Don't use LDAP for passdb

This commit is contained in:
niten 2023-09-26 10:37:59 -07:00
parent be57ad1b83
commit bedd4cd676
3 changed files with 7 additions and 30 deletions

View File

@ -245,7 +245,7 @@ in {
mailUser = cfg.mail-user; mailUser = cfg.mail-user;
mailGroup = cfg.mail-group; mailGroup = cfg.mail-group;
mailLocation = "maildir:${cfg.state-directory}/mail//%u/"; mailLocation = "maildir:${cfg.state-directory}/mail/%u/";
createMailUser = false; createMailUser = false;
sslServerCert = cfg.ssl.certificate; sslServerCert = cfg.ssl.certificate;

View File

@ -212,31 +212,6 @@ in {
}; };
}; };
users = {
users = {
mailserver-dovecot = {
uid = 4455;
isSystemUser = true;
group = "mailserver-dovecot";
};
mailserver-antivirus = {
uid = 4456;
isSystemUser = true;
group = "mailserver-antivirus";
};
mailserver-dkim = {
uid = 4457;
isSystemUser = true;
group = "mailserver-dkim";
};
};
groups = {
mailserver-dovecot = { };
mailserver-antivirus = { };
mailserver-dkim = { };
};
};
systemd.tmpfiles.rules = [ systemd.tmpfiles.rules = [
"d ${cfg.state-directory}/dovecot 0700 mailserver-dovecot - - -" "d ${cfg.state-directory}/dovecot 0700 mailserver-dovecot - - -"
"d ${cfg.state-directory}/antivirus 0700 mailserver-antivirus - - -" "d ${cfg.state-directory}/antivirus 0700 mailserver-antivirus - - -"

View File

@ -188,8 +188,10 @@ in {
dovecot2 = { dovecot2 = {
enable = true; enable = true;
enablePAM = false; enablePAM = false;
enableImap = true; extraConfig = let
extraConfig = '' mailUser = config.services.dovecot2.user;
mailUserUid = config.users.users."${mailUser}".uid;
in ''
# Extra Config # Extra Config
${lib.optionalString cfg.debug "auth_debug = yes"} ${lib.optionalString cfg.debug "auth_debug = yes"}
@ -204,8 +206,8 @@ in {
} }
userdb = { userdb = {
driver = ldap driver = static
args = ${cfg.ldap-conf} args = uid=${toString mailUserUid} home=/tmp/%u
} }
service auth { service auth {