'';
}
{
- dest = "postfix/mysql_mailbox_maps";
+ dest = "postfix/ldap_mailboxes";
user = config.services.postfix.user;
group = config.services.postfix.group;
permissions = "0440";
text = ''
- # We need to specify that option to trigger ssl connection
- tls_ciphers = TLSv1.2
- user = ${config.myEnv.mail.postfix.mysql.user}
- password = ${config.myEnv.mail.postfix.mysql.password}
- hosts = unix:${config.myEnv.mail.postfix.mysql.socket}
- dbname = ${config.myEnv.mail.postfix.mysql.database}
- result_format = /%d/%u
- query = SELECT DISTINCT '%s'
- FROM mailboxes
- WHERE active = 1
- AND (
- (domain = '%d' AND user = '%u' AND regex = 0)
- OR (
- regex = 1
- AND '%d' REGEXP CONCAT('^',domain,'$')
- AND '%u' REGEXP CONCAT('^',user,'$')
- )
- )
- LIMIT 1
+ server_host = ldaps://${config.myEnv.mail.dovecot.ldap.host}:636
+ search_base = ${config.myEnv.mail.dovecot.ldap.base}
+ query_filter = ${config.myEnv.mail.dovecot.ldap.postfix_mailbox_filter}
+ bind_dn = ${config.myEnv.mail.dovecot.ldap.dn}
+ bind_pw = ${config.myEnv.mail.dovecot.ldap.password}
+ result_attribute = immaePostfixAddress
+ result_format = dummy
+ version = 3
'';
}
{
restart = true;
paths = [
config.secrets.fullPaths."postfix/mysql_alias_maps"
- config.secrets.fullPaths."postfix/mysql_mailbox_maps"
+ config.secrets.fullPaths."postfix/ldap_mailboxes"
config.secrets.fullPaths."postfix/mysql_sender_login_maps"
config.secrets.fullPaths."postfix/ldap_ejabberd_users_immae_fr"
];
joined = builtins.concatStringsSep ",";
in pkgs.writeText "host-sender-login"
(builtins.concatStringsSep "\n" (mapAttrsToList (n: v: "${n} ${joined v}") addresses));
- host_dummy_mailboxes = pkgs.writeText "host-virtual-mailbox"
- (builtins.concatStringsSep "\n" (["immae-eu@immae.eu dummy"] ++ lib.attrsets.mapAttrsToList (n: v: "${n}@immae.eu dummy") nodes));
};
in
recipient_maps // relay_restrictions // virtual_map // sasl_access;
config.myEnv.dns.masterZones
));
virtual_mailbox_maps = [
- "hash:/etc/postfix/host_dummy_mailboxes"
- "mysql:${config.secrets.fullPaths."postfix/mysql_mailbox_maps"}"
+ "ldap:${config.secrets.fullPaths."postfix/ldap_mailboxes"}"
];
dovecot_destination_recipient_limit = "1";
virtual_transport = "dovecot";
'';
}
{
- dest = "postfix/mysql_mailbox_maps";
+ dest = "postfix/ldap_mailboxes";
user = config.services.postfix.user;
group = config.services.postfix.group;
permissions = "0440";
text = ''
- # We need to specify that option to trigger ssl connection
- tls_ciphers = TLSv1.2
- user = ${config.myEnv.mail.postfix.mysql.user}
- password = ${config.myEnv.mail.postfix.mysql.password}
- hosts = ${config.myEnv.mail.postfix.mysql.remoteHost}
- dbname = ${config.myEnv.mail.postfix.mysql.database}
- query = SELECT DISTINCT 1
- FROM mailboxes
- WHERE active = 1
- AND (
- (domain = '%d' AND user = '%u' AND regex = 0)
- OR (
- regex = 1
- AND '%d' REGEXP CONCAT('^',domain,'$')
- AND '%u' REGEXP CONCAT('^',user,'$')
- )
- )
- LIMIT 1
+ server_host = ldaps://${config.myEnv.mail.dovecot.ldap.host}:636
+ search_base = ${config.myEnv.mail.dovecot.ldap.base}
+ query_filter = ${config.myEnv.mail.dovecot.ldap.postfix_mailbox_filter}
+ bind_dn = ${config.myEnv.mail.dovecot.ldap.dn}
+ bind_pw = ${config.myEnv.mail.dovecot.ldap.password}
+ result_attribute = immaePostfixAddress
+ result_format = dummy
+ version = 3
'';
}
{
user = ${config.myEnv.mail.sympa.postgresql.user}
password = ${config.myEnv.mail.sympa.postgresql.password}
dbname = ${config.myEnv.mail.sympa.postgresql.database}
- query = SELECT DISTINCT CONCAT(name_list, '@', robot_list) FROM list_table
+ query = SELECT DISTINCT 1 FROM list_table WHERE '%s' IN (
+ CONCAT(name_list, '@', robot_list),
+ CONCAT(name_list, '-request@', robot_list),
+ CONCAT(name_list, '-editor@', robot_list),
+ CONCAT(name_list, '-unsubscribe@', robot_list),
+ CONCAT(name_list, '-owner@', robot_list),
+ CONCAT('sympa-request@', robot_list),
+ CONCAT('sympa-owner@', robot_list),
+ CONCAT('sympa@', robot_list),
+ CONCAT('listmaster@', robot_list),
+ CONCAT('bounce@', robot_list),
+ CONCAT('abuse-feedback-report@', robot_list)
+ )
'';
}
{
restart = true;
paths = [
config.secrets.fullPaths."postfix/mysql_alias_maps"
- config.secrets.fullPaths."postfix/mysql_mailbox_maps"
config.secrets.fullPaths."postfix/sympa_mailbox_maps"
config.secrets.fullPaths."postfix/ldap_ejabberd_users_immae_fr"
+ config.secrets.fullPaths."postfix/ldap_mailboxes"
];
};
services.postfix = {
)
);
};
- sasl_access = {
- host_dummy_mailboxes = pkgs.writeText "host-virtual-mailbox"
- (builtins.concatStringsSep "\n" (lib.attrsets.mapAttrsToList (n: v: "${n}@immae.eu 1") nodes));
- };
in
- recipient_maps // relay_restrictions // virtual_map // sasl_access;
+ recipient_maps // relay_restrictions // virtual_map;
config = {
### postfix module overrides
readme_directory = "${pkgs.postfix}/share/postfix/doc";
"ldap:${config.secrets.fullPaths."postfix/ldap_ejabberd_users_immae_fr"}"
];
virtual_mailbox_maps = [
- "hash:/etc/postfix/host_dummy_mailboxes"
- "mysql:${config.secrets.fullPaths."postfix/mysql_mailbox_maps"}"
+ "ldap:${config.secrets.fullPaths."postfix/ldap_mailboxes"}"
"pgsql:${config.secrets.fullPaths."postfix/sympa_mailbox_maps"}"
];
in