fixed ssl support, moved defaults from template to defaults
This commit is contained in:
parent
1bf1feca21
commit
143139237f
2 changed files with 32 additions and 13 deletions
16
defaults/main.yml
Normal file
16
defaults/main.yml
Normal file
|
|
@ -0,0 +1,16 @@
|
||||||
|
postfix:
|
||||||
|
ssl:
|
||||||
|
key: /etc/ssl/private/ssl-cert-snakeoil.key
|
||||||
|
cert: /etc/ssl/certs/ssl-cert-snakeoil.pem
|
||||||
|
outgoing_security_level: may
|
||||||
|
incoming_security_level: may
|
||||||
|
enable_opendkim: false
|
||||||
|
message_size_limit: 20480000
|
||||||
|
relay_transport: smtp
|
||||||
|
relayhost: ''
|
||||||
|
relay_domains: []
|
||||||
|
sender_dependent_relayhost_maps: ''
|
||||||
|
virtual_alias_maps: ''
|
||||||
|
virtual_mailbox_domains: []
|
||||||
|
mynetworks: []
|
||||||
|
mydestination: []
|
||||||
|
|
@ -20,11 +20,14 @@ readme_directory = no
|
||||||
compatibility_level = 2
|
compatibility_level = 2
|
||||||
|
|
||||||
# TLS parameters
|
# TLS parameters
|
||||||
smtpd_tls_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
|
smtpd_tls_cert_file = {{ postfix.ssl.cert }}
|
||||||
smtpd_tls_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
|
smtpd_tls_key_file = {{ postfix.ssl.key }}
|
||||||
smtpd_use_tls = yes
|
smtpd_use_tls = yes
|
||||||
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
|
smtpd_tls_session_cache_database = btree:${data_directory}/smtpd_scache
|
||||||
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
|
smtp_tls_session_cache_database = btree:${data_directory}/smtp_scache
|
||||||
|
smtpd_tls_security_level = {{ postfix.ssl.incoming_security_level }}
|
||||||
|
smtpd_tls_auth_only = yes
|
||||||
|
smtp_tls_security_level = {{ postfix.ssl.outgoing_security_level }}
|
||||||
|
|
||||||
# See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for
|
# See /usr/share/doc/postfix/TLS_README.gz in the postfix-doc package for
|
||||||
# information on enabling SSL in the smtp client.
|
# information on enabling SSL in the smtp client.
|
||||||
|
|
@ -34,25 +37,25 @@ smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_una
|
||||||
myhostname = {{ inventory_hostname }}
|
myhostname = {{ inventory_hostname }}
|
||||||
mydomain = {{ postfix.mydomain|d(ansible_domain) }}
|
mydomain = {{ postfix.mydomain|d(ansible_domain) }}
|
||||||
myorigin = $mydomain
|
myorigin = $mydomain
|
||||||
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 {{ postfix.mynetworks|d([])|join(' ') }}
|
mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 {{ postfix.mynetworks|join(' ') }}
|
||||||
mydestination = {{ inventory_hostname_short }} {{ inventory_hostname }} localhost {{ postfix.mydestination|d([])|join(' ') }}
|
mydestination = {{ inventory_hostname_short }} {{ inventory_hostname }} localhost {{ postfix.mydestination|join(' ') }}
|
||||||
|
|
||||||
alias_maps = hash:/etc/aliases
|
alias_maps = hash:/etc/aliases
|
||||||
alias_database = hash:/etc/aliases
|
alias_database = hash:/etc/aliases
|
||||||
|
|
||||||
relayhost = {{ postfix.relayhost|d('') }}
|
relayhost = {{ postfix.relayhost }}
|
||||||
relay_domains = {{ postfix.relay_domains|d([])|join(', ') }}
|
relay_domains = {{ postfix.relay_domains|join(', ') }}
|
||||||
relay_transport = {{ postfix.relay_transport|d('smtp') }}
|
relay_transport = {{ postfix.relay_transport }}
|
||||||
sender_dependent_relayhost_maps = {{ postfix.sender_dependent_relayhost_maps|d('') }}
|
sender_dependent_relayhost_maps = {{ postfix.sender_dependent_relayhost_maps }}
|
||||||
virtual_alias_maps = {{ postfix.virtual_alias_maps|d('') }}
|
virtual_alias_maps = {{ postfix.virtual_alias_maps }}
|
||||||
virtual_mailbox_domains = {{ postfix.virtual_mailbox_domains|d([])|join(' ') }}
|
virtual_mailbox_domains = {{ postfix.virtual_mailbox_domains|join(' ') }}
|
||||||
|
|
||||||
mailbox_size_limit = 0
|
mailbox_size_limit = 0
|
||||||
recipient_delimiter = +
|
recipient_delimiter = +
|
||||||
inet_interfaces = all
|
inet_interfaces = all
|
||||||
inet_protocols = all
|
inet_protocols = all
|
||||||
|
|
||||||
message_size_limit = {{ postfix.message_size_limit|d('20480000') }}
|
message_size_limit = {{ postfix.message_size_limit }}
|
||||||
|
|
||||||
{% if "virtual_transport" in postfix and postfix.virtual_transport == "dovecot" %}
|
{% if "virtual_transport" in postfix and postfix.virtual_transport == "dovecot" %}
|
||||||
smtpd_sasl_type = dovecot
|
smtpd_sasl_type = dovecot
|
||||||
|
|
@ -68,7 +71,7 @@ virtual_transport = dovecot
|
||||||
|
|
||||||
# opendkim
|
# opendkim
|
||||||
|
|
||||||
{% if postfix.enable_opendkim|d(false) %}
|
{% if postfix.enable_opendkim %}
|
||||||
|
|
||||||
milter_protocol = 6
|
milter_protocol = 6
|
||||||
milter_default_action = accept
|
milter_default_action = accept
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue