ansible/host_vars/irc.adm.crans.org.yml

144 lines
3.8 KiB
YAML

---
interfaces:
adm: ens18
srv: ens19
loc_needrestart:
override:
- regex: inspircd
mode: 'i'
- regex: anope
mode: 'i'
- regex: thelounge
mode: 'i'
loc_nginx:
service_name: "thelounge"
servers:
- server_name:
- "irc.crans.org"
- "irc"
default: true
ssl: crans.org
locations:
- filter: "^~ /web/"
params:
- "proxy_pass http://localhost:9000/"
- "include \"/etc/nginx/snippets/options-proxypass.conf\""
- filter: "~ ^/$"
params:
- "return 302 https://irc.crans.org/web/"
- filter: "/"
params:
- "return 302 \"https://wiki.crans.org/VieCrans/UtiliserIrc#Via_l.27interface_web\""
loc_thelounge:
public: "true"
loc_inspircd:
cloak:
name: crans
key: "{{ vault.inspircd.cloak.key }}"
diepass: "{{ vault.inspircd.diepass }}"
restartpass: "{{ vault.inspircd.restartpass }}"
opers: "{{ vault.inspircd.opers }}"
server:
name: irc.crans.org
description: Crans IRC server
network: Crans
admin:
name: Pierre-Elliott Bécue
nick: PEB
email: root@crans.org
ssl:
- name: crans.org
- name: adm.crans.org
bind:
- address: "{{ lookup('ldap', 'ip4', 'irc', 'srv') }}"
type: clients
clair: 6667
ssl: 6697
certificate: crans.org
- address: "{{ lookup('ldap', 'ip6', 'irc', 'srv') }}"
type: clients
clair: 6667
ssl: 6697
certificate: crans.org
- address: "{{ lookup('ldap', 'ip4', 'irc', 'adm') }}"
type: clients
clair: 6667
ssl: 6697
certificate: adm.crans.org
- address: "{{ lookup('ldap', 'ip6', 'irc', 'adm') }}"
type: clients
clair: 6667
ssl: 6697
certificate: adm.crans.org
- address: 127.0.0.1
type: servers
clair: 6668
connect:
- name: zamok
allows:
ipv4: "{{ lookup('ldap', 'ip4', 'zamok', 'srv') }}/32"
ipv6: "{{ lookup('ldap', 'ip6', 'zamok', 'srv') }}/128"
threshold: 1
- name: irc
allows:
ipv4: "{{ lookup('ldap', 'ip4', 'irc', 'srv') }}/32"
ipv6: "{{ lookup('ldap', 'ip6', 'irc', 'srv') }}/128"
threshold: 1
- name: gitlab
allows:
ipv4: "{{ lookup('ldap', 'ip4', 'gitzly', 'srv') }}/32"
ipv6: "{{ lookup('ldap', 'ip6', 'gitzly', 'srv') }}/128"
threshold: 10
commandrate: 10000
- name: monitoring
allows:
ipv4: "{{ lookup('ldap', 'ip4', 'fyre', 'adm') }}/32"
ipv6: "{{ lookup('ldap', 'ip6', 'fyre', 'adm') }}/128"
threshold: 10
commandrate: 10000
modes: true
dns: "{{ lookup('ldap', 'ip4', 'romanesco', 'srv') }}"
services:
name: services.irc.crans.org
port: 6668
recvpass: "{{ vault.anope.recvpass }}"
sendpass: "{{ vault.anope.sendpass }}"
loc_anope:
recvpass: "{{ vault.anope.recvpass }}"
sendpass: "{{ vault.anope.sendpass }}"
options_seed: "{{ vault.anope.options_seed }}"
services_roots: "{{ vault.anope.services_roots }}"
services_host: "services.irc.crans.org"
loc_certbot:
- mail: root@crans.org
certname: crans.org
domains: "*.crans.org"
- mail: root@crans.org
certname: adm.crans.org
domains: "*.adm.crans.org"
loc_service_certbot:
config:
"crans.org":
zone: _acme-challenge.crans.org
server: "{{ lookup('ldap', 'ip4', 'silice', 'adm') }}"
port: 53
key:
name: certbot_challenge.
secret: "{{ vault.bind.rfc2136_keys['certbot_challenge.'].secret }}"
algorithm: HMAC-SHA512
"adm.crans.org":
zone: _acme-challenge.adm.crans.org
server: "{{ lookup('ldap', 'ip4', 'silice', 'adm') }}"
port: 53
key:
name: certbot_adm_challenge.
secret: "{{ vault.bind.rfc2136_keys['certbot_adm_challenge.'].secret }}"
algorithm: HMAC-SHA512