fix
This commit is contained in:
@@ -88,15 +88,13 @@ resource "kubectl_manifest" "haraka_deploy" {
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "haraka_config" {
|
||||
yaml_body = <<-EOF
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: "${var.instance}-haraka"
|
||||
namespace: "${var.namespace}"
|
||||
labels: ${jsonencode(local.haraka-labels)}
|
||||
data:
|
||||
resource "kubernetes_config_map_v1" "haraka_config" {
|
||||
metadata {
|
||||
name = "${var.instance}-haraka"
|
||||
namespace = "${var.namespace}"
|
||||
labels = local.haraka-labels
|
||||
}
|
||||
data = yamldecode(<<-EOF
|
||||
me: |-
|
||||
${var.sub-domain}.${var.domain-name}
|
||||
host_list: |-
|
||||
@@ -251,6 +249,7 @@ resource "kubectl_manifest" "haraka_config" {
|
||||
DMARC_POLICY_REJECT: "Unauthenticated email from {host} is not accepted due to domain's DMARC policy"
|
||||
RBL_ZONE: '[{host}] was found from Zone RBL'
|
||||
EOF
|
||||
)
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "haraka_service" {
|
||||
|
||||
@@ -6,16 +6,46 @@ metadata:
|
||||
name: wildduck
|
||||
description: null
|
||||
options:
|
||||
backups:
|
||||
default:
|
||||
enable: false
|
||||
endpoint: ''
|
||||
key-id-key: s3-id
|
||||
secret-key: s3-secret
|
||||
secret-name: backup-settings
|
||||
examples:
|
||||
- enable: false
|
||||
endpoint: ''
|
||||
key-id-key: s3-id
|
||||
secret-key: s3-secret
|
||||
secret-name: backup-settings
|
||||
properties:
|
||||
enable:
|
||||
default: false
|
||||
type: boolean
|
||||
endpoint:
|
||||
default: ''
|
||||
type: string
|
||||
key-id-key:
|
||||
default: s3-id
|
||||
type: string
|
||||
secret-key:
|
||||
default: s3-secret
|
||||
type: string
|
||||
secret-name:
|
||||
default: backup-settings
|
||||
type: string
|
||||
type: object
|
||||
domain:
|
||||
default: your-company
|
||||
examples:
|
||||
- your-company
|
||||
type: string
|
||||
additional-domains:
|
||||
default: []
|
||||
items:
|
||||
type: string
|
||||
type: array
|
||||
issuer:
|
||||
default: letsencrypt-prod
|
||||
examples:
|
||||
- letsencrypt-prod
|
||||
type: string
|
||||
redis:
|
||||
default:
|
||||
exporter:
|
||||
@@ -54,51 +84,11 @@ options:
|
||||
examples:
|
||||
- mail
|
||||
type: string
|
||||
domain-name:
|
||||
default: your_company.com
|
||||
examples:
|
||||
- your_company.com
|
||||
type: string
|
||||
backups:
|
||||
default:
|
||||
enable: false
|
||||
endpoint: ''
|
||||
key-id-key: s3-id
|
||||
secret-key: s3-secret
|
||||
secret-name: backup-settings
|
||||
examples:
|
||||
- enable: false
|
||||
endpoint: ''
|
||||
key-id-key: s3-id
|
||||
secret-key: s3-secret
|
||||
secret-name: backup-settings
|
||||
properties:
|
||||
enable:
|
||||
default: false
|
||||
type: boolean
|
||||
endpoint:
|
||||
default: ''
|
||||
type: string
|
||||
key-id-key:
|
||||
default: s3-id
|
||||
type: string
|
||||
secret-key:
|
||||
default: s3-secret
|
||||
type: string
|
||||
secret-name:
|
||||
default: backup-settings
|
||||
type: string
|
||||
type: object
|
||||
ingress-class:
|
||||
default: traefik
|
||||
examples:
|
||||
- traefik
|
||||
type: string
|
||||
domain:
|
||||
default: your-company
|
||||
examples:
|
||||
- your-company
|
||||
type: string
|
||||
images:
|
||||
default:
|
||||
haraka:
|
||||
@@ -262,6 +252,16 @@ options:
|
||||
type: string
|
||||
type: object
|
||||
type: object
|
||||
domain-name:
|
||||
default: your_company.com
|
||||
examples:
|
||||
- your_company.com
|
||||
type: string
|
||||
issuer:
|
||||
default: letsencrypt-prod
|
||||
examples:
|
||||
- letsencrypt-prod
|
||||
type: string
|
||||
dependencies:
|
||||
- dist: null
|
||||
category: dbo
|
||||
|
||||
@@ -56,15 +56,13 @@ resource "kubectl_manifest" "rspamd_deploy" {
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "rspamd_config" {
|
||||
yaml_body = <<-EOF
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: "${var.instance}-rspamd"
|
||||
namespace: "${var.namespace}"
|
||||
labels: ${jsonencode(local.rspamd-labels)}
|
||||
data:
|
||||
resource "kubernetes_config_map_v1" "rspamd_config" {
|
||||
metadata {
|
||||
name = "${var.instance}-rspamd"
|
||||
namespace = "${var.namespace}"
|
||||
labels = local.rspamd-labels
|
||||
}
|
||||
data = yamldecode(<<-EOF
|
||||
worker-normal.conf: |-
|
||||
# Included from top-level .conf file
|
||||
|
||||
@@ -83,6 +81,7 @@ resource "kubectl_manifest" "rspamd_config" {
|
||||
servers = "${var.instance}-${var.component}-redis.${var.namespace}.svc:6379";
|
||||
db = "4";
|
||||
EOF
|
||||
)
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "rspamd_service" {
|
||||
|
||||
@@ -65,15 +65,13 @@ resource "kubectl_manifest" "webmail_deploy" {
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "webmail_config" {
|
||||
yaml_body = <<-EOF
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: "${var.instance}-webmail"
|
||||
namespace: "${var.namespace}"
|
||||
labels: ${jsonencode(local.webmail-labels)}
|
||||
data:
|
||||
resource "kubernetes_config_map_v1" "webmail_config" {
|
||||
metadata {
|
||||
name = "${var.instance}-webmail"
|
||||
namespace = "${var.namespace}"
|
||||
labels = local.webmail-labels
|
||||
}
|
||||
data = yamldecode(<<-EOF
|
||||
index.hbs: |-
|
||||
<div class="row">
|
||||
<div class="col-md-12">
|
||||
@@ -168,6 +166,7 @@ resource "kubectl_manifest" "webmail_config" {
|
||||
secure=true
|
||||
port=25
|
||||
EOF
|
||||
)
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "webmail_service" {
|
||||
|
||||
@@ -96,15 +96,13 @@ resource "kubectl_manifest" "wildduck_deploy" {
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "wildduck_config" {
|
||||
yaml_body = <<-EOF
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: "${var.instance}-wildduck"
|
||||
namespace: "${var.namespace}"
|
||||
labels: ${jsonencode(local.wildduck-labels)}
|
||||
data:
|
||||
resource "kubernetes_config_map_v1" "wildduck_config" {
|
||||
metadata {
|
||||
name = "${var.instance}-wildduck"
|
||||
namespace = "${var.namespace}"
|
||||
labels = local.wildduck-labels
|
||||
}
|
||||
data = yamldecode(<<-EOF
|
||||
default.toml: |-
|
||||
# Uncomment if you start the app as root and want to downgrade
|
||||
# once all privileged actions are completed
|
||||
@@ -380,6 +378,7 @@ resource "kubectl_manifest" "wildduck_config" {
|
||||
# If not set then looping is not tracked
|
||||
loopSecret="${local.secrets.srs}"
|
||||
EOF
|
||||
)
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "wildduck_service_api" {
|
||||
|
||||
@@ -78,15 +78,13 @@ resource "kubectl_manifest" "zonemta_deploy" {
|
||||
EOF
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "zonemta_config" {
|
||||
yaml_body = <<-EOF
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: "${var.instance}-zonemta"
|
||||
namespace: "${var.namespace}"
|
||||
labels: ${jsonencode(local.zonemta-labels)}
|
||||
data:
|
||||
resource "kubernetes_config_map_v1" "zonemta_config" {
|
||||
metadata {
|
||||
name = "${var.instance}-zonemta"
|
||||
namespace = "${var.namespace}"
|
||||
labels = local.zonemta-labels
|
||||
}
|
||||
data = yamldecode(<<-EOF
|
||||
feeder.toml: |-
|
||||
# Default SMTP interface for accepting mail for delivery
|
||||
[feeder]
|
||||
@@ -173,6 +171,7 @@ resource "kubectl_manifest" "zonemta_config" {
|
||||
signTransportDomain=false
|
||||
hashAlgo="sha256"
|
||||
EOF
|
||||
)
|
||||
}
|
||||
|
||||
resource "kubectl_manifest" "zonemta_service" {
|
||||
|
||||
Reference in New Issue
Block a user