radicale/defaults/main.yaml

66 lines
1.9 KiB
YAML
Raw Permalink Normal View History

2019-10-08 18:18:14 +00:00
---
radicale_server_username: radicale
2019-10-11 16:57:11 +00:00
radicale_server_home_dir: "/mnt/diskstation/CardDav"
2019-10-08 18:18:14 +00:00
radicale_service_state: started
# See https://radicale.org/configuration/
radicale_config:
server:
hosts:
- addr: 0.0.0.0
port: 5232
#daemon: true
#pid: /var/run/radicale/radicale.pid
#max_connections: 20
#max_connections: 100000000
#timeout: 30
2020-06-04 20:24:05 +00:00
2019-10-08 18:18:14 +00:00
# Consider TLS directives carefully before activating them.
#ssl: true
#certificate: "/etc/ssl/radicale.cert.pem"
#key: "/etc/ssl/radicale.key.pem"
#certificate_authority:
#protocol: PROTOCOL_TLSv1_2
#ciphers:
#encoding:
#request: utf-8
#stock: utf-8
auth:
type: htpasswd
htpasswd_filename: "{{ radicale_server_home_dir }}/users.htpasswd"
2020-06-04 20:24:05 +00:00
htpasswd_encryption: md5
2019-10-08 18:18:14 +00:00
delay: 1
2020-06-04 20:24:05 +00:00
#realm: Radicale Realm
2019-10-08 18:18:14 +00:00
rights:
type: from_file
file: "{{ radicale_server_home_dir }}/rights.conf"
storage:
type: multifilesystem
filesystem_folder: "{{ radicale_server_home_dir }}/collections"
2020-06-04 20:24:05 +00:00
2019-10-08 18:18:14 +00:00
# For an example of the `hook` directive in use, see
# http://radicale.org/versioning/
#hook:
#web:
#type: internal
#headers:
#X-Extra-HTTP-Header: foo
#X-Another-Header: bar
#logging:
2020-06-04 20:24:05 +00:00
#level: false
2019-10-08 18:18:14 +00:00
#mask_passwords: true
#full_environment: false
#config: "/etc/radicale/log.conf"
# List of Radicale user information as a dictionary.
radicale_users:
- name: admin # The username.
2019-10-11 16:57:11 +00:00
password: "{{vault_CardDav}}" # Their password. This should probably be vault-encrypted.
2019-10-08 18:18:14 +00:00
# As an alternative to a password, you can specify a bcrypt hash.
# Create this hash using the standard `htpasswd` utility, then
# paste it here. This method allows a user to generate a password
# for their account themselves, and then send you the hash rather
# than the plaintext.
2020-06-04 20:24:05 +00:00
#md5_hash: "$2y$05$t31SnKFWj9UcMr5Y96cl3uBFkdhelqkZn77TnquIeVb9sriEByUPK"