{% from "postfix/map.jinja" import postfix with context %} {% set config = salt['pillar.get']('postfix:config', {}) -%} {% set processed_parameters = ['aliases', 'virtual'] -%} {% macro set_parameter(parameter, default=None) -%} {% set value = config.get(parameter, default) -%} {% if value is not none -%} {%- if value is number or value is string %} {{ parameter }} = {{ value }} {%- elif value is iterable %} {{ parameter }} = {%- for v in value %} {{ v }}, {%- endfor %} {%- endif %} {%- do processed_parameters.append(parameter) -%} {% endif -%} {% endmacro -%} # Managed by config management # See /usr/share/postfix/main.cf.dist for a commented, more complete version # Debian specific: Specifying a file name will cause the first # line of that file to be used as the name. The Debian default # is /etc/mailname. #myorigin = /etc/mailname {{ set_parameter('smtpd_banner', '$myhostname ESMTP $mail_name') }} {{ set_parameter('biff', 'no') }} {{ set_parameter('compatibility_level', '2') }} # appending .domain is the MUA's job. {{ set_parameter('append_dot_mydomain', 'no') }} # Uncomment the next line to generate "delayed mail" warnings #delay_warning_time = 4h {{ set_parameter('readme_directory', 'no') }} # TLS parameters {{ set_parameter('smtpd_tls_cert_file', '/etc/ssl/certs/ssl-cert-snakeoil.pem') }} {{ set_parameter('smtpd_tls_key_file', '/etc/ssl/private/ssl-cert-snakeoil.key') }} {{ set_parameter('smtpd_use_tls', 'yes') }} {{ set_parameter('smtpd_tls_session_cache_database', 'btree:${data_directory}/smtpd_scache') }} {{ set_parameter('smtp_tls_session_cache_database', 'btree:${data_directory}/smtp_scache') }} # See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for # information on enabling SSL in the smtp client. {{ set_parameter('myhostname', grains['fqdn']) }} {{ set_parameter('alias_maps', 'hash:' ~ postfix.aliases) }} {{ set_parameter('alias_database', 'hash:' ~ postfix.aliases) }} {{ set_parameter('mydestination', [grains['fqdn'], 'localhost', 'localhost.localdomain', grains['domain']]) }} {{ set_parameter('relayhost', '') }} {{ set_parameter('mynetworks', ['127.0.0.0/8', '[::ffff:127.0.0.0]/104', '[::1]/128']) }} {{ set_parameter('mailbox_size_limit', '0') }} {{ set_parameter('recipient_delimiter', '+') }} {{ set_parameter('inet_interfaces', 'all') }} {{ set_parameter('message_size_limit', '41943040') }} {% set relay_restrictions = ['permit_mynetworks', 'permit_sasl_authenticated', 'defer_unauth_destination'] %} {% set policyd_spf = salt['pillar.get']('postfix:policyd-spf', {}) %} {% if policyd_spf.get('enabled', False) %} {% set relay_restrictions = relay_restrictions + ['check_policy_server unix:private/policyd-spf'] %} policy-spf_time_limit = {{ policyd_spf.get('time_limit', '3600s') }} {% endif %} {{ set_parameter('smtpd_relay_restrictions', relay_restrictions) }} {% set recipient_restrictions = ['permit_mynetworks', 'permit_sasl_authenticated', 'reject_unauth_destination'] %} {% set postgrey_config = salt['pillar.get']('postfix:postgrey', {}) %} {% if postgrey_config.get('enabled', False) %} {% set recipient_restrictions = recipient_restrictions + ['check_policy_service ' ~ postgrey_config.get('location', 'inet:127.0.0.1:10030')] %} {% endif %} {{ set_parameter('smtpd_recipient_restrictions', recipient_restrictions) }} {% if 'virtual' in pillar.get('postfix','') %} virtual_alias_maps = hash:/etc/postfix/virtual {% endif %} {# Accept arbitrary parameters -#} {% for parameter in config -%} {% if parameter not in processed_parameters -%} {{ set_parameter(parameter) }} {% endif -%} {% endfor -%}