rmilter service: support only one socket
This commit is contained in:
parent
4defb788eb
commit
8ab2d2ee27
@ -237,6 +237,18 @@ following incompatible changes:</para>
|
|||||||
</para>
|
</para>
|
||||||
</listitem>
|
</listitem>
|
||||||
|
|
||||||
|
<listitem>
|
||||||
|
<para>
|
||||||
|
The socket handling of the <literal>services.rmilter</literal> module
|
||||||
|
has been fixed and refactored. As rmilter doesn't support binding to
|
||||||
|
more than one socket, the options <literal>bindUnixSockets</literal>
|
||||||
|
and <literal>bindInetSockets</literal> have been replaced by
|
||||||
|
<literal>services.rmilter.bindSocket.*</literal>. The default is still
|
||||||
|
a unix socket in <literal>/run/rmilter/rmilter.sock</literal>. Refer to
|
||||||
|
the options documentation for more information.
|
||||||
|
</para>
|
||||||
|
</listitem>
|
||||||
|
|
||||||
</itemizedlist>
|
</itemizedlist>
|
||||||
|
|
||||||
|
|
||||||
|
@ -35,6 +35,9 @@ with lib;
|
|||||||
(mkRemovedOptionModule [ "security" "setuidOwners" ] "Use security.wrappers instead")
|
(mkRemovedOptionModule [ "security" "setuidOwners" ] "Use security.wrappers instead")
|
||||||
(mkRemovedOptionModule [ "security" "setuidPrograms" ] "Use security.wrappers instead")
|
(mkRemovedOptionModule [ "security" "setuidPrograms" ] "Use security.wrappers instead")
|
||||||
|
|
||||||
|
(mkRemovedOptionModule [ "services" "rmilter" "bindInetSockets" ] "Use services.rmilter.bindSocket.* instead")
|
||||||
|
(mkRemovedOptionModule [ "services" "rmilter" "bindUnixSockets" ] "Use services.rmilter.bindSocket.* instead")
|
||||||
|
|
||||||
# Old Grub-related options.
|
# Old Grub-related options.
|
||||||
(mkRenamedOptionModule [ "boot" "initrd" "extraKernelModules" ] [ "boot" "initrd" "kernelModules" ])
|
(mkRenamedOptionModule [ "boot" "initrd" "extraKernelModules" ] [ "boot" "initrd" "kernelModules" ])
|
||||||
(mkRenamedOptionModule [ "boot" "extraKernelParams" ] [ "boot" "kernelParams" ])
|
(mkRenamedOptionModule [ "boot" "extraKernelParams" ] [ "boot" "kernelParams" ])
|
||||||
|
@ -7,14 +7,17 @@ let
|
|||||||
rspamdCfg = config.services.rspamd;
|
rspamdCfg = config.services.rspamd;
|
||||||
cfg = config.services.rmilter;
|
cfg = config.services.rmilter;
|
||||||
|
|
||||||
inetSockets = map (sock: let s = splitString ":" sock; in "inet:${last s}@${head s}") cfg.bindInetSockets;
|
inetSocket = addr: port: "inet:[${toString port}@${addr}]";
|
||||||
unixSockets = map (sock: "unix:${sock}") cfg.bindUnixSockets;
|
unixSocket = sock: "unix:${sock}";
|
||||||
|
|
||||||
allSockets = unixSockets ++ inetSockets;
|
systemdSocket = if cfg.bindSocket.type == "unix" then cfg.bindSocket.path
|
||||||
|
else "${cfg.bindSocket.address}:${toString cfg.bindSocket.port}";
|
||||||
|
rmilterSocket = if cfg.bindSocket.type == "unix" then unixSocket cfg.bindSocket.path
|
||||||
|
else inetSocket cfg.bindSocket.address cfg.bindSocket.port;
|
||||||
|
|
||||||
rmilterConf = ''
|
rmilterConf = ''
|
||||||
pidfile = /run/rmilter/rmilter.pid;
|
pidfile = /run/rmilter/rmilter.pid;
|
||||||
bind_socket = ${if cfg.socketActivation then "fd:3" else last inetSockets};
|
bind_socket = ${if cfg.socketActivation then "fd:3" else rmilterSocket};
|
||||||
tempdir = /tmp;
|
tempdir = /tmp;
|
||||||
'' + (with cfg.rspamd; if enable then ''
|
'' + (with cfg.rspamd; if enable then ''
|
||||||
spamd {
|
spamd {
|
||||||
@ -32,7 +35,7 @@ let
|
|||||||
rspamd_metric = "default";
|
rspamd_metric = "default";
|
||||||
${extraConfig}
|
${extraConfig}
|
||||||
};
|
};
|
||||||
'' else "") + cfg.extraConfig;
|
'' else "") + cfg.extraConfig;
|
||||||
|
|
||||||
rmilterConfigFile = pkgs.writeText "rmilter.conf" rmilterConf;
|
rmilterConfigFile = pkgs.writeText "rmilter.conf" rmilterConf;
|
||||||
|
|
||||||
@ -47,11 +50,13 @@ in
|
|||||||
services.rmilter = {
|
services.rmilter = {
|
||||||
|
|
||||||
enable = mkOption {
|
enable = mkOption {
|
||||||
|
type = types.bool;
|
||||||
default = cfg.rspamd.enable;
|
default = cfg.rspamd.enable;
|
||||||
description = "Whether to run the rmilter daemon.";
|
description = "Whether to run the rmilter daemon.";
|
||||||
};
|
};
|
||||||
|
|
||||||
debug = mkOption {
|
debug = mkOption {
|
||||||
|
type = types.bool;
|
||||||
default = false;
|
default = false;
|
||||||
description = "Whether to run the rmilter daemon in debug mode.";
|
description = "Whether to run the rmilter daemon in debug mode.";
|
||||||
};
|
};
|
||||||
@ -72,25 +77,37 @@ in
|
|||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
bindUnixSockets = mkOption {
|
bindSocket.type = mkOption {
|
||||||
type = types.listOf types.str;
|
type = types.enum [ "unix" "inet" ];
|
||||||
default = ["/run/rmilter/rmilter.sock"];
|
default = "unix";
|
||||||
description = ''
|
description = ''
|
||||||
Unix domain sockets to listen for MTA requests.
|
What kind of socket rmilter should listen on. Either "unix"
|
||||||
'';
|
for an Unix domain socket or "inet" for a TCP socket.
|
||||||
example = ''
|
|
||||||
[ "/run/rmilter.sock"]
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
bindInetSockets = mkOption {
|
bindSocket.path = mkOption {
|
||||||
type = types.listOf types.str;
|
type = types.str;
|
||||||
default = [];
|
default = "/run/rmilter/rmilter.sock";
|
||||||
description = ''
|
description = ''
|
||||||
Inet addresses to listen (in format accepted by systemd.socket)
|
Path to Unix domain socket to listen on.
|
||||||
'';
|
'';
|
||||||
example = ''
|
};
|
||||||
["127.0.0.1:11990"]
|
|
||||||
|
bindSocket.address = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
default = "::1";
|
||||||
|
example = "0.0.0.0";
|
||||||
|
description = ''
|
||||||
|
Inet address to listen on.
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
bindSocket.port = mkOption {
|
||||||
|
type = types.int;
|
||||||
|
default = 11990;
|
||||||
|
description = ''
|
||||||
|
Inet port to listen on.
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
@ -102,13 +119,13 @@ in
|
|||||||
|
|
||||||
Disabling socket activation is not recommended when a Unix
|
Disabling socket activation is not recommended when a Unix
|
||||||
domain socket is used and could lead to incorrect
|
domain socket is used and could lead to incorrect
|
||||||
permissions. Therefore, setting this to false will
|
permissions.
|
||||||
configure rmilter to use an inet socket only.
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
rspamd = {
|
rspamd = {
|
||||||
enable = mkOption {
|
enable = mkOption {
|
||||||
|
type = types.bool;
|
||||||
default = rspamdCfg.enable;
|
default = rspamdCfg.enable;
|
||||||
description = "Whether to use rspamd to filter mails";
|
description = "Whether to use rspamd to filter mails";
|
||||||
};
|
};
|
||||||
@ -158,13 +175,9 @@ in
|
|||||||
type = types.str;
|
type = types.str;
|
||||||
description = "Addon to postfix configuration";
|
description = "Addon to postfix configuration";
|
||||||
default = ''
|
default = ''
|
||||||
smtpd_milters = ${head allSockets}
|
smtpd_milters = ${rmilterSocket}
|
||||||
# or for TCP socket
|
milter_protocol = 6
|
||||||
# # smtpd_milters = inet:localhost:9900
|
milter_mail_macros = i {mail_addr} {client_addr} {client_name} {auth_authen}
|
||||||
milter_protocol = 6
|
|
||||||
milter_mail_macros = i {mail_addr} {client_addr} {client_name} {auth_authen}
|
|
||||||
# skip mail without checks if milter will die
|
|
||||||
milter_default_action = accept
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@ -176,52 +189,58 @@ milter_default_action = accept
|
|||||||
|
|
||||||
###### implementation
|
###### implementation
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
config = mkMerge [
|
||||||
|
|
||||||
users.extraUsers = singleton {
|
(mkIf cfg.enable {
|
||||||
name = cfg.user;
|
|
||||||
description = "rspamd daemon";
|
|
||||||
uid = config.ids.uids.rmilter;
|
|
||||||
group = cfg.group;
|
|
||||||
};
|
|
||||||
|
|
||||||
users.extraGroups = singleton {
|
users.extraUsers = singleton {
|
||||||
name = cfg.group;
|
name = cfg.user;
|
||||||
gid = config.ids.gids.rmilter;
|
description = "rmilter daemon";
|
||||||
};
|
uid = config.ids.uids.rmilter;
|
||||||
|
group = cfg.group;
|
||||||
systemd.services.rmilter = {
|
|
||||||
description = "Rmilter Service";
|
|
||||||
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
after = [ "network.target" ];
|
|
||||||
|
|
||||||
serviceConfig = {
|
|
||||||
ExecStart = "${pkgs.rmilter}/bin/rmilter ${optionalString cfg.debug "-d"} -n -c ${rmilterConfigFile}";
|
|
||||||
ExecReload = "${pkgs.coreutils}/bin/kill -USR1 $MAINPID";
|
|
||||||
User = cfg.user;
|
|
||||||
Group = cfg.group;
|
|
||||||
PermissionsStartOnly = true;
|
|
||||||
Restart = "always";
|
|
||||||
RuntimeDirectory = "rmilter";
|
|
||||||
RuntimeDirectoryMode = "0755";
|
|
||||||
};
|
};
|
||||||
|
|
||||||
};
|
users.extraGroups = singleton {
|
||||||
|
name = cfg.group;
|
||||||
systemd.sockets.rmilter = mkIf cfg.socketActivation {
|
gid = config.ids.gids.rmilter;
|
||||||
description = "Rmilter service socket";
|
|
||||||
wantedBy = [ "sockets.target" ];
|
|
||||||
socketConfig = {
|
|
||||||
ListenStream = cfg.bindUnixSockets ++ cfg.bindInetSockets;
|
|
||||||
SocketUser = cfg.user;
|
|
||||||
SocketGroup = cfg.group;
|
|
||||||
SocketMode = "0666";
|
|
||||||
};
|
};
|
||||||
};
|
|
||||||
|
|
||||||
services.postfix.extraConfig = optionalString cfg.postfix.enable cfg.postfix.configFragment;
|
systemd.services.rmilter = {
|
||||||
users.users.postfix.extraGroups = [ cfg.group ];
|
description = "Rmilter Service";
|
||||||
};
|
|
||||||
|
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
after = [ "network.target" ];
|
||||||
|
|
||||||
|
serviceConfig = {
|
||||||
|
ExecStart = "${pkgs.rmilter}/bin/rmilter ${optionalString cfg.debug "-d"} -n -c ${rmilterConfigFile}";
|
||||||
|
ExecReload = "${pkgs.coreutils}/bin/kill -USR1 $MAINPID";
|
||||||
|
User = cfg.user;
|
||||||
|
Group = cfg.group;
|
||||||
|
PermissionsStartOnly = true;
|
||||||
|
Restart = "always";
|
||||||
|
RuntimeDirectory = "rmilter";
|
||||||
|
RuntimeDirectoryMode = "0755";
|
||||||
|
};
|
||||||
|
|
||||||
|
};
|
||||||
|
|
||||||
|
systemd.sockets.rmilter = mkIf cfg.socketActivation {
|
||||||
|
description = "Rmilter service socket";
|
||||||
|
wantedBy = [ "sockets.target" ];
|
||||||
|
socketConfig = {
|
||||||
|
ListenStream = systemdSocket;
|
||||||
|
SocketUser = cfg.user;
|
||||||
|
SocketGroup = cfg.group;
|
||||||
|
SocketMode = "0666";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
})
|
||||||
|
|
||||||
|
(mkIf (cfg.enable && cfg.postfix.enable) {
|
||||||
|
|
||||||
|
services.postfix.extraConfig = cfg.postfix.configFragment;
|
||||||
|
users.users.postfix.extraGroups = [ cfg.group ];
|
||||||
|
|
||||||
|
})
|
||||||
|
];
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user