3 path = "../../opendmarc";
6 inputs.files-watcher = {
7 path = "../../files-watcher";
14 inputs.nix-lib.url = "github:NixOS/nixpkgs";
16 description = "Private configuration for opendmarc";
17 outputs = { self, nix-lib, opendmarc, my-lib, files-watcher }:
19 cfg = name': { config, lib, pkgs, name, ... }: {
20 imports = [ (my-lib.lib.withNarKey files-watcher "nixosModule") ];
21 config = lib.mkIf (name == name') {
22 users.users."${config.services.opendmarc.user}".extraGroups = [ "keys" ];
23 systemd.services.opendmarc.serviceConfig.Slice = "mail.slice";
24 services.opendmarc = {
26 socket = "local:${config.myServices.mail.milters.sockets.opendmarc}";
27 configFile = pkgs.writeText "opendmarc.conf" ''
30 FailureReportsBcc postmaster@immae.eu
31 FailureReportsOnNone true
32 FailureReportsSentBy postmaster@immae.eu
33 IgnoreAuthenticatedClients true
34 IgnoreHosts ${config.secrets.fullPaths."opendmarc/ignore.hosts"}
40 group = config.services.postfix.group;
42 services.filesWatcher.opendmarc = {
45 config.secrets.fullPaths."opendmarc/ignore.hosts"
50 dest = "opendmarc/ignore.hosts";
51 user = config.services.opendmarc.user;
52 group = config.services.opendmarc.group;
55 mxes = lib.attrsets.filterAttrs
59 builtins.concatStringsSep "\n" ([
60 config.myEnv.mail.dmarc.ignore_hosts
61 ] ++ lib.mapAttrsToList (n: v: v.fqdn) mxes);
68 { nixosModules = opendmarc.nixosModules or {} // nix-lib.lib.genAttrs ["eldiron" "backup-2"] cfg; };