nixos-mailserver/mail-server/systemd.nix

118 lines
4 KiB
Nix
Raw Normal View History

2017-08-12 11:47:52 +02:00
# nixos-mailserver: a simple mail server
2018-01-29 10:34:27 +01:00
# Copyright (C) 2016-2018 Robin Raymond
2017-08-12 11:47:52 +02:00
#
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation, either version 3 of the License, or
# (at your option) any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>
2017-09-02 15:08:50 +02:00
{ config, pkgs, lib, ... }:
2017-08-12 11:47:52 +02:00
let
2017-09-02 15:08:50 +02:00
cfg = config.mailserver;
create_certificate = if cfg.certificateScheme == 2 then
2017-09-03 16:20:47 +02:00
''
# Create certificates if they do not exist yet
dir="${cfg.certificateDirectory}"
fqdn="${cfg.fqdn}"
2017-09-03 16:20:47 +02:00
case $fqdn in /*) fqdn=$(cat "$fqdn");; esac
key="''${dir}/key-${cfg.fqdn}.pem";
cert="''${dir}/cert-${cfg.fqdn}.pem";
2017-09-03 16:20:47 +02:00
if [ ! -f "''${key}" ] || [ ! -f "''${cert}" ]
then
mkdir -p "${cfg.certificateDirectory}"
(umask 077; "${pkgs.openssl}/bin/openssl" genrsa -out "''${key}" 2048) &&
"${pkgs.openssl}/bin/openssl" req -new -key "''${key}" -x509 -subj "/CN=''${fqdn}" \
-days 3650 -out "''${cert}"
fi
''
else "";
2017-08-23 17:22:44 +02:00
2018-02-13 13:18:31 +01:00
createDhParameterFile =
''
# Create a dh parameter file
2018-02-23 14:56:28 +01:00
if [ ! -f "''${cfg.certificateDirectory}/dh.pem" ]
then
mkdir -p "${cfg.certificateDirectory}"
${pkgs.openssl}/bin/openssl \
dhparam ${builtins.toString cfg.dhParamBitLength} \
> "${cfg.certificateDirectory}/dh.pem"
fi
2018-02-13 13:18:31 +01:00
'';
2017-11-11 16:05:49 +01:00
createDomainDkimCert = dom:
let
dkim_key = "${cfg.dkimKeyDirectory}/${dom}.${cfg.dkimSelector}.key";
dkim_txt = "${cfg.dkimKeyDirectory}/${dom}.${cfg.dkimSelector}.txt";
in
''
if [ ! -f "${dkim_key}" ] || [ ! -f "${dkim_txt}" ]
then
${pkgs.opendkim}/bin/opendkim-genkey -s "${cfg.dkimSelector}" \
-d "${dom}" \
--directory="${cfg.dkimKeyDirectory}"
mv "${cfg.dkimKeyDirectory}/${cfg.dkimSelector}.private" "${dkim_key}"
mv "${cfg.dkimKeyDirectory}/${cfg.dkimSelector}.txt" "${dkim_txt}"
fi
'';
createAllCerts = lib.concatStringsSep "\n" (map createDomainDkimCert cfg.domains);
2017-09-03 16:20:47 +02:00
create_dkim_cert =
''
# Create dkim dir
mkdir -p "${cfg.dkimKeyDirectory}"
chown rmilter:rmilter "${cfg.dkimKeyDirectory}"
2017-11-11 16:05:49 +01:00
${createAllCerts}
2017-09-03 16:20:47 +02:00
2017-11-11 16:05:49 +01:00
chown -R rmilter:rmilter "${cfg.dkimKeyDirectory}"
2017-09-03 16:20:47 +02:00
'';
in
2017-08-12 11:47:52 +02:00
{
2017-09-02 15:08:50 +02:00
config = with cfg; lib.mkIf enable {
2017-09-03 15:31:37 +02:00
# Make sure postfix gets started first, so that the certificates are in place
2017-09-02 15:08:50 +02:00
systemd.services.dovecot2.after = [ "postfix.service" ];
2017-09-03 15:31:37 +02:00
# Create certificates and maildir folder
2017-09-02 15:08:50 +02:00
systemd.services.postfix = {
2017-09-23 09:56:09 +02:00
after = (if (certificateScheme == 3) then [ "nginx.service" ] else []);
2017-11-09 22:13:27 +01:00
preStart =
2017-09-02 15:08:50 +02:00
''
2017-09-02 12:15:22 +02:00
# Create mail directory and set permissions. See
# <http://wiki2.dovecot.org/SharedMailboxes/Permissions>.
2017-09-03 15:56:36 +02:00
mkdir -p "${mailDirectory}"
chgrp "${vmailGroupName}" "${mailDirectory}"
chmod 02770 "${mailDirectory}"
2017-09-02 15:08:50 +02:00
${create_certificate}
2018-02-13 13:18:31 +01:00
${let
dovecotVersion = builtins.fromJSON
(builtins.readFile (pkgs.callPackage ./dovecot-version.nix {}));
in lib.optionalString
(dovecotVersion.major == 2 && dovecotVersion.minor >= 3)
createDhParameterFile}
2017-09-02 15:08:50 +02:00
'';
};
2017-09-03 15:31:37 +02:00
# Create dkim certificates
2017-09-02 15:08:50 +02:00
systemd.services.rmilter = {
requires = [ "rmilter.socket" ];
after = [ "rmilter.socket" ];
2017-09-02 15:08:50 +02:00
preStart =
''
2017-09-03 15:31:37 +02:00
${create_dkim_cert}
2017-09-02 15:08:50 +02:00
'';
};
2017-08-23 17:22:44 +02:00
};
2017-08-12 11:47:52 +02:00
}