From 423e90cc04fb926f2e844822f8991c6ea882ac44 Mon Sep 17 00:00:00 2001 From: Ionut <81566145+Blitz-Cloud@users.noreply.github.com> Date: Thu, 22 May 2025 14:59:12 +0300 Subject: [PATCH] Update mailserver-behind-proxy.md When the entrypoints for traefik are defined there are named mail-*(smtp,...), but it the dms labels when it comes to using these entry point in the TLS section just smtp is used, and for TLS it is used smtp-submissions witch is an invalid entrypoint --- .../content/examples/tutorials/mailserver-behind-proxy.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/content/examples/tutorials/mailserver-behind-proxy.md b/docs/content/examples/tutorials/mailserver-behind-proxy.md index 11487747..ec95de6c 100644 --- a/docs/content/examples/tutorials/mailserver-behind-proxy.md +++ b/docs/content/examples/tutorials/mailserver-behind-proxy.md @@ -114,15 +114,15 @@ The below guidance is focused on configuring [Traefik][traefik-web], but the adv # These are examples, configure the equivalent for any additional ports you proxy. # Explicit TLS (STARTTLS): - traefik.tcp.routers.mail-smtp.rule=HostSNI(`*`) - - traefik.tcp.routers.mail-smtp.entrypoints=smtp - - traefik.tcp.routers.mail-smtp.service=smtp + - traefik.tcp.routers.mail-smtp.entrypoints=mail-smtp + - traefik.tcp.routers.mail-smtp.service=mail-smtp - traefik.tcp.services.mail-smtp.loadbalancer.server.port=25 - traefik.tcp.services.mail-smtp.loadbalancer.proxyProtocol.version=2 # Implicit TLS is no different, except for optional HostSNI support: - traefik.tcp.routers.mail-submissions.rule=HostSNI(`*`) - - traefik.tcp.routers.mail-submissions.entrypoints=smtp-submissions - - traefik.tcp.routers.mail-submissions.service=smtp-submissions + - traefik.tcp.routers.mail-submissions.entrypoints=mail-submissions + - traefik.tcp.routers.mail-submissions.service=mail-submissions - traefik.tcp.services.mail-submissions.loadbalancer.server.port=465 - traefik.tcp.services.mail-submissions.loadbalancer.proxyProtocol.version=2 # NOTE: Optionally match by SNI rule, this requires TLS passthrough (not compatible with STARTTLS):