1 { lib, pkgs, config, name, ... }:
4 builtins.attrValues (import ../../../lib/flake-compat.nix ../../../flakes/private/openarc).nixosModules
5 ++ builtins.attrValues (import ../../../lib/flake-compat.nix ../../../flakes/private/opendmarc).nixosModules;
7 options.myServices.mail.milters.sockets = lib.mkOption {
8 type = lib.types.attrsOf lib.types.path;
10 opendkim = "/run/opendkim/opendkim.sock";
11 opendmarc = config.services.opendmarc.socket;
12 openarc = config.services.openarc.socket;
19 config = lib.mkIf (config.myServices.mail.enable || config.myServices.mailBackup.enable) {
23 user = config.services.opendkim.user;
24 group = config.services.opendkim.group;
27 "opendkim/eldiron.private" = {
28 user = config.services.opendkim.user;
29 group = config.services.opendkim.group;
31 text = config.myEnv.mail.dkim.eldiron.private;
33 "opendkim/eldiron.txt" = {
34 user = config.services.opendkim.user;
35 group = config.services.opendkim.group;
38 eldiron._domainkey IN TXT ${config.myEnv.mail.dkim.eldiron.public}'';
41 users.users."${config.services.opendkim.user}".extraGroups = [ "keys" ];
44 socket = "local:${config.myServices.mail.milters.sockets.opendkim}";
45 domains = builtins.concatStringsSep "," (lib.flatten (map
47 (e: "${e.domain}${lib.optionalString (e.domain != "") "."}${zone.name}")
48 (zone.withEmail or [])
50 config.myEnv.dns.masterZones
52 keyPath = config.secrets.fullPaths."opendkim";
54 configFile = pkgs.writeText "opendkim.conf" ''
59 group = config.services.postfix.group;
61 systemd.services.opendkim.serviceConfig.Slice = "mail.slice";
62 systemd.services.opendkim.preStart = lib.mkBefore ''
63 # Skip the prestart script as keys are handled in secrets
66 services.filesWatcher.opendkim = {
69 config.secrets.fullPaths."opendkim/eldiron.private"
73 systemd.services.milter_verify_from = {
74 description = "Verify from milter";
75 after = [ "network.target" ];
76 wantedBy = [ "multi-user.target" ];
82 ExecStart = let python = pkgs.python3.withPackages (p: [ p.pymilter ]);
83 in "${python}/bin/python ${./verify_from.py} -s /run/milter_verify_from/verify_from.sock";
84 RuntimeDirectory = "milter_verify_from";