You've already forked ansible-role-rspamd
Initial Commit
This commit is contained in:
4
.ansible-lint
Normal file
4
.ansible-lint
Normal file
@@ -0,0 +1,4 @@
|
||||
---
|
||||
|
||||
exclude_paths:
|
||||
- .gitea/
|
||||
12
.editorconfig
Normal file
12
.editorconfig
Normal file
@@ -0,0 +1,12 @@
|
||||
# EditorConfig is awesome: https://EditorConfig.org
|
||||
|
||||
# top-most EditorConfig file
|
||||
root = true
|
||||
|
||||
[*]
|
||||
indent_style = space
|
||||
indent_size = 2
|
||||
end_of_line = lf
|
||||
charset = utf-8
|
||||
trim_trailing_whitespace = true
|
||||
insert_final_newline = false
|
||||
20
.gitea/workflows/ansible-linters.yaml
Normal file
20
.gitea/workflows/ansible-linters.yaml
Normal file
@@ -0,0 +1,20 @@
|
||||
name: Ansible Linter
|
||||
|
||||
on:
|
||||
pull_request:
|
||||
types: [ "opened", "reopened", "synchronize" ]
|
||||
push:
|
||||
branches: [ '**' ]
|
||||
tags-ignore: [ '**' ]
|
||||
|
||||
jobs:
|
||||
ansible-lint:
|
||||
runs-on:
|
||||
- ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v6.0.2
|
||||
- name: Run ansible-lint
|
||||
uses: ansible/ansible-lint@v26.2.0
|
||||
with:
|
||||
args: "--config-file .ansible-lint"
|
||||
setup_python: "true"
|
||||
18
.gitea/workflows/markdown-linters.yaml
Normal file
18
.gitea/workflows/markdown-linters.yaml
Normal file
@@ -0,0 +1,18 @@
|
||||
name: Lint Markdown files
|
||||
|
||||
on:
|
||||
pull_request:
|
||||
types: [ "opened", "reopened", "synchronize" ]
|
||||
push:
|
||||
branches: [ '**' ]
|
||||
tags-ignore: [ '**' ]
|
||||
|
||||
jobs:
|
||||
markdown-lint:
|
||||
runs-on:
|
||||
- ubuntu-latest
|
||||
steps:
|
||||
- uses: actions/checkout@v6.0.2
|
||||
- uses: DavidAnson/markdownlint-cli2-action@v21.0.0
|
||||
with:
|
||||
globs: '**/*.md'
|
||||
22
.gitea/workflows/release.yaml
Normal file
22
.gitea/workflows/release.yaml
Normal file
@@ -0,0 +1,22 @@
|
||||
name: Release Ansible Role
|
||||
|
||||
on:
|
||||
push:
|
||||
tags:
|
||||
- '**'
|
||||
workflow_dispatch: {}
|
||||
|
||||
jobs:
|
||||
release:
|
||||
name: Release Ansible Role
|
||||
runs-on: ubuntu-latest
|
||||
steps:
|
||||
- name: Install Ansible Galaxy
|
||||
run: |
|
||||
apt update --yes
|
||||
apt install --yes ansible
|
||||
- env:
|
||||
ANSIBLE_GALAXY_TOKEN: ${{ secrets.ANSIBLE_GALAXY_TOKEN }}
|
||||
name: Update Ansible Role in Ansible Galaxy
|
||||
run: |
|
||||
ansible-galaxy role import --token=${ANSIBLE_GALAXY_TOKEN} volker-raschek ${GITHUB_REPOSITORY#*/}
|
||||
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
.ansible
|
||||
137
.markdownlint.yaml
Normal file
137
.markdownlint.yaml
Normal file
@@ -0,0 +1,137 @@
|
||||
# markdownlint YAML configuration
|
||||
# https://github.com/DavidAnson/markdownlint/blob/main/schema/.markdownlint.yaml
|
||||
|
||||
# Default state for all rules
|
||||
default: true
|
||||
|
||||
# Path to configuration file to extend
|
||||
extends: null
|
||||
|
||||
# MD003/heading-style/header-style - Heading style
|
||||
MD003:
|
||||
# Heading style
|
||||
style: "atx"
|
||||
|
||||
# MD004/ul-style - Unordered list style
|
||||
MD004:
|
||||
style: "dash"
|
||||
|
||||
# MD007/ul-indent - Unordered list indentation
|
||||
MD007:
|
||||
# Spaces for indent
|
||||
indent: 2
|
||||
# Whether to indent the first level of the list
|
||||
start_indented: false
|
||||
|
||||
# MD009/no-trailing-spaces - Trailing spaces
|
||||
MD009:
|
||||
# Spaces for line break
|
||||
br_spaces: 2
|
||||
# Allow spaces for empty lines in list items
|
||||
list_item_empty_lines: false
|
||||
# Include unnecessary breaks
|
||||
strict: false
|
||||
|
||||
# MD010/no-hard-tabs - Hard tabs
|
||||
MD010:
|
||||
# Include code blocks
|
||||
code_blocks: true
|
||||
|
||||
# MD012/no-multiple-blanks - Multiple consecutive blank lines
|
||||
MD012:
|
||||
# Consecutive blank lines
|
||||
maximum: 1
|
||||
|
||||
# MD013/line-length - Line length
|
||||
MD013:
|
||||
# Number of characters
|
||||
line_length: 120
|
||||
# Number of characters for headings
|
||||
heading_line_length: 120
|
||||
# Number of characters for code blocks
|
||||
code_block_line_length: 120
|
||||
# Include code blocks
|
||||
code_blocks: false
|
||||
# Include tables
|
||||
tables: false
|
||||
# Include headings
|
||||
headings: true
|
||||
# Strict length checking
|
||||
strict: false
|
||||
# Stern length checking
|
||||
stern: false
|
||||
|
||||
# MD022/blanks-around-headings/blanks-around-headers - Headings should be surrounded by blank lines
|
||||
MD022:
|
||||
# Blank lines above heading
|
||||
lines_above: 1
|
||||
# Blank lines below heading
|
||||
lines_below: 1
|
||||
|
||||
# MD025/single-title/single-h1 - Multiple top-level headings in the same document
|
||||
MD025:
|
||||
# Heading level
|
||||
level: 1
|
||||
# RegExp for matching title in front matter
|
||||
front_matter_title: "^\\s*title\\s*[:=]"
|
||||
|
||||
# MD026/no-trailing-punctuation - Trailing punctuation in heading
|
||||
MD026:
|
||||
# Punctuation characters
|
||||
punctuation: ".,;:!。,;:!"
|
||||
|
||||
# MD029/ol-prefix - Ordered list item prefix
|
||||
MD029:
|
||||
# List style
|
||||
style: "one_or_ordered"
|
||||
|
||||
# MD030/list-marker-space - Spaces after list markers
|
||||
MD030:
|
||||
# Spaces for single-line unordered list items
|
||||
ul_single: 1
|
||||
# Spaces for single-line ordered list items
|
||||
ol_single: 1
|
||||
# Spaces for multi-line unordered list items
|
||||
ul_multi: 1
|
||||
# Spaces for multi-line ordered list items
|
||||
ol_multi: 1
|
||||
|
||||
# MD033/no-inline-html - Inline HTML
|
||||
MD033:
|
||||
# Allowed elements
|
||||
allowed_elements: []
|
||||
|
||||
# MD035/hr-style - Horizontal rule style
|
||||
MD035:
|
||||
# Horizontal rule style
|
||||
style: "---"
|
||||
|
||||
# MD036/no-emphasis-as-heading/no-emphasis-as-header - Emphasis used instead of a heading
|
||||
MD036:
|
||||
# Punctuation characters
|
||||
punctuation: ".,;:!?。,;:!?"
|
||||
|
||||
# MD041/first-line-heading/first-line-h1 - First line in a file should be a top-level heading
|
||||
MD041:
|
||||
# Heading level
|
||||
level: 1
|
||||
# RegExp for matching title in front matter
|
||||
front_matter_title: "^\\s*title\\s*[:=]"
|
||||
|
||||
# MD044/proper-names - Proper names should have the correct capitalization
|
||||
MD044:
|
||||
# List of proper names
|
||||
names:
|
||||
- gitea
|
||||
# Include code blocks
|
||||
code_blocks: false
|
||||
|
||||
# MD046/code-block-style - Code block style
|
||||
MD046:
|
||||
# Block style
|
||||
style: "fenced"
|
||||
|
||||
# MD048/code-fence-style - Code fence style
|
||||
MD048:
|
||||
# Code fence syle
|
||||
style: "backtick"
|
||||
14
.vscode/settings.json
vendored
Normal file
14
.vscode/settings.json
vendored
Normal file
@@ -0,0 +1,14 @@
|
||||
{
|
||||
"ansible.python.interpreterPath": "/bin/python",
|
||||
"files.associations": {
|
||||
"**/.gitea/**/*.yml": "yaml",
|
||||
"**/.gitea/**/*.yaml": "yaml",
|
||||
"docker-compose*.yml": "dockercompose",
|
||||
"*.yml": "ansible",
|
||||
"*.yaml": "ansible",
|
||||
".yamllint": "yaml",
|
||||
".yamllint.yml": "yaml",
|
||||
".yamllint.yaml": "yaml"
|
||||
},
|
||||
"rewrap.wrappingColumn": 120
|
||||
}
|
||||
19
.yamllint.yaml
Normal file
19
.yamllint.yaml
Normal file
@@ -0,0 +1,19 @@
|
||||
---
|
||||
|
||||
#
|
||||
# Documentation:
|
||||
# https://yamllint.readthedocs.io/en/stable/
|
||||
#
|
||||
|
||||
rules:
|
||||
brackets:
|
||||
forbid: false
|
||||
min-spaces-inside: 0
|
||||
max-spaces-inside: 2
|
||||
min-spaces-inside-empty: 0
|
||||
max-spaces-inside-empty: 0
|
||||
indentation:
|
||||
spaces: 2
|
||||
indent-sequences: false
|
||||
line-length:
|
||||
max: 360
|
||||
20
LICENSE
Normal file
20
LICENSE
Normal file
@@ -0,0 +1,20 @@
|
||||
Copyright (c) 2022 Markus Pesch
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining
|
||||
a copy of this software and associated documentation files (the
|
||||
"Software"), to deal in the Software without restriction, including
|
||||
without limitation the rights to use, copy, modify, merge, publish,
|
||||
distribute, sublicense, and/or sell copies of the Software, and to
|
||||
permit persons to whom the Software is furnished to do so, subject to
|
||||
the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be
|
||||
included in all copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
||||
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
|
||||
NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE
|
||||
LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION
|
||||
OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION
|
||||
WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
||||
62
README.md
Normal file
62
README.md
Normal file
@@ -0,0 +1,62 @@
|
||||
# volker-raschek.rspamd
|
||||
|
||||

|
||||
|
||||
The ansible role `volker-raschek.rspamd` install rspamd - a spam milter. For example for Arch Linux, Fedora and Ubuntu.
|
||||
Furthermore, rspamd can be integration in some MTA's like postfix.
|
||||
|
||||
## Examples
|
||||
|
||||
The following configuration enables DKIM signature validation and redis as backend. Furthermore, it configures custom
|
||||
DNS servers for DNS queries.
|
||||
|
||||
```yaml
|
||||
## @param rspamd_dkim_enabled Create `dkim_sining.conf`.
|
||||
## @param rspamd_dkim_domains DKIM Domain configuration.
|
||||
rspamd_dkim_enabled: true
|
||||
rspamd_dkim_domains:
|
||||
- name: my.example.local
|
||||
selector: "2020"
|
||||
|
||||
## @section DNS
|
||||
## @param List of DNS servers used for DNS lookups.
|
||||
rspamd_dns_servers:
|
||||
- 8.8.4.4
|
||||
- 8.8.8.8
|
||||
|
||||
## @section Redis
|
||||
## https://docs.rspamd.com/configuration/redis/#available-redis-options
|
||||
## @param rspamd_redis_database Number of redis database.
|
||||
## @param rspamd_redis_password Password to connect to redis.
|
||||
## @param rspamd_redis_username Username to connect to redis.
|
||||
## @param rspamd_redis_servers List of upstream redis server for read and write requests.
|
||||
## @param rspamd_redis_timeout Timeout in seconds to get reply from redis. For example `0.5s`, `1min`.
|
||||
## @param rspamd_redis_disabled_modules List of disabled modules.
|
||||
rspamd_redis_enabled: true
|
||||
rspamd_redis_database: "0"
|
||||
rspamd_redis_password: "my-password"
|
||||
rspamd_redis_username: "my-username"
|
||||
rspamd_redis_servers:
|
||||
- "127.0.0.1"
|
||||
rspamd_redis_timeout: "5s"
|
||||
rspamd_redis_disabled_modules:
|
||||
- "ratelimit"
|
||||
```
|
||||
|
||||
## Further ansible roles
|
||||
|
||||
This ansible role is used in combination with other ansible roles of `volker-raschek`. You can search for the other
|
||||
ansible roles via the following command.
|
||||
|
||||
```bash
|
||||
$ ansible-galaxy role search --author "volker-raschek"
|
||||
|
||||
Found roles matching your search:
|
||||
|
||||
Name Description
|
||||
---- -----------
|
||||
volker-raschek.bind9 Role to install and configure bind9 on different distributions
|
||||
volker-raschek.dhcpd Role to install and configure dhcpd on different distributions
|
||||
volker-raschek.renovate Role to configure renovate as container image
|
||||
...
|
||||
```
|
||||
101
defaults/main.yaml
Normal file
101
defaults/main.yaml
Normal file
@@ -0,0 +1,101 @@
|
||||
---
|
||||
|
||||
## @section ACLs
|
||||
## @param rspamd_acl_allowlist_from Allow emails by sender.
|
||||
## @param rspamd_acl_allowlist_ips Allow emails by ip addresses.
|
||||
## @param rspamd_acl_blocklist_from Reject emails by sender.
|
||||
## @param rspamd_acl_blocklist_ips Reject emails by ip addresses.
|
||||
rspamd_acl_allowlist_from: []
|
||||
# - from: "max.mustermann@example.local"
|
||||
# - from: "*@example.local"
|
||||
rspamd_acl_allowlist_ips: []
|
||||
# - ip: "10.11.12.13"
|
||||
rspamd_acl_blocklist_from: []
|
||||
# - from: "max.mustermann@example.local"
|
||||
# - from: "*@example.local"
|
||||
rspamd_acl_blocklist_ips: []
|
||||
# - ip: "10.11.12.13"
|
||||
|
||||
|
||||
## @section DKIM Singing configuration
|
||||
## @param rspamd_dkim_enabled Create `dkim_sining.conf`.
|
||||
## @param rspamd_dkim_allow_username_mismatch Enable DKIM signing for alias sender addresses.
|
||||
## @param rspamd_dkim_directory Directory of the DKIM keys.
|
||||
## @param rspamd_dkim_domains DKIM Domain configuration.
|
||||
rspamd_dkim_enabled: false
|
||||
rspamd_dkim_allow_username_mismatch: false
|
||||
rspamd_dkim_dir: "/var/lib/rspamd/dkim"
|
||||
rspamd_dkim_domains: []
|
||||
# - name: example.local
|
||||
# selector: "2020"
|
||||
|
||||
## @section DNS
|
||||
## @param List of DNS servers used for DNS lookups.
|
||||
rspamd_dns_servers: []
|
||||
# - 8.8.4.4
|
||||
# - 8.8.8.8
|
||||
|
||||
## @section Logging configuration
|
||||
## https://docs.rspamd.com/configuration/logging/
|
||||
## @param rspamd_logging_enabled Create `logging.inc.conf`.
|
||||
## @param rspamd_logging_filename Path to log file for logging. Require logging_type `file`.
|
||||
## @param rspamd_logging_level Log level. Allowed values: `error`, `warning`, `notice`, `info`, `silent` and `debug`.
|
||||
## @param rspamd_logging_type Log type. Allowed values: `console`, `file` and `syslog`.
|
||||
rspamd_logging_enabled: true
|
||||
rspamd_logging_filename: ""
|
||||
rspamd_logging_level: "info"
|
||||
rspamd_logging_type: "syslog"
|
||||
|
||||
## @section Redis
|
||||
## https://docs.rspamd.com/configuration/redis/#available-redis-options
|
||||
## @param rspamd_redis_enabled Create `redis.conf`.
|
||||
## @param rspamd_redis_database Number of redis database.
|
||||
## @param rspamd_redis_password Password to connect to redis.
|
||||
## @param rspamd_redis_username Username to connect to redis.
|
||||
## @param rspamd_redis_servers List of upstream redis server for read and write requests.
|
||||
## @param rspamd_redis_read_servers List of redis servers for read requests. Usually redis replication instances.
|
||||
## @param rspamd_redis_timeout Timeout in seconds to get reply from redis. For example `0.5s`, `1min`.
|
||||
## @param rspamd_redis_write_servers List of redis servers for write requests. Usually redis primary instances.
|
||||
## @param rspamd_redis_disabled_modules List of disabled modules.
|
||||
rspamd_redis_enabled: false
|
||||
rspamd_redis_database: "0"
|
||||
rspamd_redis_password: ""
|
||||
rspamd_redis_username: ""
|
||||
rspamd_redis_servers: []
|
||||
# - "redis.example.local"
|
||||
rspamd_redis_read_servers: []
|
||||
# - "replica-0.redis.example.local"
|
||||
# - "replica-1.redis.example.local"
|
||||
rspamd_redis_timeout: "5s"
|
||||
rspamd_redis_write_servers: []
|
||||
# - "primary-0.redis.example.local"
|
||||
# - "primary-1.redis.example.local"
|
||||
rspamd_redis_disabled_modules: []
|
||||
# - "ratelimit"
|
||||
|
||||
## @section Worker Controller
|
||||
## https://docs.rspamd.com/workers/#common-worker-options
|
||||
## @param rspamd_worker_controller_enabled Create `worker-controller.conf`.
|
||||
## @param rspamd_worker_controller_read_password Password required for read-only commands.
|
||||
## @param rspamd_worker_controller_read_password Password required for write (privileged) commands.
|
||||
## @param rspamd_worker_controller_secure_ips List of secure IP-Addresses for password-less access. If using a reverse proxy with X-Forwarded-For, include both proxy and client IPs.
|
||||
## @param rspamd_worker_controller_ssl_cert Path to PEM certificate file (required when using ssl bind sockets).
|
||||
## @param rspamd_worker_controller_ssl_key Path to PEM private key file (required when using ssl bind sockets).
|
||||
rspamd_worker_controller_enabled: false
|
||||
rspamd_worker_controller_bind_socket: "localhost:11334"
|
||||
rspamd_worker_controller_read_password: ""
|
||||
rspamd_worker_controller_write_password: ""
|
||||
rspamd_worker_controller_secure_ips:
|
||||
- "localhost"
|
||||
rspamd_worker_controller_ssl_cert: ""
|
||||
rspamd_worker_controller_ssl_key: ""
|
||||
|
||||
## @section Drop-In directories
|
||||
## @param rspamd_local_d_dir Drop-In directory to customize rspamd configurations.
|
||||
## @param rspamd_modules_d_dir Drop-In directory to customize rspamd modules.
|
||||
## @param rspamd_override_d_dir Drop-In directory to customize rspamd plugins.
|
||||
## @param rspamd_plugins_d_dir Drop-In directory to override rspamd configurations.
|
||||
rspamd_local_d_dir: "/etc/rspamd/local.d"
|
||||
rspamd_modules_d_dir: "/etc/rspamd/modules.d"
|
||||
rspamd_override_d_dir: "/etc/rspamd/override.d"
|
||||
rspamd_plugins_d_dir: "/etc/rspamd/plugins.d"
|
||||
11
handlers/main.yaml
Normal file
11
handlers/main.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
---
|
||||
|
||||
- name: Restart rspamd
|
||||
ansible.builtin.systemd:
|
||||
name: rspamd
|
||||
state: restarted
|
||||
|
||||
- name: Restart nginx
|
||||
ansible.builtin.systemd:
|
||||
name: nginx
|
||||
state: restarted
|
||||
176
meta/argument_specs.yaml
Normal file
176
meta/argument_specs.yaml
Normal file
@@ -0,0 +1,176 @@
|
||||
---
|
||||
argument_specs:
|
||||
main:
|
||||
short_description: "Role to install and configure rspamd mail filter"
|
||||
description:
|
||||
- "This role configures rspamd with support for DKIM signing, Redis integration, logging, ACLs, and worker controller settings."
|
||||
author: "Markus Pesch"
|
||||
options:
|
||||
# ACLs
|
||||
rspamd_acl_allowlist_from:
|
||||
description: "Allow emails by sender."
|
||||
type: list
|
||||
elements: dict
|
||||
default: []
|
||||
rspamd_acl_allowlist_ips:
|
||||
description: "Allow emails by IP addresses."
|
||||
type: list
|
||||
elements: dict
|
||||
default: []
|
||||
rspamd_acl_blocklist_from:
|
||||
description: "Reject emails by sender."
|
||||
type: list
|
||||
elements: dict
|
||||
default: []
|
||||
rspamd_acl_blocklist_ips:
|
||||
description: "Reject emails by IP addresses."
|
||||
type: list
|
||||
elements: dict
|
||||
default: []
|
||||
|
||||
# DKIM Signing
|
||||
rspamd_dkim_enabled:
|
||||
description: "Create dkim_signing.conf."
|
||||
type: bool
|
||||
default: false
|
||||
rspamd_dkim_allow_username_mismatch:
|
||||
description: "Enable DKIM signing for alias sender addresses."
|
||||
type: bool
|
||||
default: false
|
||||
rspamd_dkim_dir:
|
||||
description: "Directory of the DKIM keys."
|
||||
type: str
|
||||
default: "/var/lib/rspamd/dkim"
|
||||
rspamd_dkim_domains:
|
||||
description: "DKIM Domain configuration."
|
||||
type: list
|
||||
elements: dict
|
||||
default: []
|
||||
|
||||
# DNS
|
||||
rspamd_dns_servers:
|
||||
description: "List of DNS servers used for DNS lookups."
|
||||
type: list
|
||||
elements: str
|
||||
default: []
|
||||
|
||||
# Logging
|
||||
rspamd_logging_enabled:
|
||||
description: "Create logging.inc.conf."
|
||||
type: bool
|
||||
default: true
|
||||
rspamd_logging_filename:
|
||||
description: "Path to log file for logging. Requires logging_type 'file'."
|
||||
type: str
|
||||
default: ""
|
||||
rspamd_logging_level:
|
||||
description: "Log level."
|
||||
type: str
|
||||
default: "info"
|
||||
choices:
|
||||
- error
|
||||
- warning
|
||||
- notice
|
||||
- info
|
||||
- silent
|
||||
- debug
|
||||
rspamd_logging_type:
|
||||
description: "Log type."
|
||||
type: str
|
||||
default: "syslog"
|
||||
choices:
|
||||
- console
|
||||
- file
|
||||
- syslog
|
||||
|
||||
# Redis
|
||||
rspamd_redis_enabled:
|
||||
description: "Create redis.conf."
|
||||
type: bool
|
||||
default: false
|
||||
rspamd_redis_database:
|
||||
description: "Number of redis database."
|
||||
type: str
|
||||
default: "0"
|
||||
rspamd_redis_password:
|
||||
description: "Password to connect to redis."
|
||||
type: str
|
||||
default: ""
|
||||
rspamd_redis_username:
|
||||
description: "Username to connect to redis."
|
||||
type: str
|
||||
default: ""
|
||||
rspamd_redis_servers:
|
||||
description: "List of upstream redis servers for read and write requests."
|
||||
type: list
|
||||
elements: str
|
||||
default: []
|
||||
rspamd_redis_read_servers:
|
||||
description: "List of redis servers for read requests. Usually redis replication instances."
|
||||
type: list
|
||||
elements: str
|
||||
default: []
|
||||
rspamd_redis_timeout:
|
||||
description: "Timeout in seconds to get reply from redis. For example '0.5s', '1min'."
|
||||
type: str
|
||||
default: "5s"
|
||||
rspamd_redis_write_servers:
|
||||
description: "List of redis servers for write requests. Usually redis primary instances."
|
||||
type: list
|
||||
elements: str
|
||||
default: []
|
||||
rspamd_redis_disabled_modules:
|
||||
description: "List of disabled modules."
|
||||
type: list
|
||||
elements: str
|
||||
default: []
|
||||
|
||||
# Worker Controller
|
||||
rspamd_worker_controller_enabled:
|
||||
description: "Create worker-controller.conf."
|
||||
type: bool
|
||||
default: false
|
||||
rspamd_worker_controller_bind_socket:
|
||||
description: "Bind socket for worker controller."
|
||||
type: str
|
||||
default: "localhost:11334"
|
||||
rspamd_worker_controller_read_password:
|
||||
description: "Password required for read-only commands."
|
||||
type: str
|
||||
default: ""
|
||||
rspamd_worker_controller_write_password:
|
||||
description: "Password required for write (privileged) commands."
|
||||
type: str
|
||||
default: ""
|
||||
rspamd_worker_controller_secure_ips:
|
||||
description: "List of secure IP addresses for password-less access. If using a reverse proxy with X-Forwarded-For, include both proxy and client IPs."
|
||||
type: list
|
||||
elements: str
|
||||
default:
|
||||
- localhost
|
||||
rspamd_worker_controller_ssl_cert:
|
||||
description: "Path to PEM certificate file (required when using ssl bind sockets)."
|
||||
type: str
|
||||
default: ""
|
||||
rspamd_worker_controller_ssl_key:
|
||||
description: "Path to PEM private key file (required when using ssl bind sockets)."
|
||||
type: str
|
||||
default: ""
|
||||
|
||||
# Drop-In directories
|
||||
rspamd_local_d_dir:
|
||||
description: "Drop-In directory to customize rspamd configurations."
|
||||
type: str
|
||||
default: "/etc/rspamd/local.d"
|
||||
rspamd_modules_d_dir:
|
||||
description: "Drop-In directory to customize rspamd modules."
|
||||
type: str
|
||||
default: "/etc/rspamd/modules.d"
|
||||
rspamd_override_d_dir:
|
||||
description: "Drop-In directory to override rspamd configurations."
|
||||
type: str
|
||||
default: "/etc/rspamd/override.d"
|
||||
rspamd_plugins_d_dir:
|
||||
description: "Drop-In directory to customize rspamd plugins."
|
||||
type: str
|
||||
default: "/etc/rspamd/plugins.d"
|
||||
28
meta/main.yaml
Normal file
28
meta/main.yaml
Normal file
@@ -0,0 +1,28 @@
|
||||
dependencies: []
|
||||
galaxy_info:
|
||||
author: "Markus Pesch"
|
||||
company: "Cryptic Systems"
|
||||
description: "Role to install and configure rspamd mail filter"
|
||||
galaxy_tags:
|
||||
- rspamd
|
||||
- mail
|
||||
- spam
|
||||
- filter
|
||||
- email
|
||||
license: "MIT"
|
||||
min_ansible_version: "2.9"
|
||||
namespace: volker-raschek
|
||||
platforms:
|
||||
- name: ArchLinux
|
||||
versions:
|
||||
- all
|
||||
- name: EL
|
||||
versions:
|
||||
- all
|
||||
- name: Fedora
|
||||
versions:
|
||||
- all
|
||||
- name: Ubuntu
|
||||
versions:
|
||||
- all
|
||||
role_name: "rspamd"
|
||||
9
renovate.json
Normal file
9
renovate.json
Normal file
@@ -0,0 +1,9 @@
|
||||
{
|
||||
"$schema": "https://docs.renovatebot.com/renovate-schema.json",
|
||||
"extends": [
|
||||
"local>volker.raschek/renovate-config:default#master",
|
||||
"local>volker.raschek/renovate-config:container#master",
|
||||
"local>volker.raschek/renovate-config:actions#master",
|
||||
"local>volker.raschek/renovate-config:regexp#master"
|
||||
]
|
||||
}
|
||||
48
tasks/dkim_create.yaml
Normal file
48
tasks/dkim_create.yaml
Normal file
@@ -0,0 +1,48 @@
|
||||
---
|
||||
|
||||
- name: "Create directory for dkim keys"
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_dkim_dir }}"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0755"
|
||||
state: "directory"
|
||||
|
||||
- name: "Generate dkim keys"
|
||||
ansible.builtin.command:
|
||||
cmd: "bash -c \"rspamadm dkim_keygen -b 2048 -s {{ item.selector }} -k {{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.key > {{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.txt\""
|
||||
creates: "{{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.txt"
|
||||
with_items: "{{ rspamd_dkim_domains }}"
|
||||
notify: Restart rspamd
|
||||
|
||||
- name: "Change ownership for dkim key files"
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.txt"
|
||||
owner: "{{ rspamd_unix_user }}"
|
||||
group: "{{ rspamd_unix_group }}"
|
||||
mode: "0440"
|
||||
with_items: "{{ rspamd_dkim_domains }}"
|
||||
|
||||
- name: "Change ownership for dkim dns record files"
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_dkim_dir }}/{{ item.name }}.{{ item.selector }}.key"
|
||||
owner: "{{ rspamd_unix_user }}"
|
||||
group: "{{ rspamd_unix_group }}"
|
||||
mode: "0440"
|
||||
with_items: "{{ rspamd_dkim_domains }}"
|
||||
|
||||
- name: "Create dkim_signing.conf"
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/dkim_signing.conf.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/dkim_signing.conf"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
|
||||
- name: Link ARC module to same DKIM configuration
|
||||
ansible.builtin.file:
|
||||
src: "{{ rspamd_local_d_dir }}/dkim_signing.conf"
|
||||
dest: "{{ rspamd_local_d_dir }}/arc.conf"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
state: link
|
||||
11
tasks/dkim_delete.yaml
Normal file
11
tasks/dkim_delete.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
---
|
||||
|
||||
- name: "Delete directory for dkim keys"
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_dkim_dir }}"
|
||||
state: "absent"
|
||||
|
||||
- name: "Delete dkim_signing.conf"
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_local_d_dir }}/dkim_signing.conf"
|
||||
state: "absent"
|
||||
9
tasks/logging_create.yaml
Normal file
9
tasks/logging_create.yaml
Normal file
@@ -0,0 +1,9 @@
|
||||
---
|
||||
|
||||
- name: "Create logging.inc"
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/logging.inc.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/logging.inc"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
6
tasks/logging_delete.yaml
Normal file
6
tasks/logging_delete.yaml
Normal file
@@ -0,0 +1,6 @@
|
||||
---
|
||||
|
||||
- name: "Delete logging.inc"
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_local_d_dir }}/logging.inc"
|
||||
state: "absent"
|
||||
121
tasks/main.yaml
Normal file
121
tasks/main.yaml
Normal file
@@ -0,0 +1,121 @@
|
||||
---
|
||||
|
||||
- name: Include OS-specific variables
|
||||
tags: [ letsencrypt-hooks ]
|
||||
ansible.builtin.include_vars: "{{ lookup('first_found', params) }}"
|
||||
vars:
|
||||
params:
|
||||
files:
|
||||
- "{{ ansible_facts['distribution'] }}_{{ ansible_facts['architecture'] }}.yaml"
|
||||
- "{{ ansible_facts['distribution'] }}.yaml"
|
||||
- "{{ ansible_facts['os_family'] }}_{{ ansible_facts['architecture'] }}.yaml"
|
||||
- "{{ ansible_facts['os_family'] }}.yaml"
|
||||
- main.yaml
|
||||
paths:
|
||||
- vars
|
||||
|
||||
- name: Install rspamd
|
||||
ansible.builtin.package:
|
||||
name: rspamd
|
||||
state: "present"
|
||||
|
||||
- name: Create directory for custom rspamd configurations
|
||||
ansible.builtin.file:
|
||||
path: "{{ item }}"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0755"
|
||||
state: directory
|
||||
with_items:
|
||||
- "{{ rspamd_local_d_dir }}"
|
||||
- "{{ rspamd_modules_d_dir }}"
|
||||
- "{{ rspamd_override_d_dir }}"
|
||||
- "{{ rspamd_plugins_d_dir }}"
|
||||
|
||||
- name: Manage dkim configuration
|
||||
notify:
|
||||
- Restart rspamd
|
||||
block:
|
||||
- name: Create dkim configuration
|
||||
when: rspamd_dkim_enabled
|
||||
ansible.builtin.include_tasks: dkim_create.yaml
|
||||
- name: Delete dkim configuration
|
||||
when: not rspamd_dkim_enabled
|
||||
ansible.builtin.include_tasks: dkim_delete.yaml
|
||||
|
||||
- name: Manage logging configuration
|
||||
notify:
|
||||
- Restart rspamd
|
||||
block:
|
||||
- name: Create logging configuration
|
||||
when: rspamd_logging_enabled
|
||||
ansible.builtin.include_tasks: logging_create.yaml
|
||||
- name: Delete logging configuration
|
||||
when: not rspamd_logging_enabled
|
||||
ansible.builtin.include_tasks: logging_delete.yaml
|
||||
|
||||
- name: Manage multimaps
|
||||
ansible.builtin.include_tasks: multimaps.yaml
|
||||
|
||||
- name: Manage redis configuration
|
||||
notify:
|
||||
- Restart rspamd
|
||||
block:
|
||||
- name: Create redis configuration
|
||||
when: rspamd_redis_enabled
|
||||
ansible.builtin.include_tasks: redis_create.yaml
|
||||
- name: Delete redis configuration
|
||||
when: not rspamd_redis_enabled
|
||||
ansible.builtin.include_tasks: redis_delete.yaml
|
||||
|
||||
- name: Manage worker controller
|
||||
notify:
|
||||
- Restart rspamd
|
||||
block:
|
||||
- name: Create worker controller configuration
|
||||
when: rspamd_worker_controller_enabled
|
||||
ansible.builtin.include_tasks: worker_controller_create.yaml
|
||||
- name: Delete worker controller configuration
|
||||
when: not rspamd_worker_controller_enabled
|
||||
ansible.builtin.include_tasks: worker_controller_delete.yaml
|
||||
|
||||
- name: Template local.d files
|
||||
vars:
|
||||
selector_name: "{{ rspamd_dkim_selector_name | default('2020') }}"
|
||||
ansible.builtin.template:
|
||||
src: "{{ item }}.j2"
|
||||
dest: "{{ rspamd_local_d_dir }}/{{ item | basename }}"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
with_items:
|
||||
- etc/rspamd/local.d/classifier-bayes.conf
|
||||
- etc/rspamd/local.d/milter_headers.conf
|
||||
- etc/rspamd/local.d/options.inc
|
||||
notify:
|
||||
- Restart rspamd
|
||||
|
||||
- name: Template override.d files
|
||||
ansible.builtin.template:
|
||||
src: "{{ item }}.j2"
|
||||
dest: "{{ rspamd_override_d_dir }}/{{ item | basename }}"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
with_items:
|
||||
- etc/rspamd/override.d/classifier-bayes.conf
|
||||
notify:
|
||||
- Restart rspamd
|
||||
|
||||
- name: Test rspamd configuration
|
||||
ansible.builtin.command:
|
||||
cmd: rspamadm configtest --strict --config /etc/rspamd/rspamd.conf
|
||||
register: _rspamd_rspamadm_configtest
|
||||
changed_when: false
|
||||
failed_when: _rspamd_rspamadm_configtest.rc > 0
|
||||
|
||||
- name: Start and enable rspamd
|
||||
ansible.builtin.systemd:
|
||||
name: rspamd
|
||||
state: started
|
||||
enabled: true
|
||||
73
tasks/multimaps.yaml
Normal file
73
tasks/multimaps.yaml
Normal file
@@ -0,0 +1,73 @@
|
||||
---
|
||||
|
||||
- name: "Create multimap.conf"
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/multimap.conf.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/multimap.conf"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
|
||||
- name: "Manage sender based allowlist"
|
||||
block:
|
||||
- name: "Create sender based allowlist"
|
||||
when: rspamd_acl_allowlist_from | length > 0
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/allowlist_from.map.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/allowlist_from.map"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
- name: "Delete sender based allowlist"
|
||||
when: rspamd_acl_allowlist_from | length == 0
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_local_d_dir }}/allowlist_from.map"
|
||||
state: "absent"
|
||||
|
||||
- name: "Manage ip based allowlist"
|
||||
block:
|
||||
- name: "Create ip based allowlist"
|
||||
when: rspamd_acl_allowlist_ips | length > 0
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/allowlist_ips.map.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/allowlist_ips.map"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
- name: "Delete ip based allowlist"
|
||||
when: rspamd_acl_allowlist_ips | length == 0
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_local_d_dir }}/allowlist_ips.map"
|
||||
state: "absent"
|
||||
|
||||
- name: "Manage sender based blocklist"
|
||||
block:
|
||||
- name: "Create sender based blocklist"
|
||||
when: rspamd_acl_blocklist_from | length > 0
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/blocklist_from.map.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/blocklist_from.map"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
- name: "Delete sender based blocklist"
|
||||
when: rspamd_acl_blocklist_from | length == 0
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_local_d_dir }}/blocklist_from.map"
|
||||
state: "absent"
|
||||
|
||||
- name: "Manage ip based blocklist"
|
||||
block:
|
||||
- name: "Create ip based blocklist"
|
||||
when: rspamd_acl_blocklist_ips | length > 0
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/blocklist_ips.map.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/blocklist_ips.map"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
- name: "Delete ip based blocklist"
|
||||
when: rspamd_acl_blocklist_ips | length == 0
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_local_d_dir }}/blocklist_ips.map"
|
||||
state: "absent"
|
||||
9
tasks/redis_create.yaml
Normal file
9
tasks/redis_create.yaml
Normal file
@@ -0,0 +1,9 @@
|
||||
---
|
||||
|
||||
- name: "Create redis.conf"
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/redis.conf.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/redis.conf"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
6
tasks/redis_delete.yaml
Normal file
6
tasks/redis_delete.yaml
Normal file
@@ -0,0 +1,6 @@
|
||||
---
|
||||
|
||||
- name: "Delete redis.conf"
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_local_d_dir }}/redis.conf"
|
||||
state: "absent"
|
||||
23
tasks/worker_controller_create.yaml
Normal file
23
tasks/worker_controller_create.yaml
Normal file
@@ -0,0 +1,23 @@
|
||||
---
|
||||
|
||||
- name: Generate salted read password
|
||||
when: rspamd_worker_controller_read_password | length > 0
|
||||
ansible.builtin.command:
|
||||
cmd: "rspamadm pw --password {{ rspamd_worker_controller_read_password }}"
|
||||
changed_when: false
|
||||
register: rspamd_worker_controller_read_password_salted
|
||||
|
||||
- name: Generate salted write password
|
||||
when: rspamd_worker_controller_write_password | length > 0
|
||||
ansible.builtin.command:
|
||||
cmd: "rspamadm pw --password {{ rspamd_worker_controller_write_password }}"
|
||||
changed_when: false
|
||||
register: rspamd_worker_controller_write_password_salted
|
||||
|
||||
- name: "Create worker-controller.inc"
|
||||
ansible.builtin.template:
|
||||
src: etc/rspamd/local.d/worker-controller.inc.j2
|
||||
dest: "{{ rspamd_local_d_dir }}/worker-controller.inc"
|
||||
owner: "root"
|
||||
group: "root"
|
||||
mode: "0644"
|
||||
6
tasks/worker_controller_delete.yaml
Normal file
6
tasks/worker_controller_delete.yaml
Normal file
@@ -0,0 +1,6 @@
|
||||
---
|
||||
|
||||
- name: "Delete worker-controller.inc"
|
||||
ansible.builtin.file:
|
||||
path: "{{ rspamd_local_d_dir }}/worker-controller.inc"
|
||||
state: "absent"
|
||||
6
templates/etc/rspamd/local.d/allowlist_from.map.j2
Normal file
6
templates/etc/rspamd/local.d/allowlist_from.map.j2
Normal file
@@ -0,0 +1,6 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
{% for item in rspamd_acl_allowlist_from %}
|
||||
{{ item.from }}
|
||||
{% endfor %}
|
||||
6
templates/etc/rspamd/local.d/allowlist_ips.map.j2
Normal file
6
templates/etc/rspamd/local.d/allowlist_ips.map.j2
Normal file
@@ -0,0 +1,6 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
{% for item in rspamd_acl_allowlist_ips %}
|
||||
{{ item.ip }}
|
||||
{% endfor %}
|
||||
6
templates/etc/rspamd/local.d/blocklist_from.map.j2
Normal file
6
templates/etc/rspamd/local.d/blocklist_from.map.j2
Normal file
@@ -0,0 +1,6 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
{% for item in rspamd_acl_blocklist_from %}
|
||||
{{ item.from }}
|
||||
{% endfor %}
|
||||
6
templates/etc/rspamd/local.d/blocklist_ips.map.j2
Normal file
6
templates/etc/rspamd/local.d/blocklist_ips.map.j2
Normal file
@@ -0,0 +1,6 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
{% for item in rspamd_acl_blocklist_ips %}
|
||||
{{ item.ip }}
|
||||
{% endfor %}
|
||||
5
templates/etc/rspamd/local.d/classifier-bayes.conf.j2
Normal file
5
templates/etc/rspamd/local.d/classifier-bayes.conf.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
|
||||
backend = "redis";
|
||||
23
templates/etc/rspamd/local.d/dkim_signing.conf.j2
Normal file
23
templates/etc/rspamd/local.d/dkim_signing.conf.j2
Normal file
@@ -0,0 +1,23 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
|
||||
#
|
||||
# Documentation: https://rspamd.com/doc/modules/dkim_signing.html#configuration
|
||||
#
|
||||
|
||||
# Default DKIM Keys
|
||||
# selector = "";
|
||||
# path = "";
|
||||
|
||||
allow_username_mismatch = {{ rspamd_dkim_allow_username_mismatch | lower }};
|
||||
|
||||
# Domain specific settings
|
||||
domain {
|
||||
{% for dkim_domain in rspamd_dkim_domains %}
|
||||
{{ dkim_domain.name }} {
|
||||
path = "{{ rspamd_dkim_dir }}/{{ dkim_domain.name }}.{{ dkim_domain.selector }}.key";
|
||||
selector = "{{ dkim_domain.selector }}";
|
||||
}
|
||||
{% endfor %}
|
||||
}
|
||||
9
templates/etc/rspamd/local.d/logging.inc.j2
Normal file
9
templates/etc/rspamd/local.d/logging.inc.j2
Normal file
@@ -0,0 +1,9 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
|
||||
{% if rspamd_logging_type == "file" and rspamd_logging_filename | length > 0 %}
|
||||
filename = "{{ rspamd_logging_filename }}";
|
||||
{% endif %}
|
||||
level = "{{ rspamd_logging_level }}";
|
||||
type = "{{ rspamd_logging_type}}";
|
||||
13
templates/etc/rspamd/local.d/milter_headers.conf.j2
Normal file
13
templates/etc/rspamd/local.d/milter_headers.conf.j2
Normal file
@@ -0,0 +1,13 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
|
||||
authenticated_headers = [
|
||||
"authentication-results",
|
||||
];
|
||||
|
||||
use = [
|
||||
"x-spamd-bar",
|
||||
"x-spam-level",
|
||||
"authentication-results",
|
||||
];
|
||||
39
templates/etc/rspamd/local.d/multimap.conf.j2
Normal file
39
templates/etc/rspamd/local.d/multimap.conf.j2
Normal file
@@ -0,0 +1,39 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
{% if rspamd_acl_blocklist_from | length > 0 %}
|
||||
BLACKLIST_FROM {
|
||||
type = "from";
|
||||
map = "$CONFDIR/local.d/blocklist_from.map";
|
||||
description = "Local from blocklist";
|
||||
action = "reject";
|
||||
}
|
||||
|
||||
{% endif %}
|
||||
{% if rspamd_acl_blocklist_ips | length > 0 %}
|
||||
BLACKLIST_IP {
|
||||
type = "ip";
|
||||
map = "$CONFDIR/local.d/blocklist_ips.map";
|
||||
description = "Local ip blocklist";
|
||||
action = "reject";
|
||||
}
|
||||
|
||||
{% endif %}
|
||||
{% if rspamd_acl_allowlist_from | length > 0 %}
|
||||
WHITELIST_FROM {
|
||||
type = "from";
|
||||
map = "$CONFDIR/local.d/allowlist_from.map";
|
||||
description = "Local from allowlist";
|
||||
action = "accept";
|
||||
}
|
||||
|
||||
{% endif %}
|
||||
{% if rspamd_acl_allowlist_ips | length > 0 %}
|
||||
WHITELIST_IP {
|
||||
type = "ip";
|
||||
map = "$CONFDIR/local.d/allowlist_ips.map";
|
||||
description = "Local ip allowlist";
|
||||
action = "accept";
|
||||
}
|
||||
|
||||
{% endif %}
|
||||
10
templates/etc/rspamd/local.d/options.inc.j2
Normal file
10
templates/etc/rspamd/local.d/options.inc.j2
Normal file
@@ -0,0 +1,10 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
|
||||
{% if rspamd_dns_server is defined and rspamd_dns_servers | length > 0 %}
|
||||
dns {
|
||||
nameserver = "{{ rspamd_dns_server }}";
|
||||
}
|
||||
{% endif %}
|
||||
enable_test_patterns = true;
|
||||
27
templates/etc/rspamd/local.d/redis.conf.j2
Normal file
27
templates/etc/rspamd/local.d/redis.conf.j2
Normal file
@@ -0,0 +1,27 @@
|
||||
#jinja2: lstrip_blocks: True, trim_blocks: True
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
|
||||
db = {{ rspamd_redis_database }};
|
||||
{% if rspamd_redis_disabled_modules | length > 0 %}
|
||||
disabled_modules = [
|
||||
{% for item in rspamd_redis_disabled_modules %}
|
||||
"{{ item }}",
|
||||
{% endfor %}
|
||||
];
|
||||
{% endif %}
|
||||
{% if rspamd_redis_password | length > 0 %}
|
||||
password = "{{ rspamd_redis_password }}";
|
||||
{% endif %}
|
||||
{% if rspamd_redis_username| length > 0 %}
|
||||
username = "{{ rspamd_redis_username }}";
|
||||
{% endif %}
|
||||
servers = "{{ rspamd_redis_servers | join(',') }}";
|
||||
{% if rspamd_redis_read_servers | length > 0 %}
|
||||
read_servers = "{{ rspamd_redis_read_servers | join(',') }}";
|
||||
{% endif %}
|
||||
{% if rspamd_redis_write_servers | length > 0 %}
|
||||
write_servers = "{{ rspamd_redis_write_servers | join(',') }}";
|
||||
{% endif %}
|
||||
timeout = {{ rspamd_redis_timeout }};
|
||||
22
templates/etc/rspamd/local.d/worker-controller.inc.j2
Normal file
22
templates/etc/rspamd/local.d/worker-controller.inc.j2
Normal file
@@ -0,0 +1,22 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
|
||||
{% if rspamd_worker_controller_bind_socket | length > 0 %}
|
||||
bind_socket = "{{ rspamd_worker_controller_bind_socket }}";
|
||||
{% endif %}
|
||||
{% if rspamd_worker_controller_write_password_salted.stdout is defined and rspamd_worker_controller_write_password_salted.stdout | length > 0 %}
|
||||
enable_password = "{{ rspamd_worker_controller_write_password_salted.stdout }}";
|
||||
{% endif %}
|
||||
{% if rspamd_worker_controller_read_password_salted.stdout is defined and rspamd_worker_controller_read_password_salted.stdout | length > 0 %}
|
||||
password = "{{ rspamd_worker_controller_read_password_salted.stdout }}";
|
||||
{% endif %}
|
||||
{% if rspamd_worker_controller_secure_ips | length > 0 %}
|
||||
secure_ip = "{{ rspamd_worker_controller_secure_ips | join(',') }}";
|
||||
{% endif %}
|
||||
{% if rspamd_worker_controller_ssl_cert | length > 0 %}
|
||||
ssl_cert = "{{ rspamd_worker_controller_ssl_cert }}";
|
||||
{% endif %}
|
||||
{% if rspamd_worker_controller_ssl_key | length > 0 %}
|
||||
ssl_key = "{{ rspamd_worker_controller_ssl_key }}";
|
||||
{% endif %}
|
||||
5
templates/etc/rspamd/override.d/classifier-bayes.conf.j2
Normal file
5
templates/etc/rspamd/override.d/classifier-bayes.conf.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
#
|
||||
# {{ ansible_managed }}
|
||||
#
|
||||
|
||||
autolearn = true;
|
||||
4
vars/Archlinux.yaml
Normal file
4
vars/Archlinux.yaml
Normal file
@@ -0,0 +1,4 @@
|
||||
---
|
||||
|
||||
rspamd_unix_user: rspamd
|
||||
rspamd_unix_group: rspamd
|
||||
Reference in New Issue
Block a user