Files
@ 449e6423959c
Branch filter:
Location: majic-ansible-roles/roles/mail_server/molecule/default/host_vars/ldap-server.yml - annotation
449e6423959c
1.4 KiB
text/x-yaml
MAR-151: Added support for Debian 10 Buster to xmpp_server role:
- Updated role reference documentaiton.
- Updated role meta information.
- Updated tests.
- Enable lower-level TLS protocols (1.0/1.1) in global OpenSSL
configuration file on Buster in order to be able to test the
xmpp_server_tls_protocol parameter (otherwise Prosody completely
refuses to use them even if listed in its configuration).
- Move stretch-specific tests into its own file (for backported
lua-ldap library), and run them on Debian 9 Stretch machines only.
- Updated role reference documentaiton.
- Updated role meta information.
- Updated tests.
- Enable lower-level TLS protocols (1.0/1.1) in global OpenSSL
configuration file on Buster in order to be able to test the
xmpp_server_tls_protocol parameter (otherwise Prosody completely
refuses to use them even if listed in its configuration).
- Move stretch-specific tests into its own file (for backported
lua-ldap library), and run them on Debian 9 Stretch machines only.
b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 6844c0a01173 6844c0a01173 b0c92677ba93 b0c92677ba93 b0c92677ba93 6844c0a01173 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 5c5d8636f699 5c5d8636f699 5c5d8636f699 5c5d8636f699 7d9696a7b5cc 7d9696a7b5cc 7d9696a7b5cc 7d9696a7b5cc | ---
# ldap_server role
ldap_admin_password: admin
ldap_server_consumers:
- name: postfix
password: postfixpassword
- name: dovecot
password: dovecotpassword
state: present
ldap_server_domain: "local"
ldap_server_groups:
- name: mail
ldap_server_organization: "Example"
ldap_server_tls_certificate: "{{ lookup('file', 'tests/data/x509/server/ldap-server_ldap.cert.pem') }}"
ldap_server_tls_key: "{{ lookup('file', 'tests/data/x509/server/ldap-server_ldap.key.pem') }}"
# common
ca_certificates:
testca: "{{ lookup('file', 'tests/data/x509/ca/level1.cert.pem') }}"
# ldap_client
ldap_client_config:
- comment: CA truststore
option: TLS_CACERT
value: /etc/ssl/certs/testca.cert.pem
- comment: Ensure TLS is enforced
option: TLS_REQCERT
value: demand
- comment: Base DN
option: BASE
value: dc=local
- comment: URI
option: URI
value: ldapi:///
# backup_server role
backup_host_ssh_private_keys:
rsa: "{{ lookup('file', 'tests/data/ssh/server_rsa') }}"
ed25519: "{{ lookup('file', 'tests/data/ssh/server_ed25519') }}"
ecdsa: "{{ lookup('file', 'tests/data/ssh/server_ecdsa') }}"
backup_clients:
- server: parameters-optional-s64
ip: 10.31.127.33
public_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional.pub') }}"
- server: parameters-optional-b64
ip: 10.31.127.31
public_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional.pub') }}"
|