diff options
-rw-r--r-- | host_vars/vultr | 6 | ||||
-rw-r--r-- | roles/dns/templates/nsd.conf.j2 | 14 |
2 files changed, 1 insertions, 19 deletions
diff --git a/host_vars/vultr b/host_vars/vultr index 7c683b5..fd97333 100644 --- a/host_vars/vultr +++ b/host_vars/vultr @@ -20,11 +20,7 @@ shadowsocks: nameserver: "8.8.8.8" nsd: - # Secret key for TSIGs that secure zone transfers. - key_name: nsdkey - # Generate by e.g.: dd if=/dev/random bs=32 count=1 | openssl base64 - key_secret: cuE2ZtReggzlaVzCmD0VWAnZp494x0KnPG4pSTU63LE= - # Domains/zones + # List of domains/zones zones: - 233233.xyz - 1314233.xyz diff --git a/roles/dns/templates/nsd.conf.j2 b/roles/dns/templates/nsd.conf.j2 index 9110210..f154796 100644 --- a/roles/dns/templates/nsd.conf.j2 +++ b/roles/dns/templates/nsd.conf.j2 @@ -99,20 +99,6 @@ remote-control: control-cert-file: "/usr/local/etc/nsd/nsd_control.pem" -# Secret keys for TSIGs that secure zone transfers. -# You could include: "secret.keys" and put the "key:" statements there, -# and give that file special access control permissions. -# -key: - # The key name is used to refer to this key in the access control list, - # and must be correct for TSIG to work. - name: "{{ nsd.key_name }}" - - # The base64-encoded shared secret. - # e.g.: dd if=/dev/random bs=32 count=1 | openssl base64 - secret: "{{ nsd.key_secret }}" - - # Patterns have zone configuration that are shared by one or more zones. # pattern: |