stop using virtual resources for ferm::rule
[mirror/dsa-puppet.git] / modules / exim / manifests / init.pp
1 class exim {
2
3         $is_mailrelay = has_role('mailrelay')
4         $is_bugsmx = has_role('bugsmx')
5         $is_rtmaster = has_role('rtmaster')
6         $is_packagesmaster = has_role('packagesmaster')
7         $is_packagesqamaster = has_role('packagesqamaster')
8
9         include exim::vdomain::setup
10         include debian_org::mail_incoming_port
11
12         munin::check { 'ps_exim4': script => 'ps_' }
13         munin::check { 'exim_mailqueue': }
14         munin::check { 'exim_mailstats': }
15
16         munin::check { 'postfix_mailqueue':  ensure => absent }
17         munin::check { 'postfix_mailstats':  ensure => absent }
18         munin::check { 'postfix_mailvolume': ensure => absent }
19
20         package { 'exim4-daemon-heavy': ensure => installed }
21
22         Package['exim4-daemon-heavy']->Mailalias<| |>
23
24         concat::fragment { 'virtual_domain_template':
25                 target  => '/etc/exim4/virtualdomains',
26                 content => template('exim/virtualdomains.erb'),
27                 order   => '05',
28         }
29
30         service { 'exim4':
31                 ensure  => running,
32                 require => [
33                         File['/etc/exim4/exim4.conf'],
34                         Package['exim4-daemon-heavy'],
35                 ]
36         }
37
38         file { '/etc/exim4/':
39                 ensure  => directory,
40                 mode    => '0755',
41                 require => Package['exim4-daemon-heavy'],
42                 purge   => true,
43         }
44         file { '/etc/exim4/conf.d':
45                 ensure  => directory,
46                 purge   => true,
47                 force   => true,
48                 recurse => true,
49                 source  => 'puppet:///files/empty/',
50         }
51         file { '/etc/exim4/ssl':
52                 ensure  => directory,
53                 group   => 'Debian-exim',
54                 mode    => '0750',
55                 purge   => true,
56         }
57         file { '/etc/exim4/exim4.conf':
58                 content => template('exim/eximconf.erb'),
59                 require => File['/etc/exim4/ssl/thishost.crt'],
60                 notify  => Service['exim4'],
61         }
62         file { '/etc/mailname':
63                 content => template('exim/mailname.erb'),
64         }
65         file { '/etc/exim4/manualroute':
66                 content => template('exim/manualroute.erb')
67         }
68         file { '/etc/exim4/locals':
69                 content => template('exim/locals.erb')
70         }
71         file { '/etc/exim4/submission-domains':
72                 content => template('exim/submission-domains.erb'),
73         }
74         file { '/etc/exim4/host_blacklist':
75                 source => 'puppet:///modules/exim/common/host_blacklist',
76         }
77         file { '/etc/exim4/blacklist':
78                 source => 'puppet:///modules/exim/common/blacklist',
79         }
80         file { '/etc/exim4/callout_users':
81                 source => 'puppet:///modules/exim/common/callout_users',
82         }
83         file { '/etc/exim4/grey_users':
84                 source => 'puppet:///modules/exim/common/grey_users',
85         }
86         file { '/etc/exim4/helo-check':
87                 source => 'puppet:///modules/exim/common/helo-check',
88         }
89         file { '/etc/exim4/localusers':
90                 source => 'puppet:///modules/exim/common/localusers',
91         }
92         file { '/etc/exim4/rbllist':
93                 source => 'puppet:///modules/exim/common/rbllist',
94         }
95         file { '/etc/exim4/rhsbllist':
96                 source => 'puppet:///modules/exim/common/rhsbllist',
97         }
98         file { '/etc/exim4/whitelist':
99                 source => 'puppet:///modules/exim/common/whitelist',
100         }
101         file { '/etc/logrotate.d/exim4-base':
102                 source => 'puppet:///modules/exim/common/logrotate-exim4-base',
103         }
104         file { '/etc/logrotate.d/exim4-paniclog':
105                 source => 'puppet:///modules/exim/common/logrotate-exim4-paniclog'
106         }
107         file { '/etc/exim4/ssl/thishost.crt':
108                 content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".crt") %>'),
109                 group   => 'Debian-exim',
110                 mode    => '0640',
111         }
112         file { '/etc/exim4/ssl/thishost.key':
113                 content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".key") %>'),
114                 group   => 'Debian-exim',
115                 mode    => '0640',
116         }
117         file { '/etc/exim4/ssl/ca.crt':
118                 content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crt") %>'),
119                 group   => 'Debian-exim',
120                 mode    => '0640',
121         }
122         file { '/etc/exim4/ssl/ca.crl':
123                 content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crl") %>'),
124                 group   => 'Debian-exim',
125                 mode    => '0640',
126         }
127         file { '/var/log/exim4':
128                 ensure  => directory,
129                 mode    => '2750',
130                 owner   => 'Debian-exim',
131                 group   => maillog,
132         }
133
134         # Do we actually want this?  I'm only doing it because it's harmless
135         # and makes the logs quiet.  There are better ways of making logs quiet,
136         # though.
137         ferm::rule { 'dsa-ident':
138                 domain      => '(ip ip6)',
139                 description => 'Allow ident access',
140                 rule        => '&SERVICE(tcp, 113)'
141         }
142
143         # These only affect the alias @$fqdn, not say, @debian.org
144
145         mailalias { [
146                 'postmaster',
147                 'hostmaster',
148                 'usenet',
149                 'webmaster',
150                 'abuse',
151                 'noc',
152                 'security',
153         ]:
154                 ensure => absent
155         }
156 }