nixos-mailserver/mail-server/systemd.nix

86 lines
2.9 KiB
Nix
Raw Normal View History

2017-08-12 11:47:52 +02:00
# nixos-mailserver: a simple mail server
# Copyright (C) 2016-2017 Robin Raymond
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
2017-09-02 13:29:49 +02:00
{ pkgs, mailDirectory, vmailGroupName, certificateScheme, certificateDirectory, hostPrefix,
domain, dkimSelector, dkimKeyDirectory}:
2017-08-12 11:47:52 +02:00
let
2017-09-02 13:23:37 +02:00
create_certificate = if certificateScheme == 2 then
''
# Create certificates if they do not exist yet
2017-09-02 13:29:49 +02:00
dir="${certificateDirectory}"
2017-09-02 13:23:37 +02:00
fqdn="${hostPrefix}.${domain}"
case $fqdn in /*) fqdn=$(cat "$fqdn");; esac
key="''${dir}/key-${domain}.pem";
cert="''${dir}/cert-${domain}.pem";
if [ ! -f "''${key}" ] || [ ! -f "''${cert}" ]
then
2017-09-02 13:29:49 +02:00
mkdir -p "${certificateDirectory}"
(umask 077; "${pkgs.openssl}/bin/openssl" genrsa -out "''${key}" 2048) &&
"${pkgs.openssl}/bin/openssl" req -new -key "''${key}" -x509 -subj "/CN=''${fqdn}" \
-days 3650 -out "''${cert}"
fi
''
else "";
2017-08-23 17:22:44 +02:00
2017-09-02 13:29:49 +02:00
dkim_key = "${dkimKeyDirectory}/${dkimSelector}.private";
dkim_txt = "${dkimKeyDirectory}/${dkimSelector}.txt";
2017-08-23 17:22:44 +02:00
create_dkim_cert =
''
# Create dkim dir
2017-09-02 13:29:49 +02:00
mkdir -p "${dkimKeyDirectory}"
chown rmilter:rmilter "${dkimKeyDirectory}"
2017-08-23 17:22:44 +02:00
if [ ! -f "${dkim_key}" ] || [ ! -f "${dkim_txt}" ]
then
2017-09-02 13:29:49 +02:00
${pkgs.opendkim}/bin/opendkim-genkey -s "${dkimSelector}" \
2017-08-23 17:22:44 +02:00
-d ${domain} \
2017-09-02 13:29:49 +02:00
--directory="${dkimKeyDirectory}"
2017-08-30 14:29:06 +02:00
chown rmilter:rmilter "${dkim_key}"
2017-08-23 17:22:44 +02:00
fi
'';
in
2017-08-12 11:47:52 +02:00
{
# Set the correct permissions for dovecot vmail folder. See
# <http://wiki2.dovecot.org/SharedMailboxes/Permissions>. We choose
# to use the systemd service to set the folder permissions whenever
# dovecot gets started.
services.dovecot2.after = [ "postfix.service" ];
# Check for certificate before both postfix and dovecot to make sure it
# exists.
services.postfix = {
preStart =
''
# Create mail directory and set permissions
2017-09-02 13:23:37 +02:00
mkdir -p "${mailDirectory}"
chgrp "${vmailGroupName}" "${mailDirectory}"
chmod 02770 "${mailDirectory}"
${create_certificate}
'';
};
2017-08-30 14:29:06 +02:00
services.rmilter = {
2017-08-23 17:22:44 +02:00
preStart =
''
${create_dkim_cert}
'';
};
2017-08-12 11:47:52 +02:00
}