NixOS-Config/modules/system/services/server/mailserver/default.nix

50 lines
1.5 KiB
Nix
Raw Normal View History

{ pkgs, config, ... }:
2024-10-09 03:36:08 -04:00
{
imports = [
./nginx
./roundcube
];
2024-08-24 22:16:51 -04:00
mailserver = rec {
enable = true;
2024-09-18 13:49:57 -04:00
openFirewall = false;
domains = [ "${config.secrets.jimDomain}" ];
fqdn = "mx.${config.secrets.jimDomain}";
2024-08-24 22:16:51 -04:00
certificateScheme = "acme-nginx";
localDnsResolver = false;
redis.port = 1515;
# Dmarc info
dmarcReporting = {
enable = true;
domain = "${config.secrets.jimDomain}";
localpart = "noreply";
organizationName = "Jimbo's Files";
};
2024-08-24 22:16:51 -04:00
# A list of accounts, passwords generated with nix-shell -p mkpasswd --run 'mkpasswd -sm bcrypt'
loginAccounts = {
"noreply@${config.secrets.jimDomain}" = {
hashedPasswordFile = pkgs.writeText "noreply" config.secrets.noreplyMailHash;
2024-08-24 22:16:51 -04:00
sendOnly = true;
};
"jimbo@${config.secrets.jimDomain}" = {
hashedPasswordFile = pkgs.writeText "jimbo" config.secrets.jimboMailHash;
aliases = [ "james@${config.secrets.jimDomain}" "contact@${config.secrets.jimDomain}" ];
2024-08-24 22:16:51 -04:00
};
"lunamoonlight@${config.secrets.jimDomain}" = {
hashedPasswordFile = pkgs.writeText "luna" config.secrets.lunaMailHash;
2024-08-24 22:16:51 -04:00
};
"freecorn1854@${config.secrets.jimDomain}" = {
hashedPasswordFile = pkgs.writeText "freecorn" config.secrets.freecornMailHash;
2024-08-24 22:16:51 -04:00
};
"tinyattack09@${config.secrets.jimDomain}" = {
hashedPasswordFile = pkgs.writeText "tiny" config.secrets.tinyMailHash;
2024-08-24 22:16:51 -04:00
};
};
};
# Assign the correct port
services.redis.servers.rspamd.port = 1515;
2024-08-24 22:16:51 -04:00
}