summaryrefslogtreecommitdiff
path: root/provider_base/services/mx.json
AgeCommit message (Collapse)Author
2017-03-15Direct connection when couch runs locallyvarac
2017-03-15[8144] Remove Haproxyvarac
We used haproxy because we had multiple bigcouch nodes but now with a single couchdb node this is not needed anymore. - Resolves: #8144
2016-12-22bugfix: don't block commercial certs for mx serverselijah
2016-12-19bugfix: mx service does not require a commercial certificateelijah
2016-04-05testing: adds mx delivery testselijah
2016-02-23get dkim working, closes #5924elijah
2015-10-13add clamav filtering, with sanesecurity signature updating and provider ↵Micah
whitelisting (#3625) Change-Id: I15985ca00ee95bc62855f098a78e364ebbc32616
2015-09-24added firewall information to nodes (needed for `leap compile firewall`)elijah
2015-08-31mx: added mx.key_lookup_domain propertyelijah
2015-07-28Support RBL blocking of incoming mail (#5923)Micah Anderson
Set zen.spamhaus as the default rbl Change-Id: Ic3537d645c80ba42267bab370a1cf77730382158
2014-07-29fix haproxy_servers call with couchdb default portAzul
2014-07-16haproxy connects to a local couch if availableAzul
When running a service that requires couch (webapp or mx) on a node that also had couch running the haproxy was confused because it did not have an stunnel port for the local couch. Emit a more useful error and fixed this for webapp and mx
2014-06-25fix stunnel entries in mx.json and webapp.jsonelijah
2014-06-25more friendly error message in `leap compile` when commercial certificate is ↵elijah
missing.
2014-04-01Fix for Openstack/Amazon special case needing to allow ec2_public_ipv4Micah Anderson
in mynetworks (#5427) Change-Id: Iee954f8cacd852f8c7c598c68a8793a3523c0132
2014-04-01Include all the ips that are allowed to send mail through the relay inMicah Anderson
the mynetworks parameter. Previously we only allowed other mx servers to relay to each other, but this prevents system mail from non-mx nodes from getting out. Fixes "Helo command rejected: You are not in domain bitmask.net (in reply to RCPT TO command))" (#5343) Change-Id: I5e204958cb235808eedc3a1724fb2dc6c7a5b73b
2014-02-27fixed more places where passwords were set to the wrong environment.elijah
2013-12-19Set mynetworks to include any mx server in the provider to allow them to0.5.0rc1Micah Anderson
Helo as the domain (#4495) Change-Id: I6c8ac28faceb8b0c6129a606ede04837efd3d261
2013-11-28remove leap_mx admin user and fix leap_mx couchdb hiera variablesMicah Anderson
Change-Id: I052576279d8a47313cd99412fdd7b715daa73374
2013-10-10provide global.provider.contacts.default on every node, no need to add in ↵varac
services/mx.json again
2013-09-18Include content of client_ca.crt and client_ca.key in hiera (Feature #3874)varac
2013-08-01Merge branch 'feature/issue/3278' into developvarac
2013-07-31add haproxy servers to services/mx.jsonvarac
2013-07-31fix /etc/leap/mx.conf doesn't contain any user credentials (Feature #3347)varac
2013-07-25fixed provider_base/services/mx.json syntaxvarac
2013-07-25initial mx couchdb stunnel configurationMicah Anderson
2013-07-25add necessary service type to the mx.jsonMicah Anderson
2013-07-25fixed provider_base/services/mx.json syntaxvarac
2013-07-25initial mx couchdb stunnel configurationMicah Anderson
2013-07-25hiera variable mx.contact -> postfix $root_mail_recipientvarac
2013-07-25initial mx couchdb stunnel configurationMicah Anderson
2013-07-25added provider_base/services/mx.jsonvarac