diff options
Diffstat (limited to 'terraform/modules')
-rw-r--r-- | terraform/modules/email/main.tf | 268 | ||||
-rw-r--r-- | terraform/modules/email/postfix-master.cf | 120 |
2 files changed, 388 insertions, 0 deletions
diff --git a/terraform/modules/email/main.tf b/terraform/modules/email/main.tf new file mode 100644 index 0000000..510994e --- /dev/null +++ b/terraform/modules/email/main.tf @@ -0,0 +1,268 @@ +variable "secret_cloudflare_token" {} + +variable "domain" { + description = "Domain name of email addresses." +} + +variable "server_ipv4" { + description = "IP address of primary mail server." +} + +variable "server_ipv6" { + description = "IP address of primary mail server." +} + +variable "server_id" { + description = "Unique server ID that will trigger this module, if changed." +} + +resource "tls_private_key" "tls_mail" { + algorithm = "RSA" +} + +resource "acme_registration" "tls_mail" { + account_key_pem = "${tls_private_key.tls_mail.private_key_pem}" + email_address = "jakob@odersky.com" +} + +resource "acme_certificate" "tls_mail" { + account_key_pem = "${acme_registration.tls_mail.account_key_pem}" + common_name = "mail.${var.domain}" + + dns_challenge { + provider = "cloudflare" + + config { + CLOUDFLARE_EMAIL = "jakob@odersky.com" + CLOUDFLARE_API_KEY = "${var.secret_cloudflare_token}" + } + } +} + +resource "hcloud_rdns" "rdns4" { + server_id = "${var.server_id}" + ip_address = "${var.server_ipv4}" + dns_ptr = "mail.${var.domain}" +} + +resource "hcloud_rdns" "rdns6" { + server_id = "${var.server_id}" + ip_address = "${var.server_ipv6}" + dns_ptr = "mail.${var.domain}" +} + +resource "cloudflare_record" "record_a" { + type = "A" + domain = "${var.domain}" + name = "mail" + value = "${var.server_ipv4}" +} + +resource "cloudflare_record" "record_aaaa" { + type = "AAAA" + domain = "${var.domain}" + name = "mail" + value = "${var.server_ipv6}" +} + +resource "cloudflare_record" "record_mx" { + type = "MX" + domain = "${var.domain}" + name = "@" + value = "mail.${var.domain}" +} + +resource "cloudflare_record" "record_spf" { + type = "TXT" + domain = "${var.domain}" + name = "@" + value = "v=spf1 a mx -all" +} + +resource "cloudflare_record" "record_dmarc" { + type = "TXT" + domain = "${var.domain}" + name = "_dmarc" + value = "v=DMARC1; p=quarantine; rua=mailto:postmaster@${var.domain}" +} + +resource "tls_private_key" "dkim" { + algorithm = "RSA" +} + +resource "cloudflare_record" "record_dkim_txt" { + type = "TXT" + domain = "${var.domain}" + name = "mail._domainkey" + value = "v=DKIM1; k=rsa; p=${replace("${tls_private_key.dkim.public_key_pem}","/-----BEGIN PUBLIC KEY-----|-----END PUBLIC KEY-----|\n/","")};" +} + +resource "null_resource" "config" { + triggers { + server_id = "${var.server_id}" + domain = "${var.domain}" + dkim_private_key = "${tls_private_key.dkim.private_key_pem}" + mail_key = "${acme_certificate.tls_mail.private_key_pem}" + mail_cert = "${acme_certificate.tls_mail.certificate_pem}" + } + + connection { + host = "${var.server_ipv4}" + } + + provisioner "remote-exec" { + inline = ["DEBIAN_FRONTEND=noninteractive apt-get install --yes postfix opendkim bsd-mailx dovecot-core dovecot-imapd"] + } + + provisioner "file" { + content = "${acme_certificate.tls_mail.private_key_pem}" + destination = "/etc/ssl/private/mail.key.pem" + } + + provisioner "file" { + content = "${acme_certificate.tls_mail.certificate_pem}" + destination = "/etc/ssl/mail.cert.pem" + } + + provisioner "file" { + content = "${var.domain}\n" + destination = "/etc/mailname" + } + + provisioner "file" { + source = "${path.module}/postfix-master.cf" + destination = "/etc/postfix/master.cf" + } + + provisioner "file" { + content = <<EOF +myhostname = mail.${var.domain} +myorigin = /etc/mailname +mydestination = $myhostname, ${var.domain}, localhost.localdomain, localhost + +smtpd_banner = $myhostname ESMTP $mail_name (Debian/GNU) +biff = no + +# appending .domain is the MUA's job. +append_dot_mydomain = no + +# Uncomment the next line to generate "delayed mail" warnings +#delay_warning_time = 4h + +readme_directory = no + +# See http://www.postfix.org/COMPATIBILITY_README.html -- default to 2 on +# fresh installs. +compatibility_level = 2 + +# TLS parameters +smtpd_tls_cert_file=/etc/ssl/mail.cert.pem +smtpd_tls_key_file=/etc/ssl/private/mail.key.pem +smtpd_use_tls=yes +smtpd_tls_session_cache_database = btree:$${data_directory}/smtpd_scache +smtp_tls_session_cache_database = btree:$${data_directory}/smtp_scache + +smtpd_relay_restrictions = permit_mynetworks permit_sasl_authenticated defer_unauth_destination +alias_maps = hash:/etc/aliases +alias_database = hash:/etc/aliases +relayhost = +mynetworks = 127.0.0.0/8 [::ffff:127.0.0.0]/104 [::1]/128 +mailbox_size_limit = 0 +recipient_delimiter = + +inet_interfaces = all +inet_protocols = all +#home_mailbox = mail/ + +smtpd_milters = inet:127.0.0.1:8891 +non_smtpd_milters = inet:127.0.0.1:8891 +EOF + + destination = "/etc/postfix/main.cf" + } + + provisioner "file" { + content = "${tls_private_key.dkim.private_key_pem}" + destination = "/etc/dkimkeys/dkim.key" + } + + provisioner "file" { + content = <<EOF +Syslog yes +UMask 007 +Domain ${var.domain} +KeyFile /etc/dkimkeys/dkim.key +# on Debian, directory permissions of /etc/dkimkeys already restrict access +RequireSafeKeys false +Selector mail +Canonicalization relaxed/simple +Mode s +Socket inet:8891@127.0.0.1 +PidFile /var/run/opendkim/opendkim.pid +OversignHeaders From +TrustAnchorFile /usr/share/dns/root.key +UserID opendkim +EOF + + destination = "/etc/opendkim.conf" + } + + provisioner "file" { + content = <<EOF +disable_plaintext_auth = no +mail_privileged_group = mail +mail_location = mbox:~/mail:INBOX=/var/mail/%u +userdb { + driver = passwd +} +passdb { + driver = passwd-file + args = scheme=sha256-crypt username_format=%n /etc/imap.passwd +} +protocols = " imap" + +service auth { + unix_listener /var/spool/postfix/private/auth { + group = postfix + mode = 0660 + user = postfix + } +} +ssl=required +ssl_cert = </etc/ssl/mail.cert.pem +ssl_key = </etc/ssl/private/mail.key.pem +EOF + + destination = "/etc/dovecot/dovecot.conf" + } + + provisioner "file" { + # content generated with + # echo "root:$(doveadm pw -s sha256-crypt -p "$(pass infra/root@crashbox.io)")" + content = "root:{SHA256-CRYPT}$5$Yymf6C.k4LgUaNla$UqKwSSIewxCyLV72zXNjfVI2s3xdicXmgCM99BwxWeB" + + destination = "/etc/imap.passwd" + } + + provisioner "remote-exec" { + inline = [ + "usermod --append --groups ssl-cert postfix", + "usermod --append --groups ssl-cert dovecot", + "systemctl restart opendkim.service postfix.service dovecot.service", + "ufw allow 25", + "ufw allow 587", + ] + } + + provisioner "remote-exec" { + when = "destroy" + + inline = [ + "DEBIAN_FRONTEND=noninteractive apt-get purge --yes postfix opendkim dovecot-core dovecot-imapd", + "rm -rf /etc/dkimkey/dkim.key", + "rm -f /etc/ssl/mail.cert.pem", + "rm -f /etc/ssl/private/mail.key.pem", + "ufw delete allow 25", + "ufw delete allow 587", + ] + } +} diff --git a/terraform/modules/email/postfix-master.cf b/terraform/modules/email/postfix-master.cf new file mode 100644 index 0000000..d9d50eb --- /dev/null +++ b/terraform/modules/email/postfix-master.cf @@ -0,0 +1,120 @@ +# +# Postfix master process configuration file. For details on the format +# of the file, see the master(5) manual page (command: "man 5 master" or +# on-line: http://www.postfix.org/master.5.html). +# +# Do not forget to execute "postfix reload" after editing this file. +# +# ========================================================================== +# service type private unpriv chroot wakeup maxproc command + args +# (yes) (yes) (no) (never) (100) +# ========================================================================== +smtp inet n - y - - smtpd +#smtp inet n - y - 1 postscreen +#smtpd pass - - y - - smtpd +#dnsblog unix - - y - 0 dnsblog +#tlsproxy unix - - y - 0 tlsproxy +submission inet n - y - - smtpd + -o syslog_name=postfix/submission + -o smtpd_relay_restrictions=permit_sasl_authenticated,reject + -o smtpd_sasl_auth_enable=yes + -o smtpd_sasl_path=private/auth + -o smtpd_sasl_type=dovecot + -o smtpd_tls_security_level=encrypt +#smtps inet n - y - - smtpd +# -o syslog_name=postfix/smtps +# -o smtpd_tls_wrappermode=yes +# -o smtpd_sasl_auth_enable=yes +# -o smtpd_reject_unlisted_recipient=no +# -o smtpd_client_restrictions=$mua_client_restrictions +# -o smtpd_helo_restrictions=$mua_helo_restrictions +# -o smtpd_sender_restrictions=$mua_sender_restrictions +# -o smtpd_recipient_restrictions= +# -o smtpd_relay_restrictions=permit_sasl_authenticated,reject +# -o milter_macro_daemon_name=ORIGINATING +#628 inet n - y - - qmqpd +pickup unix n - y 60 1 pickup +cleanup unix n - y - 0 cleanup +qmgr unix n - n 300 1 qmgr +#qmgr unix n - n 300 1 oqmgr +tlsmgr unix - - y 1000? 1 tlsmgr +rewrite unix - - y - - trivial-rewrite +bounce unix - - y - 0 bounce +defer unix - - y - 0 bounce +trace unix - - y - 0 bounce +verify unix - - y - 1 verify +flush unix n - y 1000? 0 flush +proxymap unix - - n - - proxymap +proxywrite unix - - n - 1 proxymap +smtp unix - - y - - smtp +relay unix - - y - - smtp +# -o smtp_helo_timeout=5 -o smtp_connect_timeout=5 +showq unix n - y - - showq +error unix - - y - - error +retry unix - - y - - error +discard unix - - y - - discard +local unix - n n - - local +virtual unix - n n - - virtual +lmtp unix - - y - - lmtp +anvil unix - - y - 1 anvil +scache unix - - y - 1 scache +# +# ==================================================================== +# Interfaces to non-Postfix software. Be sure to examine the manual +# pages of the non-Postfix software to find out what options it wants. +# +# Many of the following services use the Postfix pipe(8) delivery +# agent. See the pipe(8) man page for information about ${recipient} +# and other message envelope options. +# ==================================================================== +# +# maildrop. See the Postfix MAILDROP_README file for details. +# Also specify in main.cf: maildrop_destination_recipient_limit=1 +# +maildrop unix - n n - - pipe + flags=DRhu user=vmail argv=/usr/bin/maildrop -d ${recipient} +# +# ==================================================================== +# +# Recent Cyrus versions can use the existing "lmtp" master.cf entry. +# +# Specify in cyrus.conf: +# lmtp cmd="lmtpd -a" listen="localhost:lmtp" proto=tcp4 +# +# Specify in main.cf one or more of the following: +# mailbox_transport = lmtp:inet:localhost +# virtual_transport = lmtp:inet:localhost +# +# ==================================================================== +# +# Cyrus 2.1.5 (Amos Gouaux) +# Also specify in main.cf: cyrus_destination_recipient_limit=1 +# +#cyrus unix - n n - - pipe +# user=cyrus argv=/cyrus/bin/deliver -e -r ${sender} -m ${extension} ${user} +# +# ==================================================================== +# Old example of delivery via Cyrus. +# +#old-cyrus unix - n n - - pipe +# flags=R user=cyrus argv=/cyrus/bin/deliver -e -m ${extension} ${user} +# +# ==================================================================== +# +# See the Postfix UUCP_README file for configuration details. +# +uucp unix - n n - - pipe + flags=Fqhu user=uucp argv=uux -r -n -z -a$sender - $nexthop!rmail ($recipient) +# +# Other external delivery methods. +# +ifmail unix - n n - - pipe + flags=F user=ftn argv=/usr/lib/ifmail/ifmail -r $nexthop ($recipient) +bsmtp unix - n n - - pipe + flags=Fq. user=bsmtp argv=/usr/lib/bsmtp/bsmtp -t$nexthop -f$sender $recipient +scalemail-backend unix - n n - 2 pipe + flags=R user=scalemail argv=/usr/lib/scalemail/bin/scalemail-store ${nexthop} ${user} ${extension} +mailman unix - n n - - pipe + flags=FR user=list argv=/usr/lib/mailman/bin/postfix-to-mailman.py + ${nexthop} ${user} + |