diff options
Diffstat (limited to 'cluster/prod/app/email/deploy')
-rw-r--r-- | cluster/prod/app/email/deploy/email.hcl | 505 |
1 files changed, 505 insertions, 0 deletions
diff --git a/cluster/prod/app/email/deploy/email.hcl b/cluster/prod/app/email/deploy/email.hcl new file mode 100644 index 0000000..0c6308a --- /dev/null +++ b/cluster/prod/app/email/deploy/email.hcl @@ -0,0 +1,505 @@ +job "email" { + datacenters = ["orion"] + type = "service" + priority = 65 + + group "dovecot" { + count = 1 + + network { + port "zauthentication_port" { + static = 1337 + to = 1337 + } + port "imaps_port" { + static = 993 + to = 993 + } + port "imap_port" { + static = 143 + to = 143 + } + port "lmtp_port" { + static = 24 + to = 24 + } + } + + task "server" { + driver = "docker" + + constraint { + attribute = "${attr.unique.hostname}" + operator = "=" + value = "doradille" + } + + config { + image = "superboum/amd64_dovecot:v6" + readonly_rootfs = false + network_mode = "host" + ports = [ "zauthentication_port", "imaps_port", "imap_port", "lmtp_port" ] + command = "dovecot" + args = [ "-F" ] + volumes = [ + "secrets/ssl/certs:/etc/ssl/certs", + "secrets/ssl/private:/etc/ssl/private", + "secrets/conf/:/etc/dovecot/", + "/mnt/ssd/mail:/var/mail/", + ] + } + + env { + TLSINFO = "/C=FR/ST=Bretagne/L=Rennes/O=Deuxfleurs/CN=imap.deuxfleurs.fr" + } + + resources { + cpu = 100 + memory = 200 + } + + service { + name = "dovecot-imap" + port = "imap_port" + tags = [ + "dovecot" + ] + check { + type = "tcp" + port = "imap_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "90s" + ignore_warnings = false + } + } + } + + service { + name = "dovecot-imaps" + port = "imaps_port" + tags = [ + "dovecot", + "(diplonat (tcp_port 993))" + ] + + check { + type = "tcp" + port = "imaps_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "90s" + ignore_warnings = false + } + } + } + + service { + name = "dovecot-lmtp" + port = "lmtp_port" + tags = [ + "dovecot", + ] + + check { + type = "tcp" + port = "lmtp_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "90s" + ignore_warnings = false + } + } + } + + service { + name = "dovecot-auth" + port = "zauthentication_port" + tags = [ + "dovecot", + ] + check { + type = "tcp" + port = "zauthentication_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "90s" + ignore_warnings = false + } + } + } + + template { + data = file("../config/dovecot/dovecot-ldap.conf.tpl") + destination = "secrets/conf/dovecot-ldap.conf" + perms = "400" + } + template { + data = file("../config/dovecot/dovecot.conf") + destination = "secrets/conf/dovecot.conf" + perms = "400" + } + + # ----- secrets ------ + template { + # data = "{{ key \"secrets/email/dovecot/dovecot.crt\" }}" + data = "{{ with $d := key \"tricot/certs/imap.deuxfleurs.fr\" | parseJSON }}{{ $d.cert_pem }}{{ end }}" + destination = "secrets/ssl/certs/dovecot.crt" + perms = "400" + } + template { + # data = "{{ key \"secrets/email/dovecot/dovecot.key\" }}" + data = "{{ with $d := key \"tricot/certs/imap.deuxfleurs.fr\" | parseJSON }}{{ $d.key_pem }}{{ end }}" + destination = "secrets/ssl/private/dovecot.key" + perms = "400" + } + } + } + + group "opendkim" { + count = 1 + + network { + port "dkim_port" { + static = 8999 + to = 8999 + } + } + + task "server" { + driver = "docker" + config { + image = "superboum/amd64_opendkim:v6" + readonly_rootfs = false + ports = [ "dkim_port" ] + volumes = [ + "/dev/log:/dev/log", + "secrets/dkim:/etc/dkim", + ] + } + + resources { + cpu = 100 + memory = 50 + } + + service { + name = "opendkim" + port = "dkim_port" + address_mode = "host" + tags = [ + "opendkim", + ] + check { + type = "tcp" + port = "dkim_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "90s" + ignore_warnings = false + } + } + } + + template { + data = file("../config/dkim/keytable") + destination = "secrets/dkim/keytable" + } + template { + data = file("../config/dkim/signingtable") + destination = "secrets/dkim/signingtable" + } + template { + data = file("../config/dkim/trusted") + destination = "secrets/dkim/trusted" + } + + # --- secrets --- + template { + data = "{{ key \"secrets/email/dkim/smtp.private\" }}" + destination = "secrets/dkim/smtp.private" + } + } + } + + group "postfix" { + count = 1 + + network { + port "smtp_port" { + static = 25 + to = 25 + } + port "smtps_port" { + static = 465 + to = 465 + } + port "submission_port" { + static = 587 + to = 587 + } + } + + task "server" { + driver = "docker" + config { + image = "superboum/amd64_postfix:v3" + readonly_rootfs = false + network_mode = "host" + ports = [ "smtp_port", "smtps_port", "submission_port" ] + command = "postfix" + args = [ "start-fg" ] + volumes = [ + "secrets/ssl:/etc/ssl", + "secrets/postfix:/etc/postfix-conf", + "/dev/log:/dev/log" + ] + } + + env { + TLSINFO = "/C=FR/ST=Bretagne/L=Rennes/O=Deuxfleurs/CN=smtp.deuxfleurs.fr" + MAILNAME = "smtp.deuxfleurs.fr" + } + + resources { + cpu = 100 + memory = 200 + } + + service { + name = "postfix-smtp" + port = "smtp_port" + address_mode = "host" + tags = [ + "postfix", + "(diplonat (tcp_port 25 465 587))" + ] + check { + type = "tcp" + port = "smtp_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "90s" + ignore_warnings = false + } + } + } + + service { + name = "postfix-smtps" + port = "smtps_port" + address_mode = "host" + tags = [ + "postfix", + ] + + check { + type = "tcp" + port = "smtps_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "90s" + ignore_warnings = false + } + } + } + + service { + name = "postfix-submission" + port = "submission_port" + address_mode = "host" + tags = [ + "postfix", + ] + + check { + type = "tcp" + port = "submission_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "90s" + ignore_warnings = false + } + } + } + + template { + data = file("../config/postfix/ldap-account.cf.tpl") + destination = "secrets/postfix/ldap-account.cf" + } + + template { + data = file("../config/postfix/ldap-alias.cf.tpl") + destination = "secrets/postfix/ldap-alias.cf" + } + + template { + data = file("../config/postfix/ldap-virtual-domains.cf.tpl") + destination = "secrets/postfix/ldap-virtual-domains.cf" + } + + template { + data = file("../config/postfix/dynamicmaps.cf") + destination = "secrets/postfix/dynamicmaps.cf" + } + + template { + data = file("../config/postfix/header_checks") + destination = "secrets/postfix/header_checks" + } + + template { + data = file("../config/postfix/main.cf") + destination = "secrets/postfix/main.cf" + } + + template { + data = file("../config/postfix/master.cf") + destination = "secrets/postfix/master.cf" + } + + template { + data = file("../config/postfix/transport") + destination = "secrets/postfix/transport" + } + + # --- secrets --- + template { + # data = "{{ key \"secrets/email/postfix/postfix.crt\" }}" + data = "{{ with $d := key \"tricot/certs/smtp.deuxfleurs.fr\" | parseJSON }}{{ $d.cert_pem }}{{ end }}" + destination = "secrets/ssl/postfix.crt" + perms = "400" + } + + template { + # data = "{{ key \"secrets/email/postfix/postfix.key\" }}" + data = "{{ with $d := key \"tricot/certs/smtp.deuxfleurs.fr\" | parseJSON }}{{ $d.key_pem }}{{ end }}" + destination = "secrets/ssl/postfix.key" + perms = "400" + } + } + } + + group "alps" { + count = 1 + + network { + port "alps_web_port" { to = 1323 } + } + + task "main" { + driver = "docker" + config { + image = "lxpz/alps_amd64:v2" + readonly_rootfs = true + ports = [ "alps_web_port" ] + args = [ + "-skiptlsverification", + "-theme", + "alps", + "imaps://imap.deuxfleurs.fr:993", + "smtps://smtp.deuxfleurs.fr:465" + ] + } + + resources { + cpu = 100 + memory = 100 + } + + service { + name = "alps" + port = "alps_web_port" + address_mode = "host" + tags = [ + "alps", + "traefik.enable=true", + "traefik.frontend.entryPoints=https,http", + "traefik.frontend.rule=Host:alps.deuxfleurs.fr", + "tricot alps.deuxfleurs.fr", + ] + check { + type = "tcp" + port = "alps_web_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "5m" + ignore_warnings = false + } + } + } + } + } + + + group "sogo" { + count = 1 + + network { + port "sogo_web_port" { to = 8080 } + } + + task "bundle" { + driver = "docker" + config { + image = "superboum/amd64_sogo:v7" + readonly_rootfs = false + ports = [ "sogo_web_port" ] + volumes = [ + "secrets/sogo.conf:/etc/sogo/sogo.conf", + ] + } + + template { + data = file("../config/sogo/sogo.conf.tpl") + destination = "secrets/sogo.conf" + } + + resources { + cpu = 200 + memory = 1000 + } + + service { + name = "sogo" + port = "sogo_web_port" + address_mode = "host" + tags = [ + "sogo", + "tricot www.sogo.deuxfleurs.fr", + "tricot sogo.deuxfleurs.fr", + ] + check { + type = "tcp" + port = "sogo_web_port" + interval = "60s" + timeout = "5s" + check_restart { + limit = 3 + grace = "5m" + ignore_warnings = false + } + } + } + + } + } +} |