1
0
mirror of https://github.com/mailcow/mailcow-dockerized.git synced 2024-11-28 08:52:00 +02:00
mailcow: dockerized - 🐮 + 🐋 = 💕
Go to file
2016-12-12 10:01:27 +01:00
data Remove vars from main.cf 2016-12-12 09:25:37 +01:00
.gitignore Fix ignores 2016-12-11 22:03:24 +01:00
001-build-network.sh Create an order 2016-12-12 10:01:27 +01:00
002-build-pdns.sh Create an order 2016-12-12 10:01:27 +01:00
003-build-sql.sh Create an order 2016-12-12 10:01:27 +01:00
004-build-redis.sh Create an order 2016-12-12 10:01:27 +01:00
005-build-rspamd.sh Create an order 2016-12-12 10:01:27 +01:00
006-build-php-fpm.sh Create an order 2016-12-12 10:01:27 +01:00
007-build-nginx.sh Create an order 2016-12-12 10:01:27 +01:00
008-build-rmilter.sh Create an order 2016-12-12 10:01:27 +01:00
009-build-dovecot.sh Create an order 2016-12-12 10:01:27 +01:00
010-build-postfix.sh Create an order 2016-12-12 10:01:27 +01:00
011-build-memcached.sh Create an order 2016-12-12 10:01:27 +01:00
012-build-sogo.sh Create an order 2016-12-12 10:01:27 +01:00
build-all.sh Create an order 2016-12-12 10:01:27 +01:00
fix-permissions.sh Fixes, working rspamd settings, generate DKIM keys in PHP 2016-12-10 21:49:41 +01:00
mailcow.conf Some changes 2016-12-12 09:26:27 +01:00
port-check.sh Basic port check for build-all.sh 2016-12-12 09:26:08 +01:00
README.md Create an order 2016-12-12 10:01:27 +01:00

mailcow-dockerized

mailcow dockerized comes with 11 containers linked in a mailcow network: Dovecot, Memcached, Redis, MariaDB, PowerDNS Recursor, PHP-FPM, Postfix, Nginx, Rmilter, Rspamd and SOGo.

All configurations were written with security in mind.

Exposed ports:

Service External bindings Internal bindings
Postfix 25/tcp, 465/tcp, 587/tcp 588/tcp
Dovecot 110/tcp, 143/tcp, 993/tcp, 995/tcp, 4190/tcp 24/tcp, 10001/tcp
Nginx 443/tcp 80/tcp, 8081/tcp
PowerDNS Recursor - 53/udp
Rspamd - 11333/tcp, 11334/tcp
MariaDB - 3306/tcp
Rmilter - 9000/tcp
PHP FPM - 9000/tcp
SOGo - 9000/tcp
Redis - 6379/tcp
Memcached - 11211/tcp

All containers share a network "mailcow-network" (name can be changed, but remove all containers and rebuild them after changing).

Installation

  1. You need Docker. Most systems can install Docker by running wget -qO- https://get.docker.com/ | sh

  2. Clone this repository and configure mailcow.conf, do not use special chars in passwords in this file (will be fixed soon). It is almost always enough to just change the hostname.

  3. Run ./build-all.sh - select Y when asked to reset the admin password.

Done.

You can now access https://${MAILCOW_HOSTNAME} with the default credentials admin + password moohoo.

Configuration after installation

Rspamd UI access

If you want to use Rspamds web UI, you need to set a Rspamd controller password:

# Generate hash
docker exec -it rspamd-mailcow rspamadm pw

Replace given hash in data/conf/rspamd/override.d/worker-controller.inc:

enable_password = "myhash";

Restart rspamd:

docker restart rspamd-mailcow

Open https://${MAILCOW_HOSTNAME}/rspamd in a browser.

SSL (or: How to use Let's Encrypt)

mailcow dockerized comes with a self-signed certificate. Certificates and DH parameters are saved as data/assets/ssl/{dhparams.pem,mail.{crt,key}}.

First you should renew the DH parameters. Soem say you should use 4096, but be prepared for a long waiting period when generating such a file.

Assuming you are in the mailcow root folder:

openssl dhparam -out ./data/assets/ssl/dhparams.pem 2048

Get the certbot client:

wget https://dl.eff.org/certbot-auto -O /usr/local/sbin/certbot && chmod +x /usr/local/sbin/certbot

Please disable applications blocking port 80 and run certbot:

certbot-auto certonly \
	--standalone \
	--standalone-supported-challenges http-01 \
	-d ${MAILCOW_HOSTNAME} \
	--email you@example.org \
	--agree-tos

Create hard links to the full path of the new certificates. Assuming you are still in the mailcow root folder:

mv data/assets/ssl/mail.{crt,crt_old}
mv data/assets/ssl/mail.{key,key_old}
ln $(readlink -f /etc/letsencrypt/live/${MAILCOW_HOSTNAME}/fullchain.pem) data/assets/ssl/mail.crt
ln $(readlink -f /etc/letsencrypt/live/${MAILCOW_HOSTNAME}/privkey.pem) data/assets/ssl/mail.key

Restart containers which use the certificate:

docker restart postfix-mailcow
docker restart dovecot-mailcow
docker restart nginx-mailcow

When renewing certificates, run the last two steps (link + restart) as post-hook in certbot.

Special usage

build-*.files

(Re)build a container:

./n-build-$name.sh 

Any previous container with the same name will be stopped and removed. No persistent data is deleted at any time. If an image exists, you will be asked wether or not to repull/rebuild it.

Logs

You can use docker logs $name for almost all containers. Only rmilter does not log to stdout. You can check rspamd logs for rmilter reponses.

When a process dies, the container dies, too. Except for Postfix' container.

MariaDB

Connect to MariaDB database:

./n-build-sql.sh --client

Init schema (will also be installed when running ./n-build-sql.sh without parameters):

./n-build-sql.sh --init-schema

Reset mailcow admin to admin:moohoo:

./n-build-sql.sh --reset-admin

Dump database to file backup_${DBNAME}_${DATE}.sql:

./n-build-sql.sh --dump

Restore database from a file:

./n-build-sql.sh --restore filename

Redis

Connect to redis database:

./n-build-redis.sh --client

Rspamd examples

Use rspamadm:

docker exec -it rspamd-mailcow rspamadm --help

Use rspamc:

docker exec -it rspamd-mailcow rspamc --help

Remove persistent data

MariaDB:

docker stop mariadb-mailcow
docker rm mariadb-mailcow
rm -rf data/db/mysql/*
./n-build-sql.sh

Redis:

# If you feel hardcore:
docker stop redis-mailcow
docker rm redus-mailcow
rm -rf data/db/redis/*
./n-build-redis.sh

## It is almost always enough to just flush all keys:
./n-build-redis client
# FLUSHALL [ENTER]