8.2 KiB
Known issues and limitations
- Installation using acmetool (
docker-compose-default.yaml) may NOT work. In this case, use installation via traefik (docker-compose-traefik.yaml). Personally, during my tests, I encountered the errorcould not install DNS challenge, no hooks succeeded;, which I was unable to fix. - Chatmail will be reinstalled every time the container is started (longer the first time, faster on subsequent starts). This is how the original installer works because it wasn’t designed for Docker. At the end of the documentation, there’s a proposed solution.
- Requires cgroups v2 configured in the system. Operation with cgroups v1 has not been tested.
- Yes, of course, using systemd inside a container is a hack, and it would be better to split it into several services, but since this is an MVP, it turned out to be easier to do it this way initially than to rewrite the entire deployment system.
- The Docker image is only suitable for amd64. If you need to run it on a different architecture, try modifying the Dockerfile (specifically the part responsible for installing dovecot).
Docker installation
This section provides instructions for installing Chatmail using docker-compose.
Preliminary setup
We use chat.example.org as the Chatmail domain in the following steps.
Please substitute it with your own domain.
-
Setup the initial DNS records. The following is an example in the familiar BIND zone file format with a TTL of 1 hour (3600 seconds). Please substitute your domain and IP addresses.
chat.example.com. 3600 IN A 198.51.100.5 chat.example.com. 3600 IN AAAA 2001:db8::5 www.chat.example.com. 3600 IN CNAME chat.example.com. mta-sts.chat.example.com. 3600 IN CNAME chat.example.com. -
clone the repository on your server.
git clone https://github.com/chatmail/relay cd relay
Installation
When installing via Docker, there are several options:
- Use the built-in nginx and acmetool in Chatmail container to host the chat and manage certificates.
- Use third-party tools for certificate management.
For the third-party certificate manager example, traefik will be used, but you can use whatever is more convenient for you.
- Copy the file
./docker/docker-compose-default.yamlor./docker/docker-compose-traefik.yamland rename it todocker-compose.yaml. This is necessary becausedocker-compose.yamlis in.gitignoreand won’t cause conflicts when updating the git repository.
cp ./docker/docker-compose-default.yaml docker-compose.yaml
## or
# cp ./docker/docker-compose-traefik.yaml docker-compose.yaml
- Copy
./docker/example.envand rename it to.env. This file stores variables used indocker-compose.yaml.
cp ./docker/example.env .env
-
Configure environment variables in the
.envfile. These variables are used in thedocker-compose.yamlfile to pass repeated values. -
Configure kernel parameters because they cannot be changed inside the container, specifically
fs.inotify.max_user_instancesandfs.inotify.max_user_watches. Run the following:
echo "fs.inotify.max_user_instances=65536" | sudo tee -a /etc/sysctl.d/99-inotify.conf
echo "fs.inotify.max_user_watches=65536" | sudo tee -a /etc/sysctl.d/99-inotify.conf
sudo sysctl --system
- Configure container environment variables. Below is the list of variables used during deployment:
MAIL_DOMAIN– The domain name of the future server. (required)DEBUG_COMMANDS_ENABLED– Run debug commands before installation. (default:false)FORCE_REINIT_INI_FILE– Recreate the ini configuration file on startup. (default:false)USE_FOREIGN_CERT_MANAGER– Use a third-party certificate manager. (default:false)RECREATE_VENV- Recreate the virtual environment (venv). If set totrue, the environment will be recreated when the container starts, which will increase the startup time of the service but can help avoid certain errors. (default:false)INI_FILE– Path to the ini configuration file. (default:./chatmail.ini)PATH_TO_SSL– Path to where the certificates are stored. (default:/var/lib/acme/live/${MAIL_DOMAIN})ENABLE_CERTS_MONITORING– Enable certificate monitoring ifUSE_FOREIGN_CERT_MANAGER=true. If certificates change, services will be automatically restarted. (default:false)CERTS_MONITORING_TIMEOUT– Interval in seconds to check if certificates have changed. (default:'60')
You can also use any variables from the ini configuration file; they must be in uppercase.
Mandatory variables for deployment via Docker:
CHANGE_KERNEL_SETTINGS– Change kernel settings (fs.inotify.max_user_instancesandfs.inotify.max_user_watches) on startup. Changing kernel settings inside the container is not possible! (default:False)
- Build the Docker image:
docker compose build chatmail
- Start docker compose and wait for the installation to finish:
docker compose up -d # start service
docker compose logs -f chatmail # view container logs, press CTRL+C to exit
- After installation is complete, you can open
https://<your_domain_name>in your browser.
Using custom files
When using Docker, you can apply modified configuration files to make the installation more personalized. This is usually needed for the www/src section so that the Chatmail landing page is customized to your taste, but it can be used for any other cases as well.
To replace files correctly:
- Create the
./customdirectory. It is in.gitignore, so it won’t cause conflicts when updating.
mkdir -p ./custom
- Modify the required file. For example,
index.md:
mkdir -p ./custom/www/src
nano ./custom/www/src/index.md
- In
docker-compose.yaml, add the file mount in thevolumessection:
services:
chatmail:
volumes:
...
## custom resources
- ./custom/www/src/index.md:/opt/chatmail/www/src/index.md
- Restart the service:
docker compose down
docker compose up -d
Locking the Chatmail version
Note
These steps are optional and should only be done if you are not satisfied that the service is installed each time the container starts.
Since the current Docker version installs the Chatmail service every time the container starts, you can lock the container version after installation as follows:
- Commit the current state of the configured container:
docker container commit chatmail configured-chatmail:$(date +'%Y-%m-%d')
docker image ls | grep configured-chatmail
- Change the entrypoint for the container in
docker-compose.yamlto:
services:
chatmail:
image: <image name from step 1>
volumes:
...
## custom resources
- ./custom/setup_chatmail_docker.sh:/setup_chatmail_docker.sh
- Create the file
./custom/setup_chatmail_docker.shwith the new configuration:
mkdir -p ./custom
cat > ./custom/setup_chatmail_docker.sh << 'EOF'
#!/bin/bash
set -eo pipefail
export ENABLE_CERTS_MONITORING="${ENABLE_CERTS_MONITORING:-true}"
export CERTS_MONITORING_TIMEOUT="${CERTS_MONITORING_TIMEOUT:-60}"
export PATH_TO_SSL="${PATH_TO_SSL:-/var/lib/acme/live/${MAIL_DOMAIN}}"
calculate_hash() {
find "$PATH_TO_SSL" -type f -exec sha1sum {} \; | sort | sha1sum | awk '{print $1}'
}
monitor_certificates() {
if [ "$ENABLE_CERTS_MONITORING" != "true" ]; then
echo "Certs monitoring disabled."
exit 0
fi
current_hash=$(calculate_hash)
previous_hash=$current_hash
while true; do
current_hash=$(calculate_hash)
if [[ "$current_hash" != "$previous_hash" ]]; then
# TODO: add an option to restart at a specific time interval
echo "[INFO] Certificate's folder hash was changed, restarting nginx, dovecot and postfix services."
systemctl restart nginx.service
systemctl reload dovecot.service
systemctl reload postfix.service
previous_hash=$current_hash
fi
sleep $CERTS_MONITORING_TIMEOUT
done
}
monitor_certificates &
EOF
- Restart the service:
docker compose down
docker compose up -d