nixfiles/hosts/hetzner-vm/services/mailserver/config.nix

49 lines
1 KiB
Nix
Raw Normal View History

{ }:
let secrets-db = (import ../../secrets-db.nix { });
2022-11-02 12:24:55 +00:00
in rec {
2022-06-22 15:51:22 +01:00
fqdn = "mail.owo.monster";
2022-11-02 08:40:25 +00:00
domains = [
"owo.monster"
"kitteh.pw"
# "mailchaos.net"
];
2022-06-22 15:51:22 +01:00
2022-08-12 17:06:50 +01:00
debug_mode = false;
2022-06-22 15:51:22 +01:00
ssl_config = {
cert = "/var/lib/acme/${fqdn}/fullchain.pem";
key = "/var/lib/acme/${fqdn}/key.pem";
};
# generate password files with:
# nix run nixpkgs.apacheHttpd -c htpasswd -nbB "" "password" | cut -d: -f2
accounts = {
"chaoticryptidz@owo.monster" = {
2022-06-22 18:05:02 +01:00
name = "chaoticryptidz@owo.monster";
2022-11-02 12:24:55 +00:00
passwordFile = "${secrets-db.chaos_mail_passwd.path}";
2022-06-22 15:51:22 +01:00
aliases = [
"all@owo.monster"
2022-08-28 14:46:06 +01:00
# for sending from
2022-06-22 16:59:41 +01:00
"chaos@owo.monster"
2022-08-28 14:46:06 +01:00
2022-11-02 12:24:55 +00:00
# TODO: legacy - to be deprecated by 2023-01-01
2022-06-22 16:59:41 +01:00
"kitteh@owo.monster"
"kitteh@kitteh.pw"
2022-06-22 15:51:22 +01:00
];
2022-06-22 18:05:02 +01:00
sieveScript = null;
2022-06-22 15:51:22 +01:00
};
};
sieve_directory = "/var/sieve";
2022-06-22 16:59:41 +01:00
dkim_directory = "/var/dkim";
policyd_config = "";
2022-06-22 15:51:22 +01:00
vmail_config = {
user_group_name = "vmail";
user_group_id = 5000;
directory = "/home/vmail";
};
}