X-Git-Url: https://git.openstreetmap.org./chef.git/blobdiff_plain/3dd8e177f260478b9da3c5c5be583bd262e1f6e9..d0df16b1ad827a1bf5be089798db8ceadb737196:/cookbooks/exim/recipes/default.rb diff --git a/cookbooks/exim/recipes/default.rb b/cookbooks/exim/recipes/default.rb index 219baa36d..ced5a9196 100644 --- a/cookbooks/exim/recipes/default.rb +++ b/cookbooks/exim/recipes/default.rb @@ -126,6 +126,12 @@ file "/etc/exim4/blocked-senders" do mode "644" end +file "/etc/exim4/blocked-sender-domains" do + owner "root" + group "Debian-exim" + mode "644" +end + if node[:exim][:dkim_selectors] keys = data_bag_item("exim", "dkim") @@ -229,54 +235,36 @@ prometheus_exporter "exim" do end if node[:exim][:smarthost_name] - node[:exim][:daemon_smtp_ports].each do |port| - firewall_rule "accept-inbound-smtp-#{port}" do - action :accept - source "net" - dest "fw" - proto "tcp:syn" - dest_ports port - source_ports "1024-65535" - end + firewall_rule "accept-inbound-smtp" do + action :accept + context :incoming + protocol :tcp + dest_ports node[:exim][:daemon_smtp_ports] + source_ports "1024-65535" end else - smarthosts_inet = [] - smarthosts_inet6 = [] + smarthosts = [] search(:node, "exim_smarthost_name:*?").each do |host| - smarthosts_inet |= host.ipaddresses(:role => :external, :family => :inet) - smarthosts_inet6 |= host.ipaddresses(:role => :external, :family => :inet6) + smarthosts |= host.ipaddresses(:role => :external) end - node[:exim][:daemon_smtp_ports].each do |port| - firewall_rule "accept-inbound-smtp-#{port}" do - action :accept - family :inet - source "net:#{smarthosts_inet.sort.join(',')}" - dest "fw" - proto "tcp:syn" - dest_ports port - source_ports "1024-65535" - end - - firewall_rule "accept-inbound-smtp-#{port}" do - action :accept - family :inet6 - source "net:#{smarthosts_inet6.sort.join(',')}" - dest "fw" - proto "tcp:syn" - dest_ports port - source_ports "1024-65535" - end + firewall_rule "accept-inbound-smtp" do + action :accept + context :incoming + protocol :tcp + source smarthosts + dest_ports node[:exim][:daemon_smtp_ports] + source_ports "1024-65535" + not_if { smarthosts.empty? } end end if node[:exim][:smarthost_via] firewall_rule "deny-outbound-smtp" do action :reject - source "fw" - dest "net" - proto "tcp:syn" + context :outgoing + protocol :tcp dest_ports "smtp" end end