2 Boolean $is_rtmaster = false,
5 $is_mailrelay = has_role('mailrelay')
6 $is_bugsmx = has_role('bugsmx')
7 $is_packagesmaster = has_role('packagesmaster')
8 $is_packagesqamaster = has_role('packagesqamaster')
10 include exim::vdomain::setup
11 include debian_org::mail_incoming_port
13 munin::check { 'ps_exim4': script => 'ps_' }
14 munin::check { 'exim_mailqueue': }
15 munin::check { 'exim_mailstats': }
17 munin::check { 'postfix_mailqueue': ensure => absent }
18 munin::check { 'postfix_mailstats': ensure => absent }
19 munin::check { 'postfix_mailvolume': ensure => absent }
21 package { 'exim4-daemon-heavy': ensure => installed }
23 Package['exim4-daemon-heavy']->Mailalias<| |>
25 concat::fragment { 'virtual_domain_template':
26 target => '/etc/exim4/virtualdomains',
27 content => template('exim/virtualdomains.erb'),
34 File['/etc/exim4/exim4.conf'],
35 Package['exim4-daemon-heavy'],
42 require => Package['exim4-daemon-heavy'],
45 file { '/etc/exim4/conf.d':
50 source => 'puppet:///files/empty/',
52 file { '/etc/exim4/ssl':
54 group => 'Debian-exim',
58 file { '/etc/exim4/exim4.conf':
59 content => template('exim/eximconf.erb'),
60 require => File['/etc/exim4/ssl/thishost.crt'],
61 notify => Service['exim4'],
63 file { '/etc/mailname':
64 content => template('exim/mailname.erb'),
66 file { '/etc/exim4/manualroute':
67 content => template('exim/manualroute.erb')
69 file { '/etc/exim4/locals':
70 content => template('exim/locals.erb')
72 file { '/etc/exim4/submission-domains':
73 content => template('exim/submission-domains.erb'),
75 file { '/etc/exim4/host_blacklist':
76 source => 'puppet:///modules/exim/common/host_blacklist',
78 file { '/etc/exim4/blacklist':
79 source => 'puppet:///modules/exim/common/blacklist',
81 file { '/etc/exim4/callout_users':
82 source => 'puppet:///modules/exim/common/callout_users',
84 file { '/etc/exim4/grey_users':
85 source => 'puppet:///modules/exim/common/grey_users',
87 file { '/etc/exim4/helo-check':
88 source => 'puppet:///modules/exim/common/helo-check',
90 file { '/etc/exim4/localusers':
91 source => 'puppet:///modules/exim/common/localusers',
93 file { '/etc/exim4/rbllist':
94 source => 'puppet:///modules/exim/common/rbllist',
96 file { '/etc/exim4/rhsbllist':
97 source => 'puppet:///modules/exim/common/rhsbllist',
99 file { '/etc/exim4/whitelist':
100 source => 'puppet:///modules/exim/common/whitelist',
102 file { '/etc/logrotate.d/exim4-base':
103 source => 'puppet:///modules/exim/common/logrotate-exim4-base',
105 file { '/etc/logrotate.d/exim4-paniclog':
106 source => 'puppet:///modules/exim/common/logrotate-exim4-paniclog'
108 file { '/etc/exim4/ssl/thishost.crt':
109 content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".crt") %>'),
110 group => 'Debian-exim',
113 file { '/etc/exim4/ssl/thishost.key':
114 content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".key") %>'),
115 group => 'Debian-exim',
118 file { '/etc/exim4/ssl/ca.crt':
119 content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crt") %>'),
120 group => 'Debian-exim',
123 file { '/etc/exim4/ssl/ca.crl':
124 content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crl") %>'),
125 group => 'Debian-exim',
128 file { '/var/log/exim4':
131 owner => 'Debian-exim',
135 # Do we actually want this? I'm only doing it because it's harmless
136 # and makes the logs quiet. There are better ways of making logs quiet,
138 ferm::rule { 'dsa-ident':
139 domain => '(ip ip6)',
140 description => 'Allow ident access',
141 rule => '&SERVICE(tcp, 113)'
144 # These only affect the alias @$fqdn, not say, @debian.org