Skip to content

Conversation

@fastlorenzo
Copy link
Collaborator

@fastlorenzo fastlorenzo commented Dec 27, 2024

This pull request introduces several changes fixing support for Traefik as an ingress controller and allowing the disabling of TLS verification between Traefik and the backend.

Documentation updates:

  • mailu/README.md: Added descriptions for new ingress settings, including ingress.type and ingress.traefik.insecureSkipVerify. [1] [2]

Configuration updates:

  • mailu/values.yaml: Introduced new parameters ingress.type and ingress.traefik.insecureSkipVerify to support Traefik and allow disabling TLS verification.

Template updates:

Fixes #368

@DrPsychick
Copy link
Collaborator

DrPsychick commented Dec 29, 2024

I tried this locally and it only worked when adding the following annotation to the mailu-front service. I removed all traefik annotations from the ingress and only added this one to the service.

    traefik.ingress.kubernetes.io/service.serverstransport: mailu-mailu@kubernetescrd

Also, helm warns about the serversTransport field:

W1229 15:25:16.280479   52728 warnings.go:70] unknown field "spec.ports[12].serversTransport"

{{- if .Values.commonAnnotations }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
{{- end }}
{{- if and (eq .Values.ingress.type "traefik") .Values.ingress.enabled .Values.ingress.traefik.insecureSkipVerify }}
Copy link
Collaborator

@DrPsychick DrPsychick Dec 29, 2024

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is needed instead on the mailu-front service. Although it's also documented for Ingress: https://doc.traefik.io/traefik-hub/api-gateway/reference/routing/kubernetes/http/services/ref-svc-annotations

Also, the https/443 port on the mailu-front deployment should be enabled again, otherwise traefik refuses to link the ingress as the pod does not expose https

@Teravla
Copy link

Teravla commented Sep 21, 2025

Hi everyone

Just wondering if there’s any update on this topic?

I tried applying the suggested solution with my Traefik setup, but it looks like the Ingress isn’t working properly. From what I can tell, the problem comes from the fact that it’s not possible to clearly separate the HTTP port from the mail service ports.

It might be useful to introduce a way to split those concerns:

  • HTTP(S) traffic could be routed through Traefik (via Ingress).
  • Mail-specific ports could still be exposed through a NodePort or another service type.

That way we could leverage Traefik for the web parts (admin/webmail, API, etc.) while keeping the mail protocols accessible.

@github-actions
Copy link
Contributor

This PR is stale because it has been open 45 days with no activity. Remove stale label or comment or this will be closed in 10 days.

@github-actions github-actions bot added the Stale Issues or pull requests that have not been updated for a while label Oct 23, 2025
@DrPsychick DrPsychick removed the Stale Issues or pull requests that have not been updated for a while label Oct 23, 2025
@DrPsychick DrPsychick added the pending answer Issues or pull requests that are awaiting a response label Nov 7, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

pending answer Issues or pull requests that are awaiting a response

Projects

None yet

Development

Successfully merging this pull request may close these issues.

[BUG] Ingress Template No Longer Works with Traefik

4 participants