From 9db7fa010e65883a03aa93cfebe0ffc1f3b15d7a Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Andr=C3=A9=20Peters?= Date: Fri, 6 Mar 2020 09:11:15 +0100 Subject: [PATCH] Update firststeps-rp.md --- docs/firststeps-rp.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/docs/firststeps-rp.md b/docs/firststeps-rp.md index bdc18ff68..8ee1771e3 100644 --- a/docs/firststeps-rp.md +++ b/docs/firststeps-rp.md @@ -134,6 +134,9 @@ server { ### HAProxy (community supported) +!!! warning + This is an unsupported community contribution. Feel free to provide fixes. + **Important/Fixme**: This example only forwards HTTPS traffic and does not use mailcows built-in ACME client. ``` @@ -150,6 +153,9 @@ backend mailcow ### Traefik v2 (community supported) +!!! warning + This is an unsupported community contribution. Feel free to provide fixes. + **Important**: This config only covers the "reverseproxing" of the webpannel (nginx-mailcow) using Traefik v2, if you also want to reverseproxy the mail services such as dovecot, postfix... you'll just need to adapt the following config to each container and create an [EntryPoint](https://docs.traefik.io/routing/entrypoints/) on your `traefik.toml` or `traefik.yml` (depending which config you use) for each port. For this section we'll assume you have your Traefik 2 `[certificatesresolvers]` properly configured on your traefik configuration file, and also using acme, also, the following example uses Lets Encrypt, but feel free to change it to your own cert resolver. You can find a basic Traefik 2 toml config file with all the above implemented which can be used for this example here [traefik.toml](https://github.com/Frenzoid/TraefikBasicConfig/blob/master/traefik.toml) if you need one, or a hint on how to adapt your config.