Florent Daigniere
ce9dc3a335
ghostwheel42's suggestion
2022-03-17 11:39:57 +01:00
Florent Daigniere
83140322e0
ghostwheel42's suggestion
2022-03-17 11:38:22 +01:00
Florent Daigniere
3aa735cc2d
ghostwheel42's suggestion
2022-03-17 11:37:01 +01:00
Florent Daigniere
6d80eea649
ghostwheel42's suggestion
2022-03-17 11:35:31 +01:00
Florent Daigniere
9bc963f19b
don't think the escaping is required but it was there
2022-03-16 14:58:43 +01:00
Florent Daigniere
3e6f3a95a4
Reflect the data from the POST
2022-03-16 14:43:14 +01:00
Florent Daigniere
14931c4acd
doh
2022-03-16 14:14:03 +01:00
Florent Daigniere
c6c444cfa7
simplify
2022-03-16 14:04:02 +01:00
Florent Daigniere
373e6d2161
doh
2022-03-16 14:04:02 +01:00
Florent Daigniere
184c9bc566
Add json redirect
2022-03-16 14:04:02 +01:00
Florent Daigniere
9a2d8d63a3
Search and replace wasn't a good idea
2022-03-16 14:04:02 +01:00
Florent Daigniere
c50750054b
Allow POST
2022-03-16 14:04:02 +01:00
Florent Daigniere
71897f4ff0
Doh
2022-03-16 14:04:02 +01:00
Florent Daigniere
d677c465a7
Handle spaces too
2022-03-16 14:04:02 +01:00
Florent Daigniere
6fc1273b58
Add a link to autoconfigure apple devices
2022-03-16 14:04:02 +01:00
Florent Daigniere
0bccb5045c
STARTTLS is a bad idea
2022-03-16 14:04:02 +01:00
Florent Daigniere
3a56525e21
As discussed on #mailu-dev
...
Don't attempt to guess what the user wants
2022-03-16 14:04:02 +01:00
Florent Daigniere
81b592f3cb
try to get LE certs for the new names
2022-03-16 14:04:02 +01:00
Florent Daigniere
a3f9e2beee
Use priorities instead
2022-03-16 14:04:02 +01:00
Florent Daigniere
2b62a6327a
Do explicit TLS where possible
2022-03-16 14:04:02 +01:00
Florent Daigniere
c817eaf608
Add the SRV record for autodiscover
2022-03-16 14:04:02 +01:00
Florent Daigniere
cdc92aa65b
Mobileconfig apple style
2022-03-16 14:04:02 +01:00
Florent Daigniere
ccd2cad4f1
Autodiscovery microsoft style
2022-03-16 14:04:02 +01:00
Florent Daigniere
523cee1680
Autoconfig mozilla-style
2022-03-16 14:04:02 +01:00
bors[bot]
0b25854de0
Merge #2210
...
2210: Add input validation for domain creation r=mergify[bot] a=0pc0deFR
## What type of PR?
bug-fix
## What does this PR do?
This patch add the input validation for domain creation.
### Related issue(s)
- Mention an issue like: #1817
- Auto close an issue like: closes #1817
Co-authored-by: Kevin Falcoz <0pc0defr@gmail.com>
Co-authored-by: Dimitri Huisman <diman@huisman.xyz>
2022-03-12 12:34:30 +00:00
İbrahim Akyel
f65e2fc469
Feature: Marking "Read" spam mails
2022-03-11 16:58:50 +03:00
Florent Daigniere
a7f9a35fa1
Merge branch 'master' into fix2274
2022-03-09 19:33:04 +01:00
Florent Daigniere
a4ed464170
doh
2022-03-09 19:29:39 +01:00
Florent Daigniere
0bfbb3bcd4
doh
2022-03-08 13:10:27 +01:00
Florent Daigniere
cd3eee4c51
ghostwheel42's suggestion
2022-03-07 09:09:36 +01:00
Florent Daigniere
d723326b8e
style
2022-03-07 09:04:40 +01:00
Florent Daigniere
f01d8cd9b9
improve
2022-03-05 18:41:06 +01:00
Florent Daigniere
7b9c4e01f7
improve
2022-03-05 18:36:27 +01:00
Florent Daigniere
91de20c49c
Fix exception in logs
...
This was occuring when you had square brackets in the domain part
2022-03-05 18:22:58 +01:00
Florent Daigniere
8cf76afbab
Catch the ValueError instead
2022-03-05 18:01:30 +01:00
Florent Daigniere
08aa32a5df
Revert "Don't bother running the query without an address"
...
This reverts commit dc819795506c13d9ee9c06aec130995ee80858cc.
2022-03-05 17:59:44 +01:00
Florent Daigniere
7ce7f2096b
belt, braces and suspenders
2022-03-05 14:54:54 +01:00
Florent Daigniere
dc81979550
Don't bother running the query without an address
...
This should solve the following in admin logs:
"WARNING in nginx: Invalid user 'xxxx': (builtins.ValueError)
invalid email address (no "@")"
2022-03-05 14:33:20 +01:00
Pumba98
f1952d0e97
Update start.py
2022-02-27 13:44:26 +01:00
bors[bot]
2e9b14d536
Merge #2254
...
2254: Send ISRG_X1 on port 25, make DANE pin that r=mergify[bot] a=nextgens
## What type of PR?
bug-fix
## What does this PR do?
Ensure we send ISRG_X1 in the handshake on port 25 (non-interactive, size doesn't really matter).
Update the DANE pin to reflect the change.
I am not sure whether we will need to add --preferred-chain= in the future; This may be the case when letsencrypt decides to use X2/the ECDSA chain
This needs to be tested on a letsencrypt account that isn't mine (I'm opted in for the alternate cert chains)
### Related issue(s)
- closes #2138
## Prerequisites
Before we can consider review and merge, please make sure the following list is done and checked.
If an entry in not applicable, you can check it or remove it from the list.
There's already a towncrier news for it
Co-authored-by: Florent Daigniere <nextgens@freenetproject.org>
2022-02-24 13:22:57 +00:00
Florent Daigniere
f9869b1d79
ghostwheel42's suggestions
2022-02-24 12:45:30 +01:00
Dimitri Huisman
c40a0f4b80
Change link in warning to master. Master is always available. 1.9 will be unavaiable in the future.
2022-02-23 10:48:53 +00:00
Florent Daigniere
ab35492589
the first time the loop runs we don't have the second cert
2022-02-20 12:02:30 +01:00
Florent Daigniere
0816cb9497
simplify as per ghostwheel42's suggestion
2022-02-20 11:56:21 +01:00
Florent Daigniere
7166e7d2b2
Implement #2213 : slow transports
2022-02-19 18:37:37 +01:00
Florent Daigniere
e4a32b55f5
Send ISRG_X1 on port 25, make DANE pin that
2022-02-19 14:35:45 +01:00
Florent Daigniere
d3e7ea5389
spell it out
2022-02-19 13:30:36 +01:00
Florent Daigniere
a8dc20962a
workaround a bug in coredns
2022-02-19 13:02:52 +01:00
Dimitri Huisman
55a601de5a
Add missing import for validators, improve behaviour when an error occurs.
2022-02-17 13:09:15 +00:00
Dimitri Huisman
7d801c560c
Improve if statement
2022-02-17 12:45:35 +00:00