Domain is verified with Mailgun and MX records pointed to Mailgun
Reply by email is configured
Configuration
Obtain and set your Mailgun webhook signing key - while only steps 1 and 2 are required, now would be a great time to set up your temporary/permanent failure webhooks if you have not already done so.
The expression type (unless you only want to receive on specific addresses) should be catch all. Check the box under “Forward” and set the URL to https://your.discourse/mailgun/routes/receive_mime
Click the “Save route” button.
Release 0.2
Added new spam settings mailgun_spam_detection, mailgun_spam_score, dkim_domain_exclusions, and spf_domain_exclusions
To get started with these settings, head to domain settings in the Mailgun dashboard and set spam filtering to option 3.
If you use options 1 or 2, you must set mailgun_spam_detection to none.
Unless you are utilizing a ddos protection service such as cloudflare (or your provider blocks inbound connections on port 25) it doesn’t really have any benefit over the mail-receiver setup.
Also, Mailgun stopped including routes in their pay-as-you-go plan, so if you don’t have a prepaid subscription or an older account you should just use the mail-receiver setup.
If you’re not receiving them via email at all, chances are they’re in the rejected tab (which is where they ended up for me when I used mail-receiver without webhooks).
I assume the same thing would happen using this plugin since it doesn’t do any parsing outside of dkim/spf and spam headers.
Bounce reasons are kept in mailgun logs, while it’s not ideal you can look at those in the meantime.