mirror of
https://github.com/kevinveenbirkenbach/computer-playbook.git
synced 2025-08-29 15:06:26 +02:00
Solved bug existed due to difference between mailu domain and hostname difference. also refactored during this to find the bug
This commit is contained in:
@@ -11,16 +11,16 @@
|
||||
LD_PRELOAD=/usr/lib/libhardened_malloc.so
|
||||
|
||||
# Set to a randomly generated 16 bytes string
|
||||
SECRET_KEY={{applications | get_app_conf(application_id,'credentials.secret_key')}}
|
||||
SECRET_KEY={{ MAILU_SECRET_KEY }}
|
||||
|
||||
# Subnet of the docker network. This should not conflict with any networks to which your system is connected. (Internal and external!)
|
||||
SUBNET={{networks.local['web-app-mailu'].subnet}}
|
||||
SUBNET={{ MAILU_SUBNET }}
|
||||
|
||||
# Main mail domain
|
||||
DOMAIN={{ applications | get_app_conf(application_id,'domain') }}
|
||||
DOMAIN={{ MAILU_DOMAIN }}
|
||||
|
||||
# Hostnames for this server, separated with comas
|
||||
HOSTNAMES={{ domains[application_id] | join(',') }}
|
||||
HOSTNAMES={{ MAILU_HOSTNAMES | join(',') }}
|
||||
|
||||
# Postmaster local part (will append the main mail domain)
|
||||
POSTMASTER=admin
|
||||
@@ -105,7 +105,7 @@ WEB_WEBMAIL=/webmail
|
||||
SITENAME=Mailservices
|
||||
|
||||
# Linked Website URL
|
||||
WEBSITE={{ domains | get_url(application_id, WEB_PROTOCOL) }}
|
||||
WEBSITE={{ MAILU_WEBSITE }}
|
||||
|
||||
|
||||
|
||||
@@ -151,34 +151,34 @@ SQLALCHEMY_DATABASE_URI=mysql+mysqlconnector://{{ database_username }}:{{ databa
|
||||
API=true
|
||||
WEB_API=/api
|
||||
# Configures the authentication token. The minimum length is 3 characters. This token must be passed as request header to the API as authentication token. This is a mandatory setting for using the RESTful API.
|
||||
API_TOKEN={{ applications | get_app_conf(application_id, 'credentials.api_token')}}
|
||||
API_TOKEN={{ MAILU_API_TOKEN}}
|
||||
|
||||
|
||||
# Activated https://mailu.io/master/configuration.html#advanced-settings
|
||||
AUTH_REQUIRE_TOKENS=True
|
||||
|
||||
|
||||
{% if applications | get_app_conf(application_id, 'features.oidc', False) %}
|
||||
{% if MAILU_OIDC_ENABLED | bool %}
|
||||
###################################
|
||||
# OpenID Connect settings
|
||||
###################################
|
||||
# @see https://github.com/heviat/Mailu-OIDC/tree/master
|
||||
|
||||
# Enable OpenID Connect. Possible values: True, False
|
||||
OIDC_ENABLED={{ applications | get_app_conf(application_id, 'features.oidc', False) | string | capitalize }}
|
||||
OIDC_ENABLED={{ MAILU_OIDC_ENABLED | string | capitalize }}
|
||||
|
||||
# OpenID Connect provider configuration URL
|
||||
OIDC_PROVIDER_INFO_URL={{ oidc.client.issuer_url }}
|
||||
OIDC_PROVIDER_INFO_URL={{ OIDC.CLIENT.ISSUER_URL }}
|
||||
|
||||
|
||||
# OpenID Connect Client ID for Mailu
|
||||
OIDC_CLIENT_ID={{ oidc.client.id }}
|
||||
OIDC_CLIENT_ID={{ OIDC.CLIENT.ID }}
|
||||
|
||||
# OpenID Connect Client secret for Mailu
|
||||
OIDC_CLIENT_SECRET={{ oidc.client.secret }}
|
||||
OIDC_CLIENT_SECRET={{ OIDC.CLIENT.SECRET }}
|
||||
|
||||
# Label text for OpenID Connect login button. Default: OpenID Connect
|
||||
OIDC_BUTTON_NAME={{ oidc.button_text }}
|
||||
OIDC_BUTTON_NAME={{ OIDC.BUTTON_TEXT }}
|
||||
|
||||
# Disable TLS certificate verification for the OIDC client. Possible values: True, False
|
||||
OIDC_VERIFY_SSL=True
|
||||
@@ -187,17 +187,17 @@ OIDC_VERIFY_SSL=True
|
||||
OIDC_CHANGE_PASSWORD_REDIRECT_ENABLED=True
|
||||
|
||||
# Redirect URL for password change. Defaults to provider issuer url appended by /.well-known/change-password
|
||||
OIDC_CHANGE_PASSWORD_REDIRECT_URL={{oidc.client.change_credentials}}
|
||||
OIDC_CHANGE_PASSWORD_REDIRECT_URL={{ OIDC.CLIENT.CHANGE_CREDENTIALS }}
|
||||
|
||||
{% if applications | get_app_conf(application_id, 'oidc.email_by_username', True) | bool %}
|
||||
{% if MAILU_OIDC_EMAIL_BY_USERNAME_ENABLED | bool %}
|
||||
|
||||
# The OIDC claim used as the username. If the selected claim contains an email address, it will be used as is. If it is not an email (e.g., sub), the email address will be constructed as <OIDC_USERNAME_CLAIM>@<OIDC_USER_DOMAIN>. Defaults to email.
|
||||
OIDC_USERNAME_CLAIM={{oidc.attributes.username}}
|
||||
OIDC_USERNAME_CLAIM={{ OIDC.ATTRIBUTES.USERNAME }}
|
||||
|
||||
# The domain used when constructing an email from a non-email username (e.g., when OIDC_USERNAME_CLAIM=sub). Ignored if OIDC_USERNAME_CLAIM is already an email. Defaults to the value of DOMAIN.
|
||||
OIDC_USER_DOMAIN={{ PRIMARY_DOMAIN }}
|
||||
OIDC_USER_DOMAIN={{ MAILU_DOMAIN }}
|
||||
{% endif %}
|
||||
|
||||
# If enabled, users who authenticate successfully but do not yet have an account will have one created for them. If disabled, only existing users can log in, and authentication will fail for users without a pre-existing account. Defaults to True.
|
||||
OIDC_ENABLE_USER_CREATION={{ applications | get_app_conf(application_id, 'oidc.enable_user_creation', True) | string | capitalize }}
|
||||
OIDC_ENABLE_USER_CREATION={{ MAILU_OIDC_ENABLE_USER_CREATION }}
|
||||
{% endif %}
|
Reference in New Issue
Block a user