nixfmt rfc style
This commit is contained in:
parent
037b196e94
commit
133d5a69a5
4 changed files with 91 additions and 46 deletions
|
|
@ -1,19 +1,28 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
|
||||
{
|
||||
imports =
|
||||
[
|
||||
./hardware-configuration.nix
|
||||
./authentik.nix
|
||||
];
|
||||
imports = [
|
||||
./hardware-configuration.nix
|
||||
./authentik.nix
|
||||
];
|
||||
|
||||
security.pam.loginLimits = [{
|
||||
domain = "*";
|
||||
type = "soft";
|
||||
item = "nofile";
|
||||
value = "8192";
|
||||
}];
|
||||
nix.settings.experimental-features = [ "nix-command" "flakes" ];
|
||||
security.pam.loginLimits = [
|
||||
{
|
||||
domain = "*";
|
||||
type = "soft";
|
||||
item = "nofile";
|
||||
value = "8192";
|
||||
}
|
||||
];
|
||||
nix.settings.experimental-features = [
|
||||
"nix-command"
|
||||
"flakes"
|
||||
];
|
||||
nix.settings.trusted-users = [ "administration" ];
|
||||
nix.settings.download-buffer-size = 6710886400;
|
||||
# boot.loader.grub.enable = true;
|
||||
|
|
@ -39,7 +48,10 @@
|
|||
}
|
||||
];
|
||||
networking.defaultGateway.address = "172.31.1.1";
|
||||
networking.nameservers = [ "9.9.9.9" "1.1.1.1" ];
|
||||
networking.nameservers = [
|
||||
"9.9.9.9"
|
||||
"1.1.1.1"
|
||||
];
|
||||
|
||||
time.timeZone = "Europe/Berlin";
|
||||
|
||||
|
|
@ -98,7 +110,7 @@
|
|||
hyperkitty = {
|
||||
enable = true;
|
||||
};
|
||||
serve.enable=true;
|
||||
serve.enable = true;
|
||||
webHosts = [
|
||||
"lists.${config.networking.domain}"
|
||||
];
|
||||
|
|
@ -118,7 +130,11 @@
|
|||
mailserver = {
|
||||
enable = true;
|
||||
fqdn = "mail.${config.networking.domain}";
|
||||
domains = [ "${config.networking.domain}" "lists.${config.networking.domain}" "mail.${config.networking.domain}" ];
|
||||
domains = [
|
||||
"${config.networking.domain}"
|
||||
"lists.${config.networking.domain}"
|
||||
"mail.${config.networking.domain}"
|
||||
];
|
||||
ldap = {
|
||||
enable = true;
|
||||
bind = {
|
||||
|
|
@ -126,11 +142,11 @@
|
|||
passwordFile = "/var/lib/dovecot_ldap_passwd";
|
||||
};
|
||||
dovecot = {
|
||||
#userFilter = "(&(objectClass=posixAccount)(cn=%u))";
|
||||
#passFilter = "(&(objectClass=posixAccount)(cn=%u))";
|
||||
#userFilter = "(&(objectClass=posixAccount)(cn=%u))";
|
||||
#passFilter = "(&(objectClass=posixAccount)(cn=%u))";
|
||||
};
|
||||
postfix = {
|
||||
#filter = "(&(objectClass=posixUser)(cn=%s))";
|
||||
#filter = "(&(objectClass=posixUser)(cn=%s))";
|
||||
};
|
||||
searchBase = "dc=auth,dc=htw,dc=stura-dresden,dc=de";
|
||||
uris = [
|
||||
|
|
@ -139,12 +155,12 @@
|
|||
};
|
||||
|
||||
certificateScheme = "acme-nginx";
|
||||
enableImap = true;
|
||||
enableImap = true;
|
||||
enableImapSsl = true;
|
||||
enableManageSieve = false;
|
||||
enableSubmission = true;
|
||||
enableSubmissionSsl = true;
|
||||
extraVirtualAliases = {};
|
||||
extraVirtualAliases = { };
|
||||
lmtpSaveToDetailMailbox = "no"; # DOS potential
|
||||
mailboxes = {
|
||||
Drafts = {
|
||||
|
|
@ -172,14 +188,17 @@
|
|||
services.dovecot2.mailLocation = lib.mkForce "maildir:/var/vmail/%n";
|
||||
# services.postfix.relayHost = "141.56.51.14";
|
||||
|
||||
|
||||
# virtualisation.docker.enable = true;
|
||||
security.acme.acceptTerms = true;
|
||||
security.acme.defaults.email = "cert@stura.htw-dresden.de";
|
||||
|
||||
networking.firewall.allowedTCPPorts = [ 25 80 443 597 ];
|
||||
networking.firewall.allowedTCPPorts = [
|
||||
25
|
||||
80
|
||||
443
|
||||
597
|
||||
];
|
||||
|
||||
system.stateVersion = "24.11";
|
||||
|
||||
}
|
||||
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue