2017-08-12 14:47:52 +05:00
|
|
|
# nixos-mailserver: a simple mail server
|
2018-01-29 14:34:27 +05:00
|
|
|
# Copyright (C) 2016-2018 Robin Raymond
|
2017-08-12 14:47:52 +05:00
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program. If not, see <http://www.gnu.org/licenses/>
|
|
|
|
|
2017-09-02 18:08:50 +05:00
|
|
|
{ config, pkgs, lib, ... }:
|
2017-08-12 14:47:52 +05:00
|
|
|
|
2017-08-13 14:51:07 +05:00
|
|
|
let
|
2017-09-02 18:08:50 +05:00
|
|
|
cfg = config.mailserver;
|
2020-11-29 18:35:15 +05:00
|
|
|
certificatesDeps =
|
2023-02-15 17:15:09 +05:00
|
|
|
if cfg.certificateScheme == "manual" then
|
2020-11-29 18:35:15 +05:00
|
|
|
[]
|
2023-02-15 17:15:09 +05:00
|
|
|
else if cfg.certificateScheme == "selfsigned" then
|
2020-11-29 18:35:15 +05:00
|
|
|
[ "mailserver-selfsigned-certificate.service" ]
|
|
|
|
else
|
|
|
|
[ "acme-finished-${cfg.fqdn}.target" ];
|
2017-08-13 14:51:07 +05:00
|
|
|
in
|
2017-08-12 14:47:52 +05:00
|
|
|
{
|
2017-09-02 18:08:50 +05:00
|
|
|
config = with cfg; lib.mkIf enable {
|
2018-05-04 19:52:58 +05:00
|
|
|
# Create self signed certificate
|
2023-02-15 17:15:09 +05:00
|
|
|
systemd.services.mailserver-selfsigned-certificate = lib.mkIf (cfg.certificateScheme == "selfsigned") {
|
2020-11-29 18:35:15 +05:00
|
|
|
after = [ "local-fs.target" ];
|
2018-05-04 19:52:58 +05:00
|
|
|
script = ''
|
|
|
|
# Create certificates if they do not exist yet
|
|
|
|
dir="${cfg.certificateDirectory}"
|
|
|
|
fqdn="${cfg.fqdn}"
|
2020-11-29 18:35:15 +05:00
|
|
|
[[ $fqdn == /* ]] && fqdn=$(< "$fqdn")
|
|
|
|
key="$dir/key-${cfg.fqdn}.pem";
|
|
|
|
cert="$dir/cert-${cfg.fqdn}.pem";
|
2018-05-04 19:52:58 +05:00
|
|
|
|
2020-11-29 18:35:15 +05:00
|
|
|
if [[ ! -f $key || ! -f $cert ]]; then
|
2018-05-04 19:52:58 +05:00
|
|
|
mkdir -p "${cfg.certificateDirectory}"
|
2020-11-29 18:35:15 +05:00
|
|
|
(umask 077; "${pkgs.openssl}/bin/openssl" genrsa -out "$key" 2048) &&
|
|
|
|
"${pkgs.openssl}/bin/openssl" req -new -key "$key" -x509 -subj "/CN=$fqdn" \
|
|
|
|
-days 3650 -out "$cert"
|
2018-05-04 19:52:58 +05:00
|
|
|
fi
|
|
|
|
'';
|
|
|
|
serviceConfig = {
|
|
|
|
Type = "oneshot";
|
|
|
|
PrivateTmp = true;
|
|
|
|
};
|
|
|
|
};
|
2017-08-23 20:34:34 +05:00
|
|
|
|
2018-10-30 21:56:25 +05:00
|
|
|
# Create maildir folder before dovecot startup
|
2018-05-04 19:52:58 +05:00
|
|
|
systemd.services.dovecot2 = {
|
2020-11-29 18:35:15 +05:00
|
|
|
wants = certificatesDeps;
|
|
|
|
after = certificatesDeps;
|
2020-07-13 17:00:00 +05:00
|
|
|
preStart = let
|
|
|
|
directories = lib.strings.escapeShellArgs (
|
|
|
|
[ mailDirectory ]
|
2021-03-12 00:53:38 +05:00
|
|
|
++ lib.optional (cfg.indexDir != null) cfg.indexDir
|
2020-07-13 17:00:00 +05:00
|
|
|
);
|
|
|
|
in ''
|
2018-05-04 19:52:58 +05:00
|
|
|
# Create mail directory and set permissions. See
|
|
|
|
# <http://wiki2.dovecot.org/SharedMailboxes/Permissions>.
|
2023-06-28 13:22:07 +05:00
|
|
|
# Prevent world-readable paths, even temporarily.
|
|
|
|
umask 007
|
2020-07-13 17:00:00 +05:00
|
|
|
mkdir -p ${directories}
|
|
|
|
chgrp "${vmailGroupName}" ${directories}
|
|
|
|
chmod 02770 ${directories}
|
2017-09-02 18:08:50 +05:00
|
|
|
'';
|
|
|
|
};
|
2017-08-23 20:34:34 +05:00
|
|
|
|
2018-05-13 06:35:03 +05:00
|
|
|
# Postfix requires dovecot lmtp socket, dovecot auth socket and certificate to work
|
2018-05-04 19:52:58 +05:00
|
|
|
systemd.services.postfix = {
|
2020-11-29 18:35:15 +05:00
|
|
|
wants = certificatesDeps;
|
|
|
|
after = [ "dovecot2.service" ]
|
|
|
|
++ lib.optional cfg.dkimSigning "opendkim.service"
|
|
|
|
++ certificatesDeps;
|
2018-05-13 06:35:03 +05:00
|
|
|
requires = [ "dovecot2.service" ]
|
2020-11-29 18:35:15 +05:00
|
|
|
++ lib.optional cfg.dkimSigning "opendkim.service";
|
2018-05-04 19:52:58 +05:00
|
|
|
};
|
2017-08-23 20:22:44 +05:00
|
|
|
};
|
2017-08-12 14:47:52 +05:00
|
|
|
}
|