mirror of
https://github.com/mail-in-a-box/mailinabox.git
synced 2025-04-04 00:17:06 +00:00
Fix url redirection when a remote nextcloud is used so that .well-known/caldav and carddav work properly, as well as the redirecting /cloud to the remote Nextcloud. Since the nginx config is replaced by the management daemon whenever a new domain is added, this change adds a hooking mechanism for setup mods.Fix url redirection when a remote nextcloud is in use. This corrects redirection for /.well-known/caldav, /.well-known/carddav and /cloud to send the client to the remote nextcloud. This requires an nginx configuration change, and since the nginx config is replaced by the management daemon whenever a new domain is added, this change adds a hooking mechanism for setup mods allowing them to intercept and modify the resultant nginx config.
This commit is contained in:
parent
dae697e6af
commit
53cbabac75
@ -549,6 +549,13 @@ def web_update():
|
|||||||
from web_update import do_web_update
|
from web_update import do_web_update
|
||||||
return do_web_update(env)
|
return do_web_update(env)
|
||||||
|
|
||||||
|
@app.route('/hooks/update', methods=['POST'])
|
||||||
|
@authorized_personnel_only
|
||||||
|
def hooks_update():
|
||||||
|
from hooks import update_hook_handlers
|
||||||
|
update_hook_handlers()
|
||||||
|
return "OK"
|
||||||
|
|
||||||
# System
|
# System
|
||||||
|
|
||||||
@app.route('/system/version', methods=["GET"])
|
@app.route('/system/version', methods=["GET"])
|
||||||
@ -820,6 +827,8 @@ add_ui_common(app)
|
|||||||
from daemon_reports import add_reports
|
from daemon_reports import add_reports
|
||||||
add_reports(app, env, authorized_personnel_only)
|
add_reports(app, env, authorized_personnel_only)
|
||||||
|
|
||||||
|
from hooks import update_hook_handlers
|
||||||
|
update_hook_handlers()
|
||||||
|
|
||||||
if __name__ == '__main__':
|
if __name__ == '__main__':
|
||||||
if "DEBUG" in os.environ:
|
if "DEBUG" in os.environ:
|
||||||
|
88
management/hooks.py
Normal file
88
management/hooks.py
Normal file
@ -0,0 +1,88 @@
|
|||||||
|
# -*- indent-tabs-mode: t; tab-width: 4; python-indent-offset: 4; -*-
|
||||||
|
#####
|
||||||
|
##### This file is part of Mail-in-a-Box-LDAP which is released under the
|
||||||
|
##### terms of the GNU Affero General Public License as published by the
|
||||||
|
##### Free Software Foundation, either version 3 of the License, or (at
|
||||||
|
##### your option) any later version. See file LICENSE or go to
|
||||||
|
##### https://github.com/downtownallday/mailinabox-ldap for full license
|
||||||
|
##### details.
|
||||||
|
#####
|
||||||
|
|
||||||
|
import sys, os, stat, importlib
|
||||||
|
from threading import Lock
|
||||||
|
from utils import load_environment, load_env_vars_from_file
|
||||||
|
import logging
|
||||||
|
|
||||||
|
log = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
#
|
||||||
|
# keep a list of hook handlers as a list of dictionaries. see
|
||||||
|
# update_hook_handlers() for the format
|
||||||
|
#
|
||||||
|
mutex = Lock()
|
||||||
|
handlers = []
|
||||||
|
mods_env = {} # dict derived from /etc/mailinabox_mods.conf
|
||||||
|
|
||||||
|
def update_hook_handlers():
|
||||||
|
global handlers, mods_env
|
||||||
|
new_handlers= []
|
||||||
|
for dir in sys.path:
|
||||||
|
hooks_dir = os.path.join(dir, "management_hooks_d")
|
||||||
|
if not os.path.isdir(hooks_dir):
|
||||||
|
continue
|
||||||
|
|
||||||
|
# gather a list of applicable hook handlers
|
||||||
|
for item in os.listdir(hooks_dir):
|
||||||
|
item_path = os.path.join(hooks_dir, item)
|
||||||
|
mode = os.lstat(item_path).st_mode
|
||||||
|
if item.endswith('.py') and stat.S_ISREG(mode):
|
||||||
|
new_handlers.append({
|
||||||
|
'sort_id': item,
|
||||||
|
'path': "management_hooks_d.%s" % (item[0:-3]),
|
||||||
|
'type': "py"
|
||||||
|
})
|
||||||
|
log.info('hook handler: %s', item_path)
|
||||||
|
|
||||||
|
# handlers are sorted alphabetically by file name
|
||||||
|
new_handlers = sorted(new_handlers, key=lambda path: path['sort_id'])
|
||||||
|
log.info('%s hook handlers', len(new_handlers))
|
||||||
|
|
||||||
|
# load /etc/mailinabox_mods.conf
|
||||||
|
new_mods_env = load_environment()
|
||||||
|
if os.path.isfile('/etc/mailinabox_mods.conf'):
|
||||||
|
load_env_vars_from_file(
|
||||||
|
'/etc/mailinabox_mods.conf',
|
||||||
|
strip_quotes=True,
|
||||||
|
merge_env=new_mods_env
|
||||||
|
)
|
||||||
|
|
||||||
|
# update globals
|
||||||
|
mutex.acquire()
|
||||||
|
handlers = new_handlers
|
||||||
|
mods_env = new_mods_env
|
||||||
|
mutex.release()
|
||||||
|
|
||||||
|
|
||||||
|
def exec_hooks(hook_name, data):
|
||||||
|
# `data` is a dictionary containing data from the hook caller, the
|
||||||
|
# contents of which are specific to the type of hook. Handlers may
|
||||||
|
# modify the dictionary to return updates to the caller.
|
||||||
|
|
||||||
|
mutex.acquire()
|
||||||
|
cur_handlers = handlers
|
||||||
|
cur_mods_env = mods_env
|
||||||
|
mutex.release()
|
||||||
|
|
||||||
|
for handler in cur_handlers:
|
||||||
|
if handler['type'] == 'py':
|
||||||
|
# load the python code and run the `do_hook` function
|
||||||
|
log.debug('calling %s hook handler: %s' % (hook_name, handler['path']))
|
||||||
|
module = importlib.import_module(handler['path'])
|
||||||
|
do_hook = getattr(module, "do_hook")
|
||||||
|
do_hook(hook_name, data, cur_mods_env)
|
||||||
|
|
||||||
|
else:
|
||||||
|
log.error('Unknown hook handler type in %s: %s', handler['path'], handler['type'])
|
||||||
|
|
||||||
|
return len(cur_handlers)
|
||||||
|
|
@ -18,6 +18,7 @@ from mailconfig import get_mail_domains
|
|||||||
from dns_update import get_custom_dns_config, get_dns_zones
|
from dns_update import get_custom_dns_config, get_dns_zones
|
||||||
from ssl_certificates import get_ssl_certificates, get_domain_ssl_files, check_certificate
|
from ssl_certificates import get_ssl_certificates, get_domain_ssl_files, check_certificate
|
||||||
from utils import shell, safe_domain_name, sort_domains
|
from utils import shell, safe_domain_name, sort_domains
|
||||||
|
import hooks
|
||||||
|
|
||||||
def get_web_domains(env, include_www_redirects=True, include_auto=True, exclude_dns_elsewhere=True, categories=['mail', 'ssl']):
|
def get_web_domains(env, include_www_redirects=True, include_auto=True, exclude_dns_elsewhere=True, categories=['mail', 'ssl']):
|
||||||
# What domains should we serve HTTP(S) for?
|
# What domains should we serve HTTP(S) for?
|
||||||
@ -114,6 +115,11 @@ def do_web_update(env):
|
|||||||
# Add default 'www.' redirect.
|
# Add default 'www.' redirect.
|
||||||
nginx_conf += make_domain_config(domain, [template0, template3], ssl_certificates, env)
|
nginx_conf += make_domain_config(domain, [template0, template3], ssl_certificates, env)
|
||||||
|
|
||||||
|
# execute hooks
|
||||||
|
hook_data = {'nginx_conf': nginx_conf}
|
||||||
|
hooks.exec_hooks('web_update', hook_data)
|
||||||
|
nginx_conf = hook_data['nginx_conf']
|
||||||
|
|
||||||
# Did the file change? If not, don't bother writing & restarting nginx.
|
# Did the file change? If not, don't bother writing & restarting nginx.
|
||||||
nginx_conf_fn = "/etc/nginx/conf.d/local.conf"
|
nginx_conf_fn = "/etc/nginx/conf.d/local.conf"
|
||||||
if os.path.exists(nginx_conf_fn):
|
if os.path.exists(nginx_conf_fn):
|
||||||
|
@ -316,3 +316,14 @@ say_verbose() {
|
|||||||
say() {
|
say() {
|
||||||
echo "$@"
|
echo "$@"
|
||||||
}
|
}
|
||||||
|
|
||||||
|
install_hook_handler() {
|
||||||
|
# this is used by local setup mods to install a hook handler for
|
||||||
|
# the management daemon
|
||||||
|
local handler_file="$1"
|
||||||
|
local dst="${LOCAL_MODS_DIR:-local}/management_hooks_d"
|
||||||
|
mkdir -p "$dst"
|
||||||
|
cp "$handler_file" "$dst"
|
||||||
|
# let the daemon know there's a new hook handler
|
||||||
|
tools/hooks_update >/dev/null
|
||||||
|
}
|
||||||
|
@ -113,8 +113,8 @@ tr -cd '[:xdigit:]' < /dev/urandom | head -c 32 > /var/lib/mailinabox/api.key
|
|||||||
chmod 640 /var/lib/mailinabox/api.key
|
chmod 640 /var/lib/mailinabox/api.key
|
||||||
|
|
||||||
source $venv/bin/activate
|
source $venv/bin/activate
|
||||||
export PYTHONPATH=$(pwd)/management
|
export PYTHONPATH=$(pwd)/management:${LOCAL_MODS_DIR:-$(pwd)/local}
|
||||||
exec gunicorn -b localhost:10222 -w 1 wsgi:app
|
exec gunicorn --log-level ${MGMT_LOG_LEVEL:-info} -b localhost:10222 -w 1 wsgi:app
|
||||||
EOF
|
EOF
|
||||||
chmod +x $inst_dir/start
|
chmod +x $inst_dir/start
|
||||||
cp --remove-destination conf/mailinabox.service /lib/systemd/system/mailinabox.service # target was previously a symlink so remove it first
|
cp --remove-destination conf/mailinabox.service /lib/systemd/system/mailinabox.service # target was previously a symlink so remove it first
|
||||||
|
63
setup/mods.available/hooks/remote-nextcloud-mgmt-hooks.py
Normal file
63
setup/mods.available/hooks/remote-nextcloud-mgmt-hooks.py
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
|
||||||
|
#
|
||||||
|
# This is a web_update management hook for the remote-nextcloud setup
|
||||||
|
# mod.
|
||||||
|
#
|
||||||
|
# When management/web_update.py creates a new nginx configuration file
|
||||||
|
# "local.conf", this mod will ensure that .well-known/caldav and
|
||||||
|
# .well-known/carddav urls are redirected to the remote nextcloud.
|
||||||
|
#
|
||||||
|
# The hook is enabled by placing the file in directory
|
||||||
|
# LOCAL_MODS_DIR/managment_hooks_d.
|
||||||
|
#
|
||||||
|
|
||||||
|
import os
|
||||||
|
import logging
|
||||||
|
|
||||||
|
log = logging.getLogger(__name__)
|
||||||
|
|
||||||
|
|
||||||
|
def do_hook(hook_name, hook_data, mods_env):
|
||||||
|
if hook_name != 'web_update':
|
||||||
|
# we only care about hooking web_update
|
||||||
|
log.debug('hook - ignoring %s' % hook_name)
|
||||||
|
return False
|
||||||
|
|
||||||
|
if 'NC_HOST' not in mods_env or mods_env['NC_HOST'].strip() == '':
|
||||||
|
# not configured for a remote nextcloud
|
||||||
|
log.debug('hook - not configured for a remote nextcloud')
|
||||||
|
return False
|
||||||
|
|
||||||
|
# get the remote nextcloud url and ensure no tailing /
|
||||||
|
nc_url = "%s://%s:%s%s" % (
|
||||||
|
mods_env['NC_PROTO'],
|
||||||
|
mods_env['NC_HOST'],
|
||||||
|
mods_env['NC_PORT'],
|
||||||
|
mods_env['NC_PREFIX'][0:-1] if mods_env['NC_PREFIX'].endswith('/') else mods_env['NC_PREFIX']
|
||||||
|
)
|
||||||
|
|
||||||
|
#
|
||||||
|
# modify nginx_conf
|
||||||
|
#
|
||||||
|
def do_replace(find_str, replace_with):
|
||||||
|
if hook_data['nginx_conf'].find(find_str) == -1:
|
||||||
|
log.warning('remote-nextcloud hook: string "%s" not found in proposed nginx_conf' % (find_str))
|
||||||
|
return False
|
||||||
|
hook_data['nginx_conf'] = hook_data['nginx_conf'].replace(
|
||||||
|
find_str,
|
||||||
|
replace_with
|
||||||
|
)
|
||||||
|
return True
|
||||||
|
|
||||||
|
# 1. change the .well-known/(caldav|carddav) redirects
|
||||||
|
do_replace(
|
||||||
|
'/cloud/remote.php/dav/',
|
||||||
|
'%s/remote.php/dav/' % nc_url
|
||||||
|
)
|
||||||
|
|
||||||
|
# 2. redirect /cloud to the remote nextcloud
|
||||||
|
do_replace(
|
||||||
|
'rewrite ^/cloud/$ /cloud/index.php;',
|
||||||
|
'rewrite ^/cloud/(.*)$ %s/$1 redirect;' % nc_url
|
||||||
|
)
|
||||||
|
|
@ -89,6 +89,12 @@ EOF
|
|||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
|
update_mobileconfig() {
|
||||||
|
local url="$1"
|
||||||
|
sed -i "s|<string>/cloud/remote.php|<string>${url%/}/remote.php|g" /var/lib/mailinabox/mobileconfig.xml
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
remote_nextcloud_handler() {
|
remote_nextcloud_handler() {
|
||||||
echo ""
|
echo ""
|
||||||
@ -184,6 +190,10 @@ remote_nextcloud_handler() {
|
|||||||
|
|
||||||
# configure zpush (which links to contacts & calendar)
|
# configure zpush (which links to contacts & calendar)
|
||||||
configure_zpush
|
configure_zpush
|
||||||
|
|
||||||
|
# update ios mobileconfig.xml
|
||||||
|
update_mobileconfig "$new_url"
|
||||||
|
|
||||||
|
|
||||||
# prevent nginx from serving any miab-installed nextcloud
|
# prevent nginx from serving any miab-installed nextcloud
|
||||||
# files and remove owncloud cron job
|
# files and remove owncloud cron job
|
||||||
@ -225,6 +235,16 @@ remote_nextcloud_handler() {
|
|||||||
"NC_PORT=$NC_PORT" \
|
"NC_PORT=$NC_PORT" \
|
||||||
"NC_PREFIX=$NC_PREFIX" \
|
"NC_PREFIX=$NC_PREFIX" \
|
||||||
"NC_HOST_SRC_IP='${NC_HOST_SRC_IP:-}'"
|
"NC_HOST_SRC_IP='${NC_HOST_SRC_IP:-}'"
|
||||||
|
|
||||||
|
# Hook the management daemon, even if no remote nextcloud
|
||||||
|
# (NC_HOST==''). Must be done after writing mailinabox_mods.conf
|
||||||
|
|
||||||
|
# 1. install hooking code
|
||||||
|
install_hook_handler "setup/mods.available/hooks/remote-nextcloud-mgmt-hooks.py"
|
||||||
|
# 2. trigger hooking code for a web_update event, which updates
|
||||||
|
# the systems nginx configuration
|
||||||
|
tools/web_update
|
||||||
}
|
}
|
||||||
|
|
||||||
remote_nextcloud_handler
|
remote_nextcloud_handler
|
||||||
|
|
||||||
|
@ -17,5 +17,6 @@ export FLASK_DEBUG=1
|
|||||||
if ! systemctl is-active --quiet miabldap-capture; then
|
if ! systemctl is-active --quiet miabldap-capture; then
|
||||||
export CAPTURE_STORAGE_ROOT=/mailinabox/management/reporting/capture/tests
|
export CAPTURE_STORAGE_ROOT=/mailinabox/management/reporting/capture/tests
|
||||||
fi
|
fi
|
||||||
|
export PYTHONPATH=${LOCAL_MODS_DIR:-/local}
|
||||||
python3 --version
|
python3 --version
|
||||||
python3 ./daemon.py
|
python3 ./daemon.py
|
||||||
|
@ -57,6 +57,10 @@ rest_urlencoded() {
|
|||||||
|
|
||||||
local data=()
|
local data=()
|
||||||
local item output onlydata="false"
|
local item output onlydata="false"
|
||||||
|
|
||||||
|
if [ ! -z "$auth_user" ]; then
|
||||||
|
data+=("--user" "${auth_user}:${auth_pass}")
|
||||||
|
fi
|
||||||
|
|
||||||
for item; do
|
for item; do
|
||||||
case "$item" in
|
case "$item" in
|
||||||
@ -86,9 +90,9 @@ rest_urlencoded() {
|
|||||||
esac
|
esac
|
||||||
done
|
done
|
||||||
|
|
||||||
echo "spawn: curl -w \"%{http_code}\" -X $verb --user \"${auth_user}:xxx\" ${data[@]} $url" 1>&2
|
echo "spawn: curl -w \"%{http_code}\" -X $verb ${data[@]} $url" 1>&2
|
||||||
# pipe through 'tr' to avoid bash "warning: command substitution: ignored null byte in input" where curl places a \0 between output and http_code
|
# pipe through 'tr' to avoid bash "warning: command substitution: ignored null byte in input" where curl places a \0 between output and http_code
|
||||||
output=$(curl -s -S -w "%{http_code}" -X $verb --user "${auth_user}:${auth_pass}" "${data[@]}" $url | tr -d '\0')
|
output=$(curl -s -S -w "%{http_code}" -X $verb "${data[@]}" $url | tr -d '\0')
|
||||||
local code=$?
|
local code=$?
|
||||||
|
|
||||||
# http status is last 3 characters of output, extract it
|
# http status is last 3 characters of output, extract it
|
||||||
|
@ -140,10 +140,66 @@ test_nextcloud_contacts() {
|
|||||||
test_end
|
test_end
|
||||||
}
|
}
|
||||||
|
|
||||||
|
test_web_config() {
|
||||||
|
test_start "web-config"
|
||||||
|
|
||||||
|
if ! assert_is_configured; then
|
||||||
|
test_end
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
local code
|
||||||
|
|
||||||
|
# nginx should be configured to redirect .well-known/caldav and
|
||||||
|
# .well-known/carddav to the remote nextcloud
|
||||||
|
if grep '\.well-known/carddav[\t ]*/cloud/' /etc/nginx/conf.d/local.conf >/dev/null; then
|
||||||
|
test_failure "/.well-known/carddav redirects to the local nextcloud, but should redirect to $NC_HOST:$NC_PORT"
|
||||||
|
else
|
||||||
|
# ensure the url works
|
||||||
|
record "[test /.well-known/carddav url]"
|
||||||
|
rest_urlencoded GET "/.well-known/carddav" "" "" --location 2>>$TEST_OF
|
||||||
|
code=$?
|
||||||
|
record "code=$code"
|
||||||
|
record "status=$REST_HTTP_CODE"
|
||||||
|
record "output=$REST_OUTPUT"
|
||||||
|
if [ $code -eq 0 ]; then
|
||||||
|
test_failure "carddav url works, but expecting 401/NotAuthenticated from server"
|
||||||
|
elif [ $code -eq 1 -o $REST_HTTP_CODE -ne 401 ] || ! grep "NotAuthenticated" <<<"$REST_OUTPUT" >/dev/null; then
|
||||||
|
test_failure "carddav url doesn't work: $REST_ERROR"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
if grep '\.well-known/caldav[\t ]*/cloud/' /etc/nginx/conf.d/local.conf >/dev/null; then
|
||||||
|
test_failure "/.well-known/caldav redirects to the local nextcloud, but should redirect to $NC_HOST:$NC_PORT"
|
||||||
|
else
|
||||||
|
# ensure the url works
|
||||||
|
record "[test /.well-known/caldav url]"
|
||||||
|
rest_urlencoded GET "/.well-known/caldav" "" "" --location 2>>$TEST_OF
|
||||||
|
code=$?
|
||||||
|
record "code=$code"
|
||||||
|
record "status=$REST_HTTP_CODE"
|
||||||
|
record "output=$REST_OUTPUT"
|
||||||
|
if [ $code -eq 0 ]; then
|
||||||
|
test_failure "caldav url works, but expecting 401/NotAuthenticated from server"
|
||||||
|
elif [ $code -eq 1 -o $REST_HTTP_CODE -ne 401 ] || ! grep "NotAuthenticated" <<<"$REST_OUTPUT" >/dev/null; then
|
||||||
|
test_failure "caldav url doesn't work: $REST_ERROR"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
# ios/osx mobileconfig should be configured to redirect carddav to the
|
||||||
|
# remote nectcloud
|
||||||
|
if grep -A 1 CardDAVPrincipalURL /var/lib/mailinabox/mobileconfig.xml | tail -1 | grep -F "<string>/cloud/remote.php" >/dev/null; then
|
||||||
|
test_failure "ios mobileconfig redirects to the local nextcloud, but should redirect to $NC_HOST:$NC_PORT"
|
||||||
|
fi
|
||||||
|
|
||||||
|
test_end
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
suite_start "remote-nextcloud" mgmt_start
|
suite_start "remote-nextcloud" mgmt_start
|
||||||
|
|
||||||
#test_mail_from_nextcloud
|
#test_mail_from_nextcloud
|
||||||
|
test_web_config
|
||||||
test_nextcloud_contacts
|
test_nextcloud_contacts
|
||||||
|
|
||||||
suite_end mgmt_end
|
suite_end mgmt_end
|
||||||
|
@ -33,6 +33,7 @@ else
|
|||||||
fi
|
fi
|
||||||
export DOWNLOAD_CACHE_DIR="${DOWNLOAD_CACHE_DIR:-$(pwd)/downloads}"
|
export DOWNLOAD_CACHE_DIR="${DOWNLOAD_CACHE_DIR:-$(pwd)/downloads}"
|
||||||
export DOWNLOAD_NEXTCLOUD_FROM_GITHUB="${DOWNLOAD_NEXTCLOUD_FROM_GITHUB:-false}"
|
export DOWNLOAD_NEXTCLOUD_FROM_GITHUB="${DOWNLOAD_NEXTCLOUD_FROM_GITHUB:-false}"
|
||||||
|
export MGMT_LOG_LEVEL=${MGMT_LOG_LEVEL:-debug}
|
||||||
|
|
||||||
|
|
||||||
# Used by ehdd/start-encrypted.sh
|
# Used by ehdd/start-encrypted.sh
|
||||||
|
2
tests/vagrant/Vagrantfile
vendored
2
tests/vagrant/Vagrantfile
vendored
@ -25,7 +25,7 @@ export FEATURE_MUNIN=false
|
|||||||
export EHDD_KEYFILE=$HOME/keyfile
|
export EHDD_KEYFILE=$HOME/keyfile
|
||||||
echo -n "boo" >$EHDD_KEYFILE
|
echo -n "boo" >$EHDD_KEYFILE
|
||||||
tests/system-setup/remote-nextcloud-docker.sh || exit 1
|
tests/system-setup/remote-nextcloud-docker.sh || exit 1
|
||||||
tests/runner.sh ehdd remote-nextcloud default || exit 2
|
tests/runner.sh remote-nextcloud ehdd default || exit 2
|
||||||
SH
|
SH
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
18
tools/hooks_update
Executable file
18
tools/hooks_update
Executable file
@ -0,0 +1,18 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
#####
|
||||||
|
##### This file is part of Mail-in-a-Box-LDAP which is released under the
|
||||||
|
##### terms of the GNU Affero General Public License as published by the
|
||||||
|
##### Free Software Foundation, either version 3 of the License, or (at
|
||||||
|
##### your option) any later version. See file LICENSE or go to
|
||||||
|
##### https://github.com/downtownallday/mailinabox-ldap for full license
|
||||||
|
##### details.
|
||||||
|
#####
|
||||||
|
|
||||||
|
# use this when a hook handler is added or removed from managment to
|
||||||
|
# enable the hook without having to restart the management daemon.
|
||||||
|
#
|
||||||
|
# this only works for an addition or removal, if a hook handler file
|
||||||
|
# was replaced, the daemon must be restarted
|
||||||
|
#
|
||||||
|
|
||||||
|
curl -s -d POSTDATA --user $(</var/lib/mailinabox/api.key): http://127.0.0.1:10222/hooks/update
|
Loading…
Reference in New Issue
Block a user