diff --git a/group_vars/all/main.yml b/group_vars/all/main.yml index 557c865..fc59133 100644 --- a/group_vars/all/main.yml +++ b/group_vars/all/main.yml @@ -680,6 +680,12 @@ insert_ssh_keypair_backup_server: false ssh_keypair_backup_server: [] + +insert_keypair_backup_client: false + +ssh_keypair_backup_client: [] + + insert_root_ssh_keypair: false root_ssh_keypair: [] @@ -692,6 +698,12 @@ sudo_users: [] extra_system_user: [] + +entries_authorized_key: [] +#entries_authorized_key: +# - user: root +# - key: 'ssh-rsa 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 root@b.ns' + create_sftp_group: false @@ -1176,6 +1188,126 @@ git_jitsi_meet_repositories: git_other_repositories: [] +# --- +# vars used by roles/common/tasks/copy_files.yml +# --- + +copy_plain_files: [] + +copy_template_files: [] + + +# --- +# vars used by roles/common/tasks/symlink_files.yml +# --- + +symlink_files: [] + + +# --- +# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml +# --- + +hostname: +ipv4_address: +ipv6_address: + +# postfix_db_type +# +# possible values are 'PostgreSQL' and 'MySQL' +postfix_db_type: +postfix_db_name: +postfix_db_user: +postfix_db_host: +postfix_db_pass: + +# - +# install_amavis.conf +# - + +# mp_receipt_number +# +# O.OPEN/IL/Warenform: 106015125438 +# +mp_receipt_number: + +# si_authorisation_signature +# +# O.OPEN/IL: b0b7e94d3fcc8f3b1f128edd5830392361868cf0174723a9924ac25bf8b1b588cb974b50234e1bc1d9839dfe0ca6e1627733d90daf1399347b1046d20c2e3a89 +# +# Warenform: 76ed7ca6670dbee497e1a0397a7e178c4caa25888bc26d7327d1eab0195342a4cfa522dcf10382623d57dbc2a79bd37627b9a52def4d4bfe617d26e35405ce3b +# +si_authorisation_signature: + +# - +# install_postfixadmin.conf +# - + +website_name_postfixadmin: + +#email_welcome_message: "\n +#Hallo,\n +# +#Ihre/Deine neue E-Mail Adresse ist eingerichtet.\n +# +#O.OPEN\n +# +#--\n +#O.OPEN | Phone: +49 30 / 290 484 91\n +#Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n +#D-10999 Berlin | E-MAIL: oo@oopen.de\n +#" +email_welcome_message: + +# - +# install_update_dovecot.conf +# - + +dovecot_from_address: +dovecot_reply_to: +webmailer_address: + +#salutation: "O.OPEN\n +# +#--\n +#O.OPEN | Phone: +49 30 / 290 484 91\n +#Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n +#D-10999 Berlin | http://oopen.de" +salutation: + +# - +# install_upgrade_roundcube-webmail.conf +# - + +# First Webmailer +webmail_site_name: +autoreply_hostname: +# possible values: 'pgsql' or 'mysql' +roundcube_db_type: +roundcube_db_name: +roundcube_db_user: +roundcube_db_host: +roundcube_db_pass: + +roundcube_product_name: +roundcube_support_url: +roundcube_skin_logo: + +# 2 Webmailer +webmaili_2_site_name: +autoreply_2_hostname: +# possible values: 'pgsql' or 'mysql' +roundcube_2_db_type: +roundcube_2_db_name: +roundcube_2_db_user: +roundcube_2_db_host: +roundcube_2_db_pass: + +roundcube_2_product_name: +roundcube_2_support_url: +roundcube_2_skin_logo: + + # ============================== diff --git a/group_vars/gateway_server.yml b/group_vars/gateway_server.yml index 5e7a238..c5f73fa 100644 --- a/group_vars/gateway_server.yml +++ b/group_vars/gateway_server.yml @@ -28,6 +28,8 @@ # --- # vars used by roles/common/tasks/users.yml # --- + +insert_ssh_keypair_backup_server: false ssh_keypair_backup_server: - name: backup backup_user: back @@ -36,18 +38,15 @@ ssh_keypair_backup_server: pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub pub_key_dest: /root/.ssh/id_rsa.pub -insert_root_ssh_keypair: true - -root_ssh_keypair: +insert_keypair_backup_client: true +ssh_keypair_backup_client: - name: backup - login: root priv_key_src: root/.ssh/id_ed25519.oopen-server priv_key_dest: /root/.ssh/id_ed25519 pub_key_src: root/.ssh/id_ed25519.oopen-server.pub pub_key_dest: /root/.ssh/id_ed25519.pub target: backup.oopen.de - default_user: - name: chris diff --git a/group_vars/oopen_office_ga.yml b/group_vars/oopen_office_ga.yml index 38aedfa..aa2314c 100644 --- a/group_vars/oopen_office_ga.yml +++ b/group_vars/oopen_office_ga.yml @@ -28,6 +28,8 @@ # --- # vars used by roles/common/tasks/users.yml # --- + +insert_ssh_keypair_backup_server: false ssh_keypair_backup_server: - name: backup backup_user: back @@ -36,11 +38,9 @@ ssh_keypair_backup_server: pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub pub_key_dest: /root/.ssh/id_rsa.pub -insert_root_ssh_keypair: true - -root_ssh_keypair: +insert_keypair_backup_client: true +ssh_keypair_backup_client: - name: backup - login: root priv_key_src: root/.ssh/id_ed25519.oopen-server priv_key_dest: /root/.ssh/id_ed25519 pub_key_src: root/.ssh/id_ed25519.oopen-server.pub diff --git a/group_vars/oopen_server.yml b/group_vars/oopen_server.yml index 74acff7..a99e8b9 100644 --- a/group_vars/oopen_server.yml +++ b/group_vars/oopen_server.yml @@ -28,6 +28,8 @@ # --- # vars used by roles/common/tasks/users.yml # --- + +insert_ssh_keypair_backup_server: false ssh_keypair_backup_server: - name: backup backup_user: back @@ -36,11 +38,9 @@ ssh_keypair_backup_server: pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub pub_key_dest: /root/.ssh/id_rsa.pub -insert_root_ssh_keypair: true - -root_ssh_keypair: +insert_keypair_backup_client: true +ssh_keypair_backup_client: - name: backup - login: root priv_key_src: root/.ssh/id_ed25519.oopen-server priv_key_dest: /root/.ssh/id_ed25519 pub_key_src: root/.ssh/id_ed25519.oopen-server.pub diff --git a/group_vars/warenform_office.yml b/group_vars/warenform_office.yml index 70ecb8e..3693392 100644 --- a/group_vars/warenform_office.yml +++ b/group_vars/warenform_office.yml @@ -37,9 +37,8 @@ ssh_keypair_backup_server: pub_key_src: root/.ssh/id_rsa.devel-root.pub pub_key_dest: /root/.ssh/id_rsa.pub -insert_root_ssh_keypair: true - -root_ssh_keypair: +insert_keypair_backup_client: true +ssh_keypair_backup_client: - name: backup priv_key_src: root/.ssh/id_ed25519.warenform-office priv_key_dest: /root/.ssh/id_ed25519 diff --git a/group_vars/warenform_server.yml b/group_vars/warenform_server.yml index 2bc6b7a..b6d0b8f 100644 --- a/group_vars/warenform_server.yml +++ b/group_vars/warenform_server.yml @@ -29,6 +29,7 @@ # vars used by roles/common/tasks/users.yml # --- +insert_ssh_keypair_backup_server: false ssh_keypair_backup_server: - name: backup backup_user: back @@ -37,11 +38,9 @@ ssh_keypair_backup_server: pub_key_src: root/.ssh/id_rsa.backup.warenform.de.pub pub_key_dest: /root/.ssh/id_rsa.pub -insert_root_ssh_keypair: true - -root_ssh_keypair: +insert_keypair_backup_client: true +ssh_keypair_backup_client: - name: backup - login: root priv_key_src: root/.ssh/id_ed25519.warenform-server priv_key_dest: /root/.ssh/id_ed25519 pub_key_src: root/.ssh/id_ed25519.warenform-server.pub diff --git a/host_vars/95.217.204.247.yml b/host_vars/95.217.204.247.yml new file mode 100644 index 0000000..5b1300c --- /dev/null +++ b/host_vars/95.217.204.247.yml @@ -0,0 +1,224 @@ +--- + +# --- +# vars used by roles/ansible_dependencies +# --- + + +# --- +# vars used by roles/ansible_user +# --- + + +# --- +# vars used by roles/common/tasks/basic.yml +# --- + + +# --- +# vars used by roles/common/tasks/sshd.yml +# --- + + +# --- +# vars used by roles/common/tasks/apt.yml +# --- + +apt_install_compiler_pkgs: true + +apt_install_postgresql_pkgs: true + + +# --- +# vars used by roles/common/tasks/users.yml +# --- + +insert_root_ssh_keypair: true + +root_ssh_keypair: + - name: id-rsa-dehydrated + priv_key_src: root/.ssh/a.mx-id_rsa-dehydrated + priv_key_dest: /root/.ssh/id_rsa-dehydrated + pub_key_src: root/.ssh/a.mx-id_rsa-dehydrated.pub + pub_key_dest: /root/.ssh/id_rsa-dehydrated.pub + - name: id-rsa-opendkim + priv_key_src: root/.ssh/a.mx-id_rsa-opendkim + priv_key_dest: /root/.ssh/id_rsa-opendkim + pub_key_src: root/.ssh/a.mx-id_rsa-opendkim.pub + pub_key_dest: /root/.ssh/id_rsa-opendkim.pub + + +# --- +# vars used by roles/common/tasks/users-systemfiles.yml +# --- + + +# --- +# vars used by roles/common/tasks/webadmin-user.yml +# --- + + +# --- +# vars used by roles/common/tasks/sudoers.yml +# --- +# +# see: roles/common/tasks/vars + + +# --- +# vars used by roles/common/tasks/caching-nameserver.yml +# --- + + +# --- +# vars used by roles/common/tasks/git.yml +# --- +# +# see: roles/common/tasks/vars + + +# --- +# vars used by roles/common/tasks/copy_files.yml +# --- + +copy_plain_files: + + - name: monitoring_check_cert_for_dovecot.conf + src_path: a.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf + dest_path: /root/bin/monitoring/conf/check_cert_for_dovecot.conf + + - name: monitoring_check_webservice_load.conf + src_path: a.mx/root/bin/monitoring/conf/check_webservice_load.conf + dest_path: /root/bin/monitoring/conf/check_webservice_load.conf + + - name: postfix_create_opendkim_key.conf + src_path: a.mx/root/bin/postfix/conf/create_opendkim_key.conf + dest_path: /root/bin/postfix/conf/create_opendkim_key.conf + + - name: postfix_postfix_add_mailboxes.conf + src_path: a.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf + dest_path: /root/bin/postfix/conf/postfix_add_mailboxes.conf + + - name: postfix_sent_userinfo_postfix.conf + src_path: a.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf + dest_path: /root/bin/postfix/conf/sent_userinfo_postfix.conf + + - name: postfix_whitelist_mb_sigs.conf + src_path: a.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf + dest_path: /root/bin/postfix/conf/whitelist_mb_sigs.conf + + +copy_template_files: [] +# +# - name: mailsystem_install_amavis.conf +# src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2 +# dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf + + + +# --- +# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml +# --- + +hostname: a.mx.oopen.de +ipv4_address: 95.217.204.247 +ipv6_address: 2a01:4f9:4a:47e5::247 + +admin_email: argus@oopen.de +is_relay_host: false + +# postfix_db_type +# +# possible values are 'PostgreSQL' and 'MySQL' +postfix_db_type: PostgreSQL +postfix_db_name: postfix +postfix_db_user: postfix +postfix_db_host: localhost +postfix_db_pass: FKt4z55FxMZp + +# install_amavis.conf +# +mp_receipt_number: 106015125438 +si_authorisation_signature: b0b7e94d3fcc8f3b1f128edd5830392361868cf0174723a9924ac25bf8b1b588cb974b50234e1bc1d9839dfe0ca6e1627733d90daf1399347b1046d20c2e3a89 + +# install_postfixadmin.conf +# +website_name_postfixadmin: adm.oopen.de + +email_welcome_message: "\n +Hallo,\n + +Ihre/Deine neue E-Mail Adresse ist eingerichtet.\n + +O.OPEN\n + +--\n +O.OPEN | Phone: +49 30 / 290 484 91\n +Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n +D-10999 Berlin | E-MAIL: oo@oopen.de\n +" + +# install_update_dovecot.conf +# +dovecot_from_address: "o.open " +dovecot_reply_to: "oo@oopen.de" +webmailer_address: "https://webmail.oopen.de" +salutation: "O.OPEN\n + +--\n +O.OPEN | Phone: +49 30 / 290 484 91\n +Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n +D-10999 Berlin | http://oopen.de" + +# install_upgrade_roundcube-webmail.conf +# +# Webmailer +webmail_site_name: webmail.oopen.de +autoreply_hostname: autoreply.oopen.de +# possible values: 'pgsql' or 'mysql' +roundcube_db_type: pgsql +roundcube_db_name: roundcubemail +roundcube_db_user: roundcube +roundcube_db_host: localhost +roundcube_db_pass: '3Dsz3j5R' + +roundcube_product_name: O.OPEN - Webmailer +roundcube_support_url: https://www.oopen.de +roundcube_skin_logo: "images/oopen-logo.png" + +# 2 Webmailer +webmaili_2_site_name: webmail2.oopen.de +autoreply_2_hostname: autoreply.oopen.de +# possible values: 'pgsql' or 'mysql' +roundcube_2_db_type: pgsql +roundcube_2_db_name: roundcubemail2 +roundcube_2_db_user: roundcube +roundcube_2_db_host: localhost +roundcube_2_db_pass: '3Dsz3j5R' + +roundcube_2_product_name: O.OPEN - Webmailer +roundcube_2_support_url: https://www.oopen.de +roundcube_2_skin_logo: "images/oopen-logo.png" + + +template_files_mailsystem_script: + + - name: mailsystem_install_amavis.conf + src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf + + - name: mailsystem_install_postfixadmin.conf + src_path: usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_postfixadmin.conf + + - name: mailsystem_install_update_dovecot.conf + src_path: usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_update_dovecot.conf + + - name: mailsystem_install_upgrade_roundcube-webmail.conf + src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf + + - name: mailsystem_install_upgrade_roundcube-webmail2.conf + src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf diff --git a/host_vars/a.mx.oopen.de.yml b/host_vars/a.mx.oopen.de.yml new file mode 100644 index 0000000..902e4b9 --- /dev/null +++ b/host_vars/a.mx.oopen.de.yml @@ -0,0 +1,228 @@ +--- + +# --- +# vars used by roles/ansible_dependencies +# --- + + +# --- +# vars used by roles/ansible_user +# --- + + +# --- +# vars used by roles/common/tasks/basic.yml +# --- + + +# --- +# vars used by roles/common/tasks/sshd.yml +# --- + + +# --- +# vars used by roles/common/tasks/apt.yml +# --- + +apt_install_compiler_pkgs: true + +apt_install_postgresql_pkgs: true + + +# --- +# vars used by roles/common/tasks/users.yml +# --- + +insert_root_ssh_keypair: true + +root_ssh_keypair: + - name: id-rsa-dehydrated + priv_key_src: root/.ssh/a.mx-id_rsa-dehydrated + priv_key_dest: /root/.ssh/id_rsa-dehydrated + pub_key_src: root/.ssh/a.mx-id_rsa-dehydrated.pub + pub_key_dest: /root/.ssh/id_rsa-dehydrated.pub + - name: id-rsa-opendkim + priv_key_src: root/.ssh/a.mx-id_rsa-opendkim + priv_key_dest: /root/.ssh/id_rsa-opendkim + pub_key_src: root/.ssh/a.mx-id_rsa-opendkim.pub + pub_key_dest: /root/.ssh/id_rsa-opendkim.pub + + +# --- +# vars used by roles/common/tasks/users-systemfiles.yml +# --- + + +# --- +# vars used by roles/common/tasks/webadmin-user.yml +# --- + + +# --- +# vars used by roles/common/tasks/sudoers.yml +# --- +# +# see: roles/common/tasks/vars + + +# --- +# vars used by roles/common/tasks/caching-nameserver.yml +# --- + + +# --- +# vars used by roles/common/tasks/git.yml +# --- +# +# see: roles/common/tasks/vars + + +# --- +# vars used by roles/common/tasks/copy_files.yml +# --- + +copy_plain_files: + + - name: monitoring_check_cert_for_dovecot.conf + src_path: a.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf + dest_path: /root/bin/monitoring/conf/check_cert_for_dovecot.conf + + - name: monitoring_check_webservice_load.conf + src_path: a.mx/root/bin/monitoring/conf/check_webservice_load.conf + dest_path: /root/bin/monitoring/conf/check_webservice_load.conf + + - name: mysql_mysql_credetials.conf + src_path: a.mx/root/bin/mysql/conf/mysql_credetials.conf + dest_path: /root/bin/mysql/conf/mysql_credetials.conf + + - name: postfix_create_opendkim_key.conf + src_path: a.mx/root/bin/postfix/conf/create_opendkim_key.conf + dest_path: /root/bin/postfix/conf/create_opendkim_key.conf + + - name: postfix_postfix_add_mailboxes.conf + src_path: a.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf + dest_path: /root/bin/postfix/conf/postfix_add_mailboxes.conf + + - name: postfix_sent_userinfo_postfix.conf + src_path: a.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf + dest_path: /root/bin/postfix/conf/sent_userinfo_postfix.conf + + - name: postfix_whitelist_mb_sigs.conf + src_path: a.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf + dest_path: /root/bin/postfix/conf/whitelist_mb_sigs.conf + + +copy_template_files: [] +# +# - name: mailsystem_install_amavis.conf +# src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2 +# dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf + + + +# --- +# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml +# --- + +hostname: a.mx.oopen.de +ipv4_address: 83.223.86.91 +ipv6_address: 2a01:30:0:13:2f7:50ff:fed2:cef7 + +admin_email: argus@oopen.de +is_relay_host: false + +# postfix_db_type +# +# possible values are 'PostgreSQL' and 'MySQL' +postfix_db_type: PostgreSQL +postfix_db_name: postfix +postfix_db_user: postfix +postfix_db_host: localhost +postfix_db_pass: FKt4z55FxMZp + +# install_amavis.conf +# +mp_receipt_number: 106015125438 +si_authorisation_signature: b0b7e94d3fcc8f3b1f128edd5830392361868cf0174723a9924ac25bf8b1b588cb974b50234e1bc1d9839dfe0ca6e1627733d90daf1399347b1046d20c2e3a89 + +# install_postfixadmin.conf +# +website_name_postfixadmin: adm.oopen.de + +email_welcome_message: "\n +Hallo,\n + +Ihre/Deine neue E-Mail Adresse ist eingerichtet.\n + +O.OPEN\n + +--\n +O.OPEN | Phone: +49 30 / 290 484 91\n +Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n +D-10999 Berlin | E-MAIL: oo@oopen.de\n +" + +# install_update_dovecot.conf +# +dovecot_from_address: "o.open " +dovecot_reply_to: "oo@oopen.de" +webmailer_address: "https://webmail.oopen.de" +salutation: "O.OPEN\n + +--\n +O.OPEN | Phone: +49 30 / 290 484 91\n +Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n +D-10999 Berlin | http://oopen.de" + +# install_upgrade_roundcube-webmail.conf +# +# Webmailer +webmail_site_name: webmail.oopen.de +autoreply_hostname: autoreply.oopen.de +# possible values: 'pgsql' or 'mysql' +roundcube_db_type: pgsql +roundcube_db_name: roundcubemail +roundcube_db_user: roundcube +roundcube_db_host: localhost +roundcube_db_pass: '3Dsz3j5R' + +roundcube_product_name: O.OPEN - Webmailer +roundcube_support_url: https://www.oopen.de +roundcube_skin_logo: "images/oopen-logo.png" + +# 2 Webmailer +webmaili_2_site_name: webmail2.oopen.de +autoreply_2_hostname: autoreply.oopen.de +# possible values: 'pgsql' or 'mysql' +roundcube_2_db_type: pgsql +roundcube_2_db_name: roundcubemail2 +roundcube_2_db_user: roundcube +roundcube_2_db_host: localhost +roundcube_2_db_pass: '3Dsz3j5R' + +roundcube_2_product_name: O.OPEN - Webmailer +roundcube_2_support_url: https://www.oopen.de +roundcube_2_skin_logo: "images/oopen-logo.png" + + +template_files_mailsystem_script: + + - name: mailsystem_install_amavis.conf + src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf + + - name: mailsystem_install_postfixadmin.conf + src_path: usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_postfixadmin.conf + + - name: mailsystem_install_update_dovecot.conf + src_path: usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_update_dovecot.conf + + - name: mailsystem_install_upgrade_roundcube-webmail.conf + src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf + + - name: mailsystem_install_upgrade_roundcube-webmail2.conf + src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf diff --git a/host_vars/a.ns.oopen.de.yml b/host_vars/a.ns.oopen.de.yml index 51eeea6..a56b586 100644 --- a/host_vars/a.ns.oopen.de.yml +++ b/host_vars/a.ns.oopen.de.yml @@ -9,34 +9,41 @@ # vars used by roles/ansible_user # --- +entries_authorized_key: + - user: root + key: 'ssh-rsa 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 root@b.ns' + + extra_user: - name: manage-bind password: $6$8JdviMM8$WkGw8N8AV0W/KbOMLBlDt25NLZ0Mpyz6gcPwfRCZ.m5yZGIJyP3F8YaSd77b.Tj.TGBAYvwQ7TP655P1ry2li/ shell: /bin/bash + group_id: 1011 + user_id: 1011 ssh_keys: - - 'ssh-rsa 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 root@b.mx.oopen.de' - - 'ssh-rsa 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 root@d.mx.oopen.de' - - 'ssh-rsa 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 root@cloud' - 'ssh-rsa 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 root@a.mx-dehydrated' - 'ssh-rsa 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 root@a.mx-opendkim' - - 'ssh-rsa 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 root@c.mx' - - 'ssh-rsa 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 root@mail.cadus.org-dehydrated' - - 'ssh-rsa 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 root@test.mx' - - 'ssh-rsa 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 root@luna' - - 'ssh-rsa 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 chris@luna' - - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC33bK2Em5EfUSHz1RQEadnJLZnGIsRo5EOwFL8Q3pqt5agg522bfOQZOE4n59u5nHRfWMZCRkpjKEwYLEO3wQUjWvz/oIf+1mcBrpswLGihSRNzTt07+oSe2PUwhkv1Zvgoja9wpxj03+FMKieE55IvPjBOMe+CZB8HNExhRUOpxCyy3JdtN3stFE+6TyfCfBbL3BMUXSrXCm28HogCR01A/0rCLeMe6ZEiu1IxRPCi7g5TetAu1jfQn4iMWKV66kDH6eRVYYJEhH39jeC5gLAZCrr/tHn/HU9FSHr1FsZ4M3fTbYTuSW81ZnIY+i61ryWrmHQrj3a8LNX4Xe8YT4mjca94TBRqHw9eDNhmqQSk1IPg0AK0Vu48CW2whpum3l1DO9TKaT+QNKmmo7WMQXAD7kg0O0A1xrM43VZFTxhIEPCtjUbHgokZ+B4VG+T2+JqMcjsyY/JuMFERX6ZhU6MrXmdHGcr2AaxHOQ8UTgC+CuiR9zXOrJ5jpG3ztWjjaYRM9wHaD15wiGOY2KZ2AocTtbk+pTFMFbcSQjCvDEIxVsrxK7byNnqq5njNemk2rg1GRR06dOUj6sWdeb6DJOHjHyTjFzasANigoxuWdIWGhxgmfFQ3KlNYbMMVzTV/+kwYFAKLOQNpKUaaD1tWIty3mM8uOhQVSeqRwRcAvSWXQ== root@www.oopen.de' - - 'ssh-rsa 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 root@www2.oopen.de' - - 'ssh-rsa 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 root@www3.oopen.de' - - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQClupkurU+acJRtp2s9GgiC+rANqlup8SfhtulV0a/8z6nobjcpQWrfVq+MNjM7VghnlMAwMjz7tccFGyCmJoSS11RcnFtPmqnSNj0/TI8zyYOZUvZCczPBSeqs/IxawyYz91e3RlPWbpv71Nj+/EHUZApZkkdTkpYHduSJYWtKYA2l2Glzmjd2d2u/IFIkqXhvl1bT3RUMLZJqYdEwYAvlW2JB84EIWNf4ytcGcu6rakXCRP9o62BbRza3AfMgSfa45PLodPi5VpqDiTHSCIBll+VOuLqTgQCBYeANRPClMLbueVXXcMrmEwrDXeC0dpqTdgaF2Tz3xYsrAzTe6bcNJsGgGCQyTtDKpsAgoKb31agsyy68CoZto13Ea4WYsNVx0T3KaRlaDm98KqnUJXHJvXnLegqfXiURL5BpxXmAnFvZ0duHrtRkVpzeu5n5vz41RLnFHyLln2VE6a+IYdiLlPl2hC+7pswb+nBP9yNn6T4WQZNtHp4YssANuYKO+/gJaHpMJ1TqgL/Ip66erK+372M1T/6ibiU3+qHbwW7FbXVfn3Dz2abJGyNkoaZGpQIXtx0UxWYZHF8E35Z0ll9NQo1CnDvV3jA1aMnYVTv9DuSYxqLY34oHWXEFzMyStCRWup4Tfrp3pT61GRhb2h8kZi5dqQur9KrqWmA6HF9D+Q== root@lists.mx' - - 'ssh-rsa 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 root@d.mx' - - 'ssh-rsa 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 root@c.mx-opendkim' - - 'ssh-rsa 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 root@mail.cadus.org-opendkim' + - 'ssh-rsa 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 root@b.mx.oopen.de' - 'ssh-rsa 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 root@b.mx-opendkim' - - 'ssh-rsa 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 root@www.oopen.de-opendkim' + - 'ssh-rsa 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 root@c.mx-opendkim' + - 'ssh-rsa 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 root@c.mx-dehydrated' + - 'ssh-rsa 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 root@c.mx' + - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC31CHZ0pkdmcUVo64LeUfN/QbYyzGXihsAIYSmjRrsxhwwh30Ceu8VNukDKVrQfu7hO5sRIa8Vj/8Dr1FnLZznIva7dRqnCJ6WHFsTLFoDuBU53qxegE+fEDfoYEVJpRD6EzSAy/XJQUfkNYIPFM3f2igmTx2GjGtkg+jKGDu/UHEoa07RoqKM4eHvRI9bjOiAYr5j87Gkyzf05C6nTk3D8CXX/6MIG2tC0vyKaNgcFgP4VyMh1Fb8nVr5gHiDSavK71Y+9N3yGRy8QBS/a/ArsD3R3VH/tj1ReaABiXccJ+SrdzT89wE3tV8qZDKymbEm6mFz8z0pFXxisG3F19mU4vraZvK4df5E/SnY6qHpVrgDNXIUpXx0UDR2IVsvvFsxFzPfhDCK10e3Yk1/ctRkZZaY5x+4l4WibjH2BJxpYAxriGjP1xWicLUywba1PpJG6dTQSi2fuwKBxXw+Y/XGRA+2yXGYe687WB5pkh8y5WVVQZbCeTixIVlewHirMOqCdw+vFT7S+HOZdXA4UIM8nHAzufxQVssxbGZD3r813YcSbVymoXzte7uGQS24ofu2u1h1FLvnPDjCrKNdkr6ArhVvbDch3yPtzPG0dYX5h/fySjVZPOAPxwaVDkWyXSckeGnYxPIhY5H4yCX1vLR7XaiIfM7zLNYCkOjG3fEf7Q== root@d.mx-dehydrated' + - 'ssh-rsa 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 root@d.mx-opendkim' + - 'ssh-rsa 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 root@e.mx-dehydrated' + - 'ssh-rsa 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 root@e.mx-opendkim' + - 'ssh-rsa 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 root@mail.cadus.org-dehydrated' + - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDM5j1tCRwVGvGatVQVLxUzV4r5E5QERXxkEGcGoasLF8zBQO5KY60iqU/DLDjX0zT2Gju5dlVUd/s1N/eiv0LhfgxOcKK31tWOVm8oX5gsIC+yv9cIbAJouhstVxAgGoUci5m2/is/q2WfURWuvGFoCVzrJReqTh/yMkYegcRpnFSv+/OucIt/qQysOQSHyJ/mrIX6HnTKvWgbHjVnPj0jkicR5xyfGZxPYQYS4osNyeWyR5f5QaIXFUHhWmQd+mw3m75kkkxwo8Qm0/yj7W7KZNaD2AawiFFNyy034QLUEkx/xZkp2gD/8arqLZ5S/mrhH4u7LrN5BeE+8RoKyKVlHWidaXD1y9S6cK6cQ/fO+Gq2Lhc+LghPAaH0yTgfYU7YBCcqNYEyS7sGEMh8u8aQFTYCWOpZai5b+nu9Y6HmDZP7CgfD4bNIBNBl1CsGThWhST7DIDhPoJ4xtoCinuxoqq8RdjbVpAfPUeckvzZinwf6p1ffKcBhTJYI/+aYrNqPoLCn6+pP/0b1A67kyl0G60xO13PnnxJSsRBiTiqD8OYPM6BDmQuftc73XOJZbHxD3VFO0B440k94/S9WQqMNVaH7AAMSabU9drvI8afgwxdfuR7dzQZYMtZVq9xgc/nXibTW6ft87yY2g8eJsPNMLSvOduE8a+VnUmAh+p0SpQ== root@mail.cadus.org-opendkim' - 'ssh-rsa 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 root@mail.faire-mobilitaet.de' - 'ssh-rsa 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 root@ga-st-mail-opendkim' - 'ssh-rsa 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 root@ga-st-mail-dehydrated' - - 'ssh-rsa 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 root@www.oopen.de-ns' + - 'ssh-rsa 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 root@lists.mx' + - 'ssh-rsa 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 root@test.mx' + - 'ssh-rsa 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 root@web-01-de-ns' + - 'ssh-rsa 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 root@web-01-opendkim' + - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCyWbdnjnN/xfy1F6kPbsRXp8zvJEh8uHfTZuZKyaRV/iRuhsvqRiDB+AhUAlIaPwgQ8itaI6t5hijD+sZf+2oXXbNy3hkOHTrCDKCoVAWfMRKPuA1m8RqS4ZXXgayaeCzVnPEq6UrC5z0wO/XBwAktT37RRSQ/Hq2zCHy36NQEQYrhF3+ytX7ayb10pJAMVGRctYmr5YnLEVMSIREbPxZTNc80H1zqNPVJwYZhl8Ox61U4MoNhJmJwbKWPRPZsJpbTh9W2EU37tdwRBVQP6yxhua3TR6C7JnNPVY0IK23BYlNtQEDY4PHcIuewkamEWpP0+jhEjtwy1TqjRPdU/y+2uQjC6FSOVMsSPxgd8mw4cSsfp+Ard7P+YOevUXD81+jFZ3Wz0PRXbWMWAm2OCe7n8jVvkXMz+KxSYtrsvKNw1WugJq1z//bJNMTK6ISWpqaXDevGYQRJJ8dPbMmbey40WpS5CA/l29P7fj/cOl59w3LZGshrMOm7lVz9qysVV0ylfE3OpfKCGitkpY0Asw4lSkuLHoNZnDo6I5/ulRuKi6gsLk27LO5LYS8Zm1VOis/qHk1Gg1+QY47C4RzdTUxlU1CGesPIiQ1uUX2Z4bD7ebTrrOuEFcmNs3Wu5nif21Qq0ELEWhWby6ChFrbFHPn+hWlDwNM0Nr11ftwg0+sqVw== root@luna' + - 'ssh-rsa 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 chris@luna' + # --- @@ -86,7 +93,74 @@ extra_user: # vars used by scripts/install-update-firewall.yml # --- -git_firewall_repository: {} + +# --- +# vars used by roles/common/tasks/copy_files.yml +# --- + +copy_plain_files: + + - name: bind + src_path: a.ns/root/bin/bind/conf/bind.conf + dest_path: /root/bin/bind/conf/bind.conf + + - name: bind_add_dkim_zone_slave + src_path: a.ns/root/bin/bind/conf/bind_add_dkim_zone_slave.conf + dest_path: /root/bin/bind/conf/bind_add_dkim_zone_slave.conf + + +# --- +# vars used by roles/common/tasks/symlink_files.yml +# --- + +symlink_files: + - name: bind_get_domain_by_hostname + src_path: /root/bin/bind/bind_get_domain_by_hostname.sh + dest_path: /usr/local/bin/bind_get_domain_by_hostname.sh + + - name: bind_get_zonefile_by_hostname + src_path: /root/bin/bind/bind_get_zonefile_by_hostname.sh + dest_path: /usr/local/bin/bind_get_zonefile_by_hostname.sh + + - name: bind_rndc_sync_clean + src_path: /root/bin/bind/bind_rndc_sync_clean.sh + dest_path: /usr/local/bin/bind_rndc_sync_clean.sh + + - name: /bind_set_new_serial + src_path: /root/bin/bind/bind_set_new_serial.sh + dest_path: /usr/local/bin/bind_set_new_serial.sh + + - name: bind_set_renew_tlsa + src_path: /root/bin/bind/bind_set_renew_tlsa.sh + dest_path: /usr/local/bin/bind_set_renew_tlsa.sh + + - name: bind_add_dkim_zone_master + src_path: /root/bin/bind/bind_add_dkim_zone_master.sh + dest_path: /usr/local/bin/bind_add_dkim_zone_master.sh + + - name: bind_add_dkim_zone_slave + src_path: /root/bin/bind/bind_add_dkim_zone_slave.sh + dest_path: /usr/local/bin/bind_add_dkim_zone_slave.sh + + - name: bind_reload_all_zones + src_path: /root/bin/bind/bind_reload_all_zones.sh + dest_path: /usr/local/bin/bind_reload_all_zones.sh + + - name: bind_remove_domain_on_master + src_path: /root/bin/bind/bind_remove_domain_on_master.sh + dest_path: /usr/local/bin/bind_remove_domain_on_master.sh + + - name: bind_remove_domain_on_slave + src_path: /root/bin/bind/bind_remove_domain_on_slave.sh + dest_path: /usr/local/bin/bind_remove_domain_on_slave.sh + + +# --- +# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml +# --- + + + # ============================== diff --git a/host_vars/b.ns.oopen.de.yml b/host_vars/b.ns.oopen.de.yml index c5a03b6..8dcf536 100644 --- a/host_vars/b.ns.oopen.de.yml +++ b/host_vars/b.ns.oopen.de.yml @@ -16,29 +16,28 @@ extra_user: group_id: 1011 user_id: 1011 ssh_keys: - - 'ssh-rsa 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 root@b.mx.oopen.de' - - 'ssh-rsa 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 root@d.mx.oopen.de' - - 'ssh-rsa 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 root@cloud' - 'ssh-rsa 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 root@a.mx-dehydrated' - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC1U2pLN20C1IPh9oLfhAsFhFTaG6gFdruqeORDFdLN8ZGy8lxAeC+/42H5XO1dJU3XYvVU3L/NVwtk8NStVuYkkxn3MO148mJzZTwAdTENlUnH5u6Dn6Uzs6lqzygyfMAAVbj895KbmatsAYboElG5FbYla1QIbEwjVkWk9+bxZyLOZPPeuChMlaeOBbRxLubT5UMIQiZTNTiE1ZfgQxVANcge4MK+zYhhd7X59JuFX/5nB3P1EykWnPE6QN2jeC0Lor78uvll9fHs0xq0FfhJ9Ut5hUqq1nCtuB1ToGV1QcbgBhO0APK94wA9Bu3Oy9nqTXZ40PmObMikDKi8Pbltxo12xBnddCWo1XEkxAiR3DYVlvf7PCykBiQ8Nv3qoMSelpK9hE/tewA1wS5Ilshj1IfRU3dcY+YNG4fzPGU0EYhKzqWFzyobM9F8iYegmkgaGJ3ShXLudoecmoEEduwHqGztrn3Io5K1Z8P46kSTVgjENKVCbimCtZx+X9c6zotKSp9ftl4mAA0UziKml7d2KnVyD++YNgBr0qAcaBXG4KkPFZ6dG2h97APacqb5id4483YA51/Itu00/3WPawXxWphWNOOCUBC9jpFpjdtTopjX6DL8xZaR4o+ediP3vnKXuFmwBQ2l5pGYw3PjIvq7xyQRHepCW5nYGGkNHhW8eQ== root@a.mx-opendkim' - - 'ssh-rsa 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 root@c.mx' - - 'ssh-rsa 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 root@mail.cadus.org-mail.cadus.org-dehydrated' - - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC82aW3qFetvOZSBJFCBnSONurzqAtkZT7cNA+0OuXgYmKXjsOaBlA2pm2a+rKS1Rs2VOzQFAHJMGaR/JGRYTU060jZaZmJhNgNbtqBicDeiEE0p1HfQCm/HSN5vf4Q8CRMDHxkaRxkWOIxvouxn2dkbZklZ+SZCNh42ZMMVC/q0UJmgTV2A5RCbd6eARs9u6lnix+PAhTYYLjsnyNSorr0g6FLb4367dg1klyyHuCNb0rjTZxnYTNDHGHTrYQUXIaZt16iWaxzmnSQi4fivmunGc2Xafhkea+lfxbSwtG68zeJC4D3QBGKZu8xtjyipj9v2LyBrXONgBXfBKs8b9dmhL/Qr4cIhaUdl0IDYaQ/UEBmy3z6CeUxrUsWoQP6st8299ndj1ul7sW2Q5QPH2hLX2PSLOoMygV0cho6oh1XEAkTsAgTXnqhp5G0vZF/2VFYyu2QP+0/yJawOSUE2TMJmA5yU7TMx5koDZL51Rj9XVFqouzRG+6gOOAnhHICfvQUYpS+WW/nqNYl1MI+9Gk29Em2YoBwb1zlep6gC5EyjTzx4h13ldSFSmHcEn9vptZeZv78Es/bT9ib8IdUS9oRatw9IEmA9xnWgHxcrTn1+QYJkbjc1cS2lFVR9wmm3/4It/RyWuxAf3k4qlzHzIS/F4St7MLjviPAWRxqyvroQQ== root@test.mx' - - 'ssh-rsa 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 root@luna' - - 'ssh-rsa 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 chris@luna' - - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC33bK2Em5EfUSHz1RQEadnJLZnGIsRo5EOwFL8Q3pqt5agg522bfOQZOE4n59u5nHRfWMZCRkpjKEwYLEO3wQUjWvz/oIf+1mcBrpswLGihSRNzTt07+oSe2PUwhkv1Zvgoja9wpxj03+FMKieE55IvPjBOMe+CZB8HNExhRUOpxCyy3JdtN3stFE+6TyfCfBbL3BMUXSrXCm28HogCR01A/0rCLeMe6ZEiu1IxRPCi7g5TetAu1jfQn4iMWKV66kDH6eRVYYJEhH39jeC5gLAZCrr/tHn/HU9FSHr1FsZ4M3fTbYTuSW81ZnIY+i61ryWrmHQrj3a8LNX4Xe8YT4mjca94TBRqHw9eDNhmqQSk1IPg0AK0Vu48CW2whpum3l1DO9TKaT+QNKmmo7WMQXAD7kg0O0A1xrM43VZFTxhIEPCtjUbHgokZ+B4VG+T2+JqMcjsyY/JuMFERX6ZhU6MrXmdHGcr2AaxHOQ8UTgC+CuiR9zXOrJ5jpG3ztWjjaYRM9wHaD15wiGOY2KZ2AocTtbk+pTFMFbcSQjCvDEIxVsrxK7byNnqq5njNemk2rg1GRR06dOUj6sWdeb6DJOHjHyTjFzasANigoxuWdIWGhxgmfFQ3KlNYbMMVzTV/+kwYFAKLOQNpKUaaD1tWIty3mM8uOhQVSeqRwRcAvSWXQ== root@www.oopen.de' - - 'ssh-rsa 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 root@www2.oopen.de' - - 'ssh-rsa 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 root@www3.oopen.de' - - 'ssh-rsa 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 root@lists.mx' - - 'ssh-rsa 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 root@d.mx' - - 'ssh-rsa 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 root@c.mx-opendkim' - - 'ssh-rsa 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 root@mail.cadus.org-opendkim' + - 'ssh-rsa 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 root@b.mx.oopen.de' - 'ssh-rsa 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 root@b.mx-opendkim' - - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDIf2ahqowiUbP4f3/qtdC1JmbjIdlF+i+TiWpxWam0yjiGuTPDjI1ud5vj0of2+P4DJy2dkDvF3yK7/Np7qpxIJgsj9HNiwIlGtfrwNCzqGlyPovjNpAr8cCR1P34K9CgHz4BInc//vjxlUXZpK17omOJ4KaVY1f/Eit0G5Y2TJ38BY6MztuUfou8PdJqITM3GM/YOk4iz2OnObDjHAbd6VTSn4yrYTkGT30axiCHdSy0XhvfUgB1yO08PIcOOogGkxRLYkvUAxwhDsFSpGzQBhUb1O5RqGnBs/aR4sxwjTaeO8mP6lpQMp2pz//I6448N3k5P1CwcJAqrkUuOk4o+jHWr5rSO+eKm4SQ74RBnAAM9bA0tpvCmO8kV2tsdbS4Yw94H4GfTgOPZ5Fe6Y8ciTR+bkGdp7sqm5DNtjZNZuwiFmoe2vj7RJlCNDIXhwVEGAWf+lFYCQKp05A13QoRYGg2aebaLSjw9XYBghNtwnmYkSb84xIoELmPKYrvdodO2uHgGxHBls1mFTz8m01kn+A49L3yY+cFZtSua/+YYoZLh1tNLAL4rBRCRVpZs+VHrmz0GCxwYMHkm9ti0SRPrb7jtH9DYwLUdci4pL8z/G4D2M92A66OZqIybgAJkkdl4H4mv9n05FPJ8RxPniD58x3AMTZNtkxGxn8UkTCSSGQ== root@www.oopen.de-opendkim' + - 'ssh-rsa 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 root@c.mx-opendkim' + - 'ssh-rsa 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 root@c.mx-dehydrated' + - 'ssh-rsa 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 root@c.mx' + - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC31CHZ0pkdmcUVo64LeUfN/QbYyzGXihsAIYSmjRrsxhwwh30Ceu8VNukDKVrQfu7hO5sRIa8Vj/8Dr1FnLZznIva7dRqnCJ6WHFsTLFoDuBU53qxegE+fEDfoYEVJpRD6EzSAy/XJQUfkNYIPFM3f2igmTx2GjGtkg+jKGDu/UHEoa07RoqKM4eHvRI9bjOiAYr5j87Gkyzf05C6nTk3D8CXX/6MIG2tC0vyKaNgcFgP4VyMh1Fb8nVr5gHiDSavK71Y+9N3yGRy8QBS/a/ArsD3R3VH/tj1ReaABiXccJ+SrdzT89wE3tV8qZDKymbEm6mFz8z0pFXxisG3F19mU4vraZvK4df5E/SnY6qHpVrgDNXIUpXx0UDR2IVsvvFsxFzPfhDCK10e3Yk1/ctRkZZaY5x+4l4WibjH2BJxpYAxriGjP1xWicLUywba1PpJG6dTQSi2fuwKBxXw+Y/XGRA+2yXGYe687WB5pkh8y5WVVQZbCeTixIVlewHirMOqCdw+vFT7S+HOZdXA4UIM8nHAzufxQVssxbGZD3r813YcSbVymoXzte7uGQS24ofu2u1h1FLvnPDjCrKNdkr6ArhVvbDch3yPtzPG0dYX5h/fySjVZPOAPxwaVDkWyXSckeGnYxPIhY5H4yCX1vLR7XaiIfM7zLNYCkOjG3fEf7Q== root@d.mx-dehydrated' + - 'ssh-rsa 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 root@d.mx-opendkim' + - 'ssh-rsa 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 root@e.mx-dehydrated' + - 'ssh-rsa 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 root@e.mx-opendkim' + - 'ssh-rsa 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 root@mail.cadus.org-dehydrated' + - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQDM5j1tCRwVGvGatVQVLxUzV4r5E5QERXxkEGcGoasLF8zBQO5KY60iqU/DLDjX0zT2Gju5dlVUd/s1N/eiv0LhfgxOcKK31tWOVm8oX5gsIC+yv9cIbAJouhstVxAgGoUci5m2/is/q2WfURWuvGFoCVzrJReqTh/yMkYegcRpnFSv+/OucIt/qQysOQSHyJ/mrIX6HnTKvWgbHjVnPj0jkicR5xyfGZxPYQYS4osNyeWyR5f5QaIXFUHhWmQd+mw3m75kkkxwo8Qm0/yj7W7KZNaD2AawiFFNyy034QLUEkx/xZkp2gD/8arqLZ5S/mrhH4u7LrN5BeE+8RoKyKVlHWidaXD1y9S6cK6cQ/fO+Gq2Lhc+LghPAaH0yTgfYU7YBCcqNYEyS7sGEMh8u8aQFTYCWOpZai5b+nu9Y6HmDZP7CgfD4bNIBNBl1CsGThWhST7DIDhPoJ4xtoCinuxoqq8RdjbVpAfPUeckvzZinwf6p1ffKcBhTJYI/+aYrNqPoLCn6+pP/0b1A67kyl0G60xO13PnnxJSsRBiTiqD8OYPM6BDmQuftc73XOJZbHxD3VFO0B440k94/S9WQqMNVaH7AAMSabU9drvI8afgwxdfuR7dzQZYMtZVq9xgc/nXibTW6ft87yY2g8eJsPNMLSvOduE8a+VnUmAh+p0SpQ== root@mail.cadus.org-opendkim' - 'ssh-rsa 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 root@mail.faire-mobilitaet.de' - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQCv2rDahAeQBR9NcQkHG5VHbMNGlOzHJPbh5V34ogloAtW0VVO7xnes3Ak3Q/eM0tFbFMG4MRti1M3Un0GJzTV9H2bqN02TmUp5MnDVDcHNfG4L7hqLH2KtwniKeB41IKIeJUdhpKxdFFqM8Z78Xn5EASO5Fu33lQcH+RTbmoYikEr1WrSbQB3wcqtXS+lNveyFUlJD9XJ0MLzanBePQh9boc93CfOa3yFTb90grfB5QjnpL7167MpSH6Oq/DVh5NcnMzvoYjZf9gsMTHuOAUyUKGeUdg2K89gFjkBq2r3S3ouKpDQxPSRXHuNDBSeHJEHy8DP6rOd+0qZVOaPEv3Qi/BRPO9LWcc2aUg8ydI7w1oMd/STaK54PaUJJ7uXV3ZTQsxGyziwZlx+Gq0PNAMjKFdYXAcuGPnlYxDGhVcJJElEuu7DJQqpWfzofov2VEniQQ8Ekknpxd5MFYka0NP038lpIZyMzy13DFJ6KUchbTGfzkHcwKmFX+3vZFEBqq5rZWOuY303qe5gP7eKhsBV/iu47Ne1OtTS2N0QFPTElshk3CLbZKerQo+XLxo3Z15cRDxDsgkdAHtY1PiMjXeX8ZahwXC2vs1ZfBoN4kK2iIH1Gtor4QG+g7chjKa+kZDKqFd4y0EZzeR0IjYCyWt2mNd3hMbEjBtZp75drYmRlqQ== root@ga-st-mail-opendkim' - 'ssh-rsa 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 root@ga-st-mail-dehydrated' - - 'ssh-rsa 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 root@www.oopen.de-ns' + - 'ssh-rsa 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 root@lists.mx' + - 'ssh-rsa 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 root@test.mx' + - 'ssh-rsa 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 root@web-01-de-ns' + - 'ssh-rsa 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 root@web-01-opendkim' + - 'ssh-rsa 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 root@luna' + - 'ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC5IhVprsvVOcFPbZzD9xR0nCjZ/9qVG6RhLJ7QBSts81nRvLwnmvcMBHSf5Rfaigey7Ff5dLHfJnxRE0KDATn6n2yd/5mXpn2GAA8hDVfhdsmsb5U7bROjZNr8MmIUrP7c3msUGx1FtvzhwxtyvIWOFQpWx+W5biBa6hFjIxT1pkUJqe6fclp7xbGYKZiqZRBS4qKG5CpKnisuOYDsqYPND+OkU+PShoxGVzp1JywIVze7qeKv6GyYbRA9SP9Np+5Mit6B21Io4zOI81c2Rz6sPX7mwEAQEs7iCm2hzG8qJws45Lb4ERqDkVEVhGNUyHjHgGebS1sZx1mLExdurXlPm1l/EamkncDFDCutHXtLP7lsFFiym7fKUjSEgiiLmyu5Xm+mwZvesKa1FYNaeiFWfYZpCJrNzIk+ffs+mgg3kmL4Sd4Ooy7jXPX+WJe5Xyh1KLU/+Wj2TVrhN+LbmupYAti/Wgd3DA1v601svmG82aLmyJRtKC0rGMePH3kDbtqU72kYpzI8mXERe1TIQ00Z77kQBR/7BF/9y5/0YmYDcXt1wNCoSie+mzz3xYcEdLAc7T+DhYpd4M6VgWnuz/exzRzhQwoSdEKkEED8CpEoBrEWEiMdrlElGmlkVomLU7P9i9j1rshX/pAq0asnqeSoPdC3vNbU3keiJQnhIHECvw== chris@luna' # --- @@ -89,6 +88,68 @@ extra_user: # --- +# --- +# vars used by roles/common/tasks/config_files.yml +# --- + +copy_plain_files: + + - name: bind_add_dkim_zone_slave + src_path: b.ns/root/bin/bind/conf/bind_add_dkim_zone_master.conf + dest_path: /root/bin/bind/conf/bind_add_dkim_zone_master.conf + + +# --- +# vars used by roles/common/tasks/symlink_files.yml +# --- + +symlink_files: + - name: bind_get_domain_by_hostname + src_path: /root/bin/bind/bind_get_domain_by_hostname.sh + dest_path: /usr/local/bin/bind_get_domain_by_hostname.sh + + - name: bind_get_zonefile_by_hostname + src_path: /root/bin/bind/bind_get_zonefile_by_hostname.sh + dest_path: /usr/local/bin/bind_get_zonefile_by_hostname.sh + + - name: bind_rndc_sync_clean + src_path: /root/bin/bind/bind_rndc_sync_clean.sh + dest_path: /usr/local/bin/bind_rndc_sync_clean.sh + + - name: /bind_set_new_serial + src_path: /root/bin/bind/bind_set_new_serial.sh + dest_path: /usr/local/bin/bind_set_new_serial.sh + + - name: bind_set_renew_tlsa + src_path: /root/bin/bind/bind_set_renew_tlsa.sh + dest_path: /usr/local/bin/bind_set_renew_tlsa.sh + + - name: bind_add_dkim_zone_master + src_path: /root/bin/bind/bind_add_dkim_zone_master.sh + dest_path: /usr/local/bin/bind_add_dkim_zone_master.sh + + - name: bind_add_dkim_zone_slave + src_path: /root/bin/bind/bind_add_dkim_zone_slave.sh + dest_path: /usr/local/bin/bind_add_dkim_zone_slave.sh + + - name: bind_reload_all_zones + src_path: /root/bin/bind/bind_reload_all_zones.sh + dest_path: /usr/local/bin/bind_reload_all_zones.sh + + - name: bind_remove_domain_on_master + src_path: /root/bin/bind/bind_remove_domain_on_master.sh + dest_path: /usr/local/bin/bind_remove_domain_on_master.sh + + - name: bind_remove_domain_on_slave + src_path: /root/bin/bind/bind_remove_domain_on_slave.sh + dest_path: /usr/local/bin/bind_remove_domain_on_slave.sh + + +# --- +# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml +# --- + + # ============================== diff --git a/host_vars/c.mx.oopen.de.yml b/host_vars/c.mx.oopen.de.yml new file mode 100644 index 0000000..50f5514 --- /dev/null +++ b/host_vars/c.mx.oopen.de.yml @@ -0,0 +1,83 @@ +--- + +# --- +# vars used by roles/ansible_dependencies +# --- + + +# --- +# vars used by roles/ansible_user +# --- + + +# --- +# vars used by roles/common/tasks/basic.yml +# --- + + +# --- +# vars used by roles/common/tasks/sshd.yml +# --- + + +# --- +# vars used by roles/common/tasks/apt.yml +# --- + +apt_install_compiler_pkgs: true + +apt_install_postgresql_pkgs: true + + +# --- +# vars used by roles/common/tasks/users.yml +# --- + +insert_root_ssh_keypair: true + +root_ssh_keypair: + - name: id-rsa-dehydrated + priv_key_src: root/.ssh/c.mx-id_rsa-dehydrated + priv_key_dest: /root/.ssh/id_rsa-dehydrated + pub_key_src: root/.ssh/c.mx-id_rsa-dehydrated.pub + pub_key_dest: /root/.ssh/id_rsa-dehydrated.pub + - name: id-rsa-opendkim + priv_key_src: root/.ssh/c.mx-id_rsa-opendkim + priv_key_dest: /root/.ssh/id_rsa-opendkim + pub_key_src: root/.ssh/c.mx-id_rsa-opendkim.pub + pub_key_dest: /root/.ssh/id_rsa-opendkim.pub + - name: id-rsa + priv_key_src: root/.ssh/c.mx-id_rsa + priv_key_dest: /root/.ssh/id_rsa + pub_key_src: root/.ssh/c.mx-id_rsa.pub + pub_key_dest: /root/.ssh/id_rsa.pub + + + +# --- +# vars used by roles/common/tasks/users-systemfiles.yml +# --- + + +# --- +# vars used by roles/common/tasks/webadmin-user.yml +# --- + + +# --- +# vars used by roles/common/tasks/sudoers.yml +# --- +# +# see: roles/common/tasks/vars + + +# --- +# vars used by roles/common/tasks/caching-nameserver.yml +# --- + + +# --- +# vars used by roles/common/tasks/git.yml +# --- +# +# see: roles/common/tasks/vars diff --git a/host_vars/devel-cloud.wf.netz.yml b/host_vars/devel-cloud.wf.netz.yml index b3aaff6..8d9182e 100644 --- a/host_vars/devel-cloud.wf.netz.yml +++ b/host_vars/devel-cloud.wf.netz.yml @@ -29,26 +29,6 @@ # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.devel-root - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.devel-root.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - priv_key_src: root/.ssh/id_ed25519.warenform-office - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.warenform-office.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: devel-root.wf.netz - - - extra_user: - name: kaya diff --git a/host_vars/e.mx.oopen.de.yml b/host_vars/e.mx.oopen.de.yml new file mode 100644 index 0000000..3d8aaa0 --- /dev/null +++ b/host_vars/e.mx.oopen.de.yml @@ -0,0 +1,206 @@ +--- + +# --- +# vars used by roles/ansible_dependencies +# --- + + +# --- +# vars used by roles/ansible_user +# --- + + +# --- +# vars used by roles/common/tasks/basic.yml +# --- + + +# --- +# vars used by roles/common/tasks/sshd.yml +# --- + + +# --- +# vars used by roles/common/tasks/apt.yml +# --- + +apt_install_compiler_pkgs: true + +apt_install_postgresql_pkgs: true + + +# --- +# vars used by roles/common/tasks/users.yml +# --- + +insert_root_ssh_keypair: true + +root_ssh_keypair: + - name: id-rsa-dehydrated + priv_key_src: root/.ssh/e.mx-id_rsa-dehydrated + priv_key_dest: /root/.ssh/id_rsa-dehydrated + pub_key_src: root/.ssh/e.mx-id_rsa-dehydrated.pub + pub_key_dest: /root/.ssh/id_rsa-dehydrated.pub + - name: id-rsa-opendkim + priv_key_src: root/.ssh/e.mx-id_rsa-opendkim + priv_key_dest: /root/.ssh/id_rsa-opendkim + pub_key_src: root/.ssh/e.mx-id_rsa-opendkim.pub + pub_key_dest: /root/.ssh/id_rsa-opendkim.pub + + +# --- +# vars used by roles/common/tasks/users-systemfiles.yml +# --- + + +# --- +# vars used by roles/common/tasks/webadmin-user.yml +# --- + + +# --- +# vars used by roles/common/tasks/sudoers.yml +# --- +# +# see: roles/common/tasks/vars + + +# --- +# vars used by roles/common/tasks/caching-nameserver.yml +# --- + + +# --- +# vars used by roles/common/tasks/git.yml +# --- +# +# see: roles/common/tasks/vars + + +# --- +# vars used by roles/common/tasks/copy_files.yml +# --- + +copy_plain_files: + + - name: monitoring_check_cert_for_dovecot.conf + src_path: e.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf + dest_path: /root/bin/monitoring/conf/check_cert_for_dovecot.conf + + - name: monitoring_check_webservice_load.conf + src_path: e.mx/root/bin/monitoring/conf/check_webservice_load.conf + dest_path: /root/bin/monitoring/conf/check_webservice_load.conf + + - name: postfix_create_opendkim_key.conf + src_path: e.mx/root/bin/postfix/conf/create_opendkim_key.conf + dest_path: /root/bin/postfix/conf/create_opendkim_key.conf + + - name: postfix_postfix_add_mailboxes.conf + src_path: e.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf + dest_path: /root/bin/postfix/conf/postfix_add_mailboxes.conf + + - name: postfix_sent_userinfo_postfix.conf + src_path: e.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf + dest_path: /root/bin/postfix/conf/sent_userinfo_postfix.conf + + - name: postfix_whitelist_mb_sigs.conf + src_path: e.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf + dest_path: /root/bin/postfix/conf/whitelist_mb_sigs.conf + + +copy_template_files: [] +# +# - name: mailsystem_install_amavis.conf +# src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2 +# dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf + + + +# --- +# vars used by roles/common/tasks/config_files_mailsystem_scripts.yml +# --- + +hostname: e.mx.oopen.de +ipv4_address: 95.217.204.205 +ipv6_address: 2a01:4f9:4a:47e5::205 + +admin_email: argus@oopen.de +is_relay_host: false + +# postfix_db_type +# +# possible values are 'PostgreSQL' and 'MySQL' +postfix_db_type: PostgreSQL +postfix_db_name: postfix +postfix_db_user: postfix +postfix_db_host: localhost +postfix_db_pass: W/w-musi9cr5Gg%U + +# install_amavis.conf +# +mp_receipt_number: 106015125438 +si_authorisation_signature: b0b7e94d3fcc8f3b1f128edd5830392361868cf0174723a9924ac25bf8b1b588cb974b50234e1bc1d9839dfe0ca6e1627733d90daf1399347b1046d20c2e3a89 + +# install_postfixadmin.conf +# +website_name_postfixadmin: adm-e.oopen.de + +email_welcome_message: "\n +Hallo,\n + +Ihre/Deine neue E-Mail Adresse ist eingerichtet.\n + +O.OPEN\n + +--\n +O.OPEN | Phone: +49 30 / 290 484 91\n +Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n +D-10999 Berlin | E-MAIL: oo@oopen.de\n +" + +# install_update_dovecot.conf +# +dovecot_from_address: "o.open " +dovecot_reply_to: "oo@oopen.de" +webmailer_address: "https://webmail-e.oopen.de" +salutation: "O.OPEN\n + +--\n +O.OPEN | Phone: +49 30 / 290 484 91\n +Erkelenzdamm 21 | Fax: +49 30 / 290 484 99\n +D-10999 Berlin | http://oopen.de" + +# install_upgrade_roundcube-webmail.conf +# +# Webmailer +webmail_site_name: webmail-e.oopen.de +autoreply_hostname: autoreply.oopen.de +# possible values: 'pgsql' or 'mysql' +roundcube_db_type: pgsql +roundcube_db_name: roundcubemail +roundcube_db_user: roundcube +roundcube_db_host: localhost +roundcube_db_pass: 'mfeV-64e.VQRfR7x' + +roundcube_product_name: O.OPEN - Webmailer +roundcube_support_url: https://www.oopen.de +roundcube_skin_logo: "images/oopen-logo.png" + + +template_files_mailsystem_script: + + - name: mailsystem_install_amavis.conf + src_path: usr/local/src/mailsystem/conf/install_amavis.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_amavis.conf + + - name: mailsystem_install_postfixadmin.conf + src_path: usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_postfixadmin.conf + + - name: mailsystem_install_update_dovecot.conf + src_path: usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_update_dovecot.conf + + - name: mailsystem_install_upgrade_roundcube-webmail.conf + src_path: usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2 + dest_path: /usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf diff --git a/host_vars/git.oopen.de.yml b/host_vars/git.oopen.de.yml index 6d6db1e..812ae23 100644 --- a/host_vars/git.oopen.de.yml +++ b/host_vars/git.oopen.de.yml @@ -28,25 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/gw-123.oopen.de.yml b/host_vars/gw-123.oopen.de.yml index 561a917..726ec88 100644 --- a/host_vars/gw-123.oopen.de.yml +++ b/host_vars/gw-123.oopen.de.yml @@ -28,25 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/gw-ckubu.local.netz.yml b/host_vars/gw-ckubu.local.netz.yml index 561a917..726ec88 100644 --- a/host_vars/gw-ckubu.local.netz.yml +++ b/host_vars/gw-ckubu.local.netz.yml @@ -28,25 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/meet.oopen.de.yml b/host_vars/meet.oopen.de.yml index a6a5492..b285945 100644 --- a/host_vars/meet.oopen.de.yml +++ b/host_vars/meet.oopen.de.yml @@ -30,25 +30,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/moodle.oopen.de.yml b/host_vars/moodle.oopen.de.yml index b059630..ea33abf 100644 --- a/host_vars/moodle.oopen.de.yml +++ b/host_vars/moodle.oopen.de.yml @@ -30,25 +30,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/nc-gw.oopen.de.yml b/host_vars/nc-gw.oopen.de.yml index fa97a80..6ce5122 100644 --- a/host_vars/nc-gw.oopen.de.yml +++ b/host_vars/nc-gw.oopen.de.yml @@ -23,25 +23,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o13-board.oopen.de.yml b/host_vars/o13-board.oopen.de.yml index b7539f1..4d1a894 100644 --- a/host_vars/o13-board.oopen.de.yml +++ b/host_vars/o13-board.oopen.de.yml @@ -28,25 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o13-mail.oopen.de.yml b/host_vars/o13-mail.oopen.de.yml index b7539f1..5d934d1 100644 --- a/host_vars/o13-mail.oopen.de.yml +++ b/host_vars/o13-mail.oopen.de.yml @@ -28,26 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - - default_user: diff --git a/host_vars/o13-mumble.oopen.de.yml b/host_vars/o13-mumble.oopen.de.yml index b7539f1..5d934d1 100644 --- a/host_vars/o13-mumble.oopen.de.yml +++ b/host_vars/o13-mumble.oopen.de.yml @@ -28,26 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - - default_user: diff --git a/host_vars/o13-pad.oopen.de.yml b/host_vars/o13-pad.oopen.de.yml index b7539f1..5d934d1 100644 --- a/host_vars/o13-pad.oopen.de.yml +++ b/host_vars/o13-pad.oopen.de.yml @@ -28,26 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - - default_user: diff --git a/host_vars/o13-schleuder.oopen.de.yml b/host_vars/o13-schleuder.oopen.de.yml index b7539f1..5d934d1 100644 --- a/host_vars/o13-schleuder.oopen.de.yml +++ b/host_vars/o13-schleuder.oopen.de.yml @@ -28,26 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - - default_user: diff --git a/host_vars/o13-web.oopen.de.yml b/host_vars/o13-web.oopen.de.yml index 84aea4c..18922d0 100644 --- a/host_vars/o13-web.oopen.de.yml +++ b/host_vars/o13-web.oopen.de.yml @@ -28,26 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - - default_user: diff --git a/host_vars/o13.oopen.de.yml b/host_vars/o13.oopen.de.yml index b7539f1..4d1a894 100644 --- a/host_vars/o13.oopen.de.yml +++ b/host_vars/o13.oopen.de.yml @@ -28,25 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o28.oopen.de.yml b/host_vars/o28.oopen.de.yml index aceb4e2..ea3a62c 100644 --- a/host_vars/o28.oopen.de.yml +++ b/host_vars/o28.oopen.de.yml @@ -28,25 +28,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o29.oopen.de.yml b/host_vars/o29.oopen.de.yml index bcffee4..c7cccc6 100644 --- a/host_vars/o29.oopen.de.yml +++ b/host_vars/o29.oopen.de.yml @@ -30,25 +30,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o30.oopen.de.yml b/host_vars/o30.oopen.de.yml index 45f7469..42c6f27 100644 --- a/host_vars/o30.oopen.de.yml +++ b/host_vars/o30.oopen.de.yml @@ -123,25 +123,6 @@ network_interfaces: # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o32.oopen.de.yml b/host_vars/o32.oopen.de.yml index bb0e377..1c6e6e6 100644 --- a/host_vars/o32.oopen.de.yml +++ b/host_vars/o32.oopen.de.yml @@ -33,25 +33,6 @@ create_sftp_group: true -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o35.oopen.de.yml b/host_vars/o35.oopen.de.yml index f7f51d1..aa92ef0 100644 --- a/host_vars/o35.oopen.de.yml +++ b/host_vars/o35.oopen.de.yml @@ -123,25 +123,6 @@ network_interfaces: # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o36.oopen.de.yml b/host_vars/o36.oopen.de.yml index a6a5492..b285945 100644 --- a/host_vars/o36.oopen.de.yml +++ b/host_vars/o36.oopen.de.yml @@ -30,25 +30,6 @@ # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/o37.oopen.de.yml b/host_vars/o37.oopen.de.yml index 50c46f9..5ea3c18 100644 --- a/host_vars/o37.oopen.de.yml +++ b/host_vars/o37.oopen.de.yml @@ -33,25 +33,6 @@ create_sftp_group: true -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/host_vars/www.oopen.de.yml b/host_vars/www.oopen.de.yml index de2eea6..070ff45 100644 --- a/host_vars/www.oopen.de.yml +++ b/host_vars/www.oopen.de.yml @@ -30,25 +30,6 @@ create_sftp_group: true # --- # vars used by roles/common/tasks/users.yml # --- -ssh_keypair_backup_server: - - name: backup - backup_user: back - priv_key_src: root/.ssh/id_rsa.backup.oopen.de - priv_key_dest: /root/.ssh/id_rsa - pub_key_src: root/.ssh/id_rsa.backup.oopen.de.pub - pub_key_dest: /root/.ssh/id_rsa.pub - -insert_root_ssh_keypair: true - -root_ssh_keypair: - - name: backup - login: root - priv_key_src: root/.ssh/id_ed25519.oopen-server - priv_key_dest: /root/.ssh/id_ed25519 - pub_key_src: root/.ssh/id_ed25519.oopen-server.pub - pub_key_dest: /root/.ssh/id_ed25519.pub - target: backup.oopen.de - default_user: diff --git a/hosts b/hosts index 5822a3f..1c29c60 100644 --- a/hosts +++ b/hosts @@ -1,7 +1,6 @@ [dns_sinma] dns1.warenform.de -a.ns.oopen.de [extra_hosts] @@ -85,9 +84,7 @@ o13-schleuder.oopen.de o13-web.oopen.de o14.oopen.de -b.ns.oopen.de -95.217.204.204 -d.mx.oopen.de +a.mx.oopen.de o15.oopen.de b.mx.oopen.de @@ -113,6 +110,7 @@ oolm-shop-dev.oopen.de oolm-web.oopen.de o23.oopen.de +a.ns.oopen.de cl-01.oopen.de cp-01.oopen.de meet.oopen.de @@ -159,10 +157,13 @@ o33.oopen.de o34.oopen.de o35.oopen.de +b.ns.oopen.de cl-02.oopen.de e.mx.oopen.de etherpad.oopen.de web-02.oopen.de +d.mx.oopen.de +95.217.204.247 # Jitsi Meet - ReachOut o36.oopen.de @@ -280,9 +281,6 @@ o13-web.oopen.de # - o14.oopen.de o14.oopen.de a.mx.oopen.de -b.ns.oopen.de -95.217.204.204 -d.mx.oopen.de # - o15.oopen.de o15.oopen.de @@ -313,6 +311,7 @@ oolm-web.oopen.de # - o23.oopen.de o23.oopen.de +a.ns.oopen.de cl-01.oopen.de cp-01.oopen.de meet.oopen.de @@ -365,10 +364,13 @@ o34.oopen.de # - o35.oopen.de o35.oopen.de +b.ns.oopen.de cl-02.oopen.de e.mx.oopen.de etherpad.oopen.de web-02.oopen.de +d.mx.oopen.de +95.217.204.247 # Jitsi Meet - ReachOut o36.oopen.de @@ -376,9 +378,6 @@ o36.oopen.de # Backup Faire Mobilitaet o37.oopen.de -# - Vserver von Sinma -a.ns.oopen.de - # --- # O.OPEN office network # --- @@ -436,7 +435,6 @@ o13-web.oopen.de # o14.oopen.de a.mx.oopen.de -d.mx.oopen.de # o15.oopen.de web-01.oopen.de @@ -479,6 +477,8 @@ cloud.akweb.de cl-02.oopen.de e.mx.oopen.de web-02.oopen.de +d.mx.oopen.de +95.217.204.247 # Backup Faire Mobilitaet o37.oopen.de @@ -691,7 +691,6 @@ o13-schleuder.oopen.de # o14.oopen.de a.mx.oopen.de -d.mx.oopen.de # o15.oopen.de b.mx.oopen.de @@ -708,6 +707,8 @@ mail.faire-mobilitaet.de # o35.oopen.de e.mx.oopen.de +d.mx.oopen.de +95.217.204.247 # --- @@ -728,9 +729,6 @@ lists.mx.warenform.de [sympa_list_server] -# o14.oopen.de -d.mx.oopen.de - # server24.warenform.de lists.mx.warenform.de @@ -757,6 +755,8 @@ mail.faire-mobilitaet.de # o35.oopen.de e.mx.oopen.de +d.mx.oopen.de +95.217.204.247 # --- # O.OPEN office network @@ -795,9 +795,6 @@ o13-board.oopen.de o13-mail.oopen.de o13-web.oopen.de -# o14.oopen.de -d.mx.oopen.de - # o15.oopen.de piwik.oopen.de web-01.oopen.de @@ -844,6 +841,7 @@ o32.oopen.de cl-02.oopen.de etherpad.oopen.de web-02.oopen.de +d.mx.oopen.de # Backup Faire Mobilitaet o37.oopen.de @@ -927,7 +925,6 @@ cloud-giz.warenform.de # --- a.ns.oopen.de b.ns.oopen.de -95.217.204.204 # --- # Warenform @@ -950,8 +947,6 @@ o13-mail.oopen.de # o14.oopen.de a.mx.oopen.de -d.mx.oopen.de -e.mx.oopen.de # o15.oopen.de b.mx.oopen.de @@ -969,7 +964,9 @@ mail.cadus.org mail.faire-mobilitaet.de # o35.oopen.de +d.mx.oopen.de e.mx.oopen.de +95.217.204.247 # --- # O.OPEN office network @@ -1134,9 +1131,6 @@ o13-web.oopen.de # - o14.oopen.de a.mx.oopen.de -b.ns.oopen.de -95.217.204.204 -d.mx.oopen.de # - o15.oopen.de b.mx.oopen.de @@ -1161,6 +1155,7 @@ oolm-shop-dev.oopen.de oolm-web.oopen.de # - o23.oopen.de +a.ns.oopen.de cl-01.oopen.de cp-01.oopen.de meet.oopen.de @@ -1202,9 +1197,6 @@ o31.oopen.de # etventure o32.oopen.de -# - Vserver von Sinma -a.ns.oopen.de - # BigBlueButton - O.OPEN o33.oopen.de @@ -1216,6 +1208,9 @@ cl-02.oopen.de e.mx.oopen.de etherpad.oopen.de web-02.oopen.de +b.ns.oopen.de +d.mx.oopen.de +95.217.204.247 # Jitsi Meet - ReachOut o36.oopen.de @@ -1317,9 +1312,6 @@ o13-web.oopen.de # - o14.oopen.de o14.oopen.de a.mx.oopen.de -b.ns.oopen.de -95.217.204.204 -d.mx.oopen.de # - o15.oopen.de o15.oopen.de @@ -1352,6 +1344,7 @@ oolm-web.oopen.de # - o23.oopen.de o23.oopen.de +a.ns.oopen.de cl-01.oopen.de cp-01.oopen.de meet.oopen.de @@ -1409,6 +1402,9 @@ cl-02.oopen.de e.mx.oopen.de etherpad.oopen.de web-02.oopen.de +b.ns.oopen.de +d.mx.oopen.de +95.217.204.247 # Jitsi Meet - ReachOut o36.oopen.de @@ -1416,9 +1412,6 @@ o36.oopen.de # Backup Faire Mobilitaet o37.oopen.de -# - Vserver von Sinma -a.ns.oopen.de - # --- # so36.NET diff --git a/roles/common/files/a.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf b/roles/common/files/a.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf new file mode 100644 index 0000000..a14b911 --- /dev/null +++ b/roles/common/files/a.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf @@ -0,0 +1,133 @@ +#--------------------------------------- +#----------------------------- +# Settings for script check_cert_for_dovecot.sh +#----------------------------- +#--------------------------------------- + +# - service_domain +# - +# - The main domain for which the certificate was issued +# - +# - Example: +# - service_domain="a.mx.oopen.de" +# - service_domain="mail.cadus.org" +# - service_domain="mx.warenform.de" +# - +#service_domain="" +service_domain="a.mx.oopen.de" + + +# - service_name +# - +# - Name of service. +# - +# - Note: this var will also be used to determin systemd service file +# - or sysVinit script. +# - +# - Example: +# - service_name="Mumble" +# - service_name="Prosody" +# - +# - Defaults to: +# - service_name="Dovecot" +# - +#service_name="" + + +# - check_string_ps +# - +# - String wich (clearly) identifies the service at the process list (ps) +# - +# - Example: +# - check_string_ps="[[:digit:]]\ /usr/sbin/murmurd" +# - check_string_ps="" +# - +# - Defaults to: +# - check_string_ps="[[:digit:]]\ /usr/local/dovecot-[[:digit:]]{1,2}\.[[:digit:]]{1,2}\.[[:digit:]]{1,2}(\.[[:digit:]]{1,2})?/sbin/dovecot" +# - +#check_string_ps="" + + +# - service_user +# - +# - User under which the service is running. +# - +# - Example: +# - service_user="mumble-server" +# - service_user="prosody" +# - +# - Defaults to: +# - service_user="prosody" +# - +#service_user="" + + +# - service_group +# - +# - Group under which the service is running. +# - +# - Example: +# - service_group="mumble-server" +# - service_group="prosody" +# - +# - Defaults to: +# - service_group="prosody" +# - +#service_group="" + + +# - cert_installed +# - +# - Locataion of certificate read by service +# - +# - Example: +# - cert_installed="/var/lib/mumble-server/fullchain.pem" +# - cert_installed="/var/lib/dehydrated/certs/jabber.so36.net/fullchain.pem" +# - +# - Defaults to: +# - /etc/dovecot/ssl/mailserver.crt +# - +#cert_installed="" + + +# - key_installed +# - +# - Location of the key read by service +# - +# - Example: +# - key_installed="/var/lib/mumble-server/privkey.pem" +# - key_installed="/etc/prosody/certs/privkey_jabber.so36.pem" +# - +# - Defaults to: +# - /etc/dovecot/ssl/mailserver.key +# - +#key_installed="" + + +# - cert_newest +# - +# - Location of the newest certificate. +# - +# - Example: +# - cert_newest="/var/lib/dehydrated/certs/il-mumble.oopen.de/fullchain.pem" +# - cert_newest="/var/lib/dehydrated/certs/jabber.so36.net/fullchain.pem" +# - +# - Defaults to: +# - /var/lib/dehydrated/certs/${service_domain}/fullchain.pem +# - +#cert_newest="" + + +# - key_newest +# - +# - Location of the newest Key +# - +# - Example: +# - key_newest="/var/lib/dehydrated/certs/il-mumble.oopen.de/privkey.pem" +# - key_newest="/var/lib/dehydrated/certs/jabber.so36.net/privkey.pem" +# - +# - Defaults to: +# - /var/lib/dehydrated/certs/${service_domain}/privkey.pem +# - +#key_newest="" + diff --git a/roles/common/files/a.mx/root/bin/monitoring/conf/check_webservice_load.conf b/roles/common/files/a.mx/root/bin/monitoring/conf/check_webservice_load.conf new file mode 100644 index 0000000..6b84d2d --- /dev/null +++ b/roles/common/files/a.mx/root/bin/monitoring/conf/check_webservice_load.conf @@ -0,0 +1,145 @@ +#--------------------------------------- +#----------------------------- +# Settings +#----------------------------- +#--------------------------------------- + +#LOGGING=true +LOGGING=false + +# - What to check +# - +check_load=true +check_mysql=false +check_apache=true +check_php_fpm=true +check_website=false + + +# - Additional Settings for check_mysql +# - +# - MySQL / MariaDB credentials +# - +# - Giving password on command line is insecure an sind mysql 5.5 +# - you will get a warning doing so. +# - +# - Reading username/password fro file ist also possible, using MySQL/MariaDB +# - commandline parameter '--defaults-file'. +# - +# - Since Mysql Version 5.6, you can read username/password from +# - encrypted file. +# - +# - Create (encrypted) option file: +# - $ mysql_config_editor set --login-path=local --socket=/tmp/mysql.sock --user=root --password +# - $ Password: +# - +# - Use of option file: +# - $ mysql --login-path=local ... +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +mysql_credential_args="--login-path=local" + + +# - Additional Settings for check_php_fpm +# - +# - On Linux Vserver System set +# - curl_check_host=localhost +# - +# - On LX-Container set +# - curl_check_host=127.0.0.1 +# - +curl_check_host=127.0.0.1 + +# - Which PHP versions should be supported by this script. If more than one, +# - give a blank separated list +# - +# - Example: +# - php_versions="5.4 5.6 7.0 7.1" +# - +php_versions="7.4" + +# - If PHP-FPM's ping.path setting does not match ping-$php_major_version, +# - set the value given in your ping.path setting here. Give ping_path also +# - the concerning php_version in form +# - : +# - +# - Multiple settings are possible, give a blank separated list. +# - +# - Example: +# - +# - ping_path="5.4:ping-site36_net 5.6:ping-oopen_de" +# - +ping_path="" + + +# - Additional Settings for check_website - checking (expected) website response +# - +# - example: +# - is_working_url="https://www.outoflineshop.de/" +# - check_string='ool-account-links' +# - include_cleanup_function=true +# - extra_alert_address="ilker@so36.net" +# - cleanup_function=' +# - rm -rf /var/www/www.outoflineshop.de/htdocs/var/cache/* +# - rm -rf /var/www/www.outoflineshop.de/htdocs/var/session/* +# - /usr/local/bin/redis-cli flushall > /dev/null 2>&1 +# - if [[ "$?" = "0" ]]; then +# - ok "I have cleaned up directory \"/var/www/www.outoflineshop.de/htdocs/var/cache/\"" +# - else +# - error "Cleaning up directory \"/var/www/www.outoflineshop.de/htdocs/var/cache/\" failed!" +# - fi +# - /etc/init.d/redis_6379 restart +# - if [[ "$?" = "0" ]]; then +# - ok "I restarted the redis service" +# - echo -e "\t[ Ok ]: I restarted the redis service" >> $LOCK_DIR/extra_msg.txt +# - else +# - error "Restarting the redis server failed!" +# - echo -e "\t[ Error ]: Restarting the redis server failed!" >> $LOCK_DIR/extra_msg.txt +# - fi +# - ' +# - +is_working_url='' + +check_string='' + +include_cleanup_function=true + +# - An extra e-mail address, which will be informed, if the given check URL +# - does not response as expected (check_string) AFTER script checking, restarting +# - servervices (webserver, php-fpm) and cleaning up (cleanup_function) was done. +# - +extra_alert_address='' + +# - php_version_of_working_url +# - +# - If given website (is_working_url) does not response as expected, this PHP FPM +# - engines will be restarted. +# - +# - Type "None" if site does not support php +# - +# - If php_version_of_working_url is not set, PHP FPM processes of ALL versions (php_versions) +# - will be restarted +# - +php_version_of_working_url='' + +# - Notice: +# - If single qoutes "'" not needed inside cleanup function, then use single quotes +# - to enclose variable "cleanup_function". Then you don't have do masquerade any +# - sign inside. +# - +# - Otherwise use double quotes and masq any sign to prevent bash from interpreting. +# - +cleanup_function=' +' + + +# - E-Mail settings for sending script messages +# - +from_address="root@`hostname -f`" +content_type='Content-Type: text/plain;\n charset="utf-8"' +to_addresses="root" + diff --git a/roles/common/files/a.mx/root/bin/postfix/conf/create_opendkim_key.conf b/roles/common/files/a.mx/root/bin/postfix/conf/create_opendkim_key.conf new file mode 100644 index 0000000..aded3df --- /dev/null +++ b/roles/common/files/a.mx/root/bin/postfix/conf/create_opendkim_key.conf @@ -0,0 +1,170 @@ +# --------------------------------------------------------- +# - Parameter Settings for script 'create_opendkim_key.sh'. +# --------------------------------------------------------- + + +# ---------- +# DNS Server +# ---------- + +# - dns_dkim_zone_master_server +# - +# - The DNS Server who is serving the update zone and is used +# - for the dynamic updates (nsupdate) +# - +dns_dkim_zone_master_server="b.ns.oopen.de" + +# - update_dns +# - +# - Possible Values are 'true' or 'false' +# - +#update_dns=true + +# - update_zone +# - +# - Zone containing the DKIM TXT record. +# - +# - Defaults to '_domainkey.' +# - +# - Note: +# - do NOT change/set this option unless you know what you do. +# - +#update_zone="" + +# - TTL +# - +# - TTL for the DKIM TXT Record. +# - +# - Defaults to "" if update_dns=false +# - Defaults to "43200" if update_dns=true +# - +#TTL= + + +# ---------- +# TSIG Key +# ---------- + +# - key_secret +# - +# - Sectret Key used by 'nsupdate' to create/update the +# - DKIM TXT record. +# - +# - Example: +# - key_secret="EtvvMdW0PXD4GMHP+onuHZ0dT/Z8OSJGlce/xH10OwI=" +# - +key_secret="4woPu0jqf9Jp1IX+gduJ3BVW/1ZMeyCPTQMqEsMXLFw=" + +# - key_algo +# - +# - The key algorithm used for key creation. Available choices are: hmac-md5, +# - hmac-sha1, hmac-sha224, hmac-sha256, hmac-sha384 and hmac-sha512. The +# - default is hmac-sha256. Options are case-insensitive. +# - +# - Example: +# - key_algo="hmac-md5" +# - +# - Defaults to 'hmac-sha256' +# - +key_algo="hmac-sha256" + +# - key_name +# - +# - Name of the Key +# - +# - Defaults to "$update_zone" +# - +key_name="update-dkim" + + +# ---------- +# Access Credentials DNS Server +# ---------- + +# - dns_ssh_user +# - +# - Defaults to 'manage-bind' +# - +#dns_ssh_user="manage-bind" + +# - dns_ssh_port +# - +# - Defaults to '22' +# - +#dns_ssh_port=22 + +# - dns_ssh_key +# - +# - Defaults to '/root/.ssh/id_rsa-opendkim' +# - +#dns_ssh_key="/root/.ssh/id_rsa-opendkim" + + +# ---------- +# Scripts envoked at DNS Server +# ---------- + +# - set_new_serial_script +# - +# - Script increases the serial for a given domain or a given +# - hostname's concerning domain. +# - +# - Defaults to /root/bin/bind/bind_set_new_serial.sh +# - +#set_new_serial_script="/root/bin/bind/bind_set_new_serial.sh" + +# - create_dkim_delegation_script +# - +# - Script adds DKIM subdomain delegation for a given domain +# - +# - Defaults to '/root/bin/bind/bind_create_dkim_delegation.sh' +# - +#create_dkim_delegation_script="/root/bin/bind/bind_create_dkim_delegation.sh" + +# - add_dkim_zone_master_script +# - +# - Script adds zone _domainkey. as master zone +# - +# - Defaults to '/root/bin/bind/bind_add_dkim_zone_master.sh' +# - +#add_dkim_zone_master_script="/root/bin/bind/bind_add_dkim_zone_master.sh" + +# - add_dkim_zone_slave_script +# - +# - Script adds zone _domainkey. as slave zone +# - +# - Defaults to '/root/bin/bind/bind_add_dkim_zone_slave.sh' +# - +#add_dkim_zone_slave_script="/root/bin/bind/bind_add_dkim_zone_slave.sh" + + + +# ---------- +# OpenDKIM Installation +# ---------- + +# - opendkim_dir +# - +# - OpenDKIM's etc-directory +# - +# - Defaults to opendkim_dir="/etc/opendkim" +# - +#opendkim_dir="/etc/opendkim" + +# - key_base_dir +# - +# - Defaults to "${opendkim_dir}/keys" +# - +#key_base_dir=${opendkim_dir}/keys + +# - signing_table_file +# - +# - Defaults to "${opendkim_dir}/signing.table" +# - +#signing_table_file="${opendkim_dir}/signing.table" + +# - key_table_file +# - +# - Defaults to "${opendkim_dir}/key.table" +# - +#key_table_file="${opendkim_dir}/key.table" diff --git a/roles/common/files/a.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf b/roles/common/files/a.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf new file mode 100644 index 0000000..3cffedf --- /dev/null +++ b/roles/common/files/a.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf @@ -0,0 +1,84 @@ +# ---------------------------------------------------- +# --- +# - Parameter Settings for script 'postfix_add_mailboxes.sh'. +# --- +# ---------------------------------------------------- + +# - dovecot_enc_method +# - +# - The (dovecot) password scheme which should be used to generate the hashed +# - passwords of EXISTING users. +# - +# - Possible values are: +# - +# - See output of 'doveadm pw -l' +# - +# - DEFAULTS to: dovecot_enc_method="SHA512-CRYPT" +# - +#dovecot_enc_method="SHA512-CRYPT" + +# - in_file +# - +# - The file from wich the script reads the e-mail-address/password +# - kombination(s). Each line in this file must only contain +# - +# - +# - Defaults to: in_file="${conf_dir}/mailboxes_new.lst" +# - +#in_file="${conf_dir}/mailboxes_new.lst" + +# - db_type +# - +# - Type of Postfix Database +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +# - Defaults to: db_type="pgsql" +# - +#db_type="pgsql" + +# - db_name +# - +# - Database name for the postfix database +# - +# - Defaults to: db_name="postfix" +# - +#db_name="postfix" + +# - db_name +# - +# - Database name for the postfix database +# - +# - Defaults to: db_name="postfix" +# - +#db_name="postfix" + +# - mysql_credential_args (root access to MySQL Database) +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +# - Defaults to: +# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system +# - '/usr/local/mysql/sys-maint.cnf' otherwise +# - +#mysql_credential_args="" + +# - quota +# - +# - The quota setting for the new mailboxes. +# - +# - Defaults to: quota="536870912" +# - +#quota="536870912" +quota=1073741824 + +# - log_file +# - +# - Where to write logging informations? +# - +# - Defaults to: log_file="${script_dir}/log/postfix_add_mailboxes.log" +# - +#log_file="${script_dir}/log/postfix_add_mailboxes.log" diff --git a/roles/common/files/a.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf b/roles/common/files/a.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf new file mode 100644 index 0000000..56574b2 --- /dev/null +++ b/roles/common/files/a.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf @@ -0,0 +1,92 @@ +# ---------------------------------------------------- +# --- +# - Parameter Settings for script 'sent_userinfo_postfix.sh'. +# --- +# ---------------------------------------------------- + +# - message_body_file +# - +# - Full path to file containing the user info. This file must contain +# - the message body WITHOUT e-mail headers. If file is placed in the +# - 'files' directory use '${file_dir}/' +# - +# - Defaults to '${file_dir}/sent_userinfo_postfix.message' +# - +#message_body_file="${file_dir}/sent_userinfo_postfix.email" + + +# - email_from +# - +# - From Address of user info +# - +# - Example: 'oo@oopen.de' +# - +#email_from="" +email_from="oo@oopen.de" + + +# - email_from_org +# - +# - Example: email_from_org="O.OPEN" +# - +#email_from_org="" +email_from_org="O.OPEN" + + +# - db_type +# - +# - Type of Postfix Database +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +# - Defaults to: db_type="pgsql" +# - +#db_type="pgsql" + +# - db_name +# - +# - Database name for the postfix database +# - +# - Defaults to: db_name="postfix" +# - +#db_name="postfix" + +# - mysql_credential_args (root access to MySQL Database) +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +# - Defaults to: +# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system +# - '/usr/local/mysql/sys-maint.cnf' otherwise +# - +#mysql_credential_args="" + + +# - mail_user +# - +# - The owner of the mailbox directories and within the e-mails itself. +# - +# - defaults to mail_user="vmail" +# - +#mail_user="vmail" + + +# - mail_group +# - +# - The group of the mailbox directories +# - +# - defaults to mail_group="vmail" +# - +#mail_group="vmail" + + +# - mail_basedir - No more needed! +# - +# - The root directory where all mailbox-domains are located. +# - +# - Defaults to '/var/vmail'. +# - +#mail_basedir=/var/vmail diff --git a/roles/common/files/a.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf b/roles/common/files/a.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf new file mode 100644 index 0000000..e7cf6b5 --- /dev/null +++ b/roles/common/files/a.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf @@ -0,0 +1,42 @@ +# ====================================================== +# --- +# Parameter Settings for Script 'whitelist_mb_sigs.conf' +# --- +# ====================================================== + +# QUARANTINE_BASE_DIR +# +# Base directory where amavis stores quarantined e-mails, mostly in +# +# virus e-mails: $QUARANTINE_BASE_DIR/virus +# spam emails: $QUARANTINE_BASE_DIR/spam +# .. +# +# Defaults to: +# QUARANTINE_BASE_DIR="/var/QUARANTINE" +# +#QUARANTINE_BASE_DIR="/var/QUARANTINE" + + +# CLAMAV_VIRUS_WHITE_LIST +# +# Full path to clamav's (personal) white list file +# +# Defaults to: +# CLAMAV_VIRUS_WHITE_LIST="/var/lib/clamav/my_whitelist.ign2" +# +#CLAMAV_VIRUS_WHITE_LIST="/var/lib/clamav/my_whitelist.ign2" + + +# WHITE_LIST_STRINGS +# +# A blank separated list of strings to whitelist. +# +# Example: +# WHITE_LIST_STRINGS="google.com tinyurl.com" +# +# Defaults to: +# WHITE_LIST_STRINGS="google.com" +# +#WHITE_LIST_STRINGS="google.com" +WHITE_LIST_STRINGS="google.com tinyurl.com" diff --git a/roles/common/files/a.ns/root/bin/bind/conf/bind.conf b/roles/common/files/a.ns/root/bin/bind/conf/bind.conf new file mode 100644 index 0000000..5e2352c --- /dev/null +++ b/roles/common/files/a.ns/root/bin/bind/conf/bind.conf @@ -0,0 +1,86 @@ +# ---------------------------------------------------- +# --- +# - Parameter Settings for bind administration scripts. +# --- +# ---------------------------------------------------- + + +# - BIND_USER +# - +# - The user under which the nameservice is running +# - +# - Defaults to 'bind' +# - +#BIND_USER="bind" + + +# - BIND_GROUP +# - +# - The group under which the nameservice is running +# - +# - Defaults to 'bind' +# - +#BIND_GROUP="bind" + + +# - CONF_FILE_DIR +# - +# - Directory containing bind configuration files +# - +# - Defaults to "/etc/bind" +# - +#CONF_FILE_DIR="/root/tmp/bind" +CONF_FILE_DIR="/etc/bind" + + +# - ZONE_FILE_MASTER_DIR +# - +# - Directory containing the zone files (master) +# - +# - Defaults to "${CONF_FILE_DIR}/master" +# - +#ZONE_FILE_MASTER_DIR="${CONF_FILE_DIR}/master" + + +# - ZONE_FILE_SLAVE_DIR +# - +# - Directory containing the zone files (slave) +# - +# - Defaults to "${CONF_FILE_DIR}/slave" +# - +#ZONE_FILE_SLAVE_DIR="${CONF_FILE_DIR}/slave" + + +# - ZONE_FILE_SUFFIX +# - +# - Defaults to 'zone' +# - +#ZONE_FILE_SUFFIX="zone" + + +# - ZONES_DECLARATION_FILE +# - +# - File containing zone declarations +# - +# - Defaults to ${CONF_FILE_DIR}/named.conf.local +# - +#ZONES_DECLARATION_FILE="${CONF_FILE_DIR}/named.conf.local" + + + +# ----- +# - bind_change_SOA.sh +# ----- + +# - SOA_PRIMARY_MASTER +# - +# - Primary master for all zones +# - +SOA_PRIMARY_MASTER="a.ns.oopen.de" + +# - SOA_ADMIN_EMAIL +# - +# - mail address of the responsible of all zones +# - +SOA_ADMIN_EMAIL="domreg@oopen.de" + diff --git a/roles/common/files/a.ns/root/bin/bind/conf/bind_add_dkim_zone_slave.conf b/roles/common/files/a.ns/root/bin/bind/conf/bind_add_dkim_zone_slave.conf new file mode 100644 index 0000000..a5a0989 --- /dev/null +++ b/roles/common/files/a.ns/root/bin/bind/conf/bind_add_dkim_zone_slave.conf @@ -0,0 +1,24 @@ +# -------------------------------------------------------------- +# - Parameter Settings for script 'bind_add_dkim_zone_slave.sh'. +# --------------------------------------------------------------- + +# - DKIM_DNS_MASTER +# - +# - Primary master for new DKIM slave zones _domainkey.* +# - +# - Example: +# - DKIM_DNS_MASTER="b.ns.oopen.de" +# - +# - This option is required and have no default value. But +# - option can also set usinf commandline parameter flag '-M' +# - +DKIM_DNS_MASTER="b.ns.oopen.de" + +# - ALLOW_TRANSFER_OPTION +# - +# - Example: +# - ALLOW_TRANSFER_OPTION="oopen" +# - +# - Defaults to DKIM_DNS_MASTER IPv4 Address +# - +#ALLOW_TRANSFER_OPTION="" diff --git a/roles/common/files/b.ns/root/bin/bind/conf/bind_add_dkim_zone_master.conf b/roles/common/files/b.ns/root/bin/bind/conf/bind_add_dkim_zone_master.conf new file mode 100644 index 0000000..9344a0c --- /dev/null +++ b/roles/common/files/b.ns/root/bin/bind/conf/bind_add_dkim_zone_master.conf @@ -0,0 +1,40 @@ +# -------------------------------------------------------------- +# - Parameter Settings for script 'bind_add_dkim_zone_master.sh'. +# --------------------------------------------------------------- + +# - SOA_PRIMARY_MASTER +# - +# - Primary master for new DKIM zones _domainkey.* +# - +# - Example: SOA_PRIMARY_MASTER="a.ns.oopen.de" +# - +# - Defaults to '$(hostname --long)' +# - +SOA_PRIMARY_MASTER="b.ns.oopen.de" + +# - SOA_ADMIN_EMAIL +# - +# - mail address of the responsible of all zones +# - +# - Example: SOA_ADMIN_EMAIL="domreg@oopen.de" +# - +# - Defaults to 'domreg@oopen.de' +# - +SOA_ADMIN_EMAIL="domreg@oopen.de" + +# - TSIG_KEY_NAME +# - +# - Name of the key used for dynamical updates +# - +# - Defaults to 'update-dkim' +# - +TSIG_KEY_NAME='update-dkim' + +# - ALLOW_TRANSFER_OPTION +# - +# - Example: +# - ALLOW_TRANSFER_OPTION="oopen;" +# - ALLOW_TRANSFER_OPTION="83.223.90.93;" +# - +ALLOW_TRANSFER_OPTION="oopen;" + diff --git a/roles/common/files/e.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf b/roles/common/files/e.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf new file mode 100644 index 0000000..a14b911 --- /dev/null +++ b/roles/common/files/e.mx/root/bin/monitoring/conf/check_cert_for_dovecot.conf @@ -0,0 +1,133 @@ +#--------------------------------------- +#----------------------------- +# Settings for script check_cert_for_dovecot.sh +#----------------------------- +#--------------------------------------- + +# - service_domain +# - +# - The main domain for which the certificate was issued +# - +# - Example: +# - service_domain="a.mx.oopen.de" +# - service_domain="mail.cadus.org" +# - service_domain="mx.warenform.de" +# - +#service_domain="" +service_domain="a.mx.oopen.de" + + +# - service_name +# - +# - Name of service. +# - +# - Note: this var will also be used to determin systemd service file +# - or sysVinit script. +# - +# - Example: +# - service_name="Mumble" +# - service_name="Prosody" +# - +# - Defaults to: +# - service_name="Dovecot" +# - +#service_name="" + + +# - check_string_ps +# - +# - String wich (clearly) identifies the service at the process list (ps) +# - +# - Example: +# - check_string_ps="[[:digit:]]\ /usr/sbin/murmurd" +# - check_string_ps="" +# - +# - Defaults to: +# - check_string_ps="[[:digit:]]\ /usr/local/dovecot-[[:digit:]]{1,2}\.[[:digit:]]{1,2}\.[[:digit:]]{1,2}(\.[[:digit:]]{1,2})?/sbin/dovecot" +# - +#check_string_ps="" + + +# - service_user +# - +# - User under which the service is running. +# - +# - Example: +# - service_user="mumble-server" +# - service_user="prosody" +# - +# - Defaults to: +# - service_user="prosody" +# - +#service_user="" + + +# - service_group +# - +# - Group under which the service is running. +# - +# - Example: +# - service_group="mumble-server" +# - service_group="prosody" +# - +# - Defaults to: +# - service_group="prosody" +# - +#service_group="" + + +# - cert_installed +# - +# - Locataion of certificate read by service +# - +# - Example: +# - cert_installed="/var/lib/mumble-server/fullchain.pem" +# - cert_installed="/var/lib/dehydrated/certs/jabber.so36.net/fullchain.pem" +# - +# - Defaults to: +# - /etc/dovecot/ssl/mailserver.crt +# - +#cert_installed="" + + +# - key_installed +# - +# - Location of the key read by service +# - +# - Example: +# - key_installed="/var/lib/mumble-server/privkey.pem" +# - key_installed="/etc/prosody/certs/privkey_jabber.so36.pem" +# - +# - Defaults to: +# - /etc/dovecot/ssl/mailserver.key +# - +#key_installed="" + + +# - cert_newest +# - +# - Location of the newest certificate. +# - +# - Example: +# - cert_newest="/var/lib/dehydrated/certs/il-mumble.oopen.de/fullchain.pem" +# - cert_newest="/var/lib/dehydrated/certs/jabber.so36.net/fullchain.pem" +# - +# - Defaults to: +# - /var/lib/dehydrated/certs/${service_domain}/fullchain.pem +# - +#cert_newest="" + + +# - key_newest +# - +# - Location of the newest Key +# - +# - Example: +# - key_newest="/var/lib/dehydrated/certs/il-mumble.oopen.de/privkey.pem" +# - key_newest="/var/lib/dehydrated/certs/jabber.so36.net/privkey.pem" +# - +# - Defaults to: +# - /var/lib/dehydrated/certs/${service_domain}/privkey.pem +# - +#key_newest="" + diff --git a/roles/common/files/e.mx/root/bin/monitoring/conf/check_webservice_load.conf b/roles/common/files/e.mx/root/bin/monitoring/conf/check_webservice_load.conf new file mode 100644 index 0000000..87fe901 --- /dev/null +++ b/roles/common/files/e.mx/root/bin/monitoring/conf/check_webservice_load.conf @@ -0,0 +1,145 @@ +#--------------------------------------- +#----------------------------- +# Settings +#----------------------------- +#--------------------------------------- + +#LOGGING=true +LOGGING=false + +# - What to check +# - +check_load=true +check_mysql=false +check_apache=true +check_php_fpm=true +check_website=false + + +# - Additional Settings for check_mysql +# - +# - MySQL / MariaDB credentials +# - +# - Giving password on command line is insecure an sind mysql 5.5 +# - you will get a warning doing so. +# - +# - Reading username/password fro file ist also possible, using MySQL/MariaDB +# - commandline parameter '--defaults-file'. +# - +# - Since Mysql Version 5.6, you can read username/password from +# - encrypted file. +# - +# - Create (encrypted) option file: +# - $ mysql_config_editor set --login-path=local --socket=/tmp/mysql.sock --user=root --password +# - $ Password: +# - +# - Use of option file: +# - $ mysql --login-path=local ... +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +mysql_credential_args="" + + +# - Additional Settings for check_php_fpm +# - +# - On Linux Vserver System set +# - curl_check_host=localhost +# - +# - On LX-Container set +# - curl_check_host=127.0.0.1 +# - +curl_check_host=127.0.0.1 + +# - Which PHP versions should be supported by this script. If more than one, +# - give a blank separated list +# - +# - Example: +# - php_versions="5.4 5.6 7.0 7.1" +# - +php_versions="7.4" + +# - If PHP-FPM's ping.path setting does not match ping-$php_major_version, +# - set the value given in your ping.path setting here. Give ping_path also +# - the concerning php_version in form +# - : +# - +# - Multiple settings are possible, give a blank separated list. +# - +# - Example: +# - +# - ping_path="5.4:ping-site36_net 5.6:ping-oopen_de" +# - +ping_path="" + + +# - Additional Settings for check_website - checking (expected) website response +# - +# - example: +# - is_working_url="https://www.outoflineshop.de/" +# - check_string='ool-account-links' +# - include_cleanup_function=true +# - extra_alert_address="ilker@so36.net" +# - cleanup_function=' +# - rm -rf /var/www/www.outoflineshop.de/htdocs/var/cache/* +# - rm -rf /var/www/www.outoflineshop.de/htdocs/var/session/* +# - /usr/local/bin/redis-cli flushall > /dev/null 2>&1 +# - if [[ "$?" = "0" ]]; then +# - ok "I have cleaned up directory \"/var/www/www.outoflineshop.de/htdocs/var/cache/\"" +# - else +# - error "Cleaning up directory \"/var/www/www.outoflineshop.de/htdocs/var/cache/\" failed!" +# - fi +# - /etc/init.d/redis_6379 restart +# - if [[ "$?" = "0" ]]; then +# - ok "I restarted the redis service" +# - echo -e "\t[ Ok ]: I restarted the redis service" >> $LOCK_DIR/extra_msg.txt +# - else +# - error "Restarting the redis server failed!" +# - echo -e "\t[ Error ]: Restarting the redis server failed!" >> $LOCK_DIR/extra_msg.txt +# - fi +# - ' +# - +is_working_url='' + +check_string='' + +include_cleanup_function=true + +# - An extra e-mail address, which will be informed, if the given check URL +# - does not response as expected (check_string) AFTER script checking, restarting +# - servervices (webserver, php-fpm) and cleaning up (cleanup_function) was done. +# - +extra_alert_address='' + +# - php_version_of_working_url +# - +# - If given website (is_working_url) does not response as expected, this PHP FPM +# - engines will be restarted. +# - +# - Type "None" if site does not support php +# - +# - If php_version_of_working_url is not set, PHP FPM processes of ALL versions (php_versions) +# - will be restarted +# - +php_version_of_working_url='' + +# - Notice: +# - If single qoutes "'" not needed inside cleanup function, then use single quotes +# - to enclose variable "cleanup_function". Then you don't have do masquerade any +# - sign inside. +# - +# - Otherwise use double quotes and masq any sign to prevent bash from interpreting. +# - +cleanup_function=' +' + + +# - E-Mail settings for sending script messages +# - +from_address="root@`hostname -f`" +content_type='Content-Type: text/plain;\n charset="utf-8"' +to_addresses="root" + diff --git a/roles/common/files/e.mx/root/bin/postfix/conf/create_opendkim_key.conf b/roles/common/files/e.mx/root/bin/postfix/conf/create_opendkim_key.conf new file mode 100644 index 0000000..aded3df --- /dev/null +++ b/roles/common/files/e.mx/root/bin/postfix/conf/create_opendkim_key.conf @@ -0,0 +1,170 @@ +# --------------------------------------------------------- +# - Parameter Settings for script 'create_opendkim_key.sh'. +# --------------------------------------------------------- + + +# ---------- +# DNS Server +# ---------- + +# - dns_dkim_zone_master_server +# - +# - The DNS Server who is serving the update zone and is used +# - for the dynamic updates (nsupdate) +# - +dns_dkim_zone_master_server="b.ns.oopen.de" + +# - update_dns +# - +# - Possible Values are 'true' or 'false' +# - +#update_dns=true + +# - update_zone +# - +# - Zone containing the DKIM TXT record. +# - +# - Defaults to '_domainkey.' +# - +# - Note: +# - do NOT change/set this option unless you know what you do. +# - +#update_zone="" + +# - TTL +# - +# - TTL for the DKIM TXT Record. +# - +# - Defaults to "" if update_dns=false +# - Defaults to "43200" if update_dns=true +# - +#TTL= + + +# ---------- +# TSIG Key +# ---------- + +# - key_secret +# - +# - Sectret Key used by 'nsupdate' to create/update the +# - DKIM TXT record. +# - +# - Example: +# - key_secret="EtvvMdW0PXD4GMHP+onuHZ0dT/Z8OSJGlce/xH10OwI=" +# - +key_secret="4woPu0jqf9Jp1IX+gduJ3BVW/1ZMeyCPTQMqEsMXLFw=" + +# - key_algo +# - +# - The key algorithm used for key creation. Available choices are: hmac-md5, +# - hmac-sha1, hmac-sha224, hmac-sha256, hmac-sha384 and hmac-sha512. The +# - default is hmac-sha256. Options are case-insensitive. +# - +# - Example: +# - key_algo="hmac-md5" +# - +# - Defaults to 'hmac-sha256' +# - +key_algo="hmac-sha256" + +# - key_name +# - +# - Name of the Key +# - +# - Defaults to "$update_zone" +# - +key_name="update-dkim" + + +# ---------- +# Access Credentials DNS Server +# ---------- + +# - dns_ssh_user +# - +# - Defaults to 'manage-bind' +# - +#dns_ssh_user="manage-bind" + +# - dns_ssh_port +# - +# - Defaults to '22' +# - +#dns_ssh_port=22 + +# - dns_ssh_key +# - +# - Defaults to '/root/.ssh/id_rsa-opendkim' +# - +#dns_ssh_key="/root/.ssh/id_rsa-opendkim" + + +# ---------- +# Scripts envoked at DNS Server +# ---------- + +# - set_new_serial_script +# - +# - Script increases the serial for a given domain or a given +# - hostname's concerning domain. +# - +# - Defaults to /root/bin/bind/bind_set_new_serial.sh +# - +#set_new_serial_script="/root/bin/bind/bind_set_new_serial.sh" + +# - create_dkim_delegation_script +# - +# - Script adds DKIM subdomain delegation for a given domain +# - +# - Defaults to '/root/bin/bind/bind_create_dkim_delegation.sh' +# - +#create_dkim_delegation_script="/root/bin/bind/bind_create_dkim_delegation.sh" + +# - add_dkim_zone_master_script +# - +# - Script adds zone _domainkey. as master zone +# - +# - Defaults to '/root/bin/bind/bind_add_dkim_zone_master.sh' +# - +#add_dkim_zone_master_script="/root/bin/bind/bind_add_dkim_zone_master.sh" + +# - add_dkim_zone_slave_script +# - +# - Script adds zone _domainkey. as slave zone +# - +# - Defaults to '/root/bin/bind/bind_add_dkim_zone_slave.sh' +# - +#add_dkim_zone_slave_script="/root/bin/bind/bind_add_dkim_zone_slave.sh" + + + +# ---------- +# OpenDKIM Installation +# ---------- + +# - opendkim_dir +# - +# - OpenDKIM's etc-directory +# - +# - Defaults to opendkim_dir="/etc/opendkim" +# - +#opendkim_dir="/etc/opendkim" + +# - key_base_dir +# - +# - Defaults to "${opendkim_dir}/keys" +# - +#key_base_dir=${opendkim_dir}/keys + +# - signing_table_file +# - +# - Defaults to "${opendkim_dir}/signing.table" +# - +#signing_table_file="${opendkim_dir}/signing.table" + +# - key_table_file +# - +# - Defaults to "${opendkim_dir}/key.table" +# - +#key_table_file="${opendkim_dir}/key.table" diff --git a/roles/common/files/e.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf b/roles/common/files/e.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf new file mode 100644 index 0000000..3cffedf --- /dev/null +++ b/roles/common/files/e.mx/root/bin/postfix/conf/postfix_add_mailboxes.conf @@ -0,0 +1,84 @@ +# ---------------------------------------------------- +# --- +# - Parameter Settings for script 'postfix_add_mailboxes.sh'. +# --- +# ---------------------------------------------------- + +# - dovecot_enc_method +# - +# - The (dovecot) password scheme which should be used to generate the hashed +# - passwords of EXISTING users. +# - +# - Possible values are: +# - +# - See output of 'doveadm pw -l' +# - +# - DEFAULTS to: dovecot_enc_method="SHA512-CRYPT" +# - +#dovecot_enc_method="SHA512-CRYPT" + +# - in_file +# - +# - The file from wich the script reads the e-mail-address/password +# - kombination(s). Each line in this file must only contain +# - +# - +# - Defaults to: in_file="${conf_dir}/mailboxes_new.lst" +# - +#in_file="${conf_dir}/mailboxes_new.lst" + +# - db_type +# - +# - Type of Postfix Database +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +# - Defaults to: db_type="pgsql" +# - +#db_type="pgsql" + +# - db_name +# - +# - Database name for the postfix database +# - +# - Defaults to: db_name="postfix" +# - +#db_name="postfix" + +# - db_name +# - +# - Database name for the postfix database +# - +# - Defaults to: db_name="postfix" +# - +#db_name="postfix" + +# - mysql_credential_args (root access to MySQL Database) +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +# - Defaults to: +# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system +# - '/usr/local/mysql/sys-maint.cnf' otherwise +# - +#mysql_credential_args="" + +# - quota +# - +# - The quota setting for the new mailboxes. +# - +# - Defaults to: quota="536870912" +# - +#quota="536870912" +quota=1073741824 + +# - log_file +# - +# - Where to write logging informations? +# - +# - Defaults to: log_file="${script_dir}/log/postfix_add_mailboxes.log" +# - +#log_file="${script_dir}/log/postfix_add_mailboxes.log" diff --git a/roles/common/files/e.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf b/roles/common/files/e.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf new file mode 100644 index 0000000..56574b2 --- /dev/null +++ b/roles/common/files/e.mx/root/bin/postfix/conf/sent_userinfo_postfix.conf @@ -0,0 +1,92 @@ +# ---------------------------------------------------- +# --- +# - Parameter Settings for script 'sent_userinfo_postfix.sh'. +# --- +# ---------------------------------------------------- + +# - message_body_file +# - +# - Full path to file containing the user info. This file must contain +# - the message body WITHOUT e-mail headers. If file is placed in the +# - 'files' directory use '${file_dir}/' +# - +# - Defaults to '${file_dir}/sent_userinfo_postfix.message' +# - +#message_body_file="${file_dir}/sent_userinfo_postfix.email" + + +# - email_from +# - +# - From Address of user info +# - +# - Example: 'oo@oopen.de' +# - +#email_from="" +email_from="oo@oopen.de" + + +# - email_from_org +# - +# - Example: email_from_org="O.OPEN" +# - +#email_from_org="" +email_from_org="O.OPEN" + + +# - db_type +# - +# - Type of Postfix Database +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +# - Defaults to: db_type="pgsql" +# - +#db_type="pgsql" + +# - db_name +# - +# - Database name for the postfix database +# - +# - Defaults to: db_name="postfix" +# - +#db_name="postfix" + +# - mysql_credential_args (root access to MySQL Database) +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +# - Defaults to: +# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system +# - '/usr/local/mysql/sys-maint.cnf' otherwise +# - +#mysql_credential_args="" + + +# - mail_user +# - +# - The owner of the mailbox directories and within the e-mails itself. +# - +# - defaults to mail_user="vmail" +# - +#mail_user="vmail" + + +# - mail_group +# - +# - The group of the mailbox directories +# - +# - defaults to mail_group="vmail" +# - +#mail_group="vmail" + + +# - mail_basedir - No more needed! +# - +# - The root directory where all mailbox-domains are located. +# - +# - Defaults to '/var/vmail'. +# - +#mail_basedir=/var/vmail diff --git a/roles/common/files/e.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf b/roles/common/files/e.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf new file mode 100644 index 0000000..e7cf6b5 --- /dev/null +++ b/roles/common/files/e.mx/root/bin/postfix/conf/whitelist_mb_sigs.conf @@ -0,0 +1,42 @@ +# ====================================================== +# --- +# Parameter Settings for Script 'whitelist_mb_sigs.conf' +# --- +# ====================================================== + +# QUARANTINE_BASE_DIR +# +# Base directory where amavis stores quarantined e-mails, mostly in +# +# virus e-mails: $QUARANTINE_BASE_DIR/virus +# spam emails: $QUARANTINE_BASE_DIR/spam +# .. +# +# Defaults to: +# QUARANTINE_BASE_DIR="/var/QUARANTINE" +# +#QUARANTINE_BASE_DIR="/var/QUARANTINE" + + +# CLAMAV_VIRUS_WHITE_LIST +# +# Full path to clamav's (personal) white list file +# +# Defaults to: +# CLAMAV_VIRUS_WHITE_LIST="/var/lib/clamav/my_whitelist.ign2" +# +#CLAMAV_VIRUS_WHITE_LIST="/var/lib/clamav/my_whitelist.ign2" + + +# WHITE_LIST_STRINGS +# +# A blank separated list of strings to whitelist. +# +# Example: +# WHITE_LIST_STRINGS="google.com tinyurl.com" +# +# Defaults to: +# WHITE_LIST_STRINGS="google.com" +# +#WHITE_LIST_STRINGS="google.com" +WHITE_LIST_STRINGS="google.com tinyurl.com" diff --git a/roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated b/roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated new file mode 100644 index 0000000..66af054 --- /dev/null +++ b/roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated @@ -0,0 +1,51 @@ +-----BEGIN RSA PRIVATE KEY----- +MIIJKAIBAAKCAgEA0UjqDwJ76w3kDmYue5zflICaB2AtBIxM8WDEXEBtQgFIFviV +4wURBWL/Z4P3iTrci7nTWQcSn2+tuIysfQ4VKigju8T+wGgCOx8D/u4ZDcFzIryl +zkP585Z0b/7OlXKniLHcqczvbxrlSxQJ+L8mEj3GDGf2/EZwHSomhpAh0X81n0r6 +4R4hnLhVmpBudC8kI4ZkjIyCKs0KMzmCY7yIr1HccdKuUhRS4wYy+TTgvQtVT59/ ++Bwea47BxOMKqnDJojCeR9qXjNtMLO+jqWka1PNFxBXHg61/fJ5Cufv2zrx9tSpx +JsUNzO8AYC2iMBvzzpJkecegykoHdyh1MsTQUdG2dHTTorosMnV4jg1+GK425zha +JoJtTOdoxujga7MJSZYwEYSCYA56kDyctV3yP9V06l7kk8OhgHhvnhJZN3jMN9xy +xy3uCzMphCFsNiQwgFUZITnUK2qamwppnAliDQiFCN+Hp3vdTvmaGQdYtHXoD4Wf +Wel3anIP8DteQjUffZss5+JvmMGj36N8kYYnBvHohz9n+kgGyP5CczvDUgypipBZ +vQ9SQOme92jrcG2eKd3RpKuUUijxZrP2GCPjNFsSpT5jW1yaGqT9/yA7yh8aM+hV +VACCNzN6a33foQcjmNjsW1HKXUnNLn3bG02E10I3N2BFm2uaX7sW69taLQ8CAwEA +AQKCAgBkfHj9ifjLzJiinUdWTOVBHVpXjkMvOto6z3aYwMp09b6SYPs+zJD2oCj3 +n/J7rop0gF3NEktLyEiGIu0zAk8BNdKqdpTG92mSz3qQrevTof3RQPjvh838ulHf +8F1qfmmYhaXo1aBlHWnY2Z9MEyOJgKWWEVkSmhN8vV9QHuZN+6FYgZzh+CC1agCY +PR77pCLa981ReqmJOXfbTpKfpseOPmT1Ne5DNMTzgmd5Jn1953Inz/KWw5GLnTjG +eykE2zDFMkjdQUSg+i6iKNHRJskeVEw8MSThwa1DvY1WVXeUngZRtTYtIlJVArCQ +fXixVsqCdeHOYx594nuhKAjVvpAyyo69j2m6G60B6WlpMKm0bHQ9+b/lYhA1urmy +KHUzskRoxukyV8p37pUXbahtAPc3rqyKZ9bq98H4sDR7BK7AVbNiITaly9dNLlX1 +vZ3CMyQKRHULPtRrFPQIiepJZG5BFFFl+WuOuUjbDUqLPTzuuHV2sJ+dNacu/Lgj +KgAmTPi0XgHGTZvTxndpvYbR5cXdVfSihlAxzqaGOFw0jx4kSu06aIcRhrCql0x6 +wD5SQzBnvfDVsXnZMEqYR76MCHyEcBUmK++1a1GODowuZoH8OVpPA7YPxCKQEgF0 +sG8wEi5x+wgp4H8lU/QYfewOrkRfA8aProoEHIbAFbpR/Q2I6QKCAQEA6j77wT4O +9QIOJIR/zYTVVUf/yOJUUf6vCtAx4szIJ5rPbXndwi8bRxJgd8RTLeRI/JUqdMN2 +5TWLCv5XjOYCQrZcMGWotSOX77z6iOv/kBzcB3Xj286DWK2MVa5zm9657V/EQZVX +U+eKY0WA0S1be68mtKRFfx4YvgUMto/vv9TKFxXRcwSTZOPqahS5vzcfQHQoNjVL +Cwm0L0ghKlFjRVKA/CkQpv7yTm40XiCpjL8vexPHjISxZpdbgtlve/60IRQRoqt8 +/vAwfaWyzH4uRDpjDA1eQr3dwqTgc7dyN+u6D80Fy3gS24ZrSclJ9zwnt3R4IPln +TP0DGyjzgLJbbQKCAQEA5Lh/ZVGA0b29VWSIRABp2fkkpaS4RyZVmDKF7EjDMB4l +lnv9lbhF8zVW72+RhFQWSJ0HnBUyISp47axHzizaEtpQ0YqeBkQ46yDPwoAZzc/9 +4y6YYVYC+zXylPrIgRstiBenqxKqtrWE4pA9Y3l9TJ4CF7dvMocqaNppA2AoIM30 +7YRej79bzszLRy7AqMfejOK942LtVnuKaH/frBIof+GwKdrsvr08uYLMyFlMd6g+ +MT2T8rOs0JteABrlLPPULAVgNRsmxYvVqusk/IAfca2G/WqY1x9oj17dZXRiT/Vc +dYVQOzKvi9I1qWU55muXxusJ22/Qx9euJ6aj67lA6wKCAQAjZGzJX8UGw867OcHN +nZpWDlDZW0j+MorkCVzgNaywPzXEBru40UE/1cj5j5I5xto4P5lwlu/p5dMiUBeO +VFpXFhKLxXBeHgig0l7QPUgZ0CJ2hhttZKB3z5D6iScyj85rzSJr/lJ5fOxt31x9 +PmsqHuasOH2/nR6D52NqWgkRZOc74bIJvNFAVydd68+80mlIZcSFnDvAaTDuS+mm +6TEkkjim4NWBRdf6fbAv4KN9fo1//RcTZiEfrRLIjG3JwEwbC1s2xs5V/ph1A4om +V5JKAMBiW8q4LtPIyvyWv0rkpBsys/mCKpw+yup+9YjVcCNYFqLn6IbxHPFRMzjH +YytpAoIBADk0J7CodMaAZQUhcq9HRzIcDN1c2DX7UXcSU8pn3GGBeLctZZv3jY8p +bQfPaJ6nBTe+BnQ0HOiMndgbuY3IS/ZhIct2ltVMZMvx1eR4c3u1JHOYaMYXZAF+ +WaCHJHSd3oJmICo6LfYqagTcPG5PqVXrQuy5lRcXFTVKQu90MjUaLcLl01yyaHzN +XZ39BHRyIKgt4X4odOGnXlOKf9+iXvy07oFZXtLJs5FWNG97XhOjQYLBOup9o6A8 +64KtN1pJ1Wv5IDnIA6dutM7dps98H+EnnFZvPbC4C0eoW0kPlbMX07sUz58uqxcW +SROH3LZTfI9ko399dMM2nzkNhXvkRmcCggEBAIGkY2KlHJAqivcefDDi9/2SQXgT +0wY65gVK0ihxcrGwwpS+t1zzFbLzz87m3dSh6BYFElGMvBGsTol2w16YnsRQQYL7 +HCgkQDau9SJCbK+6ula+7SI4kVF0SFTXIKffRkSC/KRoBBf2EIV3RwBUF0SIwSE6 +MG99OqV9E7u+o7AQtHCZYjmdDyqYmbt1XBfh2kV8if8OG0kCizrqijBxPCLzMItB +HBr7v10ZJQxKVU614PHI3rjEzekLC3ypEAdZWSIFvRQceWxpFefN/lfOZcjcPEQD +j1BDDwX18O7W2OtePYs4PxnJUWQ2M5QMcuAYwviy/p72HokwocmoSor60Mg= +-----END RSA PRIVATE KEY----- diff --git a/roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated.pub b/roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated.pub new file mode 100644 index 0000000..d7d55d7 --- /dev/null +++ b/roles/common/files/root/.ssh/a.mx-id_rsa-dehydrated.pub @@ -0,0 +1 @@ +ssh-rsa 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 root@a.mx diff --git a/roles/common/files/root/.ssh/a.mx-id_rsa-opendkim b/roles/common/files/root/.ssh/a.mx-id_rsa-opendkim new file mode 100644 index 0000000..91571f4 --- /dev/null +++ b/roles/common/files/root/.ssh/a.mx-id_rsa-opendkim @@ -0,0 +1,51 @@ +-----BEGIN RSA PRIVATE KEY----- +MIIJKQIBAAKCAgEAtVNqSzdtAtSD4faC34QLBYRU2huoBXa7qnjkQxXSzfGRsvJc +QHgvv+Nh+VztXSVN12L1VNy/zVcLZPDUrVbmJJMZ9zDtePJic2U8AHUxDZVJx+bu +g5+lM7Opas8oMnzAAFW4/PeSm5mrbAGG6BJRuRW2JWtUCGxMI1ZFpPfm8WcizmTz +3rgoTJWnjgW0cS7m0+VDCEImUzU4hNWX4EMVQDXIHuDCvs2IYXe1+fSbhV/+Zwdz +9RMpFpzxOkDdo3gtC6K+/Lr5ZfXx7NMatBX4SfVLeYVKqtZwrbgdU6BldUHG4AYT +tADyveMAPQbtzsvZ6k12eND5jmzIpAyovD25bcaNdsQZ3XQlqNVxJMQIkdw2FZb3 ++zwspAYkPDb96qDEnpaSvYRP7XsANcEuSJbIY9SH0VN3XGPmDRuH8zxlNBGISs6l +hc8qGzPRfImHoJpIGhid0oVy7naHnJqBBHbsB6hs7a59yKOStWfD+OpEk1YIxDSl +Qm4pgrWcfl/XOs6LSkqfX7ZeJgANFM4ippe3dip1cg/vmDYAa9KgHGgVxuCpDxWe +nRtofewD2nKm+YneOPN2AOdfyLbtNP91j2sF8VqYVjTjglAQvY6RaY3bU6KY1+gy +/MWWkeKPnnYj975yl7hZsAUNpeaRmMNz4yL6u8ckER3qQluZ2BhpDR4VvHkCAwEA +AQKCAgEAqC5QXqdv8roOAN3WEV61ok5VLV+NflPcSIeMoDRzrBStYN6udhWDpGVQ +kCuC9WwOQQJGLon5VImxxdQiTwxUtgPCh6XX/OBENGfnOT15W/Hl1wX4oBjI76Vq +M+kkjX9rzmO0Ct3OG4hymODpsgKbziG3KgncjVt1Wyk/u307tRhGDk1QbHk+15nP +KUldTcWEz3DLtbM1POQWIg7CqX1PDplTnmA2ASc9obmZDde1EAYzPniJMvyslY7H +p5JWgLKMhUhUALGjdNCjrVc4Y2QlQOPFN1dMJBx1soscmF4i/JkfztWUHNbsTvdn +VzNACxjEbC+g/PpHHbUEfDRJpR9TBk8j+goCedGZ+jlRb5ux3CCyQ3FwqVAIOkwv +aa+nhWPkxVooSnusrth0U3syY6vRNbpLTklcPMSTq2Glnly1DsO9ZdOGpMvF/8il +sTbQxGrA10RJ28oisbSObWBb3NyzDPsRrTQeUmshxg7wnmZsFMzQhHicZGOzUuTK +T1u7INO9tpAoy8EFROB+0SdywokR2Kzf7Pt+jKtKlu1hce4R8PTTQksQxBosWfGG +qEe0KpxDngPdCwSo3gk/ABrP7NdHnBbCZjGR/x0+6jj8vDqZLeKlxUQXWsHfRWrM +qk1AN+FbYWxGrfJqoZ5YT1VqLvaahjchaZ4LMzWUg2sj4y6DxwECggEBAO1JoTd1 +8/22k7Ul5SVcHGabPL7pfOLovOhkYd3rjJlukJLhTfy2fotcsNBor80MeCc5Dr0E +ljC+ailxUGm2ZlSK4GFPfLILZKJCEZt29f4j2V4ovmgFbtbhdbSH1LEFuKB1d5r6 +4o4KXU6p59p84/V5JedFVq+afAHVrufi6lv46MoYmGEx0Jt0Q1YjOj5PjD50Ebpm +mbW9b3n2Gi606quVTKUYTyjhIzCS2/1AGy6rzgc5/49Sf24JRf138m+VDMIecJXF +rEOaB10ZGu3CZbZdssY7idtVhBt0saG00gHYwHqcyJGPQVzIY6ziW9dvsgsPkJ3h +Cin4rrOATCVlZfECggEBAMOgBvvlvQXJIir78TBGl4cumBspgucReROVhyZI0UqV +qxltCcwDr+xQre/uG5Z5+HLFnVAqKLhaq+1tIbbHp1nvUUWrlAHTfUF+U/mjbGh8 +jQ2A2Fy9x1tjd6eYjYs5tut4CXzktExQnvuipfNTO2fZiqNi+43OwIV6kJuMQRa5 +p++HAaVWwrdJaGHjQ+cas4Xu2tC3Bm1/lG6Yk3SViINkrKxU8wJApr3l+1LfxVi4 +OWGFJZS2+zp3QSZLLHABP7SfrbFpFZHVUAOrjCh8JnNAx8f/fUDZzKJQLda9aLoA +WGaY796ZGhVSUXU8jB4/FZ74x1tMxmmtYz6nprCklwkCggEAeuoVFMGI7ffRc5h5 +pmycWZo4UTxpcLDWihrVhzsozaG0SiFjYHC4BECzZoGT70dyRf8MX2Us13sLSwRj +fx74yvpVWJLwKNo1+sb2j+2DZ23yfw/j8cY+sBiB/E4QItKv3I58sk8bZDCCPOlO +LKNdAh8LP01vpe8EJX8m5v9oHtRE4crzxAUl5iDHcKs21GgoYYGGXWQgY0AJqseM +sH0OwmrIFQ0OlEJrFBI+2mSGsBpW0u98LiWx1LIBC1dCwgIXZcaW0z5eCXaUMel7 +RYXZYioPHRhiRLd7gy1jhjxAPKymp9znGF94oDM9TqTCpko5k/kwFFgqB6vF8z2W +NBjeQQKCAQEAvlRtVxnPzdhCURXtNO4JsbGotgyuWsjKRz6dTqdcUbfKz6Mh/Ae+ +WyqoAJ9m4gHrsycHhp5uHefCDO+39JDOBxdruGBWUWyGGnmhlGnnKMW9qtyoJZtT +YlwlZ79qP4I4sWKJwKT3sqRh+ivmUBaz3rduRscgPnlhILz+AwjzrvuVI9vzwvzl +19QpJcwrHagB8JZS+OyJ6XFOZkg2dyChwEzsH4NLJ+7lDC+9VYV4CXi8A2C7DrT1 +O44ZqftL0fG1HLSbFthJ7yhegCOg6ybXdh0aA0FViQofKfDemGaShR2e5Lt57daB +5SrBLFJrdWYlUBV2SSMqjFjxDV2qNYT9mQKCAQBdyS5/4yRfTL7YAJzEwtT1NF49 +VzNIYF7+axDW51wn0qcsghk5yzYbr91vDvWbROobiLq/Ed75xq8i7vuZDjw367Kg +d8gB6lstq29RwCRmVso7OEuNs1vC+4uDoEHsUPowI9fnn03142qo0z0HS05p0i1E +Zf9CRso7i4a+Z3IjJxn1/wuHvzX8FaEoXBTjRLejJarfHWZ+wkZrWwCoYt+eqZup +jhF2xNTjGQqSrcVzPsvdtj9JVJ4Qi3yZOqWu41ONh3Yg0TIXovGzLwYYA5LlJwf0 +1NY4bdqXsdO2bBRRJMlWzea++fuyETdCoWphMVzvtZn7DNp6/DItnu97O9rA +-----END RSA PRIVATE KEY----- diff --git a/roles/common/files/root/.ssh/a.mx-id_rsa-opendkim.pub b/roles/common/files/root/.ssh/a.mx-id_rsa-opendkim.pub new file mode 100644 index 0000000..8d4bdbc --- /dev/null +++ b/roles/common/files/root/.ssh/a.mx-id_rsa-opendkim.pub @@ -0,0 +1 @@ +ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAACAQC1U2pLN20C1IPh9oLfhAsFhFTaG6gFdruqeORDFdLN8ZGy8lxAeC+/42H5XO1dJU3XYvVU3L/NVwtk8NStVuYkkxn3MO148mJzZTwAdTENlUnH5u6Dn6Uzs6lqzygyfMAAVbj895KbmatsAYboElG5FbYla1QIbEwjVkWk9+bxZyLOZPPeuChMlaeOBbRxLubT5UMIQiZTNTiE1ZfgQxVANcge4MK+zYhhd7X59JuFX/5nB3P1EykWnPE6QN2jeC0Lor78uvll9fHs0xq0FfhJ9Ut5hUqq1nCtuB1ToGV1QcbgBhO0APK94wA9Bu3Oy9nqTXZ40PmObMikDKi8Pbltxo12xBnddCWo1XEkxAiR3DYVlvf7PCykBiQ8Nv3qoMSelpK9hE/tewA1wS5Ilshj1IfRU3dcY+YNG4fzPGU0EYhKzqWFzyobM9F8iYegmkgaGJ3ShXLudoecmoEEduwHqGztrn3Io5K1Z8P46kSTVgjENKVCbimCtZx+X9c6zotKSp9ftl4mAA0UziKml7d2KnVyD++YNgBr0qAcaBXG4KkPFZ6dG2h97APacqb5id4483YA51/Itu00/3WPawXxWphWNOOCUBC9jpFpjdtTopjX6DL8xZaR4o+ediP3vnKXuFmwBQ2l5pGYw3PjIvq7xyQRHepCW5nYGGkNHhW8eQ== root@a.mx diff --git a/roles/common/files/root/.ssh/c.mx-id_rsa b/roles/common/files/root/.ssh/c.mx-id_rsa new file mode 100644 index 0000000..8450b23 --- /dev/null +++ b/roles/common/files/root/.ssh/c.mx-id_rsa @@ -0,0 +1,49 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn +NhAAAAAwEAAQAAAgEA1tPiYEIBNv6V6QuaPva6JHlg7zY1rUClaSgF1sR5wwIbX0/lzOUj +gA0mexYIaXxhEYDnm/EzEu+eVb07M0sCY+FMlCwVL4U2iiE+uRwbis3KeFON/6kHajAXmW +vkugEOI7vNtJMIY+OUJJadDY2ZxbpjIsaMTXrHp3DnurjXOuaalR63zvIoh0YJHoS4BwaJ +qSM89L8zySN/jy9v7laT/ZJt7m9pUOWRrLDRLhE2nNrzowEyk+OFDW+tqChsTl1Y+nN0Y4 +nx3vkskCKWoPLQL5xnjisZw7gq5MkV9QKt9Ndh4oiKdfDNCnDSeeIMjAyCMevwtVdqjLp0 +ClSoOQ7fMi/eHaPPS33aii1tdxhEqYFbPbsc2aW74/DdngzlZQrVwohAfJyHXmJEc8JGGa +vQjNMZG/Z5cErbvEPxY/vYqvjQaTIQ8FJ/AYQu4xkQOyoUSLwlrkW750aVN1Xa2CBl/CsF +ZWSqDt4vXLxf8stbhp9aXQ1Q9I31v1eJ3UolIQ0c/7wuqaGiVdK15hkNczuipbr9vXMrlL +jcbwfFtvyZXOhhaIJ+FxBwY6o1AKGHydJOHQxYViwLV850YRs2ffPSmpB0SRSJirMeANeF +SSzsrI7zGMG1b0ZDwoynKRmbeXBRQvpcjOBtBJwQItb3qrghUV78RwmYAYIya+QZH/uhx6 +cAAAdAAgFxuQIBcbkAAAAHc3NoLXJzYQAAAgEA1tPiYEIBNv6V6QuaPva6JHlg7zY1rUCl +aSgF1sR5wwIbX0/lzOUjgA0mexYIaXxhEYDnm/EzEu+eVb07M0sCY+FMlCwVL4U2iiE+uR +wbis3KeFON/6kHajAXmWvkugEOI7vNtJMIY+OUJJadDY2ZxbpjIsaMTXrHp3DnurjXOuaa +lR63zvIoh0YJHoS4BwaJqSM89L8zySN/jy9v7laT/ZJt7m9pUOWRrLDRLhE2nNrzowEyk+ +OFDW+tqChsTl1Y+nN0Y4nx3vkskCKWoPLQL5xnjisZw7gq5MkV9QKt9Ndh4oiKdfDNCnDS +eeIMjAyCMevwtVdqjLp0ClSoOQ7fMi/eHaPPS33aii1tdxhEqYFbPbsc2aW74/DdngzlZQ +rVwohAfJyHXmJEc8JGGavQjNMZG/Z5cErbvEPxY/vYqvjQaTIQ8FJ/AYQu4xkQOyoUSLwl +rkW750aVN1Xa2CBl/CsFZWSqDt4vXLxf8stbhp9aXQ1Q9I31v1eJ3UolIQ0c/7wuqaGiVd +K15hkNczuipbr9vXMrlLjcbwfFtvyZXOhhaIJ+FxBwY6o1AKGHydJOHQxYViwLV850YRs2 +ffPSmpB0SRSJirMeANeFSSzsrI7zGMG1b0ZDwoynKRmbeXBRQvpcjOBtBJwQItb3qrghUV +78RwmYAYIya+QZH/uhx6cAAAADAQABAAACAQChXGGrP6i98BgWBfsD1DsY7nra8vL6gZY9 +GCzalpWG3mxE+TR45Jv3sOj4hyImaaBXj2VogpGEZaueZxayfmL7Nt1YZow7N2ox8qq0S+ +J8LfsoykncgM/q+NihCqOw+t3uBUCLo+0namd53A93gKbCGDAijNQR1mlk4a+NVw2DVndC +DuKtdMLwaLCs1a+Mx2JbQvakN4HkUN+dY1pFwY5DZttfvxtyAh2bgux8F73Xr7ZU969P2h +O0dfAQYNyJOCB/bn07zv94Jd1NHk3Z8shhGq/F36XolsrRMiFl+W9EewsxJrIpyIeakgfm +ON6Hy1V3ver9qv2DWwGSSOhag0ste6szGxkgt6wyh9QMPkw/G7X2slCm/ZURaFeSkpH7jo +CrbIikQmTYrIHpWFetSyzpEWJso0OhkQdVwTL9ON1D42KcQ4wMDAZF87LipmjPtqg77uX4 +RGN42hCYCDxgIZez7KwPwqLEft+uw+EVzmAb+FW/RpIxWdFK6DzTLF+YRzhIj+fhXCvYcr +RTiSAyC1zc/FjH1LDPufJDIdrZ7VOEtMSoM2/44cDQl26EOPgwNyrsr4r+eYv0r+g5IkUs +QzxKwHxulmjlpzb84hVmvanafCC2Lza9MirprVYO9lwnah8cfJxAXbiFwHli7HifNRZSHh +KdKktZuaV+ifl1Or0qIQAAAQBaNi5gVGJvPud8AAvG9QkYm6FSPjKXcJdPijMLbb2UxhLE +kICYKFYz0j2qwfqBvBMbNvdTKpd/nsYNS3iB3ye9RTDRW5APE0kLKbsRxWolm83MRwMpKS +gumH1UM4uSGqRwO/TZnUJJFvpQlq0M0ZAnjwePlmCs1OE5smhDvGLsF0UGLbHfCUyzYme3 +8g3/c73zpnvw5jdW43pp9Pl8mecU90gWoIz1Tt/Fke2a1Bw8c9jwDdjR5NcBg6xL6hHQv9 +q+i2BIzGWzScbG37QoKmFfoyjOQMjeQEcI7MFDQHKnU1h+UXY7/v34ZHoVJsH68Hu9Zc7q +BA8ZBT+4qoX2jNKQAAABAQD/PE6lC4aiDvkKDxad+4gdsWaUnjhQ6EbqV6FsNgzOlw4SGW +6FsJB/cC5h3TOzR6xLuYVw/PTPldpEvJYWYHTpncuLzLoqZRythbJCF8WuCSwSooG/Azsa +87hZmx/jthmyI5AB2/1cSfCaIx5HX1zr7xKwOGT7kqHICocUsFheUHGr7gDjQjDDYV2cLD +402StiT4V/QYdiy6WKhyIkd/0sCAWWSJ+eHufSdf8IVziIzEsXotJBhCnVt3ArQIS4l/F/ +hLK7vlSSFxPnxBHFKk6kUv+OA1WG/xScL8MVDPOeSa1r956ugqBKWkNGSPlDQNujn6C7B8 +7NMy5C8CjyJUi/AAABAQDXeJiDXa8dxkA/1/baiLcCDgf99x58Rv88IAVfykhZuGBU+Ra/ +dFe+js2uNDgXvz3q/IoAD4xb43GPKamg+fW3ITonEidTDj6xZm9vyPJMpXMOtE1e6wcb3a +UB0lyQD/i/y9qdMYb/wgJDoClRWnTl2DuPtcMWhKpUiRXnTzZLd2x/mnxvYlC7GUxUy65t +6y+OjxkLMuNf5QOWsiCaB2G132X655JgTin+9moJn1pXiuP9IrHQHh4nBI6dMsu+4dilj2 +SoJ/pKm2DsSiwv/xD9odgc4amJTqpMNGTHJLQ9GvKdkMP/jJ5/Ssmj/TD2ya+R4P77LPuW +Pszip7noyJMZAAAACXJvb3RAYy5teAE= +-----END OPENSSH PRIVATE KEY----- diff --git a/roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated b/roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated new file mode 100644 index 0000000..099a113 --- /dev/null +++ b/roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated @@ -0,0 +1,51 @@ +-----BEGIN RSA PRIVATE KEY----- +MIIJKgIBAAKCAgEAuPbh08KHfSgo9KHHP9AExGy6JCPmese02WCiXUTEe7ebJndz +ZNvBmxFwQYhUvq1Ry1BaOxtUN/v/1oeJ+S0wmnCtFm8uiAyDiRSkU6o0+chJSMfC +Fu9//6ufINZDXJdgqLI2iJpQXLf3VqE3C93YFxjNfT7HCzFhjRvTkPItLe2I8ZPa +D3ibA0nTo3IRzfDv3Ey+z8b3CTPcLqz9r2Nz235AVKCMz6GDq2hWYhvpb97wIX5d +DyUcMJnko2Za2r52wk9BGASBzY+hsO7KqXq4jnxAOLNAp6Jsa3+ReFuBEsZWJVmh +uS9CJYxfD0Ie04OlZA2ZRPsFUi+zYtN/RgIcIydxgLyoCDwTjPkC9qYm1vf80t2v +frajEj20LpN0lsgr8dvEzVSwzLBW5qdY76KhLy3Y0X572mttOCdDxTAFulKEQCZZ +jqrEKJgs7QiotW2bI6wlvLYUrP+ns1fTVGCAJrRBZjR0T20ivVatjl3HbJkMr6c4 +I91NmT4jFI8ZTriCRD+Yz+cZS/ynpzKXHfI7ORIShyT9YZjPFKcru4clh299xdOg +Y3mSRbycVfVqEfe6/O46sWrWFkfRL4mNEZ+IJC3n6SF/q0/bK9FygvGGjIVDe1+N +fUaTMLD++PMJ5n4AA4XUKJYgLHsjqVcxb8g7aPU8TQFQyt/UDTlqb9vj83MCAwEA +AQKCAgEAkmGAU3COfbR8xS4LXCsqurE5l0R6MQ0/yRE7LgkwXqDuPsEmJ9nrHOfu +KU7VkpnkM72By2lTe4MJ9CQMQ5FJ98/Yi/qtnqoYpzIY4sW/azbhGKJOrowYhqSy +KPCpGuwKaTexBObrVpWZP4wS3mdRjuXoKoi2Sdto0p4FD585tjFYwac7WicetrmE +rsOl55AYpAZwtEtIUpYiWSY7FsTkef8utkrhZajzZYILa1WfpxOOg1NYHpZF+wiv +88kbeiZmIl1KrNFUUPStCDPTW9FtogYfZUAnmQNoPqMU42W3fr5Miv6miMIn3UN8 +L70qXEbBa69/byIiEesCUuICxcsBrE22Xly7Y72CgHNkTmleMwp3BhZ2vlkzEWjD +29cg4mzF/7bpFZ/le1aa8yl3ruehNWoArmlmMfqukCWBoP/Qfu6ZyPsVmG2PRTHN +4DqjEBWJa6nLkDgWx7MEAIcxoK8JL/XiPXJO38Cg6Mtuy/LSwQIPOSJYUcv+bsIG +lgtO7f2n8utPorkZT48LeALUm21dx7nh1noYaUWKO4zNWrjLyfYS3z4lNN950MwG +evAwYKe9316dmSz9iS2F3K8sdbrdnFJVMkWkjIYV7oJSiEH+RZ1dUUfyn6LCHDiJ +nZfMMphsc6x2L3Idkpxw7VZQxubfbpcHT02JDrN7eB0jsnNbS2ECggEBAPUznJ7o +gE0BWbeL/ltN3pY7nmzTWUBelk5MEZEnme/mL//4o+3Ab6rhjOtLuS7C60V/Mwjl +e45bD6XktV1ZhED3sAFd4quZJLiLiZsoS3V3sj5GpTpc9nTwhw3eWIM5j/TeXqtS +i/28VfSJ3MG+arjqrQcAmSomZf2GooOyK9kqO4EsOBDH664bG4QqtrfLvAM8N/qg +pIddsRNPv57QZ86LVgpgO5p1lPBCsnUQSP20WZoHYpI9HprnBK3LOsPm7VBvt67y +hFpuciSBpPfhAbv9/kfCakw5f6vhv4lr/2oCYKXXRPI2YSLVPbK1zohQiMiDGfjd +woqcCixO7vLGxVkCggEBAMEcKNOxVVPg6+J3duWrquBvwGmmSvRev9pBZ2BuwrZz +SFrDET3RepsmWW0u7B93LlKEwXu8AQ8yOhif/qEeqyt6a9AOEKbUIaurw2WWjWfE +0+wDtJTdklf/KzT9KwH/qpqdOcySsbLHvZccxt/ywfFtPuJZdbsjWz/z9PE/i3L+ +W5cDmUPSwomL446I//3Ew4htfau+rYA5cPfdK8OoMvpKamk1KeRPneehAWqY3EFa +/sHW5CQhphJXFuwtiK2hoggJxsLSt2qbrnhUfQOJDf3IoSrYjQiJfqlq8VK+0AZc +4HqjDF52Ki5nWOt6llzwNYCh6R7G8J5gVuC0uPneCasCggEBAKgiwvPoRAoJsgZ9 +VWYwaEAmE4VWC25rLa/001rwh8sL0cA5M9dUzH2leibiXtIk0IVwKoOgMHA2Gu3L +fV3Mgza1YRge086NDbQJ4srk/5FGCZBQiv4RPuKDCGjHHXSmJQNo9AuQZ/QOj/ZG +Dn0/4Bh6uzkA/QX9HJSTHJ8nro+UOQdjVfKT1BUn+19OlspDRuIFCfGu9ALqiQDP +/3qcN4JW4yHsSRKqK/3wDkTdbN+jKonHJJ1YkcLwRLITmHE6yWINqSuqmn0UHOrR +h1h+Dt1k1ldIhfFMwDIRc3B9AMAlbzZo/ZsFFOh4xnzj1AJ/DrxHwah4D+1SAFvP +qGQLTskCggEAap86p4+dFj/03ciqPCspoNvy+CJZ9k0uTrqX8nWVSpmiVIKpzWEQ ++gMVkyQ6OTFbwTINhl0KlLJdw2TreVhumAXy6yAo74Pmx1uB+mBC2Q2jGQf+t8cS +20VHPO2fxm28a7vtwtcoCBcixgGciOAHV17DPsS4LUhbRJdVIbK9MxPfzCSvhfQj +d0BmtzdLaHkwoO4bWi1grJCKoEBcvp3q76kQ0eAJrkaLX+3U019tFSTBzpLwykZN +5IhzXpnRglThGuES/lTL8q/ciBHWKJKOyBXzbq28SP9pkO88KTyzrR+wzeWimbFS +nuZvAS1hQhVa5RgAl/6tsjRtI4qFK2j+GwKCAQEA6d13kvQjQirN9MpVkWrOtKPU +gIYZzGveiLKz3X5B3UHPL91Ur1yuU4GT/A50Pj0J3psPVsaKm/antrrz6KzQHeNY +yl6DdjM7A57wDo+rrmPoiZsbEvJ6gCnBz3ycf/8v4F4rXUDf7sfYFUA301m15QLc +V4oSQUo7useOdC1xcbM43spG1skpXYEvOzLkhlql9q2vUfN3Mmr7QxpppVdQiAfK +Ij8LH5DAyyopvl7diUEhK8aNwNkmKlUVMIH4YpDZSLl2/q1tIMoEOYwGsPeEPyZe +nMPmBETe/7rxZdspYBiiAk+vCRwQ4RpT2hDt261DENqT/yyOdlQxk+GCYb1Kew== +-----END RSA PRIVATE KEY----- diff --git a/roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated.pub b/roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated.pub new file mode 100644 index 0000000..560e76c --- /dev/null +++ b/roles/common/files/root/.ssh/c.mx-id_rsa-dehydrated.pub @@ -0,0 +1 @@ +ssh-rsa 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 root@c.mx diff --git a/roles/common/files/root/.ssh/c.mx-id_rsa-opendkim b/roles/common/files/root/.ssh/c.mx-id_rsa-opendkim new file mode 100644 index 0000000..bee8319 --- /dev/null +++ b/roles/common/files/root/.ssh/c.mx-id_rsa-opendkim @@ -0,0 +1,49 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn +NhAAAAAwEAAQAAAgEAtkq+Jysyk7JWHKhojkcG7Zb89YIUJCLlojhmK8tgV6G3sXrA3kl/ +EWnCaoPGDwu8N3jWjTNDW9QWZ4ol5/xmtSjYJFcLPXqPS676Ur+57RTQYw6nIusELok5Cl +veBVWh+3OXmqMje1JIndD9O583uNoIYCQYb+/7tWSdz4JeSHtEftGA1GxuTbNDNsnzIuio +jlcdyr8XdR2r6667ab99GYalqOPDi09Sjeamo4I1bJvxlS6fADhPhNsckTlwFnyYaatrFO +xKnO6CEfUXjd0F9EwzDSRpa0yluQkbdHUA7sz8i2aRUsMoDinxvaZnsFPpqNFwElFudLGQ +E1Mcza16erbnP+Iu7zIbXEMa3OZvfykpF0tTOnYXq8cml+KB+9CtPeNNJmt0TkQDJ7p5xY +CbIkbZOlKEk0VmNljAvNpl9s/Ab/LK9fXfvdFtc7RAFgkr8RBcvqjyK/Cyh7/hIw8w2bIa +OZjpTA66Rqj1PrTBv6Z99fGqaFlu5zkb08KpniQXRe05F9NEuErz3DjL+PBSSKJ0qtnHLT ++lTYMBkJqfIdvi8qfOYZznR6Vzmb4Gl5R7eg5THEvDKybYZeide9ceI+AFRqbuofYfWNMi +WNy/r+fXe9FgpDtSpSf+zgvOB8T2+vHwGDVamsnZHvyxAKRMlM/WZu5hZPh8s11ckBthIR +sAAAdAC79ctAu/XLQAAAAHc3NoLXJzYQAAAgEAtkq+Jysyk7JWHKhojkcG7Zb89YIUJCLl +ojhmK8tgV6G3sXrA3kl/EWnCaoPGDwu8N3jWjTNDW9QWZ4ol5/xmtSjYJFcLPXqPS676Ur ++57RTQYw6nIusELok5ClveBVWh+3OXmqMje1JIndD9O583uNoIYCQYb+/7tWSdz4JeSHtE +ftGA1GxuTbNDNsnzIuiojlcdyr8XdR2r6667ab99GYalqOPDi09Sjeamo4I1bJvxlS6fAD +hPhNsckTlwFnyYaatrFOxKnO6CEfUXjd0F9EwzDSRpa0yluQkbdHUA7sz8i2aRUsMoDinx +vaZnsFPpqNFwElFudLGQE1Mcza16erbnP+Iu7zIbXEMa3OZvfykpF0tTOnYXq8cml+KB+9 +CtPeNNJmt0TkQDJ7p5xYCbIkbZOlKEk0VmNljAvNpl9s/Ab/LK9fXfvdFtc7RAFgkr8RBc +vqjyK/Cyh7/hIw8w2bIaOZjpTA66Rqj1PrTBv6Z99fGqaFlu5zkb08KpniQXRe05F9NEuE +rz3DjL+PBSSKJ0qtnHLT+lTYMBkJqfIdvi8qfOYZznR6Vzmb4Gl5R7eg5THEvDKybYZeid +e9ceI+AFRqbuofYfWNMiWNy/r+fXe9FgpDtSpSf+zgvOB8T2+vHwGDVamsnZHvyxAKRMlM +/WZu5hZPh8s11ckBthIRsAAAADAQABAAACAH2135pNXOyj4GSU8r2jV7DDHiEEmnUtJ6UO +Nc9fyknEeVRIbfcdQia1A2DHDO/VTPAIQhVP09Tg1q6Cg4+O7RljWGL/L/4upeEwgupL06 +EeaHLXaQVYgyLAePiez+Zn3nP0jAkVFeP2o6NJu0jBjQDKQ1phqgSPv8qg3395zSE4+Mxo +F+rl989XnzOKY0Sgo5S9mQr3aurWEnhOoGnVpyTSSS3GHFTW1/yJokNCCSukAx647ueM7b +GWFQZFUPoA5G6Cyy67oNzGUiamGZ84W+HUJqSahqR7UBHhqPBPu9vyuvo7Ol6TvOy/mjkK +J5le1NUZ0aqgQ4bv6IabG1LvnnUV98n4VNmuuaATBLRsYQwQf2ipcTUMblxnOQwsG5OQ2U +Ex21YNQ6JphYiweAWN4UNLFXVm8W0Cyo0/lFu85KlIZ3nKQmDW/pFULuMECksgSR6TdFTN +ibh1bjHhETFfeLTFwrhFrpOdpOlvgRdD0xg4jONxUzE1TbNpIlSheDkVaWO7uAZx1K0m8R +g/fPNDfvKO+tJuAbiCQrK4+isM8xVcBjew7Lq7EcAhdhgmO4PJoc0sjGkOMF+H1lzkcVxQ +bZOFrILbwgsKPh09oLagE5JZ/buXDUgyhkp5zxaQvEUQlDkxjPY1YTKKi3aaPcaZ8ITElq +gQe+R5MGMOEIolcyKRAAABAES5JEDLSk2pCjzw9ldZOXlJlQlbR15Yry/j9tFT5dP2RPeP +FJL8UkFV2B6AcqxileYC/8w8vnQplLYFu0rImKSYdMTtTD4DmertqALnVNcZsgGDfN5JBS +jk+hMJir0w1RVJC2tZY52oEQM2muxU9Pdwp1883eaagl1FnkQO5cRj1YbrQJfckRge26E1 +oZl+fWRjNsp6zRubxXayKiPgxG+/C4Js2Fkcx+LwzG2neZU0p61d4cW2N2NwK4d1HX1BbV +f4UsNVDhudowWYpWRfgHItHUzxovguObCFdFc8PAtMYhtmP8bHMzWByamAqYFO4FR1Pqbc +4XoerIClO4fAQ0UAAAEBANhVXTI/ANdYo3XjEeMxXpkkAk2DJq231p2UasRNk20Slr4cYj +j3s20qCjS47IDHy6Nsa8hmKXBa4PPZkDteOH9pNtTCcO0QltMVU4bAcMg/693S2R9eOyk/ +kvoWnieHjdMk8p0kJ0bmtyrABeerRI6UGxm3UMxi3KNJwyGjeedzqFe31eN7oN8flc75gl +595HfrJlS5z3Lz6NpVGP9ENc+lYaGHdMMnGunGi2PNXSMCeM9wts97Z7qr61EtclbZ8nq1 +r4y0RCTDZUjwn1TTodKHFF9HN/5tlAVbV3uxY/1ueejKoMSdDmomBYo9BSIKVNGNV66JwG +KvqcsRXIOIoRkAAAEBANe3eueLjCjt/jEdlOOvGCdSt3IXV+A2l23XPUWVrAwYwJVNRRdz +3dj4+GvHPKWiG8/s7nYkQl+HU2kv/7xLr6vPVZxHenCiYSgLPhAvEzCHJ/eyryHTqhfIYN +uu8VETBRv7o13cQheg28ifgNXGXqkRPTQjirFj1aoJvy1HlZDB8oJGnRrm3QYkOec33h3y +g5HXYJ1LdL2C5n4+IxDceDHDdMl2V+bzmDIiFWcW1CCcX8aghbk4dy9Zwtu8oy0GGFRhRu +e4N872WOYntW/TKdjAHOvQwOdmbG1NfkddmvGj67atpPfsYDupvEO/l0v/1lMJ3sAfe+i3 +ZH4xe/X61lMAAAAJcm9vdEBjLm14AQI= +-----END OPENSSH PRIVATE KEY----- diff --git a/roles/common/files/root/.ssh/c.mx-id_rsa-opendkim.pub b/roles/common/files/root/.ssh/c.mx-id_rsa-opendkim.pub new file mode 100644 index 0000000..d338dbb --- /dev/null +++ b/roles/common/files/root/.ssh/c.mx-id_rsa-opendkim.pub @@ -0,0 +1 @@ +ssh-rsa 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 root@c.mx-opendkim diff --git a/roles/common/files/root/.ssh/c.mx-id_rsa.pub b/roles/common/files/root/.ssh/c.mx-id_rsa.pub new file mode 100644 index 0000000..7ff38ac --- /dev/null +++ b/roles/common/files/root/.ssh/c.mx-id_rsa.pub @@ -0,0 +1 @@ +ssh-rsa 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 root@c.mx diff --git a/roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated b/roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated new file mode 100644 index 0000000..5767787 --- /dev/null +++ b/roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated @@ -0,0 +1,49 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn +NhAAAAAwEAAQAAAgEA7Sc91UspRVsl8iTDPPolc2stWad9O27ohFYK1yYp08oGDDB4h+Ju +JbA90Rn7nSXZInLH4d1VzbeB6bvsRgV2P9T5+I6jPXXT4tBEhEgtnBI+96ALlywJO6Eivq +kEWApS2YEvhGbPlIBqZaUedN2CdqNK5yo8hfRFWU5/h2ri1bNehkOUuZWCLJq/YD1iIuRD +rPvSo0lk4sn7/0j8QKCe/D6oJzU0dwd6rIxn9lmmpykX7lkSUjJvLBZ0MPgmRbFyIlrVz/ +pyQzowMjbHiT9yQ+hoZqhlAZFozL0KYc3JpF6ZG+V3ZHxz5j5fYU9IrA5KF9auBTqvZCuX +XTHPaZdX8tmwZ2A1ECVKxo/+HvjKrg4L82VZc+trvnxR4Q64MSvBBletVxaUdZ6xIw5wpq +JzhZViGLC4dway+Cwb5FEFXbdjm9XowJw93FD0fJ9x15KkIK58s67yakyaE9o5MvbqbNdj +ZSKyW9Lfc900TdvFyC2lCT3jDMjZFgpb1uNUsjDbjTDUd2nXEzwAoC79+aRNgNuo8uCJxR +x01H+Zm9cqHcuYl+mppKp70Fe9i0y69WEd+6KuudCh67ZMMqgFCAbGXcNtFiSJChgMMsMx +1P7TmahjkblvdwQK6+KgiHBT70SDwC9ibeIKm8x2TAAxCQV176y54cbg/f5cxR0GbfB6bl +0AAAdA4BwyZOAcMmQAAAAHc3NoLXJzYQAAAgEA7Sc91UspRVsl8iTDPPolc2stWad9O27o +hFYK1yYp08oGDDB4h+JuJbA90Rn7nSXZInLH4d1VzbeB6bvsRgV2P9T5+I6jPXXT4tBEhE +gtnBI+96ALlywJO6EivqkEWApS2YEvhGbPlIBqZaUedN2CdqNK5yo8hfRFWU5/h2ri1bNe +hkOUuZWCLJq/YD1iIuRDrPvSo0lk4sn7/0j8QKCe/D6oJzU0dwd6rIxn9lmmpykX7lkSUj +JvLBZ0MPgmRbFyIlrVz/pyQzowMjbHiT9yQ+hoZqhlAZFozL0KYc3JpF6ZG+V3ZHxz5j5f +YU9IrA5KF9auBTqvZCuXXTHPaZdX8tmwZ2A1ECVKxo/+HvjKrg4L82VZc+trvnxR4Q64MS +vBBletVxaUdZ6xIw5wpqJzhZViGLC4dway+Cwb5FEFXbdjm9XowJw93FD0fJ9x15KkIK58 +s67yakyaE9o5MvbqbNdjZSKyW9Lfc900TdvFyC2lCT3jDMjZFgpb1uNUsjDbjTDUd2nXEz +wAoC79+aRNgNuo8uCJxRx01H+Zm9cqHcuYl+mppKp70Fe9i0y69WEd+6KuudCh67ZMMqgF +CAbGXcNtFiSJChgMMsMx1P7TmahjkblvdwQK6+KgiHBT70SDwC9ibeIKm8x2TAAxCQV176 +y54cbg/f5cxR0GbfB6bl0AAAADAQABAAACAQCfv1lFfjW0xGtRKzZgstfbYYzQ4aPYDyON +UTBIMSrnwSRFvbjTP9GWjZt2aRw2hTI4pDzEhoWv5zcZrT7BBBjdcqdXqS2IzwAFvukIel +5OzXOg9iwYjs9BXY+8ArosW/fnD8BkXaTikYYaJhnX+wZQyDpCcQ8H5L16JQh+vZ9C+Gpp +4sgiIvXm+e6D85VRj5WOxqri1yOgKRMYqZ9SIWA25jX7AznuHBmkdYfqSAWcgG/gXBudRt +/gQNfPzLhrJdaOEcYJLNkfM+kXShMq/pQH7lu1GyW+4qZHk+eUbjyv/hEA25eLFtIzfDxf +njqDu7RpTnE2kIto3Hw/iLgAlrPkVI8nEoEL7GkWmpm9EyyHL+OgGjEa/PQ4VK9w+WY+Iw +iwFORpyFA2uDpuiPYsLkNto//85o2IrBCSx/KMaGhx/INL+4CcKGLjXu/OBFok29vRm44+ +U8HwNbStN+iyGLqEdH/hbc3Gu6dre8MRRd4h+9aaCncRh5y59mEKNeGwOMmfO6mzu4G1Tq +ywuoN6MYqGNpB1TMVN4xS0hLk9m1hfg1WHUeOTqlobRUmZT+ObqJBGIQ45valZSOoHLFLZ +p6cw0XasEfl6MWNwHngroi209g71gLL9QzBhK8dJbYd48CtuK9sA7yT6iQ5UlLBueAkpuG +RBnoGSVACRhHen+OuUQQAAAQAFWpaNWlPWSNZABzyHSLI76ztgYpY36tix9YfCtXz6IZS5 +3RFTTkhVgOS+9Z26K7V1jcvTGCo0sEmJPkrChPhtXQhPRJEaNqX3LWAknPDA2Aj2/LUhs4 +OtygE+todFLOxMi/Sk60BrXHG10xsgHVERN+41G3+K0X+sn7DwBzksO30CSqssRrHe2bgq +U5ga/Jos6pPBgqhcTAZWinvgDRzoCfCSdzLXjK5l1pbpV8wlgmlgyEkFyJcXqE4XSz9tS7 +iJ9E2+L8DwR9b/QorosvEQmlFV1uRFGdZQ/qsBGYAiT5wW232r/5+X3YlaGCD2tFEr0FDL +A+MZDe4pz/oswgNoAAABAQD21D98tn3/3B9wtC3ynatTuJnYZI6lgkyiDVbteMYZ22bK7I +TZrkfrypc4TW8Hb+e2y/gEUTwQ6zfBHtv9f4yss2vmYfy4dKmCaD2TZg38kAYmFItQSKpI +1dFy6+GByqQaZ5ziYXjQM1qpX35Y9EDTuLHWwZfNfuNtc0Jt/Zu5l1Nc0QqHmf8AZWFo5H +BMqcFYkBjPfddO/+DDoCy32vBlrPFcr6/zNKESCnaTDopuWqpV9NRWcjOmF+JbNY9CdIDn +jp1+mYRsGs26DuoLIqFt26/K2PNI7XyHUocFzHUSmiLZdRAazsK3fYOgKfsEJLkUhlYW52 +KT0REZ9MSIUHgpAAABAQD19vXtTjeDDlmIwgoX7EHyCX6bXaQL2Iz/fJUeqnsgJV7NIVLC +6aPp2DrjBMoSly1TtDgKQDJDlU67hDExD3sqXb8kQjBb5ivfT8H/cC7quj8R3aUX5yNIdK +tcZogt/aULr05k5nkdDnoGvExbVMVsXEX0FbtFzDIbmRKyKPlXQdwcH6KHTYgd253tbU3K +/Oz1N2DTqsgAukZiUvq4+zcebNXogGygd2M7+bhc3Kftz6Fo/+5ud1qGXha261dxeKG3rM +zeROefUKOqLtENRLhTX7i9ARCEPGM8Z8Hmwq6JzJVHfh1ovxF4egImW2Y9NfikKK2qLkei +tYQtI6i7GlsVAAAACXJvb3RAZS5teAE= +-----END OPENSSH PRIVATE KEY----- diff --git a/roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated.pub b/roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated.pub new file mode 100644 index 0000000..ff59119 --- /dev/null +++ b/roles/common/files/root/.ssh/e.mx-id_rsa-dehydrated.pub @@ -0,0 +1 @@ +ssh-rsa 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 root@e.mx-dehydrated diff --git a/roles/common/files/root/.ssh/e.mx-id_rsa-opendkim b/roles/common/files/root/.ssh/e.mx-id_rsa-opendkim new file mode 100644 index 0000000..a884d33 --- /dev/null +++ b/roles/common/files/root/.ssh/e.mx-id_rsa-opendkim @@ -0,0 +1,49 @@ +-----BEGIN OPENSSH PRIVATE KEY----- +b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAACFwAAAAdzc2gtcn +NhAAAAAwEAAQAAAgEA0SMzlBRpQvUeH9okdzcyeLMpfIZ7MZit7cjyzfCwgiVGNTHFR/NM +44gfFfjgA2fKyNjXM1+UDRttLGssPQyUDobj1pSmbs/tacz/pTwDc1lRV+zcqi4qXY5JRT +OQ9vYKNRqutT4QBQAlPF2l2UYj72JEEMB2D7bY5QrA/UeLjn212l1NYD9kR5CoLHhiOy9r +7ksUw0m2hcidNwOhj1YrYt2JaqU+R/FBsm9U24gpf7JXiavtm6cj2z36Zi+382f+IG25sS +jeBgIrePdf9gnAKXHkz/fBfpL/BGyIZH54FKdii/CBDjNUs14qEiv+IqiEucpzOOzv7FCC +McAnMeFEXRPGsegJaPPIsSO3QvpNFaqaQEh4XssuOZfc7Nyo7cZhL20WDqHWX5tMonQOYs +gfRVuwU69VwUr4wS9fOhmpMAv5u7eWdXs/aUID39R3JQSbevYFC7mf3fj61spYXCCInGor +nCw/sZ2Xnn3YgFSO89ODPoPMAbELUdmMytUmaC2+p8z0E+pWanNRfTNY99gsie3FjYDyfC +3OCESkqsUqPSZoX05jJIYkqKYEcpPrN+jyYk7SuT4CG9D/L7Uu4KcwLTrm/8dNGl9LWBhF +/PQ75ffS6bOZ4+FuIPdgzk9u4NffhHScMnq8kyEmnpu09qBAeS1amv4m5wg3wA0JyxZqEW +UAAAdA1JVcF9SVXBcAAAAHc3NoLXJzYQAAAgEA0SMzlBRpQvUeH9okdzcyeLMpfIZ7MZit +7cjyzfCwgiVGNTHFR/NM44gfFfjgA2fKyNjXM1+UDRttLGssPQyUDobj1pSmbs/tacz/pT +wDc1lRV+zcqi4qXY5JRTOQ9vYKNRqutT4QBQAlPF2l2UYj72JEEMB2D7bY5QrA/UeLjn21 +2l1NYD9kR5CoLHhiOy9r7ksUw0m2hcidNwOhj1YrYt2JaqU+R/FBsm9U24gpf7JXiavtm6 +cj2z36Zi+382f+IG25sSjeBgIrePdf9gnAKXHkz/fBfpL/BGyIZH54FKdii/CBDjNUs14q +Eiv+IqiEucpzOOzv7FCCMcAnMeFEXRPGsegJaPPIsSO3QvpNFaqaQEh4XssuOZfc7Nyo7c +ZhL20WDqHWX5tMonQOYsgfRVuwU69VwUr4wS9fOhmpMAv5u7eWdXs/aUID39R3JQSbevYF +C7mf3fj61spYXCCInGornCw/sZ2Xnn3YgFSO89ODPoPMAbELUdmMytUmaC2+p8z0E+pWan +NRfTNY99gsie3FjYDyfC3OCESkqsUqPSZoX05jJIYkqKYEcpPrN+jyYk7SuT4CG9D/L7Uu +4KcwLTrm/8dNGl9LWBhF/PQ75ffS6bOZ4+FuIPdgzk9u4NffhHScMnq8kyEmnpu09qBAeS +1amv4m5wg3wA0JyxZqEWUAAAADAQABAAACAQCq1mWIvg+qWY7tGAYXuGgrPrdR+Izj28Og +bTkiT03wUkCCrZBpEO8rIoO6MB3VylBVNwS7+4R2HIRW94kgqYi8QSYWoEFAXeujNIlUUa +zD6h9PgrZS8fk7iUKDG/d8NUnrTUuP1A3D9/Vy1VDoJqquHohZYs5OUd/lYZ56h5oRoNEP +eo39ZGsnJpyqDwC3NiqlcoGYcTt/F3yNdxLfgtVYIn3hNvCkVgiDmPwphJXZsTZeyKoFL0 +hUDNHh7XMHi1iE5vz8IdUT9WvLmc+yrQ5jDJ2L4OgX3D4jQAE+jizLOlx+0cyqa/Xxu6cE +RxmG+D/LgPwUcUAfuzhPKZca4Ng08fXTLQLnj+a1J6qJ4C6rig7Ky8ZCO0aJQJp+sA1w+c ++FfKrPf7eb9E5lsj6inlsJ0pRAGOVYaF+mgE06FCJRBatrgxOFIvcU+SP6LOb6LP0FyTT/ +24AC2INPwrYr3ima7lksqiYKxGVEB283RfMjWQZsHSL+1si6k43FDVjTwhd2fQFd/Zbvvq +IDUKGtAR5F2YcztP49p6eA6pgL4B1hXGqaNe0nPL50Qyk1i+wQv832bbQE6OvWhCb0bBLV +KV2cqCHcTpdtMI8ehNonpttPVNiJWXewePvV/IfX3XoOaK9L6p0pDBInxgt2Lu1Q1fr7rK +YgALetOM1l5pZfwi6WdQAAAQAbi2gto54QxM2H36AVLhGqOoozv5kjIyJ7eamDXtY2hCly +X6HiMUNuxv0Pn3S0XkwvSk1lFLw6I6CaGZ9EXqpNheFPc40ShM4Ddy7V6GiYqE8TLkqqHn +B1Ek3/7u5E0eA1NGLzbJF9gThZTOLaQYWrvDfpLB7t75qJey99B4cNCSPwr4xeX2itqdzU +TX0q9NZzNjdtELQK9yYMmQsOfsMHUNRZyWGJrp0gwYTDNjSROywnXOxsevMo/k3reZWlPY +CsaEBtXxEUh2QbfyQqS0EZ4CM8941rkEvN0aMG9IyL9bkRYI0wX4wlvZI8vpz/iUYsrPck +0VKcgc/8LjwakPpjAAABAQDvcXdG2yYw2i5y958TvwEQFkTzfFZGnuJ01+NdJz+fYl83Qz +liPYmKe4iJzK3udUSUzx5dNpsNV9HFCzC6wuisJMLWINqXGXieluQkeGX22LU1tUzsQgoT +aB709dOI0HeN0ZZTT6m1uI+hCUL1ScnM8DahTJ73Q/d+GfZ8Bp2y7iKaZ3H+LYQcz+n1UD +41zKvLx+knUnnu/ZL2VDKzYfgrt8ABwuRTm01lX8Cp0vACd51xrMOMZWrxjncfUcTPjhUh +5quT7WCuCri9JxQ8Xa6/YLFbwr209dnQ/a3PtKXY/P7RkC8OZi6CgYqET8JFWvIwKEd6YL +Tv8Ah9rTmqH9QLAAABAQDfmUZq9oKsN14XtaS4Ot3rOlwsNDwxheTArQsrS96FLXqIHnQW +PhJ537XBNQQRSzSXPe0rpiaq7ITRKitJgNqDmAGzcpdnIirXw5i2P8Z2C0DJ8+/cwCWnzy +GtKOO5kD98l94JUVQ34dlCN++7bOLZz9i5CbA7ae+7wm+bXmGGzniK0ciqcm4B/d8vh9NS +368KmO8E0WXqV0gcjcpD3LNHq1+dsS2QEUv7HKuAUhdOnKvzoD1yX1Y41z9VvxxUQX6W+U +JWipsaP16HEXDV4mJ3qLMV2/0bsEitrFwx40T40qI0Ws6BYH97ywgO57CaK/sf3c/w5iwz +g9Yz3ip8GiZPAAAACXJvb3RAZS5teAE= +-----END OPENSSH PRIVATE KEY----- diff --git a/roles/common/files/root/.ssh/e.mx-id_rsa-opendkim.pub b/roles/common/files/root/.ssh/e.mx-id_rsa-opendkim.pub new file mode 100644 index 0000000..3bdadb2 --- /dev/null +++ b/roles/common/files/root/.ssh/e.mx-id_rsa-opendkim.pub @@ -0,0 +1 @@ +ssh-rsa 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 root@e.mx-opendkim diff --git a/roles/common/tasks/config_files_mailsystem_scripts.yml b/roles/common/tasks/config_files_mailsystem_scripts.yml new file mode 100644 index 0000000..34cde33 --- /dev/null +++ b/roles/common/tasks/config_files_mailsystem_scripts.yml @@ -0,0 +1,15 @@ +--- + +- name: (config_files_mailsystem_scripts.yml) Copy config file templates mailsystem scripts + template: + src: '{{ item.src_path }}' + dest: '{{ item.dest_path }}' + owner: root + group: root + mode: '0644' + loop: "{{ template_files_mailsystem_script }}" + loop_control: + label: 'dest: {{ item.name }}' + when: + - template_files_mailsystem_script is defined + - template_files_mailsystem_script|length > 0 diff --git a/roles/common/tasks/copy_files.yml b/roles/common/tasks/copy_files.yml new file mode 100644 index 0000000..b66b6aa --- /dev/null +++ b/roles/common/tasks/copy_files.yml @@ -0,0 +1,37 @@ +--- + + + +- name: (copy_files.yml) Copy plain files + copy: + src: '{{ item.src_path }}' + dest: '{{ item.dest_path }}' + owner: root + group: root + mode: '0644' + loop: "{{ copy_plain_files }}" + loop_control: + label: 'dest: {{ item.name }}' + when: + - copy_plain_files is defined + - copy_plain_files|length > 0 + tags: + - copy-files + - copy-plain-files + +- name: (copy_files.yml) Copy template files + template: + src: '{{ item.src_path }}' + dest: '{{ item.dest_path }}' + owner: root + group: root + mode: '0644' + loop: "{{ copy_template_files }}" + loop_control: + label: 'dest: {{ item.name }}' + when: + - copy_template_files is defined + - copy_template_files|length > 0 + tags: + - copy-files + - copy-template-files diff --git a/roles/common/tasks/main.yml b/roles/common/tasks/main.yml index d4fcaea..f8a4173 100644 --- a/roles/common/tasks/main.yml +++ b/roles/common/tasks/main.yml @@ -109,6 +109,30 @@ - import_tasks: git.yml tags: git + +# tags supported inside copy_files.yml: +# +# copy-files +# copy-plain-files +# copy-template-files +- import_tasks: copy_files.yml + tags: + - copy-files + +# tags supported inside symlink_files.yml: +# +# symlink-files +- import_tasks: symlink_files.yml + tags: + - symlink-files + + +# tags supported inside config_files_mailsystem_scripts.yml: +# +- import_tasks: config_files_mailsystem_scripts.yml + tags: + - config-files-mailsystem + # tags supportetd inside caching-nameserver.yml # # apt-caching-nameserver diff --git a/roles/common/tasks/symlink_files.yml b/roles/common/tasks/symlink_files.yml new file mode 100644 index 0000000..4dc4567 --- /dev/null +++ b/roles/common/tasks/symlink_files.yml @@ -0,0 +1,17 @@ +--- + +- name: (symlink_files.yml) Symlink files + file: + src: '{{ item.src_path }}' + dest: '{{ item.dest_path }}' + owner: root + group: root + state: link + loop: "{{ symlink_files }}" + loop_control: + label: 'dest: {{ item.name }}' + when: + - symlink_files is defined + - symlink_files|length > 0 + tags: + - symlink-files diff --git a/roles/common/tasks/users.yml b/roles/common/tasks/users.yml index 5fac5ad..d0a54af 100644 --- a/roles/common/tasks/users.yml +++ b/roles/common/tasks/users.yml @@ -95,6 +95,19 @@ tags: - authorized_key +- name: (users.yml) other entries authorized_key files + authorized_key: + user: "{{ item.user }}" + key: "{{ item.key }}" + state: present + loop: "{{ entries_authorized_key }}" + loop_control: + label: "{{ item.user }}" + when: + - entries_authorized_key is defined + - entries_authorized_key|length > 0 + + # --- # - extra system groups # --- @@ -144,8 +157,9 @@ loop_control: label: '{{ item.priv_key_dest }}' when: - - ssh_keypair_backup_server is defined and ssh_keypair_backup_server|length > 0 - insert_ssh_keypair_backup_server|bool + - ssh_keypair_backup_server is defined + - ssh_keypair_backup_server|length > 0 tags: - insert-ssh-keypair-backup-server - keypair-backup-server @@ -162,8 +176,9 @@ loop_control: label: '{{ item.pub_key_dest }}' when: - - ssh_keypair_backup_server is defined and ssh_keypair_backup_server|length > 0 - insert_ssh_keypair_backup_server|bool + - ssh_keypair_backup_server is defined + - ssh_keypair_backup_server|length > 0 tags: - insert-ssh-keypair-backup-server - keypair-backup-server @@ -177,7 +192,9 @@ loop: "{{ ssh_keypair_backup_server }}" loop_control: label: 'authorized_keys - user: {{ item.backup_user }}' - when: ssh_keypair_backup_server is defined and ssh_keypair_backup_server|length > 0 + when: + - ssh_keypair_backup_server is defined + - ssh_keypair_backup_server|length > 0 tags: - authorized_key - keypair-backup-server @@ -192,26 +209,76 @@ path: /root/.ssh state: directory -- name: (users.yml) Copy default ed25519 ssh private key to user root +- name: (users.yml) Copy (backup) ed25519 ssh private key to user root copy: src: '{{ item.priv_key_src }}' dest: '{{ item.priv_key_dest }}' owner: root group: root mode: '0600' - #when: groups['oopen_server']|string is search(inventory_hostname) when: - - insert_root_ssh_keypair|bool - - groups['backup_server']|string is not search(inventory_hostname) + - insert_keypair_backup_client|bool + - ssh_keypair_backup_client is defined + - ssh_keypair_backup_client|length > 0 + loop: "{{ ssh_keypair_backup_client }}" + loop_control: + label: 'dest: {{ item.priv_key_dest }}' + tags: + - insert_ssh_keypair_backup_server + +- name: (users.yml) Copy (backup) ed25519 ssh public key to user root + copy: + src: '{{ item.pub_key_src }}' + dest: '{{ item.pub_key_dest }}' + owner: root + group: root + mode: '0644' + when: + - insert_keypair_backup_client|bool + - ssh_keypair_backup_client is defined + - ssh_keypair_backup_client|length > 0 + loop: "{{ ssh_keypair_backup_client }}" + loop_control: + label: 'dest: {{ item.pub_key_dest }}' + tags: + - insert_ssh_keypair_backup_server + +- name: (users.yml) Ensure authorized_key (root) on backup hosts contains public key + authorized_key: + user: root + key: "{{ lookup('file', item.pub_key_src) }}" + state: present + loop: "{{ ssh_keypair_backup_client }}" + loop_control: + label: 'authorized_keys - user: root' + when: + - inventory_hostname == item.target + - ssh_keypair_backup_client is defined + - ssh_keypair_backup_client|length > 0 + tags: + - authorized_key + - ssh-keypair-backup-server + + +- name: (users.yml) Copy further ssh private key(s) to user root + copy: + src: '{{ item.priv_key_src }}' + dest: '{{ item.priv_key_dest }}' + owner: root + group: root + mode: '0600' loop: "{{ root_ssh_keypair }}" loop_control: label: 'dest: {{ item.priv_key_dest }}' - #with_items: '{{ root_ssh_keypair }}' + when: + - insert_root_ssh_keypair|bool + - root_ssh_keypair is defined + - root_ssh_keypair|length > 0 tags: - insert_root_ssh_keypair - root-defaut-ssh-keypair -- name: (users.yml) Copy default ed25519 ssh public key to user root +- name: (users.yml) Copy further ssh public key(s) to user root copy: src: '{{ item.pub_key_src }}' dest: '{{ item.pub_key_dest }}' @@ -221,25 +288,11 @@ loop: "{{ root_ssh_keypair }}" loop_control: label: 'dest: {{ item.pub_key_dest }}' - #with_items: '{{ root_ssh_keypair }}' when: - insert_root_ssh_keypair|bool - - groups['backup_server']|string is not search(inventory_hostname) + - root_ssh_keypair is defined + - root_ssh_keypair|length > 0 tags: - insert_root_ssh_keypair - root-defaut-ssh-keypair -- name: (users.yml) Ensure authorized_key (root) on backup hosts contains public key - authorized_key: - user: root - key: "{{ lookup('file', item.pub_key_src) }}" - state: present - loop: "{{ root_ssh_keypair }}" - loop_control: - label: 'authorized_keys - user: root' - #with_items: '{{ root_ssh_keypair }}' - when: inventory_hostname == item.target - tags: - - authorized_key - - root-defaut-ssh-keypair - diff --git a/roles/common/templates/usr/local/src/mailsystem/conf/install_amavis.conf.j2 b/roles/common/templates/usr/local/src/mailsystem/conf/install_amavis.conf.j2 new file mode 100644 index 0000000..505421e --- /dev/null +++ b/roles/common/templates/usr/local/src/mailsystem/conf/install_amavis.conf.j2 @@ -0,0 +1,30 @@ +# {{ ansible_managed }} + +# --- +# - Parametersettins postfix bases system +# --- + + +_HOSTNAME={{ hostname }} +_IPV4='{{ ipv4_address | default(omit) }}' +_IPV6='{{ ipv6_address | default(omit) }}' + +_QUARANTINE_DIR=/var/QUARANTINE +_QUARANTINE_ADMIN=postmaster\@$mydomain + +_DB_IN_USE=true +{% if "PostgreSQL" == postfix_db_type %} +_DB_TYPE=PostgreSQL +{% else %} +_DB_TYPE=MySQL +{% endif %} +_DB_HOST={{ postfix_db_host | default(omit) }} +_DB_NAME={{ postfix_db_name | default(omit) }} +_DB_USER={{ postfix_db_user | default(omit) }} +_DB_PASS='{{ postfix_db_pass | default(omit) }}' +_INSTALL_CLAMAV_UNOFFICIAL_SIGS=true +_MALWARE_PATROL_IN_USE=true +_MALWERE_PATROL_FREE=false +_MP_RECEIPT_NUMBER={{ mp_receipt_number | default(omit) }} +_SECURITE_INFO_IN_USE=true +_SI_AUTHORISATION_SIGNATURE={{ si_authorisation_signature | default(omit) }} diff --git a/roles/common/templates/usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2 b/roles/common/templates/usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2 new file mode 100644 index 0000000..dcc43dc --- /dev/null +++ b/roles/common/templates/usr/local/src/mailsystem/conf/install_postfixadmin.conf.j2 @@ -0,0 +1,275 @@ +# {{ ansible_managed }} + +# ----------------------------------------------- +# - Configuration for postfixadmin install script +# ----------------------------------------------- + +# - Name of the website - usualy 'webmail..' +# - +WEBSITE_NAME="{{ website_name_postfixadmin | default(omit) }}" + +# - IPv4 Address +# - +IPV4='{{ ipv4_address | default(omit) }}' + +# - IPv6 Address +# - +IPV6='{{ ipv6_address | default(omit) }}' + +# - Is apache installed from debian package system ? +# - +# - Boolean, possible values are 'true', 'false' +# - +# - Defaults to 'false' +# +#APACHE_DEBIAN_INSTALLATION="" + +# - Apache User +# - +# - If ommitted, script tries to determine the user under which user the webserver +# - is running. If that fails, parameter defaults to 'www-data' +# - +#HTTP_USER="" + +# - Apache Group +# - +# - If ommitted, script tries to determine the user under which group the webserver +# - is running. If that fails, parameter defaults to 'www-data' +# - +#HTTP_GROUP="" + +# - Webmasters E-Mail Address +# - +# - Defaults to 'admin@.' +# - +#WEBMASTER_EMAIL="" + +# - Base Directory of Roundcube Website +# - +# - Note: it's not the 'DocumentRoot' directory, but the directory where +# - the 'DocumentRoot' Directory lives. +# - +# - Defaults to '/var/www/$WEBSITE_NAME' +# - +#WEBSITE_BASEDIR="" + +# - Directory, where apache places the log-files for thw webmailers site. +# - +# - Defaults to '/var/log/apache2' +# - +#APACHE_LOG_DIR="" + +# - Directory where certificate and key for the roundcube website +# - are stored. +# - +# - Example: +# - APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME" +# - +# - Defaults to +# - '/etc/apache2' if apache is installed from debian package system +# - '/usr/local/apache2/conf' otherwise +# - +APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME" + +# - Certificate for the Rounfcube Website +# - +# - Example: +# - APACHE_SERVER_CERT="fullchain.pem" +# - +# - Defaults to 'server-bundle.crt' +# - +APACHE_SERVER_CERT="fullchain.pem" + +# - Key File for the Rounfcube Website +# - +# - Example: +# - APACHE_SERVER_KEY="privkey.pem" +# - +# - Defaults to 'server.key' +# - +APACHE_SERVER_KEY="privkey.pem" + +# - Certification Chain File +# - +# - Deprecated since Apache 2.4 - Leave empty if not present +# - +#CERT_ChainFile="" + + +# - Is PHP installed from debian package system ? +# - +# - Boolean, possible values are 'true', 'false' +# - +# - Defaults to 'false' +# +#PHP_DEBIAN_INSTALLATION="" + +# - Type of PHP installation. +# - +# - Possible values are: 'php_fpm' , 'fcgid' , 'mod_php +# - +# - defaults to 'php_fpm'' +# - +#PHP_TYPE="" + +# - Directory where apache vhosts definitions live. +# - +# - Defaults to +# - '/etc/apache2/sites-available' if installed from debain package system +# - '/usr/local/apache2/conf/vhosts' otherwise +# - +#APACHE_VHOST_DIR="" + +# - Hostname for vacation / absence messages +# - +# - Defaults to 'autoreply.. +# - +#AUTOREPLY_HOSTNAME="" + + + +# - Is MySQL installed from debian package system? +# - +# - Only needed, if DB_TYPE is set to 'mysql' +# - +# - Defaults to 'false' +# - +#MYSQL_DEBIAN_INSTALLATION="" + +# - mysql_credential_args (root access to MySQL Database) +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +# - Defaults to: +# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system +# - '/usr/local/mysql/sys-maint.cnf' otherwise +# - +#MYSQL_CREDENTIALS="" + + +# - The wa passwords will be encrypted. +# - +# - $CONF['encrypt'] +# - +# - Possible values: +# - md5crypt = internal postfix admin md5 +# - md5 = md5 sum of the password +# - cleartext = clear text passwords +# - mysql_encrypt = useful for PAM integration +# - +# - authlib = support for courier-authlib style passwords - also set $CONF['authlib_default_flavor'] +# - dovecot:CRYPT-METHOD = use dovecotpw -s 'CRYPT-METHOD'. Example: dovecot:CRAM-MD5 +# - IMPORTANT: +# - - don't use dovecot:* methods that include the username in the hash - you won't be able +# - to login to PostfixAdmin in this case +# - - you'll need at least dovecot 2.1 for salted passwords ('doveadm pw' 2.0.x doesn't support the '-t' option) +# - - dovecot 2.0.0 - 2.0.7 is not supported +# - +# - Example: +# - +# - ENCRYPTION_METHOD="cleartext" +# - ENCRYPTION_METHOD="dovecot:CRAM-MD5" +# - +ENCRYPTION_METHOD="dovecot:SHA512-CRYPT" + +# - If you use the dovecot encryption method: where is the dovecotpw binary located? +# - +# - Defaults to '/usr/local/dovecot/bin/doveadm pw' +# - +#DOVEADM_PW="" + +# - Directory where deleted mailbox will be saved +# - +# - defaults to '/var/deleted-maildirs' +# - +#DELETED_MAILBOX_DIR= + +# - Directory where deleted domains will be saved +# - +# - defaults to '/var/deleted-maildomains' +# - +#DELETED_DOMAINS_DIR= + +# - Welcome Message +# - This message is send to every newly created mailbox. +# - +WELCOME_MESSAGE=" +{{ email_welcome_message }} +" + + +# ========== +# - Settings Postfix Database +# ========== + +# - Type of Postfix database +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +{% if "PostgreSQL" == postfix_db_type %} +POSTFIX_DB_TYPE="pgsql" +{% else %} +POSTFIX_DB_TYPE="mysql" +{% endif %} + +# - Host/Socket of Postfix Database (MySQL) +# - +# - Example: +# - POSTFIX_DB_HOST_MYSQL="127.0.0.1" +# - POSTFIX_DB_HOST_MYSQL="unix:/tmp/mysql.sock" +# - +# - Note: +# - Dont't use 'localhost' if your MySQL socket is NOT +# - located at '/var/run/mysqld/mysqld.sock' +# - +# - Defaults to 'unix:/tmp/mysql.sock' +# - +#POSTFIX_DB_HOST_MYSQL="" + +# - Host/Socket of Postfix Database (PostgeSQL) +# - +# - Example: +# - POSTFIX_DB_HOST_PGSQL='/var/run/postgresql' +# - +# - Defaults to '/var/run/postgresql' +# - +#POSTFIX_DB_HOST_PGSQL="" + +# - Name of Postfix Database +# - +# - Defaults to 'postfix' +# - +#POSTFIX_DB_NAME= + +# - User of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Defaults to 'postfix' +# - +#POSTFIX_DB_USER="" + +# - Password of Postfix Database +# - +POSTFIX_DB_PASS='{{ postfix_db_pass | default(omit) }}' + + +# ========== +# - vacation +# ========== + +# - Vacation User +# - +# - Defaults to 'vacation' +# - +#VACATION_USER="" + +# - Vacation Group +# - +# - Defaults to '' +# - +#VACATION_GROUP="vacation" + diff --git a/roles/common/templates/usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2 b/roles/common/templates/usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2 new file mode 100644 index 0000000..302e6ba --- /dev/null +++ b/roles/common/templates/usr/local/src/mailsystem/conf/install_update_dovecot.conf.j2 @@ -0,0 +1,168 @@ +#!/usr/bin/env bash + +# {{ ansible_managed }} + +## =================================================================== +## - Configuration File: Install/Update Dovecot Server +## =================================================================== + +# --- +# --- Configure Settings for your Server here.. +# --- + + +# --- +# - Base Configuration +# --- + +# - Set update=false if that is a new installation +# - +# - This parameter must be set here! There is no default value. +# - +_update=true + + +# - Install dovecot with systemd support +# - +# - Defaults to 'true' if systemd is present, otherwise to 'false' +# - +systemd_support="true" + + +# - postmaster_address +# - +# - This parameter must be set here! There is no default value. +# - +# - Example: +# - postmaster_address="admin\@warenform.net" +# - +postmaster_address="admin\@oopen.de" + + +# - hostname +# - +# - This parameter must be set here! There is no default value. +# - +hostname="{{ hostname | default(omit) }}" + + +# - IPv4 / IPv6 Addressen +# - +ipv4="{{ ipv4_address | default(omit) }}" +ipv6="{{ ipv6_address | default(omit) }}" + + +# --- +# - Listener configuration +# --- +if [[ -n "$ipv6" ]]; then + imap_listener_adresses="127.0.0.1 $ipv4 $ipv6" + imaps_listener_adresses="$ipv4 $ipv6" + + pop_listener_adresses="$ipv4 $ipv6" + pops_listener_adresses="$ipv4 $ipv6" +else + imap_listener_adresses="127.0.0.1 $ipv4" + imaps_listener_adresses="$ipv4" + + pop_listener_adresses="$ipv4" + pops_listener_adresses="$ipv4" +fi + +xmpp_listener=false +xmpp_listener_addresses="$ipv4 $ipv6" +xmpp_listener_port="44444" + +# --- +# - Database settings +# --- + +# - database +# - +# - This parameter must be set here! There is no default value. +# - +# - Possible values for parameter database are only 'mysql' and 'postgres' +# - +{% if "PostgreSQL" == postfix_db_type %} +database="postgres" +{% else %} +database="mysql" +{% endif %} + +# - dbname +# - +# - Defaults to 'postfix' +dbname={{ postfix_db_name | default(omit) }} + +# - dbuser +# - +# - Defaults to 'postfix' +# - +dbuser={{ postfix_db_user | default(omit) }} + +# - dbpassword +# - +# - This parameter must be set here! +# - +dbpassword="{{ postfix_db_pass | default(omit) }}" + +# - dbhost +# - +# - Defaults to: +# - '/var/run/postgresql' if database is set to 'postgres' +# - '127.0.0.1' if database is set to 'mysql' +# - +{% if postfix_db_type == 'PostgeSQL' %} +dbhost=/var/run/postgresql +{% else %} +dbhost={{ postfix_db_host | default(omit) }} +{% endif %} + +# - default_pass_scheme +# - +# - Password databases have a default password scheme. +# - +# - The password scheme can be overridden for each password by prefixing +# - it with {SCHEME}, for example: {SHA512-CRYPT}pass. +# - +# - See: https://wiki.dovecot.org/Authentication/PasswordSchemes +# - +# - Defaults to 'PLAIN' +# - +default_pass_scheme=PLAIN + + +# --- +# - Cert/Key configurations +# --- + +cert_base_dir="/etc/dovecot/ssl" +server_cert=${cert_base_dir}/mailserver.crt +server_key=${cert_base_dir}/mailserver.key +dh_pem_file="${cert_base_dir}/dh_4096.pem" + +imap_cert=${cert_base_dir}/mailserver.crt +imap_key=${cert_base_dir}/mailserver.key + +pop_cert=${cert_base_dir}/mailserver.crt +pop_key=${cert_base_dir}/mailserver.key + + +# - Other settings +# - +spam_folder=Spam + +max_userip_connections=48 +#auth_mechanisms="plain login digest-md5 cram-md5" +auth_mechanisms="plain login" + +# - Settings for quota warning sript +# - +from_address="{{ dovecot_from_address | default(omit) }}" +reply_to="{{ dovecot_reply_to | default(omit) }}" +webmailer="{{ webmailer_address | default(omit) }}" +salutation="{{ salutation | default(omit) }}" + +# --- +# --- End server-specific Settings +# --- diff --git a/roles/common/templates/usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2 b/roles/common/templates/usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2 new file mode 100644 index 0000000..86a6f71 --- /dev/null +++ b/roles/common/templates/usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail.conf.j2 @@ -0,0 +1,365 @@ +# {{ ansible_managed }} + +# ---------------------------------------------------- +# - Configuration for roundcube install/upgrade script +# ---------------------------------------------------- + +# - Name of the website - usualy 'webmail..' +# - +WEBSITE_NAME="{{ webmail_site_name | default(omit) }}" + +# - IPv4 Address +# - +IPV4="{{ ipv4_address | default(omit) }}" + +# - IPv6 Address +# - +IPV6="{{ ipv6_address | default(omit) }}" + +# - Is apache installed from debian package system ? +# - +# - Boolean, possible values are 'true', 'false' +# - +# - Defaults to 'false' +# +#APACHE_DEBIAN_INSTALLATION="" + +# - Apache User +# - +# - If ommitted, script tries to determine the user under which user the webserver +# - is running. If that fails, parameter defaults to 'www-data' +# - +#HTTP_USER="" + +# - Apache Group +# - +# - If ommitted, script tries to determine the user under which group the webserver +# - is running. If that fails, parameter defaults to 'www-data' +# - +#HTTP_GROUP="" + +# - Webmasters E-Mail Address +# - +# - Defaults to 'admin@.' +# - +#WEBMASTER_EMAIL="" + +# - Base Directory of Roundcube Website +# - +# - Note: it's not the 'DocumentRoot' directory, but the directory where +# - the 'DocumentRoot' Directory lives. +# - +# - Defaults to '/var/www/webmail/$WEBSITE_NAME' +# - +#WEBSITE_BASEDIR="" + + +# - Directory for storing temporary files +# - +# - Defaults to '${WEBMAIL_BASEDIR}/temp" +# - +#ROUNDCUBE_TMPDIR="" + +# - Directory, where apache places the log-files for thw webmailers site. +# - +# - Defaults to '/var/log/apache2' +# - +#APACHE_LOG_DIR="" + +# - Directory where certificate and key for the roundcube website +# - are stored. +# - +# - Example: +# - APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME" +# - +# - Defaults to +# - '/etc/apache2' if apache is installed from debian package system +# - '/usr/local/apache2/conf' otherwise +# - +APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME" + +# - Certificate for the Rounfcube Website +# - +# - Example: +# - APACHE_SERVER_CERT="fullchain.pem" +# - +# - Defaults to 'server-bundle.crt' +# - +APACHE_SERVER_CERT="fullchain.pem" + +# - Key File for the Rounfcube Website +# - +# - Example: +# - APACHE_SERVER_KEY="privkey.pem" +# - +# - Defaults to 'server.key' +# - +APACHE_SERVER_KEY="privkey.pem" + +# - Certification Chain File +# - +# - Deprecated since Apache 2.4 - Leave empty if not present +# - +#CERT_ChainFile="" + + +# - Is PHP installed from debian package system ? +# - +# - Boolean, possible values are 'true', 'false' +# - +# - Defaults to 'false' +# +PHP_DEBIAN_INSTALLATION="false" + +# - Type of PHP installation. +# - +# - Possible values are: 'php_fpm' , 'fcgid' , 'mod_php +# - +# - defaults to 'php_fpm'' +# - +#PHP_TYPE="" + +# - Directory where apache vhosts definitions live. +# - +# - Defaults to +# - '/etc/apache2/sites-available' if installed from debain package system +# - '/usr/local/apache2/conf/vhosts' otherwise +# - +#APACHE_VHOST_DIR="" + +# - Hostname for vacation / absence messages +# - +# - Defaults to 'autoreply.. +# - +AUTOREPLY_HOSTNAME="{{ autoreply_hostname | default(omit) }}" + +# - Database type for Roundcube +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +DB_TYPE="{{ roundcube_db_type | default(omit) }}" + +# - Host of Roundcube Database +# - +# - Defaults to 'localhost' +# - +DB_HOST="{{ roundcube_db_host | default(omit) }}" + +# - Name of Roundcube Database +# - +# - Defaults to 'roundcubemail' +# - +DB_NAME="{{ roundcube_db_name | default(omit) }}" + +# - User of Roundcube Database +# - +# - Defaults to 'roundcube' +# - +DB_USER="{{ roundcube_db_user | default(omit) }}" + +# - Password of Roundcube Database +# - +DB_PASS='{{ roundcube_db_pass | default(omit) }}' + + +# - Is MySQL installed from debian package system? +# - +# - Only needed, if DB_TYPE is set to 'mysql' +# - +# - Defaults to 'false' +# - +#MYSQL_DEBIAN_INSTALLATION="" + +# - mysql_credential_args (root access to MySQL Database) +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +# - Defaults to: +# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system +# - '/usr/local/mysql/sys-maint.cnf' otherwise +# - +#MYSQL_CREDENTIALS="" + +# - Name of the folder where (assumed) junk mails will be stored +# - +# - Defaults to 'Spam' +# - +#SPAM_FOLDER_NAME="" + +# - You can set your own product name to replace the default. +# - +# - Defaults to 'Roundcube Webmail' +# - +PRODUCT_NAME="{{ roundcube_product_name | default(omit) }}" + +# - URL for users, to get in contact if something goes wrong +# - +# - Defaults to 'www..' +# - +SUPPORT_URL="{{ roundcube_support_url | default(omit) }}" + +# - Provide your own logo under this URI +# - +# - Note: this script will NOT place the logo. You have to do this by your own +# - after installation is finisched. +# - +# - Default is empty +# - +SKIN_LOGO="{{ roundcube_skin_logo | default(omit) }}" + + + +# -------------------- +# - Plugins Configuration +# -------------------- + + +# ========== +# - Settings Postfix Database +# ========== + +# - Type of Postfix database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +{% if "PostgreSQL" == postfix_db_type %} +POSTFIX_DB_TYPE="pgsql" +{% else %} +POSTFIX_DB_TYPE="mysql" +{% endif %} + +# - Host of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Defaults to 'localhost' +# - +POSTFIX_DB_HOST="{{ postfix_db_host | default(omit) }}" + +# - Name of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Defaults to 'postfix' +# - +POSTFIX_DB_NAME="{{ postfix_db_name | default(omit) }}" + +# - User of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Defaults to 'postfix' +# - +POSTFIX_DB_USER="{{ postfix_db_user | default(omit) }}" + +# - Password of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +POSTFIX_DB_PASSWD='{{ postfix_db_pass | default(omit) }}' + + +# === +# - Plugin acl +# === + +# - Activate plugin 'acl'? +# - +# - Boolean - possible values are 'true' and 'false' +# - +# - Defaults to 'false' +# - +INCLUDE_ACL_PLUGIN="true" + + +# === +# - Plugin password (change password) +# === + +# - Is current password reqired +# - +# - $config['password_confirm_current'] +# - +# - Boolean - possible values are 'true' and 'false' +# - +# - Defaults to 'true' +# - +#PW_CONFIRM_CURRENT="" + +# - Minimun length if new password +# - +# - $config['password_minimum_length'] +# - +# - Defaults to '10' +# - +#PW_MIN_LENGTH="" + +# - New Password requires nonalpha character +# - +# - $config['password_require_nonalpha'] +# - +# - Boolean - possible values are 'true' and 'false' +# - +# - Defaults to 'true' +# - +#PW_REQUIRE_NONALPHA='' + +# - Default password hashing/crypting algorithm. +# - +# - $config['password_algorithm'] +# - +# - Possible values: des-crypt, ext-des-crypt, md5-crypt, blowfish-crypt, +# - sha256-crypt, sha512-crypt, md5, sha, smd5, ssha, samba, +# - ad, dovecot, clear. +# - +# - Defaults to 'dovecot' +# - +PW_PASSWD_ALGO='dovecot' + +# - Password prefix (e.g. {CRYPT}, {SHA}, {CRAM-MD5}) for passwords generated +# - +# - $config['password_algorithm_prefix'] +# - +# - Defaults to '{CRAM-MD5}' +# - +PW_PASSWD_ALGO_PREFIX='{SHA512-CRYPT}' + +# - Path for dovecotpw/doveadm-pw +# - +# - $config['password_dovecotpw'] +# - +# - Defaults to '/usr/local/dovecot/bin/doveadm pw' +# - +#PW_DOVEADM_PW='' + +# - Dovecot password scheme. +# - +# - $config['password_dovecotpw_method'] +# - +# - Defaults to 'CRAM-MD5 +# - +PW_DOVECOT_PW_METHOD='SHA512-CRYPT' + +# - The SQL query used to change the password. +# - +# - $config['password_query'] +# - +PW_DB_UPDATE_STRING='UPDATE mailbox SET password=%P WHERE username=%u' + + +# ========== +# - Plugin password vacation +# ========== + +# - allow vacation forwarder +# - +# - $rcmail_config['vacation_gui_vacationforwarder'] = FALSE; +# - +# - defaults to 'false' +# - +#VAC_GUI_FORWARDER=false diff --git a/roles/common/templates/usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf.j2 b/roles/common/templates/usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf.j2 new file mode 100644 index 0000000..a8a83dd --- /dev/null +++ b/roles/common/templates/usr/local/src/mailsystem/conf/install_upgrade_roundcube-webmail2.conf.j2 @@ -0,0 +1,356 @@ +# {{ ansible_managed }} + +# ---------------------------------------------------- +# - Configuration for roundcube install/upgrade script +# ---------------------------------------------------- + +# - Name of the website - usualy 'webmail..' +# - +WEBSITE_NAME="{{ webmaili_2_site_name | default(omit) }}" + +# - IPv4 Address +# - +IPV4="{{ ipv4_address | default(omit) }}" + +# - IPv6 Address +# - +IPV6="{{ ipv6_address | default(omit) }}" + +# - Is apache installed from debian package system ? +# - +# - Boolean, possible values are 'true', 'false' +# - +# - Defaults to 'false' +# +#APACHE_DEBIAN_INSTALLATION="" + +# - Apache User +# - +# - If ommitted, script tries to determine the user under which user the webserver +# - is running. If that fails, parameter defaults to 'www-data' +# - +#HTTP_USER="" + +# - Apache Group +# - +# - If ommitted, script tries to determine the user under which group the webserver +# - is running. If that fails, parameter defaults to 'www-data' +# - +#HTTP_GROUP="" + +# - Webmasters E-Mail Address +# - +# - Defaults to 'admin@.' +# - +#WEBMASTER_EMAIL="" + +# - Base Directory of Roundcube Website +# - +# - Note: it's not the 'DocumentRoot' directory, but the directory where +# - the 'DocumentRoot' Directory lives. +# - +# - Defaults to '/var/www/webmail/$WEBSITE_NAME' +# - +#WEBSITE_BASEDIR="" + + +# - Directory for storing temporary files +# - +# - Defaults to '${WEBMAIL_BASEDIR}/temp" +# - +#ROUNDCUBE_TMPDIR="" + +# - Directory, where apache places the log-files for thw webmailers site. +# - +# - Defaults to '/var/log/apache2' +# - +#APACHE_LOG_DIR="" + +# - Directory where certificate and key for the roundcube website +# - are stored. +# - +# - Example: +# - APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME" +# - +# - Defaults to +# - '/etc/apache2' if apache is installed from debian package system +# - '/usr/local/apache2/conf' otherwise +# - +APACHE_CERT_DIR="/var/lib/dehydrated/certs/$WEBSITE_NAME" + +# - Certificate for the Rounfcube Website +# - +# - Example: +# - APACHE_SERVER_CERT="fullchain.pem" +# - +# - Defaults to 'server-bundle.crt' +# - +APACHE_SERVER_CERT="fullchain.pem" + +# - Key File for the Rounfcube Website +# - +# - Example: +# - APACHE_SERVER_KEY="privkey.pem" +# - +# - Defaults to 'server.key' +# - +APACHE_SERVER_KEY="privkey.pem" + +# - Certification Chain File +# - +# - Deprecated since Apache 2.4 - Leave empty if not present +# - +#CERT_ChainFile="" + +# - Type of PHP installation. +# - +# - Possible values are: 'php_fpm' , 'fcgid' , 'mod_php +# - +# - defaults to 'php_fpm'' +# - +#PHP_TYPE="" + +# - Directory where apache vhosts definitions live. +# - +# - Defaults to +# - '/etc/apache2/sites-available' if installed from debain package system +# - '/usr/local/apache2/conf/vhosts' otherwise +# - +#APACHE_VHOST_DIR="" + +# - Hostname for vacation / absence messages +# - +# - Defaults to 'autoreply.. +# - +AUTOREPLY_HOSTNAME="{{ autoreply_2_hostname | default(omit) }}" + +# - Database type for Roundcube +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +DB_TYPE="{{ roundcube_2_db_type | default(omit) }}" + +# - Host of Roundcube Database +# - +# - Defaults to 'localhost' +# - +DB_HOST="{{ roundcube_2_db_host | default(omit) }}" + +# - Name of Roundcube Database +# - +# - Defaults to 'roundcubemail' +# - +DB_NAME="{{ roundcube_2_db_name | default(omit) }}" + +# - User of Roundcube Database +# - +# - Defaults to 'roundcube' +# - +DB_USER="{{ roundcube_2_db_user | default(omit) }}" + +# - Password of Roundcube Database +# - +DB_PASS="3Dsz3j5R" + + +# - Is MySQL installed from debian package system? +# - +# - Only needed, if DB_TYPE is set to 'mysql' +# - +# - Defaults to 'false' +# - +#MYSQL_DEBIAN_INSTALLATION="" + +# - mysql_credential_args (root access to MySQL Database) +# - +# - Example +# - mysql_credential_args="--login-path=local" +# - mysql_credential_args="--defaults-file=/etc/mysql/debian.cnf" (Debian default) +# - mysql_credential_args="--defaults-file=/usr/local/mysql/sys-maint.cnf" +# - +# - Defaults to: +# - '/etc/mysql/debian.cnf' if MySQL is installed from debian package system +# - '/usr/local/mysql/sys-maint.cnf' otherwise +# - +#MYSQL_CREDENTIALS="" + +# - Name of the folder where (assumed) junk mails will be stored +# - +# - Defaults to 'Spam' +# - +#SPAM_FOLDER_NAME="" + +# - You can set your own product name to replace the default. +# - +# - Defaults to 'Roundcube Webmail' +# - +PRODUCT_NAME="{{ roundcube_2_product_name | default(omit) }}" + +# - URL for users, to get in contact if something goes wrong +# - +# - Defaults to 'www..' +# - +SUPPORT_URL="{{ roundcube_2_support_url | default(omit) }}" + +# - Provide your own logo under this URI +# - +# - Note: this script will NOT place the logo. You have to do this by your own +# - after installation is finisched. +# - +# - Default is empty +# - +SKIN_LOGO="{{ roundcube_2_skin_logo | default(omit) }}" + + + +# -------------------- +# - Plugins Configuration +# -------------------- + + +# ========== +# - Settings Postfix Database +# ========== + +# - Type of Postfix database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Possible values are 'pgsql' (PostgeSQL) or 'mysql' (MySQL) +# - +{% if "PostgreSQL" == postfix_db_type %} +POSTFIX_DB_TYPE="pgsql" +{% else %} +POSTFIX_DB_TYPE="mysql" +{% endif %} + +# - Host of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Defaults to 'localhost' +# - +POSTFIX_DB_HOST="{{ postfix_db_host | default(omit) }}" + +# - Name of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Defaults to 'postfix' +# - +POSTFIX_DB_NAME="{{ postfix_db_name | default(omit) }}" + +# - User of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +# - Defaults to 'postfix' +# - +POSTFIX_DB_USER="{{ postfix_db_user | default(omit) }}" + +# - Password of Postfix Database +# - +# - used for setting $config['password_db_dsn'] +# - +POSTFIX_DB_PASSWD='{{ postfix_db_pass | default(omit) }}' + + +# === +# - Plugin acl +# === + +# - Activate plugin 'acl'? +# - +# - Boolean - possible values are 'true' and 'false' +# - +# - Defaults to 'false' +# - +INCLUDE_ACL_PLUGIN="true" + + +# === +# - Plugin password (change password) +# === + +# - Is current password reqired +# - +# - $config['password_confirm_current'] +# - +# - Boolean - possible values are 'true' and 'false' +# - +# - Defaults to 'true' +# - +#PW_CONFIRM_CURRENT="" + +# - Minimun length if new password +# - +# - $config['password_minimum_length'] +# - +# - Defaults to '10' +# - +#PW_MIN_LENGTH="" + +# - New Password requires nonalpha character +# - +# - $config['password_require_nonalpha'] +# - +# - Boolean - possible values are 'true' and 'false' +# - +# - Defaults to 'true' +# - +#PW_REQUIRE_NONALPHA='' + +# - Default password hashing/crypting algorithm. +# - +# - $config['password_algorithm'] +# - +# - Possible values: des-crypt, ext-des-crypt, md5-crypt, blowfish-crypt, +# - sha256-crypt, sha512-crypt, md5, sha, smd5, ssha, samba, +# - ad, dovecot, clear. +# - +# - Defaults to 'dovecot' +# - +PW_PASSWD_ALGO='dovecot' + +# - Password prefix (e.g. {CRYPT}, {SHA}, {CRAM-MD5}) for passwords generated +# - +# - $config['password_algorithm_prefix'] +# - +# - Defaults to '{CRAM-MD5}' +# - +PW_PASSWD_ALGO_PREFIX='{SHA512-CRYPT}' + +# - Path for dovecotpw/doveadm-pw +# - +# - $config['password_dovecotpw'] +# - +# - Defaults to '/usr/local/dovecot/bin/doveadm pw' +# - +#PW_DOVEADM_PW='' + +# - Dovecot password scheme. +# - +# - $config['password_dovecotpw_method'] +# - +# - Defaults to 'CRAM-MD5 +# - +PW_DOVECOT_PW_METHOD='SHA512-CRYPT' + +# - The SQL query used to change the password. +# - +# - $config['password_query'] +# - +PW_DB_UPDATE_STRING='UPDATE mailbox SET password=%P WHERE username=%u' + + +# ========== +# - Plugin password vacation +# ========== + +# - allow vacation forwarder +# - +# - $rcmail_config['vacation_gui_vacationforwarder'] = FALSE; +# - +# - defaults to 'false' +# - +#VAC_GUI_FORWARDER=false