2018-07-26 21:57:21 +02:00
|
|
|
#!/usr/bin/python3
|
2017-09-24 14:34:46 +02:00
|
|
|
|
|
|
|
import os
|
|
|
|
import glob
|
|
|
|
import shutil
|
2018-07-26 21:57:21 +02:00
|
|
|
import multiprocessing
|
2019-01-07 23:49:10 +02:00
|
|
|
import logging as log
|
|
|
|
import sys
|
2018-07-26 21:57:21 +02:00
|
|
|
|
2019-07-25 10:33:57 +02:00
|
|
|
from podop import run_server
|
2021-07-24 14:39:40 +02:00
|
|
|
from pwd import getpwnam
|
2019-07-25 10:33:57 +02:00
|
|
|
from socrate import system, conf
|
2018-07-26 21:57:21 +02:00
|
|
|
|
2019-01-08 05:16:05 +02:00
|
|
|
log.basicConfig(stream=sys.stderr, level=os.environ.get("LOG_LEVEL", "WARNING"))
|
2018-07-26 21:57:21 +02:00
|
|
|
|
|
|
|
def start_podop():
|
2021-07-24 14:39:40 +02:00
|
|
|
os.setuid(getpwnam('postfix').pw_uid)
|
2021-08-09 17:39:15 +02:00
|
|
|
os.mkdir('/dev/shm/postfix',mode=0o700)
|
2019-01-17 16:32:47 +02:00
|
|
|
url = "http://" + os.environ["ADMIN_ADDRESS"] + "/internal/postfix/"
|
2019-01-07 23:49:10 +02:00
|
|
|
# TODO: Remove verbosity setting from Podop?
|
|
|
|
run_server(0, "postfix", "/tmp/podop.socket", [
|
2019-01-17 16:32:47 +02:00
|
|
|
("transport", "url", url + "transport/§"),
|
|
|
|
("alias", "url", url + "alias/§"),
|
2021-08-31 20:24:06 +02:00
|
|
|
("dane", "url", url + "dane/§"),
|
2019-01-17 16:32:47 +02:00
|
|
|
("domain", "url", url + "domain/§"),
|
|
|
|
("mailbox", "url", url + "mailbox/§"),
|
2020-01-14 02:18:30 +02:00
|
|
|
("recipientmap", "url", url + "recipient/map/§"),
|
|
|
|
("sendermap", "url", url + "sender/map/§"),
|
2019-01-17 16:32:47 +02:00
|
|
|
("senderaccess", "url", url + "sender/access/§"),
|
2021-08-08 09:21:14 +02:00
|
|
|
("senderlogin", "url", url + "sender/login/§"),
|
|
|
|
("senderrate", "url", url + "sender/rate/§")
|
2018-07-26 21:57:21 +02:00
|
|
|
])
|
|
|
|
|
2021-08-29 17:40:37 +02:00
|
|
|
def start_mta_sts_daemon():
|
|
|
|
os.chmod("/root/", 0o755) # read access to /root/.netrc required
|
|
|
|
os.setuid(getpwnam('postfix').pw_uid)
|
|
|
|
from postfix_mta_sts_resolver import daemon
|
|
|
|
daemon.main()
|
|
|
|
|
2020-03-07 20:17:24 +02:00
|
|
|
def is_valid_postconf_line(line):
|
|
|
|
return not line.startswith("#") \
|
|
|
|
and not line == ''
|
|
|
|
|
2019-01-07 23:49:10 +02:00
|
|
|
# Actual startup script
|
2019-08-23 08:43:59 +02:00
|
|
|
os.environ["FRONT_ADDRESS"] = system.get_host_address_from_environment("FRONT", "front")
|
|
|
|
os.environ["ADMIN_ADDRESS"] = system.get_host_address_from_environment("ADMIN", "admin")
|
2019-10-12 01:01:35 +02:00
|
|
|
os.environ["ANTISPAM_MILTER_ADDRESS"] = system.get_host_address_from_environment("ANTISPAM_MILTER", "antispam:11332")
|
2019-08-23 08:43:59 +02:00
|
|
|
os.environ["LMTP_ADDRESS"] = system.get_host_address_from_environment("LMTP", "imap:2525")
|
2021-07-18 18:24:46 +02:00
|
|
|
os.environ["OUTCLEAN"] = os.environ["HOSTNAMES"].split(",")[0]
|
2021-07-18 18:43:20 +02:00
|
|
|
try:
|
2021-07-24 12:40:38 +02:00
|
|
|
_to_lookup = os.environ["OUTCLEAN"]
|
|
|
|
# Ensure we lookup a FQDN: @see #1884
|
|
|
|
if not _to_lookup.endswith('.'):
|
|
|
|
_to_lookup += '.'
|
|
|
|
os.environ["OUTCLEAN_ADDRESS"] = system.resolve_hostname(_to_lookup)
|
2021-07-18 18:43:20 +02:00
|
|
|
except:
|
|
|
|
os.environ["OUTCLEAN_ADDRESS"] = "10.10.10.10"
|
2017-09-24 14:34:46 +02:00
|
|
|
|
|
|
|
for postfix_file in glob.glob("/conf/*.cf"):
|
2019-07-25 10:33:57 +02:00
|
|
|
conf.jinja(postfix_file, os.environ, os.path.join("/etc/postfix", os.path.basename(postfix_file)))
|
2017-09-24 14:34:46 +02:00
|
|
|
|
|
|
|
if os.path.exists("/overrides/postfix.cf"):
|
|
|
|
for line in open("/overrides/postfix.cf").read().strip().split("\n"):
|
2020-03-07 20:17:24 +02:00
|
|
|
if is_valid_postconf_line(line):
|
|
|
|
os.system('postconf -e "{}"'.format(line))
|
2017-09-24 14:34:46 +02:00
|
|
|
|
|
|
|
if os.path.exists("/overrides/postfix.master"):
|
|
|
|
for line in open("/overrides/postfix.master").read().strip().split("\n"):
|
2020-03-07 20:17:24 +02:00
|
|
|
if is_valid_postconf_line(line):
|
|
|
|
os.system('postconf -Me "{}"'.format(line))
|
2017-09-24 14:34:46 +02:00
|
|
|
|
|
|
|
for map_file in glob.glob("/overrides/*.map"):
|
|
|
|
destination = os.path.join("/etc/postfix", os.path.basename(map_file))
|
|
|
|
shutil.copyfile(map_file, destination)
|
|
|
|
os.system("postmap {}".format(destination))
|
|
|
|
os.remove(destination)
|
|
|
|
|
2021-08-29 17:40:37 +02:00
|
|
|
if os.path.exists("/overrides/mta-sts-daemon.yml"):
|
|
|
|
shutil.copyfile("/overrides/mta-sts-daemon.yml", "/etc/mta-sts-daemon.yml")
|
2021-08-30 14:21:28 +02:00
|
|
|
conf.jinja("/etc/mta-sts-daemon.yml", os.environ, "/etc/mta-sts-daemon.yml")
|
2021-08-29 17:40:37 +02:00
|
|
|
|
2021-08-01 11:09:44 +02:00
|
|
|
if not os.path.exists("/etc/postfix/tls_policy.map.db"):
|
|
|
|
with open("/etc/postfix/tls_policy.map", "w") as f:
|
2021-08-30 14:44:13 +02:00
|
|
|
for domain in ['example.com']:
|
2021-08-02 13:14:40 +02:00
|
|
|
f.write(f'{domain}\tsecure\n')
|
2021-08-01 11:09:44 +02:00
|
|
|
os.system("postmap /etc/postfix/tls_policy.map")
|
|
|
|
|
2019-03-04 19:52:04 +02:00
|
|
|
if "RELAYUSER" in os.environ:
|
|
|
|
path = "/etc/postfix/sasl_passwd"
|
2019-07-25 10:33:57 +02:00
|
|
|
conf.jinja("/conf/sasl_passwd", os.environ, path)
|
2019-03-04 19:52:04 +02:00
|
|
|
os.system("postmap {}".format(path))
|
2017-09-24 14:34:46 +02:00
|
|
|
|
2018-07-26 21:57:21 +02:00
|
|
|
# Run Podop and Postfix
|
|
|
|
multiprocessing.Process(target=start_podop).start()
|
2021-08-29 17:40:37 +02:00
|
|
|
multiprocessing.Process(target=start_mta_sts_daemon).start()
|
2019-06-23 21:00:01 +02:00
|
|
|
os.system("/usr/libexec/postfix/post-install meta_directory=/etc/postfix create-missing")
|
2020-05-04 17:41:53 +02:00
|
|
|
# Before starting postfix, we need to check permissions on /queue
|
|
|
|
# in the event that postfix,postdrop id have changed
|
2020-05-04 20:18:32 +02:00
|
|
|
os.system("postfix set-permissions")
|
2019-06-23 21:18:39 +02:00
|
|
|
os.system("postfix start-fg")
|