142 lines
4.6 KiB
Nix
Raw Normal View History

2023-10-14 16:15:26 -07:00
{ primaryMailserver, primaryDomain, authentikServer, servedDomains, ldapBase
2024-05-21 23:16:02 -07:00
, ldapBindDn, ldapBindPwFile, dkimRecord, saslDomain, authentikOutpostToken
, authentikVersion, ... }:
2023-10-14 16:15:26 -07:00
{ config, lib, pkgs, ... }:
with lib;
2023-11-13 10:59:41 -08:00
let
inherit (pkgs.lib) getHostIpv4 getHostIpv6;
hostname = config.instance.hostname;
2023-10-14 16:15:26 -07:00
in {
config = {
2023-12-04 17:10:57 -08:00
systemd.services.arion-mail-server = {
requires = [ "podman.service" ];
after = [ "podman.service" ];
};
# security.acme.certs = {
# "imap.${primaryDomain}".extraDomainNames = [ "mail.${primaryDomain}" ];
# "smtp.${primaryDomain}".extraDomainNames = [ "mail.${primaryDomain}" ];
# };
2023-10-14 16:15:26 -07:00
fudo = {
2024-02-10 16:53:55 -08:00
zones = let
mailserverIp = getHostIpv4 primaryMailserver;
spfRecords = [
''@ IN TXT "v=spf1 mx ip4:${mailserverIp}/32 -all"''
''@ IN SPF "v=spf1 mx ip4:${mailserverIp}/32 -all"''
];
2023-10-14 16:15:26 -07:00
in {
2024-02-10 16:53:55 -08:00
"${primaryDomain}" = let
mailserverDomain = config.fudo.hosts."${primaryMailserver}".domain;
mailserverIps = {
ipv4-address = getHostIpv4 primaryMailserver;
ipv6-address = getHostIpv6 primaryMailserver;
2023-10-14 16:15:26 -07:00
};
2024-02-10 16:53:55 -08:00
srvRecord = host: port: [{ inherit host port; }];
in {
srv-records = {
tcp = {
imap = srvRecord "mail.${primaryDomain}" 143;
imaps = srvRecord "mail.${primaryDomain}" 993;
smtp = srvRecord "mail.${primaryDomain}" 25;
submission = srvRecord "mail.${primaryDomain}" 587;
submissions = srvRecord "mail.${primaryDomain}" 465;
};
udp = {
smtp = srvRecord "mail.${primaryDomain}" 25;
submission = srvRecord "mail.${primaryDomain}" 587;
};
2023-10-14 16:15:26 -07:00
};
2023-11-13 10:59:41 -08:00
2024-02-10 16:53:55 -08:00
metric-records = genAttrs [ "dovecot" "postfix" "rspamd" ]
(_: srvRecord "mail-stats.${primaryDomain}" 443);
2023-11-13 10:59:41 -08:00
2024-02-10 16:53:55 -08:00
hosts = {
imap = mailserverIps;
smtp = mailserverIps;
mail = mailserverIps;
mail-stats = mailserverIps;
};
verbatim-dns-records = [ dkimRecord ] ++ spfRecords;
2023-11-13 10:59:41 -08:00
};
2024-02-10 16:53:55 -08:00
} // (genAttrs (filter (dom: dom != primaryDomain) servedDomains)
(domain: { verbatim-dns-records = [ dkimRecord ] ++ spfRecords; }));
2023-10-14 16:15:26 -07:00
2023-11-13 10:59:41 -08:00
metrics.prometheus.service-discovery-dns =
(genAttrs [ "dovecot" "postfix" "rspamd" ]
(metricType: [ "${metricType}._metrics._tcp.${primaryDomain}" ]));
2023-10-14 16:15:26 -07:00
mail = {
enable = hostname == primaryMailserver;
debug = true;
primary-domain = primaryDomain;
extra-domains = servedDomains;
2023-10-14 16:15:26 -07:00
sasl-domain = saslDomain;
trusted-networks = config.instance.local-networks;
smtp = {
2024-02-10 16:53:55 -08:00
hostname = "mail.${primaryDomain}";
2024-03-23 14:23:43 -07:00
spf.enable = false;
2023-10-14 16:15:26 -07:00
ssl-directory =
2024-02-10 16:53:55 -08:00
config.security.acme.certs."mail.${primaryDomain}".directory;
2023-10-14 16:15:26 -07:00
};
imap = {
2024-02-10 16:53:55 -08:00
hostname = "mail.${primaryDomain}";
2023-10-14 16:15:26 -07:00
ssl-directory =
2024-02-10 16:53:55 -08:00
config.security.acme.certs."mail.${primaryDomain}".directory;
2023-10-14 16:15:26 -07:00
};
ldap = {
authentik-host = "https://${authentikServer}";
outpost-token = readFile authentikOutpostToken;
base = ldapBase;
bind-dn = ldapBindDn;
bind-password-file = ldapBindPwFile;
};
2024-05-21 23:16:02 -07:00
images.ldap-proxy = "ghcr.io/goauthentik/ldap:${authentikVersion}";
2023-10-14 16:15:26 -07:00
aliases = let admins = config.instance.local-admins;
in {
alias-users = {
admin = admins;
dmarc-reports = admins;
ftp = admins;
hostmaster = admins;
irc = admins;
postmaster = admins;
root = admins;
system = admins;
webmaster = admins;
www-data = admins;
};
user-aliases =
let hasAliases = _: userOpts: userOpts.email-aliases != [ ];
in mapAttrs (_: userOpts: userOpts.email-aliases)
(filterAttrs hasAliases config.fudo.users);
};
};
};
services.nginx = mkIf (hostname == primaryMailserver) {
enable = true;
virtualHosts = {
"imap.${primaryDomain}" = {
2023-10-14 16:15:26 -07:00
enableACME = true;
forceSSL = true;
2024-02-10 16:53:55 -08:00
locations."/".return = "403 Forbidden";
2023-10-14 16:15:26 -07:00
};
"mail.${primaryDomain}" = {
enableACME = true;
forceSSL = true;
locations."/".return = "301 https://webmail.${primaryDomain}";
};
"smtp.${primaryDomain}" = {
2023-10-14 16:15:26 -07:00
enableACME = true;
forceSSL = true;
2024-02-10 16:53:55 -08:00
locations."/".return = "403 Forbidden";
2023-10-14 16:15:26 -07:00
};
};
};
};
}