{ mailserver, pkgs, config, ... }: { imports = [ ./nginx mailserver.nixosModule ]; mailserver = rec { enable = true; domains = [ "${config.domains.jim1}" "${config.domains.jim2}" "${config.domains.luna}" "${config.domains.corn}" ]; fqdn = "mx.${config.domains.jim1}"; certificateScheme = "acme-nginx"; localDnsResolver = false; redis.port = 1515; dmarcReporting = { enable = true; domain = "${config.domains.jim1}"; localpart = "noreply"; organizationName = "Jimbo's Files"; }; # A list of accounts, passwords generated with nix-shell -p mkpasswd --run 'mkpasswd -sm bcrypt' loginAccounts = { "noreply@${config.domains.jim1}" = { hashedPasswordFile = pkgs.writeText "noreply" config.secrets.noreplyMailHash; sendOnly = true; }; "jimbo@${config.domains.jim12}" = { hashedPasswordFile = pkgs.writeText "jimbo" config.secrets.jimboMailHash; aliases = [ "jimbo@${config.domains.jim1}" "james@${config.domains.jim1}" "james@${config.domains.jim2}" "contact@${config.domains.jim1}" "contact@${config.domains.jim2}" ]; }; "luna@${config.domains.luna}" = { hashedPasswordFile = pkgs.writeText "luna" config.secrets.lunaMailHash; }; "corn@${config.domains.corn}" = { hashedPasswordFile = pkgs.writeText "corn" config.secrets.cornMailHash; }; "tiny@${config.domains.corn}" = { hashedPasswordFile = pkgs.writeText "tiny" config.secrets.tinyMailHash; }; }; }; # Assign the correct port services.redis.servers.rspamd.port = 1515; }