133 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			133 lines
		
	
	
		
			3.4 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
{ config, lib, pkgs, ... }:
 | 
						|
 | 
						|
with lib;
 | 
						|
 | 
						|
let
 | 
						|
 | 
						|
  cfg = config.services.opendkim;
 | 
						|
 | 
						|
  defaultSock = "local:/run/opendkim/opendkim.sock";
 | 
						|
 | 
						|
  keyFile = "${cfg.keyPath}/${cfg.selector}.private";
 | 
						|
 | 
						|
  args = [ "-f" "-l"
 | 
						|
           "-p" cfg.socket
 | 
						|
           "-d" cfg.domains
 | 
						|
           "-k" keyFile
 | 
						|
           "-s" cfg.selector
 | 
						|
         ] ++ optionals (cfg.configFile != null) [ "-x" cfg.configFile ];
 | 
						|
 | 
						|
in {
 | 
						|
 | 
						|
  ###### interface
 | 
						|
 | 
						|
  options = {
 | 
						|
 | 
						|
    services.opendkim = {
 | 
						|
 | 
						|
      enable = mkOption {
 | 
						|
        type = types.bool;
 | 
						|
        default = false;
 | 
						|
        description = "Whether to enable the OpenDKIM sender authentication system.";
 | 
						|
      };
 | 
						|
 | 
						|
      socket = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = defaultSock;
 | 
						|
        description = "Socket which is used for communication with OpenDKIM.";
 | 
						|
      };
 | 
						|
 | 
						|
      user = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = "opendkim";
 | 
						|
        description = "User for the daemon.";
 | 
						|
      };
 | 
						|
 | 
						|
      group = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = "opendkim";
 | 
						|
        description = "Group for the daemon.";
 | 
						|
      };
 | 
						|
 | 
						|
      domains = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        default = "csl:${config.networking.hostName}";
 | 
						|
        example = "csl:example.com,mydomain.net";
 | 
						|
        description = ''
 | 
						|
          Local domains set (see <literal>opendkim(8)</literal> for more information on datasets).
 | 
						|
          Messages from them are signed, not verified.
 | 
						|
        '';
 | 
						|
      };
 | 
						|
 | 
						|
      keyPath = mkOption {
 | 
						|
        type = types.path;
 | 
						|
        description = ''
 | 
						|
          The path that opendkim should put its generated private keys into.
 | 
						|
          The DNS settings will be found in this directory with the name selector.txt.
 | 
						|
        '';
 | 
						|
        default = "/var/lib/opendkim/keys";
 | 
						|
      };
 | 
						|
 | 
						|
      selector = mkOption {
 | 
						|
        type = types.str;
 | 
						|
        description = "Selector to use when signing.";
 | 
						|
      };
 | 
						|
 | 
						|
      configFile = mkOption {
 | 
						|
        type = types.nullOr types.path;
 | 
						|
        default = null;
 | 
						|
        description = "Additional opendkim configuration.";
 | 
						|
      };
 | 
						|
 | 
						|
    };
 | 
						|
 | 
						|
  };
 | 
						|
 | 
						|
 | 
						|
  ###### implementation
 | 
						|
 | 
						|
  config = mkIf cfg.enable {
 | 
						|
 | 
						|
    users.users = optionalAttrs (cfg.user == "opendkim") (singleton
 | 
						|
      { name = "opendkim";
 | 
						|
        group = cfg.group;
 | 
						|
        uid = config.ids.uids.opendkim;
 | 
						|
      });
 | 
						|
 | 
						|
    users.groups = optionalAttrs (cfg.group == "opendkim") (singleton
 | 
						|
      { name = "opendkim";
 | 
						|
        gid = config.ids.gids.opendkim;
 | 
						|
      });
 | 
						|
 | 
						|
    environment.systemPackages = [ pkgs.opendkim ];
 | 
						|
 | 
						|
    systemd.services.opendkim = {
 | 
						|
      description = "OpenDKIM signing and verification daemon";
 | 
						|
      after = [ "network.target" ];
 | 
						|
      wantedBy = [ "multi-user.target" ];
 | 
						|
 | 
						|
      preStart = ''
 | 
						|
        mkdir -p "${cfg.keyPath}"
 | 
						|
        cd "${cfg.keyPath}"
 | 
						|
        if ! test -f ${cfg.selector}.private; then
 | 
						|
          ${pkgs.opendkim}/bin/opendkim-genkey -s ${cfg.selector} -d all-domains-generic-key
 | 
						|
          echo "Generated OpenDKIM key! Please update your DNS settings:\n"
 | 
						|
          echo "-------------------------------------------------------------"
 | 
						|
          cat ${cfg.selector}.txt
 | 
						|
          echo "-------------------------------------------------------------"
 | 
						|
        fi
 | 
						|
        chown ${cfg.user}:${cfg.group} ${cfg.selector}.private
 | 
						|
      '';
 | 
						|
 | 
						|
      serviceConfig = {
 | 
						|
        ExecStart = "${pkgs.opendkim}/bin/opendkim ${escapeShellArgs args}";
 | 
						|
        User = cfg.user;
 | 
						|
        Group = cfg.group;
 | 
						|
        RuntimeDirectory = optional (cfg.socket == defaultSock) "opendkim";
 | 
						|
        PermissionsStartOnly = true;
 | 
						|
      };
 | 
						|
    };
 | 
						|
 | 
						|
  };
 | 
						|
}
 |