Files
@ 2381ba93d089
Branch filter:
Location: majic-ansible-roles/roles/mail_server/molecule/default/group_vars/parameters-optional.yml - annotation
2381ba93d089
2.1 KiB
text/x-yaml
MAR-148: Better workaround for https://github.com/ansible/ansible/issues/64560 (override the module_utils/mysql.py instead of the module itself).
b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 5c5d8636f699 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 5c5d8636f699 b0c92677ba93 5c5d8636f699 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 | ---
mail_ldap_base_dn: dc=local
mail_ldap_url: ldap://ldap-server/
mail_ldap_tls_truststore: "{{ lookup('file', 'tests/data/x509/ca.cert.pem') }}"
mail_ldap_postfix_password: postfixpassword
mail_ldap_dovecot_password: dovecotpassword
mail_server_tls_protocols:
- TLSv1.2
- TLSv1.1
mail_server_tls_ciphers: "DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-GCM-SHA384:\
DHE-RSA-AES256-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-GCM-SHA384:\
ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA:!aNULL:!MD5:!EXPORT"
mail_user: virtmail
mail_user_uid: 5000
mail_user_gid: 5000
imap_max_user_connections_per_ip: 2
imap_tls_certificate: "{{ lookup('file', 'tests/data/x509/parameters-optional_imap.cert.pem') }}"
imap_tls_key: "{{ lookup('file', 'tests/data/x509/parameters-optional_imap.key.pem') }}"
local_mail_aliases:
root: "john.doe@domain1"
smtp_tls_certificate: "{{ lookup('file', 'tests/data/x509/parameters-optional_smtp.cert.pem') }}"
smtp_tls_key: "{{ lookup('file', 'tests/data/x509/parameters-optional_smtp.key.pem') }}"
imap_folder_separator: "."
smtp_rbl:
- bl.spamcop.net
- zen.spamhaus.org
mail_postmaster: "webmaster@parameters-optional"
smtp_allow_relay_from:
- "{% if ansible_distribution_release == 'jessie' %}10.31.127.20{% elif ansible_distribution_release == 'stretch' %}10.31.127.22{% endif %}"
# common
ca_certificates:
testca: "{{ lookup('file', 'tests/data/x509/ca.cert.pem') }}"
# backup_client (backup username should end in -j64/-s64 for Jessie/Stretch.
enable_backup: true
backup_client_username: "bak-parameters-optional-{{ ansible_distribution_release[0] }}64"
backup_encryption_key: "{{ lookup('file', 'tests/data/gnupg/parameters-optional.asc') }}"
backup_server: ldap-server
backup_server_host_ssh_public_keys:
- "{{ lookup('file', 'tests/data/ssh/server_dsa.pub') }}"
- "{{ lookup('file', 'tests/data/ssh/server_rsa.pub') }}"
- "{{ lookup('file', 'tests/data/ssh/server_ed25519.pub') }}"
- "{{ lookup('file', 'tests/data/ssh/server_ecdsa.pub') }}"
backup_ssh_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional' ) }}"
|