Skip to content

Ansible playbook for my self-hosted communication infrastructure

Notifications You must be signed in to change notification settings

krig/ansible-communication

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

12 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

My setup for running my own infrastructure

This provides:

  • NTP (as a prerequisite)
  • Mail via postfix/dovecot, using virtual users
  • Spam protection using dspam and postgrey
  • DKIM signing/verification
  • Full-text search over imap via dovecot-clucene
  • XMPP for all mail accounts

Open issues:

  • test sieve and managedsieve
  • auto-create imap folders (Spam, Sent, more?)
  • radicale is installed from git, which is less than optimal for reproducable builds..
  • backup & restore scripts

Roadmap:

  • Evaluate Mozilla Persona / OpenID
  • Evaluate bitmessage
  • Offer CalDAV/CardDAV web interfaces? CalDavZAP & CardDavMate?
  • Offer webmail? Roundcube?
  • Administrative interface for domains/users

Requirements:

  • Arch target host

  • Sudo privileges on the target host

  • SSL certificate in /roles/common/files/certs/{{ansible_fqdn}}.pem

  • SSL certificate private key in /roles/common/files/certs/{{ansible_fqdn}}.key.enc This is expected to be encrypted with openssl aes-256-cbc -in $hostname.key -out $hostname.key.enc

  • Opendkim keys below /roles/mail/files/opendkim/keys One folder per domain, below that a key named default.private.enc Again, this is encrypted with openssl (see ssl key above)

    Example: /roles/mail/files/opendkim/keys/example.com/default.private.enc

About

Ansible playbook for my self-hosted communication infrastructure

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published