fix
This commit is contained in:
@@ -88,15 +88,13 @@ resource "kubectl_manifest" "haraka_deploy" {
|
|||||||
EOF
|
EOF
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "haraka_config" {
|
resource "kubernetes_config_map_v1" "haraka_config" {
|
||||||
yaml_body = <<-EOF
|
metadata {
|
||||||
apiVersion: v1
|
name = "${var.instance}-haraka"
|
||||||
kind: ConfigMap
|
namespace = "${var.namespace}"
|
||||||
metadata:
|
labels = local.haraka-labels
|
||||||
name: "${var.instance}-haraka"
|
}
|
||||||
namespace: "${var.namespace}"
|
data = yamldecode(<<-EOF
|
||||||
labels: ${jsonencode(local.haraka-labels)}
|
|
||||||
data:
|
|
||||||
me: |-
|
me: |-
|
||||||
${var.sub-domain}.${var.domain-name}
|
${var.sub-domain}.${var.domain-name}
|
||||||
host_list: |-
|
host_list: |-
|
||||||
@@ -251,6 +249,7 @@ resource "kubectl_manifest" "haraka_config" {
|
|||||||
DMARC_POLICY_REJECT: "Unauthenticated email from {host} is not accepted due to domain's DMARC policy"
|
DMARC_POLICY_REJECT: "Unauthenticated email from {host} is not accepted due to domain's DMARC policy"
|
||||||
RBL_ZONE: '[{host}] was found from Zone RBL'
|
RBL_ZONE: '[{host}] was found from Zone RBL'
|
||||||
EOF
|
EOF
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "haraka_service" {
|
resource "kubectl_manifest" "haraka_service" {
|
||||||
|
|||||||
@@ -6,16 +6,46 @@ metadata:
|
|||||||
name: wildduck
|
name: wildduck
|
||||||
description: null
|
description: null
|
||||||
options:
|
options:
|
||||||
|
backups:
|
||||||
|
default:
|
||||||
|
enable: false
|
||||||
|
endpoint: ''
|
||||||
|
key-id-key: s3-id
|
||||||
|
secret-key: s3-secret
|
||||||
|
secret-name: backup-settings
|
||||||
|
examples:
|
||||||
|
- enable: false
|
||||||
|
endpoint: ''
|
||||||
|
key-id-key: s3-id
|
||||||
|
secret-key: s3-secret
|
||||||
|
secret-name: backup-settings
|
||||||
|
properties:
|
||||||
|
enable:
|
||||||
|
default: false
|
||||||
|
type: boolean
|
||||||
|
endpoint:
|
||||||
|
default: ''
|
||||||
|
type: string
|
||||||
|
key-id-key:
|
||||||
|
default: s3-id
|
||||||
|
type: string
|
||||||
|
secret-key:
|
||||||
|
default: s3-secret
|
||||||
|
type: string
|
||||||
|
secret-name:
|
||||||
|
default: backup-settings
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
domain:
|
||||||
|
default: your-company
|
||||||
|
examples:
|
||||||
|
- your-company
|
||||||
|
type: string
|
||||||
additional-domains:
|
additional-domains:
|
||||||
default: []
|
default: []
|
||||||
items:
|
items:
|
||||||
type: string
|
type: string
|
||||||
type: array
|
type: array
|
||||||
issuer:
|
|
||||||
default: letsencrypt-prod
|
|
||||||
examples:
|
|
||||||
- letsencrypt-prod
|
|
||||||
type: string
|
|
||||||
redis:
|
redis:
|
||||||
default:
|
default:
|
||||||
exporter:
|
exporter:
|
||||||
@@ -54,51 +84,11 @@ options:
|
|||||||
examples:
|
examples:
|
||||||
- mail
|
- mail
|
||||||
type: string
|
type: string
|
||||||
domain-name:
|
|
||||||
default: your_company.com
|
|
||||||
examples:
|
|
||||||
- your_company.com
|
|
||||||
type: string
|
|
||||||
backups:
|
|
||||||
default:
|
|
||||||
enable: false
|
|
||||||
endpoint: ''
|
|
||||||
key-id-key: s3-id
|
|
||||||
secret-key: s3-secret
|
|
||||||
secret-name: backup-settings
|
|
||||||
examples:
|
|
||||||
- enable: false
|
|
||||||
endpoint: ''
|
|
||||||
key-id-key: s3-id
|
|
||||||
secret-key: s3-secret
|
|
||||||
secret-name: backup-settings
|
|
||||||
properties:
|
|
||||||
enable:
|
|
||||||
default: false
|
|
||||||
type: boolean
|
|
||||||
endpoint:
|
|
||||||
default: ''
|
|
||||||
type: string
|
|
||||||
key-id-key:
|
|
||||||
default: s3-id
|
|
||||||
type: string
|
|
||||||
secret-key:
|
|
||||||
default: s3-secret
|
|
||||||
type: string
|
|
||||||
secret-name:
|
|
||||||
default: backup-settings
|
|
||||||
type: string
|
|
||||||
type: object
|
|
||||||
ingress-class:
|
ingress-class:
|
||||||
default: traefik
|
default: traefik
|
||||||
examples:
|
examples:
|
||||||
- traefik
|
- traefik
|
||||||
type: string
|
type: string
|
||||||
domain:
|
|
||||||
default: your-company
|
|
||||||
examples:
|
|
||||||
- your-company
|
|
||||||
type: string
|
|
||||||
images:
|
images:
|
||||||
default:
|
default:
|
||||||
haraka:
|
haraka:
|
||||||
@@ -262,6 +252,16 @@ options:
|
|||||||
type: string
|
type: string
|
||||||
type: object
|
type: object
|
||||||
type: object
|
type: object
|
||||||
|
domain-name:
|
||||||
|
default: your_company.com
|
||||||
|
examples:
|
||||||
|
- your_company.com
|
||||||
|
type: string
|
||||||
|
issuer:
|
||||||
|
default: letsencrypt-prod
|
||||||
|
examples:
|
||||||
|
- letsencrypt-prod
|
||||||
|
type: string
|
||||||
dependencies:
|
dependencies:
|
||||||
- dist: null
|
- dist: null
|
||||||
category: dbo
|
category: dbo
|
||||||
|
|||||||
@@ -56,15 +56,13 @@ resource "kubectl_manifest" "rspamd_deploy" {
|
|||||||
EOF
|
EOF
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "rspamd_config" {
|
resource "kubernetes_config_map_v1" "rspamd_config" {
|
||||||
yaml_body = <<-EOF
|
metadata {
|
||||||
apiVersion: v1
|
name = "${var.instance}-rspamd"
|
||||||
kind: ConfigMap
|
namespace = "${var.namespace}"
|
||||||
metadata:
|
labels = local.rspamd-labels
|
||||||
name: "${var.instance}-rspamd"
|
}
|
||||||
namespace: "${var.namespace}"
|
data = yamldecode(<<-EOF
|
||||||
labels: ${jsonencode(local.rspamd-labels)}
|
|
||||||
data:
|
|
||||||
worker-normal.conf: |-
|
worker-normal.conf: |-
|
||||||
# Included from top-level .conf file
|
# Included from top-level .conf file
|
||||||
|
|
||||||
@@ -83,6 +81,7 @@ resource "kubectl_manifest" "rspamd_config" {
|
|||||||
servers = "${var.instance}-${var.component}-redis.${var.namespace}.svc:6379";
|
servers = "${var.instance}-${var.component}-redis.${var.namespace}.svc:6379";
|
||||||
db = "4";
|
db = "4";
|
||||||
EOF
|
EOF
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "rspamd_service" {
|
resource "kubectl_manifest" "rspamd_service" {
|
||||||
|
|||||||
@@ -65,15 +65,13 @@ resource "kubectl_manifest" "webmail_deploy" {
|
|||||||
EOF
|
EOF
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "webmail_config" {
|
resource "kubernetes_config_map_v1" "webmail_config" {
|
||||||
yaml_body = <<-EOF
|
metadata {
|
||||||
apiVersion: v1
|
name = "${var.instance}-webmail"
|
||||||
kind: ConfigMap
|
namespace = "${var.namespace}"
|
||||||
metadata:
|
labels = local.webmail-labels
|
||||||
name: "${var.instance}-webmail"
|
}
|
||||||
namespace: "${var.namespace}"
|
data = yamldecode(<<-EOF
|
||||||
labels: ${jsonencode(local.webmail-labels)}
|
|
||||||
data:
|
|
||||||
index.hbs: |-
|
index.hbs: |-
|
||||||
<div class="row">
|
<div class="row">
|
||||||
<div class="col-md-12">
|
<div class="col-md-12">
|
||||||
@@ -168,6 +166,7 @@ resource "kubectl_manifest" "webmail_config" {
|
|||||||
secure=true
|
secure=true
|
||||||
port=25
|
port=25
|
||||||
EOF
|
EOF
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "webmail_service" {
|
resource "kubectl_manifest" "webmail_service" {
|
||||||
|
|||||||
@@ -96,15 +96,13 @@ resource "kubectl_manifest" "wildduck_deploy" {
|
|||||||
EOF
|
EOF
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "wildduck_config" {
|
resource "kubernetes_config_map_v1" "wildduck_config" {
|
||||||
yaml_body = <<-EOF
|
metadata {
|
||||||
apiVersion: v1
|
name = "${var.instance}-wildduck"
|
||||||
kind: ConfigMap
|
namespace = "${var.namespace}"
|
||||||
metadata:
|
labels = local.wildduck-labels
|
||||||
name: "${var.instance}-wildduck"
|
}
|
||||||
namespace: "${var.namespace}"
|
data = yamldecode(<<-EOF
|
||||||
labels: ${jsonencode(local.wildduck-labels)}
|
|
||||||
data:
|
|
||||||
default.toml: |-
|
default.toml: |-
|
||||||
# Uncomment if you start the app as root and want to downgrade
|
# Uncomment if you start the app as root and want to downgrade
|
||||||
# once all privileged actions are completed
|
# once all privileged actions are completed
|
||||||
@@ -380,6 +378,7 @@ resource "kubectl_manifest" "wildduck_config" {
|
|||||||
# If not set then looping is not tracked
|
# If not set then looping is not tracked
|
||||||
loopSecret="${local.secrets.srs}"
|
loopSecret="${local.secrets.srs}"
|
||||||
EOF
|
EOF
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "wildduck_service_api" {
|
resource "kubectl_manifest" "wildduck_service_api" {
|
||||||
|
|||||||
@@ -78,15 +78,13 @@ resource "kubectl_manifest" "zonemta_deploy" {
|
|||||||
EOF
|
EOF
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "zonemta_config" {
|
resource "kubernetes_config_map_v1" "zonemta_config" {
|
||||||
yaml_body = <<-EOF
|
metadata {
|
||||||
apiVersion: v1
|
name = "${var.instance}-zonemta"
|
||||||
kind: ConfigMap
|
namespace = "${var.namespace}"
|
||||||
metadata:
|
labels = local.zonemta-labels
|
||||||
name: "${var.instance}-zonemta"
|
}
|
||||||
namespace: "${var.namespace}"
|
data = yamldecode(<<-EOF
|
||||||
labels: ${jsonencode(local.zonemta-labels)}
|
|
||||||
data:
|
|
||||||
feeder.toml: |-
|
feeder.toml: |-
|
||||||
# Default SMTP interface for accepting mail for delivery
|
# Default SMTP interface for accepting mail for delivery
|
||||||
[feeder]
|
[feeder]
|
||||||
@@ -173,6 +171,7 @@ resource "kubectl_manifest" "zonemta_config" {
|
|||||||
signTransportDomain=false
|
signTransportDomain=false
|
||||||
hashAlgo="sha256"
|
hashAlgo="sha256"
|
||||||
EOF
|
EOF
|
||||||
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
resource "kubectl_manifest" "zonemta_service" {
|
resource "kubectl_manifest" "zonemta_service" {
|
||||||
|
|||||||
Reference in New Issue
Block a user