151 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			151 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { config, lib, pkgs, ... }:
 | |
| 
 | |
| with lib;
 | |
| 
 | |
| let
 | |
| 
 | |
|   cfg = config.services.dspam;
 | |
| 
 | |
|   dspam = pkgs.dspam;
 | |
| 
 | |
|   defaultSock = "/run/dspam/dspam.sock";
 | |
| 
 | |
|   cfgfile = pkgs.writeText "dspam.conf" ''
 | |
|     Home /var/lib/dspam
 | |
|     StorageDriver ${dspam}/lib/dspam/lib${cfg.storageDriver}_drv.so
 | |
| 
 | |
|     Trust root
 | |
|     Trust ${cfg.user}
 | |
|     SystemLog on
 | |
|     UserLog on
 | |
| 
 | |
|     ${optionalString (cfg.domainSocket != null) ''
 | |
|       ServerDomainSocketPath "${cfg.domainSocket}"
 | |
|       ClientHost "${cfg.domainSocket}"
 | |
|     ''}
 | |
| 
 | |
|     ${cfg.extraConfig}
 | |
|   '';
 | |
| 
 | |
| in {
 | |
| 
 | |
|   ###### interface
 | |
| 
 | |
|   options = {
 | |
| 
 | |
|     services.dspam = {
 | |
| 
 | |
|       enable = mkOption {
 | |
|         type = types.bool;
 | |
|         default = false;
 | |
|         description = "Whether to enable the dspam spam filter.";
 | |
|       };
 | |
| 
 | |
|       user = mkOption {
 | |
|         type = types.str;
 | |
|         default = "dspam";
 | |
|         description = "User for the dspam daemon.";
 | |
|       };
 | |
| 
 | |
|       group = mkOption {
 | |
|         type = types.str;
 | |
|         default = "dspam";
 | |
|         description = "Group for the dspam daemon.";
 | |
|       };
 | |
| 
 | |
|       storageDriver = mkOption {
 | |
|         type = types.str;
 | |
|         default = "hash";
 | |
|         description =  "Storage driver backend to use for dspam.";
 | |
|       };
 | |
| 
 | |
|       domainSocket = mkOption {
 | |
|         type = types.nullOr types.path;
 | |
|         default = defaultSock;
 | |
|         description = "Path to local domain socket which is used for communication with the daemon. Set to null to disable UNIX socket.";
 | |
|       };
 | |
| 
 | |
|       extraConfig = mkOption {
 | |
|         type = types.lines;
 | |
|         default = "";
 | |
|         description = "Additional dspam configuration.";
 | |
|       };
 | |
| 
 | |
|       maintenanceInterval = mkOption {
 | |
|         type = types.nullOr types.str;
 | |
|         default = null;
 | |
|         description = "If set, maintenance script will be run at specified (in systemd.timer format) interval";
 | |
|       };
 | |
| 
 | |
|     };
 | |
| 
 | |
|   };
 | |
| 
 | |
| 
 | |
|   ###### implementation
 | |
| 
 | |
|   config = mkIf cfg.enable (mkMerge [
 | |
|     {
 | |
|       users.users = optionalAttrs (cfg.user == "dspam") (singleton
 | |
|         { name = "dspam";
 | |
|           group = cfg.group;
 | |
|           uid = config.ids.uids.dspam;
 | |
|         });
 | |
| 
 | |
|       users.groups = optionalAttrs (cfg.group == "dspam") (singleton
 | |
|         { name = "dspam";
 | |
|           gid = config.ids.gids.dspam;
 | |
|         });
 | |
| 
 | |
|       environment.systemPackages = [ dspam ];
 | |
| 
 | |
|       environment.etc."dspam/dspam.conf".source = cfgfile;
 | |
| 
 | |
|       systemd.services.dspam = {
 | |
|         description = "dspam spam filtering daemon";
 | |
|         wantedBy = [ "multi-user.target" ];
 | |
|         after = [ "postgresql.service" ];
 | |
|         restartTriggers = [ cfgfile ];
 | |
| 
 | |
|         serviceConfig = {
 | |
|           ExecStart = "${dspam}/bin/dspam --daemon --nofork";
 | |
|           User = cfg.user;
 | |
|           Group = cfg.group;
 | |
|           RuntimeDirectory = optional (cfg.domainSocket == defaultSock) "dspam";
 | |
|           RuntimeDirectoryMode = optional (cfg.domainSocket == defaultSock) "0750";
 | |
|           StateDirectory = "dspam";
 | |
|           StateDirectoryMode = "0750";
 | |
|           LogsDirectory = "dspam";
 | |
|           LogsDirectoryMode = "0750";
 | |
|           # DSPAM segfaults on just about every error
 | |
|           Restart = "on-abort";
 | |
|           RestartSec = "1s";
 | |
|         };
 | |
|       };
 | |
|     }
 | |
| 
 | |
|     (mkIf (cfg.maintenanceInterval != null) {
 | |
|       systemd.timers.dspam-maintenance = {
 | |
|         description = "Timer for dspam maintenance script";
 | |
|         wantedBy = [ "timers.target" ];
 | |
|         timerConfig = {
 | |
|           OnCalendar = cfg.maintenanceInterval;
 | |
|           Unit = "dspam-maintenance.service";
 | |
|         };
 | |
|       };
 | |
| 
 | |
|       systemd.services.dspam-maintenance = {
 | |
|         description = "dspam maintenance script";
 | |
|         restartTriggers = [ cfgfile ];
 | |
| 
 | |
|         serviceConfig = {
 | |
|           ExecStart = "${dspam}/bin/dspam_maintenance --verbose";
 | |
|           Type = "oneshot";
 | |
|           User = cfg.user;
 | |
|           Group = cfg.group;
 | |
|         };
 | |
|       };
 | |
|     })
 | |
|   ]);
 | |
| }
 | 
