1 { lib, pkgs, config, ... }:
3 options.myServices.mail.milters.sockets = lib.mkOption {
4 type = lib.types.attrsOf lib.types.path;
6 opendkim = "/run/opendkim/opendkim.sock";
7 opendmarc = "/run/opendmarc/opendmarc.sock";
8 openarc = "/run/openarc/openarc.sock";
15 config = lib.mkIf (config.myServices.mail.enable || config.myServices.mailBackup.enable) {
18 dest = "opendkim/eldiron.private";
19 user = config.services.opendkim.user;
20 group = config.services.opendkim.group;
22 text = config.myEnv.mail.dkim.eldiron.private;
25 dest = "opendkim/eldiron.txt";
26 user = config.services.opendkim.user;
27 group = config.services.opendkim.group;
30 eldiron._domainkey IN TXT ${config.myEnv.mail.dkim.eldiron.public}'';
33 dest = "opendmarc/ignore.hosts";
34 user = config.services.opendmarc.user;
35 group = config.services.opendmarc.group;
38 mxes = lib.attrsets.filterAttrs
42 builtins.concatStringsSep "\n" ([
43 config.myEnv.mail.dmarc.ignore_hosts
44 ] ++ lib.mapAttrsToList (n: v: v.fqdn) mxes);
47 users.users."${config.services.opendkim.user}".extraGroups = [ "keys" ];
50 socket = "local:${config.myServices.mail.milters.sockets.opendkim}";
51 domains = builtins.concatStringsSep "," (lib.flatten (map
53 (e: "${e.domain}${lib.optionalString (e.domain != "") "."}${zone.name}")
54 (zone.withEmail or [])
56 config.myEnv.dns.masterZones
58 keyPath = "${config.secrets.location}/opendkim";
60 configFile = pkgs.writeText "opendkim.conf" ''
65 group = config.services.postfix.group;
67 systemd.services.opendkim.preStart = lib.mkBefore ''
68 # Skip the prestart script as keys are handled in secrets
71 services.filesWatcher.opendkim = {
74 config.secrets.fullPaths."opendkim/eldiron.private"
78 users.users."${config.services.opendmarc.user}".extraGroups = [ "keys" ];
79 services.opendmarc = {
81 socket = "local:${config.myServices.mail.milters.sockets.opendmarc}";
82 configFile = pkgs.writeText "opendmarc.conf" ''
85 FailureReportsBcc postmaster@immae.eu
86 FailureReportsOnNone true
87 FailureReportsSentBy postmaster@immae.eu
88 IgnoreAuthenticatedClients true
89 IgnoreHosts ${config.secrets.fullPaths."opendmarc/ignore.hosts"}
95 group = config.services.postfix.group;
97 services.filesWatcher.opendmarc = {
100 config.secrets.fullPaths."opendmarc/ignore.hosts"
107 socket = "local:${config.myServices.mail.milters.sockets.openarc}";
108 group = config.services.postfix.group;
109 configFile = pkgs.writeText "openarc.conf" ''
110 AuthservID mail.immae.eu
112 KeyFile ${config.secrets.fullPaths."opendkim/eldiron.private"}
119 systemd.services.openarc.postStart = lib.optionalString
120 (lib.strings.hasPrefix "local:" config.services.openarc.socket) ''
121 while [ ! -S ${lib.strings.removePrefix "local:" config.services.openarc.socket} ]; do
124 chmod g+w ${lib.strings.removePrefix "local:" config.services.openarc.socket}
126 services.filesWatcher.openarc = {
129 config.secrets.fullPaths."opendkim/eldiron.private"
133 systemd.services.milter_verify_from = {
134 description = "Verify from milter";
135 after = [ "network.target" ];
136 wantedBy = [ "multi-user.target" ];
141 ExecStart = let python = pkgs.python3.withPackages (p: [ p.pymilter ]);
142 in "${python}/bin/python ${./verify_from.py} -s /run/milter_verify_from/verify_from.sock";
143 RuntimeDirectory = "milter_verify_from";