Init MC update + Dovecot/SOGo LDAP configuration
Signed-off-by: Georg <georg@lysergic.dev>
This commit is contained in:
parent
01da6ddafe
commit
98fa66b5ad
16
mailcow/data/Dockerfiles/ldap/Dockerfile
Normal file
16
mailcow/data/Dockerfiles/ldap/Dockerfile
Normal file
@ -0,0 +1,16 @@
|
||||
FROM python:3-alpine
|
||||
|
||||
RUN apk --no-cache add build-base openldap-dev python2-dev python3-dev
|
||||
RUN pip3 install python-ldap sqlalchemy requests
|
||||
|
||||
COPY templates ./templates
|
||||
COPY api.py filedb.py syncer.py ./
|
||||
|
||||
ADD syscid-ca.crt /usr/local/share/ca-certificates/syscid-ca.crt
|
||||
RUN chmod 644 /usr/local/share/ca-certificates/syscid-ca.crt && update-ca-certificates
|
||||
|
||||
VOLUME [ "/db" ]
|
||||
VOLUME [ "/conf/dovecot" ]
|
||||
VOLUME [ "/conf/sogo" ]
|
||||
|
||||
ENTRYPOINT [ "python3", "syncer.py" ]
|
69
mailcow/data/Dockerfiles/ldap/api.py
Normal file
69
mailcow/data/Dockerfiles/ldap/api.py
Normal file
@ -0,0 +1,69 @@
|
||||
import random, string, sys
|
||||
import requests
|
||||
|
||||
def __post_request(url, json_data):
|
||||
api_url = f"{api_host}/{url}"
|
||||
headers = {'X-API-Key': api_key, 'Content-type': 'application/json'}
|
||||
|
||||
req = requests.post(api_url, headers=headers, json=json_data,verify=is_ssl_verify)
|
||||
rsp = req.json()
|
||||
req.close()
|
||||
|
||||
if isinstance(rsp, list):
|
||||
rsp = rsp[0]
|
||||
|
||||
if not "type" in rsp or not "msg" in rsp:
|
||||
sys.exit(f"API {url}: got response without type or msg from Mailcow API")
|
||||
|
||||
if rsp['type'] != 'success':
|
||||
sys.exit(f"API {url}: {rsp['type']} - {rsp['msg']}")
|
||||
|
||||
def add_user(email, name, active):
|
||||
password = ''.join(random.choices(string.ascii_letters + string.digits, k=20))
|
||||
json_data = {
|
||||
'local_part':email.split('@')[0],
|
||||
'domain':email.split('@')[1],
|
||||
'name':name,
|
||||
'password':password,
|
||||
'password2':password,
|
||||
"active": 1 if active else 0
|
||||
}
|
||||
|
||||
__post_request('api/v1/add/mailbox', json_data)
|
||||
|
||||
def edit_user(email, active=None, name=None):
|
||||
attr = {}
|
||||
if (active is not None):
|
||||
attr['active'] = 1 if active else 0
|
||||
if (name is not None):
|
||||
attr['name'] = name
|
||||
|
||||
json_data = {
|
||||
'items': [email],
|
||||
'attr': attr
|
||||
}
|
||||
|
||||
__post_request('api/v1/edit/mailbox', json_data)
|
||||
|
||||
def __delete_user(email):
|
||||
json_data = [email]
|
||||
|
||||
__post_request('api/v1/delete/mailbox', json_data)
|
||||
|
||||
def check_user(email):
|
||||
url = f"{api_host}/api/v1/get/mailbox/{email}"
|
||||
headers = {'X-API-Key': api_key, 'Content-type': 'application/json'}
|
||||
req = requests.get(url, headers=headers,verify=is_ssl_verify)
|
||||
rsp = req.json()
|
||||
req.close()
|
||||
|
||||
if not isinstance(rsp, dict):
|
||||
sys.exit("API get/mailbox: got response of a wrong type")
|
||||
|
||||
if (not rsp):
|
||||
return (False, False, None)
|
||||
|
||||
if 'active_int' not in rsp and rsp['type'] == 'error':
|
||||
sys.exit(f"API {url}: {rsp['type']} - {rsp['msg']}")
|
||||
|
||||
return (True, bool(rsp['active_int']), rsp['name'])
|
52
mailcow/data/Dockerfiles/ldap/filedb.py
Normal file
52
mailcow/data/Dockerfiles/ldap/filedb.py
Normal file
@ -0,0 +1,52 @@
|
||||
import datetime, os
|
||||
|
||||
import logging
|
||||
logging.basicConfig(format='%(asctime)s %(message)s', datefmt='%d.%m.%y %H:%M:%S', level=logging.INFO)
|
||||
|
||||
import sqlalchemy
|
||||
from sqlalchemy.ext.declarative import declarative_base
|
||||
from sqlalchemy import create_engine, Column, String, Boolean, DateTime
|
||||
from sqlalchemy.orm import sessionmaker
|
||||
|
||||
db_file = 'db/ldap-mailcow.sqlite3'
|
||||
|
||||
Base = declarative_base()
|
||||
|
||||
class DbUser(Base): # type: ignore
|
||||
__tablename__ = 'users'
|
||||
email = Column(String, primary_key=True)
|
||||
active = Column(Boolean, nullable=False)
|
||||
last_seen = Column(DateTime, nullable=False)
|
||||
|
||||
Session = sessionmaker()
|
||||
|
||||
if not os.path.isfile(db_file):
|
||||
logging.info (f"New database file created: {db_file}")
|
||||
|
||||
db_engine = create_engine(f"sqlite:///{db_file}") # echo=True
|
||||
Base.metadata.create_all(db_engine)
|
||||
Session.configure(bind=db_engine)
|
||||
session = Session()
|
||||
session_time = datetime.datetime.now()
|
||||
|
||||
def get_unchecked_active_users():
|
||||
query = session.query(DbUser.email).filter(DbUser.last_seen != session_time).filter(DbUser.active == True)
|
||||
|
||||
return [x.email for x in query]
|
||||
|
||||
def add_user(email, active=True):
|
||||
session.add(DbUser(email=email, active=active, last_seen=session_time))
|
||||
session.commit()
|
||||
|
||||
def check_user(email):
|
||||
user = session.query(DbUser).filter_by(email=email).first()
|
||||
if user is None:
|
||||
return (False, False)
|
||||
user.last_seen = session_time
|
||||
session.commit()
|
||||
return (True, user.active)
|
||||
|
||||
def user_set_active_to(email, active):
|
||||
user = session.query(DbUser).filter_by(email=email).first()
|
||||
user.active = active
|
||||
session.commit()
|
186
mailcow/data/Dockerfiles/ldap/syncer.py
Normal file
186
mailcow/data/Dockerfiles/ldap/syncer.py
Normal file
@ -0,0 +1,186 @@
|
||||
import sys, os, string, time, datetime
|
||||
import ldap
|
||||
|
||||
import filedb, api
|
||||
|
||||
from string import Template
|
||||
from pathlib import Path
|
||||
|
||||
import logging
|
||||
logging.basicConfig(format='%(asctime)s %(message)s', datefmt='%d.%m.%y %H:%M:%S', level=logging.INFO)
|
||||
|
||||
def main():
|
||||
global config
|
||||
config = read_config()
|
||||
|
||||
passdb_conf = read_dovecot_passdb_conf_template()
|
||||
plist_ldap = read_sogo_plist_ldap_template()
|
||||
extra_conf = read_dovecot_extra_conf()
|
||||
|
||||
passdb_conf_changed = apply_config('conf/dovecot/ldap/passdb.conf', config_data = passdb_conf)
|
||||
extra_conf_changed = apply_config('conf/dovecot/extra.conf', config_data = extra_conf)
|
||||
plist_ldap_changed = apply_config('conf/sogo/plist_ldap', config_data = plist_ldap)
|
||||
|
||||
if passdb_conf_changed or extra_conf_changed or plist_ldap_changed:
|
||||
logging.info ("One or more config files have been changed, please make sure to restart dovecot-mailcow and sogo-mailcow!")
|
||||
|
||||
api.api_host = config['API_HOST']
|
||||
api.api_key = config['API_KEY']
|
||||
api.is_ssl_verify = bool(int(config['API_SSL_VERIFY']))
|
||||
|
||||
while (True):
|
||||
sync()
|
||||
interval = int(config['SYNC_INTERVAL'])
|
||||
logging.info(f"Sync finished, sleeping {interval} seconds before next cycle")
|
||||
time.sleep(interval)
|
||||
|
||||
def sync():
|
||||
ldap_connector = ldap.initialize(f"{config['LDAP_HOST']}")
|
||||
ldap_connector.set_option(ldap.OPT_REFERRALS, 0)
|
||||
ldap_connector.simple_bind_s(config['LDAP_BIND_DN'], config['LDAP_BIND_DN_PASSWORD'])
|
||||
|
||||
#ldap_results = ldap_connector.search_s(config['LDAP_BASE_DN'], ldap.SCOPE_SUBTREE,
|
||||
# '(&(objectClass=user)(objectCategory=person))',
|
||||
# ['userPrincipalName', 'cn', 'userAccountControl'])
|
||||
|
||||
ldap_results = ldap_connector.search_s(config['LDAP_BASE_DN'], ldap.SCOPE_SUBTREE, config['LDAP_FILTER'],
|
||||
config['LDAP_FIELDS_MAIL'], config['LDAP_FIELDS_NAME'])
|
||||
|
||||
ldap_results = map(lambda x: (
|
||||
[i.decode() for i in x[1][config['LDAP_FIELDS_MAIL']]],
|
||||
x[1][config['LDAP_FIELDS_NAME']][0].decode(),
|
||||
#False if int(x[1]['userAccountControl'][0].decode()) & 0b10 else True), ldap_results)
|
||||
True), ldap_results)
|
||||
|
||||
filedb.session_time = datetime.datetime.now()
|
||||
|
||||
for (ldap_email, ldap_name, ldap_active) in ldap_results:
|
||||
for email in ldap_email:
|
||||
if email.split('@')[1] not in config['EMAIL_DOMAINS']:
|
||||
continue
|
||||
(db_user_exists, db_user_active) = filedb.check_user(email)
|
||||
(api_user_exists, api_user_active, api_name) = api.check_user(email)
|
||||
|
||||
unchanged = True
|
||||
|
||||
if not db_user_exists:
|
||||
filedb.add_user(email, ldap_active)
|
||||
(db_user_exists, db_user_active) = (True, ldap_active)
|
||||
logging.info (f"Added filedb user: {email} (Active: {ldap_active})")
|
||||
unchanged = False
|
||||
|
||||
if not api_user_exists:
|
||||
api.add_user(email, ldap_name, ldap_active)
|
||||
(api_user_exists, api_user_active, api_name) = (True, ldap_active, ldap_name)
|
||||
logging.info (f"Added Mailcow user: {email} (Active: {ldap_active})")
|
||||
unchanged = False
|
||||
|
||||
if db_user_active != ldap_active:
|
||||
filedb.user_set_active_to(email, ldap_active)
|
||||
logging.info (f"{'Activated' if ldap_active else 'Deactived'} {email} in filedb")
|
||||
unchanged = False
|
||||
|
||||
if api_user_active != ldap_active:
|
||||
api.edit_user(email, active=ldap_active)
|
||||
logging.info (f"{'Activated' if ldap_active else 'Deactived'} {email} in Mailcow")
|
||||
unchanged = False
|
||||
|
||||
if api_name != ldap_name:
|
||||
api.edit_user(email, name=ldap_name)
|
||||
logging.info (f"Changed name of {email} in Mailcow to {ldap_name}")
|
||||
unchanged = False
|
||||
|
||||
if unchanged:
|
||||
logging.info (f"Checked user {email}, unchanged")
|
||||
|
||||
for email in filedb.get_unchecked_active_users():
|
||||
(api_user_exists, api_user_active, _) = api.check_user(email)
|
||||
|
||||
if (api_user_active and api_user_active):
|
||||
api.edit_user(email, active=False)
|
||||
logging.info (f"Deactivated user {email} in Mailcow, not found in LDAP")
|
||||
|
||||
filedb.user_set_active_to(email, False)
|
||||
logging.info (f"Deactivated user {email} in filedb, not found in LDAP")
|
||||
|
||||
def apply_config(config_file, config_data):
|
||||
if os.path.isfile(config_file):
|
||||
with open(config_file) as f:
|
||||
old_data = f.read()
|
||||
|
||||
if old_data.strip() == config_data.strip():
|
||||
logging.info(f"Config file {config_file} unchanged")
|
||||
return False
|
||||
|
||||
backup_index = 1
|
||||
backup_file = f"{config_file}.ldap_mailcow_bak"
|
||||
while os.path.exists(backup_file):
|
||||
backup_file = f"{config_file}.ldap_mailcow_bak.{backup_index}"
|
||||
backup_index += 1
|
||||
|
||||
os.rename(config_file, backup_file)
|
||||
logging.info(f"Backed up {config_file} to {backup_file}")
|
||||
|
||||
Path(os.path.dirname(config_file)).mkdir(parents=True, exist_ok=True)
|
||||
|
||||
print(config_data, file=open(config_file, 'w'))
|
||||
|
||||
logging.info(f"Saved generated config file to {config_file}")
|
||||
return True
|
||||
|
||||
def read_config():
|
||||
required_config_keys = [
|
||||
'LDAP-MAILCOW_LDAP_HOST',
|
||||
'LDAP-MAILCOW_LDAP_BASE_DN',
|
||||
'LDAP-MAILCOW_LDAP_BIND_DN',
|
||||
'LDAP-MAILCOW_LDAP_BIND_DN_PASSWORD',
|
||||
'LDAP-MAILCOW_LDAP_FILTER',
|
||||
'LDAP-MAILCOW_LDAP_FIELDS_MAIL',
|
||||
'LDAP-MAILCOW_LDAP_FIELDS_NAME',
|
||||
'LDAP-MAILCOW_API_HOST',
|
||||
'LDAP-MAILCOW_API_KEY',
|
||||
'LDAP-MAILCOW_API_SSL_VERIFY',
|
||||
'LDAP-MAILCOW_SYNC_INTERVAL',
|
||||
'LDAP-MAILCOW_EMAIL_DOMAINS'
|
||||
]
|
||||
|
||||
config = {}
|
||||
|
||||
for config_key in required_config_keys:
|
||||
if config_key not in os.environ:
|
||||
sys.exit (f"Required envrionment value {config_key} is not set")
|
||||
|
||||
config[config_key.replace('LDAP-MAILCOW_', '')] = os.environ[config_key]
|
||||
config['EMAIL_DOMAINS'] = config['EMAIL_DOMAINS'].split(',')
|
||||
return config
|
||||
|
||||
def read_dovecot_passdb_conf_template():
|
||||
with open('templates/dovecot/ldap/passdb.conf') as f:
|
||||
data = Template(f.read())
|
||||
|
||||
return data.substitute(
|
||||
ldap_host=config['LDAP_HOST'],
|
||||
ldap_base_dn=config['LDAP_BASE_DN'],
|
||||
ldap_bind_dn=config['LDAP_BIND_DN'],
|
||||
ldap_bind_dn_password=config['LDAP_BIND_DN_PASSWORD']
|
||||
)
|
||||
|
||||
def read_sogo_plist_ldap_template():
|
||||
with open('templates/sogo/plist_ldap') as f:
|
||||
data = Template(f.read())
|
||||
|
||||
return data.substitute(
|
||||
ldap_host=config['LDAP_HOST'],
|
||||
ldap_base_dn=config['LDAP_BASE_DN'],
|
||||
ldap_bind_dn=config['LDAP_BIND_DN'],
|
||||
ldap_bind_dn_password=config['LDAP_BIND_DN_PASSWORD']
|
||||
)
|
||||
|
||||
def read_dovecot_extra_conf():
|
||||
with open('templates/dovecot/extra.conf') as f:
|
||||
data = f.read()
|
||||
|
||||
return data
|
||||
|
||||
if __name__ == '__main__':
|
||||
main()
|
32
mailcow/data/Dockerfiles/ldap/syscid-ca.crt
Normal file
32
mailcow/data/Dockerfiles/ldap/syscid-ca.crt
Normal file
@ -0,0 +1,32 @@
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIFfzCCA2egAwIBAgIUUtCa6jguJLt20qzq/MR82JX/6JQwDQYJKoZIhvcNAQEL
|
||||
BQAwTzEUMBIGA1UECgwLTGliZXJ0YUNhc2ExEzARBgNVBAMMCnN5c2NpZC5jb20x
|
||||
IjAgBgkqhkiG9w0BCQEWE3N5c3RlbUBseXNlcmdpYy5kZXYwHhcNMjEwODEwMDAy
|
||||
MjM2WhcNMjIwODEwMDAyMjM2WjBPMRQwEgYDVQQKDAtMaWJlcnRhQ2FzYTETMBEG
|
||||
A1UEAwwKc3lzY2lkLmNvbTEiMCAGCSqGSIb3DQEJARYTc3lzdGVtQGx5c2VyZ2lj
|
||||
LmRldjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAO0m7lpEZwGB1pxo
|
||||
24RESADjbnk6iGmH783cuMo7jzio6P5vZk8FRD0/8Gmli/sOe8oZ2hGE5sNx4RKK
|
||||
4g7kDVnYznHS6k5zpBzU4FP9wVMho/TcfaXlCdSwj6Ih0mLxDYzvX0l12Gi1K9gg
|
||||
0HxdG2XPfslQbk6py1jQYVkRjwZIj2ya7t7/fNyn6S7flVUIvvcvZd3eNvAlg4ZU
|
||||
wDV1H5mF3s42Iv5TOEYi88n7yXUex5I9xi5NqG/qOuYuC69yYobI/WjfId7bUDPT
|
||||
UjZJFD5wHUHwtBmjp2bdyzdl9Z9iJp24jhR3Syi4h/BjYFwUG793PjP8DZBWtrOC
|
||||
jHoOwkCyYFfOTa8n+Knb8i2FSuX4TgMZeFwcLpSsecBIjknKHPNYW2NTcP7S/Xbl
|
||||
KpP2fpN7JBlR8WTi9+WQZVHuMfU1rjp3Kjwj9dmjcWsOMuMEqJUZMSsMpUBKULbq
|
||||
6QFhMPJL+yYDHg1S0E3ymHRU94mlQ57mQwAg0AraCDtdPR3zw+gh2k1hUEkva26G
|
||||
zHYigssbhCT81Dp4Ez65tKHZoKYKvgywJ6gb7PURS8Ued8PSDEhJd18WN22l4xQP
|
||||
k08fg+mB5gHXNNGzYVETPalrWmk9IHczQnDITWM1hj14VhIcwa9oMNesIllviL7/
|
||||
BRjiz6jHZfc3Htp4NZ/5sBgFDUelAgMBAAGjUzBRMB0GA1UdDgQWBBSU/TIhYSYN
|
||||
HQ3+7ueHMmkVD8BZRzAfBgNVHSMEGDAWgBSU/TIhYSYNHQ3+7ueHMmkVD8BZRzAP
|
||||
BgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4ICAQCLf0GU+mrZo4l7qMJz
|
||||
WfNFxZv3E5GFRgl1NlUfJM2hnpgqrT7ukXcRnY4n9KtLx14QWHpPdX7KyLsSqx6X
|
||||
UoPsJNywYQNVyAQ0qddY4glGV8u6+QE1zN1yUw6CMbsqWz50T76r1Y1CRZuMyffU
|
||||
OeVhBM17sWibgDbev0SmG12uYTkq7qmbCKOWUhbaL1jCE1yvu9ZFFXCQ/OaAMyn9
|
||||
fYyyn48z7MHsyISuBdAcJkR2JkIgL4oZufw5hcecZ1wcnmYTRm6owuhUsZ2FYXkU
|
||||
5o2Pn6nce1QEaUKsik8xBNA0/jIBCkiPDb5/eIA8Yys7pb/DeFEE/X0JM9rhoOk7
|
||||
tXOvxV2S7Y1xRqVwa3mrlp/0yXHuBb+u3/1+jsxkaeSPQ8FRejPIZzeOGhVHPaub
|
||||
RdvzSO0TBK54vLA0CrkDRLgFdyuzsvm6VMVqGpcKn/aaju7pLI/knJzITaHHxzqV
|
||||
wxmA0kf/68+wVvdICZt4R3iqSU9KVmCmh6owTixNTgh1wLmFIyMl2VhOwibFVg4L
|
||||
600gIb59wEV4tWnYEX3Ugsw8g0ZXoqPDA27CPlpmgaVXwBv1qssRYnUreZEXxEN3
|
||||
4A1UOTdjMPn9v1wqmBwTCb9MULX60byX72YPMOnuSAQyptbXx8oMvInK91T5ivZ0
|
||||
JpmySX/Gfpgrr7HSI9+cD3eUcQ==
|
||||
-----END CERTIFICATE-----
|
@ -0,0 +1,4 @@
|
||||
passdb {
|
||||
args = /etc/dovecot/ldap/passdb.conf
|
||||
driver = ldap
|
||||
}
|
@ -0,0 +1,8 @@
|
||||
uris = $ldap_host
|
||||
ldap_version = 3
|
||||
base = $ldap_base_dn
|
||||
auth_bind = yes
|
||||
dn = $ldap_bind_dn
|
||||
dnpass = $ldap_bind_dn_password
|
||||
pass_attrs = userPassword=password
|
||||
pass_filter = (&(memberof=cn=syscid_email_mailcow,ou=syscid-groups,dc=syscid,dc=com)(|(uid=%n)(mail=%u)))
|
43
mailcow/data/Dockerfiles/ldap/templates/sogo/plist_ldap
Normal file
43
mailcow/data/Dockerfiles/ldap/templates/sogo/plist_ldap
Normal file
@ -0,0 +1,43 @@
|
||||
<!-- LDAP Configuration -->
|
||||
<dict>
|
||||
<key>type</key>
|
||||
<string>ldap</string>
|
||||
<key>id</key>
|
||||
<string>$${line}_ldap</string>
|
||||
|
||||
<key>CNFieldName</key>
|
||||
<string>cn</string>
|
||||
<key>IDFieldName</key>
|
||||
<string>uid</string>
|
||||
<key>UIDFieldName</key>
|
||||
<string>uid</string>
|
||||
|
||||
<key>baseDN</key>
|
||||
<string>$ldap_base_dn</string>
|
||||
|
||||
<key>bindDN</key>
|
||||
<string>$ldap_bind_dn</string>
|
||||
<key>bindPassword</key>
|
||||
<string>$ldap_bind_dn_password</string>
|
||||
<key>bindFields</key>
|
||||
<array>
|
||||
<string>uid</string>
|
||||
<string>mail</string>
|
||||
</array>
|
||||
|
||||
<key>bindAsCurrentUser</key>
|
||||
<string>YES</string>
|
||||
|
||||
<key>hostname</key>
|
||||
<string>$ldap_host</string>
|
||||
<key>canAuthenticate</key>
|
||||
<string>YES</string>
|
||||
|
||||
<key>isAddressBook</key>
|
||||
<string>NO</string>
|
||||
<key>displayName</key>
|
||||
<string>LibertaCasa</string>
|
||||
|
||||
<key>scope</key>
|
||||
<string>SUB</string>
|
||||
</dict>
|
5
mailcow/data/conf/dovecot/extra.conf
Normal file
5
mailcow/data/conf/dovecot/extra.conf
Normal file
@ -0,0 +1,5 @@
|
||||
passdb {
|
||||
args = /etc/dovecot/ldap/passdb.conf
|
||||
driver = ldap
|
||||
}
|
||||
|
9
mailcow/data/conf/dovecot/ldap/passdb.conf
Normal file
9
mailcow/data/conf/dovecot/ldap/passdb.conf
Normal file
@ -0,0 +1,9 @@
|
||||
uris = ldaps://orpheus.syscid.com
|
||||
ldap_version = 3
|
||||
base = OU=syscid-users,DC=syscid,DC=com
|
||||
auth_bind = yes
|
||||
dn = $BINDDN
|
||||
dnpass = $BINDSEC
|
||||
pass_attrs = userPassword=password
|
||||
pass_filter = (&(memberof=cn=syscid_email_mailcow,ou=syscid-groups,dc=syscid,dc=com)(|(uid=%n)(mail=%u)))
|
||||
|
44
mailcow/data/conf/sogo/plist_ldap
Normal file
44
mailcow/data/conf/sogo/plist_ldap
Normal file
@ -0,0 +1,44 @@
|
||||
<!-- LDAP Configuration -->
|
||||
<dict>
|
||||
<key>type</key>
|
||||
<string>ldap</string>
|
||||
<key>id</key>
|
||||
<string>${line}_ldap</string>
|
||||
|
||||
<key>CNFieldName</key>
|
||||
<string>cn</string>
|
||||
<key>IDFieldName</key>
|
||||
<string>uid</string>
|
||||
<key>UIDFieldName</key>
|
||||
<string>uid</string>
|
||||
|
||||
<key>baseDN</key>
|
||||
<string>OU=syscid-users,DC=syscid,DC=com</string>
|
||||
|
||||
<key>bindDN</key>
|
||||
<string>$BINDDN</string>
|
||||
<key>bindPassword</key>
|
||||
<string>$BINDSEC</string>
|
||||
<key>bindFields</key>
|
||||
<array>
|
||||
<string>uid</string>
|
||||
<string>mail</string>
|
||||
</array>
|
||||
|
||||
<key>bindAsCurrentUser</key>
|
||||
<string>YES</string>
|
||||
|
||||
<key>hostname</key>
|
||||
<string>ldaps://orpheus.syscid.com</string>
|
||||
<key>canAuthenticate</key>
|
||||
<string>YES</string>
|
||||
|
||||
<key>isAddressBook</key>
|
||||
<string>NO</string>
|
||||
<key>displayName</key>
|
||||
<string>LibertaCasa</string>
|
||||
|
||||
<key>scope</key>
|
||||
<string>SUB</string>
|
||||
</dict>
|
||||
|
34
mailcow/docker-compose.override.yml
Normal file
34
mailcow/docker-compose.override.yml
Normal file
@ -0,0 +1,34 @@
|
||||
version: '2.1'
|
||||
services:
|
||||
|
||||
ldap-mailcow:
|
||||
image: mailcow/ldap
|
||||
network_mode: host
|
||||
container_name: mailcowcustomized_ldap
|
||||
depends_on:
|
||||
- nginx-mailcow
|
||||
volumes:
|
||||
- ./data/ldap:/db:rw
|
||||
- ./data/conf/dovecot:/conf/dovecot:rw
|
||||
- ./data/conf/sogo:/conf/sogo:rw
|
||||
environment:
|
||||
- LDAP-MAILCOW_LDAP_HOST=ldaps://orpheus.syscid.com
|
||||
- LDAP-MAILCOW_LDAP_BASE_DN=OU=syscid-users,DC=syscid,DC=com
|
||||
- LDAP-MAILCOW_LDAP_BIND_DN=$BINDDN
|
||||
- LDAP-MAILCOW_LDAP_BIND_DN_PASSWORD=$BINDSEC
|
||||
- LDAP-MAILCOW_LDAP_FILTER=(objectClass=inetOrgPerson)
|
||||
- LDAP-MAILCOW_LDAP_FIELDS_MAIL=mail
|
||||
- LDAP-MAILCOW_LDAP_FIELDS_NAME=cn
|
||||
- LDAP-MAILCOW_API_HOST=$MAILCOWHOST
|
||||
- LDAP-MAILCOW_API_KEY=$MAILCOWAPI
|
||||
- LDAP-MAILCOW_API_SSL_VERIFY=1
|
||||
- LDAP-MAILCOW_SYNC_INTERVAL=300
|
||||
- LDAP-MAILCOW_EMAIL_DOMAINS=syscid.com
|
||||
|
||||
dovecot-mailcow:
|
||||
extra_hosts:
|
||||
- "orpheus.syscid.com:192.168.0.115"
|
||||
|
||||
sogo-mailcow:
|
||||
extra_hosts:
|
||||
- "orpheus.syscid.com:192.168.0.115"
|
@ -2,7 +2,7 @@ version: '2.1'
|
||||
services:
|
||||
|
||||
unbound-mailcow:
|
||||
image: mailcow/unbound:1.13
|
||||
image: mailcow/unbound:1.14
|
||||
environment:
|
||||
- TZ=${TZ}
|
||||
volumes:
|
||||
@ -41,7 +41,7 @@ services:
|
||||
- mysql
|
||||
|
||||
redis-mailcow:
|
||||
image: redis:5-alpine
|
||||
image: redis:6-alpine
|
||||
volumes:
|
||||
- redis-vol-1:/data/:Z
|
||||
restart: always
|
||||
@ -49,6 +49,8 @@ services:
|
||||
- "${REDIS_PORT:-127.0.0.1:7654}:6379"
|
||||
environment:
|
||||
- TZ=${TZ}
|
||||
sysctls:
|
||||
- net.core.somaxconn=4096
|
||||
networks:
|
||||
mailcow-network:
|
||||
ipv4_address: ${IPV4_NETWORK:-172.22.1}.249
|
||||
@ -56,7 +58,7 @@ services:
|
||||
- redis
|
||||
|
||||
clamd-mailcow:
|
||||
image: mailcow/clamd:1.40
|
||||
image: mailcow/clamd:1.41
|
||||
restart: always
|
||||
dns:
|
||||
- ${IPV4_NETWORK:-172.22.1}.254
|
||||
@ -71,7 +73,7 @@ services:
|
||||
- clamd
|
||||
|
||||
rspamd-mailcow:
|
||||
image: mailcow/rspamd:1.76
|
||||
image: mailcow/rspamd:1.79
|
||||
stop_grace_period: 30s
|
||||
depends_on:
|
||||
- dovecot-mailcow
|
||||
@ -101,7 +103,7 @@ services:
|
||||
- rspamd
|
||||
|
||||
php-fpm-mailcow:
|
||||
image: mailcow/phpfpm:1.75
|
||||
image: mailcow/phpfpm:1.76
|
||||
command: "php-fpm -d date.timezone=${TZ} -d expose_php=0"
|
||||
depends_on:
|
||||
- redis-mailcow
|
||||
@ -122,7 +124,6 @@ services:
|
||||
- ./data/conf/dovecot/global_sieve_before:/global_sieve/before:z
|
||||
- ./data/conf/dovecot/global_sieve_after:/global_sieve/after:z
|
||||
- ./data/assets/templates:/tpls:z
|
||||
- ./data/conf/ejabberd/autogen:/ejabberd/:z
|
||||
- ./data/conf/nginx/:/etc/nginx/conf.d/:z
|
||||
dns:
|
||||
- ${IPV4_NETWORK:-172.22.1}.254
|
||||
@ -146,8 +147,6 @@ services:
|
||||
- SUBMISSION_PORT=${SUBMISSION_PORT:-587}
|
||||
- SMTPS_PORT=${SMTPS_PORT:-465}
|
||||
- SMTP_PORT=${SMTP_PORT:-25}
|
||||
- XMPP_C2S_PORT=${XMPP_C2S_PORT:-5222}
|
||||
- XMPP_S2S_PORT=${XMPP_S2S_PORT:-5269}
|
||||
- API_KEY=${API_KEY:-invalid}
|
||||
- API_KEY_READ_ONLY=${API_KEY_READ_ONLY:-invalid}
|
||||
- API_ALLOW_FROM=${API_ALLOW_FROM:-invalid}
|
||||
@ -164,7 +163,7 @@ services:
|
||||
- phpfpm
|
||||
|
||||
sogo-mailcow:
|
||||
image: mailcow/sogo:1.99
|
||||
image: mailcow/sogo:1.101
|
||||
environment:
|
||||
- DBNAME=${DBNAME}
|
||||
- DBUSER=${DBUSER}
|
||||
@ -184,6 +183,7 @@ services:
|
||||
dns:
|
||||
- ${IPV4_NETWORK:-172.22.1}.254
|
||||
volumes:
|
||||
- ./data/hooks/sogo:/hooks:Z
|
||||
- ./data/conf/sogo/:/etc/sogo/:z
|
||||
- ./data/web/inc/init_db.inc.php:/init_db.inc.php:Z
|
||||
- ./data/conf/sogo/custom-favicon.ico:/usr/lib/GNUstep/SOGo/WebServerResources/img/sogo.ico:z
|
||||
@ -212,7 +212,7 @@ services:
|
||||
- sogo
|
||||
|
||||
dovecot-mailcow:
|
||||
image: mailcow/dovecot:1.145
|
||||
image: mailcow/dovecot:1.156
|
||||
depends_on:
|
||||
- mysql-mailcow
|
||||
dns:
|
||||
@ -244,7 +244,7 @@ services:
|
||||
- MAILCOW_PASS_SCHEME=${MAILCOW_PASS_SCHEME:-BLF-CRYPT}
|
||||
- IPV4_NETWORK=${IPV4_NETWORK:-172.22.1}
|
||||
- ALLOW_ADMIN_EMAIL_LOGIN=${ALLOW_ADMIN_EMAIL_LOGIN:-n}
|
||||
- MAILDIR_GC_TIME=${MAILDIR_GC_TIME:-1440}
|
||||
- MAILDIR_GC_TIME=${MAILDIR_GC_TIME:-7200}
|
||||
- ACL_ANYONE=${ACL_ANYONE:-disallow}
|
||||
- SKIP_SOLR=${SKIP_SOLR:-y}
|
||||
- MAILDIR_SUB=${MAILDIR_SUB:-}
|
||||
@ -292,7 +292,7 @@ services:
|
||||
- dovecot
|
||||
|
||||
postfix-mailcow:
|
||||
image: mailcow/postfix:1.61
|
||||
image: mailcow/postfix:1.66
|
||||
depends_on:
|
||||
- mysql-mailcow
|
||||
volumes:
|
||||
@ -323,6 +323,7 @@ services:
|
||||
- ${IPV4_NETWORK:-172.22.1}.254
|
||||
networks:
|
||||
mailcow-network:
|
||||
ipv4_address: ${IPV4_NETWORK:-172.22.1}.253
|
||||
aliases:
|
||||
- postfix
|
||||
|
||||
@ -347,7 +348,6 @@ services:
|
||||
command: /bin/sh -c "envsubst < /etc/nginx/conf.d/templates/listen_plain.template > /etc/nginx/conf.d/listen_plain.active &&
|
||||
envsubst < /etc/nginx/conf.d/templates/listen_ssl.template > /etc/nginx/conf.d/listen_ssl.active &&
|
||||
envsubst < /etc/nginx/conf.d/templates/sogo.template > /etc/nginx/conf.d/sogo.active &&
|
||||
. /etc/nginx/conf.d/templates/sogo.auth_request.template.sh > /etc/nginx/conf.d/sogo_proxy_auth.active &&
|
||||
. /etc/nginx/conf.d/templates/server_name.template.sh > /etc/nginx/conf.d/server_name.active &&
|
||||
. /etc/nginx/conf.d/templates/sites.template.sh > /etc/nginx/conf.d/sites.active &&
|
||||
. /etc/nginx/conf.d/templates/sogo_eas.template.sh > /etc/nginx/conf.d/sogo_eas.active &&
|
||||
@ -356,7 +356,6 @@ services:
|
||||
until ping sogo -c1 > /dev/null; do sleep 1; done &&
|
||||
until ping redis -c1 > /dev/null; do sleep 1; done &&
|
||||
until ping rspamd -c1 > /dev/null; do sleep 1; done &&
|
||||
until ping ejabberd -c1 > /dev/null; do sleep 1; done &&
|
||||
exec nginx -g 'daemon off;'"
|
||||
environment:
|
||||
- HTTPS_PORT=${HTTPS_PORT:-443}
|
||||
@ -387,7 +386,7 @@ services:
|
||||
acme-mailcow:
|
||||
depends_on:
|
||||
- nginx-mailcow
|
||||
image: mailcow/acme:1.79
|
||||
image: mailcow/acme:1.80
|
||||
dns:
|
||||
- ${IPV4_NETWORK:-172.22.1}.254
|
||||
environment:
|
||||
@ -423,7 +422,7 @@ services:
|
||||
- acme
|
||||
|
||||
netfilter-mailcow:
|
||||
image: mailcow/netfilter:1.43
|
||||
image: mailcow/netfilter:1.44
|
||||
stop_grace_period: 30s
|
||||
depends_on:
|
||||
- dovecot-mailcow
|
||||
@ -446,7 +445,7 @@ services:
|
||||
- /lib/modules:/lib/modules:ro
|
||||
|
||||
watchdog-mailcow:
|
||||
image: mailcow/watchdog:1.91
|
||||
image: mailcow/watchdog:1.94
|
||||
# Debug
|
||||
#command: /watchdog.sh
|
||||
dns:
|
||||
@ -499,7 +498,6 @@ services:
|
||||
- RATELIMIT_THRESHOLD=${RATELIMIT_THRESHOLD:-1}
|
||||
- FAIL2BAN_THRESHOLD=${FAIL2BAN_THRESHOLD:-1}
|
||||
- ACME_THRESHOLD=${ACME_THRESHOLD:-1}
|
||||
- IPV6NAT_THRESHOLD=${IPV6NAT_THRESHOLD:-1}
|
||||
- RSPAMD_THRESHOLD=${RSPAMD_THRESHOLD:-5}
|
||||
- OLEFY_THRESHOLD=${OLEFY_THRESHOLD:-5}
|
||||
- MAILQ_THRESHOLD=${MAILQ_THRESHOLD:-20}
|
||||
@ -510,7 +508,7 @@ services:
|
||||
- watchdog
|
||||
|
||||
dockerapi-mailcow:
|
||||
image: mailcow/dockerapi:1.38
|
||||
image: mailcow/dockerapi:1.39
|
||||
security_opt:
|
||||
- label=disable
|
||||
restart: always
|
||||
@ -544,7 +542,7 @@ services:
|
||||
- solr
|
||||
|
||||
olefy-mailcow:
|
||||
image: mailcow/olefy:1.7
|
||||
image: mailcow/olefy:1.8
|
||||
restart: always
|
||||
environment:
|
||||
- TZ=${TZ}
|
||||
@ -561,44 +559,6 @@ services:
|
||||
aliases:
|
||||
- olefy
|
||||
|
||||
ejabberd-mailcow:
|
||||
image: mailcow/ejabberd:1.6
|
||||
volumes:
|
||||
- ./data/conf/ejabberd/ejabberd.yml:/home/ejabberd/conf/ejabberd.yml:z
|
||||
- xmpp-vol-1:/home/ejabberd/database:z
|
||||
- xmpp-upload-vol-1:/var/www/upload:z
|
||||
- ./data/assets/ejabberd/sqlite:/sqlite:z
|
||||
- ./data/conf/ejabberd/autogen:/ejabberd/:z
|
||||
- mysql-socket-vol-1:/var/run/mysqld/:z
|
||||
- ./data/assets/ssl:/ssl:ro,z
|
||||
restart: always
|
||||
dns:
|
||||
- ${IPV4_NETWORK:-172.22.1}.254
|
||||
hostname: ejabberd.mailcow.local
|
||||
labels:
|
||||
ofelia.enabled: "true"
|
||||
ofelia.job-exec.ejabberd_certs.schedule: "@every 168h"
|
||||
ofelia.job-exec.ejabberd_certs.command: "/sbin/su-exec ejabberd /home/ejabberd/bin/ejabberdctl --node ejabberd@$${MAILCOW_HOSTNAME} request-certificate all"
|
||||
extra_hosts:
|
||||
- "${MAILCOW_HOSTNAME}:127.0.0.1"
|
||||
environment:
|
||||
- TZ=${TZ}
|
||||
- MAILCOW_HOSTNAME=${MAILCOW_HOSTNAME}
|
||||
- MASTER=${MASTER:-y}
|
||||
- IPV4_NETWORK=${IPV4_NETWORK:-172.22.1}
|
||||
- XMPP_HTTPS_PORT=${XMPP_HTTPS_PORT:-5443}
|
||||
- DBNAME=${DBNAME}
|
||||
- DBUSER=${DBUSER}
|
||||
- DBPASS=${DBPASS}
|
||||
ports:
|
||||
- "${XMPP_C2S_PORT:-5222}:5222"
|
||||
- "${XMPP_S2S_PORT:-5269}:5269"
|
||||
- "${XMPP_HTTPS_PORT:-5443}:5443"
|
||||
networks:
|
||||
mailcow-network:
|
||||
aliases:
|
||||
- ejabberd
|
||||
|
||||
ofelia-mailcow:
|
||||
image: mcuadros/ofelia:latest
|
||||
restart: always
|
||||
@ -607,9 +567,10 @@ services:
|
||||
depends_on:
|
||||
- sogo-mailcow
|
||||
- dovecot-mailcow
|
||||
- ejabberd-mailcow
|
||||
labels:
|
||||
ofelia.enabled: "true"
|
||||
security_opt:
|
||||
- label=disable
|
||||
volumes:
|
||||
- /var/run/docker.sock:/var/run/docker.sock:ro
|
||||
networks:
|
||||
@ -671,5 +632,3 @@ volumes:
|
||||
crypt-vol-1:
|
||||
sogo-web-vol-1:
|
||||
sogo-userdata-backup-vol-1:
|
||||
xmpp-vol-1:
|
||||
xmpp-upload-vol-1:
|
||||
|
@ -16,8 +16,8 @@ MAILCOW_PASS_SCHEME=BLF-CRYPT
|
||||
# SQL database configuration
|
||||
# ------------------------------
|
||||
|
||||
DBNAME=mailcow
|
||||
DBUSER=mailcow
|
||||
DBNAME=$DBNAME
|
||||
DBUSER=$DBUSER
|
||||
|
||||
# Please use long, random alphanumeric strings (A-Za-z0-9)
|
||||
|
||||
@ -125,15 +125,6 @@ ENABLE_SSL_SNI=n
|
||||
|
||||
# Skip IPv4 check in ACME container - y/n
|
||||
|
||||
SKIP_LETS_ENCRYPT=y
|
||||
|
||||
# Create seperate certificates for all domains - y/n
|
||||
# this will allow adding more than 100 domains, but some email clients will not be able to connect with alternative hostnames
|
||||
# see https://wiki.dovecot.org/SSL/SNIClientSupport
|
||||
ENABLE_SSL_SNI=n
|
||||
|
||||
# Skip IPv4 check in ACME container - y/n
|
||||
|
||||
SKIP_IP_CHECK=n
|
||||
|
||||
# Skip HTTP verification in ACME container - y/n
|
||||
|
Reference in New Issue
Block a user