3 url = "path:../../opendmarc";
6 url = "path:../../secrets";
8 inputs.files-watcher = {
9 url = "path:../../files-watcher";
12 url = "path:../../lib";
14 inputs.nix-lib.url = "github:NixOS/nixpkgs";
16 description = "Private configuration for opendmarc";
17 outputs = { self, nix-lib, opendmarc, my-lib, files-watcher, secrets }:
19 cfg = name': { config, lib, pkgs, name, ... }: {
21 (my-lib.lib.withNarKey files-watcher "nixosModule")
22 (my-lib.lib.withNarKey opendmarc "nixosModule")
23 (my-lib.lib.withNarKey secrets "nixosModule")
25 config = lib.mkIf (name == name') {
26 users.users."${config.services.opendmarc.user}".extraGroups = [ "keys" ];
27 systemd.services.opendmarc.serviceConfig.Slice = "mail.slice";
28 services.opendmarc = {
30 socket = "/run/opendmarc/opendmarc.sock";
31 configFile = pkgs.writeText "opendmarc.conf" ''
34 FailureReportsBcc postmaster@immae.eu
35 FailureReportsOnNone true
36 FailureReportsSentBy postmaster@immae.eu
37 IgnoreAuthenticatedClients true
38 IgnoreHosts ${config.secrets.fullPaths."opendmarc/ignore.hosts"}
44 group = config.services.postfix.group;
46 services.filesWatcher.opendmarc = {
49 config.secrets.fullPaths."opendmarc/ignore.hosts"
53 "opendmarc/ignore.hosts" = {
54 user = config.services.opendmarc.user;
55 group = config.services.opendmarc.group;
58 mxes = lib.attrsets.filterAttrs
62 builtins.concatStringsSep "\n" ([
63 config.myEnv.mail.dmarc.ignore_hosts
64 ] ++ lib.mapAttrsToList (n: v: v.fqdn) mxes);
71 { nixosModules = opendmarc.nixosModules or {} // nix-lib.lib.genAttrs ["eldiron" "backup-2"] cfg; };