Commit Graph

23 Commits

Author SHA1 Message Date
Pascal Bleser
3f978d7870 groupware: make everything also work with the built-in LDAP and IDP 2026-01-22 09:42:23 +01:00
Pascal Bleser
6ab30db64c groupware: devtools: Stalwart: add internal LDAP configuration 2026-01-22 09:42:23 +01:00
Viktor Scharf
337dbda364 fixed connection reset issue. adapted make file to generate swagger docs on mac 2026-01-22 09:42:23 +01:00
Pascal Bleser
3b5a56554a groupware: upgrade Stalwart in devtools from 0.13.2 to 0.13.4
* changes from 0.13.4:
   - JMAP: Protocol layer rewrite for zero-copy deserialization and
     architectural improvements.
   - IMAP: Unbounded memory allocation in request parser
     (CVE-2025-61600)
   - IMAP: Wrong permission checked for GETACL.
   - JMAP: References to previous method fail when there are no results
     (stalwartlabs#1507).
   - JMAP: Enforce quota checks on Blob/copy.
   - JMAP: Mailbox/get fails without accountId argument (stalwartlabs#1936).
   - JMAP: Do not return invalidProperties when email update doesn't
     contain changes (stalwartlabs#1139)
   - iTIP: Include date properties in REPLY (stalwartlabs#2102).
   - OIDC: Do not set username field if it is the same as the email field.
   - Telemetry: Fix calculateMetrics housekeeper task (stalwartlabs#2155).
   - Directory: Always use rsplit to extract the domain part from email
     addresses.

  * changes from 0.13.3:
   - CLI: Health checks
   - WebDAV: Assisted discovery v2
   - iTIP: Do not send a REPLY when deleting an event that was not
     accepted.
   - iTIP: Include event details in REPLY messages (stalwart#2102).
   - iTIP: Add organizer to iMIP replies if missing to deal with MS
     Exchange 2010 bug.
   - OIDC: Do not overwrite locally defined aliases (stalwart#2065).
   - HTTP: Scan ban should only be triggered by HTTP parse errors.
   - HTTP: Skip scanner fail2ban checks when the proxy client IP can't
     be parsed (stalwart#2121).
   - JMAP: Do not allow roles to be removed from system mailboxes
     (stalwart#1977).
   - JMAP WS: Fix panic when using invalid server url.
   - SMTP: Do no send EHLO twice when STARTTLS is unavailable
     (stalwart#2050).
   - IMAP: Allow ENABLE UTF8 in IMAPrev1.
   - IMAP: Include administer permission in ACL responses.
   - IMAP: Add owner rights to ACL get responses.
   - IMAP: Do not auto-train Bayes when moving messages from Junk to
     Trash.
   - IMAP/ManageSieve: Increase maximum quoted argument size
     (stalwart#2039).
   - CalDAV: Limit recurrence expansions in calendar reports
     (CVE-2025-59045).
   - WebDAV: Do not fix percent encoding on WebDAV FS (stalwart#2036).
2026-01-22 09:42:23 +01:00
Pascal Bleser
20980a6037 opencloud_full: also keep the 'Trace-Id' HTTP header 2026-01-22 09:42:22 +01:00
Pascal Bleser
917fb38e1c Docker Compose Groupware improvements
* made a few changes in order to further simplify the setup for
   developers of the Groupware backend

 * add STALWART_DOMAIN to deployments/examples/opencloud_full/.env

 * adapt the Stalwart configuration file to not set server.hostname and,
   instead, pick it up from /etc/hostname, which is set by Docker
   Compose as we can use default values for STALWART_DOMAIN there, in an
   analogous fashion to the other containers in that project

 * add config/keycloak/clients/groupware.json to avoid requiring manual
   configuration of Keycloak via the admin web UI

 * Stalwart container:
   - listen for SMTPS on :1465
   - remove the stalwart-logs volume, not needed (logs are going to
     stdout)

 * updated services/groupware/DEVELOPER.md:
   - refer to a variable OCDIR to make instructions more copy-pasteable
   - remove manual Keycloak configuration section as it is now obsolete,
     replaced by provisioning a configuration file instead
2026-01-22 09:42:22 +01:00
Pascal Bleser
2573bf4a99 upgrade Stalwart to 0.13.2 2026-01-22 09:39:15 +01:00
Pascal Bleser
0247c28d58 Refactor groupware service after ADR decision on the Groupware API
* after having decided that the Groupware API should be a standalone
   independent custom REST API that is using JMAP data models as much as
   possible,
 * removed Groupware APIs from the Graph service
 * moved Groupware implementation to the Groupware service, and
   refactored a few things accordingly
2026-01-22 09:39:15 +01:00
Pascal Bleser
0478eb98fd opencloud_full: upgrade Stalwart to 0.12.5, and use the ghcr.io container repository to avoid Hub limits 2026-01-22 09:39:15 +01:00
Pascal Bleser
cd9d05c31a fix Stalwart LDAP configuration 2026-01-22 09:39:15 +01:00
Pascal Bleser
d00fe96128 Use password policy overlay in LDAP and configure Stalwart to use it 2026-01-22 09:39:15 +01:00
Pascal Bleser
8df0f5ed75 upgrade Stalwart to 0.12.4 2026-01-22 09:39:15 +01:00
Pascal Bleser
6f35e9c69a upgrade Stalwart to 0.12 2026-01-22 09:39:15 +01:00
Pascal Bleser
89d07b0ac7 minor corrections to the Stalwart configuration 2026-01-22 09:39:15 +01:00
Pascal Bleser
1e5dd90f3d Introduce a the auth-api service
* primitive implementation to demonstrate how it could work, still to
   be considered WIP at best

 * add new dependency: MicahParks/jwkset and MicahParks/keyfunc to
   retrieve the JWK set from KeyCloak to verify the signature of the
   JWTs sent as part of Bearer authentication in the /auth API

 * (minor) opencloud/.../service.go: clean up a logging statement that
   was introduced earlier to hunt down why the auth-api service was not
   being started
2026-01-22 09:39:15 +01:00
Pascal Bleser
1b45acfa43 add an OIDC Directory to Stalwart, requires exposing Keycloak port 8080 directly to access the userinfo endpoint using HTTP since the certificates in traefik are self-signed and end up being rejected by Stalwart with no option to bypass the certificate check 2026-01-22 09:39:15 +01:00
Pascal Bleser
ef888ea90d rename Stalwart fallback admin username from 'admin' to 'mailadmin' since 'admin' exists as a regular user in LDAP and thus won't have access to the administration 2026-01-22 09:39:15 +01:00
Pascal Bleser
c10f04bd95 Add Stalwart container to the opencloud_full deployment, using the OpenLDAP container as a directory for user authentication 2026-01-22 09:36:14 +01:00
André Duffeck
ef3c0da0cb Assing the opencloudUser to the users so they get a personal space 2026-01-20 15:49:13 +01:00
Ralf Haferkamp
b9523caa70 devtools: add deployment for multi-tenancy 2026-01-20 15:49:12 +01:00
Jörn Friedrich Dreyer
79a0fe0cec devtools: use http2 for backend connection
Signed-off-by: Jörn Friedrich Dreyer <jfd@butonic.de>
2025-12-16 14:34:22 +01:00
Thomas Schweiger
2c18d5b010 fix: apply changes from other fixes in compose repo (#1707)
* fix: apply changes from other fixes in compose repo

* temporarily disabled e2e navigation step

---------

Co-authored-by: Viktor Scharf <v.scharf@opencloud.eu>
2025-10-24 22:10:27 +02:00
Ralf Haferkamp
5023642885 cleanup: Move old compose example to devtools directory
We agreed to move the 'opencloud_full' example to a new directory to
avoid confusion with the supported compose examples in
opencloud-compose.

This commit keeps the bare-metal example in place as that is still
mentioned in the documentation.
2025-09-24 08:33:03 +02:00