Merge pull request #382 from tyranron/texthash_format

Use "texthash" Postfix lookup format instead of "hash"
This commit is contained in:
Thomas VIAL 2016-11-21 11:44:15 +01:00 committed by GitHub
commit 90708bc924
3 changed files with 16 additions and 20 deletions

View file

@ -7,8 +7,8 @@ readme_directory = no
# Basic configuration # Basic configuration
# myhostname = # myhostname =
alias_maps = hash:/etc/aliases alias_maps = texthash:/etc/aliases
alias_database = hash:/etc/aliases alias_database = texthash:/etc/aliases
mydestination = mydestination =
relayhost = relayhost =
mynetworks = 127.0.0.0/8 [::1]/128 [fe80::]/64 mynetworks = 127.0.0.0/8 [::1]/128 [fe80::]/64
@ -59,8 +59,8 @@ broken_sasl_auth_clients = yes
# Mail directory # Mail directory
virtual_transport = lmtp:unix:/var/run/dovecot/lmtp virtual_transport = lmtp:unix:/var/run/dovecot/lmtp
virtual_mailbox_domains = /etc/postfix/vhost virtual_mailbox_domains = /etc/postfix/vhost
virtual_mailbox_maps = hash:/etc/postfix/vmailbox virtual_mailbox_maps = texthash:/etc/postfix/vmailbox
virtual_alias_maps = hash:/etc/postfix/virtual virtual_alias_maps = texthash:/etc/postfix/virtual
# Additional option for filtering # Additional option for filtering
content_filter = smtp-amavis:[127.0.0.1]:10024 content_filter = smtp-amavis:[127.0.0.1]:10024

View file

@ -16,7 +16,6 @@ fi
# #
# Default variables # Default variables
# #
echo "export VIRUSMAILS_DELETE_DELAY=${VIRUSMAILS_DELETE_DELAY:="7"}" >> /root/.bashrc echo "export VIRUSMAILS_DELETE_DELAY=${VIRUSMAILS_DELETE_DELAY:="7"}" >> /root/.bashrc
# #
@ -36,6 +35,8 @@ fi
# #
# Users # Users
# #
echo -n > /etc/postfix/vmailbox
echo -n > /etc/dovecot/userdb
if [ -f /tmp/docker-mailserver/postfix-accounts.cf -a "$ENABLE_LDAP" != 1 ]; then if [ -f /tmp/docker-mailserver/postfix-accounts.cf -a "$ENABLE_LDAP" != 1 ]; then
echo "Checking file line endings" echo "Checking file line endings"
sed -i 's/\r//g' /tmp/docker-mailserver/postfix-accounts.cf sed -i 's/\r//g' /tmp/docker-mailserver/postfix-accounts.cf
@ -45,7 +46,6 @@ if [ -f /tmp/docker-mailserver/postfix-accounts.cf -a "$ENABLE_LDAP" != 1 ]; the
# Checking that /tmp/docker-mailserver/postfix-accounts.cf ends with a newline # Checking that /tmp/docker-mailserver/postfix-accounts.cf ends with a newline
sed -i -e '$a\' /tmp/docker-mailserver/postfix-accounts.cf sed -i -e '$a\' /tmp/docker-mailserver/postfix-accounts.cf
echo -n > /etc/dovecot/userdb
chown dovecot:dovecot /etc/dovecot/userdb chown dovecot:dovecot /etc/dovecot/userdb
chmod 640 /etc/dovecot/userdb chmod 640 /etc/dovecot/userdb
@ -168,9 +168,11 @@ fi
# #
# Aliases # Aliases
# #
echo -n > /etc/postfix/virtual
echo -n > /etc/postfix/regexp
if [ -f /tmp/docker-mailserver/postfix-virtual.cf ]; then if [ -f /tmp/docker-mailserver/postfix-virtual.cf ]; then
# Copying virtual file # Copying virtual file
cp /tmp/docker-mailserver/postfix-virtual.cf /etc/postfix/virtual cp -f /tmp/docker-mailserver/postfix-virtual.cf /etc/postfix/virtual
while read from to while read from to
do do
# Setting variables for better readability # Setting variables for better readability
@ -185,7 +187,7 @@ fi
if [ -f /tmp/docker-mailserver/postfix-regexp.cf ]; then if [ -f /tmp/docker-mailserver/postfix-regexp.cf ]; then
# Copying regexp alias file # Copying regexp alias file
echo "Adding regexp alias file postfix-regexp.cf" echo "Adding regexp alias file postfix-regexp.cf"
cp /tmp/docker-mailserver/postfix-regexp.cf /etc/postfix/regexp cp -f /tmp/docker-mailserver/postfix-regexp.cf /etc/postfix/regexp
sed -i -e '/^virtual_alias_maps/{ sed -i -e '/^virtual_alias_maps/{
s/ regexp:.*// s/ regexp:.*//
s/$/ regexp:\/etc\/postfix\/regexp/ s/$/ regexp:\/etc\/postfix\/regexp/
@ -317,10 +319,6 @@ if [ -f /tmp/vhost.tmp ]; then
cat /tmp/vhost.tmp | sort | uniq > /etc/postfix/vhost && rm /tmp/vhost.tmp cat /tmp/vhost.tmp | sort | uniq > /etc/postfix/vhost && rm /tmp/vhost.tmp
fi fi
echo "Postfix configurations"
touch /etc/postfix/vmailbox && postmap /etc/postfix/vmailbox
touch /etc/postfix/virtual && postmap /etc/postfix/virtual
# PERMIT_DOCKER Option # PERMIT_DOCKER Option
container_ip=$(ip addr show eth0 | grep 'inet ' | sed 's/[^0-9\.\/]*//g' | cut -d '/' -f 1) container_ip=$(ip addr show eth0 | grep 'inet ' | sed 's/[^0-9\.\/]*//g' | cut -d '/' -f 1)
container_network="$(echo $container_ip | cut -d '.' -f1-2).0.0" container_network="$(echo $container_ip | cut -d '.' -f1-2).0.0"
@ -377,7 +375,7 @@ if [ ! -z "$AWS_SES_HOST" -a ! -z "$AWS_SES_USERPASS" ]; then
"relayhost = [$AWS_SES_HOST]:$AWS_SES_PORT" \ "relayhost = [$AWS_SES_HOST]:$AWS_SES_PORT" \
"smtp_sasl_auth_enable = yes" \ "smtp_sasl_auth_enable = yes" \
"smtp_sasl_security_options = noanonymous" \ "smtp_sasl_security_options = noanonymous" \
"smtp_sasl_password_maps = hash:/etc/postfix/sasl_passwd" \ "smtp_sasl_password_maps = texthash:/etc/postfix/sasl_passwd" \
"smtp_use_tls = yes" \ "smtp_use_tls = yes" \
"smtp_tls_security_level = encrypt" \ "smtp_tls_security_level = encrypt" \
"smtp_tls_note_starttls_offer = yes" \ "smtp_tls_note_starttls_offer = yes" \
@ -386,10 +384,8 @@ fi
# Install SASL passwords # Install SASL passwords
if [ -f /etc/postfix/sasl_passwd ]; then if [ -f /etc/postfix/sasl_passwd ]; then
postmap hash:/etc/postfix/sasl_passwd chown root:root /etc/postfix/sasl_passwd
rm /etc/postfix/sasl_passwd chmod 0600 /etc/postfix/sasl_passwd
chown root:root /etc/postfix/sasl_passwd.db
chmod 0600 /etc/postfix/sasl_passwd.db
echo "Loaded SASL_PASSWD" echo "Loaded SASL_PASSWD"
else else
echo "==> Warning: 'SASL_PASSWD' is not provided. /etc/postfix/sasl_passwd not created." echo "==> Warning: 'SASL_PASSWD' is not provided. /etc/postfix/sasl_passwd not created."

View file

@ -123,8 +123,8 @@
[ "$status" -eq 0 ] [ "$status" -eq 0 ]
} }
@test "checking sasl: sasl_passwd.db exists" { @test "checking sasl: sasl_passwd exists" {
run docker exec mail [ -f /etc/postfix/sasl_passwd.db ] run docker exec mail [ -f /etc/postfix/sasl_passwd ]
[ "$status" -eq 0 ] [ "$status" -eq 0 ]
} }