d8a4007220
Note: https://www.us-cert.gov/ncas/current-activity/2019/06/13/Exim-Releases-Security-Patches That said, I don't believe we've been affected. Not in a bad way at least, because: - we run exim as non-root and capabilities dropped - we run exim in a private Docker network with known trusted relayers (Synapse and mxisd)
23 lines
815 B
YAML
23 lines
815 B
YAML
matrix_mailer_enabled: true
|
|
|
|
matrix_mailer_base_path: "{{ matrix_base_data_path }}/mailer"
|
|
|
|
matrix_mailer_docker_image: "devture/exim-relay:4.92-r0-0"
|
|
matrix_mailer_docker_image_force_pull: "{{ matrix_mailer_docker_image.endswith(':latest') }}"
|
|
|
|
# The user/group that the container runs with.
|
|
# These match the `exim` user/group within the container image.
|
|
matrix_mailer_container_user_uid: 100
|
|
matrix_mailer_container_user_gid: 101
|
|
|
|
# A list of extra arguments to pass to the container
|
|
matrix_mailer_container_extra_arguments: []
|
|
|
|
matrix_mailer_sender_address: "matrix@{{ matrix_domain }}"
|
|
matrix_mailer_relay_use: false
|
|
matrix_mailer_relay_host_name: "mail.example.com"
|
|
matrix_mailer_relay_host_port: 587
|
|
matrix_mailer_relay_auth: false
|
|
matrix_mailer_relay_auth_username: ""
|
|
matrix_mailer_relay_auth_password: ""
|