self-hosting/modules/roundcube.nix

51 lines
1.6 KiB
Nix
Raw Normal View History

2021-12-27 16:39:22 +01:00
{ pkgs, lib, config, ... }:
2024-03-26 23:37:53 +01:00
let cfg = config.custom.services.roundcube;
in {
options.custom.services.roundcube = {
enable = lib.mkEnableOption "roundcube";
2021-12-27 16:39:22 +01:00
};
2024-03-26 23:37:53 +01:00
config = lib.mkIf cfg.enable {
sops.secrets = {
pgPassFile = {
owner = "nginx";
key = "roundcube/pg_pass_file";
};
dbPassword = {
owner = "nginx";
key = "roundcube/db_password";
};
2021-12-27 16:39:22 +01:00
};
2024-05-24 18:16:06 +02:00
# Required because roundcube uses psql: https://github.com/NixOS/nixpkgs/blob/46397778ef1f73414b03ed553a3368f0e7e33c2f/nixos/modules/services/mail/roundcube.nix#L247
services.postgresql.package = pkgs.postgresql_15;
2024-03-26 23:37:53 +01:00
services.roundcube = {
enable = true;
plugins = [ "managesieve" ];
dicts = with pkgs.aspellDicts; [ en fr de ];
hostName = "webmail.banditlair.com";
database = {
host = "10.0.1.11";
username = "roundcube";
dbname = "roundcube";
passwordFile = config.sops.secrets.pgPassFile.path;
};
2021-12-27 16:39:22 +01:00
2024-03-26 23:37:53 +01:00
extraConfig = ''
# This override is required as a workaround for the nixpkgs config because we need a plain password instead of a pgpass file
$password = file_get_contents('${config.sops.secrets.dbPassword.path}');
$config['db_dsnw'] = 'pgsql://roundcube:' . $password . '@10.0.1.11/roundcube';
2021-12-27 16:39:22 +01:00
2024-03-26 23:37:53 +01:00
$config['default_host'] = 'ssl://mail.banditlair.com:993';
$config['smtp_server'] = 'ssl://%h';
$config['smtp_user'] = '%u';
$config['smtp_pass'] = '%p';
$config['identities_level'] = 0;
$config['managesieve_host'] = 'tls://%h';
$config['managesieve_auth_type'] = 'PLAIN';
'';
};
2021-12-27 16:39:22 +01:00
};
}