about summary refs log tree commit diff
path: root/nixos/tests/postfix.nix
AgeCommit message (Collapse)AuthorFilesLines
2022-03-28treewide: machine -> nodes.machineRobert Hensing1-1/+1
2020-11-12postfix: add passthru testsMartin Weinelt1-3/+3
2020-11-12nixos/tests/postfix: migrate test to use tlsTrustedAuthoritiesMartin Weinelt1-1/+1
Fixes: 632104e ("postfix: deprecated `sslCACert` in favour of `tlsTrustedAuthorities`")
2020-09-02nixos/acme: Restructure moduleLucas Savva1-6/+7
- Use an acme user and group, allow group override only - Use hashes to determine when certs actually need to regenerate - Avoid running lego more than necessary - Harden permissions - Support "systemctl clean" for cert regeneration - Support reuse of keys between some configuration changes - Permissions fix services solves for previously root owned certs - Add a note about multiple account creation and emails - Migrate extraDomains to a list - Deprecate user option - Use minica for self-signed certs - Rewrite all tests I thought of a few more cases where things may go wrong, and added tests to cover them. In particular, the web server reload services were depending on the target - which stays alive, meaning that the renewal timer wouldn't be triggering a reload and old certs would stay on the web servers. I encountered some problems ensuring that the reload took place without accidently triggering it as part of the test. The sync commands I added ended up being essential and I'm not sure why, it seems like either node.succeed ends too early or there's an oddity of the vm's filesystem I'm not aware of. - Fix duplicate systemd rules on reload services Since useACMEHost is not unique to every vhost, if one cert was reused many times it would create duplicate entries in ${server}-config-reload.service for wants, before and ConditionPathExists
2020-08-04nixos/tests/*: editorconfig fixeszowoq1-1/+1
2020-07-06postfix: Add submissions option for postfix and test (#91691)Eric Wolf1-0/+76
RFC 8314 suggests, for end user submission of mails, SMTP over TLS on port 465 should be used. Closes #91690