2015-08-22 23:55:56 +02:00
|
|
|
{%- set config = salt['pillar.get']('postfix:config', {}) -%}
|
2017-12-08 14:53:58 +01:00
|
|
|
|
2019-04-09 20:12:23 +02:00
|
|
|
{#- " | list": Python3.6 retuns dict_keys here, which needs to be converted into a list here. -#}
|
|
|
|
{%- set processed_parameters = salt['pillar.get']('postfix:mapping', {}).keys() | list %}
|
2017-12-08 14:53:58 +01:00
|
|
|
|
2015-08-22 23:55:56 +02:00
|
|
|
{%- macro set_parameter(parameter, default=None) -%}
|
|
|
|
{% set value = config.get(parameter, default) %}
|
|
|
|
{%- if value is not none %}
|
|
|
|
{%- if value is number or value is string -%}
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ parameter }} = {{ value }}
|
2015-08-22 23:55:56 +02:00
|
|
|
{%- elif value is iterable -%}
|
Improve handling of multiple values in main.cf
In case a list of items (iterable) is passed to the set_parameter
function in main.cf, the list of items are joined by a comma.
This makes parameters with many items a bit hard to read as it
results in long lines.
Postfix also supports an alternative declaration where subsequent
parameter values are written in a new line that starts with whitespace
and thus forms a continuation of the previous line.
This makes parsing multiple entry lines easier for humans.
Old style:
smtpd_milters = { unix:/run/spamass-milter/postfix/sock, connect_timeout=10s, default_action=accept } { inet:localhost:10003, connect_timeout=10s, default_action=accept } { inet:localhost:10004, connect_timeout=10s, default_action=accept } { inet:localhost:10006, connect_timeout=10s, default_action=accept } { inet:localhost:10007, connect_timeout=10s, default_action=accept }
New style:
smtpd_milters = { unix:/run/spamass-milter/postfix/sock, connect_timeout=10s, default_action=accept }
{ inet:localhost:10003, connect_timeout=10s, default_action=accept }
{ inet:localhost:10004, connect_timeout=10s, default_action=accept }
{ inet:localhost:10006, connect_timeout=10s, default_action=accept }
{ inet:localhost:10007, connect_timeout=10s, default_action=accept }
2018-09-29 03:42:32 +02:00
|
|
|
{{ parameter }} = {{ value | join('\n') | indent(parameter | length + 3) }}
|
2015-08-22 23:55:56 +02:00
|
|
|
{%- endif -%}
|
|
|
|
{%- do processed_parameters.append(parameter) %}
|
|
|
|
{%- endif %}
|
|
|
|
{%- endmacro -%}
|
2017-12-08 14:53:58 +01:00
|
|
|
|
2018-03-18 18:08:45 +01:00
|
|
|
#
|
|
|
|
# This file is managed by salt.
|
|
|
|
# Modify the salt pillar in the postfix formula that generates this file instead.
|
|
|
|
#
|
2014-08-20 02:32:47 +02:00
|
|
|
# See /usr/share/postfix/main.cf.dist for a commented, more complete version
|
|
|
|
|
|
|
|
|
|
|
|
# Debian specific: Specifying a file name will cause the first
|
|
|
|
# line of that file to be used as the name. The Debian default
|
|
|
|
# is /etc/mailname.
|
|
|
|
#myorigin = /etc/mailname
|
|
|
|
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ set_parameter('smtpd_banner', '$myhostname ESMTP $mail_name') }}
|
|
|
|
{{ set_parameter('biff', 'no') }}
|
2015-06-21 01:22:23 +02:00
|
|
|
{{ set_parameter('compatibility_level', '2') }}
|
2014-08-20 02:32:47 +02:00
|
|
|
|
|
|
|
# appending .domain is the MUA's job.
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ set_parameter('append_dot_mydomain', 'no') }}
|
2014-08-20 02:32:47 +02:00
|
|
|
|
|
|
|
# Uncomment the next line to generate "delayed mail" warnings
|
|
|
|
#delay_warning_time = 4h
|
|
|
|
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ set_parameter('readme_directory', 'no') }}
|
2014-08-20 02:32:47 +02:00
|
|
|
|
2015-08-22 23:58:04 +02:00
|
|
|
{%- set relay_restrictions = ['permit_mynetworks'] %}
|
|
|
|
{%- set recipient_restrictions = ['permit_mynetworks'] %}
|
|
|
|
|
2015-08-22 23:59:10 +02:00
|
|
|
{%- if config.get('smtpd_sasl_auth_enable', 'yes') == 'yes' %}
|
|
|
|
# SASL parameters (http://www.postfix.org/SASL_README.html)
|
2015-10-02 23:11:27 +02:00
|
|
|
{%- do relay_restrictions.append('permit_sasl_authenticated') %}
|
|
|
|
{%- do recipient_restrictions.append('permit_sasl_authenticated') %}
|
2015-10-02 23:11:50 +02:00
|
|
|
{{ set_parameter('smtpd_sasl_auth_enable', 'yes') }}
|
2015-08-22 23:59:10 +02:00
|
|
|
{{ set_parameter('smtpd_sasl_path', 'smtpd') }}
|
|
|
|
{{ set_parameter('smtpd_sasl_type', 'cyrus') }}
|
|
|
|
{{ set_parameter('smtpd_sasl_security_options', ['noanonymous', 'noplaintext']) }}
|
|
|
|
{{ set_parameter('smtpd_sasl_tls_security_options', ['noanonymous']) }}
|
|
|
|
{{ set_parameter('smtpd_tls_auth_only', 'yes') }}
|
|
|
|
{%- endif %}
|
|
|
|
|
2015-08-23 00:12:36 +02:00
|
|
|
{%- if config.get('smtpd_use_tls', 'yes') == 'yes' %}
|
|
|
|
# TLS parameters (http://www.postfix.org/TLS_README.html)
|
|
|
|
# Recipient settings
|
|
|
|
{{ set_parameter('smtpd_use_tls') }}
|
2015-08-23 00:27:03 +02:00
|
|
|
{{ set_parameter('smtpd_tls_loglevel', 1) }}
|
|
|
|
{{ set_parameter('smtpd_tls_security_level', 'may') }}
|
2016-01-02 20:20:54 +01:00
|
|
|
{{ set_parameter('smtp_tls_CApath', '/etc/ssl/certs') }}
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ set_parameter('smtpd_tls_cert_file', '/etc/ssl/certs/ssl-cert-snakeoil.pem') }}
|
|
|
|
{{ set_parameter('smtpd_tls_key_file', '/etc/ssl/private/ssl-cert-snakeoil.key') }}
|
|
|
|
{{ set_parameter('smtpd_tls_session_cache_database', 'btree:${data_directory}/smtpd_scache') }}
|
2015-08-23 00:27:03 +02:00
|
|
|
{{ set_parameter('smtpd_tls_mandatory_ciphers', 'high') }}
|
|
|
|
{{ set_parameter('smtpd_tls_mandatory_exclude_ciphers', ['aNULL', 'MD5']) }}
|
|
|
|
{{ set_parameter('smtpd_tls_mandatory_protocols', ['!SSLv2', '!SSLv3']) }}
|
|
|
|
{{ set_parameter('tls_preempt_cipherlist', 'yes') }}
|
2015-08-23 00:12:36 +02:00
|
|
|
# Relay/Sender settings
|
2015-08-23 00:27:03 +02:00
|
|
|
{{ set_parameter('smtp_tls_loglevel', 1) }}
|
|
|
|
{{ set_parameter('smtp_tls_security_level', 'may') }}
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ set_parameter('smtp_tls_session_cache_database', 'btree:${data_directory}/smtp_scache') }}
|
2015-08-23 00:12:36 +02:00
|
|
|
{%- endif %}
|
2014-08-20 02:32:47 +02:00
|
|
|
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ set_parameter('myhostname', grains['fqdn']) }}
|
2017-08-24 13:35:24 +02:00
|
|
|
{#- TODO: The following two may not be the same: #}
|
2015-08-27 16:14:57 +02:00
|
|
|
{{ set_parameter('alias_maps', 'hash:' ~ postfix.aliases_file) }}
|
|
|
|
{{ set_parameter('alias_database', 'hash:' ~ postfix.aliases_file) }}
|
2015-08-22 12:39:32 +02:00
|
|
|
{{ set_parameter('mydestination', [grains['fqdn'], 'localhost', 'localhost.localdomain', grains['domain']]) }}
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ set_parameter('relayhost', '') }}
|
2015-08-22 12:39:32 +02:00
|
|
|
{{ set_parameter('mynetworks', ['127.0.0.0/8', '[::ffff:127.0.0.0]/104', '[::1]/128']) }}
|
2014-11-21 19:38:45 +01:00
|
|
|
{{ set_parameter('mailbox_size_limit', '0') }}
|
|
|
|
{{ set_parameter('recipient_delimiter', '+') }}
|
|
|
|
{{ set_parameter('inet_interfaces', 'all') }}
|
2018-07-03 15:35:32 +02:00
|
|
|
{{ set_parameter('inet_protocols', 'all') }}
|
2015-02-04 12:16:36 +01:00
|
|
|
{{ set_parameter('message_size_limit', '41943040') }}
|
2015-08-22 13:59:29 +02:00
|
|
|
|
2015-08-23 00:12:36 +02:00
|
|
|
{%- if config.get('relayhost') %}
|
2015-08-22 13:59:29 +02:00
|
|
|
{% set policyd_spf = salt['pillar.get']('postfix:policyd-spf', {}) %}
|
2015-08-22 23:58:04 +02:00
|
|
|
{%- if policyd_spf.get('enabled', False) %}
|
|
|
|
{%- do relay_restrictions.append('check_policy_server unix:private/policyd-spf') %}
|
2015-08-22 13:59:29 +02:00
|
|
|
policy-spf_time_limit = {{ policyd_spf.get('time_limit', '3600s') }}
|
2015-08-22 23:58:04 +02:00
|
|
|
{%- endif %}
|
|
|
|
{%- do relay_restrictions.append('defer_unauth_destination') %}
|
2015-08-22 13:59:29 +02:00
|
|
|
{{ set_parameter('smtpd_relay_restrictions', relay_restrictions) }}
|
2015-08-23 00:12:36 +02:00
|
|
|
{%- endif %}
|
2014-08-20 03:42:08 +02:00
|
|
|
|
2015-08-22 23:58:04 +02:00
|
|
|
{#- check_policy_service must be after reject_unauth_destination #}
|
|
|
|
{%- do recipient_restrictions.append('reject_unauth_destination') %}
|
|
|
|
{%- set postgrey_config = salt['pillar.get']('postfix:postgrey', {}) %}
|
|
|
|
{%- if postgrey_config.get('enabled', False) %}
|
|
|
|
{%- do recipient_restrictions.append('check_policy_service ' ~ postgrey_config.get('location', 'inet:127.0.0.1:10030')) %}
|
|
|
|
{%- endif %}
|
2015-08-22 13:26:26 +02:00
|
|
|
{{ set_parameter('smtpd_recipient_restrictions', recipient_restrictions) }}
|
|
|
|
|
2017-08-24 13:10:54 +02:00
|
|
|
{# From init.sls #}
|
|
|
|
{%- set default_database_type = salt['pillar.get']('postfix:config:default_database_type', 'hash') %}
|
|
|
|
|
|
|
|
{%- for mapping, data in salt['pillar.get']('postfix:mapping', {}).items() %}
|
|
|
|
{%- set file_path = salt['pillar.get']('postfix:config:' ~ mapping) %}
|
2018-10-06 23:12:49 +02:00
|
|
|
{%- if file_path.startswith('proxy:') %}
|
|
|
|
{#- Discard the proxy:-prefix #}
|
|
|
|
{%- set _, file_type, file_path = file_path.split(':') %}
|
|
|
|
{%- elif ':' in file_path %}
|
2017-08-24 13:10:54 +02:00
|
|
|
{%- set file_type, file_path = file_path.split(':') %}
|
|
|
|
{%- else %}
|
|
|
|
{%- set file_type = default_database_type %}
|
|
|
|
{%- endif %}
|
|
|
|
{%- if not file_path.startswith('/') %}
|
|
|
|
{%- set file_path = postfix.config_path ~ '/' ~ file_path %}
|
|
|
|
{%- endif %}
|
2015-09-02 20:59:57 +02:00
|
|
|
|
2018-08-29 05:34:31 +02:00
|
|
|
{{ set_parameter(mapping, file_type ~ ':' ~ file_path) }}
|
2017-08-24 13:10:54 +02:00
|
|
|
{% endfor %}
|
2015-08-31 22:34:51 +02:00
|
|
|
|
2014-11-21 19:38:45 +01:00
|
|
|
{# Accept arbitrary parameters -#}
|
|
|
|
{% for parameter in config -%}
|
|
|
|
{% if parameter not in processed_parameters -%}
|
|
|
|
{{ set_parameter(parameter) }}
|
|
|
|
{% endif -%}
|
|
|
|
{% endfor -%}
|