ansible-docker-mailcow/roles/mailcow-ansiblerole/defaults/main/mailcow.yml
Jesko Anschütz d563801458 initial
2025-03-20 10:39:09 +01:00

119 lines
No EOL
5.1 KiB
YAML

---
# -------------
# Mailcow.conf
# -------------
mailcow__config_http_port: 80
mailcow__config_http_bind:
mailcow__config_https_port: 443
mailcow__config_https_bind:
# Set this to "allow" to enable the anyone pseudo user. Disabled by default.
# When enabled, ACL can be created, that apply to "All authenticated users"
# This should probably only be activated on mail hosts, that are used exclusivly by one organisation.
# Otherwise a user might share data with too many other users.
mailcow__config_acl_anyone: disallow
# Garbage collector cleanup
# Deleted domains and mailboxes are moved to /var/vmail/_garbage/timestamp_sanitizedstring
# How long should objects remain in the garbage until they are being deleted? (value in minutes)
# Check interval is hourly
mailcow__config_maildir_gc_time: 1440
# Additional SAN for the certificate
#
# You can use wildcard records to create specific names for every domain you add to mailcow.
# Example: Add domains "example.com" and "example.net" to mailcow, change ADDITIONAL_SAN to a value like:
#ADDITIONAL_SAN=imap.*,smtp.*
# This will expand the certificate to "imap.example.com", "smtp.example.com", "imap.example.net", "imap.example.net"
# plus every domain you add in the future.
#
# You can also just add static names...
#ADDITIONAL_SAN=srv1.example.net
# ...or combine wildcard and static names:
#ADDITIONAL_SAN=imap.*,srv1.example.com
#
mailcow__config_additional_san: []
# Additional server names for mailcow UI
#
# Specify alternative addresses for the mailcow UI to respond to
# This is useful when you set mail.* as ADDITIONAL_SAN and want to make sure mail.maildomain.com will always point to the mailcow UI.
# If the server name does not match a known site, Nginx decides by best-guess and may redirect users to the wrong web root.
# You can understand this as server_name directive in Nginx.
# Comma separated list without spaces! Example: ADDITIONAL_SERVER_NAMES=a.b.c,d.e.f
mailcow__config_additional_server_names: []
# Skip running ACME (acme-mailcow, Let's Encrypt certs) - y/n
mailcow__config_skip_lets_encrypt: n
# Let's Encrypt registration contact information
# Optional: Leave empty for none
# This value is only used on first order!
# Setting it at a later point will require the following steps:
# https://mailcow.github.io/mailcow-dockerized-docs/troubleshooting/debug-reset_tls/
mailcow__config_acme_contact: ""
# Create seperate certificates for all domains - y/n
# this will allow adding more than 100 domains, but some email clients will not be able to connect with alternative hostnames
# see https://wiki.dovecot.org/SSL/SNIClientSupport
mailcow__config_enable_ssl_sni: n
# Skip IPv4 check in ACME container - y/n
mailcow__config_skip_ip_check: n
# Skip HTTP verification in ACME container - y/n
mailcow__config_skip_http_verification: n
# Skip ClamAV (clamd-mailcow) anti-virus (Rspamd will auto-detect a missing ClamAV container) - y/n
mailcow__config_skip_clamd: n
# Skip SOGo: Will disable SOGo integration and therefore webmail, DAV protocols and ActiveSync support (experimental, unsupported, not fully implemented) - y/n
mailcow__config_skip_sogo: n
# Allow admins to log into SOGo as email user (without any password)
mailcow__config_allow_admin_email_login: n
# Enable watchdog (watchdog-mailcow) to restart unhealthy containers
mailcow__config_use_watchdog: n
# Send watchdog notifications by mail (sent from watchdog@MAILCOW_HOSTNAME)
# CAUTION:
# 1. You should use external recipients
# 2. Mails are sent unsigned (no DKIM)
# 3. If you use DMARC, create a separate DMARC policy ("v=DMARC1; p=none;" in _dmarc.MAILCOW_HOSTNAME)
# Multiple rcpts allowed, NO quotation marks, NO spaces
mailcow__config_watchdog_notify_email:
# Notify about banned IP (includes whois lookup)
mailcow__config_watchdog_notify_ban: y
# Subject for watchdog mails. Defaults to "Watchdog ALERT" followed by the error message.
mailcow__config_watchdog_subject:
# Checks if mailcow is an open relay. Requires a SAL. More checks will follow.
# https://www.servercow.de/mailcow?lang=en
# https://www.servercow.de/mailcow?lang=de
# No data is collected. Opt-in and anonymous.
# Will only work with unmodified mailcow setups.
mailcow__config_watchdog_external_checks: n
# Max log lines per service to keep in Redis logs
mailcow__config_log_lines: 9999
# SOGo session timeout in minutes
mailcow__config_sogo_expire_session: 480
# Dovecot Indexing (FTS) Process maximum heap size in MB, there is no recommendation, please see Dovecot docs.
# Flatcurve is used as FTS Engine. It is supposed to be pretty efficient in CPU and RAM consumption.
# Please always monitor your Resource consumption!
mailcow__config_fts_heap: 128
# Controls how many processes the Dovecot indexing process can spawn at max.
# Too many indexing processes can use a lot of CPU and Disk I/O
# Please visit: https://doc.dovecot.org/configuration_manual/service_configuration/#indexer-worker for more informations
mailcow__config_fts_procs: 1
# Skip FTS (Fulltext Search) for Dovecot on low-memory, low-threaded systems or if you simply want to disable it.
# Dovecot inside mailcow use Flatcurve as FTS Backend.
mailcow__config_skip_fts: n
# Redirect HTTP connections to HTTPS - y/n
mailcow__config_http_redirect: n