{ config, lib, pkgs, ... }: { imports = [ ./hardware-configuration.nix ./authentik.nix ]; security.pam.loginLimits = [ { domain = "*"; type = "soft"; item = "nofile"; value = "8192"; } ]; nix.settings.experimental-features = [ "nix-command" "flakes" ]; nix.settings.trusted-users = [ "administration" ]; nix.settings.download-buffer-size = 6710886400; # boot.loader.grub.enable = true; boot.kernelPackages = pkgs.linuxPackages_latest; boot.loader.grub.device = "/dev/sda"; # or "nodev" for efi only boot.loader.grub.enable = true; boot.loader.grub.efiSupport = true; boot.loader.grub.efiInstallAsRemovable = true; networking.hostName = "mail"; networking.domain = "test.htw.stura-dresden.de"; networking.interfaces.ens18.ipv4.addresses = [ { address = "167.235.225.23"; prefixLength = 32; } ]; networking.interfaces.ens18.ipv6.addresses = [ { address = "2a01:4f8:c012:6bd7::1"; prefixLength = 32; } ]; networking.defaultGateway.address = "172.31.1.1"; networking.nameservers = [ "9.9.9.9" "1.1.1.1" ]; time.timeZone = "Europe/Berlin"; i18n.defaultLocale = "en_US.UTF-8"; console = { font = "Lat2-Terminus16"; keyMap = lib.mkForce "de"; useXkbConfig = true; # use xkb.options in tty. }; users.users.administration = { isNormalUser = true; initialPassword = "test"; extraGroups = [ "wheel" ]; # Enable ‘sudo’ for the user. openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINABEf0jBjtDdezDDtvl1v27l0DbHP2XUgMARTZXC+MR goeranh@node5" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDmYHNdtPmQqvNINEWJgqEojrye+wQKr0S0VwlGv7xUa goeranh@node7" ]; packages = with pkgs; [ ]; }; users.users.root.openssh.authorizedKeys.keys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINABEf0jBjtDdezDDtvl1v27l0DbHP2XUgMARTZXC+MR goeranh@node5" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDmYHNdtPmQqvNINEWJgqEojrye+wQKr0S0VwlGv7xUa goeranh@node7" ]; environment.systemPackages = with pkgs; [ tmux git htop neovim ]; services.openssh.enable = true; services.dovecot2 = { extraConfig = '' auth_verbose = yes auth_debug = yes auth_debug_passwords = yes ''; }; services.nginx.virtualHosts."auth.test.htw.stura-dresden.de".locations."/".extraConfig = '' proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; ''; services.nginx.virtualHosts."lists.${config.networking.domain}" = { enableACME = true; forceSSL = true; # locations."/" = { # proxyPass = "http://127.0.0.1:18507"; # }; }; services.mailman = { enable = true; hyperkitty = { enable = true; }; serve.enable = true; webHosts = [ "lists.${config.networking.domain}" ]; }; services.postfix.config.relay_domains = [ "hash:/var/lib/mailman/data/postfix_domains" ]; services.postfix.config.transport_maps = [ "hash:/var/lib/mailman/data/postfix_lmtp" ]; services.postfix.config.local_recipient_maps = [ "hash:/var/lib/mailman/data/postfix_lmtp" ]; services.mailman.siteOwner = "mailman@${config.networking.domain}"; mailserver = { enable = true; fqdn = "mail.${config.networking.domain}"; domains = [ "${config.networking.domain}" "lists.${config.networking.domain}" "mail.${config.networking.domain}" ]; ldap = { enable = true; bind = { dn = "cn=ldapservice,ou=users,dc=auth,dc=htw,dc=stura-dresden,dc=de"; passwordFile = "/var/lib/dovecot_ldap_passwd"; }; dovecot = { #userFilter = "(&(objectClass=posixAccount)(cn=%u))"; #passFilter = "(&(objectClass=posixAccount)(cn=%u))"; }; postfix = { #filter = "(&(objectClass=posixUser)(cn=%s))"; }; searchBase = "dc=auth,dc=htw,dc=stura-dresden,dc=de"; uris = [ "ldap://localhost:389" ]; }; certificateScheme = "acme-nginx"; enableImap = true; enableImapSsl = true; enableManageSieve = false; enableSubmission = true; enableSubmissionSsl = true; extraVirtualAliases = { }; lmtpSaveToDetailMailbox = "no"; # DOS potential mailboxes = { Drafts = { auto = "subscribe"; specialUse = "Drafts"; }; Sent = { auto = "subscribe"; specialUse = "Sent"; }; Spam = { auto = "subscribe"; specialUse = "Junk"; }; Trash = { auto = "subscribe"; specialUse = "Trash"; }; }; maxConnectionsPerUser = 10; messageSizeLimit = 10 * 1000 * 1024; # 10 MiB }; services.dovecot2.mailLocation = lib.mkForce "maildir:/var/vmail/%n"; # services.postfix.relayHost = "141.56.51.14"; # virtualisation.docker.enable = true; security.acme.acceptTerms = true; security.acme.defaults.email = "cert@stura.htw-dresden.de"; networking.firewall.allowedTCPPorts = [ 25 80 443 597 ]; system.stateVersion = "24.11"; }