195 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			195 lines
		
	
	
		
			6.0 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
{ config, lib, pkgs, ... }:
 | 
						|
 | 
						|
with lib; let
 | 
						|
 | 
						|
  cfg = config.services.postgrey;
 | 
						|
 | 
						|
  natural = with types; addCheck int (x: x >= 0);
 | 
						|
  natural' = with types; addCheck int (x: x > 0);
 | 
						|
 | 
						|
  socket = with types; addCheck (either (submodule unixSocket) (submodule inetSocket)) (x: x ? "path" || x ? "port");
 | 
						|
 | 
						|
  inetSocket = with types; {
 | 
						|
    options = {
 | 
						|
      addr = mkOption {
 | 
						|
        type = nullOr string;
 | 
						|
        default = null;
 | 
						|
        example = "127.0.0.1";
 | 
						|
        description = "The address to bind to. Localhost if null";
 | 
						|
      };
 | 
						|
      port = mkOption {
 | 
						|
        type = natural';
 | 
						|
        default = 10030;
 | 
						|
        description = "Tcp port to bind to";
 | 
						|
      };
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  unixSocket = with types; {
 | 
						|
    options = {
 | 
						|
      path = mkOption {
 | 
						|
        type = path;
 | 
						|
        default = "/var/run/postgrey.sock";
 | 
						|
        description = "Path of the unix socket";
 | 
						|
      };
 | 
						|
 | 
						|
      mode = mkOption {
 | 
						|
        type = string;
 | 
						|
        default = "0777";
 | 
						|
        description = "Mode of the unix socket";
 | 
						|
      };
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
in {
 | 
						|
 | 
						|
  options = {
 | 
						|
    services.postgrey = with types; {
 | 
						|
      enable = mkOption {
 | 
						|
        type = bool;
 | 
						|
        default = false;
 | 
						|
        description = "Whether to run the Postgrey daemon";
 | 
						|
      };
 | 
						|
      socket = mkOption {
 | 
						|
        type = socket;
 | 
						|
        default = {
 | 
						|
          path = "/var/run/postgrey.sock";
 | 
						|
          mode = "0777";
 | 
						|
        };
 | 
						|
        example = {
 | 
						|
          addr = "127.0.0.1";
 | 
						|
          port = 10030;
 | 
						|
        };
 | 
						|
        description = "Socket to bind to";
 | 
						|
      };
 | 
						|
      greylistText = mkOption {
 | 
						|
        type = string;
 | 
						|
        default = "Greylisted for %%s seconds";
 | 
						|
        description = "Response status text for greylisted messages; use %%s for seconds left until greylisting is over and %%r for mail domain of recipient";
 | 
						|
      };
 | 
						|
      greylistAction = mkOption {
 | 
						|
        type = string;
 | 
						|
        default = "DEFER_IF_PERMIT";
 | 
						|
        description = "Response status for greylisted messages (see access(5))";
 | 
						|
      };
 | 
						|
      greylistHeader = mkOption {
 | 
						|
        type = string;
 | 
						|
        default = "X-Greylist: delayed %%t seconds by postgrey-%%v at %%h; %%d";
 | 
						|
        description = "Prepend header to greylisted mails; use %%t for seconds delayed due to greylisting, %%v for the version of postgrey, %%d for the date, and %%h for the host";
 | 
						|
      };
 | 
						|
      delay = mkOption {
 | 
						|
        type = natural;
 | 
						|
        default = 300;
 | 
						|
        description = "Greylist for N seconds";
 | 
						|
      };
 | 
						|
      maxAge = mkOption {
 | 
						|
        type = natural;
 | 
						|
        default = 35;
 | 
						|
        description = "Delete entries from whitelist if they haven't been seen for N days";
 | 
						|
      };
 | 
						|
      retryWindow = mkOption {
 | 
						|
        type = either string natural;
 | 
						|
        default = 2;
 | 
						|
        example = "12h";
 | 
						|
        description = "Allow N days for the first retry. Use string with appended 'h' to specify time in hours";
 | 
						|
      };
 | 
						|
      lookupBySubnet = mkOption {
 | 
						|
        type = bool;
 | 
						|
        default = true;
 | 
						|
        description = "Strip the last N bits from IP addresses, determined by IPv4CIDR and IPv6CIDR";
 | 
						|
      };
 | 
						|
      IPv4CIDR = mkOption {
 | 
						|
        type = natural;
 | 
						|
        default = 24;
 | 
						|
        description = "Strip N bits from IPv4 addresses if lookupBySubnet is true";
 | 
						|
      };
 | 
						|
      IPv6CIDR = mkOption {
 | 
						|
        type = natural;
 | 
						|
        default = 64;
 | 
						|
        description = "Strip N bits from IPv6 addresses if lookupBySubnet is true";
 | 
						|
      };
 | 
						|
      privacy = mkOption {
 | 
						|
        type = bool;
 | 
						|
        default = true;
 | 
						|
        description = "Store data using one-way hash functions (SHA1)";
 | 
						|
      };
 | 
						|
      autoWhitelist = mkOption {
 | 
						|
        type = nullOr natural';
 | 
						|
        default = 5;
 | 
						|
        description = "Whitelist clients after successful delivery of N messages";
 | 
						|
      };
 | 
						|
      whitelistClients = mkOption {
 | 
						|
        type = listOf path;
 | 
						|
        default = [];
 | 
						|
        description = "Client address whitelist files (see postgrey(8))";
 | 
						|
      };
 | 
						|
      whitelistRecipients = mkOption {
 | 
						|
        type = listOf path;
 | 
						|
        default = [];
 | 
						|
        description = "Recipient address whitelist files (see postgrey(8))";
 | 
						|
      };
 | 
						|
    };
 | 
						|
  };
 | 
						|
 | 
						|
  config = mkIf cfg.enable {
 | 
						|
 | 
						|
    environment.systemPackages = [ pkgs.postgrey ];
 | 
						|
 | 
						|
    users = {
 | 
						|
      extraUsers = {
 | 
						|
        postgrey = {
 | 
						|
          description = "Postgrey Daemon";
 | 
						|
          uid = config.ids.uids.postgrey;
 | 
						|
          group = "postgrey";
 | 
						|
        };
 | 
						|
      };
 | 
						|
      extraGroups = {
 | 
						|
        postgrey = {
 | 
						|
          gid = config.ids.gids.postgrey;
 | 
						|
        };
 | 
						|
      };
 | 
						|
    };
 | 
						|
 | 
						|
    systemd.services.postgrey = let
 | 
						|
      bind-flag = if cfg.socket ? "path" then
 | 
						|
        ''--unix=${cfg.socket.path} --socketmode=${cfg.socket.mode}''
 | 
						|
      else
 | 
						|
        ''--inet=${optionalString (cfg.socket.addr != null) (cfg.socket.addr + ":")}${toString cfg.socket.port}'';
 | 
						|
    in {
 | 
						|
      description = "Postfix Greylisting Service";
 | 
						|
      wantedBy = [ "multi-user.target" ];
 | 
						|
      before = [ "postfix.service" ];
 | 
						|
      preStart = ''
 | 
						|
        mkdir -p /var/postgrey
 | 
						|
        chown postgrey:postgrey /var/postgrey
 | 
						|
        chmod 0770 /var/postgrey
 | 
						|
      '';
 | 
						|
      serviceConfig = {
 | 
						|
        Type = "simple";
 | 
						|
        ExecStart = ''${pkgs.postgrey}/bin/postgrey \
 | 
						|
          ${bind-flag} \
 | 
						|
          --group=postgrey --user=postgrey \
 | 
						|
          --dbdir=/var/postgrey \
 | 
						|
          --delay=${toString cfg.delay} \
 | 
						|
          --max-age=${toString cfg.maxAge} \
 | 
						|
          --retry-window=${toString cfg.retryWindow} \
 | 
						|
          ${if cfg.lookupBySubnet then "--lookup-by-subnet" else "--lookup-by-host"} \
 | 
						|
          --ipv4cidr=${toString cfg.IPv4CIDR} --ipv6cidr=${toString cfg.IPv6CIDR} \
 | 
						|
          ${optionalString cfg.privacy "--privacy"} \
 | 
						|
          --auto-whitelist-clients=${toString (if cfg.autoWhitelist == null then 0 else cfg.autoWhitelist)} \
 | 
						|
          --greylist-action=${cfg.greylistAction} \
 | 
						|
          --greylist-text="${cfg.greylistText}" \
 | 
						|
          --x-greylist-header="${cfg.greylistHeader}" \
 | 
						|
          ${concatMapStringsSep " " (x: "--whitelist-clients=" + x) cfg.whitelistClients} \
 | 
						|
          ${concatMapStringsSep " " (x: "--whitelist-recipients=" + x) cfg.whitelistRecipients}
 | 
						|
        '';
 | 
						|
        Restart = "always";
 | 
						|
        RestartSec = 5;
 | 
						|
        TimeoutSec = 10;
 | 
						|
      };
 | 
						|
    };
 | 
						|
 | 
						|
  };
 | 
						|
 | 
						|
}
 |