You've already forked ansible-role-rspamd
Initial Commit
This commit is contained in:
4
.ansible-lint
Normal file
4
.ansible-lint
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
exclude_paths:
|
||||||
|
- .gitea/
|
||||||
12
.editorconfig
Normal file
12
.editorconfig
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
# EditorConfig is awesome: https://EditorConfig.org
|
||||||
|
|
||||||
|
# top-most EditorConfig file
|
||||||
|
root = true
|
||||||
|
|
||||||
|
[*]
|
||||||
|
indent_style = space
|
||||||
|
indent_size = 2
|
||||||
|
end_of_line = lf
|
||||||
|
charset = utf-8
|
||||||
|
trim_trailing_whitespace = true
|
||||||
|
insert_final_newline = false
|
||||||
20
.gitea/workflows/ansible-linters.yaml
Normal file
20
.gitea/workflows/ansible-linters.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
name: Ansible Linter
|
||||||
|
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
types: [ "opened", "reopened", "synchronize" ]
|
||||||
|
push:
|
||||||
|
branches: [ '**' ]
|
||||||
|
tags-ignore: [ '**' ]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
ansible-lint:
|
||||||
|
runs-on:
|
||||||
|
- ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v6.0.2
|
||||||
|
- name: Run ansible-lint
|
||||||
|
uses: ansible/ansible-lint@v26.2.0
|
||||||
|
with:
|
||||||
|
args: "--config-file .ansible-lint"
|
||||||
|
setup_python: "true"
|
||||||
18
.gitea/workflows/markdown-linters.yaml
Normal file
18
.gitea/workflows/markdown-linters.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
name: Lint Markdown files
|
||||||
|
|
||||||
|
on:
|
||||||
|
pull_request:
|
||||||
|
types: [ "opened", "reopened", "synchronize" ]
|
||||||
|
push:
|
||||||
|
branches: [ '**' ]
|
||||||
|
tags-ignore: [ '**' ]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
markdown-lint:
|
||||||
|
runs-on:
|
||||||
|
- ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/checkout@v6.0.2
|
||||||
|
- uses: DavidAnson/markdownlint-cli2-action@v21.0.0
|
||||||
|
with:
|
||||||
|
globs: '**/*.md'
|
||||||
22
.gitea/workflows/release.yaml
Normal file
22
.gitea/workflows/release.yaml
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
name: Release Ansible Role
|
||||||
|
|
||||||
|
on:
|
||||||
|
push:
|
||||||
|
tags:
|
||||||
|
- '**'
|
||||||
|
workflow_dispatch: {}
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
release:
|
||||||
|
name: Release Ansible Role
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- name: Install Ansible Galaxy
|
||||||
|
run: |
|
||||||
|
apt update --yes
|
||||||
|
apt install --yes ansible
|
||||||
|
- env:
|
||||||
|
ANSIBLE_GALAXY_TOKEN: ${{ secrets.ANSIBLE_GALAXY_TOKEN }}
|
||||||
|
name: Update Ansible Role in Ansible Galaxy
|
||||||
|
run: |
|
||||||
|
ansible-galaxy role import --token=${ANSIBLE_GALAXY_TOKEN} volker-raschek ${GITHUB_REPOSITORY#*/}
|
||||||
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
.ansible
|
||||||
137
.markdownlint.yaml
Normal file
137
.markdownlint.yaml
Normal file
@@ -0,0 +1,137 @@
|
|||||||
|
# markdownlint YAML configuration
|
||||||
|
# https://github.com/DavidAnson/markdownlint/blob/main/schema/.markdownlint.yaml
|
||||||
|
|
||||||
|
# Default state for all rules
|
||||||
|
default: true
|
||||||
|
|
||||||
|
# Path to configuration file to extend
|
||||||
|
extends: null
|
||||||
|
|
||||||
|
# MD003/heading-style/header-style - Heading style
|
||||||
|
MD003:
|
||||||
|
# Heading style
|
||||||
|
style: "atx"
|
||||||
|
|
||||||
|
# MD004/ul-style - Unordered list style
|
||||||
|
MD004:
|
||||||
|
style: "dash"
|
||||||
|
|
||||||
|
# MD007/ul-indent - Unordered list indentation
|
||||||
|
MD007:
|
||||||
|
# Spaces for indent
|
||||||
|
indent: 2
|
||||||
|
# Whether to indent the first level of the list
|
||||||
|
start_indented: false
|
||||||
|
|
||||||
|
# MD009/no-trailing-spaces - Trailing spaces
|
||||||
|
MD009:
|
||||||
|
# Spaces for line break
|
||||||
|
br_spaces: 2
|
||||||
|
# Allow spaces for empty lines in list items
|
||||||
|
list_item_empty_lines: false
|
||||||
|
# Include unnecessary breaks
|
||||||
|
strict: false
|
||||||
|
|
||||||
|
# MD010/no-hard-tabs - Hard tabs
|
||||||
|
MD010:
|
||||||
|
# Include code blocks
|
||||||
|
code_blocks: true
|
||||||
|
|
||||||
|
# MD012/no-multiple-blanks - Multiple consecutive blank lines
|
||||||
|
MD012:
|
||||||
|
# Consecutive blank lines
|
||||||
|
maximum: 1
|
||||||
|
|
||||||
|
# MD013/line-length - Line length
|
||||||
|
MD013:
|
||||||
|
# Number of characters
|
||||||
|
line_length: 120
|
||||||
|
# Number of characters for headings
|
||||||
|
heading_line_length: 120
|
||||||
|
# Number of characters for code blocks
|
||||||
|
code_block_line_length: 120
|
||||||
|
# Include code blocks
|
||||||
|
code_blocks: false
|
||||||
|
# Include tables
|
||||||
|
tables: false
|
||||||
|
# Include headings
|
||||||
|
headings: true
|
||||||
|
# Strict length checking
|
||||||
|
strict: false
|
||||||
|
# Stern length checking
|
||||||
|
stern: false
|
||||||
|
|
||||||
|
# MD022/blanks-around-headings/blanks-around-headers - Headings should be surrounded by blank lines
|
||||||
|
MD022:
|
||||||
|
# Blank lines above heading
|
||||||
|
lines_above: 1
|
||||||
|
# Blank lines below heading
|
||||||
|
lines_below: 1
|
||||||
|
|
||||||
|
# MD025/single-title/single-h1 - Multiple top-level headings in the same document
|
||||||
|
MD025:
|
||||||
|
# Heading level
|
||||||
|
level: 1
|
||||||
|
# RegExp for matching title in front matter
|
||||||
|
front_matter_title: "^\\s*title\\s*[:=]"
|
||||||
|
|
||||||
|
# MD026/no-trailing-punctuation - Trailing punctuation in heading
|
||||||
|
MD026:
|
||||||
|
# Punctuation characters
|
||||||
|
punctuation: ".,;:!。,;:!"
|
||||||
|
|
||||||
|
# MD029/ol-prefix - Ordered list item prefix
|
||||||
|
MD029:
|
||||||
|
# List style
|
||||||
|
style: "one_or_ordered"
|
||||||
|
|
||||||
|
# MD030/list-marker-space - Spaces after list markers
|
||||||
|
MD030:
|
||||||
|
# Spaces for single-line unordered list items
|
||||||
|
ul_single: 1
|
||||||
|
# Spaces for single-line ordered list items
|
||||||
|
ol_single: 1
|
||||||
|
# Spaces for multi-line unordered list items
|
||||||
|
ul_multi: 1
|
||||||
|
# Spaces for multi-line ordered list items
|
||||||
|
ol_multi: 1
|
||||||
|
|
||||||
|
# MD033/no-inline-html - Inline HTML
|
||||||
|
MD033:
|
||||||
|
# Allowed elements
|
||||||
|
allowed_elements: []
|
||||||
|
|
||||||
|
# MD035/hr-style - Horizontal rule style
|
||||||
|
MD035:
|
||||||
|
# Horizontal rule style
|
||||||
|
style: "---"
|
||||||
|
|
||||||
|
# MD036/no-emphasis-as-heading/no-emphasis-as-header - Emphasis used instead of a heading
|
||||||
|
MD036:
|
||||||
|
# Punctuation characters
|
||||||
|
punctuation: ".,;:!?。,;:!?"
|
||||||
|
|
||||||
|
# MD041/first-line-heading/first-line-h1 - First line in a file should be a top-level heading
|
||||||
|
MD041:
|
||||||
|
# Heading level
|
||||||
|
level: 1
|
||||||
|
# RegExp for matching title in front matter
|
||||||
|
front_matter_title: "^\\s*title\\s*[:=]"
|
||||||
|
|
||||||
|
# MD044/proper-names - Proper names should have the correct capitalization
|
||||||
|
MD044:
|
||||||
|
# List of proper names
|
||||||
|
names:
|
||||||
|
- gitea
|
||||||
|
# Include code blocks
|
||||||
|
code_blocks: false
|
||||||
|
|
||||||
|
# MD046/code-block-style - Code block style
|
||||||
|
MD046:
|
||||||
|
# Block style
|
||||||
|
style: "fenced"
|
||||||
|
|
||||||
|
# MD048/code-fence-style - Code fence style
|
||||||
|
MD048:
|
||||||
|
# Code fence syle
|
||||||
|
style: "backtick"
|
||||||
14
.vscode/settings.json
vendored
Normal file
14
.vscode/settings.json
vendored
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
{
|
||||||
|
"ansible.python.interpreterPath": "/bin/python",
|
||||||
|
"files.associations": {
|
||||||
|
"**/.gitea/**/*.yml": "yaml",
|
||||||
|
"**/.gitea/**/*.yaml": "yaml",
|
||||||
|
"docker-compose*.yml": "dockercompose",
|
||||||
|
"*.yml": "ansible",
|
||||||
|
"*.yaml": "ansible",
|
||||||
|
".yamllint": "yaml",
|
||||||
|
".yamllint.yml": "yaml",
|
||||||
|
".yamllint.yaml": "yaml"
|
||||||
|
},
|
||||||
|
"rewrap.wrappingColumn": 120
|
||||||
|
}
|
||||||
19
.yamllint.yaml
Normal file
19
.yamllint.yaml
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
#
|
||||||
|
# Documentation:
|
||||||
|
# https://yamllint.readthedocs.io/en/stable/
|
||||||
|
#
|
||||||
|
|
||||||
|
rules:
|
||||||
|
brackets:
|
||||||
|
forbid: false
|
||||||
|
min-spaces-inside: 0
|
||||||
|
max-spaces-inside: 2
|
||||||
|
min-spaces-inside-empty: 0
|
||||||
|
max-spaces-inside-empty: 0
|
||||||
|
indentation:
|
||||||
|
spaces: 2
|
||||||
|
indent-sequences: false
|
||||||
|
line-length:
|
||||||
|
max: 360
|
||||||
20
LICENSE
Normal file
20
LICENSE
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
Copyright (c) 2022 Markus Pesch
|
||||||
|
|
||||||
|
Permission is hereby granted, free of charge, to any person obtaining
|
||||||
|
a copy of this software and associated documentation files (the
|
||||||
|
"Software"), to deal in the Software without restriction, including
|
||||||
|
without limitation the rights to use, copy, modify, merge, publish,
|
||||||
|
distribute, sublicense, and/or sell copies of the Software, and to
|
||||||
|
permit persons to whom the Software is furnished to do so, subject to
|
||||||
|
the following conditions:
|
||||||
|
|
||||||
|
The above copyright notice and this permission notice shall be
|
||||||
|
included in all copies or substantial portions of the Software.
|
||||||
|
|
||||||
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||||
|
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||||
|
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||||
|
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||||
|
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||||
|
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||||
|
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||||
190
README.md
Normal file
190
README.md
Normal file
@@ -0,0 +1,190 @@
|
|||||||
|
# volker-raschek.rspamd
|
||||||
|
|
||||||
|

|
||||||
|
|
||||||
|
The ansible role `volker-raschek.rspamd` create and manage users on Linux based distributions. For example for Arch
|
||||||
|
Linux, Fedora and Ubuntu. Furthermore, the role can also be used to create groups, `~/.forward`, `~/.netrc` and to
|
||||||
|
manage the `~/.ssh` directory.
|
||||||
|
|
||||||
|
## Examples
|
||||||
|
|
||||||
|
### User and group
|
||||||
|
|
||||||
|
The following example create the user `toor` and group `toor`. Booth with a specific id.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
unix_groups:
|
||||||
|
toor:
|
||||||
|
gid: "1001"
|
||||||
|
state: present
|
||||||
|
|
||||||
|
unix_users:
|
||||||
|
toor:
|
||||||
|
state: present
|
||||||
|
name: Toor
|
||||||
|
uid: "1000"
|
||||||
|
home: /home/toor
|
||||||
|
shell: /bin/bash
|
||||||
|
password: toor
|
||||||
|
group: toor
|
||||||
|
```
|
||||||
|
|
||||||
|
### Btrfs home dir
|
||||||
|
|
||||||
|
Optionally, the home directory of a user can also be created as dedicated btrfs subvolume. This make it possible to
|
||||||
|
create snapshots of the home directory, for example via `btrbk`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
unix_users:
|
||||||
|
toor:
|
||||||
|
state: present
|
||||||
|
name: Toor
|
||||||
|
uid: "1000"
|
||||||
|
home: /home/toor
|
||||||
|
btrfs: true
|
||||||
|
shell: /bin/bash
|
||||||
|
password: toor
|
||||||
|
group: toor
|
||||||
|
```
|
||||||
|
|
||||||
|
### .netrc
|
||||||
|
|
||||||
|
The ansible role supports the creation and management of the `.netrc` file in a user's home directory. The `.netrc` file
|
||||||
|
for the user `toor` is created below. This contains entries for GitHub.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
unix_users:
|
||||||
|
toor:
|
||||||
|
state: present
|
||||||
|
name: Toor
|
||||||
|
uid: "1000"
|
||||||
|
home: /home/toor
|
||||||
|
netrc:
|
||||||
|
- machine: github.com
|
||||||
|
login: octocat
|
||||||
|
password: pat_12345
|
||||||
|
- machine: api.github.com
|
||||||
|
login: octocat
|
||||||
|
password: pat_12345
|
||||||
|
shell: /bin/bash
|
||||||
|
password: toor
|
||||||
|
group: toor
|
||||||
|
```
|
||||||
|
|
||||||
|
### .ssh
|
||||||
|
|
||||||
|
The SSH client directory `~/.ssh` can also be managed via the Ansible role. This supports the creation and management of
|
||||||
|
`~/.ssh/config`, `~/.ssh/authorized_keys` as well as the maintenance of private and public SSH keys.
|
||||||
|
|
||||||
|
The following example create two entries in `~/.ssh/authorized_keys`. One normal SSH access for `claire`. If `bob`
|
||||||
|
establish a SSH connection the command `/usr/local/bin/upload-file.sh` will be executed and exited. Furthermore,
|
||||||
|
environment variables can be espcilitly defined, to consume it during execution of the command.
|
||||||
|
|
||||||
|
> [!IMPORTANT]
|
||||||
|
> To allow consuming environment variables must be set `PermitUserEnvironment yes` in `/etc/ssh/sshd_config`.
|
||||||
|
|
||||||
|
The private key `toor@toor-pc.ed25519.key` must be stored in `ssh/private_keys`. The public key will be automatically
|
||||||
|
extracted from the private key.
|
||||||
|
|
||||||
|
The public keys `claire@claire-pc.pub` as well as `bob@bob-pc.pub` must be stored in `ssh/authorized_keys`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
unix_users:
|
||||||
|
toor:
|
||||||
|
state: present
|
||||||
|
name: Toor
|
||||||
|
uid: "1000"
|
||||||
|
home: /home/toor
|
||||||
|
ssh:
|
||||||
|
config:
|
||||||
|
- Host: "*"
|
||||||
|
StrictHostKeyChecking: "no"
|
||||||
|
UserKnownHostFile: /dev/null
|
||||||
|
authorized_keys:
|
||||||
|
- filename: claire@claire-pc.pub
|
||||||
|
- command: /usr/local/bin/upload-file.sh
|
||||||
|
envs:
|
||||||
|
- key: SSH_KEY_NAME
|
||||||
|
value: bob@bob-pc
|
||||||
|
filename: bob@bob-pc.pub
|
||||||
|
private_keys:
|
||||||
|
- toor@toor-pc.ed25519.key
|
||||||
|
shell: /bin/bash
|
||||||
|
password: toor
|
||||||
|
group: toor
|
||||||
|
```
|
||||||
|
|
||||||
|
### .forward
|
||||||
|
|
||||||
|
If on the system is postfix installed, postfix will respect the `~/.forward`
|
||||||
|
[file](https://www.postfix.org/local.8.html). This allows to forward local emails to external email addresses. The
|
||||||
|
following example create the `~/.forward` file for `toor` to forward emails to `toor@company.example.local`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
unix_users:
|
||||||
|
toor:
|
||||||
|
state: present
|
||||||
|
name: Toor
|
||||||
|
uid: "1000"
|
||||||
|
home: /home/toor
|
||||||
|
email: toor@company.example.local
|
||||||
|
shell: /bin/bash
|
||||||
|
password: toor
|
||||||
|
group: toor
|
||||||
|
```
|
||||||
|
|
||||||
|
### shell_rc files
|
||||||
|
|
||||||
|
The role also supports the creation of bashrc drop-in files. These are created in `~/.bashrc.d` and included by
|
||||||
|
`~/.bashrc` via `source`.
|
||||||
|
|
||||||
|
Program-related configurations can be made via a drop-in file. For example, the configuration of the bash history via
|
||||||
|
the environment variables `HISTCONTROL` or `HISTFILE`. In addition to environment variables, aliases and complete
|
||||||
|
functions can also be defined.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
unix_users:
|
||||||
|
toor:
|
||||||
|
state: present
|
||||||
|
name: Toor
|
||||||
|
uid: "1000"
|
||||||
|
home: /home/toor
|
||||||
|
email: toor@company.example.local
|
||||||
|
shell: /bin/bash
|
||||||
|
shell_rc_files:
|
||||||
|
- file: "/home/toor/.bashrc.d/10-docker.bashrc" # absolute or relative path to home dir
|
||||||
|
aliases:
|
||||||
|
- key: "dcd"
|
||||||
|
value: "docker-compose down"
|
||||||
|
envs:
|
||||||
|
- export: true
|
||||||
|
key: "PATH"
|
||||||
|
value: "/home/toor/workspace/docker-compose/bin:${PATH}" # Add local compiled docker-compose into $PATH
|
||||||
|
functions:
|
||||||
|
- name: "foo"
|
||||||
|
value: |
|
||||||
|
if ! which docker 1> /dev/null; then
|
||||||
|
echo "ERROR: docker not found" 1>&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
password: toor
|
||||||
|
group: toor
|
||||||
|
```
|
||||||
|
|
||||||
|
## Further ansible roles
|
||||||
|
|
||||||
|
This ansible role is used in combination with other ansible roles of `volker-raschek`. You can search for the other
|
||||||
|
ansible roles via the following command.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ ansible-galaxy role search --author "volker-raschek"
|
||||||
|
|
||||||
|
Found roles matching your search:
|
||||||
|
|
||||||
|
Name Description
|
||||||
|
---- -----------
|
||||||
|
volker-raschek.bind9 Role to install and configure bind9 on different distributions
|
||||||
|
volker-raschek.dhcpd Role to install and configure dhcpd on different distributions
|
||||||
|
volker-raschek.renovate Role to configure renovate as container image
|
||||||
|
...
|
||||||
|
```
|
||||||
101
defaults/main.yaml
Normal file
101
defaults/main.yaml
Normal file
@@ -0,0 +1,101 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
## @section ACLs
|
||||||
|
## @param rspamd_acl_allowlist_from Allow emails by sender.
|
||||||
|
## @param rspamd_acl_allowlist_ips Allow emails by ip addresses.
|
||||||
|
## @param rspamd_acl_blocklist_from Reject emails by sender.
|
||||||
|
## @param rspamd_acl_blocklist_ips Reject emails by ip addresses.
|
||||||
|
rspamd_acl_allowlist_from: []
|
||||||
|
# - from: "max.mustermann@example.local"
|
||||||
|
# - from: "*@example.local"
|
||||||
|
rspamd_acl_allowlist_ips: []
|
||||||
|
# - ip: "10.11.12.13"
|
||||||
|
rspamd_acl_blocklist_from: []
|
||||||
|
# - from: "max.mustermann@example.local"
|
||||||
|
# - from: "*@example.local"
|
||||||
|
rspamd_acl_blocklist_ips: []
|
||||||
|
# - ip: "10.11.12.13"
|
||||||
|
|
||||||
|
|
||||||
|
## @section DKIM Singing configuration
|
||||||
|
## @param rspamd_dkim_enabled Create `dkim_sining.conf`.
|
||||||
|
## @param rspamd_dkim_allow_username_mismatch Enable DKIM signing for alias sender addresses.
|
||||||
|
## @param rspamd_dkim_directory Directory of the DKIM keys.
|
||||||
|
## @param rspamd_dkim_domains DKIM Domain configuration.
|
||||||
|
rspamd_dkim_enabled: false
|
||||||
|
rspamd_dkim_allow_username_mismatch: false
|
||||||
|
rspamd_dkim_dir: "/var/lib/rspamd/dkim"
|
||||||
|
rspamd_dkim_domains: []
|
||||||
|
# - name: example.local
|
||||||
|
# selector: "2020"
|
||||||
|
|
||||||
|
## @section DNS
|
||||||
|
## @param List of DNS servers used for DNS lookups.
|
||||||
|
rspamd_dns_servers: []
|
||||||
|
# - 8.8.4.4
|
||||||
|
# - 8.8.8.8
|
||||||
|
|
||||||
|
## @section Logging configuration
|
||||||
|
## https://docs.rspamd.com/configuration/logging/
|
||||||
|
## @param rspamd_logging_enabled Create `logging.inc.conf`.
|
||||||
|
## @param rspamd_logging_filename Path to log file for logging. Require logging_type `file`.
|
||||||
|
## @param rspamd_logging_level Log level. Allowed values: `error`, `warning`, `notice`, `info`, `silent` and `debug`.
|
||||||
|
## @param rspamd_logging_type Log type. Allowed values: `console`, `file` and `syslog`.
|
||||||
|
rspamd_logging_enabled: true
|
||||||
|
rspamd_logging_filename: ""
|
||||||
|
rspamd_logging_level: "info"
|
||||||
|
rspamd_logging_type: "syslog"
|
||||||
|
|
||||||
|
## @section Redis
|
||||||
|
## https://docs.rspamd.com/configuration/redis/#available-redis-options
|
||||||
|
## @param rspamd_redis_enabled Create `redis.conf`.
|
||||||
|
## @param rspamd_redis_database Number of redis database.
|
||||||
|
## @param rspamd_redis_password Password to connect to redis.
|
||||||
|
## @param rspamd_redis_username Username to connect to redis.
|
||||||
|
## @param rspamd_redis_servers List of upstream redis server for read and write requests.
|
||||||
|
## @param rspamd_redis_read_servers List of redis servers for read requests. Usually redis replication instances.
|
||||||
|
## @param rspamd_redis_timeout Timeout in seconds to get reply from redis. For example `0.5s`, `1min`.
|
||||||
|
## @param rspamd_redis_write_servers List of redis servers for write requests. Usually redis primary instances.
|
||||||
|
## @param rspamd_redis_disabled_modules List of disabled modules.
|
||||||
|
rspamd_redis_enabled: false
|
||||||
|
rspamd_redis_database: "0"
|
||||||
|
rspamd_redis_password: ""
|
||||||
|
rspamd_redis_username: ""
|
||||||
|
rspamd_redis_servers: []
|
||||||
|
# - "redis.example.local"
|
||||||
|
rspamd_redis_read_servers: []
|
||||||
|
# - "replica-0.redis.example.local"
|
||||||
|
# - "replica-1.redis.example.local"
|
||||||
|
rspamd_redis_timeout: "5s"
|
||||||
|
rspamd_redis_write_servers: []
|
||||||
|
# - "primary-0.redis.example.local"
|
||||||
|
# - "primary-1.redis.example.local"
|
||||||
|
rspamd_redis_disabled_modules: []
|
||||||
|
# - "ratelimit"
|
||||||
|
|
||||||
|
## @section Worker Controller
|
||||||
|
## https://docs.rspamd.com/workers/#common-worker-options
|
||||||
|
## @param rspamd_worker_controller_enabled Create `worker-controller.conf`.
|
||||||
|
## @param rspamd_worker_controller_read_password Password required for read-only commands.
|
||||||
|
## @param rspamd_worker_controller_read_password Password required for write (privileged) commands.
|
||||||
|
## @param rspamd_worker_controller_secure_ips List of secure IP-Addresses for password-less access. If using a reverse proxy with X-Forwarded-For, include both proxy and client IPs.
|
||||||
|
## @param rspamd_worker_controller_ssl_cert Path to PEM certificate file (required when using ssl bind sockets).
|
||||||
|
## @param rspamd_worker_controller_ssl_key Path to PEM private key file (required when using ssl bind sockets).
|
||||||
|
rspamd_worker_controller_enabled: false
|
||||||
|
rspamd_worker_controller_bind_socket: "localhost:11334"
|
||||||
|
rspamd_worker_controller_read_password: ""
|
||||||
|
rspamd_worker_controller_write_password: ""
|
||||||
|
rspamd_worker_controller_secure_ips:
|
||||||
|
- "localhost"
|
||||||
|
rspamd_worker_controller_ssl_cert: ""
|
||||||
|
rspamd_worker_controller_ssl_key: ""
|
||||||
|
|
||||||
|
## @section Drop-In directories
|
||||||
|
## @param rspamd_local_d_dir Drop-In directory to customize rspamd configurations.
|
||||||
|
## @param rspamd_modules_d_dir Drop-In directory to customize rspamd modules.
|
||||||
|
## @param rspamd_override_d_dir Drop-In directory to customize rspamd plugins.
|
||||||
|
## @param rspamd_plugins_d_dir Drop-In directory to override rspamd configurations.
|
||||||
|
rspamd_local_d_dir: "/etc/rspamd/local.d"
|
||||||
|
rspamd_modules_d_dir: "/etc/rspamd/modules.d"
|
||||||
|
rspamd_override_d_dir: "/etc/rspamd/override.d"
|
||||||
|
rspamd_plugins_d_dir: "/etc/rspamd/plugins.d"
|
||||||
11
handlers/main.yaml
Normal file
11
handlers/main.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Restart rspamd
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: rspamd
|
||||||
|
state: restarted
|
||||||
|
|
||||||
|
- name: Restart nginx
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: nginx
|
||||||
|
state: restarted
|
||||||
9
renovate.json
Normal file
9
renovate.json
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
{
|
||||||
|
"$schema": "https://docs.renovatebot.com/renovate-schema.json",
|
||||||
|
"extends": [
|
||||||
|
"local>volker.raschek/renovate-config:default#master",
|
||||||
|
"local>volker.raschek/renovate-config:container#master",
|
||||||
|
"local>volker.raschek/renovate-config:actions#master",
|
||||||
|
"local>volker.raschek/renovate-config:regexp#master"
|
||||||
|
]
|
||||||
|
}
|
||||||
48
tasks/dkim_create.yaml
Normal file
48
tasks/dkim_create.yaml
Normal file
@@ -0,0 +1,48 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Create directory for dkim keys"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_dkim_dir }}"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0755"
|
||||||
|
state: "directory"
|
||||||
|
|
||||||
|
- name: "Generate dkim keys"
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: "bash -c \"rspamadm dkim_keygen -b 2048 -s {{ item.selector }} -k {{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.key > {{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.txt\""
|
||||||
|
creates: "{{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.txt"
|
||||||
|
with_items: "{{ rspamd_dkim_domains }}"
|
||||||
|
notify: Restart rspamd
|
||||||
|
|
||||||
|
- name: "Change ownership for dkim key files"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.txt"
|
||||||
|
owner: "{{ rspamd_unix_user }}"
|
||||||
|
group: "{{ rspamd_unix_group }}"
|
||||||
|
mode: "0440"
|
||||||
|
with_items: "{{ rspamd_dkim_domains }}"
|
||||||
|
|
||||||
|
- name: "Change ownership for dkim dns record files"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.key"
|
||||||
|
owner: "{{ rspamd_unix_user }}"
|
||||||
|
group: "{{ rspamd_unix_group }}"
|
||||||
|
mode: "0440"
|
||||||
|
with_items: "{{ rspamd_dkim_domains }}"
|
||||||
|
|
||||||
|
- name: "Create dkim_signing.conf"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/dkim_signing.conf.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/dkim_signing.conf"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
|
|
||||||
|
- name: Link ARC module to same DKIM configuration
|
||||||
|
ansible.builtin.file:
|
||||||
|
src: "{{ rspamd_local_d_dir }}/dkim_signing.conf"
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/arc.conf"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
state: link
|
||||||
11
tasks/dkim_delete.yaml
Normal file
11
tasks/dkim_delete.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Delete directory for dkim keys"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_dkim_dir }}"
|
||||||
|
state: "absent"
|
||||||
|
|
||||||
|
- name: "Delete dkim_signing.conf"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_local_d_dir }}/dkim_signing.conf"
|
||||||
|
state: "absent"
|
||||||
9
tasks/logging_create.yaml
Normal file
9
tasks/logging_create.yaml
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Create logging.inc"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/logging.inc.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/logging.inc"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
6
tasks/logging_delete.yaml
Normal file
6
tasks/logging_delete.yaml
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Delete logging.inc"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_local_d_dir }}/logging.inc"
|
||||||
|
state: "absent"
|
||||||
121
tasks/main.yaml
Normal file
121
tasks/main.yaml
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Include OS-specific variables
|
||||||
|
tags: [ letsencrypt-hooks ]
|
||||||
|
ansible.builtin.include_vars: "{{ lookup('first_found', params) }}"
|
||||||
|
vars:
|
||||||
|
params:
|
||||||
|
files:
|
||||||
|
- "{{ ansible_facts['distribution'] }}_{{ ansible_facts['architecture'] }}.yaml"
|
||||||
|
- "{{ ansible_facts['distribution'] }}.yaml"
|
||||||
|
- "{{ ansible_facts['os_family'] }}_{{ ansible_facts['architecture'] }}.yaml"
|
||||||
|
- "{{ ansible_facts['os_family'] }}.yaml"
|
||||||
|
- main.yaml
|
||||||
|
paths:
|
||||||
|
- vars
|
||||||
|
|
||||||
|
- name: Install rspamd
|
||||||
|
ansible.builtin.package:
|
||||||
|
name: rspamd
|
||||||
|
state: "present"
|
||||||
|
|
||||||
|
- name: Create directory for custom rspamd configurations
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0755"
|
||||||
|
state: directory
|
||||||
|
with_items:
|
||||||
|
- "{{ rspamd_local_d_dir }}"
|
||||||
|
- "{{ rspamd_modules_d_dir }}"
|
||||||
|
- "{{ rspamd_override_d_dir }}"
|
||||||
|
- "{{ rspamd_plugins_d_dir }}"
|
||||||
|
|
||||||
|
- name: Manage dkim configuration
|
||||||
|
notify:
|
||||||
|
- Restart rspamd
|
||||||
|
block:
|
||||||
|
- name: Create dkim configuration
|
||||||
|
when: rspamd_dkim_enabled
|
||||||
|
ansible.builtin.include_tasks: dkim_create.yaml
|
||||||
|
- name: Delete dkim configuration
|
||||||
|
when: not rspamd_dkim_enabled
|
||||||
|
ansible.builtin.include_tasks: dkim_delete.yaml
|
||||||
|
|
||||||
|
- name: Manage logging configuration
|
||||||
|
notify:
|
||||||
|
- Restart rspamd
|
||||||
|
block:
|
||||||
|
- name: Create logging configuration
|
||||||
|
when: rspamd_logging_enabled
|
||||||
|
ansible.builtin.include_tasks: logging_create.yaml
|
||||||
|
- name: Delete logging configuration
|
||||||
|
when: not rspamd_logging_enabled
|
||||||
|
ansible.builtin.include_tasks: logging_delete.yaml
|
||||||
|
|
||||||
|
- name: Manage multimaps
|
||||||
|
ansible.builtin.include_tasks: multimaps.yaml
|
||||||
|
|
||||||
|
- name: Manage redis configuration
|
||||||
|
notify:
|
||||||
|
- Restart rspamd
|
||||||
|
block:
|
||||||
|
- name: Create redis configuration
|
||||||
|
when: rspamd_redis_enabled
|
||||||
|
ansible.builtin.include_tasks: redis_create.yaml
|
||||||
|
- name: Delete redis configuration
|
||||||
|
when: not rspamd_redis_enabled
|
||||||
|
ansible.builtin.include_tasks: redis_delete.yaml
|
||||||
|
|
||||||
|
- name: Manage worker controller
|
||||||
|
notify:
|
||||||
|
- Restart rspamd
|
||||||
|
block:
|
||||||
|
- name: Create worker controller configuration
|
||||||
|
when: rspamd_worker_controller_enabled
|
||||||
|
ansible.builtin.include_tasks: worker_controller_create.yaml
|
||||||
|
- name: Delete worker controller configuration
|
||||||
|
when: not rspamd_worker_controller_enabled
|
||||||
|
ansible.builtin.include_tasks: worker_controller_delete.yaml
|
||||||
|
|
||||||
|
- name: Template local.d files
|
||||||
|
vars:
|
||||||
|
selector_name: "{{ rspamd_dkim_selector_name | default('2020') }}"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ item }}.j2"
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/{{ item | basename }}"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
|
with_items:
|
||||||
|
- etc/rspamd/local.d/classifier-bayes.conf
|
||||||
|
- etc/rspamd/local.d/milter_headers.conf
|
||||||
|
- etc/rspamd/local.d/options.inc
|
||||||
|
notify:
|
||||||
|
- Restart rspamd
|
||||||
|
|
||||||
|
- name: Template override.d files
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ item }}.j2"
|
||||||
|
dest: "{{ rspamd_override_d_dir }}/{{ item | basename }}"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
|
with_items:
|
||||||
|
- etc/rspamd/override.d/classifier-bayes.conf
|
||||||
|
notify:
|
||||||
|
- Restart rspamd
|
||||||
|
|
||||||
|
- name: Test rspamd configuration
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: rspamadm configtest --strict --config /etc/rspamd/rspamd.conf
|
||||||
|
register: _rspamd_rspamadm_configtest
|
||||||
|
changed_when: false
|
||||||
|
failed_when: _rspamd_rspamadm_configtest.rc > 0
|
||||||
|
|
||||||
|
- name: Start and enable rspamd
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: rspamd
|
||||||
|
state: started
|
||||||
|
enabled: true
|
||||||
73
tasks/multimaps.yaml
Normal file
73
tasks/multimaps.yaml
Normal file
@@ -0,0 +1,73 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Create multimap.conf"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/multimap.conf.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/multimap.conf"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
|
|
||||||
|
- name: "Manage sender based allowlist"
|
||||||
|
block:
|
||||||
|
- name: "Create sender based allowlist"
|
||||||
|
when: rspamd_acl_allowlist_from | length > 0
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/allowlist_from.map.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/allowlist_from.map"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
|
- name: "Delete sender based allowlist"
|
||||||
|
when: rspamd_acl_allowlist_from | length == 0
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_local_d_dir }}/allowlist_from.map"
|
||||||
|
state: "absent"
|
||||||
|
|
||||||
|
- name: "Manage ip based allowlist"
|
||||||
|
block:
|
||||||
|
- name: "Create ip based allowlist"
|
||||||
|
when: rspamd_acl_allowlist_ips | length > 0
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/allowlist_ips.map.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/allowlist_ips.map"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
|
- name: "Delete ip based allowlist"
|
||||||
|
when: rspamd_acl_allowlist_ips | length == 0
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_local_d_dir }}/allowlist_ips.map"
|
||||||
|
state: "absent"
|
||||||
|
|
||||||
|
- name: "Manage sender based blocklist"
|
||||||
|
block:
|
||||||
|
- name: "Create sender based blocklist"
|
||||||
|
when: rspamd_acl_blocklist_from | length > 0
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/blocklist_from.map.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/blocklist_from.map"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
|
- name: "Delete sender based blocklist"
|
||||||
|
when: rspamd_acl_blocklist_from | length == 0
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_local_d_dir }}/blocklist_from.map"
|
||||||
|
state: "absent"
|
||||||
|
|
||||||
|
- name: "Manage ip based blocklist"
|
||||||
|
block:
|
||||||
|
- name: "Create ip based blocklist"
|
||||||
|
when: rspamd_acl_blocklist_ips | length > 0
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/blocklist_ips.map.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/blocklist_ips.map"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
|
- name: "Delete ip based blocklist"
|
||||||
|
when: rspamd_acl_blocklist_ips | length == 0
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_local_d_dir }}/blocklist_ips.map"
|
||||||
|
state: "absent"
|
||||||
9
tasks/redis_create.yaml
Normal file
9
tasks/redis_create.yaml
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Create redis.conf"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/redis.conf.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/redis.conf"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
6
tasks/redis_delete.yaml
Normal file
6
tasks/redis_delete.yaml
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Delete redis.conf"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_local_d_dir }}/redis.conf"
|
||||||
|
state: "absent"
|
||||||
23
tasks/worker_controller_create.yaml
Normal file
23
tasks/worker_controller_create.yaml
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Generate salted read password
|
||||||
|
when: rspamd_worker_controller_read_password | length > 0
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: "rspamadm pw --password {{ rspamd_worker_controller_read_password }}"
|
||||||
|
changed_when: false
|
||||||
|
register: rspamd_worker_controller_read_password_salted
|
||||||
|
|
||||||
|
- name: Generate salted write password
|
||||||
|
when: rspamd_worker_controller_write_password | length > 0
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: "rspamadm pw --password {{ rspamd_worker_controller_write_password }}"
|
||||||
|
changed_when: false
|
||||||
|
register: rspamd_worker_controller_write_password_salted
|
||||||
|
|
||||||
|
- name: "Create worker-controller.inc"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: etc/rspamd/local.d/worker-controller.inc.j2
|
||||||
|
dest: "{{ rspamd_local_d_dir }}/worker-controller.inc"
|
||||||
|
owner: "root"
|
||||||
|
group: "root"
|
||||||
|
mode: "0644"
|
||||||
6
tasks/worker_controller_delete.yaml
Normal file
6
tasks/worker_controller_delete.yaml
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: "Delete worker-controller.inc"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ rspamd_local_d_dir }}/worker-controller.inc"
|
||||||
|
state: "absent"
|
||||||
6
templates/etc/rspamd/local.d/allowlist_from.map.j2
Normal file
6
templates/etc/rspamd/local.d/allowlist_from.map.j2
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
{% for item in rspamd_acl_allowlist_from %}
|
||||||
|
{{ item.from }}
|
||||||
|
{% endfor %}
|
||||||
6
templates/etc/rspamd/local.d/allowlist_ips.map.j2
Normal file
6
templates/etc/rspamd/local.d/allowlist_ips.map.j2
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
{% for item in rspamd_acl_allowlist_ips %}
|
||||||
|
{{ item.ip }}
|
||||||
|
{% endfor %}
|
||||||
6
templates/etc/rspamd/local.d/blocklist_from.map.j2
Normal file
6
templates/etc/rspamd/local.d/blocklist_from.map.j2
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
{% for item in rspamd_acl_blocklist_from %}
|
||||||
|
{{ item.from }}
|
||||||
|
{% endfor %}
|
||||||
6
templates/etc/rspamd/local.d/blocklist_ips.map.j2
Normal file
6
templates/etc/rspamd/local.d/blocklist_ips.map.j2
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
{% for item in rspamd_acl_blocklist_ips %}
|
||||||
|
{{ item.ip }}
|
||||||
|
{% endfor %}
|
||||||
5
templates/etc/rspamd/local.d/classifier-bayes.conf.j2
Normal file
5
templates/etc/rspamd/local.d/classifier-bayes.conf.j2
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
|
||||||
|
backend = "redis";
|
||||||
23
templates/etc/rspamd/local.d/dkim_signing.conf.j2
Normal file
23
templates/etc/rspamd/local.d/dkim_signing.conf.j2
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
|
||||||
|
#
|
||||||
|
# Documentation: https://rspamd.com/doc/modules/dkim_signing.html#configuration
|
||||||
|
#
|
||||||
|
|
||||||
|
# Default DKIM Keys
|
||||||
|
# selector = "";
|
||||||
|
# path = "";
|
||||||
|
|
||||||
|
allow_username_mismatch = {{ rspamd_dkim_allow_username_mismatch | lower }};
|
||||||
|
|
||||||
|
# Domain specific settings
|
||||||
|
domain {
|
||||||
|
{% for dkim_domain in rspamd_dkim_domains %}
|
||||||
|
{{ dkim_domain.name }} {
|
||||||
|
path = "{{ rspamd_dkim_dir }}/{{ dkim_domain.name }}.{{ dkim_domain.selector }}.key";
|
||||||
|
selector = "{{ dkim_domain.selector }}";
|
||||||
|
}
|
||||||
|
{% endfor %}
|
||||||
|
}
|
||||||
9
templates/etc/rspamd/local.d/logging.inc.j2
Normal file
9
templates/etc/rspamd/local.d/logging.inc.j2
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
|
||||||
|
{% if rspamd_logging_type == "file" and rspamd_logging_filename | length > 0 %}
|
||||||
|
filename = "{{ rspamd_logging_filename }}";
|
||||||
|
{% endif %}
|
||||||
|
level = "{{ rspamd_logging_level }}";
|
||||||
|
type = "{{ rspamd_logging_type}}";
|
||||||
13
templates/etc/rspamd/local.d/milter_headers.conf.j2
Normal file
13
templates/etc/rspamd/local.d/milter_headers.conf.j2
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
|
||||||
|
authenticated_headers = [
|
||||||
|
"authentication-results",
|
||||||
|
];
|
||||||
|
|
||||||
|
use = [
|
||||||
|
"x-spamd-bar",
|
||||||
|
"x-spam-level",
|
||||||
|
"authentication-results",
|
||||||
|
];
|
||||||
39
templates/etc/rspamd/local.d/multimap.conf.j2
Normal file
39
templates/etc/rspamd/local.d/multimap.conf.j2
Normal file
@@ -0,0 +1,39 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
{% if rspamd_acl_blocklist_from | length > 0 %}
|
||||||
|
BLACKLIST_FROM {
|
||||||
|
type = "from";
|
||||||
|
map = "$CONFDIR/local.d/blocklist_from.map";
|
||||||
|
description = "Local from blocklist";
|
||||||
|
action = "reject";
|
||||||
|
}
|
||||||
|
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_acl_blocklist_ips | length > 0 %}
|
||||||
|
BLACKLIST_IP {
|
||||||
|
type = "ip";
|
||||||
|
map = "$CONFDIR/local.d/blocklist_ips.map";
|
||||||
|
description = "Local ip blocklist";
|
||||||
|
action = "reject";
|
||||||
|
}
|
||||||
|
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_acl_allowlist_from | length > 0 %}
|
||||||
|
WHITELIST_FROM {
|
||||||
|
type = "from";
|
||||||
|
map = "$CONFDIR/local.d/allowlist_from.map";
|
||||||
|
description = "Local from allowlist";
|
||||||
|
action = "accept";
|
||||||
|
}
|
||||||
|
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_acl_allowlist_ips | length > 0 %}
|
||||||
|
WHITELIST_IP {
|
||||||
|
type = "ip";
|
||||||
|
map = "$CONFDIR/local.d/allowlist_ips.map";
|
||||||
|
description = "Local ip allowlist";
|
||||||
|
action = "accept";
|
||||||
|
}
|
||||||
|
|
||||||
|
{% endif %}
|
||||||
10
templates/etc/rspamd/local.d/options.inc.j2
Normal file
10
templates/etc/rspamd/local.d/options.inc.j2
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
|
||||||
|
{% if rspamd_dns_server is defined and rspamd_dns_servers | length > 0 %}
|
||||||
|
dns {
|
||||||
|
nameserver = "{{ rspamd_dns_server }}";
|
||||||
|
}
|
||||||
|
{% endif %}
|
||||||
|
enable_test_patterns = true;
|
||||||
27
templates/etc/rspamd/local.d/redis.conf.j2
Normal file
27
templates/etc/rspamd/local.d/redis.conf.j2
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
#jinja2: lstrip_blocks: True, trim_blocks: True
|
||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
|
||||||
|
db = {{ rspamd_redis_database }};
|
||||||
|
{% if rspamd_redis_disabled_modules | length > 0 %}
|
||||||
|
disabled_modules = [
|
||||||
|
{% for item in rspamd_redis_disabled_modules %}
|
||||||
|
"{{ item }}",
|
||||||
|
{% endfor %}
|
||||||
|
];
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_redis_password | length > 0 %}
|
||||||
|
password = "{{ rspamd_redis_password }}";
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_redis_username| length > 0 %}
|
||||||
|
username = "{{ rspamd_redis_username }}";
|
||||||
|
{% endif %}
|
||||||
|
servers = "{{ rspamd_redis_servers | join(',') }}";
|
||||||
|
{% if rspamd_redis_read_servers | length > 0 %}
|
||||||
|
read_servers = "{{ rspamd_redis_read_servers | join(',') }}";
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_redis_write_servers | length > 0 %}
|
||||||
|
write_servers = "{{ rspamd_redis_write_servers | join(',') }}";
|
||||||
|
{% endif %}
|
||||||
|
timeout = {{ rspamd_redis_timeout }};
|
||||||
22
templates/etc/rspamd/local.d/worker-controller.inc.j2
Normal file
22
templates/etc/rspamd/local.d/worker-controller.inc.j2
Normal file
@@ -0,0 +1,22 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
|
||||||
|
{% if rspamd_worker_controller_bind_socket | length > 0 %}
|
||||||
|
bind_socket = "{{ rspamd_worker_controller_bind_socket }}";
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_worker_controller_write_password_salted.stdout is defined and rspamd_worker_controller_write_password_salted.stdout | length > 0 %}
|
||||||
|
enable_password = "{{ rspamd_worker_controller_write_password_salted.stdout }}";
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_worker_controller_read_password_salted.stdout is defined and rspamd_worker_controller_read_password_salted.stdout | length > 0 %}
|
||||||
|
password = "{{ rspamd_worker_controller_read_password_salted.stdout }}";
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_worker_controller_secure_ips | length > 0 %}
|
||||||
|
secure_ip = "{{ rspamd_worker_controller_secure_ips | join(',') }}";
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_worker_controller_ssl_cert | length > 0 %}
|
||||||
|
ssl_cert = "{{ rspamd_worker_controller_ssl_cert }}";
|
||||||
|
{% endif %}
|
||||||
|
{% if rspamd_worker_controller_ssl_key | length > 0 %}
|
||||||
|
ssl_key = "{{ rspamd_worker_controller_ssl_key }}";
|
||||||
|
{% endif %}
|
||||||
5
templates/etc/rspamd/override.d/classifier-bayes.conf.j2
Normal file
5
templates/etc/rspamd/override.d/classifier-bayes.conf.j2
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
#
|
||||||
|
# {{ ansible_managed }}
|
||||||
|
#
|
||||||
|
|
||||||
|
autolearn = true;
|
||||||
4
vars/Archlinux.yaml
Normal file
4
vars/Archlinux.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
rspamd_unix_user: rspamd
|
||||||
|
rspamd_unix_group: rspamd
|
||||||
Reference in New Issue
Block a user