-{ lib, pkgs, config, myconfig, ... }:
+{ lib, pkgs, config, ... }:
{
options.myServices.mail.rspamd.sockets = lib.mkOption {
type = lib.types.attrsOf lib.types.path;
in
[ "*/20 * * * * vhost ${cron_script}/scan_reported_mails" ];
+ systemd.services.rspamd.serviceConfig.Slice = "mail.slice";
services.rspamd = {
enable = true;
- debug = true;
+ debug = false;
overrides = {
"actions.conf".text = ''
reject = null;
};
locals = {
"redis.conf".text = ''
- servers = "${myconfig.env.mail.rspamd.redis.socket}";
- db = "${myconfig.env.mail.rspamd.redis.db}";
+ servers = "${config.myEnv.mail.rspamd.redis.socket}";
+ db = "${config.myEnv.mail.rspamd.redis.db}";
'';
"classifier-bayes.conf".text = ''
users_enabled = true;
backend = "redis";
- servers = "${myconfig.env.mail.rspamd.redis.socket}";
- database = "${myconfig.env.mail.rspamd.redis.db}";
+ servers = "${config.myEnv.mail.rspamd.redis.socket}";
+ database = "${config.myEnv.mail.rspamd.redis.db}";
autolearn = true;
cache {
backend = "redis";
workers = {
controller = {
extraConfig = ''
- enable_password = "${myconfig.env.mail.rspamd.write_password_hashed}";
- password = "${myconfig.env.mail.rspamd.read_password_hashed}";
+ enable_password = "${config.myEnv.mail.rspamd.write_password_hashed}";
+ password = "${config.myEnv.mail.rspamd.read_password_hashed}";
'';
bindSockets = [ {
socket = config.myServices.mail.rspamd.sockets.worker-controller;