Files
@ 17cf34f73ca6
Branch filter:
Location: majic-ansible-roles/testsite/group_vars/backup.yml - annotation
17cf34f73ca6
1.5 KiB
text/x-yaml
MAR-28: Implemented additional tests for mail_server role:
- Deploy a number of tools on clients in order to test SMTP, IMAP, and Sieve
services.
- Added one more user to LDAP directory for testing group restrictions.
- Deploy CA certificate on all testing machines for TLS validation purposes.
- Use different custom-configured cipher for mail server ciphers.
- Fixed invalid postmaster address for parameters-optional host.
- Deploy configuration files for use with Imap-CLI on client test machines.
- Updated testing of SMTP server to include checks for users that do not belong
to mail group.
- Extended some SMTP-related tests to cover both test servers.
- Some small fixes in SMTP-related tests for expected output from commands.
- Implemented tests covering Dovecot (IMAP + Sieve) functionality.
- Implemented tests for running/enabled services.
- Implemented tests for ClamAV.
- Implemented tests for firewall and connectivity.
- Implemented tests for Postfix TLS configuration.
- TODO: Tests for Sieve TLS configuration have not been written yet due to
limitation of available tools.
- Deploy a number of tools on clients in order to test SMTP, IMAP, and Sieve
services.
- Added one more user to LDAP directory for testing group restrictions.
- Deploy CA certificate on all testing machines for TLS validation purposes.
- Use different custom-configured cipher for mail server ciphers.
- Fixed invalid postmaster address for parameters-optional host.
- Deploy configuration files for use with Imap-CLI on client test machines.
- Updated testing of SMTP server to include checks for users that do not belong
to mail group.
- Extended some SMTP-related tests to cover both test servers.
- Some small fixes in SMTP-related tests for expected output from commands.
- Implemented tests covering Dovecot (IMAP + Sieve) functionality.
- Implemented tests for running/enabled services.
- Implemented tests for ClamAV.
- Implemented tests for firewall and connectivity.
- Implemented tests for Postfix TLS configuration.
- TODO: Tests for Sieve TLS configuration have not been written yet due to
limitation of available tools.
500658358454 500658358454 500658358454 500658358454 500658358454 500658358454 500658358454 1b05bae8e440 500658358454 500658358454 3686169e9565 3686169e9565 a45dcc06530a 3686169e9565 3686169e9565 a45dcc06530a 881a85f08e22 881a85f08e22 881a85f08e22 dbc3381e1ff3 dbc3381e1ff3 dbc3381e1ff3 c161524058d5 c161524058d5 c161524058d5 24c957d877de 24c957d877de 24c957d877de 500658358454 500658358454 500658358454 500658358454 500658358454 500658358454 | ---
local_mail_aliases:
root: "root john.doe@{{ testsite_domain }}"
smtp_relay_host: mail.{{ testsite_domain }}
smtp_relay_truststore: "{{ lookup('file', inventory_dir + '/tls/ca.pem') }}"
backup_clients:
- server: web.{{ testsite_domain }}
public_key: "{{ lookup('file', inventory_dir + '/ssh/web.' + testsite_domain + '.pub') }}"
ip: 10.32.64.18
- server: mail.{{ testsite_domain }}
public_key: "{{ lookup('file', inventory_dir + '/ssh/mail.' + testsite_domain + '.pub') }}"
ip: 10.32.64.15
- server: ldap.{{ testsite_domain }}
public_key: "{{ lookup('file', inventory_dir + '/ssh/ldap.' + testsite_domain + '.pub') }}"
ip: 10.32.64.12
- server: xmpp.{{ testsite_domain }}
public_key: "{{ lookup('file', inventory_dir + '/ssh/xmpp.' + testsite_domain + '.pub') }}"
ip: 10.32.64.16
- server: backup.{{ testsite_domain }}
public_key: "{{ lookup('file', inventory_dir + '/ssh/backup.' + testsite_domain + '.pub') }}"
ip: 127.0.0.1
- server: ws01.{{ testsite_domain }}
public_key: "{{ lookup('file', inventory_dir + '/ssh/ws01.' + testsite_domain + '.pub') }}"
ip: 10.32.64.22
backup_host_ssh_private_keys:
dsa: "{{ lookup('file', inventory_dir + '/ssh/backup_server_dsa_key') }}"
rsa: "{{ lookup('file', inventory_dir + '/ssh/backup_server_rsa_key') }}"
ed25519: "{{ lookup('file', inventory_dir + '/ssh/backup_server_ed25519_key') }}"
ecdsa: "{{ lookup('file', inventory_dir + '/ssh/backup_server_ecdsa_key') }}"
|