aboutsummaryrefslogtreecommitdiff
path: root/terraform/modules/email/main.tf
diff options
context:
space:
mode:
Diffstat (limited to 'terraform/modules/email/main.tf')
-rw-r--r--terraform/modules/email/main.tf268
1 files changed, 268 insertions, 0 deletions
diff --git a/terraform/modules/email/main.tf b/terraform/modules/email/main.tf
new file mode 100644
index 0000000..510994e
--- /dev/null
+++ b/terraform/modules/email/main.tf
@@ -0,0 +1,268 @@
+variable "secret_cloudflare_token" {}
+
+variable "domain" {
+ description = "Domain name of email addresses."
+}
+
+variable "server_ipv4" {
+ description = "IP address of primary mail server."
+}
+
+variable "server_ipv6" {
+ description = "IP address of primary mail server."
+}
+
+variable "server_id" {
+ description = "Unique server ID that will trigger this module, if changed."
+}
+
+resource "tls_private_key" "tls_mail" {
+ algorithm = "RSA"
+}
+
+resource "acme_registration" "tls_mail" {
+ account_key_pem = "${tls_private_key.tls_mail.private_key_pem}"
+ email_address = "jakob@odersky.com"
+}
+
+resource "acme_certificate" "tls_mail" {
+ account_key_pem = "${acme_registration.tls_mail.account_key_pem}"
+ common_name = "mail.${var.domain}"
+
+ dns_challenge {
+ provider = "cloudflare"
+
+ config {
+ CLOUDFLARE_EMAIL = "jakob@odersky.com"
+ CLOUDFLARE_API_KEY = "${var.secret_cloudflare_token}"
+ }
+ }
+}
+
+resource "hcloud_rdns" "rdns4" {
+ server_id = "${var.server_id}"
+ ip_address = "${var.server_ipv4}"
+ dns_ptr = "mail.${var.domain}"
+}
+
+resource "hcloud_rdns" "rdns6" {
+ server_id = "${var.server_id}"
+ ip_address = "${var.server_ipv6}"
+ dns_ptr = "mail.${var.domain}"
+}
+
+resource "cloudflare_record" "record_a" {
+ type = "A"
+ domain = "${var.domain}"
+ name = "mail"
+ value = "${var.server_ipv4}"
+}
+
+resource "cloudflare_record" "record_aaaa" {
+ type = "AAAA"
+ domain = "${var.domain}"
+ name = "mail"
+ value = "${var.server_ipv6}"
+}
+
+resource "cloudflare_record" "record_mx" {
+ type = "MX"
+ domain = "${var.domain}"
+ name = "@"
+ value = "mail.${var.domain}"
+}
+
+resource "cloudflare_record" "record_spf" {
+ type = "TXT"
+ domain = "${var.domain}"
+ name = "@"
+ value = "v=spf1 a mx -all"
+}
+
+resource "cloudflare_record" "record_dmarc" {
+ type = "TXT"
+ domain = "${var.domain}"
+ name = "_dmarc"
+ value = "v=DMARC1; p=quarantine; rua=mailto:postmaster@${var.domain}"
+}
+
+resource "tls_private_key" "dkim" {
+ algorithm = "RSA"
+}
+
+resource "cloudflare_record" "record_dkim_txt" {
+ type = "TXT"
+ domain = "${var.domain}"
+ name = "mail._domainkey"
+ value = "v=DKIM1; k=rsa; p=${replace("${tls_private_key.dkim.public_key_pem}","/-----BEGIN PUBLIC KEY-----|-----END PUBLIC KEY-----|\n/","")};"
+}
+
+resource "null_resource" "config" {
+ triggers {
+ server_id = "${var.server_id}"
+ domain = "${var.domain}"
+ dkim_private_key = "${tls_private_key.dkim.private_key_pem}"
+ mail_key = "${acme_certificate.tls_mail.private_key_pem}"
+ mail_cert = "${acme_certificate.tls_mail.certificate_pem}"
+ }
+
+ connection {
+ host = "${var.server_ipv4}"
+ }
+
+ provisioner "remote-exec" {
+ inline = ["DEBIAN_FRONTEND=noninteractive apt-get install --yes postfix opendkim bsd-mailx dovecot-core dovecot-imapd"]
+ }
+
+ provisioner "file" {
+ content = "${acme_certificate.tls_mail.private_key_pem}"
+ destination = "/etc/ssl/private/mail.key.pem"
+ }
+
+ provisioner "file" {
+ content = "${acme_certificate.tls_mail.certificate_pem}"
+ destination = "/etc/ssl/mail.cert.pem"
+ }
+
+ provisioner "file" {
+ content = "${var.domain}\n"
+ destination = "/etc/mailname"
+ }
+
+ provisioner "file" {
+ source = "${path.module}/postfix-master.cf"
+ destination = "/etc/postfix/master.cf"
+ }
+
+ provisioner "file" {
+ content = <<EOF
+myhostname = mail.${var.domain}
+myorigin = /etc/mailname
+mydestination = $myhostname, ${var.domain}, localhost.localdomain, localhost
+
+smtpd_banner = $myhostname ESMTP $mail_name (Debian/GNU)
+biff = no
+
+# appending .domain is the MUA's job.
+append_dot_mydomain = no
+
+# Uncomment the next line to generate "delayed mail" warnings
+#delay_warning_time = 4h
+
+readme_directory = no
+
+# See http://www.postfix.org/COMPATIBILITY_README.html -- default to 2 on
+# fresh installs.
+compatibility_level = 2
+
+# TLS parameters
+smtpd_tls_cert_file=/etc/ssl/mail.cert.pem
+smtpd_tls_key_file=/etc/ssl/private/mail.key.pem
+smtpd_use_tls=yes
+smtpd_tls_session_cache_database = btree:$${data_directory}/smtpd_scache
+smtp_tls_session_cache_database = btree:$${data_directory}/smtp_scache
+
+smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_unauth_destination
+alias_maps = hash:/etc/aliases
+alias_database = hash:/etc/aliases
+relayhost =
+mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128
+mailbox_size_limit = 0
+recipient_delimiter = +
+inet_interfaces = all
+inet_protocols = all
+#home_mailbox = mail/
+
+smtpd_milters = inet:127.0.0.1:8891
+non_smtpd_milters = inet:127.0.0.1:8891
+EOF
+
+ destination = "/etc/postfix/main.cf"
+ }
+
+ provisioner "file" {
+ content = "${tls_private_key.dkim.private_key_pem}"
+ destination = "/etc/dkimkeys/dkim.key"
+ }
+
+ provisioner "file" {
+ content = <<EOF
+Syslog yes
+UMask 007
+Domain ${var.domain}
+KeyFile /etc/dkimkeys/dkim.key
+# on Debian, directory permissions of /etc/dkimkeys already restrict access
+RequireSafeKeys false
+Selector mail
+Canonicalization relaxed/simple
+Mode s
+Socket inet:8891@127.0.0.1
+PidFile /var/run/opendkim/opendkim.pid
+OversignHeaders From
+TrustAnchorFile /usr/share/dns/root.key
+UserID opendkim
+EOF
+
+ destination = "/etc/opendkim.conf"
+ }
+
+ provisioner "file" {
+ content = <<EOF
+disable_plaintext_auth = no
+mail_privileged_group = mail
+mail_location = mbox:~/mail:INBOX=/var/mail/%u
+userdb {
+ driver = passwd
+}
+passdb {
+ driver = passwd-file
+ args = scheme=sha256-crypt username_format=%n /etc/imap.passwd
+}
+protocols = " imap"
+
+service auth {
+ unix_listener /var/spool/postfix/private/auth {
+ group = postfix
+ mode = 0660
+ user = postfix
+ }
+}
+ssl=required
+ssl_cert = </etc/ssl/mail.cert.pem
+ssl_key = </etc/ssl/private/mail.key.pem
+EOF
+
+ destination = "/etc/dovecot/dovecot.conf"
+ }
+
+ provisioner "file" {
+ # content generated with
+ # echo "root:$(doveadm pw -s sha256-crypt -p "$(pass infra/root@crashbox.io)")"
+ content = "root:{SHA256-CRYPT}$5$Yymf6C.k4LgUaNla$UqKwSSIewxCyLV72zXNjfVI2s3xdicXmgCM99BwxWeB"
+
+ destination = "/etc/imap.passwd"
+ }
+
+ provisioner "remote-exec" {
+ inline = [
+ "usermod --append --groups ssl-cert postfix",
+ "usermod --append --groups ssl-cert dovecot",
+ "systemctl restart opendkim.service postfix.service dovecot.service",
+ "ufw allow 25",
+ "ufw allow 587",
+ ]
+ }
+
+ provisioner "remote-exec" {
+ when = "destroy"
+
+ inline = [
+ "DEBIAN_FRONTEND=noninteractive apt-get purge --yes postfix opendkim dovecot-core dovecot-imapd",
+ "rm -rf /etc/dkimkey/dkim.key",
+ "rm -f /etc/ssl/mail.cert.pem",
+ "rm -f /etc/ssl/private/mail.key.pem",
+ "ufw delete allow 25",
+ "ufw delete allow 587",
+ ]
+ }
+}