The srv-networktests service account has root@wmcloud.org as its email address. Since that email address does not route anywhere (T278109) and that service account is a maintainer of the admin tool, we're getting annoying bounce emails for all root@toolforge.org/tools.wmflabs.org emails.
Description
Description
Related Objects
Related Objects
Event Timeline
Comment Actions
Update the email account of that address to something that does not bounce. Maybe we can just blackhole it?
Another alternative (not necessarily mutually exclusive) would be to remove that account from the project members on Keystone and instead use security::access::config in Puppet to add access.conf entries that let this service account log in to only the hosts it really needs to.
Comment Actions
I just edited the email address of the account to be null@localhost (in LDAP). Hopefully that works as blackhole without further changes.
aborrero@mwmaint1002:~ $ ldapsearch -x uid=srv-networktests | grep mail mail: null@localhost
Please reopen if required.
Comment Actions
Went one step further, deleted the email attribute:
aborrero@mwmaint1002:~ $ ldapsearch -x uid=srv-networktests | grep mail aborrero@mwmaint1002:~ $
Please reopen if required.