]> git.immae.eu Git - perso/Immae/Config/Nix.git/blobdiff - modules/private/mail/default.nix
Fix printer not supporting elliptic curve keys
[perso/Immae/Config/Nix.git] / modules / private / mail / default.nix
index ad2c6846ba9687672c2c72e704d1ef881738aa65..d893ec49d53184bb4cd495fca0bc3e82765be37d 100644 (file)
@@ -1,12 +1,47 @@
-{ lib, pkgs, config, myconfig,  ... }:
+{ lib, pkgs, config, ... }:
 {
-  config.security.acme.certs."mail" = config.services.myCertificates.certConfig // {
-    domain = "eldiron.immae.eu";
-    extraDomains = let
-      zonesWithMx = builtins.filter (zone:
-        lib.attrsets.hasAttr "withEmail" zone && lib.lists.length zone.withEmail > 0
-      ) myconfig.env.dns.masterZones;
-      mxs = map (zone: "mx-1.${zone.name}") zonesWithMx;
-    in builtins.listToAttrs (map (mx: lib.attrsets.nameValuePair mx null) mxs);
+  imports = [
+    ./milters.nix
+    ./postfix.nix
+    ./dovecot.nix
+    ./relay.nix
+    ./rspamd.nix
+    ./opensmtpd.nix
+  ];
+  options.myServices.mail.enable = lib.mkEnableOption "enable Mail services";
+  options.myServices.mailRelay.enable = lib.mkEnableOption "enable Mail relay services";
+  options.myServices.mailBackup.enable = lib.mkEnableOption "enable MX backup services";
+
+  config = lib.mkIf config.myServices.mail.enable {
+    security.acme.certs."mail" = config.myServices.certificates.certConfig // {
+      domain = config.hostEnv.fqdn;
+      extraDomains = let
+        zonesWithMx = builtins.filter (zone:
+          lib.attrsets.hasAttr "withEmail" zone && lib.lists.length zone.withEmail > 0
+        ) config.myEnv.dns.masterZones;
+        mxs = map (zone: "${config.hostEnv.mx.subdomain}.${zone.name}") zonesWithMx;
+      in builtins.listToAttrs (map (mx: lib.attrsets.nameValuePair mx null) mxs);
+    };
+    # This is for clients that don’t support elliptic curves (e.g.
+    # printer)
+    security.acme.certs."mail-rsa" = config.myServices.certificates.certConfig // {
+      domain = config.hostEnv.fqdn;
+      keyType = "rsa4096";
+      extraDomains = let
+        zonesWithMx = builtins.filter (zone:
+          lib.attrsets.hasAttr "withEmail" zone && lib.lists.length zone.withEmail > 0
+        ) config.myEnv.dns.masterZones;
+        mxs = map (zone: "${config.hostEnv.mx.subdomain}.${zone.name}") zonesWithMx;
+      in builtins.listToAttrs (map (mx: lib.attrsets.nameValuePair mx null) mxs);
+    };
+    services.duplyBackup.profiles = {
+      mail = {
+        rootDir = "/var/lib";
+        excludeFile = lib.mkAfter ''
+          + /var/lib/vhost
+          - /var/lib
+          '';
+      };
+    };
   };
 }