Преглед на файлове

Merge remote-tracking branch 'upstream/master' into 626-configure-dovecot-to-move-spam-to-junk-folder

Pavel Karoukin преди 8 години
родител
ревизия
eda3dba013

+ 9
- 0
roles/mailserver/files/etc_dovecot_conf.d_90-antispam.conf Целия файл

1
+plugin {
2
+    antispam_backend = pipe
3
+    antispam_spam    = Junk
4
+    antispam_trash   = Trash
5
+    antispam_mail_sendmail = /usr/bin/rspamc
6
+    antispam_mail_spam     = learn_spam
7
+    antispam_mail_notspam  = learn_ham
8
+    antispam_mail_sendmail_args = -h;localhost:11334;-P;q1
9
+}

+ 1
- 0
roles/mailserver/tasks/dovecot.yml Целия файл

43
     - 10-mail.conf
43
     - 10-mail.conf
44
     - 10-master.conf
44
     - 10-master.conf
45
     - 90-sieve.conf
45
     - 90-sieve.conf
46
+    - 90-antispam.conf
46
     - auth-sql.conf.ext
47
     - auth-sql.conf.ext
47
   notify: restart dovecot
48
   notify: restart dovecot
48
 
49
 

+ 2
- 2
roles/mailserver/tasks/opendkim.yml Целия файл

14
 
14
 
15
 - name: Create OpenDKIM key directories
15
 - name: Create OpenDKIM key directories
16
   file: state=directory path=/etc/opendkim/keys/{{ item.name }} group=opendkim owner=opendkim
16
   file: state=directory path=/etc/opendkim/keys/{{ item.name }} group=opendkim owner=opendkim
17
-  with_items: mail_virtual_domains
17
+  with_items: "{{ mail_virtual_domains }}"
18
 
18
 
19
 - name: Generate OpenDKIM keys
19
 - name: Generate OpenDKIM keys
20
   command: opendkim-genkey -r -d {{ item.name }} -D /etc/opendkim/keys/{{ item.name }}/ creates=/etc/opendkim/keys/{{ item.name }}/default.private
20
   command: opendkim-genkey -r -d {{ item.name }} -D /etc/opendkim/keys/{{ item.name }}/ creates=/etc/opendkim/keys/{{ item.name }}/default.private
21
-  with_items: mail_virtual_domains
21
+  with_items: "{{ mail_virtual_domains }}"
22
 
22
 
23
 - name: Put opendkim.conf into place
23
 - name: Put opendkim.conf into place
24
   copy: src=etc_opendkim.conf dest=/etc/opendkim.conf owner=opendkim group=opendkim
24
   copy: src=etc_opendkim.conf dest=/etc/opendkim.conf owner=opendkim group=opendkim

+ 1
- 1
roles/news/defaults/main.yml Целия файл

6
 selfoss_db_username: selfoss
6
 selfoss_db_username: selfoss
7
 selfoss_db_password: "{{ lookup('password', secret + '/' + 'selfoss_db_password', length=32) }}"
7
 selfoss_db_password: "{{ lookup('password', secret + '/' + 'selfoss_db_password', length=32) }}"
8
 selfoss_db_database: selfoss
8
 selfoss_db_database: selfoss
9
-selfoss_version: 2.15
9
+selfoss_version: 2.16
10
 
10
 
11
 selfoss_username: "{{ main_user_name }}"
11
 selfoss_username: "{{ main_user_name }}"
12
 # this is the sha512 hash of the desired password
12
 # this is the sha512 hash of the desired password

+ 4
- 0
roles/owncloud/tasks/owncloud.yml Целия файл

43
   template: src=etc_apache2_sites-available_owncloud.j2 dest=/etc/apache2/sites-available/owncloud.conf group=root
43
   template: src=etc_apache2_sites-available_owncloud.j2 dest=/etc/apache2/sites-available/owncloud.conf group=root
44
   notify: restart apache
44
   notify: restart apache
45
 
45
 
46
+- name: Enable ownCloud site
47
+  command: a2ensite owncloud.conf creates=/etc/apache2/sites-enabled/owncloud.conf
48
+  notify: restart apache
49
+
46
 - name: Install ownCloud cronjob
50
 - name: Install ownCloud cronjob
47
   cron: name="ownCloud" user="www-data" minute="*/5" job="php -f /var/www/owncloud/cron.php > /dev/null"
51
   cron: name="ownCloud" user="www-data" minute="*/5" job="php -f /var/www/owncloud/cron.php > /dev/null"

+ 9
- 9
roles/vpn/tasks/openvpn.yml Целия файл

21
 
21
 
22
 - name: Create directories for clients
22
 - name: Create directories for clients
23
   file: path={{ openvpn_path}}/{{ item }} state=directory
23
   file: path={{ openvpn_path}}/{{ item }} state=directory
24
-  with_items: openvpn_clients
24
+  with_items: "{{ openvpn_clients }}"
25
 
25
 
26
 - name: Generate RSA keys for the clients
26
 - name: Generate RSA keys for the clients
27
   command: openssl genrsa -out client.key {{ openvpn_key_size }}
27
   command: openssl genrsa -out client.key {{ openvpn_key_size }}
28
            chdir={{ openvpn_path }}/{{ item }}
28
            chdir={{ openvpn_path }}/{{ item }}
29
            creates=client.key
29
            creates=client.key
30
-  with_items: openvpn_clients
30
+  with_items: "{{ openvpn_clients }}"
31
 
31
 
32
 - name: Set the proper permissions on all RSA keys
32
 - name: Set the proper permissions on all RSA keys
33
   file: path={{ openvpn_path }}
33
   file: path={{ openvpn_path }}
73
   command: openssl req -new -key client.key -out client.csr -subj "{{ openssl_request_subject }}/CN={{ item }}"
73
   command: openssl req -new -key client.key -out client.csr -subj "{{ openssl_request_subject }}/CN={{ item }}"
74
            chdir={{ openvpn_path }}/{{ item }}
74
            chdir={{ openvpn_path }}/{{ item }}
75
            creates=client.csr
75
            creates=client.csr
76
-  with_items: openvpn_clients
76
+  with_items: "{{ openvpn_clients }}"
77
 
77
 
78
 - name: Generate certificates for the clients
78
 - name: Generate certificates for the clients
79
   command: openssl x509 -CA {{ openvpn_ca }}.crt -CAkey {{ openvpn_ca }}.key -CAcreateserial -req -days {{ openvpn_days_valid }} -in client.csr -out client.crt
79
   command: openssl x509 -CA {{ openvpn_ca }}.crt -CAkey {{ openvpn_ca }}.key -CAcreateserial -req -days {{ openvpn_days_valid }} -in client.csr -out client.crt
80
            chdir={{ openvpn_path }}/{{ item }}
80
            chdir={{ openvpn_path }}/{{ item }}
81
            creates=client.crt
81
            creates=client.crt
82
-  with_items: openvpn_clients
82
+  with_items: "{{ openvpn_clients }}"
83
 
83
 
84
 - name: Generate HMAC firewall key
84
 - name: Generate HMAC firewall key
85
   command: openvpn --genkey --secret {{ openvpn_hmac_firewall }}
85
   command: openvpn --genkey --secret {{ openvpn_hmac_firewall }}
93
 - name: Register client certificate contents
93
 - name: Register client certificate contents
94
   command: cat client.crt
94
   command: cat client.crt
95
            chdir={{ openvpn_path }}/{{ item }}
95
            chdir={{ openvpn_path }}/{{ item }}
96
-  with_items: openvpn_clients
96
+  with_items: "{{ openvpn_clients }}"
97
   register: openvpn_client_certificates
97
   register: openvpn_client_certificates
98
 
98
 
99
 - name: Register client key contents
99
 - name: Register client key contents
100
   command: cat client.key
100
   command: cat client.key
101
            chdir={{ openvpn_path }}/{{ item }}
101
            chdir={{ openvpn_path }}/{{ item }}
102
-  with_items: openvpn_clients
102
+  with_items: "{{ openvpn_clients }}"
103
   register: openvpn_client_keys
103
   register: openvpn_client_keys
104
 
104
 
105
 - name: Register HMAC firewall contents
105
 - name: Register HMAC firewall contents
111
   template: src=client.cnf.j2
111
   template: src=client.cnf.j2
112
             dest={{ openvpn_path }}/{{ item[0] }}/{{ openvpn_server }}.ovpn
112
             dest={{ openvpn_path }}/{{ item[0] }}/{{ openvpn_server }}.ovpn
113
   with_together:
113
   with_together:
114
-    - openvpn_clients
115
-    - openvpn_client_certificates.results
116
-    - openvpn_client_keys.results
114
+    - "{{ openvpn_clients }}"
115
+    - "{{ openvpn_client_certificates.results }}"
116
+    - "{{ openvpn_client_keys.results }}"
117
 
117
 
118
 - name: Generate Diffie-Hellman parameters (this will take a while)
118
 - name: Generate Diffie-Hellman parameters (this will take a while)
119
   command: openssl dhparam -out {{ openvpn_dhparam }} {{ openvpn_key_size }}
119
   command: openssl dhparam -out {{ openvpn_dhparam }} {{ openvpn_key_size }}

+ 1
- 1
roles/xmpp/tasks/prosody.yml Целия файл

28
 
28
 
29
 - name: Create Prosody accounts
29
 - name: Create Prosody accounts
30
   command: prosodyctl register {{ item.name }} {{ prosody_virtual_domain }} "{{ item.password }}"
30
   command: prosodyctl register {{ item.name }} {{ prosody_virtual_domain }} "{{ item.password }}"
31
-  with_items: prosody_accounts
31
+  with_items: "{{ prosody_accounts }}"
32
 
32
 
33
 - name: Set firewall rules for Prosody
33
 - name: Set firewall rules for Prosody
34
   ufw: rule=allow port={{ item }} proto=tcp
34
   ufw: rule=allow port={{ item }} proto=tcp

Loading…
Отказ
Запис