Mailman fixes #35
1
config/aliases
Normal file
|
@ -0,0 +1 @@
|
||||||
Yep, was the only account existing at this time. I'm still not sure whether we want to handle aliases in here at all or just have a stateful (but more private) /etc/aliases Yep, was the only account existing at this time. I'm still not sure whether we want to handle aliases in here at all or just have a stateful (but more private) /etc/aliases
Everything that involves end user accounts should be done statefully imo. If possible, we could still have aliases to root in nix tho. Everything that involves end user accounts should be done statefully imo. If possible, we could still have aliases to root in nix tho.
why ? for testing why ? for testing
Yep, was the only account existing at this time. I'm still not sure whether we want to handle aliases in here at all or just have a stateful (but more private) /etc/aliases Yep, was the only account existing at this time. I'm still not sure whether we want to handle aliases in here at all or just have a stateful (but more private) /etc/aliases
Everything that involves end user accounts should be done statefully imo. If possible, we could still have aliases to root in nix tho. Everything that involves end user accounts should be done statefully imo. If possible, we could still have aliases to root in nix tho.
|
|||||||
|
root: mathias_stuhlbein
|
||||||
why ? for testing why ? for testing
Yep, was the only account existing at this time. I'm still not sure whether we want to handle aliases in here at all or just have a stateful (but more private) /etc/aliases Yep, was the only account existing at this time. I'm still not sure whether we want to handle aliases in here at all or just have a stateful (but more private) /etc/aliases
Everything that involves end user accounts should be done statefully imo. If possible, we could still have aliases to root in nix tho. Everything that involves end user accounts should be done statefully imo. If possible, we could still have aliases to root in nix tho.
|
|
@ -95,7 +95,7 @@ in
|
||||||
"permit_mynetworks"
|
"permit_mynetworks"
|
||||||
"reject_unauth_destination"
|
"reject_unauth_destination"
|
||||||
];
|
];
|
||||||
#alias_maps = [ "ldap:${ldap-aliases}" ];
|
alias_maps = [ "hash:${../config/aliases}" ];
|
||||||
smtpd_milters = [ "local:/run/opendkim/opendkim.sock" ];
|
smtpd_milters = [ "local:/run/opendkim/opendkim.sock" ];
|
||||||
non_smtpd_milters = [ "local:/var/run/opendkim/opendkim.sock" ];
|
non_smtpd_milters = [ "local:/var/run/opendkim/opendkim.sock" ];
|
||||||
smtpd_sasl_auth_enable = true;
|
smtpd_sasl_auth_enable = true;
|
||||||
|
|
|
@ -10,7 +10,10 @@
|
||||||
webHosts = [ "lists.${config.fsr.domain}" ];
|
webHosts = [ "lists.${config.fsr.domain}" ];
|
||||||
hyperkitty.enable = true;
|
hyperkitty.enable = true;
|
||||||
enablePostfix = true;
|
enablePostfix = true;
|
||||||
siteOwner = "root@${config.fsr.domain}";
|
siteOwner = "mailman@${config.fsr.domain}";
|
||||||
|
settings = {
|
||||||
|
mta.smtp_secure_mode = "SecureMode.SMTPS";
|
||||||
|
};
|
||||||
ldap = {
|
ldap = {
|
||||||
enable = true;
|
enable = true;
|
||||||
serverUri = "ldap://localhost";
|
serverUri = "ldap://localhost";
|
||||||
|
|
why ? for testing