de
|
||||
|
||||
|
||||
[extra_hosts]
|
||||
@ -85,9 +84,7 @@ o13-schleuder.oopen.de
|
||||
o13-web.oopen.de
|
||||
|
||||
o14.oopen.de
|
||||
b.ns.oopen.de
|
||||
95.217.204.204
|
||||
d.mx.oopen.de
|
||||
a.mx.oopen.de
|
||||
|
||||
o15.oopen.de
|
||||
b.mx.oopen.de
|
||||
@ -113,6 +110,7 @@ oolm-shop-dev.oopen.de
|
||||
oolm-web.oopen.de
|
||||
|
||||
o23.oopen.de
|
||||
a.ns.oopen.de
|
||||
cl-01.oopen.de
|
||||
cp-01.oopen.de
|
||||
meet.oopen.de
|
||||
@ -159,10 +157,13 @@ o33.oopen.de
|
||||
o34.oopen.de
|
||||
|
||||
o35.oopen.de
|
||||
b.ns.oopen.de
|
||||
cl-02.oopen.de
|
||||
e.mx.oopen.de
|
||||
etherpad.oopen.de
|
||||
web-02.oopen.de
|
||||
d.mx.oopen.de
|
||||
95.217.204.247
|
||||
|
||||
# Jitsi Meet - ReachOut
|
||||
o36.oopen.de
|
||||
@ -280,9 +281,6 @@ o13-web.oopen.de
|
||||
# - o14.oopen.de
|
||||
o14.oopen.de
|
||||
a.mx.oopen.de
|
||||
b.ns.oopen.de
|
||||
95.217.204.204
|
||||
d.mx.oopen.de
|
||||
|
||||
# - o15.oopen.de
|
||||
o15.oopen.de
|
||||
@ -313,6 +311,7 @@ oolm-web.oopen.de
|
||||
|
||||
# - o23.oopen.de
|
||||
o23.oopen.de
|
||||
a.ns.oopen.de
|
||||
cl-01.oopen.de
|
||||
cp-01.oopen.de
|
||||
meet.oopen.de
|
||||
@ -365,10 +364,13 @@ o34.oopen.de
|
||||
|
||||
# - o35.oopen.de
|
||||
o35.oopen.de
|
||||
b.ns.oopen.de
|
||||
cl-02.oopen.de
|
||||
e.mx.oopen.de
|
||||
etherpad.oopen.de
|
||||
web-02.oopen.de
|
||||
d.mx.oopen.de
|
||||
95.217.204.247
|
||||
|
||||
# Jitsi Meet - ReachOut
|
||||
o36.oopen.de
|
||||
@ -376,9 +378,6 @@ o36.oopen.de
|
||||
# Backup Faire Mobilitaet
|
||||
o37.oopen.de
|
||||
|
||||
# - Vserver von Sinma
|
||||
a.ns.oopen.de
|
||||
|
||||
# ---
|
||||
# O.OPEN office network
|
||||
# ---
|
||||
@ -436,7 +435,6 @@ o13-web.oopen.de
|
||||
|
||||
# o14.oopen.de
|
||||
a.mx.oopen.de
|
||||
d.mx.oopen.de
|
||||
|
||||
# o15.oopen.de
|
||||
web-01.oopen.de
|
||||
@ -479,6 +477,8 @@ cloud.akweb.de
|
||||
cl-02.oopen.de
|
||||
e.mx.oopen.de
|
||||
web-02.oopen.de
|
||||
d.mx.oopen.de
|
||||
95.217.204.247
|
||||
|
||||
# Backup Faire Mobilitaet
|
||||
o37.oopen.de
|
||||
@ -691,7 +691,6 @@ o13-schleuder.oopen.de
|
||||
|
||||
# o14.oopen.de
|
||||
a.mx.oopen.de
|
||||
d.mx.oopen.de
|
||||
|
||||
# o15.oopen.de
|
||||
b.mx.oopen.de
|
||||
@ -708,6 +707,8 @@ mail.faire-mobilitaet.de
|
||||
|
||||
# o35.oopen.de
|
||||
e.mx.oopen.de
|
||||
d.mx.oopen.de
|
||||
95.217.204.247
|
||||
|
||||
|
||||
# ---
|
||||
@ -728,9 +729,6 @@ lists.mx.warenform.de
|
||||
|
||||
[sympa_list_server]
|
||||
|
||||
# o14.oopen.de
|
||||
d.mx.oopen.de
|
||||
|
||||
# server24.warenform.de
|
||||
lists.mx.warenform.de
|
||||
|
||||
@ -757,6 +755,8 @@ mail.faire-mobilitaet.de
|
||||
|
||||
# o35.oopen.de
|
||||
e.mx.oopen.de
|
||||
d.mx.oopen.de
|
||||
95.217.204.247
|
||||
|
||||
# ---
|
||||
# O.OPEN office network
|
||||
@ -795,9 +795,6 @@ o13-board.oopen.de
|
||||
o13-mail.oopen.de
|
||||
o13-web.oopen.de
|
||||
|
||||
# o14.oopen.de
|
||||
d.mx.oopen.de
|
||||
|
||||
# o15.oopen.de
|
||||
piwik.oopen.de
|
||||
web-01.oopen.de
|
||||
@ -844,6 +841,7 @@ o32.oopen.de
|
||||
cl-02.oopen.de
|
||||
etherpad.oopen.de
|
||||
web-02.oopen.de
|
||||
d.mx.oopen.de
|
||||
|
||||
# Backup Faire Mobilitaet
|
||||
o37.oopen.de
|
||||
@ -927,7 +925,6 @@ cloud-giz.warenform.de
|
||||
# ---
|
||||
a.ns.oopen.de
|
||||
b.ns.oopen.de
|
||||
95.217.204.204
|
||||
|
||||
# ---
|
||||
# Warenform
|
||||
@ -950,8 +947,6 @@ o13-mail.oopen.de
|
||||
|
||||
# o14.oopen.de
|
||||
a.mx.oopen.de
|
||||
d.mx.oopen.de
|
||||
e.mx.oopen.de
|
||||
|
||||
# o15.oopen.de
|
||||
b.mx.oopen.de
|
||||
@ -969,7 +964,9 @@ mail.cadus.org
|
||||
mail.faire-mobilitaet.de
|
||||
|
||||
# o35.oopen.de
|
||||
d.mx.oopen.de
|
||||
e.mx.oopen.de
|
||||
95.217.204.247
|
||||
|
||||
# ---
|
||||
# O.OPEN office network
|
||||
@ -1134,9 +1131,6 @@ o13-web.oopen.de
|
||||
|
||||
# - o14.oopen.de
|
||||
a.mx.oopen.de
|
||||
b.ns.oopen.de
|
||||
95.217.204.204
|
||||
d.mx.oopen.de
|
||||
|
||||
# - o15.oopen.de
|
||||
b.mx.oopen.de
|
||||
@ -1161,6 +1155,7 @@ oolm-shop-dev.oopen.de
|
||||
oolm-web.oopen.de
|
||||
|
||||
# - o23.oopen.de
|
||||
a.ns.oopen.de
|
||||
cl-01.oopen.de
|
||||
cp-01.oopen.de
|
||||
meet.oopen.de
|
||||
@ -1202,9 +1197,6 @@ o31.oopen.de
|
||||
# etventure
|
||||
o32.oopen.de
|
||||
|
||||
# - Vserver von Sinma
|
||||
a.ns.oopen.de
|
||||
|
||||
# BigBlueButton - O.OPEN
|
||||
o33.oopen.de
|
||||
|
||||
@ -1216,6 +1208,9 @@ cl-02.oopen.de
|
||||
e.mx.oopen.de
|
||||
etherpad.oopen.de
|
||||
web-02.oopen.de
|
||||
b.ns.oopen.de
|
||||
d.mx.oopen.de
|
||||
95.217.204.247
|
||||
|
||||
# Jitsi Meet - ReachOut
|
||||
o36.oopen.de
|
||||
@ -1317,9 +1312,6 @@ o13-web.oopen.de
|
||||
# - o14.oopen.de
|
||||
o14.oopen.de
|
||||
a.mx.oopen.de
|
||||
b.ns.oopen.de
|
||||
95.217.204.204
|
||||
d.mx.oopen.de
|
||||
|
||||
# - o15.oopen.de
|
||||
o15.oopen.de
|
||||
@ -1352,6 +1344,7 @@ oolm-web.oopen.de
|
||||
|
||||
# - o23.oopen.de
|
||||
o23.oopen.de
|
||||
a.ns.oopen.de
|
||||
cl-01.oopen.de
|
||||
cp-01.oopen.de
|
||||
meet.oopen.de
|
||||
@ -1409,6 +1402,9 @@ cl-02.oopen.de
|
||||
e.mx.oopen.de
|
||||
etherpad.oopen.de
|
||||
web-02.oopen.de
|
||||
b.ns.oopen.de
|
||||
d.mx.oopen.de
|
||||
95.217.204.247
|
||||
|
||||
# Jitsi Meet - ReachOut
|
||||
o36.oopen.de
|
||||
@ -1416,9 +1412,6 @@ o36.oopen.de
|
||||
# Backup Faire Mobilitaet
|
||||
o37.oopen.de
|
||||
|
||||
# - Vserver von Sinma
|
||||
a.ns.oopen.de
|
||||
|
||||
|
||||
# ---
|
||||
# so36.NET
|
||||
|
@ -0,0 +1,133 @@
|
||||
#---------------------------------------
|
||||
#-----------------------------
|
||||
# Settings for script check_cert_for_dovecot.sh
|
||||
#-----------------------------
|
||||
#---------------------------------------
|
||||
|
||||
# - service_domain
|
||||
# -
|
||||
# - The main domain for which the certificate was issued
|
||||
# -
|
||||
# - Example:
|
||||
# - service_domain="a.mx.oopen.de"
|
||||
# - service_domain="mail.cadus.org"
|
||||
# - service_domain="mx.warenform.de"
|
||||
# -
|
||||
#service_domain=""
|
||||
service_domain="a.mx.oopen.de"
|
||||
|
||||
|
||||
# - service_name
|
||||
# -
|
||||
# - Name of service.
|
||||
# -
|
||||
# - Note: this var will also be used to determin systemd service file
|
||||
# - or sysVinit script.
|
||||
# -
|
||||
# - Example:
|
||||
# - service_name="Mumble"
|
||||
# - service_name="Prosody"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - service_name="Dovecot"
|
||||
# -
|
||||
#service_name=""
|
||||
|
||||
|
||||
# - check_string_ps
|
||||
# -
|
||||
# - String wich (clearly) identifies the service at the process list (ps)
|
||||
# -
|
||||
# - Example:
|
||||
# - check_string_ps="[[:digit:]]\ /usr/sbin/murmurd"
|
||||
# - check_string_ps=""
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - check_string_ps="[[:digit:]]\ /usr/local/dovecot-[[:digit:]]{1,2}\.[[:digit:]]{1,2}\.[[:digit:]]{1,2}(\.[[:digit:]]{1,2})?/sbin/dovecot"
|
||||
# -
|
||||
#check_string_ps=""
|
||||
|
||||
|
||||
# - service_user
|
||||
# -
|
||||
# - User under which the service is running.
|
||||
# -
|
||||
# - Example:
|
||||
# - service_user="mumble-server"
|
||||
# - service_user="prosody"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - service_user="prosody"
|
||||
# -
|
||||
#service_user=""
|
||||
|
||||
|
||||
# - service_group
|
||||
# -
|
||||
# - Group under which the service is running.
|
||||
# -
|
||||
# - Example:
|
||||
# - service_group="mumble-server"
|
||||
# - service_group="prosody"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - service_group="prosody"
|
||||
# -
|
||||
#service_group=""
|
||||
|
||||
|
||||
# - cert_installed
|
||||
# -
|
||||
# - Locataion of certificate read by service
|
||||
# -
|
||||
# - Example:
|
||||
# - cert_installed="/var/lib/mumble-server/fullchain.pem"
|
||||
# - cert_installed="/var/lib/dehydrated/certs/jabber.so36.net/fullchain.pem"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - /etc/dovecot/ssl/mailserver.crt
|
||||
# -
|
||||
#cert_installed=""
|
||||
|
||||
|
||||
# - key_installed
|
||||
# -
|
||||
# - Location of the key read by service
|
||||
# -
|
||||
# - Example:
|
||||
# - key_installed="/var/lib/mumble-server/privkey.pem"
|
||||
# - key_installed="/etc/prosody/certs/privkey_jabber.so36.pem"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - /etc/dovecot/ssl/mailserver.key
|
||||
# -
|
||||
#key_installed=""
|
||||
|
||||
|
||||
# - cert_newest
|
||||
# -
|
||||
# - Location of the newest certificate.
|
||||
# -
|
||||
# - Example:
|
||||
# - cert_newest="/var/lib/dehydrated/certs/il-mumble.oopen.de/fullchain.pem"
|
||||
# - cert_newest="/var/lib/dehydrated/certs/jabber.so36.net/fullchain.pem"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - /var/lib/dehydrated/certs/${service_domain}/fullchain.pem
|
||||
# -
|
||||
#cert_newest=""
|
||||
|
||||
|
||||
# - key_newest
|
||||
# -
|
||||
# - Location of the newest Key
|
||||
# -
|
||||
# - Example:
|
||||
# - key_newest="/var/lib/dehydrated/certs/il-mumble.oopen.de/privkey.pem"
|
||||
# - key_newest="/var/lib/dehydrated/certs/jabber.so36.net/privkey.pem"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - /var/lib/dehydrated/certs/${service_domain}/privkey.pem
|
||||
# -
|
||||
#key_newest=""
|
||||
|
@ -0,0 +1,145 @@
|
||||
#---------------------------------------
|
||||
#-----------------------------
|
||||
# Settings
|
||||
#-----------------------------
|
||||
#---------------------------------------
|
||||
|
||||
#LOGGING=true
|
||||
LOGGING=false
|
||||
|
||||
# - What to check
|
||||
# -
|
||||
check_load=true
|
||||
check_mysql=false
|
||||
check_apache=true
|
||||
check_php_fpm=true
|
||||
check_website=false
|
||||
|
||||
|
||||
# - Additional Settings for check_mysql
|
||||
# -
|
||||
# - MySQL / MariaDB credentials
|
||||
# -
|
||||
# - Giving password on command line is insecure an sind mysql 5.5
|
||||
# - you will get a warning doing so.
|
||||
# -
|
||||
# - Reading username/password fro file ist also possible, using MySQL/MariaDB
|
||||
# - commandline parameter '--defaults-file'.
|
||||
# -
|
||||
# - Since Mysql Version 5.6, you can read username/password from
|
||||
# - encrypted file.
|
||||
# -
|
||||
# - Create (encrypted) option file:
|
||||
# - $ mysql_config_editor set --login-path=local --socket=/tmp/mysql.sock --user=root --password
|
||||
# - $ Password:
|
||||
# -
|
||||
# - Use of option file:
|
||||
# - $ mysql --login-path=local ...
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
mysql_credential_args="--login-path=local"
|
||||
|
||||
|
||||
# - Additional Settings for check_php_fpm
|
||||
# -
|
||||
# - On Linux Vserver System set
|
||||
# - curl_check_host=localhost
|
||||
# -
|
||||
# - On LX-Container set
|
||||
# - curl_check_host=127.0.0.1
|
||||
# -
|
||||
curl_check_host=127.0.0.1
|
||||
|
||||
# - Which PHP versions should be supported by this script. If more than one,
|
||||
# - give a blank separated list
|
||||
# -
|
||||
# - Example:
|
||||
# - php_versions="5.4 5.6 7.0 7.1"
|
||||
# -
|
||||
php_versions="7.4"
|
||||
|
||||
# - If PHP-FPM's ping.path setting does not match ping-$php_major_version,
|
||||
# - set the value given in your ping.path setting here. Give ping_path also
|
||||
# - the concerning php_version in form
|
||||
# - <php-version>:<ping-path>
|
||||
# -
|
||||
# - Multiple settings are possible, give a blank separated list.
|
||||
# -
|
||||
# - Example:
|
||||
# -
|
||||
# - ping_path="5.4:ping-site36_net 5.6:ping-oopen_de"
|
||||
# -
|
||||
ping_path=""
|
||||
|
||||
|
||||
# - Additional Settings for check_website - checking (expected) website response
|
||||
# -
|
||||
# - example:
|
||||
# - is_working_url="https://www.outoflineshop.de/"
|
||||
# - check_string='ool-account-links'
|
||||
# - include_cleanup_function=true
|
||||
# - extra_alert_address="ilker@so36.net"
|
||||
# - cleanup_function='
|
||||
# - rm -rf /var/www/www.outoflineshop.de/htdocs/var/cache/*
|
||||
# - rm -rf /var/www/www.outoflineshop.de/htdocs/var/session/*
|
||||
# - /usr/local/bin/redis-cli flushall > /dev/null 2>&1
|
||||
# - if [[ "$?" = "0" ]]; then
|
||||
# - ok "I have cleaned up directory \"/var/www/www.outoflineshop.de/htdocs/var/cache/\""
|
||||
# - else
|
||||
# - error "Cleaning up directory \"/var/www/www.outoflineshop.de/htdocs/var/cache/\" failed!"
|
||||
# - fi
|
||||
# - /etc/init.d/redis_6379 restart
|
||||
# - if [[ "$?" = "0" ]]; then
|
||||
# - ok "I restarted the redis service"
|
||||
# - echo -e "\t[ Ok ]: I restarted the redis service" >> $LOCK_DIR/extra_msg.txt
|
||||
# - else
|
||||
# - error "Restarting the redis server failed!"
|
||||
# - echo -e "\t[ Error ]: Restarting the redis server failed!" >> $LOCK_DIR/extra_msg.txt
|
||||
# - fi
|
||||
# - '
|
||||
# -
|
||||
is_working_url=''
|
||||
|
||||
check_string=''
|
||||
|
||||
include_cleanup_function=true
|
||||
|
||||
# - An extra e-mail address, which will be informed, if the given check URL
|
||||
# - does not response as expected (check_string) AFTER script checking, restarting
|
||||
# - servervices (webserver, php-fpm) and cleaning up (cleanup_function) was done.
|
||||
# -
|
||||
extra_alert_address=''
|
||||
|
||||
# - php_version_of_working_url
|
||||
# -
|
||||
# - If given website (is_working_url) does not response as expected, this PHP FPM
|
||||
# - engines will be restarted.
|
||||
# -
|
||||
# - Type "None" if site does not support php
|
||||
# -
|
||||
# - If php_version_of_working_url is not set, PHP FPM processes of ALL versions (php_versions)
|
||||
# - will be restarted
|
||||
# -
|
||||
php_version_of_working_url=''
|
||||
|
||||
# - Notice:
|
||||
# - If single qoutes "'" not needed inside cleanup function, then use single quotes
|
||||
# - to enclose variable "cleanup_function". Then you don't have do masquerade any
|
||||
# - sign inside.
|
||||
# -
|
||||
# - Otherwise use double quotes and masq any sign to prevent bash from interpreting.
|
||||
# -
|
||||
cleanup_function='
|
||||
'
|
||||
|
||||
|
||||
# - E-Mail settings for sending script messages
|
||||
# -
|
||||
from_address="root@`hostname -f`"
|
||||
content_type='Content-Type: text/plain;\n charset="utf-8"'
|
||||
to_addresses="root"
|
||||
|
@ -0,0 +1,170 @@
|
||||
# ---------------------------------------------------------
|
||||
# - Parameter Settings for script 'create_opendkim_key.sh'.
|
||||
# ---------------------------------------------------------
|
||||
|
||||
|
||||
# ----------
|
||||
# DNS Server
|
||||
# ----------
|
||||
|
||||
# - dns_dkim_zone_master_server
|
||||
# -
|
||||
# - The DNS Server who is serving the update zone and is used
|
||||
# - for the dynamic updates (nsupdate)
|
||||
# -
|
||||
dns_dkim_zone_master_server="b.ns.oopen.de"
|
||||
|
||||
# - update_dns
|
||||
# -
|
||||
# - Possible Values are 'true' or 'false'
|
||||
# -
|
||||
#update_dns=true
|
||||
|
||||
# - update_zone
|
||||
# -
|
||||
# - Zone containing the DKIM TXT record.
|
||||
# -
|
||||
# - Defaults to '_domainkey.<dkim_domaini>'
|
||||
# -
|
||||
# - Note:
|
||||
# - do NOT change/set this option unless you know what you do.
|
||||
# -
|
||||
#update_zone=""
|
||||
|
||||
# - TTL
|
||||
# -
|
||||
# - TTL for the DKIM TXT Record.
|
||||
# -
|
||||
# - Defaults to "" if update_dns=false
|
||||
# - Defaults to "43200" if update_dns=true
|
||||
# -
|
||||
#TTL=
|
||||
|
||||
|
||||
# ----------
|
||||
# TSIG Key
|
||||
# ----------
|
||||
|
||||
# - key_secret
|
||||
# -
|
||||
# - Sectret Key used by 'nsupdate' to create/update the
|
||||
# - DKIM TXT record.
|
||||
# -
|
||||
# - Example:
|
||||
# - key_secret="EtvvMdW0PXD4GMHP+onuHZ0dT/Z8OSJGlce/xH10OwI="
|
||||
# -
|
||||
key_secret="4woPu0jqf9Jp1IX+gduJ3BVW/1ZMeyCPTQMqEsMXLFw="
|
||||
|
||||
# - key_algo
|
||||
# -
|
||||
# - The key algorithm used for key creation. Available choices are: hmac-md5,
|
||||
# - hmac-sha1, hmac-sha224, hmac-sha256, hmac-sha384 and hmac-sha512. The
|
||||
# - default is hmac-sha256. Options are case-insensitive.
|
||||
# -
|
||||
# - Example:
|
||||
# - key_algo="hmac-md5"
|
||||
# -
|
||||
# - Defaults to 'hmac-sha256'
|
||||
# -
|
||||
key_algo="hmac-sha256"
|
||||
|
||||
# - key_name
|
||||
# -
|
||||
# - Name of the Key
|
||||
# -
|
||||
# - Defaults to "$update_zone"
|
||||
# -
|
||||
key_name="update-dkim"
|
||||
|
||||
|
||||
# ----------
|
||||
# Access Credentials DNS Server
|
||||
# ----------
|
||||
|
||||
# - dns_ssh_user
|
||||
# -
|
||||
# - Defaults to 'manage-bind'
|
||||
# -
|
||||
#dns_ssh_user="manage-bind"
|
||||
|
||||
# - dns_ssh_port
|
||||
# -
|
||||
# - Defaults to '22'
|
||||
# -
|
||||
#dns_ssh_port=22
|
||||
|
||||
# - dns_ssh_key
|
||||
# -
|
||||
# - Defaults to '/root/.ssh/id_rsa-opendkim'
|
||||
# -
|
||||
#dns_ssh_key="/root/.ssh/id_rsa-opendkim"
|
||||
|
||||
|
||||
# ----------
|
||||
# Scripts envoked at DNS Server
|
||||
# ----------
|
||||
|
||||
# - set_new_serial_script
|
||||
# -
|
||||
# - Script increases the serial for a given domain or a given
|
||||
# - hostname's concerning domain.
|
||||
# -
|
||||
# - Defaults to /root/bin/bind/bind_set_new_serial.sh
|
||||
# -
|
||||
#set_new_serial_script="/root/bin/bind/bind_set_new_serial.sh"
|
||||
|
||||
# - create_dkim_delegation_script
|
||||
# -
|
||||
# - Script adds DKIM subdomain delegation for a given domain
|
||||
# -
|
||||
# - Defaults to '/root/bin/bind/bind_create_dkim_delegation.sh'
|
||||
# -
|
||||
#create_dkim_delegation_script="/root/bin/bind/bind_create_dkim_delegation.sh"
|
||||
|
||||
# - add_dkim_zone_master_script
|
||||
# -
|
||||
# - Script adds zone _domainkey.<dkim domain> as master zone
|
||||
# -
|
||||
# - Defaults to '/root/bin/bind/bind_add_dkim_zone_master.sh'
|
||||
# -
|
||||
#add_dkim_zone_master_script="/root/bin/bind/bind_add_dkim_zone_master.sh"
|
||||
|
||||
# - add_dkim_zone_slave_script
|
||||
# -
|
||||
# - Script adds zone _domainkey.<dkim domain> as slave zone
|
||||
# -
|
||||
# - Defaults to '/root/bin/bind/bind_add_dkim_zone_slave.sh'
|
||||
# -
|
||||
#add_dkim_zone_slave_script="/root/bin/bind/bind_add_dkim_zone_slave.sh"
|
||||
|
||||
|
||||
|
||||
# ----------
|
||||
# OpenDKIM Installation
|
||||
# ----------
|
||||
|
||||
# - opendkim_dir
|
||||
# -
|
||||
# - OpenDKIM's etc-directory
|
||||
# -
|
||||
# - Defaults to opendkim_dir="/etc/opendkim"
|
||||
# -
|
||||
#opendkim_dir="/etc/opendkim"
|
||||
|
||||
# - key_base_dir
|
||||
# -
|
||||
# - Defaults to "${opendkim_dir}/keys"
|
||||
# -
|
||||
#key_base_dir=${opendkim_dir}/keys
|
||||
|
||||
# - signing_table_file
|
||||
# -
|
||||
# - Defaults to "${opendkim_dir}/signing.table"
|
||||
# -
|
||||
#signing_table_file="${opendkim_dir}/signing.table"
|
||||
|
||||
# - key_table_file
|
||||
# -
|
||||
# - Defaults to "${opendkim_dir}/key.table"
|
||||
# -
|
||||
#key_table_file="${opendkim_dir}/key.table"
|
@ -0,0 +1,84 @@
|
||||
# ----------------------------------------------------
|
||||
# ---
|
||||
# - Parameter Settings for script 'postfix_add_mailboxes.sh'.
|
||||
# ---
|
||||
# ----------------------------------------------------
|
||||
|
||||
# - dovecot_enc_method
|
||||
# -
|
||||
# - The (dovecot) password scheme which should be used to generate the hashed
|
||||
# - passwords of EXISTING users.
|
||||
# -
|
||||
# - Possible values are:
|
||||
# -
|
||||
# - See output of 'doveadm pw -l'
|
||||
# -
|
||||
# - DEFAULTS to: dovecot_enc_method="SHA512-CRYPT"
|
||||
# -
|
||||
#dovecot_enc_method="SHA512-CRYPT"
|
||||
|
||||
# - in_file
|
||||
# -
|
||||
# - The file from wich the script reads the e-mail-address/password
|
||||
# - kombination(s). Each line in this file must only contain
|
||||
# - <emal-address> <password>
|
||||
# -
|
||||
# - Defaults to: in_file="${conf_dir}/mailboxes_new.lst"
|
||||
# -
|
||||
#in_file="${conf_dir}/mailboxes_new.lst"
|
||||
|
||||
# - db_type
|
||||
# -
|
||||
# - Type of Postfix Database
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
# - Defaults to: db_type="pgsql"
|
||||
# -
|
||||
#db_type="pgsql"
|
||||
|
||||
# - db_name
|
||||
# -
|
||||
# - Database name for the postfix database
|
||||
# -
|
||||
# - Defaults to: db_name="postfix"
|
||||
# -
|
||||
#db_name="postfix"
|
||||
|
||||
# - db_name
|
||||
# -
|
||||
# - Database name for the postfix database
|
||||
# -
|
||||
# - Defaults to: db_name="postfix"
|
||||
# -
|
||||
#db_name="postfix"
|
||||
|
||||
# - mysql_credential_args (root access to MySQL Database)
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system
|
||||
# - '/usr/local/mysql/sys-maint.cnf' otherwise
|
||||
# -
|
||||
#mysql_credential_args=""
|
||||
|
||||
# - quota
|
||||
# -
|
||||
# - The quota setting for the new mailboxes.
|
||||
# -
|
||||
# - Defaults to: quota="536870912"
|
||||
# -
|
||||
#quota="536870912"
|
||||
quota=1073741824
|
||||
|
||||
# - log_file
|
||||
# -
|
||||
# - Where to write logging informations?
|
||||
# -
|
||||
# - Defaults to: log_file="${script_dir}/log/postfix_add_mailboxes.log"
|
||||
# -
|
||||
#log_file="${script_dir}/log/postfix_add_mailboxes.log"
|
@ -0,0 +1,92 @@
|
||||
# ----------------------------------------------------
|
||||
# ---
|
||||
# - Parameter Settings for script 'sent_userinfo_postfix.sh'.
|
||||
# ---
|
||||
# ----------------------------------------------------
|
||||
|
||||
# - message_body_file
|
||||
# -
|
||||
# - Full path to file containing the user info. This file must contain
|
||||
# - the message body WITHOUT e-mail headers. If file is placed in the
|
||||
# - 'files' directory use '${file_dir}/<file-name>'
|
||||
# -
|
||||
# - Defaults to '${file_dir}/sent_userinfo_postfix.message'
|
||||
# -
|
||||
#message_body_file="${file_dir}/sent_userinfo_postfix.email"
|
||||
|
||||
|
||||
# - email_from
|
||||
# -
|
||||
# - From Address of user info
|
||||
# -
|
||||
# - Example: 'oo@oopen.de'
|
||||
# -
|
||||
#email_from=""
|
||||
email_from="oo@oopen.de"
|
||||
|
||||
|
||||
# - email_from_org
|
||||
# -
|
||||
# - Example: email_from_org="O.OPEN"
|
||||
# -
|
||||
#email_from_org=""
|
||||
email_from_org="O.OPEN"
|
||||
|
||||
|
||||
# - db_type
|
||||
# -
|
||||
# - Type of Postfix Database
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
# - Defaults to: db_type="pgsql"
|
||||
# -
|
||||
#db_type="pgsql"
|
||||
|
||||
# - db_name
|
||||
# -
|
||||
# - Database name for the postfix database
|
||||
# -
|
||||
# - Defaults to: db_name="postfix"
|
||||
# -
|
||||
#db_name="postfix"
|
||||
|
||||
# - mysql_credential_args (root access to MySQL Database)
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system
|
||||
# - '/usr/local/mysql/sys-maint.cnf' otherwise
|
||||
# -
|
||||
#mysql_credential_args=""
|
||||
|
||||
|
||||
# - mail_user
|
||||
# -
|
||||
# - The owner of the mailbox directories and within the e-mails itself.
|
||||
# -
|
||||
# - defaults to mail_user="vmail"
|
||||
# -
|
||||
#mail_user="vmail"
|
||||
|
||||
|
||||
# - mail_group
|
||||
# -
|
||||
# - The group of the mailbox directories
|
||||
# -
|
||||
# - defaults to mail_group="vmail"
|
||||
# -
|
||||
#mail_group="vmail"
|
||||
|
||||
|
||||
# - mail_basedir - No more needed!
|
||||
# -
|
||||
# - The root directory where all mailbox-domains are located.
|
||||
# -
|
||||
# - Defaults to '/var/vmail'.
|
||||
# -
|
||||
#mail_basedir=/var/vmail
|
@ -0,0 +1,42 @@
|
||||
# ======================================================
|
||||
# ---
|
||||
# Parameter Settings for Script 'whitelist_mb_sigs.conf'
|
||||
# ---
|
||||
# ======================================================
|
||||
|
||||
# QUARANTINE_BASE_DIR
|
||||
#
|
||||
# Base directory where amavis stores quarantined e-mails, mostly in
|
||||
#
|
||||
# virus e-mails: $QUARANTINE_BASE_DIR/virus
|
||||
# spam emails: $QUARANTINE_BASE_DIR/spam
|
||||
# ..
|
||||
#
|
||||
# Defaults to:
|
||||
# QUARANTINE_BASE_DIR="/var/QUARANTINE"
|
||||
#
|
||||
#QUARANTINE_BASE_DIR="/var/QUARANTINE"
|
||||
|
||||
|
||||
# CLAMAV_VIRUS_WHITE_LIST
|
||||
#
|
||||
# Full path to clamav's (personal) white list file
|
||||
#
|
||||
# Defaults to:
|
||||
# CLAMAV_VIRUS_WHITE_LIST="/var/lib/clamav/my_whitelist.ign2"
|
||||
#
|
||||
#CLAMAV_VIRUS_WHITE_LIST="/var/lib/clamav/my_whitelist.ign2"
|
||||
|
||||
|
||||
# WHITE_LIST_STRINGS
|
||||
#
|
||||
# A blank separated list of strings to whitelist.
|
||||
#
|
||||
# Example:
|
||||
# WHITE_LIST_STRINGS="google.com tinyurl.com"
|
||||
#
|
||||
# Defaults to:
|
||||
# WHITE_LIST_STRINGS="google.com"
|
||||
#
|
||||
#WHITE_LIST_STRINGS="google.com"
|
||||
WHITE_LIST_STRINGS="google.com tinyurl.com"
|
86
roles/common/files/a.ns/root/bin/bind/conf/bind.conf
Normal file
86
roles/common/files/a.ns/root/bin/bind/conf/bind.conf
Normal file
@ -0,0 +1,86 @@
|
||||
# ----------------------------------------------------
|
||||
# ---
|
||||
# - Parameter Settings for bind administration scripts.
|
||||
# ---
|
||||
# ----------------------------------------------------
|
||||
|
||||
|
||||
# - BIND_USER
|
||||
# -
|
||||
# - The user under which the nameservice is running
|
||||
# -
|
||||
# - Defaults to 'bind'
|
||||
# -
|
||||
#BIND_USER="bind"
|
||||
|
||||
|
||||
# - BIND_GROUP
|
||||
# -
|
||||
# - The group under which the nameservice is running
|
||||
# -
|
||||
# - Defaults to 'bind'
|
||||
# -
|
||||
#BIND_GROUP="bind"
|
||||
|
||||
|
||||
# - CONF_FILE_DIR
|
||||
# -
|
||||
# - Directory containing bind configuration files
|
||||
# -
|
||||
# - Defaults to "/etc/bind"
|
||||
# -
|
||||
#CONF_FILE_DIR="/root/tmp/bind"
|
||||
CONF_FILE_DIR="/etc/bind"
|
||||
|
||||
|
||||
# - ZONE_FILE_MASTER_DIR
|
||||
# -
|
||||
# - Directory containing the zone files (master)
|
||||
# -
|
||||
# - Defaults to "${CONF_FILE_DIR}/master"
|
||||
# -
|
||||
#ZONE_FILE_MASTER_DIR="${CONF_FILE_DIR}/master"
|
||||
|
||||
|
||||
# - ZONE_FILE_SLAVE_DIR
|
||||
# -
|
||||
# - Directory containing the zone files (slave)
|
||||
# -
|
||||
# - Defaults to "${CONF_FILE_DIR}/slave"
|
||||
# -
|
||||
#ZONE_FILE_SLAVE_DIR="${CONF_FILE_DIR}/slave"
|
||||
|
||||
|
||||
# - ZONE_FILE_SUFFIX
|
||||
# -
|
||||
# - Defaults to 'zone'
|
||||
# -
|
||||
#ZONE_FILE_SUFFIX="zone"
|
||||
|
||||
|
||||
# - ZONES_DECLARATION_FILE
|
||||
# -
|
||||
# - File containing zone declarations
|
||||
# -
|
||||
# - Defaults to ${CONF_FILE_DIR}/named.conf.local
|
||||
# -
|
||||
#ZONES_DECLARATION_FILE="${CONF_FILE_DIR}/named.conf.local"
|
||||
|
||||
|
||||
|
||||
# -----
|
||||
# - bind_change_SOA.sh
|
||||
# -----
|
||||
|
||||
# - SOA_PRIMARY_MASTER
|
||||
# -
|
||||
# - Primary master for all zones
|
||||
# -
|
||||
SOA_PRIMARY_MASTER="a.ns.oopen.de"
|
||||
|
||||
# - SOA_ADMIN_EMAIL
|
||||
# -
|
||||
# - mail address of the responsible of all zones
|
||||
# -
|
||||
SOA_ADMIN_EMAIL="domreg@oopen.de"
|
||||
|
@ -0,0 +1,24 @@
|
||||
# --------------------------------------------------------------
|
||||
# - Parameter Settings for script 'bind_add_dkim_zone_slave.sh'.
|
||||
# ---------------------------------------------------------------
|
||||
|
||||
# - DKIM_DNS_MASTER
|
||||
# -
|
||||
# - Primary master for new DKIM slave zones _domainkey.*
|
||||
# -
|
||||
# - Example:
|
||||
# - DKIM_DNS_MASTER="b.ns.oopen.de"
|
||||
# -
|
||||
# - This option is required and have no default value. But
|
||||
# - option can also set usinf commandline parameter flag '-M'
|
||||
# -
|
||||
DKIM_DNS_MASTER="b.ns.oopen.de"
|
||||
|
||||
# - ALLOW_TRANSFER_OPTION
|
||||
# -
|
||||
# - Example:
|
||||
# - ALLOW_TRANSFER_OPTION="oopen"
|
||||
# -
|
||||
# - Defaults to DKIM_DNS_MASTER IPv4 Address
|
||||
# -
|
||||
#ALLOW_TRANSFER_OPTION=""
|
@ -0,0 +1,40 @@
|
||||
# --------------------------------------------------------------
|
||||
# - Parameter Settings for script 'bind_add_dkim_zone_master.sh'.
|
||||
# ---------------------------------------------------------------
|
||||
|
||||
# - SOA_PRIMARY_MASTER
|
||||
# -
|
||||
# - Primary master for new DKIM zones _domainkey.*
|
||||
# -
|
||||
# - Example: SOA_PRIMARY_MASTER="a.ns.oopen.de"
|
||||
# -
|
||||
# - Defaults to '$(hostname --long)'
|
||||
# -
|
||||
SOA_PRIMARY_MASTER="b.ns.oopen.de"
|
||||
|
||||
# - SOA_ADMIN_EMAIL
|
||||
# -
|
||||
# - mail address of the responsible of all zones
|
||||
# -
|
||||
# - Example: SOA_ADMIN_EMAIL="domreg@oopen.de"
|
||||
# -
|
||||
# - Defaults to 'domreg@oopen.de'
|
||||
# -
|
||||
SOA_ADMIN_EMAIL="domreg@oopen.de"
|
||||
|
||||
# - TSIG_KEY_NAME
|
||||
# -
|
||||
# - Name of the key used for dynamical updates
|
||||
# -
|
||||
# - Defaults to 'update-dkim'
|
||||
# -
|
||||
TSIG_KEY_NAME='update-dkim'
|
||||
|
||||
# - ALLOW_TRANSFER_OPTION
|
||||
# -
|
||||
# - Example:
|
||||
# - ALLOW_TRANSFER_OPTION="oopen;"
|
||||
# - ALLOW_TRANSFER_OPTION="83.223.90.93;"
|
||||
# -
|
||||
ALLOW_TRANSFER_OPTION="oopen;"
|
||||
|
@ -0,0 +1,133 @@
|
||||
#---------------------------------------
|
||||
#-----------------------------
|
||||
# Settings for script check_cert_for_dovecot.sh
|
||||
#-----------------------------
|
||||
#---------------------------------------
|
||||
|
||||
# - service_domain
|
||||
# -
|
||||
# - The main domain for which the certificate was issued
|
||||
# -
|
||||
# - Example:
|
||||
# - service_domain="a.mx.oopen.de"
|
||||
# - service_domain="mail.cadus.org"
|
||||
# - service_domain="mx.warenform.de"
|
||||
# -
|
||||
#service_domain=""
|
||||
service_domain="a.mx.oopen.de"
|
||||
|
||||
|
||||
# - service_name
|
||||
# -
|
||||
# - Name of service.
|
||||
# -
|
||||
# - Note: this var will also be used to determin systemd service file
|
||||
# - or sysVinit script.
|
||||
# -
|
||||
# - Example:
|
||||
# - service_name="Mumble"
|
||||
# - service_name="Prosody"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - service_name="Dovecot"
|
||||
# -
|
||||
#service_name=""
|
||||
|
||||
|
||||
# - check_string_ps
|
||||
# -
|
||||
# - String wich (clearly) identifies the service at the process list (ps)
|
||||
# -
|
||||
# - Example:
|
||||
# - check_string_ps="[[:digit:]]\ /usr/sbin/murmurd"
|
||||
# - check_string_ps=""
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - check_string_ps="[[:digit:]]\ /usr/local/dovecot-[[:digit:]]{1,2}\.[[:digit:]]{1,2}\.[[:digit:]]{1,2}(\.[[:digit:]]{1,2})?/sbin/dovecot"
|
||||
# -
|
||||
#check_string_ps=""
|
||||
|
||||
|
||||
# - service_user
|
||||
# -
|
||||
# - User under which the service is running.
|
||||
# -
|
||||
# - Example:
|
||||
# - service_user="mumble-server"
|
||||
# - service_user="prosody"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - service_user="prosody"
|
||||
# -
|
||||
#service_user=""
|
||||
|
||||
|
||||
# - service_group
|
||||
# -
|
||||
# - Group under which the service is running.
|
||||
# -
|
||||
# - Example:
|
||||
# - service_group="mumble-server"
|
||||
# - service_group="prosody"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - service_group="prosody"
|
||||
# -
|
||||
#service_group=""
|
||||
|
||||
|
||||
# - cert_installed
|
||||
# -
|
||||
# - Locataion of certificate read by service
|
||||
# -
|
||||
# - Example:
|
||||
# - cert_installed="/var/lib/mumble-server/fullchain.pem"
|
||||
# - cert_installed="/var/lib/dehydrated/certs/jabber.so36.net/fullchain.pem"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - /etc/dovecot/ssl/mailserver.crt
|
||||
# -
|
||||
#cert_installed=""
|
||||
|
||||
|
||||
# - key_installed
|
||||
# -
|
||||
# - Location of the key read by service
|
||||
# -
|
||||
# - Example:
|
||||
# - key_installed="/var/lib/mumble-server/privkey.pem"
|
||||
# - key_installed="/etc/prosody/certs/privkey_jabber.so36.pem"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - /etc/dovecot/ssl/mailserver.key
|
||||
# -
|
||||
#key_installed=""
|
||||
|
||||
|
||||
# - cert_newest
|
||||
# -
|
||||
# - Location of the newest certificate.
|
||||
# -
|
||||
# - Example:
|
||||
# - cert_newest="/var/lib/dehydrated/certs/il-mumble.oopen.de/fullchain.pem"
|
||||
# - cert_newest="/var/lib/dehydrated/certs/jabber.so36.net/fullchain.pem"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - /var/lib/dehydrated/certs/${service_domain}/fullchain.pem
|
||||
# -
|
||||
#cert_newest=""
|
||||
|
||||
|
||||
# - key_newest
|
||||
# -
|
||||
# - Location of the newest Key
|
||||
# -
|
||||
# - Example:
|
||||
# - key_newest="/var/lib/dehydrated/certs/il-mumble.oopen.de/privkey.pem"
|
||||
# - key_newest="/var/lib/dehydrated/certs/jabber.so36.net/privkey.pem"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - /var/lib/dehydrated/certs/${service_domain}/privkey.pem
|
||||
# -
|
||||
#key_newest=""
|
||||
|
@ -0,0 +1,145 @@
|
||||
#---------------------------------------
|
||||
#-----------------------------
|
||||
# Settings
|
||||
#-----------------------------
|
||||
#---------------------------------------
|
||||
|
||||
#LOGGING=true
|
||||
LOGGING=false
|
||||
|
||||
# - What to check
|
||||
# -
|
||||
check_load=true
|
||||
check_mysql=false
|
||||
check_apache=true
|
||||
check_php_fpm=true
|
||||
check_website=false
|
||||
|
||||
|
||||
# - Additional Settings for check_mysql
|
||||
# -
|
||||
# - MySQL / MariaDB credentials
|
||||
# -
|
||||
# - Giving password on command line is insecure an sind mysql 5.5
|
||||
# - you will get a warning doing so.
|
||||
# -
|
||||
# - Reading username/password fro file ist also possible, using MySQL/MariaDB
|
||||
# - commandline parameter '--defaults-file'.
|
||||
# -
|
||||
# - Since Mysql Version 5.6, you can read username/password from
|
||||
# - encrypted file.
|
||||
# -
|
||||
# - Create (encrypted) option file:
|
||||
# - $ mysql_config_editor set --login-path=local --socket=/tmp/mysql.sock --user=root --password
|
||||
# - $ Password:
|
||||
# -
|
||||
# - Use of option file:
|
||||
# - $ mysql --login-path=local ...
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
mysql_credential_args=""
|
||||
|
||||
|
||||
# - Additional Settings for check_php_fpm
|
||||
# -
|
||||
# - On Linux Vserver System set
|
||||
# - curl_check_host=localhost
|
||||
# -
|
||||
# - On LX-Container set
|
||||
# - curl_check_host=127.0.0.1
|
||||
# -
|
||||
curl_check_host=127.0.0.1
|
||||
|
||||
# - Which PHP versions should be supported by this script. If more than one,
|
||||
# - give a blank separated list
|
||||
# -
|
||||
# - Example:
|
||||
# - php_versions="5.4 5.6 7.0 7.1"
|
||||
# -
|
||||
php_versions="7.4"
|
||||
|
||||
# - If PHP-FPM's ping.path setting does not match ping-$php_major_version,
|
||||
# - set the value given in your ping.path setting here. Give ping_path also
|
||||
# - the concerning php_version in form
|
||||
# - <php-version>:<ping-path>
|
||||
# -
|
||||
# - Multiple settings are possible, give a blank separated list.
|
||||
# -
|
||||
# - Example:
|
||||
# -
|
||||
# - ping_path="5.4:ping-site36_net 5.6:ping-oopen_de"
|
||||
# -
|
||||
ping_path=""
|
||||
|
||||
|
||||
# - Additional Settings for check_website - checking (expected) website response
|
||||
# -
|
||||
# - example:
|
||||
# - is_working_url="https://www.outoflineshop.de/"
|
||||
# - check_string='ool-account-links'
|
||||
# - include_cleanup_function=true
|
||||
# - extra_alert_address="ilker@so36.net"
|
||||
# - cleanup_function='
|
||||
# - rm -rf /var/www/www.outoflineshop.de/htdocs/var/cache/*
|
||||
# - rm -rf /var/www/www.outoflineshop.de/htdocs/var/session/*
|
||||
# - /usr/local/bin/redis-cli flushall > /dev/null 2>&1
|
||||
# - if [[ "$?" = "0" ]]; then
|
||||
# - ok "I have cleaned up directory \"/var/www/www.outoflineshop.de/htdocs/var/cache/\""
|
||||
# - else
|
||||
# - error "Cleaning up directory \"/var/www/www.outoflineshop.de/htdocs/var/cache/\" failed!"
|
||||
# - fi
|
||||
# - /etc/init.d/redis_6379 restart
|
||||
# - if [[ "$?" = "0" ]]; then
|
||||
# - ok "I restarted the redis service"
|
||||
# - echo -e "\t[ Ok ]: I restarted the redis service" >> $LOCK_DIR/extra_msg.txt
|
||||
# - else
|
||||
# - error "Restarting the redis server failed!"
|
||||
# - echo -e "\t[ Error ]: Restarting the redis server failed!" >> $LOCK_DIR/extra_msg.txt
|
||||
# - fi
|
||||
# - '
|
||||
# -
|
||||
is_working_url=''
|
||||
|
||||
check_string=''
|
||||
|
||||
include_cleanup_function=true
|
||||
|
||||
# - An extra e-mail address, which will be informed, if the given check URL
|
||||
# - does not response as expected (check_string) AFTER script checking, restarting
|
||||
# - servervices (webserver, php-fpm) and cleaning up (cleanup_function) was done.
|
||||
# -
|
||||
extra_alert_address=''
|
||||
|
||||
# - php_version_of_working_url
|
||||
# -
|
||||
# - If given website (is_working_url) does not response as expected, this PHP FPM
|
||||
# - engines will be restarted.
|
||||
# -
|
||||
# - Type "None" if site does not support php
|
||||
# -
|
||||
# - If php_version_of_working_url is not set, PHP FPM processes of ALL versions (php_versions)
|
||||
# - will be restarted
|
||||
# -
|
||||
php_version_of_working_url=''
|
||||
|
||||
# - Notice:
|
||||
# - If single qoutes "'" not needed inside cleanup function, then use single quotes
|
||||
# - to enclose variable "cleanup_function". Then you don't have do masquerade any
|
||||
# - sign inside.
|
||||
# -
|
||||
# - Otherwise use double quotes and masq any sign to prevent bash from interpreting.
|
||||
# -
|
||||
cleanup_function='
|
||||
'
|
||||
|
||||
|
||||
# - E-Mail settings for sending script messages
|
||||
# -
|
||||
from_address="root@`hostname -f`"
|
||||
content_type='Content-Type: text/plain;\n charset="utf-8"'
|
||||
to_addresses="root"
|
||||
|
@ -0,0 +1,170 @@
|
||||
# ---------------------------------------------------------
|
||||
# - Parameter Settings for script 'create_opendkim_key.sh'.
|
||||
# ---------------------------------------------------------
|
||||
|
||||
|
||||
# ----------
|
||||
# DNS Server
|
||||
# ----------
|
||||
|
||||
# - dns_dkim_zone_master_server
|
||||
# -
|
||||
# - The DNS Server who is serving the update zone and is used
|
||||
# - for the dynamic updates (nsupdate)
|
||||
# -
|
||||
dns_dkim_zone_master_server="b.ns.oopen.de"
|
||||
|
||||
# - update_dns
|
||||
# -
|
||||
# - Possible Values are 'true' or 'false'
|
||||
# -
|
||||
#update_dns=true
|
||||
|
||||
# - update_zone
|
||||
# -
|
||||
# - Zone containing the DKIM TXT record.
|
||||
# -
|
||||
# - Defaults to '_domainkey.<dkim_domaini>'
|
||||
# -
|
||||
# - Note:
|
||||
# - do NOT change/set this option unless you know what you do.
|
||||
# -
|
||||
#update_zone=""
|
||||
|
||||
# - TTL
|
||||
# -
|
||||
# - TTL for the DKIM TXT Record.
|
||||
# -
|
||||
# - Defaults to "" if update_dns=false
|
||||
# - Defaults to "43200" if update_dns=true
|
||||
# -
|
||||
#TTL=
|
||||
|
||||
|
||||
# ----------
|
||||
# TSIG Key
|
||||
# ----------
|
||||
|
||||
# - key_secret
|
||||
# -
|
||||
# - Sectret Key used by 'nsupdate' to create/update the
|
||||
# - DKIM TXT record.
|
||||
# -
|
||||
# - Example:
|
||||
# - key_secret="EtvvMdW0PXD4GMHP+onuHZ0dT/Z8OSJGlce/xH10OwI="
|
||||
# -
|
||||
key_secret="4woPu0jqf9Jp1IX+gduJ3BVW/1ZMeyCPTQMqEsMXLFw="
|
||||
|
||||
# - key_algo
|
||||
# -
|
||||
# - The key algorithm used for key creation. Available choices are: hmac-md5,
|
||||
# - hmac-sha1, hmac-sha224, hmac-sha256, hmac-sha384 and hmac-sha512. The
|
||||
# - default is hmac-sha256. Options are case-insensitive.
|
||||
# -
|
||||
# - Example:
|
||||
# - key_algo="hmac-md5"
|
||||
# -
|
||||
# - Defaults to 'hmac-sha256'
|
||||
# -
|
||||
key_algo="hmac-sha256"
|
||||
|
||||
# - key_name
|
||||
# -
|
||||
# - Name of the Key
|
||||
# -
|
||||
# - Defaults to "$update_zone"
|
||||
# -
|
||||
key_name="update-dkim"
|
||||
|
||||
|
||||
# ----------
|
||||
# Access Credentials DNS Server
|
||||
# ----------
|
||||
|
||||
# - dns_ssh_user
|
||||
# -
|
||||
# - Defaults to 'manage-bind'
|
||||
# -
|
||||
#dns_ssh_user="manage-bind"
|
||||
|
||||
# - dns_ssh_port
|
||||
# -
|
||||
# - Defaults to '22'
|
||||
# -
|
||||
#dns_ssh_port=22
|
||||
|
||||
# - dns_ssh_key
|
||||
# -
|
||||
# - Defaults to '/root/.ssh/id_rsa-opendkim'
|
||||
# -
|
||||
#dns_ssh_key="/root/.ssh/id_rsa-opendkim"
|
||||
|
||||
|
||||
# ----------
|
||||
# Scripts envoked at DNS Server
|
||||
# ----------
|
||||
|
||||
# - set_new_serial_script
|
||||
# -
|
||||
# - Script increases the serial for a given domain or a given
|
||||
# - hostname's concerning domain.
|
||||
# -
|
||||
# - Defaults to /root/bin/bind/bind_set_new_serial.sh
|
||||
# -
|
||||
#set_new_serial_script="/root/bin/bind/bind_set_new_serial.sh"
|
||||
|
||||
# - create_dkim_delegation_script
|
||||
# -
|
||||
# - Script adds DKIM subdomain delegation for a given domain
|
||||
# -
|
||||
# - Defaults to '/root/bin/bind/bind_create_dkim_delegation.sh'
|
||||
# -
|
||||
#create_dkim_delegation_script="/root/bin/bind/bind_create_dkim_delegation.sh"
|
||||
|
||||
# - add_dkim_zone_master_script
|
||||
# -
|
||||
# - Script adds zone _domainkey.<dkim domain> as master zone
|
||||
# -
|
||||
# - Defaults to '/root/bin/bind/bind_add_dkim_zone_master.sh'
|
||||
# -
|
||||
#add_dkim_zone_master_script="/root/bin/bind/bind_add_dkim_zone_master.sh"
|
||||
|
||||
# - add_dkim_zone_slave_script
|
||||
# -
|
||||
# - Script adds zone _domainkey.<dkim domain> as slave zone
|
||||
# -
|
||||
# - Defaults to '/root/bin/bind/bind_add_dkim_zone_slave.sh'
|
||||
# -
|
||||
#add_dkim_zone_slave_script="/root/bin/bind/bind_add_dkim_zone_slave.sh"
|
||||
|
||||
|
||||
|
||||
# ----------
|
||||
# OpenDKIM Installation
|
||||
# ----------
|
||||
|
||||
# - opendkim_dir
|
||||
# -
|
||||
# - OpenDKIM's etc-directory
|
||||
# -
|
||||
# - Defaults to opendkim_dir="/etc/opendkim"
|
||||
# -
|
||||
#opendkim_dir="/etc/opendkim"
|
||||
|
||||
# - key_base_dir
|
||||
# -
|
||||
# - Defaults to "${opendkim_dir}/keys"
|
||||
# -
|
||||
#key_base_dir=${opendkim_dir}/keys
|
||||
|
||||
# - signing_table_file
|
||||
# -
|
||||
# - Defaults to "${opendkim_dir}/signing.table"
|
||||
# -
|
||||
#signing_table_file="${opendkim_dir}/signing.table"
|
||||
|
||||
# - key_table_file
|
||||
# -
|
||||
# - Defaults to "${opendkim_dir}/key.table"
|
||||
# -
|
||||
#key_table_file="${opendkim_dir}/key.table"
|
@ -0,0 +1,84 @@
|
||||
# ----------------------------------------------------
|
||||
# ---
|
||||
# - Parameter Settings for script 'postfix_add_mailboxes.sh'.
|
||||
# ---
|
||||
# ----------------------------------------------------
|
||||
|
||||
# - dovecot_enc_method
|
||||
# -
|
||||
# - The (dovecot) password scheme which should be used to generate the hashed
|
||||
# - passwords of EXISTING users.
|
||||
# -
|
||||
# - Possible values are:
|
||||
# -
|
||||
# - See output of 'doveadm pw -l'
|
||||
# -
|
||||
# - DEFAULTS to: dovecot_enc_method="SHA512-CRYPT"
|
||||
# -
|
||||
#dovecot_enc_method="SHA512-CRYPT"
|
||||
|
||||
# - in_file
|
||||
# -
|
||||
# - The file from wich the script reads the e-mail-address/password
|
||||
# - kombination(s). Each line in this file must only contain
|
||||
# - <emal-address> <password>
|
||||
# -
|
||||
# - Defaults to: in_file="${conf_dir}/mailboxes_new.lst"
|
||||
# -
|
||||
#in_file="${conf_dir}/mailboxes_new.lst"
|
||||
|
||||
# - db_type
|
||||
# -
|
||||
# - Type of Postfix Database
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
# - Defaults to: db_type="pgsql"
|
||||
# -
|
||||
#db_type="pgsql"
|
||||
|
||||
# - db_name
|
||||
# -
|
||||
# - Database name for the postfix database
|
||||
# -
|
||||
# - Defaults to: db_name="postfix"
|
||||
# -
|
||||
#db_name="postfix"
|
||||
|
||||
# - db_name
|
||||
# -
|
||||
# - Database name for the postfix database
|
||||
# -
|
||||
# - Defaults to: db_name="postfix"
|
||||
# -
|
||||
#db_name="postfix"
|
||||
|
||||
# - mysql_credential_args (root access to MySQL Database)
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system
|
||||
# - '/usr/local/mysql/sys-maint.cnf' otherwise
|
||||
# -
|
||||
#mysql_credential_args=""
|
||||
|
||||
# - quota
|
||||
# -
|
||||
# - The quota setting for the new mailboxes.
|
||||
# -
|
||||
# - Defaults to: quota="536870912"
|
||||
# -
|
||||
#quota="536870912"
|
||||
quota=1073741824
|
||||
|
||||
# - log_file
|
||||
# -
|
||||
# - Where to write logging informations?
|
||||
# -
|
||||
# - Defaults to: log_file="${script_dir}/log/postfix_add_mailboxes.log"
|
||||
# -
|
||||
#log_file="${script_dir}/log/postfix_add_mailboxes.log"
|
@ -0,0 +1,92 @@
|
||||
# ----------------------------------------------------
|
||||
# ---
|
||||
# - Parameter Settings for script 'sent_userinfo_postfix.sh'.
|
||||
# ---
|
||||
# ----------------------------------------------------
|
||||
|
||||
# - message_body_file
|
||||
# -
|
||||
# - Full path to file containing the user info. This file must contain
|
||||
# - the message body WITHOUT e-mail headers. If file is placed in the
|
||||
# - 'files' directory use '${file_dir}/<file-name>'
|
||||
# -
|
||||
# - Defaults to '${file_dir}/sent_userinfo_postfix.message'
|
||||
# -
|
||||
#message_body_file="${file_dir}/sent_userinfo_postfix.email"
|
||||
|
||||
|
||||
# - email_from
|
||||
# -
|
||||
# - From Address of user info
|
||||
# -
|
||||
# - Example: 'oo@oopen.de'
|
||||
# -
|
||||
#email_from=""
|
||||
email_from="oo@oopen.de"
|
||||
|
||||
|
||||
# - email_from_org
|
||||
# -
|
||||
# - Example: email_from_org="O.OPEN"
|
||||
# -
|
||||
#email_from_org=""
|
||||
email_from_org="O.OPEN"
|
||||
|
||||
|
||||
# - db_type
|
||||
# -
|
||||
# - Type of Postfix Database
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
# - Defaults to: db_type="pgsql"
|
||||
# -
|
||||
#db_type="pgsql"
|
||||
|
||||
# - db_name
|
||||
# -
|
||||
# - Database name for the postfix database
|
||||
# -
|
||||
# - Defaults to: db_name="postfix"
|
||||
# -
|
||||
#db_name="postfix"
|
||||
|
||||
# - mysql_credential_args (root access to MySQL Database)
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system
|
||||
# - '/usr/local/mysql/sys-maint.cnf' otherwise
|
||||
# -
|
||||
#mysql_credential_args=""
|
||||
|
||||
|
||||
# - mail_user
|
||||
# -
|
||||
# - The owner of the mailbox directories and within the e-mails itself.
|
||||
# -
|
||||
# - defaults to mail_user="vmail"
|
||||
# -
|
||||
#mail_user="vmail"
|
||||
|
||||
|
||||
# - mail_group
|
||||
# -
|
||||
# - The group of the mailbox directories
|
||||
# -
|
||||
# - defaults to mail_group="vmail"
|
||||
# -
|
||||
#mail_group="vmail"
|
||||
|
||||
|
||||
# - mail_basedir - No more needed!
|
||||
# -
|
||||
# - The root directory where all mailbox-domains are located.
|
||||
# -
|
||||
# - Defaults to '/var/vmail'.
|
||||
# -
|
||||
#mail_basedir=/var/vmail
|
@ -0,0 +1,42 @@
|
||||
# ======================================================
|
||||
# ---
|
||||
# Parameter Settings for Script 'whitelist_mb_sigs.conf'
|
||||
# ---
|
||||
# ======================================================
|
||||
|
||||
# QUARANTINE_BASE_DIR
|
||||
#
|
||||
# Base directory where amavis stores quarantined e-mails, mostly in
|
||||
#
|
||||
# virus e-mails: $QUARANTINE_BASE_DIR/virus
|
||||
# spam emails: $QUARANTINE_BASE_DIR/spam
|
||||
# ..
|
||||
#
|
||||
# Defaults to:
|
||||
# QUARANTINE_BASE_DIR="/var/QUARANTINE"
|
||||
#
|
||||
#QUARANTINE_BASE_DIR="/var/QUARANTINE"
|
||||
|
||||
|
||||
# CLAMAV_VIRUS_WHITE_LIST
|
||||
#
|
||||
# Full path to clamav's (personal) white list file
|
||||
#
|
||||
# Defaults to:
|
||||
# CLAMAV_VIRUS_WHITE_LIST="/var/lib/clamav/my_whitelist.ign2"
|
||||
#
|
||||
#CLAMAV_VIRUS_WHITE_LIST="/var/lib/clamav/my_whitelist.ign2"
|
||||
|
||||
|
||||
# WHITE_LIST_STRINGS
|
||||
#
|
||||
# A blank separated list of strings to whitelist.
|
||||
#
|
||||
# Example:
|
||||
# WHITE_LIST_STRINGS="google.com tinyurl.com"
|
||||
#
|
||||
# Defaults to:
|
||||
# WHITE_LIST_STRINGS="google.com"
|
||||
#
|
||||
#WHITE_LIST_STRINGS="google.com"
|
||||
WHITE_LIST_STRINGS="google.com tinyurl.com"
|
51
roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated
Normal file
51
roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated
Normal file
@ -0,0 +1,51 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIJKAIBAAKCAgEA0UjqDwJ76w3kDmYue5zflICaB2AtBIxM8WDEXEBtQgFIFviV
|
||||
4wURBWL/Z4P3iTrci7nTWQcSn2+tuIysfQ4VKigju8T+wGgCOx8D/u4ZDcFzIryl
|
||||
zkP585Z0b/7OlXKniLHcqczvbxrlSxQJ+L8mEj3GDGf2/EZwHSomhpAh0X81n0r6
|
||||
4R4hnLhVmpBudC8kI4ZkjIyCKs0KMzmCY7yIr1HccdKuUhRS4wYy+TTgvQtVT59/
|
||||
+Bwea47BxOMKqnDJojCeR9qXjNtMLO+jqWka1PNFxBXHg61/fJ5Cufv2zrx9tSpx
|
||||
JsUNzO8AYC2iMBvzzpJkecegykoHdyh1MsTQUdG2dHTTorosMnV4jg1+GK425zha
|
||||
JoJtTOdoxujga7MJSZYwEYSCYA56kDyctV3yP9V06l7kk8OhgHhvnhJZN3jMN9xy
|
||||
xy3uCzMphCFsNiQwgFUZITnUK2qamwppnAliDQiFCN+Hp3vdTvmaGQdYtHXoD4Wf
|
||||
Wel3anIP8DteQjUffZss5+JvmMGj36N8kYYnBvHohz9n+kgGyP5CczvDUgypipBZ
|
||||
vQ9SQOme92jrcG2eKd3RpKuUUijxZrP2GCPjNFsSpT5jW1yaGqT9/yA7yh8aM+hV
|
||||
VACCNzN6a33foQcjmNjsW1HKXUnNLn3bG02E10I3N2BFm2uaX7sW69taLQ8CAwEA
|
||||
AQKCAgBkfHj9ifjLzJiinUdWTOVBHVpXjkMvOto6z3aYwMp09b6SYPs+zJD2oCj3
|
||||
n/J7rop0gF3NEktLyEiGIu0zAk8BNdKqdpTG92mSz3qQrevTof3RQPjvh838ulHf
|
||||
8F1qfmmYhaXo1aBlHWnY2Z9MEyOJgKWWEVkSmhN8vV9QHuZN+6FYgZzh+CC1agCY
|
||||
PR77pCLa981ReqmJOXfbTpKfpseOPmT1Ne5DNMTzgmd5Jn1953Inz/KWw5GLnTjG
|
||||
eykE2zDFMkjdQUSg+i6iKNHRJskeVEw8MSThwa1DvY1WVXeUngZRtTYtIlJVArCQ
|
||||
fXixVsqCdeHOYx594nuhKAjVvpAyyo69j2m6G60B6WlpMKm0bHQ9+b/lYhA1urmy
|
||||
KHUzskRoxukyV8p37pUXbahtAPc3rqyKZ9bq98H4sDR7BK7AVbNiITaly9dNLlX1
|
||||
vZ3CMyQKRHULPtRrFPQIiepJZG5BFFFl+WuOuUjbDUqLPTzuuHV2sJ+dNacu/Lgj
|
||||
KgAmTPi0XgHGTZvTxndpvYbR5cXdVfSihlAxzqaGOFw0jx4kSu06aIcRhrCql0x6
|
||||
wD5SQzBnvfDVsXnZMEqYR76MCHyEcBUmK++1a1GODowuZoH8OVpPA7YPxCKQEgF0
|
||||
sG8wEi5x+wgp4H8lU/QYfewOrkRfA8aProoEHIbAFbpR/Q2I6QKCAQEA6j77wT4O
|
||||
9QIOJIR/zYTVVUf/yOJUUf6vCtAx4szIJ5rPbXndwi8bRxJgd8RTLeRI/JUqdMN2
|
||||
5TWLCv5XjOYCQrZcMGWotSOX77z6iOv/kBzcB3Xj286DWK2MVa5zm9657V/EQZVX
|
||||
U+eKY0WA0S1be68mtKRFfx4YvgUMto/vv9TKFxXRcwSTZOPqahS5vzcfQHQoNjVL
|
||||
Cwm0L0ghKlFjRVKA/CkQpv7yTm40XiCpjL8vexPHjISxZpdbgtlve/60IRQRoqt8
|
||||
/vAwfaWyzH4uRDpjDA1eQr3dwqTgc7dyN+u6D80Fy3gS24ZrSclJ9zwnt3R4IPln
|
||||
TP0DGyjzgLJbbQKCAQEA5Lh/ZVGA0b29VWSIRABp2fkkpaS4RyZVmDKF7EjDMB4l
|
||||
lnv9lbhF8zVW72+RhFQWSJ0HnBUyISp47axHzizaEtpQ0YqeBkQ46yDPwoAZzc/9
|
||||
4y6YYVYC+zXylPrIgRstiBenqxKqtrWE4pA9Y3l9TJ4CF7dvMocqaNppA2AoIM30
|
||||
7YRej79bzszLRy7AqMfejOK942LtVnuKaH/frBIof+GwKdrsvr08uYLMyFlMd6g+
|
||||
MT2T8rOs0JteABrlLPPULAVgNRsmxYvVqusk/IAfca2G/WqY1x9oj17dZXRiT/Vc
|
||||
dYVQOzKvi9I1qWU55muXxusJ22/Qx9euJ6aj67lA6wKCAQAjZGzJX8UGw867OcHN
|
||||
nZpWDlDZW0j+MorkCVzgNaywPzXEBru40UE/1cj5j5I5xto4P5lwlu/p5dMiUBeO
|
||||
VFpXFhKLxXBeHgig0l7QPUgZ0CJ2hhttZKB3z5D6iScyj85rzSJr/lJ5fOxt31x9
|
||||
PmsqHuasOH2/nR6D52NqWgkRZOc74bIJvNFAVydd68+80mlIZcSFnDvAaTDuS+mm
|
||||
6TEkkjim4NWBRdf6fbAv4KN9fo1//RcTZiEfrRLIjG3JwEwbC1s2xs5V/ph1A4om
|
||||
V5JKAMBiW8q4LtPIyvyWv0rkpBsys/mCKpw+yup+9YjVcCNYFqLn6IbxHPFRMzjH
|
||||
YytpAoIBADk0J7CodMaAZQUhcq9HRzIcDN1c2DX7UXcSU8pn3GGBeLctZZv3jY8p
|
||||
bQfPaJ6nBTe+BnQ0HOiMndgbuY3IS/ZhIct2ltVMZMvx1eR4c3u1JHOYaMYXZAF+
|
||||
WaCHJHSd3oJmICo6LfYqagTcPG5PqVXrQuy5lRcXFTVKQu90MjUaLcLl01yyaHzN
|
||||
XZ39BHRyIKgt4X4odOGnXlOKf9+iXvy07oFZXtLJs5FWNG97XhOjQYLBOup9o6A8
|
||||
64KtN1pJ1Wv5IDnIA6dutM7dps98H+EnnFZvPbC4C0eoW0kPlbMX07sUz58uqxcW
|
||||
SROH3LZTfI9ko399dMM2nzkNhXvkRmcCggEBAIGkY2KlHJAqivcefDDi9/2SQXgT
|
||||
0wY65gVK0ihxcrGwwpS+t1zzFbLzz87m3dSh6BYFElGMvBGsTol2w16YnsRQQYL7
|
||||
HCgkQDau9SJCbK+6ula+7SI4kVF0SFTXIKffRkSC/KRoBBf2EIV3RwBUF0SIwSE6
|
||||
MG99OqV9E7u+o7AQtHCZYjmdDyqYmbt1XBfh2kV8if8OG0kCizrqijBxPCLzMItB
|
||||
HBr7v10ZJQxKVU614PHI3rjEzekLC3ypEAdZWSIFvRQceWxpFefN/lfOZcjcPEQD
|
||||
j1BDDwX18O7W2OtePYs4PxnJUWQ2M5QMcuAYwviy/p72HokwocmoSor60Mg=
|
||||
-----END RSA PRIVATE KEY-----
|
1
roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated.pub
Normal file
1
roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated.pub
Normal file
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@a.mx
|
51
roles/common/files/root/.ssh/a.mx-id_rsa-opendkim
Normal file
51
roles/common/files/root/.ssh/a.mx-id_rsa-opendkim
Normal file
@ -0,0 +1,51 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIJKQIBAAKCAgEAtVNqSzdtAtSD4faC34QLBYRU2huoBXa7qnjkQxXSzfGRsvJc
|
||||
QHgvv+Nh+VztXSVN12L1VNy/zVcLZPDUrVbmJJMZ9zDtePJic2U8AHUxDZVJx+bu
|
||||
g5+lM7Opas8oMnzAAFW4/PeSm5mrbAGG6BJRuRW2JWtUCGxMI1ZFpPfm8WcizmTz
|
||||
3rgoTJWnjgW0cS7m0+VDCEImUzU4hNWX4EMVQDXIHuDCvs2IYXe1+fSbhV/+Zwdz
|
||||
9RMpFpzxOkDdo3gtC6K+/Lr5ZfXx7NMatBX4SfVLeYVKqtZwrbgdU6BldUHG4AYT
|
||||
tADyveMAPQbtzsvZ6k12eND5jmzIpAyovD25bcaNdsQZ3XQlqNVxJMQIkdw2FZb3
|
||||
+zwspAYkPDb96qDEnpaSvYRP7XsANcEuSJbIY9SH0VN3XGPmDRuH8zxlNBGISs6l
|
||||
hc8qGzPRfImHoJpIGhid0oVy7naHnJqBBHbsB6hs7a59yKOStWfD+OpEk1YIxDSl
|
||||
Qm4pgrWcfl/XOs6LSkqfX7ZeJgANFM4ippe3dip1cg/vmDYAa9KgHGgVxuCpDxWe
|
||||
nRtofewD2nKm+YneOPN2AOdfyLbtNP91j2sF8VqYVjTjglAQvY6RaY3bU6KY1+gy
|
||||
/MWWkeKPnnYj975yl7hZsAUNpeaRmMNz4yL6u8ckER3qQluZ2BhpDR4VvHkCAwEA
|
||||
AQKCAgEAqC5QXqdv8roOAN3WEV61ok5VLV+NflPcSIeMoDRzrBStYN6udhWDpGVQ
|
||||
kCuC9WwOQQJGLon5VImxxdQiTwxUtgPCh6XX/OBENGfnOT15W/Hl1wX4oBjI76Vq
|
||||
M+kkjX9rzmO0Ct3OG4hymODpsgKbziG3KgncjVt1Wyk/u307tRhGDk1QbHk+15nP
|
||||
KUldTcWEz3DLtbM1POQWIg7CqX1PDplTnmA2ASc9obmZDde1EAYzPniJMvyslY7H
|
||||
p5JWgLKMhUhUALGjdNCjrVc4Y2QlQOPFN1dMJBx1soscmF4i/JkfztWUHNbsTvdn
|
||||
VzNACxjEbC+g/PpHHbUEfDRJpR9TBk8j+goCedGZ+jlRb5ux3CCyQ3FwqVAIOkwv
|
||||
aa+nhWPkxVooSnusrth0U3syY6vRNbpLTklcPMSTq2Glnly1DsO9ZdOGpMvF/8il
|
||||
sTbQxGrA10RJ28oisbSObWBb3NyzDPsRrTQeUmshxg7wnmZsFMzQhHicZGOzUuTK
|
||||
T1u7INO9tpAoy8EFROB+0SdywokR2Kzf7Pt+jKtKlu1hce4R8PTTQksQxBosWfGG
|
||||
qEe0KpxDngPdCwSo3gk/ABrP7NdHnBbCZjGR/x0+6jj8vDqZLeKlxUQXWsHfRWrM
|
||||
qk1AN+FbYWxGrfJqoZ5YT1VqLvaahjchaZ4LMzWUg2sj4y6DxwECggEBAO1JoTd1
|
||||
8/22k7Ul5SVcHGabPL7pfOLovOhkYd3rjJlukJLhTfy2fotcsNBor80MeCc5Dr0E
|
||||
ljC+ailxUGm2ZlSK4GFPfLILZKJCEZt29f4j2V4ovmgFbtbhdbSH1LEFuKB1d5r6
|
||||
4o4KXU6p59p84/V5JedFVq+afAHVrufi6lv46MoYmGEx0Jt0Q1YjOj5PjD50Ebpm
|
||||
mbW9b3n2Gi606quVTKUYTyjhIzCS2/1AGy6rzgc5/49Sf24JRf138m+VDMIecJXF
|
||||
rEOaB10ZGu3CZbZdssY7idtVhBt0saG00gHYwHqcyJGPQVzIY6ziW9dvsgsPkJ3h
|
||||
Cin4rrOATCVlZfECggEBAMOgBvvlvQXJIir78TBGl4cumBspgucReROVhyZI0UqV
|
||||
qxltCcwDr+xQre/uG5Z5+HLFnVAqKLhaq+1tIbbHp1nvUUWrlAHTfUF+U/mjbGh8
|
||||
jQ2A2Fy9x1tjd6eYjYs5tut4CXzktExQnvuipfNTO2fZiqNi+43OwIV6kJuMQRa5
|
||||
p++HAaVWwrdJaGHjQ+cas4Xu2tC3Bm1/lG6Yk3SViINkrKxU8wJApr3l+1LfxVi4
|
||||
OWGFJZS2+zp3QSZLLHABP7SfrbFpFZHVUAOrjCh8JnNAx8f/fUDZzKJQLda9aLoA
|
||||
WGaY796ZGhVSUXU8jB4/FZ74x1tMxmmtYz6nprCklwkCggEAeuoVFMGI7ffRc5h5
|
||||
pmycWZo4UTxpcLDWihrVhzsozaG0SiFjYHC4BECzZoGT70dyRf8MX2Us13sLSwRj
|
||||
fx74yvpVWJLwKNo1+sb2j+2DZ23yfw/j8cY+sBiB/E4QItKv3I58sk8bZDCCPOlO
|
||||
LKNdAh8LP01vpe8EJX8m5v9oHtRE4crzxAUl5iDHcKs21GgoYYGGXWQgY0AJqseM
|
||||
sH0OwmrIFQ0OlEJrFBI+2mSGsBpW0u98LiWx1LIBC1dCwgIXZcaW0z5eCXaUMel7
|
||||
RYXZYioPHRhiRLd7gy1jhjxAPKymp9znGF94oDM9TqTCpko5k/kwFFgqB6vF8z2W
|
||||
NBjeQQKCAQEAvlRtVxnPzdhCURXtNO4JsbGotgyuWsjKRz6dTqdcUbfKz6Mh/Ae+
|
||||
WyqoAJ9m4gHrsycHhp5uHefCDO+39JDOBxdruGBWUWyGGnmhlGnnKMW9qtyoJZtT
|
||||
YlwlZ79qP4I4sWKJwKT3sqRh+ivmUBaz3rduRscgPnlhILz+AwjzrvuVI9vzwvzl
|
||||
19QpJcwrHagB8JZS+OyJ6XFOZkg2dyChwEzsH4NLJ+7lDC+9VYV4CXi8A2C7DrT1
|
||||
O44ZqftL0fG1HLSbFthJ7yhegCOg6ybXdh0aA0FViQofKfDemGaShR2e5Lt57daB
|
||||
5SrBLFJrdWYlUBV2SSMqjFjxDV2qNYT9mQKCAQBdyS5/4yRfTL7YAJzEwtT1NF49
|
||||
VzNIYF7+axDW51wn0qcsghk5yzYbr91vDvWbROobiLq/Ed75xq8i7vuZDjw367Kg
|
||||
d8gB6lstq29RwCRmVso7OEuNs1vC+4uDoEHsUPowI9fnn03142qo0z0HS05p0i1E
|
||||
Zf9CRso7i4a+Z3IjJxn1/wuHvzX8FaEoXBTjRLejJarfHWZ+wkZrWwCoYt+eqZup
|
||||
jhF2xNTjGQqSrcVzPsvdtj9JVJ4Qi3yZOqWu41ONh3Yg0TIXovGzLwYYA5LlJwf0
|
||||
1NY4bdqXsdO2bBRRJMlWzea++fuyETdCoWphMVzvtZn7DNp6/DItnu97O9rA
|
||||
-----END RSA PRIVATE KEY-----
|
1
roles/common/files/root/.ssh/a.mx-id_rsa-opendkim.pub
Normal file
1
roles/common/files/root/.ssh/a.mx-id_rsa-opendkim.pub
Normal file
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@a.mx
|
49
roles/common/files/root/.ssh/c.mx-id_rsa
Normal file
49
roles/common/files/root/.ssh/c.mx-id_rsa
Normal file
@ -0,0 +1,49 @@
|
||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn
|
||||
NhAAAAAwEAAQAAAgEA1tPiYEIBNv6V6QuaPva6JHlg7zY1rUClaSgF1sR5wwIbX0/lzOUj
|
||||
gA0mexYIaXxhEYDnm/EzEu+eVb07M0sCY+FMlCwVL4U2iiE+uRwbis3KeFON/6kHajAXmW
|
||||
vkugEOI7vNtJMIY+OUJJadDY2ZxbpjIsaMTXrHp3DnurjXOuaalR63zvIoh0YJHoS4BwaJ
|
||||
qSM89L8zySN/jy9v7laT/ZJt7m9pUOWRrLDRLhE2nNrzowEyk+OFDW+tqChsTl1Y+nN0Y4
|
||||
nx3vkskCKWoPLQL5xnjisZw7gq5MkV9QKt9Ndh4oiKdfDNCnDSeeIMjAyCMevwtVdqjLp0
|
||||
ClSoOQ7fMi/eHaPPS33aii1tdxhEqYFbPbsc2aW74/DdngzlZQrVwohAfJyHXmJEc8JGGa
|
||||
vQjNMZG/Z5cErbvEPxY/vYqvjQaTIQ8FJ/AYQu4xkQOyoUSLwlrkW750aVN1Xa2CBl/CsF
|
||||
ZWSqDt4vXLxf8stbhp9aXQ1Q9I31v1eJ3UolIQ0c/7wuqaGiVdK15hkNczuipbr9vXMrlL
|
||||
jcbwfFtvyZXOhhaIJ+FxBwY6o1AKGHydJOHQxYViwLV850YRs2ffPSmpB0SRSJirMeANeF
|
||||
SSzsrI7zGMG1b0ZDwoynKRmbeXBRQvpcjOBtBJwQItb3qrghUV78RwmYAYIya+QZH/uhx6
|
||||
cAAAdAAgFxuQIBcbkAAAAHc3NoLXJzYQAAAgEA1tPiYEIBNv6V6QuaPva6JHlg7zY1rUCl
|
||||
aSgF1sR5wwIbX0/lzOUjgA0mexYIaXxhEYDnm/EzEu+eVb07M0sCY+FMlCwVL4U2iiE+uR
|
||||
wbis3KeFON/6kHajAXmWvkugEOI7vNtJMIY+OUJJadDY2ZxbpjIsaMTXrHp3DnurjXOuaa
|
||||
lR63zvIoh0YJHoS4BwaJqSM89L8zySN/jy9v7laT/ZJt7m9pUOWRrLDRLhE2nNrzowEyk+
|
||||
OFDW+tqChsTl1Y+nN0Y4nx3vkskCKWoPLQL5xnjisZw7gq5MkV9QKt9Ndh4oiKdfDNCnDS
|
||||
eeIMjAyCMevwtVdqjLp0ClSoOQ7fMi/eHaPPS33aii1tdxhEqYFbPbsc2aW74/DdngzlZQ
|
||||
rVwohAfJyHXmJEc8JGGavQjNMZG/Z5cErbvEPxY/vYqvjQaTIQ8FJ/AYQu4xkQOyoUSLwl
|
||||
rkW750aVN1Xa2CBl/CsFZWSqDt4vXLxf8stbhp9aXQ1Q9I31v1eJ3UolIQ0c/7wuqaGiVd
|
||||
K15hkNczuipbr9vXMrlLjcbwfFtvyZXOhhaIJ+FxBwY6o1AKGHydJOHQxYViwLV850YRs2
|
||||
ffPSmpB0SRSJirMeANeFSSzsrI7zGMG1b0ZDwoynKRmbeXBRQvpcjOBtBJwQItb3qrghUV
|
||||
78RwmYAYIya+QZH/uhx6cAAAADAQABAAACAQChXGGrP6i98BgWBfsD1DsY7nra8vL6gZY9
|
||||
GCzalpWG3mxE+TR45Jv3sOj4hyImaaBXj2VogpGEZaueZxayfmL7Nt1YZow7N2ox8qq0S+
|
||||
J8LfsoykncgM/q+NihCqOw+t3uBUCLo+0namd53A93gKbCGDAijNQR1mlk4a+NVw2DVndC
|
||||
DuKtdMLwaLCs1a+Mx2JbQvakN4HkUN+dY1pFwY5DZttfvxtyAh2bgux8F73Xr7ZU969P2h
|
||||
O0dfAQYNyJOCB/bn07zv94Jd1NHk3Z8shhGq/F36XolsrRMiFl+W9EewsxJrIpyIeakgfm
|
||||
ON6Hy1V3ver9qv2DWwGSSOhag0ste6szGxkgt6wyh9QMPkw/G7X2slCm/ZURaFeSkpH7jo
|
||||
CrbIikQmTYrIHpWFetSyzpEWJso0OhkQdVwTL9ON1D42KcQ4wMDAZF87LipmjPtqg77uX4
|
||||
RGN42hCYCDxgIZez7KwPwqLEft+uw+EVzmAb+FW/RpIxWdFK6DzTLF+YRzhIj+fhXCvYcr
|
||||
RTiSAyC1zc/FjH1LDPufJDIdrZ7VOEtMSoM2/44cDQl26EOPgwNyrsr4r+eYv0r+g5IkUs
|
||||
QzxKwHxulmjlpzb84hVmvanafCC2Lza9MirprVYO9lwnah8cfJxAXbiFwHli7HifNRZSHh
|
||||
KdKktZuaV+ifl1Or0qIQAAAQBaNi5gVGJvPud8AAvG9QkYm6FSPjKXcJdPijMLbb2UxhLE
|
||||
kICYKFYz0j2qwfqBvBMbNvdTKpd/nsYNS3iB3ye9RTDRW5APE0kLKbsRxWolm83MRwMpKS
|
||||
gumH1UM4uSGqRwO/TZnUJJFvpQlq0M0ZAnjwePlmCs1OE5smhDvGLsF0UGLbHfCUyzYme3
|
||||
8g3/c73zpnvw5jdW43pp9Pl8mecU90gWoIz1Tt/Fke2a1Bw8c9jwDdjR5NcBg6xL6hHQv9
|
||||
q+i2BIzGWzScbG37QoKmFfoyjOQMjeQEcI7MFDQHKnU1h+UXY7/v34ZHoVJsH68Hu9Zc7q
|
||||
BA8ZBT+4qoX2jNKQAAABAQD/PE6lC4aiDvkKDxad+4gdsWaUnjhQ6EbqV6FsNgzOlw4SGW
|
||||
6FsJB/cC5h3TOzR6xLuYVw/PTPldpEvJYWYHTpncuLzLoqZRythbJCF8WuCSwSooG/Azsa
|
||||
87hZmx/jthmyI5AB2/1cSfCaIx5HX1zr7xKwOGT7kqHICocUsFheUHGr7gDjQjDDYV2cLD
|
||||
402StiT4V/QYdiy6WKhyIkd/0sCAWWSJ+eHufSdf8IVziIzEsXotJBhCnVt3ArQIS4l/F/
|
||||
hLK7vlSSFxPnxBHFKk6kUv+OA1WG/xScL8MVDPOeSa1r956ugqBKWkNGSPlDQNujn6C7B8
|
||||
7NMy5C8CjyJUi/AAABAQDXeJiDXa8dxkA/1/baiLcCDgf99x58Rv88IAVfykhZuGBU+Ra/
|
||||
dFe+js2uNDgXvz3q/IoAD4xb43GPKamg+fW3ITonEidTDj6xZm9vyPJMpXMOtE1e6wcb3a
|
||||
UB0lyQD/i/y9qdMYb/wgJDoClRWnTl2DuPtcMWhKpUiRXnTzZLd2x/mnxvYlC7GUxUy65t
|
||||
6y+OjxkLMuNf5QOWsiCaB2G132X655JgTin+9moJn1pXiuP9IrHQHh4nBI6dMsu+4dilj2
|
||||
SoJ/pKm2DsSiwv/xD9odgc4amJTqpMNGTHJLQ9GvKdkMP/jJ5/Ssmj/TD2ya+R4P77LPuW
|
||||
Pszip7noyJMZAAAACXJvb3RAYy5teAE=
|
||||
-----END OPENSSH PRIVATE KEY-----
|
51
roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated
Normal file
51
roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated
Normal file
@ -0,0 +1,51 @@
|
||||
-----BEGIN RSA PRIVATE KEY-----
|
||||
MIIJKgIBAAKCAgEAuPbh08KHfSgo9KHHP9AExGy6JCPmese02WCiXUTEe7ebJndz
|
||||
ZNvBmxFwQYhUvq1Ry1BaOxtUN/v/1oeJ+S0wmnCtFm8uiAyDiRSkU6o0+chJSMfC
|
||||
Fu9//6ufINZDXJdgqLI2iJpQXLf3VqE3C93YFxjNfT7HCzFhjRvTkPItLe2I8ZPa
|
||||
D3ibA0nTo3IRzfDv3Ey+z8b3CTPcLqz9r2Nz235AVKCMz6GDq2hWYhvpb97wIX5d
|
||||
DyUcMJnko2Za2r52wk9BGASBzY+hsO7KqXq4jnxAOLNAp6Jsa3+ReFuBEsZWJVmh
|
||||
uS9CJYxfD0Ie04OlZA2ZRPsFUi+zYtN/RgIcIydxgLyoCDwTjPkC9qYm1vf80t2v
|
||||
frajEj20LpN0lsgr8dvEzVSwzLBW5qdY76KhLy3Y0X572mttOCdDxTAFulKEQCZZ
|
||||
jqrEKJgs7QiotW2bI6wlvLYUrP+ns1fTVGCAJrRBZjR0T20ivVatjl3HbJkMr6c4
|
||||
I91NmT4jFI8ZTriCRD+Yz+cZS/ynpzKXHfI7ORIShyT9YZjPFKcru4clh299xdOg
|
||||
Y3mSRbycVfVqEfe6/O46sWrWFkfRL4mNEZ+IJC3n6SF/q0/bK9FygvGGjIVDe1+N
|
||||
fUaTMLD++PMJ5n4AA4XUKJYgLHsjqVcxb8g7aPU8TQFQyt/UDTlqb9vj83MCAwEA
|
||||
AQKCAgEAkmGAU3COfbR8xS4LXCsqurE5l0R6MQ0/yRE7LgkwXqDuPsEmJ9nrHOfu
|
||||
KU7VkpnkM72By2lTe4MJ9CQMQ5FJ98/Yi/qtnqoYpzIY4sW/azbhGKJOrowYhqSy
|
||||
KPCpGuwKaTexBObrVpWZP4wS3mdRjuXoKoi2Sdto0p4FD585tjFYwac7WicetrmE
|
||||
rsOl55AYpAZwtEtIUpYiWSY7FsTkef8utkrhZajzZYILa1WfpxOOg1NYHpZF+wiv
|
||||
88kbeiZmIl1KrNFUUPStCDPTW9FtogYfZUAnmQNoPqMU42W3fr5Miv6miMIn3UN8
|
||||
L70qXEbBa69/byIiEesCUuICxcsBrE22Xly7Y72CgHNkTmleMwp3BhZ2vlkzEWjD
|
||||
29cg4mzF/7bpFZ/le1aa8yl3ruehNWoArmlmMfqukCWBoP/Qfu6ZyPsVmG2PRTHN
|
||||
4DqjEBWJa6nLkDgWx7MEAIcxoK8JL/XiPXJO38Cg6Mtuy/LSwQIPOSJYUcv+bsIG
|
||||
lgtO7f2n8utPorkZT48LeALUm21dx7nh1noYaUWKO4zNWrjLyfYS3z4lNN950MwG
|
||||
evAwYKe9316dmSz9iS2F3K8sdbrdnFJVMkWkjIYV7oJSiEH+RZ1dUUfyn6LCHDiJ
|
||||
nZfMMphsc6x2L3Idkpxw7VZQxubfbpcHT02JDrN7eB0jsnNbS2ECggEBAPUznJ7o
|
||||
gE0BWbeL/ltN3pY7nmzTWUBelk5MEZEnme/mL//4o+3Ab6rhjOtLuS7C60V/Mwjl
|
||||
e45bD6XktV1ZhED3sAFd4quZJLiLiZsoS3V3sj5GpTpc9nTwhw3eWIM5j/TeXqtS
|
||||
i/28VfSJ3MG+arjqrQcAmSomZf2GooOyK9kqO4EsOBDH664bG4QqtrfLvAM8N/qg
|
||||
pIddsRNPv57QZ86LVgpgO5p1lPBCsnUQSP20WZoHYpI9HprnBK3LOsPm7VBvt67y
|
||||
hFpuciSBpPfhAbv9/kfCakw5f6vhv4lr/2oCYKXXRPI2YSLVPbK1zohQiMiDGfjd
|
||||
woqcCixO7vLGxVkCggEBAMEcKNOxVVPg6+J3duWrquBvwGmmSvRev9pBZ2BuwrZz
|
||||
SFrDET3RepsmWW0u7B93LlKEwXu8AQ8yOhif/qEeqyt6a9AOEKbUIaurw2WWjWfE
|
||||
0+wDtJTdklf/KzT9KwH/qpqdOcySsbLHvZccxt/ywfFtPuJZdbsjWz/z9PE/i3L+
|
||||
W5cDmUPSwomL446I//3Ew4htfau+rYA5cPfdK8OoMvpKamk1KeRPneehAWqY3EFa
|
||||
/sHW5CQhphJXFuwtiK2hoggJxsLSt2qbrnhUfQOJDf3IoSrYjQiJfqlq8VK+0AZc
|
||||
4HqjDF52Ki5nWOt6llzwNYCh6R7G8J5gVuC0uPneCasCggEBAKgiwvPoRAoJsgZ9
|
||||
VWYwaEAmE4VWC25rLa/001rwh8sL0cA5M9dUzH2leibiXtIk0IVwKoOgMHA2Gu3L
|
||||
fV3Mgza1YRge086NDbQJ4srk/5FGCZBQiv4RPuKDCGjHHXSmJQNo9AuQZ/QOj/ZG
|
||||
Dn0/4Bh6uzkA/QX9HJSTHJ8nro+UOQdjVfKT1BUn+19OlspDRuIFCfGu9ALqiQDP
|
||||
/3qcN4JW4yHsSRKqK/3wDkTdbN+jKonHJJ1YkcLwRLITmHE6yWINqSuqmn0UHOrR
|
||||
h1h+Dt1k1ldIhfFMwDIRc3B9AMAlbzZo/ZsFFOh4xnzj1AJ/DrxHwah4D+1SAFvP
|
||||
qGQLTskCggEAap86p4+dFj/03ciqPCspoNvy+CJZ9k0uTrqX8nWVSpmiVIKpzWEQ
|
||||
+gMVkyQ6OTFbwTINhl0KlLJdw2TreVhumAXy6yAo74Pmx1uB+mBC2Q2jGQf+t8cS
|
||||
20VHPO2fxm28a7vtwtcoCBcixgGciOAHV17DPsS4LUhbRJdVIbK9MxPfzCSvhfQj
|
||||
d0BmtzdLaHkwoO4bWi1grJCKoEBcvp3q76kQ0eAJrkaLX+3U019tFSTBzpLwykZN
|
||||
5IhzXpnRglThGuES/lTL8q/ciBHWKJKOyBXzbq28SP9pkO88KTyzrR+wzeWimbFS
|
||||
nuZvAS1hQhVa5RgAl/6tsjRtI4qFK2j+GwKCAQEA6d13kvQjQirN9MpVkWrOtKPU
|
||||
gIYZzGveiLKz3X5B3UHPL91Ur1yuU4GT/A50Pj0J3psPVsaKm/antrrz6KzQHeNY
|
||||
yl6DdjM7A57wDo+rrmPoiZsbEvJ6gCnBz3ycf/8v4F4rXUDf7sfYFUA301m15QLc
|
||||
V4oSQUo7useOdC1xcbM43spG1skpXYEvOzLkhlql9q2vUfN3Mmr7QxpppVdQiAfK
|
||||
Ij8LH5DAyyopvl7diUEhK8aNwNkmKlUVMIH4YpDZSLl2/q1tIMoEOYwGsPeEPyZe
|
||||
nMPmBETe/7rxZdspYBiiAk+vCRwQ4RpT2hDt261DENqT/yyOdlQxk+GCYb1Kew==
|
||||
-----END RSA PRIVATE KEY-----
|
1
roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated.pub
Normal file
1
roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated.pub
Normal file
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@c.mx
|
49
roles/common/files/root/.ssh/c.mx-id_rsa-opendkim
Normal file
49
roles/common/files/root/.ssh/c.mx-id_rsa-opendkim
Normal file
@ -0,0 +1,49 @@
|
||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn
|
||||
NhAAAAAwEAAQAAAgEAtkq+Jysyk7JWHKhojkcG7Zb89YIUJCLlojhmK8tgV6G3sXrA3kl/
|
||||
EWnCaoPGDwu8N3jWjTNDW9QWZ4ol5/xmtSjYJFcLPXqPS676Ur+57RTQYw6nIusELok5Cl
|
||||
veBVWh+3OXmqMje1JIndD9O583uNoIYCQYb+/7tWSdz4JeSHtEftGA1GxuTbNDNsnzIuio
|
||||
jlcdyr8XdR2r6667ab99GYalqOPDi09Sjeamo4I1bJvxlS6fADhPhNsckTlwFnyYaatrFO
|
||||
xKnO6CEfUXjd0F9EwzDSRpa0yluQkbdHUA7sz8i2aRUsMoDinxvaZnsFPpqNFwElFudLGQ
|
||||
E1Mcza16erbnP+Iu7zIbXEMa3OZvfykpF0tTOnYXq8cml+KB+9CtPeNNJmt0TkQDJ7p5xY
|
||||
CbIkbZOlKEk0VmNljAvNpl9s/Ab/LK9fXfvdFtc7RAFgkr8RBcvqjyK/Cyh7/hIw8w2bIa
|
||||
OZjpTA66Rqj1PrTBv6Z99fGqaFlu5zkb08KpniQXRe05F9NEuErz3DjL+PBSSKJ0qtnHLT
|
||||
+lTYMBkJqfIdvi8qfOYZznR6Vzmb4Gl5R7eg5THEvDKybYZeide9ceI+AFRqbuofYfWNMi
|
||||
WNy/r+fXe9FgpDtSpSf+zgvOB8T2+vHwGDVamsnZHvyxAKRMlM/WZu5hZPh8s11ckBthIR
|
||||
sAAAdAC79ctAu/XLQAAAAHc3NoLXJzYQAAAgEAtkq+Jysyk7JWHKhojkcG7Zb89YIUJCLl
|
||||
ojhmK8tgV6G3sXrA3kl/EWnCaoPGDwu8N3jWjTNDW9QWZ4ol5/xmtSjYJFcLPXqPS676Ur
|
||||
+57RTQYw6nIusELok5ClveBVWh+3OXmqMje1JIndD9O583uNoIYCQYb+/7tWSdz4JeSHtE
|
||||
ftGA1GxuTbNDNsnzIuiojlcdyr8XdR2r6667ab99GYalqOPDi09Sjeamo4I1bJvxlS6fAD
|
||||
hPhNsckTlwFnyYaatrFOxKnO6CEfUXjd0F9EwzDSRpa0yluQkbdHUA7sz8i2aRUsMoDinx
|
||||
vaZnsFPpqNFwElFudLGQE1Mcza16erbnP+Iu7zIbXEMa3OZvfykpF0tTOnYXq8cml+KB+9
|
||||
CtPeNNJmt0TkQDJ7p5xYCbIkbZOlKEk0VmNljAvNpl9s/Ab/LK9fXfvdFtc7RAFgkr8RBc
|
||||
vqjyK/Cyh7/hIw8w2bIaOZjpTA66Rqj1PrTBv6Z99fGqaFlu5zkb08KpniQXRe05F9NEuE
|
||||
rz3DjL+PBSSKJ0qtnHLT+lTYMBkJqfIdvi8qfOYZznR6Vzmb4Gl5R7eg5THEvDKybYZeid
|
||||
e9ceI+AFRqbuofYfWNMiWNy/r+fXe9FgpDtSpSf+zgvOB8T2+vHwGDVamsnZHvyxAKRMlM
|
||||
/WZu5hZPh8s11ckBthIRsAAAADAQABAAACAH2135pNXOyj4GSU8r2jV7DDHiEEmnUtJ6UO
|
||||
Nc9fyknEeVRIbfcdQia1A2DHDO/VTPAIQhVP09Tg1q6Cg4+O7RljWGL/L/4upeEwgupL06
|
||||
EeaHLXaQVYgyLAePiez+Zn3nP0jAkVFeP2o6NJu0jBjQDKQ1phqgSPv8qg3395zSE4+Mxo
|
||||
F+rl989XnzOKY0Sgo5S9mQr3aurWEnhOoGnVpyTSSS3GHFTW1/yJokNCCSukAx647ueM7b
|
||||
GWFQZFUPoA5G6Cyy67oNzGUiamGZ84W+HUJqSahqR7UBHhqPBPu9vyuvo7Ol6TvOy/mjkK
|
||||
J5le1NUZ0aqgQ4bv6IabG1LvnnUV98n4VNmuuaATBLRsYQwQf2ipcTUMblxnOQwsG5OQ2U
|
||||
Ex21YNQ6JphYiweAWN4UNLFXVm8W0Cyo0/lFu85KlIZ3nKQmDW/pFULuMECksgSR6TdFTN
|
||||
ibh1bjHhETFfeLTFwrhFrpOdpOlvgRdD0xg4jONxUzE1TbNpIlSheDkVaWO7uAZx1K0m8R
|
||||
g/fPNDfvKO+tJuAbiCQrK4+isM8xVcBjew7Lq7EcAhdhgmO4PJoc0sjGkOMF+H1lzkcVxQ
|
||||
bZOFrILbwgsKPh09oLagE5JZ/buXDUgyhkp5zxaQvEUQlDkxjPY1YTKKi3aaPcaZ8ITElq
|
||||
gQe+R5MGMOEIolcyKRAAABAES5JEDLSk2pCjzw9ldZOXlJlQlbR15Yry/j9tFT5dP2RPeP
|
||||
FJL8UkFV2B6AcqxileYC/8w8vnQplLYFu0rImKSYdMTtTD4DmertqALnVNcZsgGDfN5JBS
|
||||
jk+hMJir0w1RVJC2tZY52oEQM2muxU9Pdwp1883eaagl1FnkQO5cRj1YbrQJfckRge26E1
|
||||
oZl+fWRjNsp6zRubxXayKiPgxG+/C4Js2Fkcx+LwzG2neZU0p61d4cW2N2NwK4d1HX1BbV
|
||||
f4UsNVDhudowWYpWRfgHItHUzxovguObCFdFc8PAtMYhtmP8bHMzWByamAqYFO4FR1Pqbc
|
||||
4XoerIClO4fAQ0UAAAEBANhVXTI/ANdYo3XjEeMxXpkkAk2DJq231p2UasRNk20Slr4cYj
|
||||
j3s20qCjS47IDHy6Nsa8hmKXBa4PPZkDteOH9pNtTCcO0QltMVU4bAcMg/693S2R9eOyk/
|
||||
kvoWnieHjdMk8p0kJ0bmtyrABeerRI6UGxm3UMxi3KNJwyGjeedzqFe31eN7oN8flc75gl
|
||||
595HfrJlS5z3Lz6NpVGP9ENc+lYaGHdMMnGunGi2PNXSMCeM9wts97Z7qr61EtclbZ8nq1
|
||||
r4y0RCTDZUjwn1TTodKHFF9HN/5tlAVbV3uxY/1ueejKoMSdDmomBYo9BSIKVNGNV66JwG
|
||||
KvqcsRXIOIoRkAAAEBANe3eueLjCjt/jEdlOOvGCdSt3IXV+A2l23XPUWVrAwYwJVNRRdz
|
||||
3dj4+GvHPKWiG8/s7nYkQl+HU2kv/7xLr6vPVZxHenCiYSgLPhAvEzCHJ/eyryHTqhfIYN
|
||||
uu8VETBRv7o13cQheg28ifgNXGXqkRPTQjirFj1aoJvy1HlZDB8oJGnRrm3QYkOec33h3y
|
||||
g5HXYJ1LdL2C5n4+IxDceDHDdMl2V+bzmDIiFWcW1CCcX8aghbk4dy9Zwtu8oy0GGFRhRu
|
||||
e4N872WOYntW/TKdjAHOvQwOdmbG1NfkddmvGj67atpPfsYDupvEO/l0v/1lMJ3sAfe+i3
|
||||
ZH4xe/X61lMAAAAJcm9vdEBjLm14AQI=
|
||||
-----END OPENSSH PRIVATE KEY-----
|
1
roles/common/files/root/.ssh/c.mx-id_rsa-opendkim.pub
Normal file
1
roles/common/files/root/.ssh/c.mx-id_rsa-opendkim.pub
Normal file
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@c.mx-opendkim
|
1
roles/common/files/root/.ssh/c.mx-id_rsa.pub
Normal file
1
roles/common/files/root/.ssh/c.mx-id_rsa.pub
Normal file
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@c.mx
|
49
roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated
Normal file
49
roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated
Normal file
@ -0,0 +1,49 @@
|
||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn
|
||||
NhAAAAAwEAAQAAAgEA7Sc91UspRVsl8iTDPPolc2stWad9O27ohFYK1yYp08oGDDB4h+Ju
|
||||
JbA90Rn7nSXZInLH4d1VzbeB6bvsRgV2P9T5+I6jPXXT4tBEhEgtnBI+96ALlywJO6Eivq
|
||||
kEWApS2YEvhGbPlIBqZaUedN2CdqNK5yo8hfRFWU5/h2ri1bNehkOUuZWCLJq/YD1iIuRD
|
||||
rPvSo0lk4sn7/0j8QKCe/D6oJzU0dwd6rIxn9lmmpykX7lkSUjJvLBZ0MPgmRbFyIlrVz/
|
||||
pyQzowMjbHiT9yQ+hoZqhlAZFozL0KYc3JpF6ZG+V3ZHxz5j5fYU9IrA5KF9auBTqvZCuX
|
||||
XTHPaZdX8tmwZ2A1ECVKxo/+HvjKrg4L82VZc+trvnxR4Q64MSvBBletVxaUdZ6xIw5wpq
|
||||
JzhZViGLC4dway+Cwb5FEFXbdjm9XowJw93FD0fJ9x15KkIK58s67yakyaE9o5MvbqbNdj
|
||||
ZSKyW9Lfc900TdvFyC2lCT3jDMjZFgpb1uNUsjDbjTDUd2nXEzwAoC79+aRNgNuo8uCJxR
|
||||
x01H+Zm9cqHcuYl+mppKp70Fe9i0y69WEd+6KuudCh67ZMMqgFCAbGXcNtFiSJChgMMsMx
|
||||
1P7TmahjkblvdwQK6+KgiHBT70SDwC9ibeIKm8x2TAAxCQV176y54cbg/f5cxR0GbfB6bl
|
||||
0AAAdA4BwyZOAcMmQAAAAHc3NoLXJzYQAAAgEA7Sc91UspRVsl8iTDPPolc2stWad9O27o
|
||||
hFYK1yYp08oGDDB4h+JuJbA90Rn7nSXZInLH4d1VzbeB6bvsRgV2P9T5+I6jPXXT4tBEhE
|
||||
gtnBI+96ALlywJO6EivqkEWApS2YEvhGbPlIBqZaUedN2CdqNK5yo8hfRFWU5/h2ri1bNe
|
||||
hkOUuZWCLJq/YD1iIuRDrPvSo0lk4sn7/0j8QKCe/D6oJzU0dwd6rIxn9lmmpykX7lkSUj
|
||||
JvLBZ0MPgmRbFyIlrVz/pyQzowMjbHiT9yQ+hoZqhlAZFozL0KYc3JpF6ZG+V3ZHxz5j5f
|
||||
YU9IrA5KF9auBTqvZCuXXTHPaZdX8tmwZ2A1ECVKxo/+HvjKrg4L82VZc+trvnxR4Q64MS
|
||||
vBBletVxaUdZ6xIw5wpqJzhZViGLC4dway+Cwb5FEFXbdjm9XowJw93FD0fJ9x15KkIK58
|
||||
s67yakyaE9o5MvbqbNdjZSKyW9Lfc900TdvFyC2lCT3jDMjZFgpb1uNUsjDbjTDUd2nXEz
|
||||
wAoC79+aRNgNuo8uCJxRx01H+Zm9cqHcuYl+mppKp70Fe9i0y69WEd+6KuudCh67ZMMqgF
|
||||
CAbGXcNtFiSJChgMMsMx1P7TmahjkblvdwQK6+KgiHBT70SDwC9ibeIKm8x2TAAxCQV176
|
||||
y54cbg/f5cxR0GbfB6bl0AAAADAQABAAACAQCfv1lFfjW0xGtRKzZgstfbYYzQ4aPYDyON
|
||||
UTBIMSrnwSRFvbjTP9GWjZt2aRw2hTI4pDzEhoWv5zcZrT7BBBjdcqdXqS2IzwAFvukIel
|
||||
5OzXOg9iwYjs9BXY+8ArosW/fnD8BkXaTikYYaJhnX+wZQyDpCcQ8H5L16JQh+vZ9C+Gpp
|
||||
4sgiIvXm+e6D85VRj5WOxqri1yOgKRMYqZ9SIWA25jX7AznuHBmkdYfqSAWcgG/gXBudRt
|
||||
/gQNfPzLhrJdaOEcYJLNkfM+kXShMq/pQH7lu1GyW+4qZHk+eUbjyv/hEA25eLFtIzfDxf
|
||||
njqDu7RpTnE2kIto3Hw/iLgAlrPkVI8nEoEL7GkWmpm9EyyHL+OgGjEa/PQ4VK9w+WY+Iw
|
||||
iwFORpyFA2uDpuiPYsLkNto//85o2IrBCSx/KMaGhx/INL+4CcKGLjXu/OBFok29vRm44+
|
||||
U8HwNbStN+iyGLqEdH/hbc3Gu6dre8MRRd4h+9aaCncRh5y59mEKNeGwOMmfO6mzu4G1Tq
|
||||
ywuoN6MYqGNpB1TMVN4xS0hLk9m1hfg1WHUeOTqlobRUmZT+ObqJBGIQ45valZSOoHLFLZ
|
||||
p6cw0XasEfl6MWNwHngroi209g71gLL9QzBhK8dJbYd48CtuK9sA7yT6iQ5UlLBueAkpuG
|
||||
RBnoGSVACRhHen+OuUQQAAAQAFWpaNWlPWSNZABzyHSLI76ztgYpY36tix9YfCtXz6IZS5
|
||||
3RFTTkhVgOS+9Z26K7V1jcvTGCo0sEmJPkrChPhtXQhPRJEaNqX3LWAknPDA2Aj2/LUhs4
|
||||
OtygE+todFLOxMi/Sk60BrXHG10xsgHVERN+41G3+K0X+sn7DwBzksO30CSqssRrHe2bgq
|
||||
U5ga/Jos6pPBgqhcTAZWinvgDRzoCfCSdzLXjK5l1pbpV8wlgmlgyEkFyJcXqE4XSz9tS7
|
||||
iJ9E2+L8DwR9b/QorosvEQmlFV1uRFGdZQ/qsBGYAiT5wW232r/5+X3YlaGCD2tFEr0FDL
|
||||
A+MZDe4pz/oswgNoAAABAQD21D98tn3/3B9wtC3ynatTuJnYZI6lgkyiDVbteMYZ22bK7I
|
||||
TZrkfrypc4TW8Hb+e2y/gEUTwQ6zfBHtv9f4yss2vmYfy4dKmCaD2TZg38kAYmFItQSKpI
|
||||
1dFy6+GByqQaZ5ziYXjQM1qpX35Y9EDTuLHWwZfNfuNtc0Jt/Zu5l1Nc0QqHmf8AZWFo5H
|
||||
BMqcFYkBjPfddO/+DDoCy32vBlrPFcr6/zNKESCnaTDopuWqpV9NRWcjOmF+JbNY9CdIDn
|
||||
jp1+mYRsGs26DuoLIqFt26/K2PNI7XyHUocFzHUSmiLZdRAazsK3fYOgKfsEJLkUhlYW52
|
||||
KT0REZ9MSIUHgpAAABAQD19vXtTjeDDlmIwgoX7EHyCX6bXaQL2Iz/fJUeqnsgJV7NIVLC
|
||||
6aPp2DrjBMoSly1TtDgKQDJDlU67hDExD3sqXb8kQjBb5ivfT8H/cC7quj8R3aUX5yNIdK
|
||||
tcZogt/aULr05k5nkdDnoGvExbVMVsXEX0FbtFzDIbmRKyKPlXQdwcH6KHTYgd253tbU3K
|
||||
/Oz1N2DTqsgAukZiUvq4+zcebNXogGygd2M7+bhc3Kftz6Fo/+5ud1qGXha261dxeKG3rM
|
||||
zeROefUKOqLtENRLhTX7i9ARCEPGM8Z8Hmwq6JzJVHfh1ovxF4egImW2Y9NfikKK2qLkei
|
||||
tYQtI6i7GlsVAAAACXJvb3RAZS5teAE=
|
||||
-----END OPENSSH PRIVATE KEY-----
|
1
roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated.pub
Normal file
1
roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated.pub
Normal file
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@e.mx-dehydrated
|
49
roles/common/files/root/.ssh/e.mx-id_rsa-opendkim
Normal file
49
roles/common/files/root/.ssh/e.mx-id_rsa-opendkim
Normal file
@ -0,0 +1,49 @@
|
||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn
|
||||
NhAAAAAwEAAQAAAgEA0SMzlBRpQvUeH9okdzcyeLMpfIZ7MZit7cjyzfCwgiVGNTHFR/NM
|
||||
44gfFfjgA2fKyNjXM1+UDRttLGssPQyUDobj1pSmbs/tacz/pTwDc1lRV+zcqi4qXY5JRT
|
||||
OQ9vYKNRqutT4QBQAlPF2l2UYj72JEEMB2D7bY5QrA/UeLjn212l1NYD9kR5CoLHhiOy9r
|
||||
7ksUw0m2hcidNwOhj1YrYt2JaqU+R/FBsm9U24gpf7JXiavtm6cj2z36Zi+382f+IG25sS
|
||||
jeBgIrePdf9gnAKXHkz/fBfpL/BGyIZH54FKdii/CBDjNUs14qEiv+IqiEucpzOOzv7FCC
|
||||
McAnMeFEXRPGsegJaPPIsSO3QvpNFaqaQEh4XssuOZfc7Nyo7cZhL20WDqHWX5tMonQOYs
|
||||
gfRVuwU69VwUr4wS9fOhmpMAv5u7eWdXs/aUID39R3JQSbevYFC7mf3fj61spYXCCInGor
|
||||
nCw/sZ2Xnn3YgFSO89ODPoPMAbELUdmMytUmaC2+p8z0E+pWanNRfTNY99gsie3FjYDyfC
|
||||
3OCESkqsUqPSZoX05jJIYkqKYEcpPrN+jyYk7SuT4CG9D/L7Uu4KcwLTrm/8dNGl9LWBhF
|
||||
/PQ75ffS6bOZ4+FuIPdgzk9u4NffhHScMnq8kyEmnpu09qBAeS1amv4m5wg3wA0JyxZqEW
|
||||
UAAAdA1JVcF9SVXBcAAAAHc3NoLXJzYQAAAgEA0SMzlBRpQvUeH9okdzcyeLMpfIZ7MZit
|
||||
7cjyzfCwgiVGNTHFR/NM44gfFfjgA2fKyNjXM1+UDRttLGssPQyUDobj1pSmbs/tacz/pT
|
||||
wDc1lRV+zcqi4qXY5JRTOQ9vYKNRqutT4QBQAlPF2l2UYj72JEEMB2D7bY5QrA/UeLjn21
|
||||
2l1NYD9kR5CoLHhiOy9r7ksUw0m2hcidNwOhj1YrYt2JaqU+R/FBsm9U24gpf7JXiavtm6
|
||||
cj2z36Zi+382f+IG25sSjeBgIrePdf9gnAKXHkz/fBfpL/BGyIZH54FKdii/CBDjNUs14q
|
||||
Eiv+IqiEucpzOOzv7FCCMcAnMeFEXRPGsegJaPPIsSO3QvpNFaqaQEh4XssuOZfc7Nyo7c
|
||||
ZhL20WDqHWX5tMonQOYsgfRVuwU69VwUr4wS9fOhmpMAv5u7eWdXs/aUID39R3JQSbevYF
|
||||
C7mf3fj61spYXCCInGornCw/sZ2Xnn3YgFSO89ODPoPMAbELUdmMytUmaC2+p8z0E+pWan
|
||||
NRfTNY99gsie3FjYDyfC3OCESkqsUqPSZoX05jJIYkqKYEcpPrN+jyYk7SuT4CG9D/L7Uu
|
||||
4KcwLTrm/8dNGl9LWBhF/PQ75ffS6bOZ4+FuIPdgzk9u4NffhHScMnq8kyEmnpu09qBAeS
|
||||
1amv4m5wg3wA0JyxZqEWUAAAADAQABAAACAQCq1mWIvg+qWY7tGAYXuGgrPrdR+Izj28Og
|
||||
bTkiT03wUkCCrZBpEO8rIoO6MB3VylBVNwS7+4R2HIRW94kgqYi8QSYWoEFAXeujNIlUUa
|
||||
zD6h9PgrZS8fk7iUKDG/d8NUnrTUuP1A3D9/Vy1VDoJqquHohZYs5OUd/lYZ56h5oRoNEP
|
||||
eo39ZGsnJpyqDwC3NiqlcoGYcTt/F3yNdxLfgtVYIn3hNvCkVgiDmPwphJXZsTZeyKoFL0
|
||||
hUDNHh7XMHi1iE5vz8IdUT9WvLmc+yrQ5jDJ2L4OgX3D4jQAE+jizLOlx+0cyqa/Xxu6cE
|
||||
RxmG+D/LgPwUcUAfuzhPKZca4Ng08fXTLQLnj+a1J6qJ4C6rig7Ky8ZCO0aJQJp+sA1w+c
|
||||
+FfKrPf7eb9E5lsj6inlsJ0pRAGOVYaF+mgE06FCJRBatrgxOFIvcU+SP6LOb6LP0FyTT/
|
||||
24AC2INPwrYr3ima7lksqiYKxGVEB283RfMjWQZsHSL+1si6k43FDVjTwhd2fQFd/Zbvvq
|
||||
IDUKGtAR5F2YcztP49p6eA6pgL4B1hXGqaNe0nPL50Qyk1i+wQv832bbQE6OvWhCb0bBLV
|
||||
KV2cqCHcTpdtMI8ehNonpttPVNiJWXewePvV/IfX3XoOaK9L6p0pDBInxgt2Lu1Q1fr7rK
|
||||
YgALetOM1l5pZfwi6WdQAAAQAbi2gto54QxM2H36AVLhGqOoozv5kjIyJ7eamDXtY2hCly
|
||||
X6HiMUNuxv0Pn3S0XkwvSk1lFLw6I6CaGZ9EXqpNheFPc40ShM4Ddy7V6GiYqE8TLkqqHn
|
||||
B1Ek3/7u5E0eA1NGLzbJF9gThZTOLaQYWrvDfpLB7t75qJey99B4cNCSPwr4xeX2itqdzU
|
||||
TX0q9NZzNjdtELQK9yYMmQsOfsMHUNRZyWGJrp0gwYTDNjSROywnXOxsevMo/k3reZWlPY
|
||||
CsaEBtXxEUh2QbfyQqS0EZ4CM8941rkEvN0aMG9IyL9bkRYI0wX4wlvZI8vpz/iUYsrPck
|
||||
0VKcgc/8LjwakPpjAAABAQDvcXdG2yYw2i5y958TvwEQFkTzfFZGnuJ01+NdJz+fYl83Qz
|
||||
liPYmKe4iJzK3udUSUzx5dNpsNV9HFCzC6wuisJMLWINqXGXieluQkeGX22LU1tUzsQgoT
|
||||
aB709dOI0HeN0ZZTT6m1uI+hCUL1ScnM8DahTJ73Q/d+GfZ8Bp2y7iKaZ3H+LYQcz+n1UD
|
||||
41zKvLx+knUnnu/ZL2VDKzYfgrt8ABwuRTm01lX8Cp0vACd51xrMOMZWrxjncfUcTPjhUh
|
||||
5quT7WCuCri9JxQ8Xa6/YLFbwr209dnQ/a3PtKXY/P7RkC8OZi6CgYqET8JFWvIwKEd6YL
|
||||
Tv8Ah9rTmqH9QLAAABAQDfmUZq9oKsN14XtaS4Ot3rOlwsNDwxheTArQsrS96FLXqIHnQW
|
||||
PhJ537XBNQQRSzSXPe0rpiaq7ITRKitJgNqDmAGzcpdnIirXw5i2P8Z2C0DJ8+/cwCWnzy
|
||||
GtKOO5kD98l94JUVQ34dlCN++7bOLZz9i5CbA7ae+7wm+bXmGGzniK0ciqcm4B/d8vh9NS
|
||||
368KmO8E0WXqV0gcjcpD3LNHq1+dsS2QEUv7HKuAUhdOnKvzoD1yX1Y41z9VvxxUQX6W+U
|
||||
JWipsaP16HEXDV4mJ3qLMV2/0bsEitrFwx40T40qI0Ws6BYH97ywgO57CaK/sf3c/w5iwz
|
||||
g9Yz3ip8GiZPAAAACXJvb3RAZS5teAE=
|
||||
-----END OPENSSH PRIVATE KEY-----
|
1
roles/common/files/root/.ssh/e.mx-id_rsa-opendkim.pub
Normal file
1
roles/common/files/root/.ssh/e.mx-id_rsa-opendkim.pub
Normal file
@ -0,0 +1 @@
|
||||
ssh-rsa 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 root@e.mx-opendkim
|
15
roles/common/tasks/config_files_mailsystem_scripts.yml
Normal file
15
roles/common/tasks/config_files_mailsystem_scripts.yml
Normal file
@ -0,0 +1,15 @@
|
||||
---
|
||||
|
||||
- name: (config_files_mailsystem_scripts.yml) Copy config file templates mailsystem scripts
|
||||
template:
|
||||
src: '{{ item.src_path }}'
|
||||
dest: '{{ item.dest_path }}'
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
loop: "{{ template_files_mailsystem_script }}"
|
||||
loop_control:
|
||||
label: 'dest: {{ item.name }}'
|
||||
when:
|
||||
- template_files_mailsystem_script is defined
|
||||
- template_files_mailsystem_script|length > 0
|
37
roles/common/tasks/copy_files.yml
Normal file
37
roles/common/tasks/copy_files.yml
Normal file
@ -0,0 +1,37 @@
|
||||
---
|
||||
|
||||
|
||||
|
||||
- name: (copy_files.yml) Copy plain files
|
||||
copy:
|
||||
src: '{{ item.src_path }}'
|
||||
dest: '{{ item.dest_path }}'
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
loop: "{{ copy_plain_files }}"
|
||||
loop_control:
|
||||
label: 'dest: {{ item.name }}'
|
||||
when:
|
||||
- copy_plain_files is defined
|
||||
- copy_plain_files|length > 0
|
||||
tags:
|
||||
- copy-files
|
||||
- copy-plain-files
|
||||
|
||||
- name: (copy_files.yml) Copy template files
|
||||
template:
|
||||
src: '{{ item.src_path }}'
|
||||
dest: '{{ item.dest_path }}'
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
loop: "{{ copy_template_files }}"
|
||||
loop_control:
|
||||
label: 'dest: {{ item.name }}'
|
||||
when:
|
||||
- copy_template_files is defined
|
||||
- copy_template_files|length > 0
|
||||
tags:
|
||||
- copy-files
|
||||
- copy-template-files
|
@ -109,6 +109,30 @@
|
||||
- import_tasks: git.yml
|
||||
tags: git
|
||||
|
||||
|
||||
# tags supported inside copy_files.yml:
|
||||
#
|
||||
# copy-files
|
||||
# copy-plain-files
|
||||
# copy-template-files
|
||||
- import_tasks: copy_files.yml
|
||||
tags:
|
||||
- copy-files
|
||||
|
||||
# tags supported inside symlink_files.yml:
|
||||
#
|
||||
# symlink-files
|
||||
- import_tasks: symlink_files.yml
|
||||
tags:
|
||||
- symlink-files
|
||||
|
||||
|
||||
# tags supported inside config_files_mailsystem_scripts.yml:
|
||||
#
|
||||
- import_tasks: config_files_mailsystem_scripts.yml
|
||||
tags:
|
||||
- config-files-mailsystem
|
||||
|
||||
# tags supportetd inside caching-nameserver.yml
|
||||
#
|
||||
# apt-caching-nameserver
|
||||
|
17
roles/common/tasks/symlink_files.yml
Normal file
17
roles/common/tasks/symlink_files.yml
Normal file
@ -0,0 +1,17 @@
|
||||
---
|
||||
|
||||
- name: (symlink_files.yml) Symlink files
|
||||
file:
|
||||
src: '{{ item.src_path }}'
|
||||
dest: '{{ item.dest_path }}'
|
||||
owner: root
|
||||
group: root
|
||||
state: link
|
||||
loop: "{{ symlink_files }}"
|
||||
loop_control:
|
||||
label: 'dest: {{ item.name }}'
|
||||
when:
|
||||
- symlink_files is defined
|
||||
- symlink_files|length > 0
|
||||
tags:
|
||||
- symlink-files
|
@ -95,6 +95,19 @@
|
||||
tags:
|
||||
- authorized_key
|
||||
|
||||
- name: (users.yml) other entries authorized_key files
|
||||
authorized_key:
|
||||
user: "{{ item.user }}"
|
||||
key: "{{ item.key }}"
|
||||
state: present
|
||||
loop: "{{ entries_authorized_key }}"
|
||||
loop_control:
|
||||
label: "{{ item.user }}"
|
||||
when:
|
||||
- entries_authorized_key is defined
|
||||
- entries_authorized_key|length > 0
|
||||
|
||||
|
||||
# ---
|
||||
# - extra system groups
|
||||
# ---
|
||||
@ -144,8 +157,9 @@
|
||||
loop_control:
|
||||
label: '{{ item.priv_key_dest }}'
|
||||
when:
|
||||
- ssh_keypair_backup_server is defined and ssh_keypair_backup_server|length > 0
|
||||
- insert_ssh_keypair_backup_server|bool
|
||||
- ssh_keypair_backup_server is defined
|
||||
- ssh_keypair_backup_server|length > 0
|
||||
tags:
|
||||
- insert-ssh-keypair-backup-server
|
||||
- keypair-backup-server
|
||||
@ -162,8 +176,9 @@
|
||||
loop_control:
|
||||
label: '{{ item.pub_key_dest }}'
|
||||
when:
|
||||
- ssh_keypair_backup_server is defined and ssh_keypair_backup_server|length > 0
|
||||
- insert_ssh_keypair_backup_server|bool
|
||||
- ssh_keypair_backup_server is defined
|
||||
- ssh_keypair_backup_server|length > 0
|
||||
tags:
|
||||
- insert-ssh-keypair-backup-server
|
||||
- keypair-backup-server
|
||||
@ -177,7 +192,9 @@
|
||||
loop: "{{ ssh_keypair_backup_server }}"
|
||||
loop_control:
|
||||
label: 'authorized_keys - user: {{ item.backup_user }}'
|
||||
when: ssh_keypair_backup_server is defined and ssh_keypair_backup_server|length > 0
|
||||
when:
|
||||
- ssh_keypair_backup_server is defined
|
||||
- ssh_keypair_backup_server|length > 0
|
||||
tags:
|
||||
- authorized_key
|
||||
- keypair-backup-server
|
||||
@ -192,26 +209,76 @@
|
||||
path: /root/.ssh
|
||||
state: directory
|
||||
|
||||
- name: (users.yml) Copy default ed25519 ssh private key to user root
|
||||
- name: (users.yml) Copy (backup) ed25519 ssh private key to user root
|
||||
copy:
|
||||
src: '{{ item.priv_key_src }}'
|
||||
dest: '{{ item.priv_key_dest }}'
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0600'
|
||||
#when: groups['oopen_server']|string is search(inventory_hostname)
|
||||
when:
|
||||
- insert_root_ssh_keypair|bool
|
||||
- groups['backup_server']|string is not search(inventory_hostname)
|
||||
- insert_keypair_backup_client|bool
|
||||
- ssh_keypair_backup_client is defined
|
||||
- ssh_keypair_backup_client|length > 0
|
||||
loop: "{{ ssh_keypair_backup_client }}"
|
||||
loop_control:
|
||||
label: 'dest: {{ item.priv_key_dest }}'
|
||||
tags:
|
||||
- insert_ssh_keypair_backup_server
|
||||
|
||||
- name: (users.yml) Copy (backup) ed25519 ssh public key to user root
|
||||
copy:
|
||||
src: '{{ item.pub_key_src }}'
|
||||
dest: '{{ item.pub_key_dest }}'
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0644'
|
||||
when:
|
||||
- insert_keypair_backup_client|bool
|
||||
- ssh_keypair_backup_client is defined
|
||||
- ssh_keypair_backup_client|length > 0
|
||||
loop: "{{ ssh_keypair_backup_client }}"
|
||||
loop_control:
|
||||
label: 'dest: {{ item.pub_key_dest }}'
|
||||
tags:
|
||||
- insert_ssh_keypair_backup_server
|
||||
|
||||
- name: (users.yml) Ensure authorized_key (root) on backup hosts contains public key
|
||||
authorized_key:
|
||||
user: root
|
||||
key: "{{ lookup('file', item.pub_key_src) }}"
|
||||
state: present
|
||||
loop: "{{ ssh_keypair_backup_client }}"
|
||||
loop_control:
|
||||
label: 'authorized_keys - user: root'
|
||||
when:
|
||||
- inventory_hostname == item.target
|
||||
- ssh_keypair_backup_client is defined
|
||||
- ssh_keypair_backup_client|length > 0
|
||||
tags:
|
||||
- authorized_key
|
||||
- ssh-keypair-backup-server
|
||||
|
||||
|
||||
- name: (users.yml) Copy further ssh private key(s) to user root
|
||||
copy:
|
||||
src: '{{ item.priv_key_src }}'
|
||||
dest: '{{ item.priv_key_dest }}'
|
||||
owner: root
|
||||
group: root
|
||||
mode: '0600'
|
||||
loop: "{{ root_ssh_keypair }}"
|
||||
loop_control:
|
||||
label: 'dest: {{ item.priv_key_dest }}'
|
||||
#with_items: '{{ root_ssh_keypair }}'
|
||||
when:
|
||||
- insert_root_ssh_keypair|bool
|
||||
- root_ssh_keypair is defined
|
||||
- root_ssh_keypair|length > 0
|
||||
tags:
|
||||
- insert_root_ssh_keypair
|
||||
- root-defaut-ssh-keypair
|
||||
|
||||
- name: (users.yml) Copy default ed25519 ssh public key to user root
|
||||
- name: (users.yml) Copy further ssh public key(s) to user root
|
||||
copy:
|
||||
src: '{{ item.pub_key_src }}'
|
||||
dest: '{{ item.pub_key_dest }}'
|
||||
@ -221,25 +288,11 @@
|
||||
loop: "{{ root_ssh_keypair }}"
|
||||
loop_control:
|
||||
label: 'dest: {{ item.pub_key_dest }}'
|
||||
#with_items: '{{ root_ssh_keypair }}'
|
||||
when:
|
||||
- insert_root_ssh_keypair|bool
|
||||
- groups['backup_server']|string is not search(inventory_hostname)
|
||||
- root_ssh_keypair is defined
|
||||
- root_ssh_keypair|length > 0
|
||||
tags:
|
||||
- insert_root_ssh_keypair
|
||||
- root-defaut-ssh-keypair
|
||||
|
||||
- name: (users.yml) Ensure authorized_key (root) on backup hosts contains public key
|
||||
authorized_key:
|
||||
user: root
|
||||
key: "{{ lookup('file', item.pub_key_src) }}"
|
||||
state: present
|
||||
loop: "{{ root_ssh_keypair }}"
|
||||
loop_control:
|
||||
label: 'authorized_keys - user: root'
|
||||
#with_items: '{{ root_ssh_keypair }}'
|
||||
when: inventory_hostname == item.target
|
||||
tags:
|
||||
- authorized_key
|
||||
- root-defaut-ssh-keypair
|
||||
|
||||
|
@ -0,0 +1,30 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
# ---
|
||||
# - Parametersettins postfix bases system
|
||||
# ---
|
||||
|
||||
|
||||
_HOSTNAME={{ hostname }}
|
||||
_IPV4='{{ ipv4_address | default(omit) }}'
|
||||
_IPV6='{{ ipv6_address | default(omit) }}'
|
||||
|
||||
_QUARANTINE_DIR=/var/QUARANTINE
|
||||
_QUARANTINE_ADMIN=postmaster\@$mydomain
|
||||
|
||||
_DB_IN_USE=true
|
||||
{% if "PostgreSQL" == postfix_db_type %}
|
||||
_DB_TYPE=PostgreSQL
|
||||
{% else %}
|
||||
_DB_TYPE=MySQL
|
||||
{% endif %}
|
||||
_DB_HOST={{ postfix_db_host | default(omit) }}
|
||||
_DB_NAME={{ postfix_db_name | default(omit) }}
|
||||
_DB_USER={{ postfix_db_user | default(omit) }}
|
||||
_DB_PASS='{{ postfix_db_pass | default(omit) }}'
|
||||
_INSTALL_CLAMAV_UNOFFICIAL_SIGS=true
|
||||
_MALWARE_PATROL_IN_USE=true
|
||||
_MALWERE_PATROL_FREE=false
|
||||
_MP_RECEIPT_NUMBER={{ mp_receipt_number | default(omit) }}
|
||||
_SECURITE_INFO_IN_USE=true
|
||||
_SI_AUTHORISATION_SIGNATURE={{ si_authorisation_signature | default(omit) }}
|
@ -0,0 +1,275 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
# -----------------------------------------------
|
||||
# - Configuration for postfixadmin install script
|
||||
# -----------------------------------------------
|
||||
|
||||
# - Name of the website - usualy 'webmail.<domain>.<tld>'
|
||||
# -
|
||||
WEBSITE_NAME="{{ website_name_postfixadmin | default(omit) }}"
|
||||
|
||||
# - IPv4 Address
|
||||
# -
|
||||
IPV4='{{ ipv4_address | default(omit) }}'
|
||||
|
||||
# - IPv6 Address
|
||||
# -
|
||||
IPV6='{{ ipv6_address | default(omit) }}'
|
||||
|
||||
# - Is apache installed from debian package system ?
|
||||
# -
|
||||
# - Boolean, possible values are 'true', 'false'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
#
|
||||
#APACHE_DEBIAN_INSTALLATION=""
|
||||
|
||||
# - Apache User
|
||||
# -
|
||||
# - If ommitted, script tries to determine the user under which user the webserver
|
||||
# - is running. If that fails, parameter defaults to 'www-data'
|
||||
# -
|
||||
#HTTP_USER=""
|
||||
|
||||
# - Apache Group
|
||||
# -
|
||||
# - If ommitted, script tries to determine the user under which group the webserver
|
||||
# - is running. If that fails, parameter defaults to 'www-data'
|
||||
# -
|
||||
#HTTP_GROUP=""
|
||||
|
||||
# - Webmasters E-Mail Address
|
||||
# -
|
||||
# - Defaults to 'admin@<domain>.<tld>'
|
||||
# -
|
||||
#WEBMASTER_EMAIL=""
|
||||
|
||||
# - Base Directory of Roundcube Website
|
||||
# -
|
||||
# - Note: it's not the 'DocumentRoot' directory, but the directory where
|
||||
# - the 'DocumentRoot' Directory lives.
|
||||
# -
|
||||
# - Defaults to '/var/www/$WEBSITE_NAME'
|
||||
# -
|
||||
#WEBSITE_BASEDIR=""
|
||||
|
||||
# - Directory, where apache places the log-files for thw webmailers site.
|
||||
# -
|
||||
# - Defaults to '/var/log/apache2'
|
||||
# -
|
||||
#APACHE_LOG_DIR=""
|
||||
|
||||
# - Directory where certificate and key for the roundcube website
|
||||
# - are stored.
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME"
|
||||
# -
|
||||
# - Defaults to
|
||||
# - '/etc/apache2' if apache is installed from debian package system
|
||||
# - '/usr/local/apache2/conf' otherwise
|
||||
# -
|
||||
APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME"
|
||||
|
||||
# - Certificate for the Rounfcube Website
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_SERVER_CERT="fullchain.pem"
|
||||
# -
|
||||
# - Defaults to 'server-bundle.crt'
|
||||
# -
|
||||
APACHE_SERVER_CERT="fullchain.pem"
|
||||
|
||||
# - Key File for the Rounfcube Website
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_SERVER_KEY="privkey.pem"
|
||||
# -
|
||||
# - Defaults to 'server.key'
|
||||
# -
|
||||
APACHE_SERVER_KEY="privkey.pem"
|
||||
|
||||
# - Certification Chain File
|
||||
# -
|
||||
# - Deprecated since Apache 2.4 - Leave empty if not present
|
||||
# -
|
||||
#CERT_ChainFile=""
|
||||
|
||||
|
||||
# - Is PHP installed from debian package system ?
|
||||
# -
|
||||
# - Boolean, possible values are 'true', 'false'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
#
|
||||
#PHP_DEBIAN_INSTALLATION=""
|
||||
|
||||
# - Type of PHP installation.
|
||||
# -
|
||||
# - Possible values are: 'php_fpm' , 'fcgid' , 'mod_php
|
||||
# -
|
||||
# - defaults to 'php_fpm''
|
||||
# -
|
||||
#PHP_TYPE=""
|
||||
|
||||
# - Directory where apache vhosts definitions live.
|
||||
# -
|
||||
# - Defaults to
|
||||
# - '/etc/apache2/sites-available' if installed from debain package system
|
||||
# - '/usr/local/apache2/conf/vhosts' otherwise
|
||||
# -
|
||||
#APACHE_VHOST_DIR=""
|
||||
|
||||
# - Hostname for vacation / absence messages
|
||||
# -
|
||||
# - Defaults to 'autoreply.<domain>.<tld>
|
||||
# -
|
||||
#AUTOREPLY_HOSTNAME=""
|
||||
|
||||
|
||||
|
||||
# - Is MySQL installed from debian package system?
|
||||
# -
|
||||
# - Only needed, if DB_TYPE is set to 'mysql'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
# -
|
||||
#MYSQL_DEBIAN_INSTALLATION=""
|
||||
|
||||
# - mysql_credential_args (root access to MySQL Database)
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system
|
||||
# - '/usr/local/mysql/sys-maint.cnf' otherwise
|
||||
# -
|
||||
#MYSQL_CREDENTIALS=""
|
||||
|
||||
|
||||
# - The wa passwords will be encrypted.
|
||||
# -
|
||||
# - $CONF['encrypt']
|
||||
# -
|
||||
# - Possible values:
|
||||
# - md5crypt = internal postfix admin md5
|
||||
# - md5 = md5 sum of the password
|
||||
# - cleartext = clear text passwords
|
||||
# - mysql_encrypt = useful for PAM integration
|
||||
# -
|
||||
# - authlib = support for courier-authlib style passwords - also set $CONF['authlib_default_flavor']
|
||||
# - dovecot:CRYPT-METHOD = use dovecotpw -s 'CRYPT-METHOD'. Example: dovecot:CRAM-MD5
|
||||
# - IMPORTANT:
|
||||
# - - don't use dovecot:* methods that include the username in the hash - you won't be able
|
||||
# - to login to PostfixAdmin in this case
|
||||
# - - you'll need at least dovecot 2.1 for salted passwords ('doveadm pw' 2.0.x doesn't support the '-t' option)
|
||||
# - - dovecot 2.0.0 - 2.0.7 is not supported
|
||||
# -
|
||||
# - Example:
|
||||
# -
|
||||
# - ENCRYPTION_METHOD="cleartext"
|
||||
# - ENCRYPTION_METHOD="dovecot:CRAM-MD5"
|
||||
# -
|
||||
ENCRYPTION_METHOD="dovecot:SHA512-CRYPT"
|
||||
|
||||
# - If you use the dovecot encryption method: where is the dovecotpw binary located?
|
||||
# -
|
||||
# - Defaults to '/usr/local/dovecot/bin/doveadm pw'
|
||||
# -
|
||||
#DOVEADM_PW=""
|
||||
|
||||
# - Directory where deleted mailbox will be saved
|
||||
# -
|
||||
# - defaults to '/var/deleted-maildirs'
|
||||
# -
|
||||
#DELETED_MAILBOX_DIR=
|
||||
|
||||
# - Directory where deleted domains will be saved
|
||||
# -
|
||||
# - defaults to '/var/deleted-maildomains'
|
||||
# -
|
||||
#DELETED_DOMAINS_DIR=
|
||||
|
||||
# - Welcome Message
|
||||
# - This message is send to every newly created mailbox.
|
||||
# -
|
||||
WELCOME_MESSAGE="
|
||||
{{ email_welcome_message }}
|
||||
"
|
||||
|
||||
|
||||
# ==========
|
||||
# - Settings Postfix Database
|
||||
# ==========
|
||||
|
||||
# - Type of Postfix database
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
{% if "PostgreSQL" == postfix_db_type %}
|
||||
POSTFIX_DB_TYPE="pgsql"
|
||||
{% else %}
|
||||
POSTFIX_DB_TYPE="mysql"
|
||||
{% endif %}
|
||||
|
||||
# - Host/Socket of Postfix Database (MySQL)
|
||||
# -
|
||||
# - Example:
|
||||
# - POSTFIX_DB_HOST_MYSQL="127.0.0.1"
|
||||
# - POSTFIX_DB_HOST_MYSQL="unix:/tmp/mysql.sock"
|
||||
# -
|
||||
# - Note:
|
||||
# - Dont't use 'localhost' if your MySQL socket is NOT
|
||||
# - located at '/var/run/mysqld/mysqld.sock'
|
||||
# -
|
||||
# - Defaults to 'unix:/tmp/mysql.sock'
|
||||
# -
|
||||
#POSTFIX_DB_HOST_MYSQL=""
|
||||
|
||||
# - Host/Socket of Postfix Database (PostgeSQL)
|
||||
# -
|
||||
# - Example:
|
||||
# - POSTFIX_DB_HOST_PGSQL='/var/run/postgresql'
|
||||
# -
|
||||
# - Defaults to '/var/run/postgresql'
|
||||
# -
|
||||
#POSTFIX_DB_HOST_PGSQL=""
|
||||
|
||||
# - Name of Postfix Database
|
||||
# -
|
||||
# - Defaults to 'postfix'
|
||||
# -
|
||||
#POSTFIX_DB_NAME=
|
||||
|
||||
# - User of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Defaults to 'postfix'
|
||||
# -
|
||||
#POSTFIX_DB_USER=""
|
||||
|
||||
# - Password of Postfix Database
|
||||
# -
|
||||
POSTFIX_DB_PASS='{{ postfix_db_pass | default(omit) }}'
|
||||
|
||||
|
||||
# ==========
|
||||
# - vacation
|
||||
# ==========
|
||||
|
||||
# - Vacation User
|
||||
# -
|
||||
# - Defaults to 'vacation'
|
||||
# -
|
||||
#VACATION_USER=""
|
||||
|
||||
# - Vacation Group
|
||||
# -
|
||||
# - Defaults to ''
|
||||
# -
|
||||
#VACATION_GROUP="vacation"
|
||||
|
@ -0,0 +1,168 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
# {{ ansible_managed }}
|
||||
|
||||
## ===================================================================
|
||||
## - Configuration File: Install/Update Dovecot Server
|
||||
## ===================================================================
|
||||
|
||||
# ---
|
||||
# --- Configure Settings for your Server here..
|
||||
# ---
|
||||
|
||||
|
||||
# ---
|
||||
# - Base Configuration
|
||||
# ---
|
||||
|
||||
# - Set update=false if that is a new installation
|
||||
# -
|
||||
# - This parameter must be set here! There is no default value.
|
||||
# -
|
||||
_update=true
|
||||
|
||||
|
||||
# - Install dovecot with systemd support
|
||||
# -
|
||||
# - Defaults to 'true' if systemd is present, otherwise to 'false'
|
||||
# -
|
||||
systemd_support="true"
|
||||
|
||||
|
||||
# - postmaster_address
|
||||
# -
|
||||
# - This parameter must be set here! There is no default value.
|
||||
# -
|
||||
# - Example:
|
||||
# - postmaster_address="admin\@warenform.net"
|
||||
# -
|
||||
postmaster_address="admin\@oopen.de"
|
||||
|
||||
|
||||
# - hostname
|
||||
# -
|
||||
# - This parameter must be set here! There is no default value.
|
||||
# -
|
||||
hostname="{{ hostname | default(omit) }}"
|
||||
|
||||
|
||||
# - IPv4 / IPv6 Addressen
|
||||
# -
|
||||
ipv4="{{ ipv4_address | default(omit) }}"
|
||||
ipv6="{{ ipv6_address | default(omit) }}"
|
||||
|
||||
|
||||
# ---
|
||||
# - Listener configuration
|
||||
# ---
|
||||
if [[ -n "$ipv6" ]]; then
|
||||
imap_listener_adresses="127.0.0.1 $ipv4 $ipv6"
|
||||
imaps_listener_adresses="$ipv4 $ipv6"
|
||||
|
||||
pop_listener_adresses="$ipv4 $ipv6"
|
||||
pops_listener_adresses="$ipv4 $ipv6"
|
||||
else
|
||||
imap_listener_adresses="127.0.0.1 $ipv4"
|
||||
imaps_listener_adresses="$ipv4"
|
||||
|
||||
pop_listener_adresses="$ipv4"
|
||||
pops_listener_adresses="$ipv4"
|
||||
fi
|
||||
|
||||
xmpp_listener=false
|
||||
xmpp_listener_addresses="$ipv4 $ipv6"
|
||||
xmpp_listener_port="44444"
|
||||
|
||||
# ---
|
||||
# - Database settings
|
||||
# ---
|
||||
|
||||
# - database
|
||||
# -
|
||||
# - This parameter must be set here! There is no default value.
|
||||
# -
|
||||
# - Possible values for parameter database are only 'mysql' and 'postgres'
|
||||
# -
|
||||
{% if "PostgreSQL" == postfix_db_type %}
|
||||
database="postgres"
|
||||
{% else %}
|
||||
database="mysql"
|
||||
{% endif %}
|
||||
|
||||
# - dbname
|
||||
# -
|
||||
# - Defaults to 'postfix'
|
||||
dbname={{ postfix_db_name | default(omit) }}
|
||||
|
||||
# - dbuser
|
||||
# -
|
||||
# - Defaults to 'postfix'
|
||||
# -
|
||||
dbuser={{ postfix_db_user | default(omit) }}
|
||||
|
||||
# - dbpassword
|
||||
# -
|
||||
# - This parameter must be set here!
|
||||
# -
|
||||
dbpassword="{{ postfix_db_pass | default(omit) }}"
|
||||
|
||||
# - dbhost
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - '/var/run/postgresql' if database is set to 'postgres'
|
||||
# - '127.0.0.1' if database is set to 'mysql'
|
||||
# -
|
||||
{% if postfix_db_type == 'PostgeSQL' %}
|
||||
dbhost=/var/run/postgresql
|
||||
{% else %}
|
||||
dbhost={{ postfix_db_host | default(omit) }}
|
||||
{% endif %}
|
||||
|
||||
# - default_pass_scheme
|
||||
# -
|
||||
# - Password databases have a default password scheme.
|
||||
# -
|
||||
# - The password scheme can be overridden for each password by prefixing
|
||||
# - it with {SCHEME}, for example: {SHA512-CRYPT}pass.
|
||||
# -
|
||||
# - See: https://wiki.dovecot.org/Authentication/PasswordSchemes
|
||||
# -
|
||||
# - Defaults to 'PLAIN'
|
||||
# -
|
||||
default_pass_scheme=PLAIN
|
||||
|
||||
|
||||
# ---
|
||||
# - Cert/Key configurations
|
||||
# ---
|
||||
|
||||
cert_base_dir="/etc/dovecot/ssl"
|
||||
server_cert=${cert_base_dir}/mailserver.crt
|
||||
server_key=${cert_base_dir}/mailserver.key
|
||||
dh_pem_file="${cert_base_dir}/dh_4096.pem"
|
||||
|
||||
imap_cert=${cert_base_dir}/mailserver.crt
|
||||
imap_key=${cert_base_dir}/mailserver.key
|
||||
|
||||
pop_cert=${cert_base_dir}/mailserver.crt
|
||||
pop_key=${cert_base_dir}/mailserver.key
|
||||
|
||||
|
||||
# - Other settings
|
||||
# -
|
||||
spam_folder=Spam
|
||||
|
||||
max_userip_connections=48
|
||||
#auth_mechanisms="plain login digest-md5 cram-md5"
|
||||
auth_mechanisms="plain login"
|
||||
|
||||
# - Settings for quota warning sript
|
||||
# -
|
||||
from_address="{{ dovecot_from_address | default(omit) }}"
|
||||
reply_to="{{ dovecot_reply_to | default(omit) }}"
|
||||
webmailer="{{ webmailer_address | default(omit) }}"
|
||||
salutation="{{ salutation | default(omit) }}"
|
||||
|
||||
# ---
|
||||
# --- End server-specific Settings
|
||||
# ---
|
@ -0,0 +1,365 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
# ----------------------------------------------------
|
||||
# - Configuration for roundcube install/upgrade script
|
||||
# ----------------------------------------------------
|
||||
|
||||
# - Name of the website - usualy 'webmail.<domain>.<tld>'
|
||||
# -
|
||||
WEBSITE_NAME="{{ webmail_site_name | default(omit) }}"
|
||||
|
||||
# - IPv4 Address
|
||||
# -
|
||||
IPV4="{{ ipv4_address | default(omit) }}"
|
||||
|
||||
# - IPv6 Address
|
||||
# -
|
||||
IPV6="{{ ipv6_address | default(omit) }}"
|
||||
|
||||
# - Is apache installed from debian package system ?
|
||||
# -
|
||||
# - Boolean, possible values are 'true', 'false'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
#
|
||||
#APACHE_DEBIAN_INSTALLATION=""
|
||||
|
||||
# - Apache User
|
||||
# -
|
||||
# - If ommitted, script tries to determine the user under which user the webserver
|
||||
# - is running. If that fails, parameter defaults to 'www-data'
|
||||
# -
|
||||
#HTTP_USER=""
|
||||
|
||||
# - Apache Group
|
||||
# -
|
||||
# - If ommitted, script tries to determine the user under which group the webserver
|
||||
# - is running. If that fails, parameter defaults to 'www-data'
|
||||
# -
|
||||
#HTTP_GROUP=""
|
||||
|
||||
# - Webmasters E-Mail Address
|
||||
# -
|
||||
# - Defaults to 'admin@<domain>.<tld>'
|
||||
# -
|
||||
#WEBMASTER_EMAIL=""
|
||||
|
||||
# - Base Directory of Roundcube Website
|
||||
# -
|
||||
# - Note: it's not the 'DocumentRoot' directory, but the directory where
|
||||
# - the 'DocumentRoot' Directory lives.
|
||||
# -
|
||||
# - Defaults to '/var/www/webmail/$WEBSITE_NAME'
|
||||
# -
|
||||
#WEBSITE_BASEDIR=""
|
||||
|
||||
|
||||
# - Directory for storing temporary files
|
||||
# -
|
||||
# - Defaults to '${WEBMAIL_BASEDIR}/temp"
|
||||
# -
|
||||
#ROUNDCUBE_TMPDIR=""
|
||||
|
||||
# - Directory, where apache places the log-files for thw webmailers site.
|
||||
# -
|
||||
# - Defaults to '/var/log/apache2'
|
||||
# -
|
||||
#APACHE_LOG_DIR=""
|
||||
|
||||
# - Directory where certificate and key for the roundcube website
|
||||
# - are stored.
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME"
|
||||
# -
|
||||
# - Defaults to
|
||||
# - '/etc/apache2' if apache is installed from debian package system
|
||||
# - '/usr/local/apache2/conf' otherwise
|
||||
# -
|
||||
APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME"
|
||||
|
||||
# - Certificate for the Rounfcube Website
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_SERVER_CERT="fullchain.pem"
|
||||
# -
|
||||
# - Defaults to 'server-bundle.crt'
|
||||
# -
|
||||
APACHE_SERVER_CERT="fullchain.pem"
|
||||
|
||||
# - Key File for the Rounfcube Website
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_SERVER_KEY="privkey.pem"
|
||||
# -
|
||||
# - Defaults to 'server.key'
|
||||
# -
|
||||
APACHE_SERVER_KEY="privkey.pem"
|
||||
|
||||
# - Certification Chain File
|
||||
# -
|
||||
# - Deprecated since Apache 2.4 - Leave empty if not present
|
||||
# -
|
||||
#CERT_ChainFile=""
|
||||
|
||||
|
||||
# - Is PHP installed from debian package system ?
|
||||
# -
|
||||
# - Boolean, possible values are 'true', 'false'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
#
|
||||
PHP_DEBIAN_INSTALLATION="false"
|
||||
|
||||
# - Type of PHP installation.
|
||||
# -
|
||||
# - Possible values are: 'php_fpm' , 'fcgid' , 'mod_php
|
||||
# -
|
||||
# - defaults to 'php_fpm''
|
||||
# -
|
||||
#PHP_TYPE=""
|
||||
|
||||
# - Directory where apache vhosts definitions live.
|
||||
# -
|
||||
# - Defaults to
|
||||
# - '/etc/apache2/sites-available' if installed from debain package system
|
||||
# - '/usr/local/apache2/conf/vhosts' otherwise
|
||||
# -
|
||||
#APACHE_VHOST_DIR=""
|
||||
|
||||
# - Hostname for vacation / absence messages
|
||||
# -
|
||||
# - Defaults to 'autoreply.<domain>.<tld>
|
||||
# -
|
||||
AUTOREPLY_HOSTNAME="{{ autoreply_hostname | default(omit) }}"
|
||||
|
||||
# - Database type for Roundcube
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
DB_TYPE="{{ roundcube_db_type | default(omit) }}"
|
||||
|
||||
# - Host of Roundcube Database
|
||||
# -
|
||||
# - Defaults to 'localhost'
|
||||
# -
|
||||
DB_HOST="{{ roundcube_db_host | default(omit) }}"
|
||||
|
||||
# - Name of Roundcube Database
|
||||
# -
|
||||
# - Defaults to 'roundcubemail'
|
||||
# -
|
||||
DB_NAME="{{ roundcube_db_name | default(omit) }}"
|
||||
|
||||
# - User of Roundcube Database
|
||||
# -
|
||||
# - Defaults to 'roundcube'
|
||||
# -
|
||||
DB_USER="{{ roundcube_db_user | default(omit) }}"
|
||||
|
||||
# - Password of Roundcube Database
|
||||
# -
|
||||
DB_PASS='{{ roundcube_db_pass | default(omit) }}'
|
||||
|
||||
|
||||
# - Is MySQL installed from debian package system?
|
||||
# -
|
||||
# - Only needed, if DB_TYPE is set to 'mysql'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
# -
|
||||
#MYSQL_DEBIAN_INSTALLATION=""
|
||||
|
||||
# - mysql_credential_args (root access to MySQL Database)
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system
|
||||
# - '/usr/local/mysql/sys-maint.cnf' otherwise
|
||||
# -
|
||||
#MYSQL_CREDENTIALS=""
|
||||
|
||||
# - Name of the folder where (assumed) junk mails will be stored
|
||||
# -
|
||||
# - Defaults to 'Spam'
|
||||
# -
|
||||
#SPAM_FOLDER_NAME=""
|
||||
|
||||
# - You can set your own product name to replace the default.
|
||||
# -
|
||||
# - Defaults to 'Roundcube Webmail'
|
||||
# -
|
||||
PRODUCT_NAME="{{ roundcube_product_name | default(omit) }}"
|
||||
|
||||
# - URL for users, to get in contact if something goes wrong
|
||||
# -
|
||||
# - Defaults to 'www.<domain>.<tld>'
|
||||
# -
|
||||
SUPPORT_URL="{{ roundcube_support_url | default(omit) }}"
|
||||
|
||||
# - Provide your own logo under this URI
|
||||
# -
|
||||
# - Note: this script will NOT place the logo. You have to do this by your own
|
||||
# - after installation is finisched.
|
||||
# -
|
||||
# - Default is empty
|
||||
# -
|
||||
SKIN_LOGO="{{ roundcube_skin_logo | default(omit) }}"
|
||||
|
||||
|
||||
|
||||
# --------------------
|
||||
# - Plugins Configuration
|
||||
# --------------------
|
||||
|
||||
|
||||
# ==========
|
||||
# - Settings Postfix Database
|
||||
# ==========
|
||||
|
||||
# - Type of Postfix database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
{% if "PostgreSQL" == postfix_db_type %}
|
||||
POSTFIX_DB_TYPE="pgsql"
|
||||
{% else %}
|
||||
POSTFIX_DB_TYPE="mysql"
|
||||
{% endif %}
|
||||
|
||||
# - Host of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Defaults to 'localhost'
|
||||
# -
|
||||
POSTFIX_DB_HOST="{{ postfix_db_host | default(omit) }}"
|
||||
|
||||
# - Name of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Defaults to 'postfix'
|
||||
# -
|
||||
POSTFIX_DB_NAME="{{ postfix_db_name | default(omit) }}"
|
||||
|
||||
# - User of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Defaults to 'postfix'
|
||||
# -
|
||||
POSTFIX_DB_USER="{{ postfix_db_user | default(omit) }}"
|
||||
|
||||
# - Password of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
POSTFIX_DB_PASSWD='{{ postfix_db_pass | default(omit) }}'
|
||||
|
||||
|
||||
# ===
|
||||
# - Plugin acl
|
||||
# ===
|
||||
|
||||
# - Activate plugin 'acl'?
|
||||
# -
|
||||
# - Boolean - possible values are 'true' and 'false'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
# -
|
||||
INCLUDE_ACL_PLUGIN="true"
|
||||
|
||||
|
||||
# ===
|
||||
# - Plugin password (change password)
|
||||
# ===
|
||||
|
||||
# - Is current password reqired
|
||||
# -
|
||||
# - $config['password_confirm_current']
|
||||
# -
|
||||
# - Boolean - possible values are 'true' and 'false'
|
||||
# -
|
||||
# - Defaults to 'true'
|
||||
# -
|
||||
#PW_CONFIRM_CURRENT=""
|
||||
|
||||
# - Minimun length if new password
|
||||
# -
|
||||
# - $config['password_minimum_length']
|
||||
# -
|
||||
# - Defaults to '10'
|
||||
# -
|
||||
#PW_MIN_LENGTH=""
|
||||
|
||||
# - New Password requires nonalpha character
|
||||
# -
|
||||
# - $config['password_require_nonalpha']
|
||||
# -
|
||||
# - Boolean - possible values are 'true' and 'false'
|
||||
# -
|
||||
# - Defaults to 'true'
|
||||
# -
|
||||
#PW_REQUIRE_NONALPHA=''
|
||||
|
||||
# - Default password hashing/crypting algorithm.
|
||||
# -
|
||||
# - $config['password_algorithm']
|
||||
# -
|
||||
# - Possible values: des-crypt, ext-des-crypt, md5-crypt, blowfish-crypt,
|
||||
# - sha256-crypt, sha512-crypt, md5, sha, smd5, ssha, samba,
|
||||
# - ad, dovecot, clear.
|
||||
# -
|
||||
# - Defaults to 'dovecot'
|
||||
# -
|
||||
PW_PASSWD_ALGO='dovecot'
|
||||
|
||||
# - Password prefix (e.g. {CRYPT}, {SHA}, {CRAM-MD5}) for passwords generated
|
||||
# -
|
||||
# - $config['password_algorithm_prefix']
|
||||
# -
|
||||
# - Defaults to '{CRAM-MD5}'
|
||||
# -
|
||||
PW_PASSWD_ALGO_PREFIX='{SHA512-CRYPT}'
|
||||
|
||||
# - Path for dovecotpw/doveadm-pw
|
||||
# -
|
||||
# - $config['password_dovecotpw']
|
||||
# -
|
||||
# - Defaults to '/usr/local/dovecot/bin/doveadm pw'
|
||||
# -
|
||||
#PW_DOVEADM_PW=''
|
||||
|
||||
# - Dovecot password scheme.
|
||||
# -
|
||||
# - $config['password_dovecotpw_method']
|
||||
# -
|
||||
# - Defaults to 'CRAM-MD5
|
||||
# -
|
||||
PW_DOVECOT_PW_METHOD='SHA512-CRYPT'
|
||||
|
||||
# - The SQL query used to change the password.
|
||||
# -
|
||||
# - $config['password_query']
|
||||
# -
|
||||
PW_DB_UPDATE_STRING='UPDATE mailbox SET password=%P WHERE username=%u'
|
||||
|
||||
|
||||
# ==========
|
||||
# - Plugin password vacation
|
||||
# ==========
|
||||
|
||||
# - allow vacation forwarder
|
||||
# -
|
||||
# - $rcmail_config['vacation_gui_vacationforwarder'] = FALSE;
|
||||
# -
|
||||
# - defaults to 'false'
|
||||
# -
|
||||
#VAC_GUI_FORWARDER=false
|
@ -0,0 +1,356 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
# ----------------------------------------------------
|
||||
# - Configuration for roundcube install/upgrade script
|
||||
# ----------------------------------------------------
|
||||
|
||||
# - Name of the website - usualy 'webmail.<domain>.<tld>'
|
||||
# -
|
||||
WEBSITE_NAME="{{ webmaili_2_site_name | default(omit) }}"
|
||||
|
||||
# - IPv4 Address
|
||||
# -
|
||||
IPV4="{{ ipv4_address | default(omit) }}"
|
||||
|
||||
# - IPv6 Address
|
||||
# -
|
||||
IPV6="{{ ipv6_address | default(omit) }}"
|
||||
|
||||
# - Is apache installed from debian package system ?
|
||||
# -
|
||||
# - Boolean, possible values are 'true', 'false'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
#
|
||||
#APACHE_DEBIAN_INSTALLATION=""
|
||||
|
||||
# - Apache User
|
||||
# -
|
||||
# - If ommitted, script tries to determine the user under which user the webserver
|
||||
# - is running. If that fails, parameter defaults to 'www-data'
|
||||
# -
|
||||
#HTTP_USER=""
|
||||
|
||||
# - Apache Group
|
||||
# -
|
||||
# - If ommitted, script tries to determine the user under which group the webserver
|
||||
# - is running. If that fails, parameter defaults to 'www-data'
|
||||
# -
|
||||
#HTTP_GROUP=""
|
||||
|
||||
# - Webmasters E-Mail Address
|
||||
# -
|
||||
# - Defaults to 'admin@<domain>.<tld>'
|
||||
# -
|
||||
#WEBMASTER_EMAIL=""
|
||||
|
||||
# - Base Directory of Roundcube Website
|
||||
# -
|
||||
# - Note: it's not the 'DocumentRoot' directory, but the directory where
|
||||
# - the 'DocumentRoot' Directory lives.
|
||||
# -
|
||||
# - Defaults to '/var/www/webmail/$WEBSITE_NAME'
|
||||
# -
|
||||
#WEBSITE_BASEDIR=""
|
||||
|
||||
|
||||
# - Directory for storing temporary files
|
||||
# -
|
||||
# - Defaults to '${WEBMAIL_BASEDIR}/temp"
|
||||
# -
|
||||
#ROUNDCUBE_TMPDIR=""
|
||||
|
||||
# - Directory, where apache places the log-files for thw webmailers site.
|
||||
# -
|
||||
# - Defaults to '/var/log/apache2'
|
||||
# -
|
||||
#APACHE_LOG_DIR=""
|
||||
|
||||
# - Directory where certificate and key for the roundcube website
|
||||
# - are stored.
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME"
|
||||
# -
|
||||
# - Defaults to
|
||||
# - '/etc/apache2' if apache is installed from debian package system
|
||||
# - '/usr/local/apache2/conf' otherwise
|
||||
# -
|
||||
APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME"
|
||||
|
||||
# - Certificate for the Rounfcube Website
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_SERVER_CERT="fullchain.pem"
|
||||
# -
|
||||
# - Defaults to 'server-bundle.crt'
|
||||
# -
|
||||
APACHE_SERVER_CERT="fullchain.pem"
|
||||
|
||||
# - Key File for the Rounfcube Website
|
||||
# -
|
||||
# - Example:
|
||||
# - APACHE_SERVER_KEY="privkey.pem"
|
||||
# -
|
||||
# - Defaults to 'server.key'
|
||||
# -
|
||||
APACHE_SERVER_KEY="privkey.pem"
|
||||
|
||||
# - Certification Chain File
|
||||
# -
|
||||
# - Deprecated since Apache 2.4 - Leave empty if not present
|
||||
# -
|
||||
#CERT_ChainFile=""
|
||||
|
||||
# - Type of PHP installation.
|
||||
# -
|
||||
# - Possible values are: 'php_fpm' , 'fcgid' , 'mod_php
|
||||
# -
|
||||
# - defaults to 'php_fpm''
|
||||
# -
|
||||
#PHP_TYPE=""
|
||||
|
||||
# - Directory where apache vhosts definitions live.
|
||||
# -
|
||||
# - Defaults to
|
||||
# - '/etc/apache2/sites-available' if installed from debain package system
|
||||
# - '/usr/local/apache2/conf/vhosts' otherwise
|
||||
# -
|
||||
#APACHE_VHOST_DIR=""
|
||||
|
||||
# - Hostname for vacation / absence messages
|
||||
# -
|
||||
# - Defaults to 'autoreply.<domain>.<tld>
|
||||
# -
|
||||
AUTOREPLY_HOSTNAME="{{ autoreply_2_hostname | default(omit) }}"
|
||||
|
||||
# - Database type for Roundcube
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
DB_TYPE="{{ roundcube_2_db_type | default(omit) }}"
|
||||
|
||||
# - Host of Roundcube Database
|
||||
# -
|
||||
# - Defaults to 'localhost'
|
||||
# -
|
||||
DB_HOST="{{ roundcube_2_db_host | default(omit) }}"
|
||||
|
||||
# - Name of Roundcube Database
|
||||
# -
|
||||
# - Defaults to 'roundcubemail'
|
||||
# -
|
||||
DB_NAME="{{ roundcube_2_db_name | default(omit) }}"
|
||||
|
||||
# - User of Roundcube Database
|
||||
# -
|
||||
# - Defaults to 'roundcube'
|
||||
# -
|
||||
DB_USER="{{ roundcube_2_db_user | default(omit) }}"
|
||||
|
||||
# - Password of Roundcube Database
|
||||
# -
|
||||
DB_PASS="3Dsz3j5R"
|
||||
|
||||
|
||||
# - Is MySQL installed from debian package system?
|
||||
# -
|
||||
# - Only needed, if DB_TYPE is set to 'mysql'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
# -
|
||||
#MYSQL_DEBIAN_INSTALLATION=""
|
||||
|
||||
# - mysql_credential_args (root access to MySQL Database)
|
||||
# -
|
||||
# - Example
|
||||
# - mysql_credential_args="--login-path=local"
|
||||
# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default)
|
||||
# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf"
|
||||
# -
|
||||
# - Defaults to:
|
||||
# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system
|
||||
# - '/usr/local/mysql/sys-maint.cnf' otherwise
|
||||
# -
|
||||
#MYSQL_CREDENTIALS=""
|
||||
|
||||
# - Name of the folder where (assumed) junk mails will be stored
|
||||
# -
|
||||
# - Defaults to 'Spam'
|
||||
# -
|
||||
#SPAM_FOLDER_NAME=""
|
||||
|
||||
# - You can set your own product name to replace the default.
|
||||
# -
|
||||
# - Defaults to 'Roundcube Webmail'
|
||||
# -
|
||||
PRODUCT_NAME="{{ roundcube_2_product_name | default(omit) }}"
|
||||
|
||||
# - URL for users, to get in contact if something goes wrong
|
||||
# -
|
||||
# - Defaults to 'www.<domain>.<tld>'
|
||||
# -
|
||||
SUPPORT_URL="{{ roundcube_2_support_url | default(omit) }}"
|
||||
|
||||
# - Provide your own logo under this URI
|
||||
# -
|
||||
# - Note: this script will NOT place the logo. You have to do this by your own
|
||||
# - after installation is finisched.
|
||||
# -
|
||||
# - Default is empty
|
||||
# -
|
||||
SKIN_LOGO="{{ roundcube_2_skin_logo | default(omit) }}"
|
||||
|
||||
|
||||
|
||||
# --------------------
|
||||
# - Plugins Configuration
|
||||
# --------------------
|
||||
|
||||
|
||||
# ==========
|
||||
# - Settings Postfix Database
|
||||
# ==========
|
||||
|
||||
# - Type of Postfix database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL)
|
||||
# -
|
||||
{% if "PostgreSQL" == postfix_db_type %}
|
||||
POSTFIX_DB_TYPE="pgsql"
|
||||
{% else %}
|
||||
POSTFIX_DB_TYPE="mysql"
|
||||
{% endif %}
|
||||
|
||||
# - Host of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Defaults to 'localhost'
|
||||
# -
|
||||
POSTFIX_DB_HOST="{{ postfix_db_host | default(omit) }}"
|
||||
|
||||
# - Name of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Defaults to 'postfix'
|
||||
# -
|
||||
POSTFIX_DB_NAME="{{ postfix_db_name | default(omit) }}"
|
||||
|
||||
# - User of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
# - Defaults to 'postfix'
|
||||
# -
|
||||
POSTFIX_DB_USER="{{ postfix_db_user | default(omit) }}"
|
||||
|
||||
# - Password of Postfix Database
|
||||
# -
|
||||
# - used for setting $config['password_db_dsn']
|
||||
# -
|
||||
POSTFIX_DB_PASSWD='{{ postfix_db_pass | default(omit) }}'
|
||||
|
||||
|
||||
# ===
|
||||
# - Plugin acl
|
||||
# ===
|
||||
|
||||
# - Activate plugin 'acl'?
|
||||
# -
|
||||
# - Boolean - possible values are 'true' and 'false'
|
||||
# -
|
||||
# - Defaults to 'false'
|
||||
# -
|
||||
INCLUDE_ACL_PLUGIN="true"
|
||||
|
||||
|
||||
# ===
|
||||
# - Plugin password (change password)
|
||||
# ===
|
||||
|
||||
# - Is current password reqired
|
||||
# -
|
||||
# - $config['password_confirm_current']
|
||||
# -
|
||||
# - Boolean - possible values are 'true' and 'false'
|
||||
# -
|
||||
# - Defaults to 'true'
|
||||
# -
|
||||
#PW_CONFIRM_CURRENT=""
|
||||
|
||||
# - Minimun length if new password
|
||||
# -
|
||||
# - $config['password_minimum_length']
|
||||
# -
|
||||
# - Defaults to '10'
|
||||
# -
|
||||
#PW_MIN_LENGTH=""
|
||||
|
||||
# - New Password requires nonalpha character
|
||||
# -
|
||||
# - $config['password_require_nonalpha']
|
||||
# -
|
||||
# - Boolean - possible values are 'true' and 'false'
|
||||
# -
|
||||
# - Defaults to 'true'
|
||||
# -
|
||||
#PW_REQUIRE_NONALPHA=''
|
||||
|
||||
# - Default password hashing/crypting algorithm.
|
||||
# -
|
||||
# - $config['password_algorithm']
|
||||
# -
|
||||
# - Possible values: des-crypt, ext-des-crypt, md5-crypt, blowfish-crypt,
|
||||
# - sha256-crypt, sha512-crypt, md5, sha, smd5, ssha, samba,
|
||||
# - ad, dovecot, clear.
|
||||
# -
|
||||
# - Defaults to 'dovecot'
|
||||
# -
|
||||
PW_PASSWD_ALGO='dovecot'
|
||||
|
||||
# - Password prefix (e.g. {CRYPT}, {SHA}, {CRAM-MD5}) for passwords generated
|
||||
# -
|
||||
# - $config['password_algorithm_prefix']
|
||||
# -
|
||||
# - Defaults to '{CRAM-MD5}'
|
||||
# -
|
||||
PW_PASSWD_ALGO_PREFIX='{SHA512-CRYPT}'
|
||||
|
||||
# - Path for dovecotpw/doveadm-pw
|
||||
# -
|
||||
# - $config['password_dovecotpw']
|
||||
# -
|
||||
# - Defaults to '/usr/local/dovecot/bin/doveadm pw'
|
||||
# -
|
||||
#PW_DOVEADM_PW=''
|
||||
|
||||
# - Dovecot password scheme.
|
||||
# -
|
||||
# - $config['password_dovecotpw_method']
|
||||
# -
|
||||
# - Defaults to 'CRAM-MD5
|
||||
# -
|
||||
PW_DOVECOT_PW_METHOD='SHA512-CRYPT'
|
||||
|
||||
# - The SQL query used to change the password.
|
||||
# -
|
||||
# - $config['password_query']
|
||||
# -
|
||||
PW_DB_UPDATE_STRING='UPDATE mailbox SET password=%P WHERE username=%u'
|
||||
|
||||
|
||||
# ==========
|
||||
# - Plugin password vacation
|
||||
# ==========
|
||||
|
||||
# - allow vacation forwarder
|
||||
# -
|
||||
# - $rcmail_config['vacation_gui_vacationforwarder'] = FALSE;
|
||||
# -
|
||||
# - defaults to 'false'
|
||||
# -
|
||||
#VAC_GUI_FORWARDER=false
|
Loading…
Reference in New Issue
Block a user