Files
@ a5d38f30094b
Branch filter:
Location: majic-ansible-roles/roles/mail_server/molecule/default/host_vars/ldap-server.yml - annotation
a5d38f30094b
1.4 KiB
text/x-yaml
MAR-132: Workarounds for wsgi_website Python virtual environment in Debian Stretch:
- Manually install setuptools in Python virtual environment on Debian
Stretch, otherwise the pkg-resources==0.0.0 package will mess with
pip freeze etc.
- Add back installation of futures package, even on Python 3 (since it
does not cause any harm).
- A small cleanup of how requirements are treated will be done in
separate ticket.
- Manually install setuptools in Python virtual environment on Debian
Stretch, otherwise the pkg-resources==0.0.0 package will mess with
pip freeze etc.
- Add back installation of futures package, even on Python 3 (since it
does not cause any harm).
- A small cleanup of how requirements are treated will be done in
separate ticket.
b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 b0c92677ba93 5c5d8636f699 b0c92677ba93 b0c92677ba93 b0c92677ba93 5c5d8636f699 5c5d8636f699 5c5d8636f699 5c5d8636f699 | ---
# ldap_server role
ldap_admin_password: admin
ldap_server_consumers:
- name: postfix
password: postfixpassword
- name: dovecot
password: dovecotpassword
state: present
ldap_server_domain: "local"
ldap_server_groups:
- name: mail
ldap_server_organization: "Example"
ldap_server_tls_certificate: "{{ lookup('file', 'tests/data/x509/ldap-server_ldap.cert.pem') }}"
ldap_server_tls_key: "{{ lookup('file', 'tests/data/x509/ldap-server_ldap.key.pem') }}"
# common
ca_certificates:
testca: "{{ lookup('file', 'tests/data/x509/ca.cert.pem') }}"
# ldap_client
ldap_client_config:
- comment: CA truststore
option: TLS_CACERT
value: /etc/ssl/certs/testca.cert.pem
- comment: Ensure TLS is enforced
option: TLS_REQCERT
value: demand
- comment: Base DN
option: BASE
value: dc=local
- comment: URI
option: URI
value: ldapi:///
# backup_server role
backup_host_ssh_private_keys:
dsa: "{{ lookup('file', 'tests/data/ssh/server_dsa') }}"
rsa: "{{ lookup('file', 'tests/data/ssh/server_rsa') }}"
ed25519: "{{ lookup('file', 'tests/data/ssh/server_ed25519') }}"
ecdsa: "{{ lookup('file', 'tests/data/ssh/server_ecdsa') }}"
backup_clients:
- server: parameters-optional-j64
ip: 10.31.127.31
public_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional.pub') }}"
- server: parameters-optional-s64
ip: 10.31.127.33
public_key: "{{ lookup('file', 'tests/data/ssh/parameters-optional.pub') }}"
|