-{ lib, pkgs, config, myconfig, ... }:
+{ lib, pkgs, config, ... }:
{
options.myServices.mail.milters.sockets = lib.mkOption {
type = lib.types.attrsOf lib.types.path;
user = config.services.opendkim.user;
group = config.services.opendkim.group;
permissions = "0400";
- text = myconfig.env.mail.dkim.eldiron.private;
+ text = config.myEnv.mail.dkim.eldiron.private;
}
{
dest = "opendkim/eldiron.txt";
group = config.services.opendkim.group;
permissions = "0444";
text = ''
- eldiron._domainkey IN TXT ${myconfig.env.mail.dkim.eldiron.public}'';
+ eldiron._domainkey IN TXT ${config.myEnv.mail.dkim.eldiron.public}'';
}
{
dest = "opendmarc/ignore.hosts";
user = config.services.opendmarc.user;
group = config.services.opendmarc.group;
permissions = "0400";
- text = myconfig.env.mail.dmarc.ignore_hosts;
+ text = config.myEnv.mail.dmarc.ignore_hosts;
}
];
users.users."${config.services.opendkim.user}".extraGroups = [ "keys" ];
(e: "${e.domain}${lib.optionalString (e.domain != "") "."}${zone.name}")
(zone.withEmail or [])
)
- myconfig.env.dns.masterZones
+ config.myEnv.dns.masterZones
));
keyPath = "${config.secrets.location}/opendkim";
selector = "eldiron";