2019-10-08 18:18:14 +00:00
|
|
|
---
|
|
|
|
radicale_server_username: radicale
|
2019-10-11 16:57:11 +00:00
|
|
|
radicale_server_home_dir: "/mnt/diskstation/CardDav"
|
2019-10-08 18:18:14 +00:00
|
|
|
radicale_service_state: started
|
|
|
|
|
|
|
|
# See https://radicale.org/configuration/
|
|
|
|
radicale_config:
|
|
|
|
server:
|
|
|
|
hosts:
|
|
|
|
- addr: 0.0.0.0
|
|
|
|
port: 5232
|
|
|
|
#daemon: true
|
|
|
|
#pid: /var/run/radicale/radicale.pid
|
|
|
|
#max_connections: 20
|
|
|
|
#max_connections: 100000000
|
|
|
|
#timeout: 30
|
2020-06-04 20:24:05 +00:00
|
|
|
|
|
|
|
|
2019-10-08 18:18:14 +00:00
|
|
|
# Consider TLS directives carefully before activating them.
|
|
|
|
#ssl: true
|
|
|
|
#certificate: "/etc/ssl/radicale.cert.pem"
|
|
|
|
#key: "/etc/ssl/radicale.key.pem"
|
|
|
|
#certificate_authority:
|
|
|
|
#protocol: PROTOCOL_TLSv1_2
|
|
|
|
#ciphers:
|
|
|
|
#encoding:
|
|
|
|
#request: utf-8
|
|
|
|
#stock: utf-8
|
|
|
|
auth:
|
|
|
|
type: htpasswd
|
|
|
|
htpasswd_filename: "{{ radicale_server_home_dir }}/users.htpasswd"
|
2020-06-04 20:24:05 +00:00
|
|
|
htpasswd_encryption: md5
|
2019-10-08 18:18:14 +00:00
|
|
|
delay: 1
|
2020-06-04 20:24:05 +00:00
|
|
|
#realm: Radicale Realm
|
2019-10-08 18:18:14 +00:00
|
|
|
rights:
|
|
|
|
type: from_file
|
|
|
|
file: "{{ radicale_server_home_dir }}/rights.conf"
|
|
|
|
storage:
|
|
|
|
type: multifilesystem
|
|
|
|
filesystem_folder: "{{ radicale_server_home_dir }}/collections"
|
2020-06-04 20:24:05 +00:00
|
|
|
|
2019-10-08 18:18:14 +00:00
|
|
|
# For an example of the `hook` directive in use, see
|
|
|
|
# http://radicale.org/versioning/
|
|
|
|
#hook:
|
|
|
|
#web:
|
|
|
|
#type: internal
|
|
|
|
#headers:
|
|
|
|
#X-Extra-HTTP-Header: foo
|
|
|
|
#X-Another-Header: bar
|
|
|
|
#logging:
|
2020-06-04 20:24:05 +00:00
|
|
|
#level: false
|
2019-10-08 18:18:14 +00:00
|
|
|
#mask_passwords: true
|
|
|
|
#full_environment: false
|
|
|
|
#config: "/etc/radicale/log.conf"
|
|
|
|
|
|
|
|
# List of Radicale user information as a dictionary.
|
|
|
|
radicale_users:
|
|
|
|
- name: admin # The username.
|
2019-10-11 16:57:11 +00:00
|
|
|
password: "{{vault_CardDav}}" # Their password. This should probably be vault-encrypted.
|
2019-10-08 18:18:14 +00:00
|
|
|
# As an alternative to a password, you can specify a bcrypt hash.
|
|
|
|
# Create this hash using the standard `htpasswd` utility, then
|
|
|
|
# paste it here. This method allows a user to generate a password
|
|
|
|
# for their account themselves, and then send you the hash rather
|
|
|
|
# than the plaintext.
|
2020-06-04 20:24:05 +00:00
|
|
|
#md5_hash: "$2y$05$t31SnKFWj9UcMr5Y96cl3uBFkdhelqkZn77TnquIeVb9sriEByUPK"
|