initial upload
This commit is contained in:
165
roles/postfix/defaults/main.yml
Normal file
165
roles/postfix/defaults/main.yml
Normal file
@@ -0,0 +1,165 @@
|
||||
postfix_mynetworks: []
|
||||
|
||||
postfix_mydestination_local:
|
||||
- "{{ ansible_hostname }}.maruntiel.net"
|
||||
- "localhost"
|
||||
- "localhost.{{ ansible_domain }}"
|
||||
|
||||
postfix_mydestination_extra: []
|
||||
|
||||
# main.cf settings
|
||||
postfix_settings:
|
||||
|
||||
compatibility_level: 2
|
||||
|
||||
myhostname: "{{ ansible_hostname }}.maruntiel.net"
|
||||
myorigin: /etc/mailname
|
||||
|
||||
mydestination: "{{ postfix_mydestination_local + postfix_mydestination_extra }}"
|
||||
mynetworks: "10.11.0.0/16 62.171.160.169/32 207.244.234.58/32 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 {{ postfix_mynetworks | join(' ') }}"
|
||||
|
||||
relayhost: ""
|
||||
|
||||
alias_maps: hash:/etc/aliases
|
||||
alias_database: hash:/etc/aliases
|
||||
biff: no
|
||||
mailbox_command:
|
||||
home_mailbox: Maildir/
|
||||
mailbox_size_limit: 0
|
||||
recipient_delimiter: +
|
||||
append_dot_mydomain: no
|
||||
readme_directory: no
|
||||
dovecot_destination_recipient_limit: 1
|
||||
|
||||
tls_random_source: dev:/dev/urandom
|
||||
|
||||
default_transport: smtp
|
||||
relay_transport: smtp
|
||||
relay_domains: ""
|
||||
|
||||
inet_protocols: ipv4
|
||||
inet_interfaces: all
|
||||
|
||||
virtual_mailbox_domains:
|
||||
- /etc/postfix/virtual_domains
|
||||
virtual_mailbox_base:
|
||||
- /var/mail/vhosts
|
||||
virtual_mailbox_maps:
|
||||
- hash:/etc/postfix/vmailbox
|
||||
virtual_alias_maps:
|
||||
- hash:/etc/postfix/virtual_alias
|
||||
virtual_minimum_uid:
|
||||
- 100
|
||||
virtual_uid_maps:
|
||||
- static:5000
|
||||
virtual_gid_maps:
|
||||
- static:5000
|
||||
virtual_transport:
|
||||
- virtual
|
||||
virtual_alias_domains:
|
||||
- maruntiel.net
|
||||
- maruntiel.com
|
||||
- stillmob.ro
|
||||
- pedimedic.ro
|
||||
|
||||
|
||||
# SMTP SETTINGS
|
||||
smtp_use_tls: yes
|
||||
smtp_tls_security_level: may
|
||||
smtp_tls_note_starttls_offer: yes
|
||||
smtp_tls_session_cache_database: "btree:${data_directory}/smtp_scache"
|
||||
|
||||
# SMTPD SETTINGS
|
||||
smtpd_use_tls: yes
|
||||
smtpd_tls_auth_only: no
|
||||
smtpd_tls_security_level: may
|
||||
smtpd_tls_loglevel: 1
|
||||
smtpd_tls_received_header: yes
|
||||
smtpd_tls_session_cache_timeout: 3600s
|
||||
smtpd_tls_session_cache_database: "btree:${data_directory}/smtpd_scache"
|
||||
smtpd_tls_cert_file: "/etc/letsencrypt/live/maruntiel.net/fullchain.pem"
|
||||
smtpd_tls_key_file: "/etc/letsencrypt/live/maruntiel.net/privkey.pem"
|
||||
smtpd_banner: "$myhostname ESMTP $mail_name"
|
||||
smtpd_client_restrictions:
|
||||
- permit_mynetworks
|
||||
- permit_sasl_authenticated
|
||||
- reject_invalid_hostname
|
||||
- reject_unknown_client
|
||||
- reject_rbl_client sbl-xbl.spamhaus.org
|
||||
smtpd_sender_restrictions:
|
||||
- permit_mynetworks
|
||||
- reject_unknown_address
|
||||
- reject_unknown_sender_domain
|
||||
- reject_non_fqdn_sender
|
||||
smtpd_recipient_limit: 250
|
||||
smtpd_recipient_restrictions:
|
||||
- reject_invalid_hostname
|
||||
- reject_non_fqdn_sender
|
||||
- reject_non_fqdn_recipient
|
||||
- reject_unlisted_sender
|
||||
- permit_mynetworks
|
||||
- permit_sasl_authenticated
|
||||
- reject_unauth_pipelining
|
||||
- reject_unauth_destination
|
||||
- check_policy_service unix:private/policyd-spf
|
||||
- reject_non_fqdn_hostname
|
||||
- reject_unknown_sender_domain
|
||||
- reject_rbl_client bl.spamcop.net
|
||||
- reject_rbl_client zen.spamhaus.org
|
||||
- permit
|
||||
|
||||
smtpd_relay_restrictions:
|
||||
- reject_invalid_hostname
|
||||
- reject_non_fqdn_sender
|
||||
- reject_non_fqdn_recipient
|
||||
- reject_unlisted_sender
|
||||
- permit_mynetworks
|
||||
- permit_sasl_authenticated
|
||||
- reject_unauth_pipelining
|
||||
- reject_unauth_destination
|
||||
- check_policy_service unix:private/policyd-spf
|
||||
- reject_non_fqdn_hostname
|
||||
- reject_unknown_sender_domain
|
||||
- reject_rbl_client bl.spamcop.net
|
||||
- reject_rbl_client zen.spamhaus.org
|
||||
- permit
|
||||
|
||||
smtpd_client_connection_rate_limit: 10
|
||||
smtpd_client_message_rate_limit: 10
|
||||
|
||||
# SASL
|
||||
smtpd_sasl_auth_enable: yes
|
||||
smtpd_sasl_type: dovecot
|
||||
smtpd_sasl_path: private/auth
|
||||
broken_sasl_auth_clients: yes
|
||||
smtpd_sasl_local_domain: \$mydomain
|
||||
smtpd_sasl_security_options: noanonymous
|
||||
|
||||
# Other
|
||||
header_checks:
|
||||
- regexp:/etc/postfix/header_checks
|
||||
|
||||
# DKIM
|
||||
milter_default_action: accept
|
||||
milter_protocol: 6
|
||||
smtpd_milters: local:opendkim/opendkim.sock
|
||||
non_smtpd_milters: $smtpd_milters
|
||||
|
||||
# SPF
|
||||
policyd-spf_time_limit: 3600
|
||||
|
||||
postfix_opendkim: "{{ postfix_dkim_domains|count > 0 }}"
|
||||
postfix_relay: no
|
||||
postfix_smtpd_public: yes
|
||||
postfix_firewall: "{{ firewall_enabled|default(true) }}"
|
||||
|
||||
postfix_dkim_domains: []
|
||||
|
||||
virtual_mailbox_domains: /etc/postfix/virtual_domains
|
||||
virtual_mailbox_base: /var/mail/vhosts
|
||||
virtual_mailbox_maps: hash:/etc/postfix/vmailbox
|
||||
virtual_alias_maps: hash:/etc/postfix/virtual_alias
|
||||
virtual_minimum_uid: 100
|
||||
virtual_uid_maps: static:5000
|
||||
virtual_gid_maps: static:5000
|
||||
virtual_transport: virtual
|
||||
12
roles/postfix/handlers/main.yml
Normal file
12
roles/postfix/handlers/main.yml
Normal file
@@ -0,0 +1,12 @@
|
||||
- name: Restart postfix
|
||||
service:
|
||||
name: "postfix@-"
|
||||
state: restarted
|
||||
|
||||
- name: Rebuild postfix map files
|
||||
shell: postmap /etc/postfix/*.map
|
||||
|
||||
- name: Restart opendkim
|
||||
service:
|
||||
name: opendkim
|
||||
state: restarted
|
||||
4
roles/postfix/meta/main.yml
Normal file
4
roles/postfix/meta/main.yml
Normal file
@@ -0,0 +1,4 @@
|
||||
dependencies:
|
||||
|
||||
- role: firewall
|
||||
when: postfix_firewall
|
||||
151
roles/postfix/tasks/main.yml
Normal file
151
roles/postfix/tasks/main.yml
Normal file
@@ -0,0 +1,151 @@
|
||||
---
|
||||
|
||||
- name: Install postfix
|
||||
apt:
|
||||
pkg:
|
||||
- postfix
|
||||
- postfix-pcre
|
||||
state: present
|
||||
tags: packages
|
||||
|
||||
- name: Install postfix configs
|
||||
template:
|
||||
dest: "/etc/postfix/{{ item }}"
|
||||
src: "etc_postfix_{{ item }}.j2"
|
||||
mode: 0644
|
||||
owner: root
|
||||
group: root
|
||||
with_items:
|
||||
- main.cf
|
||||
- master.cf
|
||||
- header_checks
|
||||
notify: Restart postfix
|
||||
tags: configs
|
||||
|
||||
- name: Install postfix maps
|
||||
template:
|
||||
dest: "/etc/postfix/{{ item }}"
|
||||
src: "etc_postfix_{{ item }}.j2"
|
||||
mode: 0640
|
||||
owner: root
|
||||
group: postfix
|
||||
with_items:
|
||||
- sasl_passwd.map
|
||||
- transport.map
|
||||
# - virtual.map
|
||||
notify: Rebuild postfix map files
|
||||
tags: configs
|
||||
|
||||
- name: Install empty postfix maps
|
||||
copy:
|
||||
dest: "/etc/postfix/{{ item }}"
|
||||
content: ""
|
||||
force: no
|
||||
mode: 0644
|
||||
owner: root
|
||||
group: root
|
||||
with_items:
|
||||
- virtual.map
|
||||
notify: Rebuild postfix map files
|
||||
tags: configs
|
||||
|
||||
- name: Install postfix-policyd-spf
|
||||
apt:
|
||||
pkg:
|
||||
- postfix-policyd-spf-python
|
||||
state: present
|
||||
tags: packages
|
||||
|
||||
- name: Ensure postfix is running
|
||||
service:
|
||||
name: postfix
|
||||
state: started
|
||||
enabled: yes
|
||||
tags: configs
|
||||
|
||||
- name: Install the postfix firewall config
|
||||
template:
|
||||
dest: /etc/firewall/rules-v4.d/40_postfix.sh
|
||||
src: etc_firewall_rules-v4.d_40_postfix.sh.j2
|
||||
mode: 0644
|
||||
owner: root
|
||||
group: root
|
||||
when: postfix_firewall
|
||||
notify: Restart firewall
|
||||
tags:
|
||||
- configs
|
||||
- firewall
|
||||
|
||||
# =====================================================================
|
||||
|
||||
- name: Install opendkim
|
||||
apt:
|
||||
pkg:
|
||||
- opendkim
|
||||
- opendkim-tools
|
||||
state: present
|
||||
when: postfix_opendkim
|
||||
tags: packages
|
||||
|
||||
- name: Ensure postfix is a member of opendkim
|
||||
user:
|
||||
name: postfix
|
||||
groups: opendkim
|
||||
append: yes
|
||||
when: postfix_opendkim
|
||||
notify: Restart postfix
|
||||
tags: configs
|
||||
|
||||
- name: Ensure /etc/opendkim dir exists
|
||||
file:
|
||||
path: /etc/opendkim
|
||||
state: directory
|
||||
mode: 0755
|
||||
owner: root
|
||||
group: root
|
||||
when: postfix_opendkim
|
||||
tags: configs
|
||||
|
||||
- name: Ensure /etc/opendkim/keys dir exists
|
||||
file:
|
||||
path: /etc/opendkim/keys
|
||||
state: directory
|
||||
mode: 0750
|
||||
owner: root
|
||||
group: opendkim
|
||||
when: postfix_opendkim
|
||||
tags: configs
|
||||
|
||||
- name: Install opendkim configs
|
||||
template:
|
||||
dest: "/{{ item }}"
|
||||
src: "{{ item | replace('/', '_') }}.j2"
|
||||
mode: 0644
|
||||
owner: root
|
||||
group: root
|
||||
with_items:
|
||||
- etc/opendkim.conf
|
||||
- etc/opendkim/key.table
|
||||
- etc/opendkim/signing.table
|
||||
- etc/opendkim/trusted.hosts
|
||||
when: postfix_opendkim
|
||||
notify: Restart opendkim
|
||||
tags: configs
|
||||
|
||||
- name: Ensure /var/spool/postfix/opendkim dir exists
|
||||
file:
|
||||
path: /var/spool/postfix/opendkim
|
||||
state: directory
|
||||
mode: 0755
|
||||
owner: opendkim
|
||||
group: postfix
|
||||
when: postfix_opendkim
|
||||
tags: configs
|
||||
|
||||
- name: Ensure opendkim is running
|
||||
service:
|
||||
name: postfix
|
||||
state: started
|
||||
enabled: yes
|
||||
when: postfix_opendkim
|
||||
tags: configs
|
||||
@@ -0,0 +1,11 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
{% if postfix_smtpd_public %}
|
||||
iptables -A INPUT -p tcp --dport 25 -m comment --comment "postfix-smtp" -j ACCEPT
|
||||
{% elif postfix_relay %}
|
||||
iptables -A internal-in -p tcp --dport 25 -m comment --comment "postfix-smtp" -j ACCEPT
|
||||
{% endif %}
|
||||
|
||||
{% if firewall_output_default_drop %}
|
||||
iptables -A OUTPUT -p tcp --dport 25 -m owner --gid-owner postfix -m comment --comment "smtp" -j ACCEPT
|
||||
{% endif %}
|
||||
38
roles/postfix/templates/etc_opendkim.conf.j2
Normal file
38
roles/postfix/templates/etc_opendkim.conf.j2
Normal file
@@ -0,0 +1,38 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
# This is a basic configuration that can easily be adapted to suit a standard
|
||||
# installation. For more advanced options, see opendkim.conf(5) and/or
|
||||
# /usr/share/doc/opendkim/examples/opendkim.conf.sample.
|
||||
|
||||
Syslog yes
|
||||
LogWhy yes
|
||||
PidFile /var/run/opendkim/opendkim.pid
|
||||
Socket local:/var/spool/postfix/opendkim/opendkim.sock
|
||||
UMask 002
|
||||
UserID opendkim
|
||||
|
||||
# Map domains in From addresses to keys used to sign messages
|
||||
KeyTable file:/etc/opendkim/key.table
|
||||
SigningTable file:/etc/opendkim/signing.table
|
||||
|
||||
# Hosts to ignore when verifying signatures
|
||||
ExternalIgnoreList /etc/opendkim/trusted.hosts
|
||||
InternalHosts /etc/opendkim/trusted.hosts
|
||||
|
||||
# Commonly-used options; the commented-out versions show the defaults.
|
||||
Canonicalization relaxed/simple
|
||||
Mode sv
|
||||
SubDomains yes
|
||||
#ADSPAction continue
|
||||
AutoRestart yes
|
||||
AutoRestartRate 10/1M
|
||||
Background yes
|
||||
DNSTimeout 5
|
||||
SignatureAlgorithm rsa-sha256
|
||||
|
||||
# Always oversign From (sign using actual From and a null From to prevent
|
||||
# malicious signatures header fields (From and/or others) between the signer
|
||||
# and the verifier. From is oversigned by default in the Debian package
|
||||
# because it is often the identity key used by reputation systems and thus
|
||||
# somewhat security sensitive.
|
||||
OversignHeaders From
|
||||
5
roles/postfix/templates/etc_opendkim_key.table.j2
Normal file
5
roles/postfix/templates/etc_opendkim_key.table.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
{% for domain, info in postfix_dkim_domains | dictsort %}
|
||||
mail._domainkey.{{ domain }} {{ domain }}:mail:/etc/opendkim/keys/{{ domain }}/mail.private
|
||||
{% endfor %}
|
||||
6
roles/postfix/templates/etc_opendkim_signing.table.j2
Normal file
6
roles/postfix/templates/etc_opendkim_signing.table.j2
Normal file
@@ -0,0 +1,6 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
{% for domain, info in postfix_dkim_domains | dictsort %}
|
||||
{{ domain }} mail._domainkey.{{ domain }}
|
||||
.{{ domain }} mail._domainkey.{{ domain }}
|
||||
{% endfor %}
|
||||
4
roles/postfix/templates/etc_opendkim_trusted.hosts.j2
Normal file
4
roles/postfix/templates/etc_opendkim_trusted.hosts.j2
Normal file
@@ -0,0 +1,4 @@
|
||||
127.0.0.0/8
|
||||
[::ffff:127.0.0.0]/104
|
||||
[::1]/128
|
||||
{{ postfix_mynetworks | join("\n") }}
|
||||
5
roles/postfix/templates/etc_postfix_header_checks.j2
Normal file
5
roles/postfix/templates/etc_postfix_header_checks.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
{% for item in postfix_header_checks | default([]) %}
|
||||
{{ item }}
|
||||
{% endfor %}
|
||||
13
roles/postfix/templates/etc_postfix_main.cf.j2
Normal file
13
roles/postfix/templates/etc_postfix_main.cf.j2
Normal file
@@ -0,0 +1,13 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
# See /usr/share/postfix/main.cf.dist for a commented, more complete version
|
||||
|
||||
{% for key, value in postfix_settings | dictsort %}
|
||||
{% if value is sequence and value is not string %}
|
||||
{{ key }} = {{ value | flatten | join(",\n\t") }}
|
||||
{% elif value is sameas true or value is sameas false %}
|
||||
{{ key }} = {{ 'yes' if value else 'no' }}
|
||||
{% else %}
|
||||
{{ key }} = {{ value }}
|
||||
{% endif %}
|
||||
{% endfor %}
|
||||
132
roles/postfix/templates/etc_postfix_master.cf.j2
Normal file
132
roles/postfix/templates/etc_postfix_master.cf.j2
Normal file
@@ -0,0 +1,132 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
#
|
||||
# Postfix master process configuration file. For details on the format
|
||||
# of the file, see the master(5) manual page (command: "man 5 master" or
|
||||
# on-line: http://www.postfix.org/master.5.html).
|
||||
#
|
||||
# Do not forget to execute "postfix reload" after editing this file.
|
||||
#
|
||||
# ==========================================================================
|
||||
# service type private unpriv chroot wakeup maxproc command + args
|
||||
# (yes) (yes) (no) (never) (100)
|
||||
# ==========================================================================
|
||||
smtp inet n - y - - smtpd
|
||||
#smtp inet n - y - 1 postscreen
|
||||
#smtpd pass - - y - - smtpd
|
||||
#dnsblog unix - - y - 0 dnsblog
|
||||
#tlsproxy unix - - y - 0 tlsproxy
|
||||
#submission inet n - y - - smtpd
|
||||
# -o syslog_name=postfix/submission
|
||||
# -o smtpd_tls_security_level=encrypt
|
||||
# -o smtpd_sasl_auth_enable=yes
|
||||
# -o smtpd_reject_unlisted_recipient=no
|
||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||
# -o smtpd_recipient_restrictions=
|
||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||
# -o milter_macro_daemon_name=ORIGINATING
|
||||
smtps inet n - y - - smtpd
|
||||
# -o syslog_name=postfix/smtps
|
||||
# -o smtpd_tls_wrappermode=yes
|
||||
# -o smtpd_sasl_auth_enable=yes
|
||||
# -o smtpd_reject_unlisted_recipient=no
|
||||
# -o smtpd_client_restrictions=$mua_client_restrictions
|
||||
# -o smtpd_helo_restrictions=$mua_helo_restrictions
|
||||
# -o smtpd_sender_restrictions=$mua_sender_restrictions
|
||||
# -o smtpd_recipient_restrictions=
|
||||
# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject
|
||||
# -o milter_macro_daemon_name=ORIGINATING
|
||||
#628 inet n - y - - qmqpd
|
||||
pickup unix n - y 60 1 pickup
|
||||
cleanup unix n - y - 0 cleanup
|
||||
qmgr unix n - n 300 1 qmgr
|
||||
#qmgr unix n - n 300 1 oqmgr
|
||||
tlsmgr unix - - y 1000? 1 tlsmgr
|
||||
rewrite unix - - y - - trivial-rewrite
|
||||
bounce unix - - y - 0 bounce
|
||||
defer unix - - y - 0 bounce
|
||||
trace unix - - y - 0 bounce
|
||||
verify unix - - y - 1 verify
|
||||
flush unix n - y 1000? 0 flush
|
||||
proxymap unix - - n - - proxymap
|
||||
proxywrite unix - - n - 1 proxymap
|
||||
smtp unix - - y - - smtp
|
||||
relay unix - - y - - smtp
|
||||
-o smtp_fallback_relay=
|
||||
# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5
|
||||
showq unix n - y - - showq
|
||||
error unix - - y - - error
|
||||
retry unix - - y - - error
|
||||
discard unix - - y - - discard
|
||||
local unix - n n - - local
|
||||
virtual unix - n n - - virtual
|
||||
lmtp unix - - y - - lmtp
|
||||
anvil unix - - y - 1 anvil
|
||||
scache unix - - y - 1 scache
|
||||
{% if ansible_lsb.major_release|int >= 10 %}
|
||||
postlog unix-dgram n - n - 1 postlogd
|
||||
{% endif %}
|
||||
#
|
||||
# ====================================================================
|
||||
# Interfaces to non-Postfix software. Be sure to examine the manual
|
||||
# pages of the non-Postfix software to find out what options it wants.
|
||||
#
|
||||
# Many of the following services use the Postfix pipe(8) delivery
|
||||
# agent. See the pipe(8) man page for information about ${recipient}
|
||||
# and other message envelope options.
|
||||
# ====================================================================
|
||||
#
|
||||
# maildrop. See the Postfix MAILDROP_README file for details.
|
||||
# Also specify in main.cf: maildrop_destination_recipient_limit=1
|
||||
#
|
||||
maildrop unix - n n - - pipe
|
||||
flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient}
|
||||
#
|
||||
# ====================================================================
|
||||
#
|
||||
# Recent Cyrus versions can use the existing "lmtp" master.cf entry.
|
||||
#
|
||||
# Specify in cyrus.conf:
|
||||
# lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4
|
||||
#
|
||||
# Specify in main.cf one or more of the following:
|
||||
# mailbox_transport = lmtp:inet:localhost
|
||||
# virtual_transport = lmtp:inet:localhost
|
||||
#
|
||||
# ====================================================================
|
||||
#
|
||||
# Cyrus 2.1.5 (Amos Gouaux)
|
||||
# Also specify in main.cf: cyrus_destination_recipient_limit=1
|
||||
#
|
||||
#cyrus unix - n n - - pipe
|
||||
# user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user}
|
||||
#
|
||||
# ====================================================================
|
||||
# Old example of delivery via Cyrus.
|
||||
#
|
||||
#old-cyrus unix - n n - - pipe
|
||||
# flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user}
|
||||
#
|
||||
# ====================================================================
|
||||
#
|
||||
# See the Postfix UUCP_README file for configuration details.
|
||||
#
|
||||
uucp unix - n n - - pipe
|
||||
flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient)
|
||||
#
|
||||
# Other external delivery methods.
|
||||
#
|
||||
ifmail unix - n n - - pipe
|
||||
flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient)
|
||||
bsmtp unix - n n - - pipe
|
||||
flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient
|
||||
scalemail-backend unix - n n - 2 pipe
|
||||
flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension}
|
||||
mailman unix - n n - - pipe
|
||||
flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py
|
||||
${nexthop} ${user}
|
||||
|
||||
policyd-spf unix - n n - 0 spawn
|
||||
user=policyd-spf argv=/usr/bin/policyd-spf
|
||||
5
roles/postfix/templates/etc_postfix_sasl_passwd.map.j2
Normal file
5
roles/postfix/templates/etc_postfix_sasl_passwd.map.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
{% for key, value in postfix_sasl_passwd_map | default({}) | dictsort %}
|
||||
{{ key }} {{ value.username }}:{{ value.password }}
|
||||
{% endfor %}
|
||||
5
roles/postfix/templates/etc_postfix_transport.map.j2
Normal file
5
roles/postfix/templates/etc_postfix_transport.map.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
{% for key, value in postfix_transport_map | default({}) | dictsort %}
|
||||
{{ key }} {{ value }}
|
||||
{% endfor %}
|
||||
5
roles/postfix/templates/etc_postfix_virtual.map.j2
Normal file
5
roles/postfix/templates/etc_postfix_virtual.map.j2
Normal file
@@ -0,0 +1,5 @@
|
||||
# {{ ansible_managed }}
|
||||
|
||||
{% for key, value in postfix_virtual_map | default({}) | dictsort %}
|
||||
{{ key }} {{ value }}
|
||||
{% endfor %}
|
||||
Reference in New Issue
Block a user