Files
@ 3e6eaaff335e
Branch filter:
Location: majic-ansible-roles/roles/xmpp_server/molecule/default/host_vars/ldap-server.yml - annotation
3e6eaaff335e
1.2 KiB
text/x-yaml
MAR-218: Update filter syntax for checking IPv4/IPv6 addreses.
2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 87f4f8572370 87f4f8572370 2ada86e90026 2ada86e90026 2ada86e90026 87f4f8572370 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 2ada86e90026 c1abe824342c c1abe824342c c1abe824342c | ---
# ldap_server role.
ldap_admin_password: admin
ldap_server_consumers:
- name: prosody
password: prosodypassword
ldap_server_domain: "local"
ldap_server_groups:
- name: xmpp
ldap_server_organization: "Example"
ldap_server_tls_certificate: "{{ lookup('file', 'tests/data/x509/server/ldap-server_ldap.cert.pem') }}"
ldap_server_tls_key: "{{ lookup('file', 'tests/data/x509/server/ldap-server_ldap.key.pem') }}"
# common
ca_certificates:
testca: "{{ lookup('file', 'tests/data/x509/ca/level1.cert.pem') }}"
# ldap_client
ldap_client_config:
- comment: CA truststore
option: TLS_CACERT
value: /etc/ssl/certs/testca.cert.pem
- comment: Ensure TLS is enforced
option: TLS_REQCERT
value: demand
- comment: Base DN
option: BASE
value: dc=local
- comment: URI
option: URI
value: ldapi:///
# backup_server role.
backup_host_ssh_private_keys:
rsa: "{{ lookup('file', 'tests/data/ssh/server_rsa') }}"
ed25519: "{{ lookup('file', 'tests/data/ssh/server_ed25519') }}"
ecdsa: "{{ lookup('file', 'tests/data/ssh/server_ecdsa') }}"
backup_clients:
- server: parameters-optional-bookworm
ip: 192.168.56.32
public_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional.pub') }}"
|