1
0
mirror of https://github.com/Mailu/Mailu.git synced 2025-06-23 00:28:06 +02:00
Commit Graph

68 Commits

Author SHA1 Message Date
f8dffe5a19 Resolve hosts in admin 2019-01-25 17:26:45 +02:00
004a431e97 Change to mailustart functions 2019-01-25 17:26:45 +02:00
049ca9941f Cleanup syntax and fix typo 2019-01-08 05:21:03 +02:00
71cda7983e Merge branch 'master' into feat-logging 2019-01-08 01:54:33 +02:00
7d01bb2a4d LOG_LEVEL docs and changelog entry 2019-01-08 00:58:01 +02:00
b04a9d1c28 Implement debug logging for template rendering 2019-01-08 00:38:06 +02:00
5636e7f5a7 Remove to avoid matching webroot 2019-01-07 14:08:00 +02:00
4f93e09028 Implement favicon package
Credit to:
- https://stackoverflow.com/a/19590415/1816774
- https://realfavicongenerator.net/
2019-01-06 15:49:40 +02:00
24828615cf Webmail on root, fixes #757 2018-12-19 16:20:24 +02:00
c7dcfee882 Merge pull request #713 from pgeorgi/extend-nginx
nginx: Allow extending config with overrides
2018-12-09 21:44:24 +02:00
6ca8ed437d Merge pull request #732 from Nebukadneza/add_front_certificate_reload
Add certificate watcher for external certs to reload nginx
2018-12-08 20:11:09 +02:00
1aa97c9914 Add certificate watcher for external certs to reload nginx
In case of TLS_FLAVOR=[mail,cert], the user supplies their own certificates.
However, since nginx is not aware of changes to these files, it cannot
reload itself e.g. when the certs get renewed.

To solve this, let’s add a small daemon in the place of
`letsencrypt.py`, which uses a flexible file-watching framework and
reloads nginx in the case the certificates change ….
2018-12-07 16:20:42 +00:00
c00910ca4b Merge remote-tracking branch 'upstream/master' into extend-nginx 2018-12-07 16:48:50 +02:00
97d338e68a Rectify 'endif' placement 2018-12-07 16:44:42 +02:00
425cdd5e77 Fix syntax errors 2018-12-07 16:29:41 +02:00
20f1faf6d0 Send 404 when nothing server at '/'
Prevents Nginx welcome screen
2018-12-07 16:10:52 +02:00
2de4995fec Don't redirect when webmail is served on '/' 2018-12-07 15:17:04 +02:00
9dd447e23b Add login method to smtp_auth under ssl
Fixes #704
2018-12-06 01:00:16 +02:00
eac4d553a9 nginx: Allow extending config with overrides
To facilitate this, the default redirect at / can be disabled, even if
the default remains at redirecting to the webmailer.

The extensions are within the host scope and are read from
$ROOT/overrides/nginx/*.conf.
2018-12-05 23:54:52 +01:00
42e2dbe35d Standarize image by using shared / similair layers 2018-10-31 19:17:23 +02:00
603b6e7390 Merge pull request #2 from usrpro/fix-nginx-healthcheck
Fix nginx healthcheck
2018-10-21 22:44:44 +02:00
81b24f61e8 Merge branch 'master' into feat-healthchecks 2018-10-21 20:58:59 +03:00
c3e89967fb Fix front health checking
- Specified seperated /health path in order to allow for healthcheck even if webmail and admin are not seletectd. This also allows healthchecking fom external services like DNS load balancers;
- Make curl not to fail on TLS because localhost is not included in the certificates.
2018-10-21 20:45:41 +03:00
bce1487338 Merge pull request #576 from hacor/master
Kubernetes fixed for production
2018-10-20 22:30:38 +00:00
78bd5aea1c enable http2, because it's that easy 2018-10-19 22:46:36 -06:00
d4f32c3e7d remove rewrite if webmail is on root 2018-10-18 14:27:28 +02:00
3098343360 Merged conflicts 2018-10-17 07:32:56 +02:00
4ea12deae7 Added kubernetes to Mailu 2018-10-17 07:22:55 +02:00
39272ab05c add healthcheck for http services 2018-10-16 21:38:12 +02:00
de43060ef8 Move to Alpine:3.8 and fixing #522 2018-10-11 14:06:26 +03:00
2cba045013 Explicitely declare required volumes, fixes #568 2018-09-28 17:28:46 +02:00
3dca1a834c Pin alpine 3.7 until we fix the certbot issue, see #522 2018-08-01 21:56:29 +02:00
75a1bf967c Merge pull request #502 from hoellen/webmail-messagesize
Use message_size_limit variable from env for webmail client_max_body_size
2018-06-28 21:29:30 +02:00
c51e1b9eef webmail client_max_body_size with message_size_limit and 8M tolerance 2018-06-28 19:23:08 +02:00
81a6a7cbf6 Use message_size variable from env for webmail 2018-06-25 15:51:20 +02:00
a1fb8442e3 Add posibilty to run webmail on root '/' 2018-06-25 15:45:43 +02:00
6828231c28 Fix the path of the nginx pid in startup scripts, fixes #483 2018-06-02 10:23:33 +02:00
50f9f379e9 Flexible filenames for TLS via envvars (flavours 'cert' and 'mail' only) 2018-05-01 14:04:18 +02:00
d1dbba2d3a Add expose instructions in Dockerfiles, fixes #392 2018-04-21 14:46:01 +02:00
b9e67635f4 Use HOST_ADMIN in "Forwarding authentication server". Fixes #436. 2018-04-07 12:40:32 -05:00
dfb5463c94 Relax the frame filtering to allow roundcube to display previews 2018-02-11 22:56:26 +01:00
04278b6cbf Pass the full host to the backend, fixes #372 2018-02-06 18:56:41 +01:00
6c56c8e298 Specify the client max body size in the front, related to #371 2018-01-28 10:35:55 +01:00
f538e33dcf Parametrize hosts
Allows to use mailu without docker-compose when hostnames are not set up
by docker itself but provided via a separate resolver.

Use case: use mailu using nomad scheduler and consul resolver instead of
docker-compose. Other servers are provided by the DNS resolver that
resolves names like admin.service.consul or webmail.service.consul.
These names needs to be configurable.
2018-01-24 22:54:41 +01:00
6ec0fe7036 Adding options for mail-letsencrypt 2018-01-04 16:23:28 +01:00
d0b8de72e4 Do not deny HTTP access upon TLS error when the flavor is mail 2017-12-17 15:09:10 +01:00
bfc898c2d8 Move dhparam to /conf 2017-12-17 14:47:02 +01:00
f1ad2cf4d0 Use a predefined dhparam.pem, This fixes issue #322 2017-12-17 14:47:02 +01:00
acb5d7da38 Use relative redirect for / to the webmail 2017-12-04 22:42:12 +01:00
2dfc91ac4d Use a map for passing x-forwarded-proto along 2017-12-04 22:19:17 +01:00