Merge branch 'dev' into footable
commit
4f72ed4509
|
@ -81,7 +81,7 @@ user = ${DBUSER}
|
||||||
password = ${DBPASS}
|
password = ${DBPASS}
|
||||||
hosts = mysql
|
hosts = mysql
|
||||||
dbname = ${DBNAME}
|
dbname = ${DBNAME}
|
||||||
query = SELECT goto FROM alias WHERE address='%s' AND active='1' AND domain IN(SELECT domain FROM domain WHERE domain='%d' AND active='1') UNION SELECT logged_in_as FROM sender_acl WHERE send_as='@%d' OR send_as='%s' OR send_as IN ( SELECT CONCAT ('@',target_domain) FROM alias_domain WHERE alias_domain = '%d') OR send_as IN ( SELECT CONCAT ('%u','@',target_domain) FROM alias_domain WHERE alias_domain = '%d' ) AND logged_in_as NOT IN (SELECT goto FROM alias WHERE address='%s') UNION SELECT username FROM mailbox,alias_domain WHERE alias_domain.alias_domain = '%d' AND mailbox.username = CONCAT('%u','@',alias_domain.target_domain) AND mailbox.active ='1' AND alias_domain.active='1'
|
query = SELECT goto FROM alias WHERE address='%s' AND active='1' AND (domain IN (SELECT domain FROM domain WHERE domain='%d' AND active='1') OR domain in (SELECT target_domain FROM alias_domain WHERE alias_domain='%d' AND active='1')) UNION SELECT logged_in_as FROM sender_acl WHERE send_as='@%d' OR send_as='%s' OR send_as IN ( SELECT CONCAT ('@',target_domain) FROM alias_domain WHERE alias_domain = '%d') OR send_as IN ( SELECT CONCAT ('%u','@',target_domain) FROM alias_domain WHERE alias_domain = '%d' ) AND logged_in_as NOT IN (SELECT goto FROM alias WHERE address='%s') UNION SELECT username FROM mailbox,alias_domain WHERE alias_domain.alias_domain = '%d' AND mailbox.username = CONCAT('%u','@',alias_domain.target_domain) AND mailbox.active ='1' AND alias_domain.active='1'
|
||||||
EOF
|
EOF
|
||||||
|
|
||||||
cat <<EOF > /opt/postfix/conf/sql/mysql_virtual_spamalias_maps.cf
|
cat <<EOF > /opt/postfix/conf/sql/mysql_virtual_spamalias_maps.cf
|
||||||
|
|
|
@ -1,34 +0,0 @@
|
||||||
sign_condition =<<EOD
|
|
||||||
return function(task)
|
|
||||||
local smtp_from = task:get_from('smtp')
|
|
||||||
local mime_from = task:get_from('mime')
|
|
||||||
local rspamd_logger = require "rspamd_logger"
|
|
||||||
if smtp_from[1]['domain'] ~= nil and smtp_from[1]['domain'] ~= '' then
|
|
||||||
domain = smtp_from[1]['domain']
|
|
||||||
rspamd_logger.infox(task, "set domain found in smtp from field to %s", domain)
|
|
||||||
if not task:get_user() then
|
|
||||||
rspamd_logger.infox(task, "found domain in smtp header field, but user is not authenticated - skipped")
|
|
||||||
return false
|
|
||||||
end
|
|
||||||
elseif mime_from[1]['domain'] ~= nil and mime_from[1]['domain'] ~= '' then
|
|
||||||
domain = mime_from[1]['domain']
|
|
||||||
rspamd_logger.infox(task, "set domain found in mime from field to %s", domain)
|
|
||||||
else
|
|
||||||
rspamd_logger.infox(task, "cannot determine domain for dkim signing")
|
|
||||||
return false
|
|
||||||
end
|
|
||||||
local keyfile = io.open("/data/dkim/keys/" .. domain .. ".dkim")
|
|
||||||
if keyfile then
|
|
||||||
rspamd_logger.infox(task, "found dkim key file for domain %s", domain)
|
|
||||||
keyfile:close()
|
|
||||||
return {
|
|
||||||
key = "/data/dkim/keys/" .. domain .. ".dkim",
|
|
||||||
domain = domain,
|
|
||||||
selector = "dkim"
|
|
||||||
}
|
|
||||||
else
|
|
||||||
rspamd_logger.infox(task, "no key file for domain %s - skipped", domain)
|
|
||||||
end
|
|
||||||
return false
|
|
||||||
end
|
|
||||||
EOD;
|
|
|
@ -0,0 +1,38 @@
|
||||||
|
# If false, messages with empty envelope from are not signed
|
||||||
|
allow_envfrom_empty = true;
|
||||||
|
# If true, envelope/header domain mismatch is ignored
|
||||||
|
allow_hdrfrom_mismatch = false;
|
||||||
|
# If true, multiple from headers are allowed (but only first is used)
|
||||||
|
allow_hdrfrom_multiple = false;
|
||||||
|
# If true, username does not need to contain matching domain
|
||||||
|
allow_username_mismatch = false;
|
||||||
|
# If false, messages from authenticated users are not selected for signing
|
||||||
|
auth_only = true;
|
||||||
|
# Default path to key, can include '$domain' and '$selector' variables
|
||||||
|
path = "/data/dkim/keys/$domain.$selector";
|
||||||
|
# Default selector to use
|
||||||
|
selector = "dkim";
|
||||||
|
# If false, messages from local networks are not selected for signing
|
||||||
|
sign_local = true;
|
||||||
|
# Symbol to add when message is signed
|
||||||
|
symbol = "DKIM_SIGNED";
|
||||||
|
# Whether to fallback to global config
|
||||||
|
try_fallback = true;
|
||||||
|
# Domain to use for DKIM signing: can be "header" or "envelope"
|
||||||
|
use_domain = "header";
|
||||||
|
# Whether to normalise domains to eSLD
|
||||||
|
use_esld = true;
|
||||||
|
# Whether to get keys from Redis
|
||||||
|
use_redis = false;
|
||||||
|
# Hash for DKIM keys in Redis
|
||||||
|
hash_key = "DKIM_KEYS";
|
||||||
|
|
||||||
|
# Domain specific settings
|
||||||
|
#domain {
|
||||||
|
# example.com {
|
||||||
|
# # Private key path
|
||||||
|
# path = "/var/lib/rspamd/dkim/example.key";
|
||||||
|
# # Selector
|
||||||
|
# selector = "ds";
|
||||||
|
# }
|
||||||
|
#}
|
|
@ -29,7 +29,7 @@ $_SESSION['return_to'] = $_SERVER['REQUEST_URI'];
|
||||||
<label class="sr-only" for="login_user"><?=$lang['login']['username'];?></label>
|
<label class="sr-only" for="login_user"><?=$lang['login']['username'];?></label>
|
||||||
<div class="input-group">
|
<div class="input-group">
|
||||||
<div class="input-group-addon"><i class="glyphicon glyphicon-user"></i></div>
|
<div class="input-group-addon"><i class="glyphicon glyphicon-user"></i></div>
|
||||||
<input name="login_user" autocorrect="off" autocapitalize="none" type="name" id="login_user" class="form-control" placeholder="<?=$lang['login']['username'];?>" required="" autofocus="">
|
<input name="login_user" autocorrect="off" autocapitalize="none" type="text" id="login_user" class="form-control" placeholder="<?=$lang['login']['username'];?>" required="" autofocus="">
|
||||||
</div>
|
</div>
|
||||||
</div>
|
</div>
|
||||||
<div class="form-group">
|
<div class="form-group">
|
||||||
|
|
Loading…
Reference in New Issue