Forked repo to test stuff on
8a27b941bf
It seemed weird to me that preStart on postfix was used to generate files not needed directly by postfix and for the self-signed certificate which is also needed by dovecot. nginx.service was also used as a proxy for when ACME certificate generation was done. So I have created mailserver-certificates.target for when certificates are available for other services. For self-signed that means that a new oneshot service called mailserver-selfsigned-certificate has been run. And for ACME this means that the target acme-selfsigned-certificates has been reached (which is when acme has created the self-signed certificates used before the actual certificates provided by LetsEncrypt are created). This setup has the added bonus that if you want to run a service to provide your own certificates you can set that to run before mailserver-certificates.target. DH Parameters are only needed by dovecot so generation of that file has been moved to the dovecot2 preStart. And lastly the only remaining reason to for dovecot to start before postfix was that the auth and lmtp sockets where located in a directory created by postfix. But since they could just as well be located in /run/dovecot2 as long as postfix has access to them I have moved them there. |
||
---|---|---|
logo | ||
mail-server | ||
nixops | ||
tests | ||
.editorconfig | ||
.gitignore | ||
.travis.yml | ||
default.nix | ||
ISSUE_TEMPLATE.md | ||
LICENSE | ||
README.md | ||
update.sh |
Stable Releases
Subscribe to SNM Announcement List This is a very low volume list where new releases of SNM are announced, so you can stay up to date with bug fixes and updates. All announcements are signed by the gpg key with fingerprint
D9FE 4119 F082 6F15 93BD BD36 6162 DBA5 635E A16A
Features
v2.0
- Continous Integration Testing
- Multiple Domains
- Postfix MTA
- smtp on port 25
- submission port 587
- lmtp with dovecot
- Dovecot
- maildir folders
- imap starttls on port 143
- pop3 starttls on port 110
- Certificates
- manual certificates
- on the fly creation
- Let's Encrypt
- Spam Filtering
- via rspamd
- Virus Scanning
- via clamav
- DKIM Signing
- via opendkim
- User Management
- declarative user management
- declarative password management
- Sieves
- A simple standard script that moves spam
- Allow user defined sieve scripts
- ManageSieve support
- User Aliases
- Regular aliases
- Catch all aliases
In the future
- DKIM Signing
- Allow a per domain selector
Changelog
See the mailing list archive
Quick Start
{ config, pkgs, ... }:
{
imports = [
(builtins.fetchTarball "https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/archive/v2.1.4/nixos-mailserver-v2.1.4.tar.gz")
];
mailserver = {
enable = true;
fqdn = "mail.example.com";
domains = [ "example.com" "example2.com" ];
loginAccounts = {
"user1@example.com" = {
hashedPassword = "$6$/z4n8AQl6K$kiOkBTWlZfBd7PvF5GsJ8PmPgdZsFGN1jPGZufxxr60PoR0oUsrvzm2oQiflyz5ir9fFJ.d/zKm/NgLXNUsNX/";
aliases = [
"info@example.com"
"postmaster@example.com"
"postmaster@example2.com"
];
};
};
};
}
For a complete list of options, see default.nix
.
How to Set Up a 10/10 Mail Server Guide
Check out the Complete Setup Guide in the project's wiki.
How to Backup
Checkout the Complete Backup Guide. Backups are easy with SNM
.
Development
See the How to Develop SNM wiki page.
Contributors
See the contributor tab
Alternative Implementations
Credits
- send mail graphic by tnp_dreamingmao from TheNounProject is licensed under CC BY 3.0
- Logo made with Logomakr.com