mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-22 09:20:58 +03:00

After final improvements to the official formatter implementation, this commit now performs the first treewide reformat of Nix files using it. This is part of the implementation of RFC 166. Only "inactive" files are reformatted, meaning only files that aren't being touched by any PR with activity in the past 2 months. This is to avoid conflicts for PRs that might soon be merged. Later we can do a full treewide reformat to get the rest, which should not cause as many conflicts. A CI check has already been running for some time to ensure that new and already-formatted files are formatted, so the files being reformatted here should also stay formatted. This commit was automatically created and can be verified using nix-builda08b3a4d19
.tar.gz \ --argstr baseRevb32a094368
result/bin/apply-formatting $NIXPKGS_PATH
185 lines
6.6 KiB
Nix
185 lines
6.6 KiB
Nix
{
|
|
config,
|
|
pkgs,
|
|
lib,
|
|
...
|
|
}:
|
|
let
|
|
cfg = config.services.schleuder;
|
|
settingsFormat = pkgs.formats.yaml { };
|
|
postfixMap =
|
|
entries: lib.concatStringsSep "\n" (lib.mapAttrsToList (name: value: "${name} ${value}") entries);
|
|
writePostfixMap = name: entries: pkgs.writeText name (postfixMap entries);
|
|
configScript = pkgs.writeScript "schleuder-cfg" ''
|
|
#!${pkgs.runtimeShell}
|
|
set -exuo pipefail
|
|
umask 0077
|
|
${pkgs.yq}/bin/yq \
|
|
--slurpfile overrides <(${pkgs.yq}/bin/yq . <${lib.escapeShellArg cfg.extraSettingsFile}) \
|
|
< ${settingsFormat.generate "schleuder.yml" cfg.settings} \
|
|
'. * $overrides[0]' \
|
|
> /etc/schleuder/schleuder.yml
|
|
chown schleuder: /etc/schleuder/schleuder.yml
|
|
'';
|
|
in
|
|
{
|
|
options.services.schleuder = {
|
|
enable = lib.mkEnableOption "Schleuder secure remailer";
|
|
enablePostfix = lib.mkEnableOption "automatic postfix integration" // {
|
|
default = true;
|
|
};
|
|
lists = lib.mkOption {
|
|
description = ''
|
|
List of list addresses that should be handled by Schleuder.
|
|
|
|
Note that this is only handled by the postfix integration, and
|
|
the setup of the lists, their members and their keys has to be
|
|
performed separately via schleuder's API, using a tool such as
|
|
schleuder-cli.
|
|
'';
|
|
type = lib.types.listOf lib.types.str;
|
|
default = [ ];
|
|
example = [
|
|
"widget-team@example.com"
|
|
"security@example.com"
|
|
];
|
|
};
|
|
/*
|
|
maybe one day....
|
|
domains = lib.mkOption {
|
|
description = "Domains for which all mail should be handled by Schleuder.";
|
|
type = lib.types.listOf lib.types.str;
|
|
default = [];
|
|
example = ["securelists.example.com"];
|
|
};
|
|
*/
|
|
settings = lib.mkOption {
|
|
description = ''
|
|
Settings for schleuder.yml.
|
|
|
|
Check the [example configuration](https://0xacab.org/schleuder/schleuder/blob/master/etc/schleuder.yml) for possible values.
|
|
'';
|
|
type = lib.types.submodule {
|
|
freeformType = settingsFormat.type;
|
|
options.keyserver = lib.mkOption {
|
|
type = lib.types.str;
|
|
description = ''
|
|
Key server from which to fetch and update keys.
|
|
|
|
Note that NixOS uses a different default from upstream, since the upstream default sks-keyservers.net is deprecated.
|
|
'';
|
|
default = "keys.openpgp.org";
|
|
};
|
|
};
|
|
default = { };
|
|
};
|
|
extraSettingsFile = lib.mkOption {
|
|
description = "YAML file to merge into the schleuder config at runtime. This can be used for secrets such as API keys.";
|
|
type = lib.types.nullOr lib.types.path;
|
|
default = null;
|
|
};
|
|
listDefaults = lib.mkOption {
|
|
description = ''
|
|
Default settings for lists (list-defaults.yml).
|
|
|
|
Check the [example configuration](https://0xacab.org/schleuder/schleuder/-/blob/master/etc/list-defaults.yml) for possible values.
|
|
'';
|
|
type = settingsFormat.type;
|
|
default = { };
|
|
};
|
|
};
|
|
config = lib.mkIf cfg.enable {
|
|
assertions = [
|
|
{
|
|
assertion = !(cfg.settings.api ? valid_api_keys);
|
|
message = ''
|
|
services.schleuder.settings.api.valid_api_keys is set. Defining API keys via NixOS config results in them being copied to the world-readable Nix store. Please use the extraSettingsFile option to store API keys in a non-public location.
|
|
'';
|
|
}
|
|
{
|
|
assertion = !(lib.any (db: db ? password) (lib.attrValues cfg.settings.database or { }));
|
|
message = ''
|
|
A password is defined for at least one database in services.schleuder.settings.database. Defining passwords via NixOS config results in them being copied to the world-readable Nix store. Please use the extraSettingsFile option to store database passwords in a non-public location.
|
|
'';
|
|
}
|
|
];
|
|
users.users.schleuder.isSystemUser = true;
|
|
users.users.schleuder.group = "schleuder";
|
|
users.groups.schleuder = { };
|
|
environment.systemPackages = [
|
|
pkgs.schleuder-cli
|
|
];
|
|
services.postfix = lib.mkIf cfg.enablePostfix {
|
|
extraMasterConf = ''
|
|
schleuder unix - n n - - pipe
|
|
flags=DRhu user=schleuder argv=/${pkgs.schleuder}/bin/schleuder work ''${recipient}
|
|
'';
|
|
transport = lib.mkIf (cfg.lists != [ ]) (postfixMap (lib.genAttrs cfg.lists (_: "schleuder:")));
|
|
extraConfig = ''
|
|
schleuder_destination_recipient_limit = 1
|
|
'';
|
|
# review: does this make sense?
|
|
localRecipients = lib.mkIf (cfg.lists != [ ]) cfg.lists;
|
|
};
|
|
systemd.services =
|
|
let
|
|
commonServiceConfig = {
|
|
# We would have liked to use DynamicUser, but since the default
|
|
# database is SQLite and lives in StateDirectory, and that same
|
|
# database needs to be readable from the postfix service, this
|
|
# isn't trivial to do.
|
|
User = "schleuder";
|
|
StateDirectory = "schleuder";
|
|
StateDirectoryMode = "0700";
|
|
};
|
|
in
|
|
{
|
|
schleuder-init = {
|
|
serviceConfig = commonServiceConfig // {
|
|
ExecStartPre = lib.mkIf (cfg.extraSettingsFile != null) [
|
|
"+${configScript}"
|
|
];
|
|
ExecStart = [ "${pkgs.schleuder}/bin/schleuder install" ];
|
|
Type = "oneshot";
|
|
};
|
|
};
|
|
schleuder-api-daemon = {
|
|
after = [
|
|
"local-fs.target"
|
|
"network.target"
|
|
"schleuder-init.service"
|
|
];
|
|
wantedBy = [ "multi-user.target" ];
|
|
requires = [ "schleuder-init.service" ];
|
|
serviceConfig = commonServiceConfig // {
|
|
ExecStart = [ "${pkgs.schleuder}/bin/schleuder-api-daemon" ];
|
|
};
|
|
};
|
|
schleuder-weekly-key-maintenance = {
|
|
after = [
|
|
"local-fs.target"
|
|
"network.target"
|
|
];
|
|
startAt = "weekly";
|
|
serviceConfig = commonServiceConfig // {
|
|
ExecStart = [
|
|
"${pkgs.schleuder}/bin/schleuder refresh_keys"
|
|
"${pkgs.schleuder}/bin/schleuder check_keys"
|
|
];
|
|
};
|
|
};
|
|
};
|
|
|
|
environment.etc."schleuder/schleuder.yml" = lib.mkIf (cfg.extraSettingsFile == null) {
|
|
source = settingsFormat.generate "schleuder.yml" cfg.settings;
|
|
};
|
|
environment.etc."schleuder/list-defaults.yml".source =
|
|
settingsFormat.generate "list-defaults.yml" cfg.listDefaults;
|
|
|
|
services.schleuder = {
|
|
#lists_dir = "/var/lib/schleuder.lists";
|
|
settings.filters_dir = lib.mkDefault "/var/lib/schleuder/filters";
|
|
settings.keyword_handlers_dir = lib.mkDefault "/var/lib/schleuder/keyword_handlers";
|
|
};
|
|
};
|
|
}
|