Mostly working postfix+dovecot2+ldap setup
Some checks failed
/ dev-shell (push) Successful in 46s
/ rust-packages (push) Successful in 52s
/ check (push) Failing after 1m8s
/ terraform-providers (push) Successful in 1m15s
/ systems (push) Successful in 4m4s

Missing:

1. Figure out how to do some useful aliases for the mail
   addresses. Either something like assigning @kas.agerlinskovgaard.dk
   to kaare@agerlinskovgaard.dk or usual + aliases.
2. Oauth2 login is not working yet.
3. Need to be able to create accounts not handled by LDAP, such
   that eg. forgejo can have an account to send mails from (maybe
   also an account to receive mails?).
4. Once support in kanidm lands, need to look into application passwords
   such that one doesn't have to use their regular posix password,
   and maybe, ideally, doesn't need a posix password at all.
This commit is contained in:
Kaare Hoff Skovgaard 2025-07-29 11:27:09 +02:00
parent 6a1aca24a9
commit 343c87b279
Signed by: khs
GPG key ID: C7D890804F01E9F0
7 changed files with 39 additions and 14 deletions

View file

@ -164,15 +164,24 @@ in
services.rspamd.locals."dkim_signing.conf" = lib.mkForce {
text = ''
enabled = true;
allow_username_mismatch = true;
domain {
${lib.strings.concatStringsSep "\n " (lib.lists.map dkimSigningForDomain cfg.domains)}
}
'';
};
services.postfix.config = {
# Need to include this as I disabled the in built support for dkim signing
# without this postfix won't forward the mails to rspamd to be signed.
non_smtpd_milters = [ "unix:/run/rspamd/rspamd-milter.sock" ];
};
systemd.services.rspamd = {
unitConfig = {
ConditionPathExists = domainKeyPaths;
};
serviceConfig = {
ReadOnlyPaths = domainKeyPaths;
};
};
systemd.services.postfix = {
unitConfig = {