Files
@ ea69b2719d8e
Branch filter:
Location: majic-ansible-roles/roles/mail_server/templates/main.cf.j2 - annotation
ea69b2719d8e
2.5 KiB
text/plain
MAR-22: Implemented tests for the common role:
- Added missing documentation for pipreqcheck_uid and pipreqcheck_gid
parameters.
- Use static-hashed passwords for reproducibility during testing in test
playbook.
- Install Emacs and libmariadb-client-lgpl-dev-compat via test playbook on one
of the testing instances in order to test related tasks.
- Fixed parameter for connection limitting in test playbook.
- Added explicit parameters to test playbook for pipreqcheck_gid and
pipreqcheck_uid.
- Fixed deployment of ferm configuration file ot include setting user/group and
mode.
- Added tests covering common deployment, deployment when only mandatory
parameters are provided, and deployment when optional parameters are set as
well.
- Added missing documentation for pipreqcheck_uid and pipreqcheck_gid
parameters.
- Use static-hashed passwords for reproducibility during testing in test
playbook.
- Install Emacs and libmariadb-client-lgpl-dev-compat via test playbook on one
of the testing instances in order to test related tasks.
- Fixed parameter for connection limitting in test playbook.
- Added explicit parameters to test playbook for pipreqcheck_gid and
pipreqcheck_uid.
- Fixed deployment of ferm configuration file ot include setting user/group and
mode.
- Added tests covering common deployment, deployment when only mandatory
parameters are provided, and deployment when optional parameters are set as
well.
f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b 3a9692d96170 f7579be2c24b f7579be2c24b f7579be2c24b c0df2fc4a827 f7579be2c24b 298c0dbe1698 298c0dbe1698 f7579be2c24b f7579be2c24b f7579be2c24b f7579be2c24b 74ed4756d5a6 74ed4756d5a6 cf897f8c1941 cf897f8c1941 cf897f8c1941 107417b217e0 107417b217e0 cf897f8c1941 cf897f8c1941 d9dae92d436c a9e97d3e2306 a9e97d3e2306 a9e97d3e2306 cf897f8c1941 cf897f8c1941 a9e97d3e2306 12abf97ac229 12abf97ac229 cf897f8c1941 cf897f8c1941 18cd76ec050d 18cd76ec050d 08e3c2b79063 08e3c2b79063 08e3c2b79063 12abf97ac229 12abf97ac229 cf897f8c1941 cf897f8c1941 67d9190a521a 67d9190a521a 67d9190a521a cf897f8c1941 12abf97ac229 12abf97ac229 7c58a0eb0e5a 7c58a0eb0e5a 7c58a0eb0e5a 7c58a0eb0e5a | # See /usr/share/postfix/main.cf.dist for a commented, more complete version
# Debian specific: Specifying a file name will cause the first
# line of that file to be used as the name. The Debian default
# is /etc/mailname.
#myorigin = /etc/mailname
smtpd_banner = $myhostname ESMTP $mail_name (Debian/GNU)
biff = no
# appending .domain is the MUA's job.
append_dot_mydomain = no
# Uncomment the next line to generate "delayed mail" warnings
#delay_warning_time = 4h
readme_directory = no
# See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for
# information on enabling SSL in the smtp client.
myhostname = {{ inventory_hostname }}
alias_maps = hash:/etc/aliases
alias_database = hash:/etc/aliases
myorigin = /etc/mailname
mydestination = {{ inventory_hostname }}, {{ inventory_hostname_short }}, localhost.localdomain, localhost
relayhost =
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128{% for network in smtp_allow_relay_from %} {{ network }}{% endfor %}
mailbox_command = procmail -a "$EXTENSION"
mailbox_size_limit = 0
recipient_delimiter = +
inet_interfaces = all
# LDAP directory look-ups for domains, mailboxes and aliases.
virtual_mailbox_domains = ldap:/etc/postfix/ldap-virtual-mailbox-domains.cf
virtual_mailbox_maps = ldap:/etc/postfix/ldap-virtual-mailbox-maps.cf
virtual_alias_maps = ldap:/etc/postfix/ldap-virtual-alias-maps.cf
# Delivery of mails via Dovecot for virtual domains.
virtual_transport = dovecot
dovecot_destination_recipient_limit = 1
# SMTP authentication configured, but disabled by default (for server-to-server
# communication). Users should connect via submission port instead to be able to
# authenticate.
smtpd_sasl_type = dovecot
smtpd_sasl_path = private/auth
smtpd_sasl_auth_enable = no
# TLS configuration.
smtpd_tls_security_level = may
smtpd_tls_auth_only = yes
smtpd_tls_cert_file = /etc/ssl/certs/{{ ansible_fqdn }}_smtp.pem
smtpd_tls_key_file = /etc/ssl/private/{{ ansible_fqdn }}_smtp.key
smtpd_use_tls=yes
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
# Recipients restricting.
smtpd_recipient_restrictions = permit_mynetworks
permit_sasl_authenticated
{% for rbl in smtp_rbl -%}
reject_rbl {{ rbl }}
{% endfor -%}
reject_unauth_destination
smtpd_milters = unix:/var/run/clamav/clamav-milter.ctl
non_smtpd_milters = unix:/var/run/clamav/clamav-milter.ctl
# Deliver undeliverable bounces to domain's postmaster. Helps with application
# misconfigurations.
notify_classes = resource, software, 2bounce
|