- Description
- Setup - The basics of getting started with OpenDKIM
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
A Puppet module to install and manage OpenDKIM
- install OpenDKIM package
- modify the configuration file /etc/opendkim.conf
- add and modify files in /etc/opendkim
- purge /etc/opendkim and /etc/dkim from all unuseful files
Warning : this package will replace all your RSA keys ! Before using it, be sure to add all your keys in Hiera !
A basic example is as follows:
class { '::opendkim':
socket => 'inet:8891@127.0.0.1',
trusted_hosts => ['::1','127.0.0.1','localhost'],
keys => [
{
domain => 'mydomain.com',
selector => 'default',
publickey => 'p=yourPublicKey',
privatekey => 'Your Private Key',
signingdomains => ['*@mydomain.com', '*@subdomain.mydomain.com'],
}
]
}
You can also use natively Hiera :
include ::opendkim
opendkim::socket: 'inet:8891@127.0.0.1'
opendkim::trusted_hosts:
- '::1'
- '127.0.0.1'
- 'localhost'
opendkim::keys:
- domain: mydomain.com
selector: default
hash_algorithms: "sha1256"
publickey: "p=yourPublicKey"
publickeyextended: "secondLineofPublicKey"
privatekey: |
-----BEGIN RSA PRIVATE KEY-----
Your Private Key
-----END RSA PRIVATE KEY-----
signingdomains:
- '*@mydomain.com'
- '*@subdomain.mydomain.com'
If you want to use OpenDKIM though a UNIX socket with postfix for example, you should configure the socket like this :
opendkim::socket: 'local:/var/run/opendkim/opendkim.sock'
opendkim::umask: '0111'
This module has only been tested on my Debian and Centos servers. I can not guarantee for any other Operating System
You are pleased to fork this module and adapt it for you needs. I am open to any Pull Request :-)