diff options
-rw-r--r-- | nixosConfigurations/manwe/mailserver/default.nix | 33 |
1 files changed, 19 insertions, 14 deletions
diff --git a/nixosConfigurations/manwe/mailserver/default.nix b/nixosConfigurations/manwe/mailserver/default.nix index ce32f5e..56dabce 100644 --- a/nixosConfigurations/manwe/mailserver/default.nix +++ b/nixosConfigurations/manwe/mailserver/default.nix @@ -7,7 +7,6 @@ with lib; { imports = [inputs.mailserver.nixosModule]; - # Redis? ark.directories = with config.mailserver; [ "/var/lib/dovecot" "/var/lib/postfix" @@ -84,21 +83,27 @@ with lib; { loginAccounts = import ./hidden.nix lib; }; - # https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/issues/241 - services.redis.servers.rspamd.enable = mkForce false; + services = { + fail2ban.jails = { + dovecot = { + enabled = true; + settings.mode = "aggressive"; + }; + postfix = { + enabled = true; + settings.mode = "aggressive"; + }; + }; + + # https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/issues/275#note_1746383655 + dovecot2.sieve.extensions = ["fileinto"]; + + # https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/issues/241 + redis.servers.rspamd.enable = mkForce false; + }; + systemd.services.rspamd = { requires = mkForce ["redis-default.service"]; after = mkForce ["redis-default.service"]; }; - - services.fail2ban.jails = { - dovecot = { - enabled = true; - settings.mode = "aggressive"; - }; - postfix = { - enabled = true; - settings.mode = "aggressive"; - }; - }; } |