112 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			112 lines
		
	
	
		
			2.6 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { config, lib, pkgs, ... }:
 | |
| 
 | |
| with lib;
 | |
| 
 | |
| let
 | |
| 
 | |
|   cfg = config.services.postsrsd;
 | |
| 
 | |
| in {
 | |
| 
 | |
|   ###### interface
 | |
| 
 | |
|   options = {
 | |
| 
 | |
|     services.postsrsd = {
 | |
| 
 | |
|       enable = mkOption {
 | |
|         type = types.bool;
 | |
|         default = false;
 | |
|         description = "Whether to enable the postsrsd SRS server for Postfix.";
 | |
|       };
 | |
| 
 | |
|       domain = mkOption {
 | |
|         type = types.str;
 | |
|         description = "Domain name for rewrite";
 | |
|       };
 | |
| 
 | |
|       secretsFile = mkOption {
 | |
|         type = types.path;
 | |
|         default = "/var/lib/postsrsd/postsrsd.secret";
 | |
|         description = "Secret keys used for signing and verification";
 | |
|       };
 | |
| 
 | |
|       forwardPort = mkOption {
 | |
|         type = types.int;
 | |
|         default = 10001;
 | |
|         description = "Port for the forward SRS lookup";
 | |
|       };
 | |
| 
 | |
|       reversePort = mkOption {
 | |
|         type = types.int;
 | |
|         default = 10002;
 | |
|         description = "Port for the reverse SRS lookup";
 | |
|       };
 | |
| 
 | |
|       user = mkOption {
 | |
|         type = types.str;
 | |
|         default = "postsrsd";
 | |
|         description = "User for the daemon";
 | |
|       };
 | |
| 
 | |
|       group = mkOption {
 | |
|         type = types.str;
 | |
|         default = "postsrsd";
 | |
|         description = "Group for the daemon";
 | |
|       };
 | |
| 
 | |
|     };
 | |
| 
 | |
|   };
 | |
| 
 | |
| 
 | |
|   ###### implementation
 | |
| 
 | |
|   config = mkIf cfg.enable {
 | |
| 
 | |
|     services.postsrsd.domain = mkDefault config.networking.hostName;
 | |
| 
 | |
|     users.extraUsers = optionalAttrs (cfg.user == "postsrsd") (singleton
 | |
|       { name = "postsrsd";
 | |
|         group = cfg.group;
 | |
|         uid = config.ids.uids.postsrsd;
 | |
|       });
 | |
| 
 | |
|     users.extraGroups = optionalAttrs (cfg.group == "postsrsd") (singleton
 | |
|       { name = "postsrsd";
 | |
|         gid = config.ids.gids.postsrsd;
 | |
|       });
 | |
| 
 | |
|     systemd.services.postsrsd = {
 | |
|       description = "PostSRSd SRS rewriting server";
 | |
|       after = [ "network.target" ];
 | |
|       before = [ "postfix.service" ];
 | |
|       wantedBy = [ "multi-user.target" ];
 | |
| 
 | |
|       path = [ pkgs.coreutils ];
 | |
| 
 | |
|       serviceConfig = {
 | |
|         ExecStart = ''${pkgs.postsrsd}/sbin/postsrsd "-s${cfg.secretsFile}" "-d${cfg.domain}" -f${toString cfg.forwardPort} -r${toString cfg.reversePort}'';
 | |
|         User = cfg.user;
 | |
|         Group = cfg.group;
 | |
|         PermissionsStartOnly = true;
 | |
|       };
 | |
| 
 | |
|       preStart = ''
 | |
|         if [ ! -e "${cfg.secretsFile}" ]; then
 | |
|           echo "WARNING: secrets file not found, autogenerating!"
 | |
|           DIR="$(dirname "${cfg.secretsFile}")"
 | |
|           if [ ! -d "$DIR" ]; then
 | |
|             mkdir -p -m750 "$DIR"
 | |
|             chown "${cfg.user}:${cfg.group}" "$DIR"
 | |
|           fi
 | |
|           dd if=/dev/random bs=18 count=1 | base64 > "${cfg.secretsFile}"
 | |
|           chmod 600 "${cfg.secretsFile}"
 | |
|         fi
 | |
|         chown "${cfg.user}:${cfg.group}" "${cfg.secretsFile}"
 | |
|       '';
 | |
|     };
 | |
| 
 | |
|   };
 | |
| }
 | 
