initial upload

This commit is contained in:
2025-10-10 11:07:34 +00:00
commit 6224cd01c6
161 changed files with 8964 additions and 0 deletions

View File

@@ -0,0 +1,165 @@
postfix_mynetworks: []
postfix_mydestination_local:
- "{{ ansible_hostname }}.maruntiel.net"
- "localhost"
- "localhost.{{ ansible_domain }}"
postfix_mydestination_extra: []
# main.cf settings
postfix_settings:
compatibility_level: 2
myhostname: "{{ ansible_hostname }}.maruntiel.net"
myorigin: /etc/mailname
mydestination: "{{ postfix_mydestination_local + postfix_mydestination_extra }}"
mynetworks: "10.11.0.0/16 62.171.160.169/32 207.244.234.58/32 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 {{ postfix_mynetworks | join(' ') }}"
relayhost: ""
alias_maps: hash:/etc/aliases
alias_database: hash:/etc/aliases
biff: no
mailbox_command:
home_mailbox: Maildir/
mailbox_size_limit: 0
recipient_delimiter: +
append_dot_mydomain: no
readme_directory: no
dovecot_destination_recipient_limit: 1
tls_random_source: dev:/dev/urandom
default_transport: smtp
relay_transport: smtp
relay_domains: ""
inet_protocols: ipv4
inet_interfaces: all
virtual_mailbox_domains:
- /etc/postfix/virtual_domains
virtual_mailbox_base:
- /var/mail/vhosts
virtual_mailbox_maps:
- hash:/etc/postfix/vmailbox
virtual_alias_maps:
- hash:/etc/postfix/virtual_alias
virtual_minimum_uid:
- 100
virtual_uid_maps:
- static:5000
virtual_gid_maps:
- static:5000
virtual_transport:
- virtual
virtual_alias_domains:
- maruntiel.net
- maruntiel.com
- stillmob.ro
- pedimedic.ro
# SMTP SETTINGS
smtp_use_tls: yes
smtp_tls_security_level: may
smtp_tls_note_starttls_offer: yes
smtp_tls_session_cache_database: "btree:${data_directory}/smtp_scache"
# SMTPD SETTINGS
smtpd_use_tls: yes
smtpd_tls_auth_only: no
smtpd_tls_security_level: may
smtpd_tls_loglevel: 1
smtpd_tls_received_header: yes
smtpd_tls_session_cache_timeout: 3600s
smtpd_tls_session_cache_database: "btree:${data_directory}/smtpd_scache"
smtpd_tls_cert_file: "/etc/letsencrypt/live/maruntiel.net/fullchain.pem"
smtpd_tls_key_file: "/etc/letsencrypt/live/maruntiel.net/privkey.pem"
smtpd_banner: "$myhostname ESMTP $mail_name"
smtpd_client_restrictions:
- permit_mynetworks
- permit_sasl_authenticated
- reject_invalid_hostname
- reject_unknown_client
- reject_rbl_client sbl-xbl.spamhaus.org
smtpd_sender_restrictions:
- permit_mynetworks
- reject_unknown_address
- reject_unknown_sender_domain
- reject_non_fqdn_sender
smtpd_recipient_limit: 250
smtpd_recipient_restrictions:
- reject_invalid_hostname
- reject_non_fqdn_sender
- reject_non_fqdn_recipient
- reject_unlisted_sender
- permit_mynetworks
- permit_sasl_authenticated
- reject_unauth_pipelining
- reject_unauth_destination
- check_policy_service unix:private/policyd-spf
- reject_non_fqdn_hostname
- reject_unknown_sender_domain
- reject_rbl_client bl.spamcop.net
- reject_rbl_client zen.spamhaus.org
- permit
smtpd_relay_restrictions:
- reject_invalid_hostname
- reject_non_fqdn_sender
- reject_non_fqdn_recipient
- reject_unlisted_sender
- permit_mynetworks
- permit_sasl_authenticated
- reject_unauth_pipelining
- reject_unauth_destination
- check_policy_service unix:private/policyd-spf
- reject_non_fqdn_hostname
- reject_unknown_sender_domain
- reject_rbl_client bl.spamcop.net
- reject_rbl_client zen.spamhaus.org
- permit
smtpd_client_connection_rate_limit: 10
smtpd_client_message_rate_limit: 10
# SASL
smtpd_sasl_auth_enable: yes
smtpd_sasl_type: dovecot
smtpd_sasl_path: private/auth
broken_sasl_auth_clients: yes
smtpd_sasl_local_domain: \$mydomain
smtpd_sasl_security_options: noanonymous
# Other
header_checks:
- regexp:/etc/postfix/header_checks
# DKIM
milter_default_action: accept
milter_protocol: 6
smtpd_milters: local:opendkim/opendkim.sock
non_smtpd_milters: $smtpd_milters
# SPF
policyd-spf_time_limit: 3600
postfix_opendkim: "{{ postfix_dkim_domains|count > 0 }}"
postfix_relay: no
postfix_smtpd_public: yes
postfix_firewall: "{{ firewall_enabled|default(true) }}"
postfix_dkim_domains: []
virtual_mailbox_domains: /etc/postfix/virtual_domains
virtual_mailbox_base: /var/mail/vhosts
virtual_mailbox_maps: hash:/etc/postfix/vmailbox
virtual_alias_maps: hash:/etc/postfix/virtual_alias
virtual_minimum_uid: 100
virtual_uid_maps: static:5000
virtual_gid_maps: static:5000
virtual_transport: virtual

View File

@@ -0,0 +1,12 @@
- name: Restart postfix
service:
name: "postfix@-"
state: restarted
- name: Rebuild postfix map files
shell: postmap /etc/postfix/*.map
- name: Restart opendkim
service:
name: opendkim
state: restarted

View File

@@ -0,0 +1,4 @@
dependencies:
- role: firewall
when: postfix_firewall

View File

@@ -0,0 +1,151 @@
---
- name: Install postfix
apt:
pkg:
- postfix
- postfix-pcre
state: present
tags: packages
- name: Install postfix configs
template:
dest: "/etc/postfix/{{ item }}"
src: "etc_postfix_{{ item }}.j2"
mode: 0644
owner: root
group: root
with_items:
- main.cf
- master.cf
- header_checks
notify: Restart postfix
tags: configs
- name: Install postfix maps
template:
dest: "/etc/postfix/{{ item }}"
src: "etc_postfix_{{ item }}.j2"
mode: 0640
owner: root
group: postfix
with_items:
- sasl_passwd.map
- transport.map
# - virtual.map
notify: Rebuild postfix map files
tags: configs
- name: Install empty postfix maps
copy:
dest: "/etc/postfix/{{ item }}"
content: ""
force: no
mode: 0644
owner: root
group: root
with_items:
- virtual.map
notify: Rebuild postfix map files
tags: configs
- name: Install postfix-policyd-spf
apt:
pkg:
- postfix-policyd-spf-python
state: present
tags: packages
- name: Ensure postfix is running
service:
name: postfix
state: started
enabled: yes
tags: configs
- name: Install the postfix firewall config
template:
dest: /etc/firewall/rules-v4.d/40_postfix.sh
src: etc_firewall_rules-v4.d_40_postfix.sh.j2
mode: 0644
owner: root
group: root
when: postfix_firewall
notify: Restart firewall
tags:
- configs
- firewall
# =====================================================================
- name: Install opendkim
apt:
pkg:
- opendkim
- opendkim-tools
state: present
when: postfix_opendkim
tags: packages
- name: Ensure postfix is a member of opendkim
user:
name: postfix
groups: opendkim
append: yes
when: postfix_opendkim
notify: Restart postfix
tags: configs
- name: Ensure /etc/opendkim dir exists
file:
path: /etc/opendkim
state: directory
mode: 0755
owner: root
group: root
when: postfix_opendkim
tags: configs
- name: Ensure /etc/opendkim/keys dir exists
file:
path: /etc/opendkim/keys
state: directory
mode: 0750
owner: root
group: opendkim
when: postfix_opendkim
tags: configs
- name: Install opendkim configs
template:
dest: "/{{ item }}"
src: "{{ item | replace('/', '_') }}.j2"
mode: 0644
owner: root
group: root
with_items:
- etc/opendkim.conf
- etc/opendkim/key.table
- etc/opendkim/signing.table
- etc/opendkim/trusted.hosts
when: postfix_opendkim
notify: Restart opendkim
tags: configs
- name: Ensure /var/spool/postfix/opendkim dir exists
file:
path: /var/spool/postfix/opendkim
state: directory
mode: 0755
owner: opendkim
group: postfix
when: postfix_opendkim
tags: configs
- name: Ensure opendkim is running
service:
name: postfix
state: started
enabled: yes
when: postfix_opendkim
tags: configs

View File

@@ -0,0 +1,11 @@
# {{ ansible_managed }}
{% if postfix_smtpd_public %}
iptables -A INPUT -p tcp --dport 25 -m comment --comment "postfix-smtp" -j ACCEPT
{% elif postfix_relay %}
iptables -A internal-in -p tcp --dport 25 -m comment --comment "postfix-smtp" -j ACCEPT
{% endif %}
{% if firewall_output_default_drop %}
iptables -A OUTPUT -p tcp --dport 25 -m owner --gid-owner postfix -m comment --comment "smtp" -j ACCEPT
{% endif %}

View File

@@ -0,0 +1,38 @@
# {{ ansible_managed }}
# This is a basic configuration that can easily be adapted to suit a standard
# installation. For more advanced options, see opendkim.conf(5) and/or
# /usr/share/doc/opendkim/examples/opendkim.conf.sample.
Syslog yes
LogWhy yes
PidFile /var/run/opendkim/opendkim.pid
Socket local:/var/spool/postfix/opendkim/opendkim.sock
UMask 002
UserID opendkim
# Map domains in From addresses to keys used to sign messages
KeyTable file:/etc/opendkim/key.table
SigningTable file:/etc/opendkim/signing.table
# Hosts to ignore when verifying signatures
ExternalIgnoreList /etc/opendkim/trusted.hosts
InternalHosts /etc/opendkim/trusted.hosts
# Commonly-used options; the commented-out versions show the defaults.
Canonicalization relaxed/simple
Mode sv
SubDomains yes
#ADSPAction continue
AutoRestart yes
AutoRestartRate 10/1M
Background yes
DNSTimeout 5
SignatureAlgorithm rsa-sha256
# Always oversign From (sign using actual From and a null From to prevent
# malicious signatures header fields (From and/or others) between the signer
# and the verifier. From is oversigned by default in the Debian package
# because it is often the identity key used by reputation systems and thus
# somewhat security sensitive.
OversignHeaders From

View File

@@ -0,0 +1,5 @@
# {{ ansible_managed }}
{% for domain, info in postfix_dkim_domains | dictsort %}
mail._domainkey.{{ domain }} {{ domain }}:mail:/etc/opendkim/keys/{{ domain }}/mail.private
{% endfor %}

View File

@@ -0,0 +1,6 @@
# {{ ansible_managed }}
{% for domain, info in postfix_dkim_domains | dictsort %}
{{ domain }} mail._domainkey.{{ domain }}
.{{ domain }} mail._domainkey.{{ domain }}
{% endfor %}

View File

@@ -0,0 +1,4 @@
127.0.0.0/8
[::ffff:127.0.0.0]/104
[::1]/128
{{ postfix_mynetworks | join("\n") }}

View File

@@ -0,0 +1,5 @@
# {{ ansible_managed }}
{% for item in postfix_header_checks | default([]) %}
{{ item }}
{% endfor %}

View File

@@ -0,0 +1,13 @@
# {{ ansible_managed }}
# See /usr/share/postfix/main.cf.dist for a commented, more complete version
{% for key, value in postfix_settings | dictsort %}
{% if value is sequence and value is not string %}
{{ key }} = {{ value | flatten | join(",\n\t") }}
{% elif value is sameas true or value is sameas false %}
{{ key }} = {{ 'yes' if value else 'no' }}
{% else %}
{{ key }} = {{ value }}
{% endif %}
{% endfor %}

View File

@@ -0,0 +1,132 @@
# {{ ansible_managed }}
#
# Postfix master process configuration file. For details on the format
# of the file, see the master(5) manual page (command: "man 5 master" or
# on-line: http://www.postfix.org/master.5.html).
#
# Do not forget to execute "postfix reload" after editing this file.
#
# ==========================================================================
# service type private unpriv chroot wakeup maxproc command + args
# (yes) (yes) (no) (never) (100)
# ==========================================================================
smtp inet n - y - - smtpd
#smtp inet n - y - 1 postscreen
#smtpd pass - - y - - smtpd
#dnsblog unix - - y - 0 dnsblog
#tlsproxy unix - - y - 0 tlsproxy
#submission inet n - y - - smtpd
# -o syslog_name=postfix/submission
# -o smtpd_tls_security_level=encrypt
# -o smtpd_sasl_auth_enable=yes
# -o smtpd_reject_unlisted_recipient=no
# -o smtpd_client_restrictions=$mua_client_restrictions
# -o smtpd_helo_restrictions=$mua_helo_restrictions
# -o smtpd_sender_restrictions=$mua_sender_restrictions
# -o smtpd_recipient_restrictions=
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
# -o milter_macro_daemon_name=ORIGINATING
smtps inet n - y - - smtpd
# -o syslog_name=postfix/smtps
# -o smtpd_tls_wrappermode=yes
# -o smtpd_sasl_auth_enable=yes
# -o smtpd_reject_unlisted_recipient=no
# -o smtpd_client_restrictions=$mua_client_restrictions
# -o smtpd_helo_restrictions=$mua_helo_restrictions
# -o smtpd_sender_restrictions=$mua_sender_restrictions
# -o smtpd_recipient_restrictions=
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
# -o milter_macro_daemon_name=ORIGINATING
#628 inet n - y - - qmqpd
pickup unix n - y 60 1 pickup
cleanup unix n - y - 0 cleanup
qmgr unix n - n 300 1 qmgr
#qmgr unix n - n 300 1 oqmgr
tlsmgr unix - - y 1000? 1 tlsmgr
rewrite unix - - y - - trivial-rewrite
bounce unix - - y - 0 bounce
defer unix - - y - 0 bounce
trace unix - - y - 0 bounce
verify unix - - y - 1 verify
flush unix n - y 1000? 0 flush
proxymap unix - - n - - proxymap
proxywrite unix - - n - 1 proxymap
smtp unix - - y - - smtp
relay unix - - y - - smtp
-o smtp_fallback_relay=
# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5
showq unix n - y - - showq
error unix - - y - - error
retry unix - - y - - error
discard unix - - y - - discard
local unix - n n - - local
virtual unix - n n - - virtual
lmtp unix - - y - - lmtp
anvil unix - - y - 1 anvil
scache unix - - y - 1 scache
{% if ansible_lsb.major_release|int >= 10 %}
postlog unix-dgram n - n - 1 postlogd
{% endif %}
#
# ====================================================================
# Interfaces to non-Postfix software. Be sure to examine the manual
# pages of the non-Postfix software to find out what options it wants.
#
# Many of the following services use the Postfix pipe(8) delivery
# agent. See the pipe(8) man page for information about ${recipient}
# and other message envelope options.
# ====================================================================
#
# maildrop. See the Postfix MAILDROP_README file for details.
# Also specify in main.cf: maildrop_destination_recipient_limit=1
#
maildrop unix - n n - - pipe
flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient}
#
# ====================================================================
#
# Recent Cyrus versions can use the existing "lmtp" master.cf entry.
#
# Specify in cyrus.conf:
# lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4
#
# Specify in main.cf one or more of the following:
# mailbox_transport = lmtp:inet:localhost
# virtual_transport = lmtp:inet:localhost
#
# ====================================================================
#
# Cyrus 2.1.5 (Amos Gouaux)
# Also specify in main.cf: cyrus_destination_recipient_limit=1
#
#cyrus unix - n n - - pipe
# user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user}
#
# ====================================================================
# Old example of delivery via Cyrus.
#
#old-cyrus unix - n n - - pipe
# flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user}
#
# ====================================================================
#
# See the Postfix UUCP_README file for configuration details.
#
uucp unix - n n - - pipe
flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
#
# Other external delivery methods.
#
ifmail unix - n n - - pipe
flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
bsmtp unix - n n - - pipe
flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient
scalemail-backend unix - n n - 2 pipe
flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
mailman unix - n n - - pipe
flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py
${nexthop} ${user}
policyd-spf unix - n n - 0 spawn
user=policyd-spf argv=/usr/bin/policyd-spf

View File

@@ -0,0 +1,5 @@
# {{ ansible_managed }}
{% for key, value in postfix_sasl_passwd_map | default({}) | dictsort %}
{{ key }} {{ value.username }}:{{ value.password }}
{% endfor %}

View File

@@ -0,0 +1,5 @@
# {{ ansible_managed }}
{% for key, value in postfix_transport_map | default({}) | dictsort %}
{{ key }} {{ value }}
{% endfor %}

View File

@@ -0,0 +1,5 @@
# {{ ansible_managed }}
{% for key, value in postfix_virtual_map | default({}) | dictsort %}
{{ key }} {{ value }}
{% endfor %}