119 lines
No EOL
5.1 KiB
YAML
119 lines
No EOL
5.1 KiB
YAML
---
|
|
|
|
# -------------
|
|
# Mailcow.conf
|
|
# -------------
|
|
|
|
mailcow__config_http_port: 80
|
|
mailcow__config_http_bind:
|
|
mailcow__config_https_port: 443
|
|
mailcow__config_https_bind:
|
|
|
|
|
|
# Set this to "allow" to enable the anyone pseudo user. Disabled by default.
|
|
# When enabled, ACL can be created, that apply to "All authenticated users"
|
|
# This should probably only be activated on mail hosts, that are used exclusivly by one organisation.
|
|
# Otherwise a user might share data with too many other users.
|
|
mailcow__config_acl_anyone: disallow
|
|
|
|
# Garbage collector cleanup
|
|
# Deleted domains and mailboxes are moved to /var/vmail/_garbage/timestamp_sanitizedstring
|
|
# How long should objects remain in the garbage until they are being deleted? (value in minutes)
|
|
# Check interval is hourly
|
|
mailcow__config_maildir_gc_time: 1440
|
|
|
|
# Additional SAN for the certificate
|
|
#
|
|
# You can use wildcard records to create specific names for every domain you add to mailcow.
|
|
# Example: Add domains "example.com" and "example.net" to mailcow, change ADDITIONAL_SAN to a value like:
|
|
#ADDITIONAL_SAN=imap.*,smtp.*
|
|
# This will expand the certificate to "imap.example.com", "smtp.example.com", "imap.example.net", "imap.example.net"
|
|
# plus every domain you add in the future.
|
|
#
|
|
# You can also just add static names...
|
|
#ADDITIONAL_SAN=srv1.example.net
|
|
# ...or combine wildcard and static names:
|
|
#ADDITIONAL_SAN=imap.*,srv1.example.com
|
|
#
|
|
mailcow__config_additional_san: []
|
|
|
|
# Additional server names for mailcow UI
|
|
#
|
|
# Specify alternative addresses for the mailcow UI to respond to
|
|
# This is useful when you set mail.* as ADDITIONAL_SAN and want to make sure mail.maildomain.com will always point to the mailcow UI.
|
|
# If the server name does not match a known site, Nginx decides by best-guess and may redirect users to the wrong web root.
|
|
# You can understand this as server_name directive in Nginx.
|
|
# Comma separated list without spaces! Example: ADDITIONAL_SERVER_NAMES=a.b.c,d.e.f
|
|
mailcow__config_additional_server_names: []
|
|
|
|
# Skip running ACME (acme-mailcow, Let's Encrypt certs) - y/n
|
|
mailcow__config_skip_lets_encrypt: n
|
|
|
|
# Let's Encrypt registration contact information
|
|
# Optional: Leave empty for none
|
|
# This value is only used on first order!
|
|
# Setting it at a later point will require the following steps:
|
|
# https://mailcow.github.io/mailcow-dockerized-docs/troubleshooting/debug-reset_tls/
|
|
mailcow__config_acme_contact: ""
|
|
|
|
# Create seperate certificates for all domains - y/n
|
|
# this will allow adding more than 100 domains, but some email clients will not be able to connect with alternative hostnames
|
|
# see https://wiki.dovecot.org/SSL/SNIClientSupport
|
|
mailcow__config_enable_ssl_sni: n
|
|
|
|
# Skip IPv4 check in ACME container - y/n
|
|
mailcow__config_skip_ip_check: n
|
|
|
|
# Skip HTTP verification in ACME container - y/n
|
|
mailcow__config_skip_http_verification: n
|
|
|
|
# Skip ClamAV (clamd-mailcow) anti-virus (Rspamd will auto-detect a missing ClamAV container) - y/n
|
|
mailcow__config_skip_clamd: n
|
|
|
|
# Skip SOGo: Will disable SOGo integration and therefore webmail, DAV protocols and ActiveSync support (experimental, unsupported, not fully implemented) - y/n
|
|
mailcow__config_skip_sogo: n
|
|
|
|
# Allow admins to log into SOGo as email user (without any password)
|
|
mailcow__config_allow_admin_email_login: n
|
|
|
|
# Enable watchdog (watchdog-mailcow) to restart unhealthy containers
|
|
mailcow__config_use_watchdog: n
|
|
# Send watchdog notifications by mail (sent from watchdog@MAILCOW_HOSTNAME)
|
|
# CAUTION:
|
|
# 1. You should use external recipients
|
|
# 2. Mails are sent unsigned (no DKIM)
|
|
# 3. If you use DMARC, create a separate DMARC policy ("v=DMARC1; p=none;" in _dmarc.MAILCOW_HOSTNAME)
|
|
# Multiple rcpts allowed, NO quotation marks, NO spaces
|
|
mailcow__config_watchdog_notify_email:
|
|
# Notify about banned IP (includes whois lookup)
|
|
mailcow__config_watchdog_notify_ban: y
|
|
# Subject for watchdog mails. Defaults to "Watchdog ALERT" followed by the error message.
|
|
mailcow__config_watchdog_subject:
|
|
|
|
# Checks if mailcow is an open relay. Requires a SAL. More checks will follow.
|
|
# https://www.servercow.de/mailcow?lang=en
|
|
# https://www.servercow.de/mailcow?lang=de
|
|
# No data is collected. Opt-in and anonymous.
|
|
# Will only work with unmodified mailcow setups.
|
|
mailcow__config_watchdog_external_checks: n
|
|
|
|
# Max log lines per service to keep in Redis logs
|
|
mailcow__config_log_lines: 9999
|
|
|
|
# SOGo session timeout in minutes
|
|
mailcow__config_sogo_expire_session: 480
|
|
|
|
# Dovecot Indexing (FTS) Process maximum heap size in MB, there is no recommendation, please see Dovecot docs.
|
|
# Flatcurve is used as FTS Engine. It is supposed to be pretty efficient in CPU and RAM consumption.
|
|
# Please always monitor your Resource consumption!
|
|
mailcow__config_fts_heap: 128
|
|
# Controls how many processes the Dovecot indexing process can spawn at max.
|
|
# Too many indexing processes can use a lot of CPU and Disk I/O
|
|
# Please visit: https://doc.dovecot.org/configuration_manual/service_configuration/#indexer-worker for more informations
|
|
mailcow__config_fts_procs: 1
|
|
# Skip FTS (Fulltext Search) for Dovecot on low-memory, low-threaded systems or if you simply want to disable it.
|
|
# Dovecot inside mailcow use Flatcurve as FTS Backend.
|
|
mailcow__config_skip_fts: n
|
|
|
|
# Redirect HTTP connections to HTTPS - y/n
|
|
mailcow__config_http_redirect: n |