nixos-mailserver/mail-server/systemd.nix

86 lines
3.0 KiB
Nix
Raw Permalink Normal View History

2017-08-12 11:47:52 +02:00
# nixos-mailserver: a simple mail server
2018-01-29 10:34:27 +01:00
# Copyright (C) 2016-2018 Robin Raymond
2017-08-12 11:47:52 +02:00
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
2017-09-02 15:08:50 +02:00
{ config, pkgs, lib, ... }:
2017-08-12 11:47:52 +02:00
let
2017-09-02 15:08:50 +02:00
cfg = config.mailserver;
2020-11-29 14:35:15 +01:00
certificatesDeps =
if cfg.certificateScheme == "manual" then
2020-11-29 14:35:15 +01:00
[]
else if cfg.certificateScheme == "selfsigned" then
2020-11-29 14:35:15 +01:00
[ "mailserver-selfsigned-certificate.service" ]
else
[ "acme-finished-${cfg.fqdn}.target" ];
in
2017-08-12 11:47:52 +02:00
{
2017-09-02 15:08:50 +02:00
config = with cfg; lib.mkIf enable {
# Create self signed certificate
systemd.services.mailserver-selfsigned-certificate = lib.mkIf (cfg.certificateScheme == "selfsigned") {
2020-11-29 14:35:15 +01:00
after = [ "local-fs.target" ];
script = ''
# Create certificates if they do not exist yet
dir="${cfg.certificateDirectory}"
fqdn="${cfg.fqdn}"
2020-11-29 14:35:15 +01:00
[[ $fqdn == /* ]] && fqdn=$(< "$fqdn")
key="$dir/key-${cfg.fqdn}.pem";
cert="$dir/cert-${cfg.fqdn}.pem";
2020-11-29 14:35:15 +01:00
if [[ ! -f $key || ! -f $cert ]]; then
mkdir -p "${cfg.certificateDirectory}"
2020-11-29 14:35:15 +01:00
(umask 077; "${pkgs.openssl}/bin/openssl" genrsa -out "$key" 2048) &&
"${pkgs.openssl}/bin/openssl" req -new -key "$key" -x509 -subj "/CN=$fqdn" \
-days 3650 -out "$cert"
fi
'';
serviceConfig = {
Type = "oneshot";
PrivateTmp = true;
};
};
# Create maildir folder before dovecot startup
systemd.services.dovecot2 = {
2020-11-29 14:35:15 +01:00
wants = certificatesDeps;
after = certificatesDeps;
2020-07-13 14:00:00 +02:00
preStart = let
directories = lib.strings.escapeShellArgs (
[ mailDirectory ]
++ lib.optional (cfg.indexDir != null) cfg.indexDir
2020-07-13 14:00:00 +02:00
);
in ''
# Create mail directory and set permissions. See
# <http://wiki2.dovecot.org/SharedMailboxes/Permissions>.
# Prevent world-readable paths, even temporarily.
umask 007
2020-07-13 14:00:00 +02:00
mkdir -p ${directories}
chgrp "${vmailGroupName}" ${directories}
chmod 02770 ${directories}
2017-09-02 15:08:50 +02:00
'';
};
2018-05-13 03:35:03 +02:00
# Postfix requires dovecot lmtp socket, dovecot auth socket and certificate to work
systemd.services.postfix = {
2020-11-29 14:35:15 +01:00
wants = certificatesDeps;
after = [ "dovecot2.service" ]
++ lib.optional cfg.dkimSigning "opendkim.service"
++ certificatesDeps;
2018-05-13 03:35:03 +02:00
requires = [ "dovecot2.service" ]
2020-11-29 14:35:15 +01:00
++ lib.optional cfg.dkimSigning "opendkim.service";
};
2017-08-23 17:22:44 +02:00
};
2017-08-12 11:47:52 +02:00
}