Compare commits

..

14 commits

Author SHA1 Message Date
19351ef316 Hack around sieve execution for multiple recipients. 2025-03-06 08:50:36 +01:00
ceaaa3bcaf Only set original sender for MAIL FROM 2025-03-06 08:50:36 +01:00
85550be504 Alias file update 2025-03-06 08:50:36 +01:00
be998b48f5 Group config parameters 2025-03-06 08:50:36 +01:00
10ca56c064 Enable DKIM signing 2025-03-06 08:50:36 +01:00
c05d7591a8 Filter out catch-all addresses of the form "@domain.tld" from the allowlist that are not intended for HRZ 2025-03-06 08:50:36 +01:00
ea956c99e7 Set sender and increase redirect limit for our alias file 2025-03-06 08:50:36 +01:00
b3dde5ef7a Accept mail from our badly configured VMs 2025-03-06 08:50:36 +01:00
0517a5e77c Add mathebau.de to certificate 2025-03-06 08:50:36 +01:00
3ece72db70 Rename config option after update beyond version 0.11.2 2025-03-06 08:50:36 +01:00
68a02c75e1 Disable matheball.de forwards and submission to mail allowlist until we actually handle it 2025-03-06 08:50:36 +01:00
beaab16ffa Allow unpacking stalwart's webadmin interface 2025-03-06 08:50:36 +01:00
01951eadad Delete directive proxy_interface
This directive is supposed to prevent mail delivery loops that would be caused by portforwarding to itself.
Behind this ip address, however, there is our general mail vm and not immediately the mailinglist setup.
2025-03-06 08:50:36 +01:00
064aca1705
renamed secret files so they are easier to shell glob 2025-03-05 21:11:38 +01:00
12 changed files with 9 additions and 9 deletions

View file

@ -14,7 +14,7 @@
system.stateVersion = "23.11";
sops.secrets.backupKey = {
sopsFile = ./backupKey.yaml;
sopsFile = ./backupKey.secrets.yaml;
owner = config.users.users.fsaccount.name;
inherit (config.users.users.fsaccount) group;
mode = "0400";

View file

@ -21,13 +21,13 @@
sops.secrets = {
allowlistPass = {
sopsFile = ./allowlistPass.yaml;
sopsFile = ./allowlistPass.secrets.yaml;
owner = "mailman";
group = "mailman";
mode = "0400";
};
backupKey = {
sopsFile = ./backupKey.yaml;
sopsFile = ./backupKey.secrets.yaml;
owner = "root";
group = "root";
mode = "0400";

View file

@ -45,7 +45,7 @@
sops.secrets = let
allowlistSops = {
sopsFile = ./allowlistPass.yaml;
sopsFile = ./allowlistPass.secrets.yaml;
owner = "stalwart-mail";
group = "stalwart-mail";
mode = "0400";
@ -58,19 +58,19 @@
"allowlistPass/koma" = allowlistSops;
# Virtual alias file
"mathebau.aliases" = {
sopsFile = ./mathebau.aliases.yaml;
sopsFile = ./mathebau.aliases.secrets.yaml;
owner = "stalwart-mail";
group = "stalwart-mail";
mode = "0440";
};
"mathechor.aliases" = {
sopsFile = ./mathechor.aliases.yaml;
sopsFile = ./mathechor.aliases.secrets.yaml;
owner = "stalwart-mail";
group = "stalwart-mail";
mode = "0440";
};
"koma.aliases" = {
sopsFile = ./koma.aliases.yaml;
sopsFile = ./koma.aliases.secrets.yaml;
owner = "stalwart-mail";
group = "stalwart-mail";
mode = "0440";
@ -89,13 +89,13 @@
};
# password for https://stalw.art/docs/auth/authorization/administrator/#fallback-administrator encoded to be supplied in the basic auth header
stalwartAdmin = {
sopsFile = ./stalwartAdmin.yaml;
sopsFile = ./stalwartAdmin.secrets.yaml;
owner = "stalwart-mail";
group = "stalwart-mail";
mode = "0400";
};
backupKey = {
sopsFile = ./backupKey.yaml;
sopsFile = ./backupKey.secrets.yaml;
owner = "root";
group = "root";
mode = "0400";