mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-14 01:33:10 +00:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
130 lines
3.6 KiB
Nix
130 lines
3.6 KiB
Nix
{ config, pkgs, lib, ... }:
|
|
|
|
with lib;
|
|
let
|
|
cfg = config.services.zeyple;
|
|
ini = pkgs.formats.ini { };
|
|
|
|
gpgHome = pkgs.runCommand "zeyple-gpg-home" { } ''
|
|
mkdir -p $out
|
|
for file in ${lib.concatStringsSep " " cfg.keys}; do
|
|
${config.programs.gnupg.package}/bin/gpg --homedir="$out" --import "$file"
|
|
done
|
|
|
|
# Remove socket files
|
|
rm -f $out/S.*
|
|
'';
|
|
in {
|
|
options.services.zeyple = {
|
|
enable = mkEnableOption "Zeyple, an utility program to automatically encrypt outgoing emails with GPG";
|
|
|
|
user = mkOption {
|
|
type = types.str;
|
|
default = "zeyple";
|
|
description = ''
|
|
User to run Zeyple as.
|
|
|
|
::: {.note}
|
|
If left as the default value this user will automatically be created
|
|
on system activation, otherwise the sysadmin is responsible for
|
|
ensuring the user exists.
|
|
:::
|
|
'';
|
|
};
|
|
|
|
group = mkOption {
|
|
type = types.str;
|
|
default = "zeyple";
|
|
description = ''
|
|
Group to use to run Zeyple.
|
|
|
|
::: {.note}
|
|
If left as the default value this group will automatically be created
|
|
on system activation, otherwise the sysadmin is responsible for
|
|
ensuring the user exists.
|
|
:::
|
|
'';
|
|
};
|
|
|
|
settings = mkOption {
|
|
type = ini.type;
|
|
default = { };
|
|
description = ''
|
|
Zeyple configuration. refer to
|
|
<https://github.com/infertux/zeyple/blob/master/zeyple/zeyple.conf.example>
|
|
for details on supported values.
|
|
'';
|
|
};
|
|
|
|
keys = mkOption {
|
|
type = with types; listOf path;
|
|
description = "List of public key files that will be imported by gpg.";
|
|
};
|
|
|
|
rotateLogs = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = "Whether to enable rotation of log files.";
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
users.groups = optionalAttrs (cfg.group == "zeyple") { "${cfg.group}" = { }; };
|
|
users.users = optionalAttrs (cfg.user == "zeyple") {
|
|
"${cfg.user}" = {
|
|
isSystemUser = true;
|
|
group = cfg.group;
|
|
};
|
|
};
|
|
|
|
services.zeyple.settings = {
|
|
zeyple = mapAttrs (name: mkDefault) {
|
|
log_file = "/var/log/zeyple/zeyple.log";
|
|
force_encrypt = true;
|
|
};
|
|
|
|
gpg = mapAttrs (name: mkDefault) { home = "${gpgHome}"; };
|
|
|
|
relay = mapAttrs (name: mkDefault) {
|
|
host = "localhost";
|
|
port = 10026;
|
|
};
|
|
};
|
|
|
|
environment.etc."zeyple.conf".source = ini.generate "zeyple.conf" cfg.settings;
|
|
|
|
systemd.tmpfiles.settings."10-zeyple".${cfg.settings.zeyple.log_file}.f = {
|
|
inherit (cfg) user group;
|
|
mode = "0600";
|
|
};
|
|
|
|
services.logrotate = mkIf cfg.rotateLogs {
|
|
enable = true;
|
|
settings.zeyple = {
|
|
files = cfg.settings.zeyple.log_file;
|
|
frequency = "weekly";
|
|
rotate = 5;
|
|
compress = true;
|
|
copytruncate = true;
|
|
};
|
|
};
|
|
|
|
services.postfix.extraMasterConf = ''
|
|
zeyple unix - n n - - pipe
|
|
user=${cfg.user} argv=${pkgs.zeyple}/bin/zeyple ''${recipient}
|
|
|
|
localhost:${toString cfg.settings.relay.port} inet n - n - 10 smtpd
|
|
-o content_filter=
|
|
-o receive_override_options=no_unknown_recipient_checks,no_header_body_checks,no_milters
|
|
-o smtpd_helo_restrictions=
|
|
-o smtpd_client_restrictions=
|
|
-o smtpd_sender_restrictions=
|
|
-o smtpd_recipient_restrictions=permit_mynetworks,reject
|
|
-o mynetworks=127.0.0.0/8,[::1]/128
|
|
-o smtpd_authorized_xforward_hosts=127.0.0.0/8,[::1]/128
|
|
'';
|
|
|
|
services.postfix.extraConfig = "content_filter = zeyple";
|
|
};
|
|
}
|