You've already forked ansible-role-bind9
Compare commits
72 Commits
71c4e61fe8
...
0.1.2
| Author | SHA1 | Date | |
|---|---|---|---|
|
20b27e1e6b
|
|||
| d8a04d3f1b | |||
|
b6a5d1c924
|
|||
| d0ed854384 | |||
|
7e139fc571
|
|||
| c0e254bd94 | |||
|
2cbd5d82a1
|
|||
| 4f727a2bc9 | |||
|
ce76a15b09
|
|||
|
827e96463f
|
|||
|
f3cbc1d81b
|
|||
|
b50fd28d22
|
|||
|
63ff0433ff
|
|||
|
5939225733
|
|||
| 974a128275 | |||
|
35e10931a4
|
|||
|
670820009c
|
|||
|
d38b75dae5
|
|||
|
73f0d2b6bf
|
|||
|
9321ee64a5
|
|||
|
4117cbda9a
|
|||
|
0e6ad65746
|
|||
|
36d8257cd2
|
|||
|
220d23790a
|
|||
|
aa33cf1f5c
|
|||
|
9b70a69a9a
|
|||
|
5b9064cd65
|
|||
|
8458f49975
|
|||
|
ab0f34f217
|
|||
|
85ee72fe17
|
|||
|
261cd45400
|
|||
|
3ed4cc4862
|
|||
| 497d261e70 | |||
|
345a8d3075
|
|||
|
20bf0a7f9b
|
|||
|
5bb333929b
|
|||
|
ead1284611
|
|||
|
0a689b2e93
|
|||
|
7083f5e711
|
|||
|
5bd3aab57b
|
|||
| 7b7a1b05bc | |||
|
a2ff838c84
|
|||
|
b756b319dc
|
|||
| b77e30e319 | |||
| be4b20f584 | |||
| d6cfc50ce3 | |||
| 19e6e3a5a0 | |||
|
38b4533838
|
|||
| 90bdec9e98 | |||
|
f8370dc77b
|
|||
|
6607a726b7
|
|||
|
b2c61884ec
|
|||
|
55c3ccae08
|
|||
|
4ef83cee22
|
|||
|
b35ba22a6d
|
|||
|
66f7e70f48
|
|||
|
f9958f7cac
|
|||
|
1356dd6824
|
|||
|
6b8b178405
|
|||
|
b7cba859e2
|
|||
|
937b6c85de
|
|||
|
d0db9e6944
|
|||
| c19f3c9db4 | |||
|
015463f33a
|
|||
| b50e939de5 | |||
| d16492d892 | |||
|
63aa5de50d
|
|||
| 6bf4cef2d3 | |||
|
271c874529
|
|||
|
0ecda4e57b
|
|||
|
a96e09792c
|
|||
|
6f0e1d5134
|
@@ -1,3 +1,4 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
skip_list: []
|
exclude_paths:
|
||||||
|
- .gitea/
|
||||||
|
|||||||
94
.drone.yml
94
.drone.yml
@@ -1,94 +0,0 @@
|
|||||||
---
|
|
||||||
kind: pipeline
|
|
||||||
type: kubernetes
|
|
||||||
name: linter
|
|
||||||
|
|
||||||
platform:
|
|
||||||
os: linux
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: markdown lint
|
|
||||||
commands:
|
|
||||||
- markdownlint *.md
|
|
||||||
image: docker.io/volkerraschek/markdownlint:0.31.1
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
cpu: 50
|
|
||||||
memory: 50M
|
|
||||||
|
|
||||||
- name: email-notification
|
|
||||||
environment:
|
|
||||||
PLUGIN_HOST:
|
|
||||||
from_secret: smtp_host
|
|
||||||
PLUGIN_USERNAME:
|
|
||||||
from_secret: smtp_username
|
|
||||||
PLUGIN_PASSWORD:
|
|
||||||
from_secret: smtp_password
|
|
||||||
PLUGIN_FROM:
|
|
||||||
from_secret: smtp_mail_address
|
|
||||||
image: docker.io/drillster/drone-email:latest
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
cpu: 50
|
|
||||||
memory: 25M
|
|
||||||
when:
|
|
||||||
status:
|
|
||||||
- changed
|
|
||||||
- failure
|
|
||||||
|
|
||||||
trigger:
|
|
||||||
event:
|
|
||||||
exclude:
|
|
||||||
- tag
|
|
||||||
|
|
||||||
---
|
|
||||||
kind: pipeline
|
|
||||||
type: kubernetes
|
|
||||||
name: sync
|
|
||||||
|
|
||||||
platform:
|
|
||||||
os: linux
|
|
||||||
arch: amd64
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: github
|
|
||||||
image: docker.io/appleboy/drone-git-push:latest
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
cpu: 50
|
|
||||||
memory: 25M
|
|
||||||
settings:
|
|
||||||
branch: master
|
|
||||||
remote: ssh://git@github.com/volker-raschek/bind9-role.git
|
|
||||||
force: true
|
|
||||||
ssh_key:
|
|
||||||
from_secret: ssh_key
|
|
||||||
|
|
||||||
- name: email-notification
|
|
||||||
environment:
|
|
||||||
PLUGIN_HOST:
|
|
||||||
from_secret: smtp_host
|
|
||||||
PLUGIN_USERNAME:
|
|
||||||
from_secret: smtp_username
|
|
||||||
PLUGIN_PASSWORD:
|
|
||||||
from_secret: smtp_password
|
|
||||||
PLUGIN_FROM:
|
|
||||||
from_secret: smtp_mail_address
|
|
||||||
image: docker.io/drillster/drone-email:latest
|
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
cpu: 50
|
|
||||||
memory: 25M
|
|
||||||
when:
|
|
||||||
status:
|
|
||||||
- changed
|
|
||||||
- failure
|
|
||||||
|
|
||||||
trigger:
|
|
||||||
branch:
|
|
||||||
- master
|
|
||||||
event:
|
|
||||||
- cron
|
|
||||||
- push
|
|
||||||
repo:
|
|
||||||
- volker.raschek/bind9-role
|
|
||||||
20
.gitea/workflows/ansible-linters.yaml
Normal file
20
.gitea/workflows/ansible-linters.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
name: Ansible Linter
|
||||||
|
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
types: [ "opened", "reopened", "synchronize" ]
|
||||||
|
push:
|
||||||
|
branches: [ '**' ]
|
||||||
|
tags-ignore: [ '**' ]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
ansible-lint:
|
||||||
|
runs-on:
|
||||||
|
- ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4
|
||||||
|
- name: Run ansible-lint
|
||||||
|
uses: ansible/ansible-lint@v25.8.2
|
||||||
|
with:
|
||||||
|
args: "--config-file .ansible-lint"
|
||||||
|
setup_python: "true"
|
||||||
18
.gitea/workflows/markdown-linters.yaml
Normal file
18
.gitea/workflows/markdown-linters.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
name: Lint Markdown files
|
||||||
|
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
types: [ "opened", "reopened", "synchronize" ]
|
||||||
|
push:
|
||||||
|
branches: [ '**' ]
|
||||||
|
tags-ignore: [ '**' ]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
markdown-lint:
|
||||||
|
runs-on:
|
||||||
|
- ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v4.3.0
|
||||||
|
- uses: DavidAnson/markdownlint-cli2-action@v20.0.0
|
||||||
|
with:
|
||||||
|
globs: '**/*.md'
|
||||||
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
.ansible
|
||||||
@@ -45,19 +45,17 @@ MD012:
|
|||||||
# MD013/line-length - Line length
|
# MD013/line-length - Line length
|
||||||
MD013:
|
MD013:
|
||||||
# Number of characters
|
# Number of characters
|
||||||
line_length: 80
|
line_length: 120
|
||||||
# Number of characters for headings
|
# Number of characters for headings
|
||||||
heading_line_length: 80
|
heading_line_length: 120
|
||||||
# Number of characters for code blocks
|
# Number of characters for code blocks
|
||||||
code_block_line_length: 80
|
code_block_line_length: 120
|
||||||
# Include code blocks
|
# Include code blocks
|
||||||
code_blocks: false
|
code_blocks: false
|
||||||
# Include tables
|
# Include tables
|
||||||
tables: false
|
tables: false
|
||||||
# Include headings
|
# Include headings
|
||||||
headings: true
|
headings: true
|
||||||
# Include headings
|
|
||||||
headers: true
|
|
||||||
# Strict length checking
|
# Strict length checking
|
||||||
strict: false
|
strict: false
|
||||||
# Stern length checking
|
# Stern length checking
|
||||||
@@ -70,11 +68,6 @@ MD022:
|
|||||||
# Blank lines below heading
|
# Blank lines below heading
|
||||||
lines_below: 1
|
lines_below: 1
|
||||||
|
|
||||||
# MD024/no-duplicate-heading/no-duplicate-header - Multiple headings with the same content
|
|
||||||
MD024:
|
|
||||||
# Only check sibling headings
|
|
||||||
allow_different_nesting: true
|
|
||||||
|
|
||||||
# MD025/single-title/single-h1 - Multiple top-level headings in the same document
|
# MD025/single-title/single-h1 - Multiple top-level headings in the same document
|
||||||
MD025:
|
MD025:
|
||||||
# Heading level
|
# Heading level
|
||||||
|
|||||||
17
.yamllint.yaml
Normal file
17
.yamllint.yaml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
#
|
||||||
|
# Documentation:
|
||||||
|
# https://yamllint.readthedocs.io/en/stable/
|
||||||
|
#
|
||||||
|
|
||||||
|
rules:
|
||||||
|
brackets:
|
||||||
|
forbid: false
|
||||||
|
min-spaces-inside: 0
|
||||||
|
max-spaces-inside: 2
|
||||||
|
min-spaces-inside-empty: 0
|
||||||
|
max-spaces-inside-empty: 0
|
||||||
|
indentation:
|
||||||
|
spaces: 2
|
||||||
|
indent-sequences: false
|
||||||
|
line-length:
|
||||||
|
max: 360
|
||||||
@@ -1,14 +1,13 @@
|
|||||||
# bind9-role
|
# bind9-role
|
||||||
|
|
||||||
[](https://drone.cryptic.systems/volker.raschek/bind9-role)
|
[](https://galaxy.ansible.com/volker_raschek/bind9)
|
||||||
[](https://galaxy.ansible.com/volker_raschek/bind9_role)
|
|
||||||
|
|
||||||
With following role can be bind installed and configured.
|
With following role can be bind installed and configured.
|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
```bash
|
```bash
|
||||||
ansible-galaxy install volker_raschek.bind9_role
|
ansible-galaxy install volker_raschek.bind9
|
||||||
```
|
```
|
||||||
|
|
||||||
## Supported distributions
|
## Supported distributions
|
||||||
|
|||||||
@@ -1,10 +1,18 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
bind9_acls:
|
bind9_acls:
|
||||||
- name: internalnets
|
- name: "internalnets"
|
||||||
permissions: []
|
permissions: []
|
||||||
# - "111.222.111.222"
|
# - "111.222.111.222"
|
||||||
|
|
||||||
|
bind9_controls: []
|
||||||
|
# - acls:
|
||||||
|
# - localhost
|
||||||
|
# inet: "127.0.0.1"
|
||||||
|
# port: "953"
|
||||||
|
# tsig_keys:
|
||||||
|
# - rndc
|
||||||
|
|
||||||
bind9_logging:
|
bind9_logging:
|
||||||
categories:
|
categories:
|
||||||
- name: "security"
|
- name: "security"
|
||||||
@@ -33,17 +41,27 @@ bind9_options:
|
|||||||
allow_update_forwarding: []
|
allow_update_forwarding: []
|
||||||
auth_nxdomain: false
|
auth_nxdomain: false
|
||||||
blackhole: []
|
blackhole: []
|
||||||
dnssec_validations: true
|
dnssec_accept_expired: false
|
||||||
|
dnssec_validation: "auto"
|
||||||
forwarders:
|
forwarders:
|
||||||
- "8.8.8.8" # Google IPv4
|
- ip: "8.8.8.8" # Google IPv4
|
||||||
- "8.8.4.4" # Google IPv4
|
port: "53"
|
||||||
- "2001:4860:4860::8888" # Google IPv6
|
- ip: "8.8.4.4" # Google IPv4
|
||||||
- "2001:4860:4860::8844" # Google IPv6
|
port: "53"
|
||||||
- "208.67.222.222" # OpenDNS IPv4
|
- ip: "2001:4860:4860::8888" # Google IPv6
|
||||||
- "208.67.220.220" # OpenDNS IPv4
|
port: "53"
|
||||||
- "2620:0:ccc::2" # OpenDNS IPv6
|
- ip: "2001:4860:4860::8844" # Google IPv6
|
||||||
- "2620:0:ccd::2" # OpenDNS IPv6
|
port: "53"
|
||||||
|
- ip: "208.67.222.222" # OpenDNS IPv4
|
||||||
|
port: "53"
|
||||||
|
- ip: "208.67.220.220" # OpenDNS IPv4
|
||||||
|
port: "53"
|
||||||
|
- ip: "2620:0:ccc::2" # OpenDNS IPv6
|
||||||
|
port: "53"
|
||||||
|
- ip: "2620:0:ccd::2" # OpenDNS IPv6
|
||||||
|
port: "53"
|
||||||
interface_interval: 0
|
interface_interval: 0
|
||||||
|
key_directory: "/var/named/dnssec-keys"
|
||||||
listen_on_ipv4:
|
listen_on_ipv4:
|
||||||
- "127.0.0.1"
|
- "127.0.0.1"
|
||||||
listen_on_ipv6:
|
listen_on_ipv6:
|
||||||
@@ -52,20 +70,60 @@ bind9_options:
|
|||||||
minimal_responses: "no"
|
minimal_responses: "no"
|
||||||
notify: "yes"
|
notify: "yes"
|
||||||
recursion: "yes"
|
recursion: "yes"
|
||||||
|
update_policies: []
|
||||||
|
# - action: grant
|
||||||
|
# identity: keyname
|
||||||
|
# ruletype: name
|
||||||
|
# name: _acme-challenge.example.com.
|
||||||
|
# types:
|
||||||
|
# - TXT
|
||||||
|
|
||||||
transfer_format: "many-answers"
|
transfer_format: "many-answers"
|
||||||
|
|
||||||
|
bind9_rndc_key:
|
||||||
|
name: ""
|
||||||
|
algorithm: ""
|
||||||
|
secret: ""
|
||||||
|
|
||||||
|
bind9_dnssec_keys: []
|
||||||
|
# - origin: "hellenthal.cryptic.systems"
|
||||||
|
# key_signing_key:
|
||||||
|
# private:
|
||||||
|
# filename: "{{ bind9_options.key_directory }}/example.com.private"
|
||||||
|
# content: "private key"
|
||||||
|
# public:
|
||||||
|
# filename: "{{ bind9_options.key_directory }}/example.com.private"
|
||||||
|
# content: "public key"
|
||||||
|
# zone_signing_key:
|
||||||
|
# private:
|
||||||
|
# filename: "{{ bind9_options.key_directory }}/example.com.private"
|
||||||
|
# content: "private key"
|
||||||
|
# public:
|
||||||
|
# filename: "{{ bind9_options.key_directory }}/example.com.private"
|
||||||
|
# content: "public key"
|
||||||
|
|
||||||
|
bind9_statics:
|
||||||
|
enabled: true
|
||||||
|
channels:
|
||||||
|
- inet: "127.0.0.1"
|
||||||
|
port: "8053"
|
||||||
|
acls:
|
||||||
|
- "localhost"
|
||||||
|
|
||||||
|
|
||||||
bind9_tsigkeys: []
|
bind9_tsigkeys: []
|
||||||
# - name: "name"
|
# - name: "name"
|
||||||
# algorithm: "algorithm"
|
# algorithm: "algorithm"
|
||||||
# secret: "secret"
|
# secret: "secret"
|
||||||
|
|
||||||
bind9_views: []
|
bind9_views: []
|
||||||
# - name: external
|
# - name: "external"
|
||||||
# match_clients:
|
# match_clients:
|
||||||
# - "!internalnets"
|
# - "!internalnets"
|
||||||
# - "any"
|
# - "any"
|
||||||
# zones:
|
# zones:
|
||||||
# - allow_notify: []
|
# - config:
|
||||||
|
# allow_notify: []
|
||||||
# allow_query:
|
# allow_query:
|
||||||
# - "any"
|
# - "any"
|
||||||
# allow_query_on: []
|
# allow_query_on: []
|
||||||
@@ -75,13 +133,16 @@ bind9_views: []
|
|||||||
# file: zones/external/db.local.example
|
# file: zones/external/db.local.example
|
||||||
# origin: "example.local."
|
# origin: "example.local."
|
||||||
# type: master
|
# type: master
|
||||||
# - name: internal
|
# notify: true
|
||||||
|
# file: zones/external/db.local.example
|
||||||
|
# - name: "internal"
|
||||||
# match_clients:
|
# match_clients:
|
||||||
# - "!192.168.178.1"
|
# - "!192.168.178.1"
|
||||||
# - "internalnets"
|
# - "internalnets"
|
||||||
# - "127.0.0.0/8"
|
# - "127.0.0.0/8"
|
||||||
# zones:
|
# zones:
|
||||||
# - allow_notify: []
|
# - config:
|
||||||
|
# allow_notify: []
|
||||||
# allow_query:
|
# allow_query:
|
||||||
# - "any"
|
# - "any"
|
||||||
# allow_query_on: []
|
# allow_query_on: []
|
||||||
@@ -91,3 +152,17 @@ bind9_views: []
|
|||||||
# file: zones/internal/db.local.example
|
# file: zones/internal/db.local.example
|
||||||
# origin: "example.local."
|
# origin: "example.local."
|
||||||
# type: master
|
# type: master
|
||||||
|
# file: zones/internal/db.local.example
|
||||||
|
# - config:
|
||||||
|
# allow_notify: []
|
||||||
|
# allow_query: []
|
||||||
|
# allow_query_on: []
|
||||||
|
# allow_update: []
|
||||||
|
# allow_update_forwarding: []
|
||||||
|
# allow_transfer: []
|
||||||
|
# forward: only
|
||||||
|
# forwarders:
|
||||||
|
# - 192.168.175.1
|
||||||
|
# origin: "gitlab-runner.external.local"
|
||||||
|
# type: forward
|
||||||
|
# file: "gitlab-runner.external.local"
|
||||||
|
|||||||
@@ -1,7 +1,7 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
- name: restart named
|
- name: Restart named
|
||||||
systemd:
|
ansible.builtin.systemd:
|
||||||
name: "{{ bind_service_name }}"
|
name: "{{ bind_service_name }}"
|
||||||
state: restarted
|
state: restarted
|
||||||
daemon_reload: true
|
daemon_reload: true
|
||||||
|
|||||||
@@ -1,24 +1,26 @@
|
|||||||
|
dependencies: []
|
||||||
galaxy_info:
|
galaxy_info:
|
||||||
role_name: bind9
|
|
||||||
author: Markus Pesch
|
author: Markus Pesch
|
||||||
description: Role to install and configure bind9 on different distributions
|
|
||||||
company: Cryptic Systems
|
company: Cryptic Systems
|
||||||
|
description: Role to install and configure bind9 on different distributions
|
||||||
|
galaxy_tags:
|
||||||
|
- named
|
||||||
|
- bind
|
||||||
|
- dyndns
|
||||||
license: MIT
|
license: MIT
|
||||||
min_ansible_version: "2.9"
|
min_ansible_version: "2.9"
|
||||||
|
namespace: volker-raschek
|
||||||
platforms:
|
platforms:
|
||||||
- name: ArchLinux
|
- name: ArchLinux
|
||||||
versions:
|
versions:
|
||||||
- all
|
- all
|
||||||
- name: Ubuntu
|
|
||||||
versions:
|
|
||||||
- all
|
|
||||||
- name: EL
|
- name: EL
|
||||||
versions:
|
versions:
|
||||||
- all
|
- all
|
||||||
|
- name: Fedora
|
||||||
galaxy_tags:
|
versions:
|
||||||
- named
|
- all
|
||||||
- bind
|
- name: Ubuntu
|
||||||
- dyndns
|
versions:
|
||||||
|
- all
|
||||||
dependencies: []
|
role_name: bind9
|
||||||
|
|||||||
@@ -1,17 +1,9 @@
|
|||||||
{
|
{
|
||||||
"$schema": "https://docs.renovatebot.com/renovate-schema.json",
|
"$schema": "https://docs.renovatebot.com/renovate-schema.json",
|
||||||
"assignees": [ "volker.raschek" ],
|
"extends": [
|
||||||
"automergeStrategy": "merge-commit",
|
"local>volker.raschek/renovate-config:default#master",
|
||||||
"automergeType": "pr",
|
"local>volker.raschek/renovate-config:container#master",
|
||||||
"labels": [ "renovate" ],
|
"local>volker.raschek/renovate-config:actions#master",
|
||||||
"packageRules": [
|
"local>volker.raschek/renovate-config:regexp#master"
|
||||||
{
|
]
|
||||||
"addLabels": [ "renovate/droneci", "renovate/automerge" ],
|
|
||||||
"automerge": true,
|
|
||||||
"matchManagers": "droneci",
|
|
||||||
"matchUpdateTypes": [ "minor", "patch"]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"rebaseLabel": "renovate/rebase",
|
|
||||||
"rebaseWhen": "behind-base-branch"
|
|
||||||
}
|
}
|
||||||
25
tasks/create_dnssec_files.yml
Normal file
25
tasks/create_dnssec_files.yml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Create private DNSSEC: {{ bind9_dnssec_key.origin }}"
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ item.private.filename }}"
|
||||||
|
content: "{{ item.private.content }}"
|
||||||
|
owner: "{{ bind_unix_user }}"
|
||||||
|
group: "{{ bind_unix_group }}"
|
||||||
|
mode: "0600"
|
||||||
|
no_log: true
|
||||||
|
with_items:
|
||||||
|
- "{{ bind9_dnssec_key.key_signing_key }}"
|
||||||
|
- "{{ bind9_dnssec_key.zone_signing_key }}"
|
||||||
|
|
||||||
|
- name: "Create public DNSSEC: {{ bind9_dnssec_key.origin }}"
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ item.public.filename }}"
|
||||||
|
content: "{{ item.public.content }}"
|
||||||
|
owner: "{{ bind_unix_user }}"
|
||||||
|
group: "{{ bind_unix_group }}"
|
||||||
|
mode: "0644"
|
||||||
|
no_log: true
|
||||||
|
with_items:
|
||||||
|
- "{{ bind9_dnssec_key.key_signing_key }}"
|
||||||
|
- "{{ bind9_dnssec_key.zone_signing_key }}"
|
||||||
102
tasks/main.yml
102
tasks/main.yml
@@ -1,77 +1,110 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
- name: Include special distribution-dependent variables
|
- name: Include OS-specific variables
|
||||||
include_vars: "{{ ansible_os_family }}.yml"
|
ansible.builtin.include_vars: "{{ ansible_os_family }}.yml"
|
||||||
|
|
||||||
- name: Install bind and dependencies
|
- name: Install bind and dependencies
|
||||||
package:
|
ansible.builtin.package:
|
||||||
name: "{{ item }}"
|
name: "{{ item }}"
|
||||||
state: present
|
state: present
|
||||||
with_items: "{{ bind_package_names }}"
|
with_items: "{{ bind_package_names }}"
|
||||||
|
|
||||||
- name: Create logging directory
|
- name: Create logging directory
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ bind_log_directory }}"
|
path: "{{ bind_log_directory }}"
|
||||||
owner: "{{ bind_unix_user }}"
|
owner: "{{ bind_unix_user }}"
|
||||||
group: "{{ bind_unix_group }}"
|
group: "{{ bind_unix_group }}"
|
||||||
mode: 0755
|
mode: "0755"
|
||||||
state: directory
|
state: directory
|
||||||
recurse: yes
|
recurse: true
|
||||||
|
|
||||||
- name: Create config directory
|
- name: Create config directory
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ bind_config_directory }}"
|
path: "{{ bind_config_directory }}"
|
||||||
owner: "{{ bind_unix_user }}"
|
owner: "{{ bind_unix_user }}"
|
||||||
group: "{{ bind_unix_group }}"
|
group: "{{ bind_unix_group }}"
|
||||||
mode: 0755
|
mode: "0755"
|
||||||
state: directory
|
state: directory
|
||||||
recurse: yes
|
recurse: true
|
||||||
|
|
||||||
- name: Remove existing journal files
|
- name: Remove existing journal files
|
||||||
block:
|
block:
|
||||||
- name: find existing journal files
|
- name: Find existing journal files
|
||||||
find:
|
ansible.builtin.find:
|
||||||
path: "{{ bind_config_directory }}"
|
path: "{{ bind_config_directory }}"
|
||||||
recurse: yes
|
recurse: true
|
||||||
patterns: "*.jnl"
|
patterns: "*.jnl"
|
||||||
register: files_to_delete
|
register: files_to_delete
|
||||||
- name: delete existing journal files
|
- name: Delete existing journal files
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ item.path }}"
|
path: "{{ item.path }}"
|
||||||
state: absent
|
state: absent
|
||||||
with_items: "{{ files_to_delete.files }}"
|
with_items: "{{ files_to_delete.files }}"
|
||||||
|
|
||||||
|
- name: Remove existing signed zone files
|
||||||
|
block:
|
||||||
|
- name: Find existing signed zone files
|
||||||
|
ansible.builtin.find:
|
||||||
|
path: "{{ bind_config_directory }}"
|
||||||
|
recurse: true
|
||||||
|
patterns: "*.signed"
|
||||||
|
register: files_to_delete
|
||||||
|
- name: Delete existing signed zone files
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item.path }}"
|
||||||
|
state: absent
|
||||||
|
with_items: "{{ files_to_delete.files }}"
|
||||||
|
|
||||||
# - name: copy zone files
|
- name: Remove existing DNSSEC key directory
|
||||||
# include_tasks: copy_zone_files.yml
|
block:
|
||||||
# with_items:
|
- name: Check if DNSSEC key directory exists
|
||||||
# - "{{ bind9_views }}"
|
ansible.builtin.stat:
|
||||||
# loop_control:
|
path: "{{ bind9_options.key_directory }}"
|
||||||
# loop_var: view
|
register: _stat_bind9_options_key_directory
|
||||||
|
- name: Remove DNSSEC key directory
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ bind9_options.key_directory }}"
|
||||||
|
state: "absent"
|
||||||
|
when: _stat_bind9_options_key_directory.stat.exists
|
||||||
|
|
||||||
|
- name: Create DNSSEC key directory
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ bind9_options.key_directory }}"
|
||||||
|
owner: "{{ bind_unix_user }}"
|
||||||
|
group: "{{ bind_unix_group }}"
|
||||||
|
mode: "0700"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Create DNSSEC files
|
||||||
|
ansible.builtin.include_tasks: create_dnssec_files.yml
|
||||||
|
with_items: "{{ bind9_dnssec_keys }}"
|
||||||
|
no_log: true
|
||||||
|
loop_control:
|
||||||
|
loop_var: bind9_dnssec_key
|
||||||
|
|
||||||
- name: Create DNS-Zone files
|
- name: Create DNS-Zone files
|
||||||
include_tasks: template_zone_files.yml
|
ansible.builtin.include_tasks: template_zone_files.yml
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ bind9_views }}"
|
- "{{ bind9_views }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
loop_var: view
|
loop_var: view
|
||||||
|
|
||||||
- name: Create main configuration file
|
- name: Create main configuration file
|
||||||
template:
|
ansible.builtin.template:
|
||||||
src: "etc/named.conf.j2"
|
src: "etc/named.conf.j2"
|
||||||
dest: "{{ bind_main_config }}"
|
dest: "{{ bind_main_config }}"
|
||||||
owner: "{{ bind_unix_user }}"
|
owner: "{{ bind_unix_user }}"
|
||||||
group: "{{ bind_unix_group }}"
|
group: "{{ bind_unix_group }}"
|
||||||
mode: 0644
|
mode: "0644"
|
||||||
notify: restart named
|
notify: Restart named
|
||||||
|
|
||||||
- name: Create excluded configuration files
|
- name: Create excluded configuration files
|
||||||
template:
|
ansible.builtin.template:
|
||||||
src: "{{ item }}.j2"
|
src: "{{ item }}.j2"
|
||||||
dest: "{{ item | replace('etc/named', bind_config_directory) }}"
|
dest: "{{ item | replace('etc/named', bind_config_directory) }}"
|
||||||
owner: "{{ bind_unix_user }}"
|
owner: "{{ bind_unix_user }}"
|
||||||
group: "{{ bind_unix_group }}"
|
group: "{{ bind_unix_group }}"
|
||||||
mode: 0644
|
mode: "0644"
|
||||||
with_items:
|
with_items:
|
||||||
- etc/named.conf
|
- etc/named.conf
|
||||||
- etc/named/named.conf.acl
|
- etc/named/named.conf.acl
|
||||||
@@ -79,10 +112,21 @@
|
|||||||
- etc/named/named.conf.options
|
- etc/named/named.conf.options
|
||||||
- etc/named/named.conf.tsigkeys
|
- etc/named/named.conf.tsigkeys
|
||||||
- etc/named/named.conf.views
|
- etc/named/named.conf.views
|
||||||
notify: restart named
|
notify: Restart named
|
||||||
|
|
||||||
- name: Start and enabled named
|
- name: Start and enabled named
|
||||||
systemd:
|
ansible.builtin.systemd:
|
||||||
name: named
|
name: named
|
||||||
state: started
|
state: started
|
||||||
enabled: yes
|
enabled: true
|
||||||
|
|
||||||
|
- name: Create rndc.key
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rndc.key.j2
|
||||||
|
dest: /etc/rndc.key
|
||||||
|
owner: "{{ bind_unix_user }}"
|
||||||
|
group: "{{ bind_unix_group }}"
|
||||||
|
mode: "0600"
|
||||||
|
when: bind9_rndc_key.name | length > 0 and
|
||||||
|
bind9_rndc_key.algorithm | length > 0 and
|
||||||
|
bind9_rndc_key.secret | length > 0
|
||||||
|
|||||||
28
tasks/sign_zone_file.yml
Normal file
28
tasks/sign_zone_file.yml
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Sign DNS Zone {{ zone.config.origin }}"
|
||||||
|
vars:
|
||||||
|
dnssec_cmd:
|
||||||
|
- dnssec-signzone
|
||||||
|
- -N
|
||||||
|
- INCREMENT
|
||||||
|
- -S
|
||||||
|
- -K
|
||||||
|
- "{{ bind9_options.key_directory }}"
|
||||||
|
block:
|
||||||
|
- name: "Extend dnssec command of ORIGIN"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_dnssec_cmd: "{{ dnssec_cmd + ['-o', zone.config.origin] }}"
|
||||||
|
- name: "Extend dnssec command of zone file"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_dnssec_cmd: "{{ _dnssec_cmd + [bind_config_directory + '/' + zone.file] }}"
|
||||||
|
- name: "Sign zone {{ zone.config.origin }}"
|
||||||
|
ansible.builtin.command:
|
||||||
|
argv: "{{ _dnssec_cmd }}"
|
||||||
|
creates: "{{ bind_config_directory + '/' + zone.file }}.signed"
|
||||||
|
- name: Adapt signed zone file permissions
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ bind_config_directory + '/' + zone.file }}.signed"
|
||||||
|
owner: "{{ bind_unix_user }}"
|
||||||
|
group: "{{ bind_unix_group }}"
|
||||||
|
mode: "0644"
|
||||||
@@ -1,27 +1,48 @@
|
|||||||
---
|
---
|
||||||
|
|
||||||
- name: create directory for zone {{ zone.file | dirname }}
|
- name: "Create config directory of DNS zone {{ zone.config.origin }}"
|
||||||
file:
|
ansible.builtin.file:
|
||||||
path: "{{ bind_config_directory }}/{{ zone.file | dirname }}"
|
path: "{{ bind_config_directory }}/{{ zone.file | dirname }}"
|
||||||
owner: "{{ bind_unix_user }}"
|
owner: "{{ bind_unix_user }}"
|
||||||
group: "{{ bind_unix_group }}"
|
group: "{{ bind_unix_group }}"
|
||||||
mode: 0755
|
mode: "0755"
|
||||||
state: directory
|
state: directory
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ view.zones }}"
|
- "{{ view.zones }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
loop_var: zone
|
loop_var: zone
|
||||||
|
when: zone.file is defined and
|
||||||
|
zone.file | length > 0
|
||||||
|
|
||||||
- name: "template view {{ view.name }}"
|
- name: "Template view {{ view.name }}"
|
||||||
template:
|
ansible.builtin.template:
|
||||||
src: "{{ inventory_hostname }}/etc/named/{{ zone.file }}.j2"
|
src: "{{ inventory_hostname }}/etc/named/{{ zone.file }}.j2"
|
||||||
dest: "{{ bind_config_directory }}/{{ zone.file }}"
|
dest: "{{ bind_config_directory + '/' + zone.file }}"
|
||||||
owner: "{{ bind_unix_user }}"
|
owner: "{{ bind_unix_user }}"
|
||||||
group: "{{ bind_unix_group }}"
|
group: "{{ bind_unix_group }}"
|
||||||
mode: 0644
|
mode: "0644"
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ view.zones }}"
|
- "{{ view.zones }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
loop_var: zone
|
loop_var: zone
|
||||||
when: zone.type == 'master'
|
when: zone.config.type == 'master'
|
||||||
notify: restart named
|
notify: Restart named
|
||||||
|
|
||||||
|
- name: Check if last character in zone files is a newline
|
||||||
|
ansible.builtin.include_tasks: verify_zone_file.yml
|
||||||
|
with_items:
|
||||||
|
- "{{ view.zones }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: zone
|
||||||
|
when: zone.config.type == 'master'
|
||||||
|
|
||||||
|
- name: Sign Zones
|
||||||
|
ansible.builtin.include_tasks: sign_zone_file.yml
|
||||||
|
with_items:
|
||||||
|
- "{{ view.zones }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: zone
|
||||||
|
when: zone.config.type == 'master' and
|
||||||
|
bind9_dnssec_keys | selectattr('origin', 'in', zone.config.origin) | map(attribute='zone_signing_key') | length > 0 and
|
||||||
|
(bind9_dnssec_keys | selectattr('origin', 'in', zone.config.origin) | map(attribute='zone_signing_key'))[0].private | length > 0 and
|
||||||
|
(bind9_dnssec_keys | selectattr('origin', 'in', zone.config.origin) | map(attribute='zone_signing_key'))[0].public | length > 0
|
||||||
|
|||||||
13
tasks/verify_zone_file.yml
Normal file
13
tasks/verify_zone_file.yml
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Read the last character of DNS zone: {{ zone.config.origin }}"
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: "tail --bytes 1 {{ bind_config_directory + '/' + zone.file }}"
|
||||||
|
register: _bind9_zone_last_character
|
||||||
|
changed_when: _bind9_zone_last_character.rc == 0
|
||||||
|
failed_when: _bind9_zone_last_character.rc > 0
|
||||||
|
|
||||||
|
- name: "Fail when the last character of DNS zone file is not a newline: {{ bind_config_directory + '/' + zone.file }}"
|
||||||
|
ansible.builtin.fail:
|
||||||
|
msg: "Last character of DNS zone file is not a newline: {{ bind_config_directory + '/' + zone.file }}"
|
||||||
|
when: _bind9_zone_last_character.stdout | regex_search('.+')
|
||||||
@@ -2,6 +2,23 @@
|
|||||||
# {{ ansible_managed }}
|
# {{ ansible_managed }}
|
||||||
#
|
#
|
||||||
|
|
||||||
|
{% if bind9_controls is defined and bind9_controls | length > 0 %}
|
||||||
|
controls {
|
||||||
|
{% for control in bind9_controls %}
|
||||||
|
inet {{ control.inet }} port {{ control.port }} allow {
|
||||||
|
{% for acl in control.acls %}
|
||||||
|
{{ acl }};
|
||||||
|
{% endfor %}
|
||||||
|
} keys {
|
||||||
|
{% for name in control.tsig_keys %}
|
||||||
|
"{{ name }}";
|
||||||
|
{% endfor %}
|
||||||
|
};
|
||||||
|
|
||||||
|
{% endfor %}
|
||||||
|
};
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
options {
|
options {
|
||||||
|
|
||||||
# This specifies which hosts are allowed to ask ordinary DNS questions.
|
# This specifies which hosts are allowed to ask ordinary DNS questions.
|
||||||
@@ -169,14 +186,33 @@ options {
|
|||||||
|
|
||||||
directory "{{ bind_config_directory }}";
|
directory "{{ bind_config_directory }}";
|
||||||
|
|
||||||
dnssec-validation {{ bind9_options.dnssec_validation | default('no') }};
|
# This accepts expired signatures when verifying DNSSEC signatures. The default is no. Setting this option to yes
|
||||||
|
# leaves named vulnerable to replay attacks.
|
||||||
|
dnssec-accept-expired {{ "yes" if bind9_options.dnssec_accept_expired else "no" }};
|
||||||
|
|
||||||
# dump-file "/var/bind/named.dump";
|
# Enables DNSSEC validation in named.
|
||||||
|
#
|
||||||
|
# auto: If set to auto, DNSSEC validation is enabled and a default trust anchor for the DNS root zone is used. This
|
||||||
|
# trust anchor is provided as part of BIND and is kept up-to-date
|
||||||
|
#
|
||||||
|
# yes: If set to yes, DNSSEC validation is enabled, but a trust anchor must be manually configured using a
|
||||||
|
# trust-anchors statement (or the managed-keys or trusted-keys statements, both deprecated). If trust-anchors is not
|
||||||
|
# configured, it is a configuration error. If trust-anchors does not include a valid root key, then validation does
|
||||||
|
# not take place for names which are not covered by any of the configured trust anchors.
|
||||||
|
#
|
||||||
|
# no: If set to no, DNSSEC validation is disabled.
|
||||||
|
#
|
||||||
|
# https://bind9.readthedocs.io/en/latest/reference.html#namedconf-statement-dnssec-validation
|
||||||
|
dnssec-validation {{ bind9_options.dnssec_validation | default('auto') }};
|
||||||
|
|
||||||
{% if bind9_options.forwarders is defined and bind9_options.forwarders | length > 0 %}
|
{% if bind9_options.forwarders is defined and bind9_options.forwarders | length > 0 %}
|
||||||
forwarders {
|
forwarders {
|
||||||
{% for forwarder in bind9_options.forwarders %}
|
{% for forwarder in bind9_options.forwarders %}
|
||||||
{{ forwarder }};
|
{% if forwarder.port is defined and forwarder.port | length > 0 %}
|
||||||
|
{{ forwarder.ip }} port {{ forwarder.port }};
|
||||||
|
{% else %}
|
||||||
|
{{ forwarder.ip }};
|
||||||
|
{% endif %}
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
};
|
};
|
||||||
{% else %}
|
{% else %}
|
||||||
@@ -210,6 +246,13 @@ options {
|
|||||||
};
|
};
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
|
# Indicates the directory where public and private DNSSEC key files are found.
|
||||||
|
#
|
||||||
|
# This is the directory where the public and private DNSSEC key files should be found when performing a dynamic update
|
||||||
|
# of secure zones, if different than the current working directory.
|
||||||
|
# https://bind9.readthedocs.io/en/latest/reference.html#namedconf-statement-key-directory
|
||||||
|
key-directory "{{ bind9_options.key_directory }}";
|
||||||
|
|
||||||
# managed-keys-directory "/var/named/dynamic";
|
# managed-keys-directory "/var/named/dynamic";
|
||||||
# memstatistics-file "/var/bind/named.memstats";
|
# memstatistics-file "/var/bind/named.memstats";
|
||||||
minimal-responses {{ bind9_options.minimal_responses }};
|
minimal-responses {{ bind9_options.minimal_responses }};
|
||||||
@@ -231,3 +274,15 @@ options {
|
|||||||
|
|
||||||
zone-statistics yes;
|
zone-statistics yes;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
{% if bind9_statics.enabled is defined and bind9_statics.enabled is true %}
|
||||||
|
statistics-channels {
|
||||||
|
{% for channel in bind9_statics.channels %}
|
||||||
|
inet {{ channel.inet }} port {{ channel.port }} allow {
|
||||||
|
{% for acl in channel.acls %}
|
||||||
|
{{ acl }};
|
||||||
|
{% endfor %}
|
||||||
|
};
|
||||||
|
{% endfor %}
|
||||||
|
};
|
||||||
|
{% endif %}
|
||||||
|
|||||||
@@ -1,3 +1,4 @@
|
|||||||
|
#jinja2: lstrip_blocks: True
|
||||||
#
|
#
|
||||||
# {{ ansible_managed }}
|
# {{ ansible_managed }}
|
||||||
#
|
#
|
||||||
@@ -12,7 +13,7 @@ view "{{ view.name }}" {
|
|||||||
};
|
};
|
||||||
|
|
||||||
{% for zone in view.zones %}
|
{% for zone in view.zones %}
|
||||||
zone "{{ zone.origin }}" {
|
zone "{{ zone.config.origin }}" {
|
||||||
|
|
||||||
# Hosts which are allowed to issue queries to the server. If not specified all
|
# Hosts which are allowed to issue queries to the server. If not specified all
|
||||||
# hosts are allowed to make queries (defaults to allow-query {any;};
|
# hosts are allowed to make queries (defaults to allow-query {any;};
|
||||||
@@ -20,9 +21,9 @@ view "{{ view.name }}" {
|
|||||||
# NOTE:
|
# NOTE:
|
||||||
# - The statements may be used in a zone, view or a global options
|
# - The statements may be used in a zone, view or a global options
|
||||||
# clause.
|
# clause.
|
||||||
{% if zone.allow_query is defined and zone.allow_query | length > 0 %}
|
{% if zone.config.allow_query is defined and zone.config.allow_query | length > 0 %}
|
||||||
allow-query {
|
allow-query {
|
||||||
{% for entry in zone.allow_query %}
|
{% for entry in zone.config.allow_query %}
|
||||||
{{ entry }};
|
{{ entry }};
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
};
|
};
|
||||||
@@ -39,9 +40,9 @@ view "{{ view.name }}" {
|
|||||||
# NOTE:
|
# NOTE:
|
||||||
# - The statements may be used in a zone, view or a global options
|
# - The statements may be used in a zone, view or a global options
|
||||||
# clause.
|
# clause.
|
||||||
{% if zone.allow_query_on is defined and zone.allow_query_on | length > 0 %}
|
{% if zone.config.allow_query_on is defined and zone.config.allow_query_on | length > 0 %}
|
||||||
allow-query {
|
allow-query {
|
||||||
{% for entry in zone.allow_query_on %}
|
{% for entry in zone.config.allow_query_on %}
|
||||||
{{ entry }};
|
{{ entry }};
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
};
|
};
|
||||||
@@ -62,9 +63,9 @@ view "{{ view.name }}" {
|
|||||||
#
|
#
|
||||||
# NOTE:
|
# NOTE:
|
||||||
# - This statement may be used in a zone, view or global options clause.
|
# - This statement may be used in a zone, view or global options clause.
|
||||||
{% if zone.allow_transfer is defined and zone.allow_transfer | length > 0 %}
|
{% if zone.config.allow_transfer is defined and zone.config.allow_transfer | length > 0 %}
|
||||||
allow-transfer {
|
allow-transfer {
|
||||||
{% for entry in zone.allow_transfer %}
|
{% for entry in zone.config.allow_transfer %}
|
||||||
key {{ entry }};
|
key {{ entry }};
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
};
|
};
|
||||||
@@ -85,9 +86,9 @@ view "{{ view.name }}" {
|
|||||||
#
|
#
|
||||||
# NOTE:
|
# NOTE:
|
||||||
# - This statement may be used in a zone, view or an options clause.
|
# - This statement may be used in a zone, view or an options clause.
|
||||||
{% if zone.allow_update is defined and zone.allow_update | length > 0 %}
|
{% if zone.config.allow_update is defined and zone.config.allow_update | length > 0 %}
|
||||||
allow-update {
|
allow-update {
|
||||||
{% for entry in zone.allow_update %}
|
{% for entry in zone.config.allow_update %}
|
||||||
key {{ entry }};
|
key {{ entry }};
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
};
|
};
|
||||||
@@ -101,9 +102,9 @@ view "{{ view.name }}" {
|
|||||||
#
|
#
|
||||||
# NOTE:
|
# NOTE:
|
||||||
# - This statement may be used in zone, view or an options clause.
|
# - This statement may be used in zone, view or an options clause.
|
||||||
{% if zone.allow_update_forwarding is defined and zone.allow_update_forwarding | length > 0 %}
|
{% if zone.config.allow_update_forwarding is defined and zone.config.allow_update_forwarding | length > 0 %}
|
||||||
allow-update-forwarding {
|
allow-update-forwarding {
|
||||||
{% for entry in zone.allow_update_forwarding %}
|
{% for entry in zone.config.allow_update_forwarding %}
|
||||||
{{ entry }};
|
{{ entry }};
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
};
|
};
|
||||||
@@ -127,13 +128,45 @@ view "{{ view.name }}" {
|
|||||||
# is complete. If the Master is not available or the Slave fails to
|
# is complete. If the Master is not available or the Slave fails to
|
||||||
# contact the Master, ffor whatever reason, the zone may be left with
|
# contact the Master, ffor whatever reason, the zone may be left with
|
||||||
# no effective Authoritative Name Servers.
|
# no effective Authoritative Name Servers.
|
||||||
file "{{ bind_config_directory }}/{{ zone.file }}";
|
{% if zone.file is defined and zone.file | length > 0 and not zone.file.startswith('/') %}
|
||||||
|
file "{{ bind_config_directory }}/{{ zone.config.file }}";
|
||||||
|
{% elif zone.file is defined and zone.file | length > 0 and zone.file.startswith('/')%}
|
||||||
|
file "{{ zone.config.file }}";
|
||||||
|
{% else %}
|
||||||
|
# file "{{ bind_config_directory }}/...";
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
# This option is only meaningful if the forwarders list is not empty. A
|
||||||
|
# value of first is the default and causes the server to query the
|
||||||
|
# forwarders first; if that does not answer the question, the server then
|
||||||
|
# looks for the answer itself. If only is specified, the server only queries
|
||||||
|
# the forwarders.
|
||||||
|
{% if zone.config.forward is defined and zone.config.forward | length > 0 %}
|
||||||
|
forward {{ zone.config.forward }};
|
||||||
|
{% else %}
|
||||||
|
# forward first;
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
# This specifies a list of IP addresses to which queries are forwarded. The
|
||||||
|
# default is the empty list (no forwarding). Each address in the list can be
|
||||||
|
# associated with an optional port number and/or DSCP value, and a default
|
||||||
|
# port number and DSCP value can be set for the entire list.
|
||||||
|
# https://bind9.readthedocs.io/en/latest/reference.html#forwarding
|
||||||
|
{% if zone.config.forwarders is defined and zone.config.forwarders | length > 0 %}
|
||||||
|
forwarders {
|
||||||
|
{% for forwarder in zone.config.forwarders %}
|
||||||
|
{{ forwarder }};
|
||||||
|
{% endfor %}
|
||||||
|
};
|
||||||
|
{% else %}
|
||||||
|
# forwarders {};
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
# master servers
|
# master servers
|
||||||
# https://bind9.readthedocs.io/en/latest/manpages.html?highlight=masters#masters
|
# https://bind9.readthedocs.io/en/latest/manpages.html?highlight=masters#masters
|
||||||
{% if zone.masters is defined and zone.masters | length > 0 %}
|
{% if zone.config.masters is defined and zone.config.masters | length > 0 %}
|
||||||
masters {
|
masters {
|
||||||
{% for master in zone.masters %}
|
{% for master in zone.config.masters %}
|
||||||
{{ master.ip }} key {{ master.tsigkey}};
|
{{ master.ip }} key {{ master.tsigkey}};
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
};
|
};
|
||||||
@@ -157,7 +190,14 @@ view "{{ view.name }}" {
|
|||||||
# NOTE:
|
# NOTE:
|
||||||
# - This statement may be specified in zone, view clauses or in a
|
# - This statement may be specified in zone, view clauses or in a
|
||||||
# global options clause.
|
# global options clause.
|
||||||
|
{% if zone.config.notify is defined and zone.config.notify %}
|
||||||
notify yes;
|
notify yes;
|
||||||
|
{% elif zone.config.notify is defined and not zone.config.notify %}
|
||||||
|
notify no;
|
||||||
|
{% else %}
|
||||||
|
# notify yes | no;
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
|
|
||||||
# Zones configured for dynamic DNS may use this option to set the
|
# Zones configured for dynamic DNS may use this option to set the
|
||||||
# update method to be used for the zone serial number in the SOA
|
# update method to be used for the zone serial number in the SOA
|
||||||
@@ -176,15 +216,32 @@ view "{{ view.name }}" {
|
|||||||
# is the current date in the form “YYYYMMDD”, followed by two
|
# is the current date in the form “YYYYMMDD”, followed by two
|
||||||
# zeroes, unless the existing serial number is already greater than
|
# zeroes, unless the existing serial number is already greater than
|
||||||
# or equal to that value, in which case it is incremented by one.
|
# or equal to that value, in which case it is incremented by one.
|
||||||
{% if zone.serial_update_method is defined %}
|
{% if zone.config.serial_update_method is defined %}
|
||||||
serial-update-method {{ zone.serial_update_method }};
|
serial-update-method {{ zone.config.serial_update_method }};
|
||||||
{% else %}
|
{% else %}
|
||||||
# serial-update-method [date | increment | unixtime ];
|
# serial-update-method [date | increment | unixtime ];
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
type {{ zone.type }};
|
type {{ zone.config.type }};
|
||||||
|
|
||||||
|
# The update-policy clause allows more fine-grained control over which
|
||||||
|
# updates are allowed. It specifies a set of rules, in which each rule
|
||||||
|
# either grants or denies permission for one or more names in the zone to be
|
||||||
|
# updated by one or more identities. Identity is determined by the key that
|
||||||
|
# signed the update request, using either TSIG or SIG(0).
|
||||||
|
# https://bind9.readthedocs.io/en/v9_16_5/reference.html#dynamic-update-policies
|
||||||
|
{% if zone.config.update_policies is defined and zone.config.update_policies | length > 0 %}
|
||||||
|
update-policy {
|
||||||
|
{% for update_policy in zone.config.update_policies %}
|
||||||
|
{{ update_policy.action }} {{ update_policy.identity }} {{ update_policy.ruletype }} {{ update_policy.name | default('') }} {{ update_policy.types | default('') | join(' ') }};
|
||||||
|
{% endfor %}
|
||||||
|
};
|
||||||
|
{% else %}
|
||||||
|
# update-policy {};
|
||||||
|
{% endif %}
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
{% endfor %}
|
{% endfor %}
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|||||||
7
templates/etc/rndc.key.j2
Normal file
7
templates/etc/rndc.key.j2
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
key "{{ bind9_rndc_key.name }}" {
|
||||||
|
algorithm {{ bind9_rndc_key.algorithm }};
|
||||||
|
secret "{{ bind9_rndc_key.secret }}";
|
||||||
|
};
|
||||||
Reference in New Issue
Block a user