Compare commits

..

13 commits

Author SHA1 Message Date
6271e04c10 Hack around sieve execution for multiple recipients. 2025-03-05 21:00:55 +01:00
f30bd67374 Only set original sender for MAIL FROM 2025-03-05 21:00:55 +01:00
f18bf4429a Alias file update 2025-03-05 21:00:55 +01:00
20e5bae2ee Group config parameters 2025-03-05 21:00:55 +01:00
547ed4bc58 Enable DKIM signing 2025-03-05 21:00:55 +01:00
c978dd1b5d Filter out catch-all addresses of the form "@domain.tld" from the allowlist that are not intended for HRZ 2025-03-05 21:00:55 +01:00
83adc2e6e3 Set sender and increase redirect limit for our alias file 2025-03-05 21:00:55 +01:00
4893287acd Accept mail from our badly configured VMs 2025-03-05 21:00:55 +01:00
b0e91c0d39 Add mathebau.de to certificate 2025-03-05 21:00:55 +01:00
2d8c0bbf52 Rename config option after update beyond version 0.11.2 2025-03-05 21:00:55 +01:00
cbcc0d2b2d Disable matheball.de forwards and submission to mail allowlist until we actually handle it 2025-03-05 21:00:55 +01:00
1ea6db1232 Allow unpacking stalwart's webadmin interface 2025-03-05 21:00:55 +01:00
e90cc92c14 Delete directive proxy_interface
This directive is supposed to prevent mail delivery loops that would be caused by portforwarding to itself.
Behind this ip address, however, there is our general mail vm and not immediately the mailinglist setup.
2025-03-05 21:00:55 +01:00
12 changed files with 9 additions and 9 deletions

View file

@ -14,7 +14,7 @@
system.stateVersion = "23.11"; system.stateVersion = "23.11";
sops.secrets.backupKey = { sops.secrets.backupKey = {
sopsFile = ./backupKey.secrets.yaml; sopsFile = ./backupKey.yaml;
owner = config.users.users.fsaccount.name; owner = config.users.users.fsaccount.name;
inherit (config.users.users.fsaccount) group; inherit (config.users.users.fsaccount) group;
mode = "0400"; mode = "0400";

View file

@ -21,13 +21,13 @@
sops.secrets = { sops.secrets = {
allowlistPass = { allowlistPass = {
sopsFile = ./allowlistPass.secrets.yaml; sopsFile = ./allowlistPass.yaml;
owner = "mailman"; owner = "mailman";
group = "mailman"; group = "mailman";
mode = "0400"; mode = "0400";
}; };
backupKey = { backupKey = {
sopsFile = ./backupKey.secrets.yaml; sopsFile = ./backupKey.yaml;
owner = "root"; owner = "root";
group = "root"; group = "root";
mode = "0400"; mode = "0400";

View file

@ -45,7 +45,7 @@
sops.secrets = let sops.secrets = let
allowlistSops = { allowlistSops = {
sopsFile = ./allowlistPass.secrets.yaml; sopsFile = ./allowlistPass.yaml;
owner = "stalwart-mail"; owner = "stalwart-mail";
group = "stalwart-mail"; group = "stalwart-mail";
mode = "0400"; mode = "0400";
@ -58,19 +58,19 @@
"allowlistPass/koma" = allowlistSops; "allowlistPass/koma" = allowlistSops;
# Virtual alias file # Virtual alias file
"mathebau.aliases" = { "mathebau.aliases" = {
sopsFile = ./mathebau.aliases.secrets.yaml; sopsFile = ./mathebau.aliases.yaml;
owner = "stalwart-mail"; owner = "stalwart-mail";
group = "stalwart-mail"; group = "stalwart-mail";
mode = "0440"; mode = "0440";
}; };
"mathechor.aliases" = { "mathechor.aliases" = {
sopsFile = ./mathechor.aliases.secrets.yaml; sopsFile = ./mathechor.aliases.yaml;
owner = "stalwart-mail"; owner = "stalwart-mail";
group = "stalwart-mail"; group = "stalwart-mail";
mode = "0440"; mode = "0440";
}; };
"koma.aliases" = { "koma.aliases" = {
sopsFile = ./koma.aliases.secrets.yaml; sopsFile = ./koma.aliases.yaml;
owner = "stalwart-mail"; owner = "stalwart-mail";
group = "stalwart-mail"; group = "stalwart-mail";
mode = "0440"; mode = "0440";
@ -89,13 +89,13 @@
}; };
# password for https://stalw.art/docs/auth/authorization/administrator/#fallback-administrator encoded to be supplied in the basic auth header # password for https://stalw.art/docs/auth/authorization/administrator/#fallback-administrator encoded to be supplied in the basic auth header
stalwartAdmin = { stalwartAdmin = {
sopsFile = ./stalwartAdmin.secrets.yaml; sopsFile = ./stalwartAdmin.yaml;
owner = "stalwart-mail"; owner = "stalwart-mail";
group = "stalwart-mail"; group = "stalwart-mail";
mode = "0400"; mode = "0400";
}; };
backupKey = { backupKey = {
sopsFile = ./backupKey.secrets.yaml; sopsFile = ./backupKey.yaml;
owner = "root"; owner = "root";
group = "root"; group = "root";
mode = "0400"; mode = "0400";