]> git.donarmstrong.com Git - dsa-puppet.git/blob - modules/exim/manifests/init.pp
ordering hint
[dsa-puppet.git] / modules / exim / manifests / init.pp
1 class exim {
2
3         munin::check { 'ps_exim4': script => 'ps_' }
4         munin::check { 'exim_mailqueue': }
5         munin::check { 'exim_mailstats': }
6
7         munin::check { 'postfix_mailqueue':  ensure => absent }
8         munin::check { 'postfix_mailstats':  ensure => absent }
9         munin::check { 'postfix_mailvolume': ensure => absent }
10
11         package { 'exim4-daemon-heavy': ensure => installed }
12
13         Package['exim4-daemon-heavy']->Mailalias<| |>
14
15         service { 'exim4':
16                 ensure  => running,
17                 require => [
18                         File['/etc/exim4/exim4.conf'],
19                         Package['exim4-daemon-heavy'],
20                 ]
21         }
22
23         file { '/etc/exim4/':
24                 ensure  => directory,
25                 mode    => '0755',
26                 require => Package['exim4-daemon-heavy'],
27                 purge   => true,
28         }
29         file { '/etc/exim4/Git':
30                 ensure  => directory,
31                 purge   => true,
32                 force   => true,
33                 recurse => true,
34                 source  => 'puppet:///files/empty/',
35         }
36         file { '/etc/exim4/conf.d':
37                 ensure  => directory,
38                 purge   => true,
39                 force   => true,
40                 recurse => true,
41                 source  => 'puppet:///files/empty/',
42         }
43         file { '/etc/exim4/ssl':
44                 ensure  => directory,
45                 group   => Debian-exim,
46                 mode    => '0750',
47                 purge   => true,
48         }
49         file { '/etc/exim4/exim4.conf':
50                 content => template('exim/eximconf.erb'),
51                 require => File['/etc/exim4/ssl/thishost.crt'],
52                 notify  => Service['exim4'],
53         }
54         file { '/etc/mailname':
55                 content => template('exim/mailname.erb'),
56         }
57         file { '/etc/exim4/manualroute':
58                 content => template('exim/manualroute.erb')
59         }
60         file { '/etc/exim4/locals':
61                 content => template('exim/locals.erb')
62         }
63         file { '/etc/exim4/virtualdomains':
64                 content => template('exim/virtualdomains.erb'),
65         }
66         file { '/etc/exim4/submission-domains':
67                 content => template('exim/submission-domains.erb'),
68         }
69         file { '/etc/exim4/host_blacklist':
70                 source => 'puppet:///modules/exim/common/host_blacklist',
71         }
72         file { '/etc/exim4/blacklist':
73                 source => 'puppet:///modules/exim/common/blacklist',
74         }
75         file { '/etc/exim4/callout_users':
76                 source => 'puppet:///modules/exim/common/callout_users',
77         }
78         file { '/etc/exim4/grey_users':
79                 source => 'puppet:///modules/exim/common/grey_users',
80         }
81         file { '/etc/exim4/helo-check':
82                 source => 'puppet:///modules/exim/common/helo-check',
83         }
84         file { '/etc/exim4/localusers':
85                 source => 'puppet:///modules/exim/common/localusers',
86         }
87         file { '/etc/exim4/rbllist':
88                 source => 'puppet:///modules/exim/common/rbllist',
89         }
90         file { '/etc/exim4/rhsbllist':
91                 source => 'puppet:///modules/exim/common/rhsbllist',
92         }
93         file { '/etc/exim4/whitelist':
94                 source => 'puppet:///modules/exim/common/whitelist',
95         }
96         file { '/etc/logrotate.d/exim4-base':
97                 source => 'puppet:///modules/exim/common/logrotate-exim4-base',
98         }
99         file { '/etc/logrotate.d/exim4-paniclog':
100                 source => 'puppet:///modules/exim/common/logrotate-exim4-paniclog'
101         }
102         file { '/etc/exim4/ssl/thishost.crt':
103                 source  => "puppet:///modules/exim/certs/${::fqdn}.crt",
104                 group   => Debian-exim,
105                 mode    => '0640',
106         }
107         file { '/etc/exim4/ssl/thishost.key':
108                 source  => "puppet:///modules/exim/certs/${::fqdn}.key",
109                 group   => Debian-exim,
110                 mode    => '0640',
111         }
112         file { '/etc/exim4/ssl/ca.crt':
113                 source  => 'puppet:///modules/exim/certs/ca.crt',
114                 group   => Debian-exim,
115                 mode    => '0640',
116         }
117         file { '/etc/exim4/ssl/ca.crl':
118                 source  => 'puppet:///modules/exim/certs/ca.crl',
119                 group   => Debian-exim,
120                 mode    => '0640',
121         }
122         file { '/var/log/exim4':
123                 ensure  => directory,
124                 mode    => '2750',
125                 owner   => Debian-exim,
126                 group   => maillog,
127         }
128
129         case getfromhash($site::nodeinfo, 'mail_port') {
130                 /^(\d+)$/: { $mail_port = $1 }
131                 default: { $mail_port = 'smtp' }
132         }
133
134         @ferm::rule { 'dsa-exim':
135                 description => 'Allow SMTP',
136                 rule        => "&SERVICE_RANGE(tcp, $mail_port, \$SMTP_SOURCES)"
137         }
138
139         @ferm::rule { 'dsa-exim-v6':
140                 description => 'Allow SMTP',
141                 domain      => 'ip6',
142                 rule        => "&SERVICE_RANGE(tcp, $mail_port, \$SMTP_V6_SOURCES)"
143         }
144
145         # Do we actually want this?  I'm only doing it because it's harmless
146         # and makes the logs quiet.  There are better ways of making logs quiet,
147         # though.
148         @ferm::rule { 'dsa-ident':
149                 domain      => '(ip ip6)',
150                 description => 'Allow ident access',
151                 rule        => '&SERVICE(tcp, 113)'
152         }
153
154 }