Loading nixos/tests/all-tests.nix +1 −1 Original line number Diff line number Diff line Loading @@ -1331,7 +1331,7 @@ in ssh-audit = runTest ./ssh-audit.nix; sssd = handleTestOn [ "x86_64-linux" "aarch64-linux" ] ./sssd.nix { }; sssd-ldap = handleTestOn [ "x86_64-linux" "aarch64-linux" ] ./sssd-ldap.nix { }; stalwart-mail = runTest ./stalwart-mail.nix; stalwart-mail = runTest ./stalwart/stalwart-mail.nix; stargazer = runTest ./web-servers/stargazer.nix; starship = runTest ./starship.nix; stash = handleTestOn [ "x86_64-linux" "aarch64-linux" ] ./stash.nix { }; Loading nixos/tests/stalwart/stalwart-mail-config.nix 0 → 100644 +81 −0 Original line number Diff line number Diff line { pkgs, lib, ... }: let certs = import ../common/acme/server/snakeoil-certs.nix; domain = certs.domain; in { security.pki.certificateFiles = [ certs.ca.cert ]; services.stalwart-mail = { enable = true; settings = { server.hostname = domain; certificate."snakeoil" = { cert = "%{file:${certs.${domain}.cert}}%"; private-key = "%{file:${certs.${domain}.key}}%"; }; server.tls = { certificate = "snakeoil"; enable = true; implicit = false; }; server.listener = { "smtp-submission" = { bind = [ "[::]:587" ]; protocol = "smtp"; }; "imap" = { bind = [ "[::]:143" ]; protocol = "imap"; }; "http" = { bind = [ "[::]:80" ]; protocol = "http"; }; }; session.auth.mechanisms = "[plain]"; session.auth.directory = "'in-memory'"; storage.directory = "in-memory"; storage.data = "rocksdb"; storage.fts = "rocksdb"; storage.blob = "rocksdb"; storage.lookup = "rocksdb"; session.rcpt.directory = "'in-memory'"; queue.outbound.next-hop = "'local'"; store."rocksdb" = { type = "rocksdb"; path = "/var/lib/stalwart-mail/data"; compression = "lz4"; }; directory."in-memory" = { type = "memory"; principals = [ { class = "individual"; name = "alice"; secret = "foobar"; email = [ "alice@${domain}" ]; } { class = "individual"; name = "bob"; secret = "foobar"; email = [ "bob@${domain}" ]; } ]; }; }; }; } nixos/tests/stalwart-mail.nix→nixos/tests/stalwart/stalwart-mail.nix +4 −74 Original line number Diff line number Diff line Loading @@ -3,9 +3,8 @@ # - serve this message through IMAP. let certs = import ./common/acme/server/snakeoil-certs.nix; certs = import ../common/acme/server/snakeoil-certs.nix; domain = certs.domain; in { lib, ... }: { Loading @@ -14,78 +13,9 @@ in nodes.main = { pkgs, ... }: { security.pki.certificateFiles = [ certs.ca.cert ]; services.stalwart-mail = { enable = true; settings = { server.hostname = domain; certificate."snakeoil" = { cert = "%{file:${certs.${domain}.cert}}%"; private-key = "%{file:${certs.${domain}.key}}%"; }; server.tls = { certificate = "snakeoil"; enable = true; implicit = false; }; server.listener = { "smtp-submission" = { bind = [ "[::]:587" ]; protocol = "smtp"; }; "imap" = { bind = [ "[::]:143" ]; protocol = "imap"; }; "http" = { bind = [ "[::]:80" ]; protocol = "http"; }; }; session.auth.mechanisms = "[plain]"; session.auth.directory = "'in-memory'"; storage.directory = "in-memory"; storage.data = "rocksdb"; storage.fts = "rocksdb"; storage.blob = "rocksdb"; storage.lookup = "rocksdb"; session.rcpt.directory = "'in-memory'"; queue.outbound.next-hop = "'local'"; store."rocksdb" = { type = "rocksdb"; path = "/var/lib/stalwart-mail/data"; compression = "lz4"; }; directory."in-memory" = { type = "memory"; principals = [ { class = "individual"; name = "alice"; secret = "foobar"; email = [ "alice@${domain}" ]; } { class = "individual"; name = "bob"; secret = "foobar"; email = [ "bob@${domain}" ]; } imports = [ ./stalwart-mail-config.nix ]; }; }; }; environment.systemPackages = [ (pkgs.writers.writePython3Bin "test-smtp-submission" { } '' Loading Loading
nixos/tests/all-tests.nix +1 −1 Original line number Diff line number Diff line Loading @@ -1331,7 +1331,7 @@ in ssh-audit = runTest ./ssh-audit.nix; sssd = handleTestOn [ "x86_64-linux" "aarch64-linux" ] ./sssd.nix { }; sssd-ldap = handleTestOn [ "x86_64-linux" "aarch64-linux" ] ./sssd-ldap.nix { }; stalwart-mail = runTest ./stalwart-mail.nix; stalwart-mail = runTest ./stalwart/stalwart-mail.nix; stargazer = runTest ./web-servers/stargazer.nix; starship = runTest ./starship.nix; stash = handleTestOn [ "x86_64-linux" "aarch64-linux" ] ./stash.nix { }; Loading
nixos/tests/stalwart/stalwart-mail-config.nix 0 → 100644 +81 −0 Original line number Diff line number Diff line { pkgs, lib, ... }: let certs = import ../common/acme/server/snakeoil-certs.nix; domain = certs.domain; in { security.pki.certificateFiles = [ certs.ca.cert ]; services.stalwart-mail = { enable = true; settings = { server.hostname = domain; certificate."snakeoil" = { cert = "%{file:${certs.${domain}.cert}}%"; private-key = "%{file:${certs.${domain}.key}}%"; }; server.tls = { certificate = "snakeoil"; enable = true; implicit = false; }; server.listener = { "smtp-submission" = { bind = [ "[::]:587" ]; protocol = "smtp"; }; "imap" = { bind = [ "[::]:143" ]; protocol = "imap"; }; "http" = { bind = [ "[::]:80" ]; protocol = "http"; }; }; session.auth.mechanisms = "[plain]"; session.auth.directory = "'in-memory'"; storage.directory = "in-memory"; storage.data = "rocksdb"; storage.fts = "rocksdb"; storage.blob = "rocksdb"; storage.lookup = "rocksdb"; session.rcpt.directory = "'in-memory'"; queue.outbound.next-hop = "'local'"; store."rocksdb" = { type = "rocksdb"; path = "/var/lib/stalwart-mail/data"; compression = "lz4"; }; directory."in-memory" = { type = "memory"; principals = [ { class = "individual"; name = "alice"; secret = "foobar"; email = [ "alice@${domain}" ]; } { class = "individual"; name = "bob"; secret = "foobar"; email = [ "bob@${domain}" ]; } ]; }; }; }; }
nixos/tests/stalwart-mail.nix→nixos/tests/stalwart/stalwart-mail.nix +4 −74 Original line number Diff line number Diff line Loading @@ -3,9 +3,8 @@ # - serve this message through IMAP. let certs = import ./common/acme/server/snakeoil-certs.nix; certs = import ../common/acme/server/snakeoil-certs.nix; domain = certs.domain; in { lib, ... }: { Loading @@ -14,78 +13,9 @@ in nodes.main = { pkgs, ... }: { security.pki.certificateFiles = [ certs.ca.cert ]; services.stalwart-mail = { enable = true; settings = { server.hostname = domain; certificate."snakeoil" = { cert = "%{file:${certs.${domain}.cert}}%"; private-key = "%{file:${certs.${domain}.key}}%"; }; server.tls = { certificate = "snakeoil"; enable = true; implicit = false; }; server.listener = { "smtp-submission" = { bind = [ "[::]:587" ]; protocol = "smtp"; }; "imap" = { bind = [ "[::]:143" ]; protocol = "imap"; }; "http" = { bind = [ "[::]:80" ]; protocol = "http"; }; }; session.auth.mechanisms = "[plain]"; session.auth.directory = "'in-memory'"; storage.directory = "in-memory"; storage.data = "rocksdb"; storage.fts = "rocksdb"; storage.blob = "rocksdb"; storage.lookup = "rocksdb"; session.rcpt.directory = "'in-memory'"; queue.outbound.next-hop = "'local'"; store."rocksdb" = { type = "rocksdb"; path = "/var/lib/stalwart-mail/data"; compression = "lz4"; }; directory."in-memory" = { type = "memory"; principals = [ { class = "individual"; name = "alice"; secret = "foobar"; email = [ "alice@${domain}" ]; } { class = "individual"; name = "bob"; secret = "foobar"; email = [ "bob@${domain}" ]; } imports = [ ./stalwart-mail-config.nix ]; }; }; }; environment.systemPackages = [ (pkgs.writers.writePython3Bin "test-smtp-submission" { } '' Loading