X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fexim%2Fmanifests%2Finit.pp;h=caf74805573a0d0f9ecd38dc171df1aed09aace1;hb=0b9c56431623eeb69b6a70f32bddc0c083f797c9;hp=e18f0aab5b20c586149a07bb3d2e8622b4ae1edf;hpb=3eb533e5499e66423bafdedaf6c7d08ead1772de;p=mirror%2Fdsa-puppet.git diff --git a/modules/exim/manifests/init.pp b/modules/exim/manifests/init.pp index e18f0aab5..caf748055 100644 --- a/modules/exim/manifests/init.pp +++ b/modules/exim/manifests/init.pp @@ -1,5 +1,14 @@ class exim { + $is_mailrelay = has_role('mailrelay') + $is_bugsmx = has_role('bugsmx') + $is_rtmaster = has_role('rtmaster') + $is_packagesmaster = has_role('packagesmaster') + $is_packagesqamaster = has_role('packagesqamaster') + + include exim::vdomain::setup + include debian_org::mail_incoming_port + munin::check { 'ps_exim4': script => 'ps_' } munin::check { 'exim_mailqueue': } munin::check { 'exim_mailstats': } @@ -10,9 +19,20 @@ class exim { package { 'exim4-daemon-heavy': ensure => installed } + Package['exim4-daemon-heavy']->Mailalias<| |> + + concat::fragment { 'virtual_domain_template': + target => '/etc/exim4/virtualdomains', + content => template('exim/virtualdomains.erb'), + order => '05', + } + service { 'exim4': ensure => running, - require => File['/etc/exim4/exim4.conf'], + require => [ + File['/etc/exim4/exim4.conf'], + Package['exim4-daemon-heavy'], + ] } file { '/etc/exim4/': @@ -22,11 +42,8 @@ class exim { purge => true, } file { '/etc/exim4/Git': - ensure => directory, - purge => true, + ensure => absent, force => true, - recurse => true, - source => 'puppet:///files/empty/', } file { '/etc/exim4/conf.d': ensure => directory, @@ -37,12 +54,13 @@ class exim { } file { '/etc/exim4/ssl': ensure => directory, - group => Debian-exim, + group => 'Debian-exim', mode => '0750', purge => true, } file { '/etc/exim4/exim4.conf': content => template('exim/eximconf.erb'), + require => File['/etc/exim4/ssl/thishost.crt'], notify => Service['exim4'], } file { '/etc/mailname': @@ -54,11 +72,8 @@ class exim { file { '/etc/exim4/locals': content => template('exim/locals.erb') } - file { '/etc/exim4/virtualdomains': - content => template('exim/virtualdomains.erb'), - } file { '/etc/exim4/submission-domains': - content => template('exim/common/submission-domains.erb'), + content => template('exim/submission-domains.erb'), } file { '/etc/exim4/host_blacklist': source => 'puppet:///modules/exim/common/host_blacklist', @@ -94,55 +109,52 @@ class exim { source => 'puppet:///modules/exim/common/logrotate-exim4-paniclog' } file { '/etc/exim4/ssl/thishost.crt': - source => "puppet:///modules/exim/certs/${::fqdn}.crt", - group => Debian-exim, + content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".crt") %>'), + group => 'Debian-exim', mode => '0640', } file { '/etc/exim4/ssl/thishost.key': - source => "puppet:///modules/exim/certs/${::fqdn}.key", - group => Debian-exim, + content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".key") %>'), + group => 'Debian-exim', mode => '0640', } file { '/etc/exim4/ssl/ca.crt': - source => 'puppet:///modules/exim/certs/ca.crt', - group => Debian-exim, + content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crt") %>'), + group => 'Debian-exim', mode => '0640', } file { '/etc/exim4/ssl/ca.crl': - source => 'puppet:///modules/exim/certs/ca.crl', - group => Debian-exim, + content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crl") %>'), + group => 'Debian-exim', mode => '0640', } file { '/var/log/exim4': ensure => directory, mode => '2750', - owner => Debian-exim, + owner => 'Debian-exim', group => maillog, } - case getfromhash($site::nodeinfo, 'mail_port') { - /^(\d+)$/: { $mail_port = $1 } - default: { $mail_port = 'smtp' } - } - - @ferm::rule { 'dsa-exim': - description => 'Allow SMTP', - rule => '&SERVICE_RANGE(tcp, $mail_port, \$SMTP_SOURCES)' - } - - @ferm::rule { 'dsa-exim-v6': - description => 'Allow SMTP', - domain => 'ip6', - rule => '&SERVICE_RANGE(tcp, $mail_port, \$SMTP_V6_SOURCES)' - } - # Do we actually want this? I'm only doing it because it's harmless - # and makes the logs quiet. There are better ways of making logs quiet, - # though. + # and makes the logs quiet. There are better ways of making logs quiet, + # though. @ferm::rule { 'dsa-ident': domain => '(ip ip6)', description => 'Allow ident access', rule => '&SERVICE(tcp, 113)' } + # These only affect the alias @$fqdn, not say, @debian.org + + mailalias { [ + 'postmaster', + 'hostmaster', + 'usenet', + 'webmaster', + 'abuse', + 'noc', + 'security', + ]: + ensure => absent + } }