blob: 80c8af5604182358b49cc08f3af5076d003ddf6d (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
|
{ config, pkgs, ... }: {
imports = [
(builtins.fetchTarball {
url = "https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/archive/nixos-24.11/nixos-mailserver-nixos-24.11.tar.gz";
sha256 = "05k4nj2cqz1c5zgqa0c6b8sp3807ps385qca74fgs6cdc415y3qw";
})
];
mailserver = {
enable = true;
fqdn = "mail.krinitsin.com";
domains = [ "krinitsin.com" ];
certificateScheme = "acme-nginx";
# To create the password hashes, use nix-shell -p mkpasswd --run 'mkpasswd -sm bcrypt'
loginAccounts = {
"mail@krinitsin.com" = {
hashedPasswordFile = "/secret/mail@krinitsin.com";
aliases = [ "postmaster@krinitsin.com" "christian@krinitsin.com" ];
};
"wladislaw@krinitsin.com" = {
hashedPasswordFile = "/secret/wladislaw@krinitsin.com";
};
"vaultwarden@krinitsin.com" = {
hashedPasswordFile = "/secret/vaultwarden@krinitsin.com";
sendOnly = true;
};
};
};
services.roundcube = {
enable = true;
hostName = "webmail.krinitsin.com";
extraConfig = ''
$config['smtp_host'] = "tls://${config.mailserver.fqdn}";
$config['smtp_user'] = "%u";
$config['smtp_pass'] = "%p";
'';
};
services.monit.config = ''
check process postfix with pidfile /var/lib/postfix/queue/pid/master.pid
start program = "${pkgs.systemd}/bin/systemctl start postfix"
stop program = "${pkgs.systemd}/bin/systemctl stop postfix"
if failed port 25 protocol smtp for 5 cycles then restart
check process dovecot with pidfile /var/run/dovecot2/master.pid
start program = "${pkgs.systemd}/bin/systemctl start dovecot2"
stop program = "${pkgs.systemd}/bin/systemctl stop dovecot2"
if failed host mail.krinitsin.com port 993 type tcpssl sslauto protocol imap for 5 cycles then restart
check process rspamd with matching "rspamd: main process"
start program = "${pkgs.systemd}/bin/systemctl start rspamd"
stop program = "${pkgs.systemd}/bin/systemctl stop rspamd"
'';
security.acme.certs."krinitsin.com".extraDomainNames = [ "webmail.krinitsin.com" ];
}
|