Compare commits
3 commits
7c2630f80a
...
27e1a7cc3f
Author | SHA1 | Date | |
---|---|---|---|
Patrick | 27e1a7cc3f | ||
Patrick | 57454a768b | ||
Patrick | 00f45973b8 |
|
@ -73,6 +73,8 @@ in
|
|||
systemd.services.idmail.serviceConfig.RestartSec = "60"; # Retry every minute
|
||||
|
||||
services.nginx = {
|
||||
enable = true;
|
||||
recommendedSetup = true;
|
||||
upstreams.idmail = {
|
||||
servers."127.0.0.1:3000" = { };
|
||||
extraConfig = ''
|
||||
|
@ -82,7 +84,7 @@ in
|
|||
};
|
||||
virtualHosts.${idmailDomain} = {
|
||||
forceSSL = true;
|
||||
useACMEWildcardHost = true;
|
||||
useACMEHost = domain;
|
||||
locations."/" = {
|
||||
proxyPass = "http://idmail";
|
||||
proxyWebsockets = true;
|
||||
|
|
|
@ -125,6 +125,8 @@ in
|
|||
}
|
||||
];
|
||||
services.nginx = {
|
||||
enable = true;
|
||||
recommendedSetup = true;
|
||||
upstreams.stalwart = {
|
||||
servers."127.0.0.1:8080" = { };
|
||||
extraConfig = ''
|
||||
|
@ -136,7 +138,7 @@ in
|
|||
{
|
||||
${domain} = {
|
||||
forceSSL = true;
|
||||
useACMEWildcardHost = true;
|
||||
useACMEHost = domain;
|
||||
extraConfig = ''
|
||||
client_max_body_size 512M;
|
||||
'';
|
||||
|
@ -154,7 +156,7 @@ in
|
|||
]
|
||||
(_: {
|
||||
forceSSL = true;
|
||||
useACMEWildcardHost = true;
|
||||
useACMEHost = domain;
|
||||
locations."/".proxyPass = "http://stalwart";
|
||||
});
|
||||
};
|
||||
|
@ -203,17 +205,12 @@ in
|
|||
enable = true;
|
||||
settings =
|
||||
let
|
||||
case = field: check: value: data: {
|
||||
"if" = field;
|
||||
${check} = value;
|
||||
"then" = data;
|
||||
};
|
||||
ifthen = field: data: {
|
||||
"if" = field;
|
||||
"then" = data;
|
||||
};
|
||||
otherwise = value: { "else" = value; };
|
||||
is-smtp = case "listener" "eq" "smtp";
|
||||
is-smtp = ifthen "listener = 'smtp'";
|
||||
is-authenticated = data: {
|
||||
"if" = "!is_empty(authenticated_as)";
|
||||
"then" = data;
|
||||
|
|
|
@ -12,7 +12,8 @@
|
|||
};
|
||||
|
||||
services = {
|
||||
fwupd.enable = !minimal;
|
||||
# Enable if you're feeling very fwupd that day
|
||||
#fwupd.enable = !minimal;
|
||||
smartd.enable = !minimal;
|
||||
thermald.enable = builtins.elem config.nixpkgs.hostPlatform.system [ "x86_64-linux" ];
|
||||
};
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
imports = [
|
||||
../../config/basic
|
||||
../../config/support/initrd-ssh.nix
|
||||
../../config/services/maddy.nix
|
||||
# ../../config/services/maddy.nix
|
||||
../../config/support/zfs.nix
|
||||
|
||||
./net.nix
|
||||
|
|
|
@ -52,6 +52,7 @@
|
|||
};
|
||||
};
|
||||
networking.nftables.firewall.zones.untrusted.interfaces = [ "lan01" ];
|
||||
users.groups.acme.members = [ "nginx" ];
|
||||
security.acme.certs = {
|
||||
"${config.secrets.secrets.global.domains.mail_public}" = {
|
||||
domain = config.secrets.secrets.global.domains.mail_public;
|
||||
|
|
Binary file not shown.
BIN
hosts/mailnix/secrets/generated/dhparams.pem.age
Normal file
BIN
hosts/mailnix/secrets/generated/dhparams.pem.age
Normal file
Binary file not shown.
Binary file not shown.
Loading…
Reference in a new issue