Files
@ 449e6423959c
Branch filter:
Location: majic-ansible-roles/roles/ldap_server/defaults/main.yml - annotation
449e6423959c
1010 B
text/x-yaml
MAR-151: Added support for Debian 10 Buster to xmpp_server role:
- Updated role reference documentaiton.
- Updated role meta information.
- Updated tests.
- Enable lower-level TLS protocols (1.0/1.1) in global OpenSSL
configuration file on Buster in order to be able to test the
xmpp_server_tls_protocol parameter (otherwise Prosody completely
refuses to use them even if listed in its configuration).
- Move stretch-specific tests into its own file (for backported
lua-ldap library), and run them on Debian 9 Stretch machines only.
- Updated role reference documentaiton.
- Updated role meta information.
- Updated tests.
- Enable lower-level TLS protocols (1.0/1.1) in global OpenSSL
configuration file on Buster in order to be able to test the
xmpp_server_tls_protocol parameter (otherwise Prosody completely
refuses to use them even if listed in its configuration).
- Move stretch-specific tests into its own file (for backported
lua-ldap library), and run them on Debian 9 Stretch machines only.
99edcba90842 99edcba90842 c082a26b62ff 99edcba90842 99edcba90842 99edcba90842 99edcba90842 99edcba90842 99edcba90842 9f804c9501da 9f804c9501da 99edcba90842 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 63d26c0b3d86 55dd00900508 63d26c0b3d86 430eb250e244 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 2e3af1a245a5 | ---
enable_backup: false
ldap_entries: []
# Internal value, base DN.
ldap_server_int_basedn: "{{ ldap_server_domain | regex_replace('\\.', ',dc=') | regex_replace('^', 'dc=') }}"
ldap_server_organization: "Private"
ldap_server_log_level: 256
ldap_server_ssf: 128
ldap_server_consumers: []
ldap_server_groups: []
ldap_permissions:
- >
to *
by dn.exact=gidNumber=0+uidNumber=0,cn=peercred,cn=external,cn=auth manage
by dn="cn=admin,{{ ldap_server_int_basedn }}" manage
by * break
- >
to attrs=userPassword,shadowLastChange
by self write
by anonymous auth
by * none
- >
to dn.base=""
by * read
- >
to *
by self write
by dn="cn=admin,{{ ldap_server_int_basedn }}" write
by users read
by * none
ldap_tls_ciphers: "NONE:\
+VERS-TLS1.2:\
+CTYPE-X509:\
+COMP-NULL:\
+SIGN-RSA-SHA256:\
+SIGN-RSA-SHA384:\
+SIGN-RSA-SHA512:\
+DHE-RSA:\
+ECDHE-RSA:\
+SHA256:\
+SHA384:\
+SHA512:\
+AEAD:\
+AES-128-GCM:\
+AES-256-GCM:\
+CHACHA20-POLY1305:\
+CURVE-ALL"
|