diff options
author | Armael <armael@noreply.localhost> | 2024-11-21 17:49:15 +0000 |
---|---|---|
committer | Armael <armael@noreply.localhost> | 2024-11-21 17:49:15 +0000 |
commit | 90f861e1e12ebaa232225ff22f7782af1cff563c (patch) | |
tree | e27ea8432dd89559f7a3bd16e62e2760f62bb292 /cluster/prod/app/email | |
parent | 3f51534e0335e1335312adebf8a285abcf9faf1b (diff) | |
parent | e0385b0456cbd5f64e5464d0b6a36171ba770ba6 (diff) | |
download | nixcfg-90f861e1e12ebaa232225ff22f7782af1cff563c.tar.gz nixcfg-90f861e1e12ebaa232225ff22f7782af1cff563c.zip |
Merge pull request 'postfix: add rate-limiting exceptions for our own nodes' (#39) from postfix-rate-limit-exceptions into mainHEADmain
Reviewed-on: https://git.deuxfleurs.fr/Deuxfleurs/nixcfg/pulls/39
Diffstat (limited to 'cluster/prod/app/email')
-rw-r--r-- | cluster/prod/app/email/config/postfix/main.cf | 7 | ||||
-rw-r--r-- | cluster/prod/app/email/deploy/email.hcl | 23 |
2 files changed, 28 insertions, 2 deletions
diff --git a/cluster/prod/app/email/config/postfix/main.cf b/cluster/prod/app/email/config/postfix/main.cf index 5593716..ca9c87d 100644 --- a/cluster/prod/app/email/config/postfix/main.cf +++ b/cluster/prod/app/email/config/postfix/main.cf @@ -83,11 +83,14 @@ smtpd_forbid_unauth_pipelining = yes smtpd_discard_ehlo_keywords = chunking smtpd_forbid_bare_newline = yes -smtpd_client_connection_rate_limit = 2 - #=== # Rate limiting #=== +smtpd_client_connection_rate_limit = 2 +# do not rate-limit ourselves +# in particular, useful for forgejo who opens a lot of SMTP connections +smtpd_client_event_limit_exceptions = $mynetworks /etc/postfix/rate-limit-exceptions + slow_destination_recipient_limit = 20 slow_destination_concurrency_limit = 2 diff --git a/cluster/prod/app/email/deploy/email.hcl b/cluster/prod/app/email/deploy/email.hcl index 10e4d50..287cff3 100644 --- a/cluster/prod/app/email/deploy/email.hcl +++ b/cluster/prod/app/email/deploy/email.hcl @@ -382,6 +382,29 @@ job "email" { destination = "secrets/postfix/transport" } + template { + # Collect machine IPs from the cluster. + # We use intermediate maps to ensure we get a sorted list with no duplicates, + # so that it is robust wrt. changes in the order of the output of ls or + # addition of new machines in an existing site. + # (scratch.MapValues returns the list of *values* in the map, sorted by *key*) + data = <<EOH + {{- range ls "diplonat/autodiscovery/ipv4" }} + {{- with $a := .Value | parseJSON }} + {{- scratch.MapSet "ipv4" $a.address $a.address }} + {{- end }} + {{- end -}} + {{- range ls "diplonat/autodiscovery/ipv6" }} + {{- with $a := .Value | parseJSON }} + {{- scratch.MapSet "ipv6" $a.address $a.address }} + {{- end }} + {{- end -}} + {{- range scratch.MapValues "ipv4" }}{{ . }} {{ end }} + {{- range scratch.MapValues "ipv6" }}[{{ . }}] {{ end }} + EOH + destination = "secrets/postfix/rate-limit-exceptions" + } + # --- secrets --- template { data = "{{ with $d := key \"tricot/certs/smtp.deuxfleurs.fr\" | parseJSON }}{{ $d.cert_pem }}{{ end }}" |