2020-04-24 23:36:52 +00:00
|
|
|
|
{ config, options, pkgs, lib, ... }:
|
|
|
|
|
|
|
|
|
|
with lib;
|
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
|
|
|
|
cfg = config.services.rspamd;
|
2021-12-19 01:06:50 +00:00
|
|
|
|
opt = options.services.rspamd;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
postfixCfg = config.services.postfix;
|
|
|
|
|
|
|
|
|
|
bindSocketOpts = {options, config, ... }: {
|
|
|
|
|
options = {
|
|
|
|
|
socket = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
example = "localhost:11333";
|
2022-09-09 14:08:57 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Socket for this worker to listen on in a format acceptable by rspamd.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
mode = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "0644";
|
2022-09-09 14:08:57 +00:00
|
|
|
|
description = lib.mdDoc "Mode to set on unix socket";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
owner = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "${cfg.user}";
|
2022-09-09 14:08:57 +00:00
|
|
|
|
description = lib.mdDoc "Owner to set on unix socket";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
group = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "${cfg.group}";
|
2022-09-09 14:08:57 +00:00
|
|
|
|
description = lib.mdDoc "Group to set on unix socket";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
rawEntry = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
internal = true;
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
config.rawEntry = let
|
|
|
|
|
maybeOption = option:
|
|
|
|
|
optionalString options.${option}.isDefined " ${option}=${config.${option}}";
|
|
|
|
|
in
|
|
|
|
|
if (!(hasPrefix "/" config.socket)) then "${config.socket}"
|
|
|
|
|
else "${config.socket}${maybeOption "mode"}${maybeOption "owner"}${maybeOption "group"}";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
traceWarning = w: x: builtins.trace "[1;31mwarning: ${w}[0m" x;
|
|
|
|
|
|
|
|
|
|
workerOpts = { name, options, ... }: {
|
|
|
|
|
options = {
|
|
|
|
|
enable = mkOption {
|
|
|
|
|
type = types.nullOr types.bool;
|
|
|
|
|
default = null;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc "Whether to run the rspamd worker.";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
name = mkOption {
|
|
|
|
|
type = types.nullOr types.str;
|
|
|
|
|
default = name;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc "Name of the worker";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
type = mkOption {
|
|
|
|
|
type = types.nullOr (types.enum [
|
|
|
|
|
"normal" "controller" "fuzzy" "rspamd_proxy" "lua" "proxy"
|
|
|
|
|
]);
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
|
The type of this worker. The type `proxy` is
|
2020-04-24 23:36:52 +00:00
|
|
|
|
deprecated and only kept for backwards compatibility and should be
|
2022-08-12 12:06:08 +00:00
|
|
|
|
replaced with `rspamd_proxy`.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
|
|
|
|
apply = let
|
|
|
|
|
from = "services.rspamd.workers.\"${name}\".type";
|
|
|
|
|
files = options.type.files;
|
|
|
|
|
warning = "The option `${from}` defined in ${showFiles files} has enum value `proxy` which has been renamed to `rspamd_proxy`";
|
|
|
|
|
in x: if x == "proxy" then traceWarning warning "rspamd_proxy" else x;
|
|
|
|
|
};
|
|
|
|
|
bindSockets = mkOption {
|
|
|
|
|
type = types.listOf (types.either types.str (types.submodule bindSocketOpts));
|
|
|
|
|
default = [];
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
List of sockets to listen, in format acceptable by rspamd
|
|
|
|
|
'';
|
|
|
|
|
example = [{
|
|
|
|
|
socket = "/run/rspamd.sock";
|
|
|
|
|
mode = "0666";
|
|
|
|
|
owner = "rspamd";
|
|
|
|
|
} "*:11333"];
|
|
|
|
|
apply = value: map (each: if (isString each)
|
|
|
|
|
then if (isUnixSocket each)
|
|
|
|
|
then {socket = each; owner = cfg.user; group = cfg.group; mode = "0644"; rawEntry = "${each}";}
|
|
|
|
|
else {socket = each; rawEntry = "${each}";}
|
|
|
|
|
else each) value;
|
|
|
|
|
};
|
|
|
|
|
count = mkOption {
|
|
|
|
|
type = types.nullOr types.int;
|
|
|
|
|
default = null;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Number of worker instances to run
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
includes = mkOption {
|
|
|
|
|
type = types.listOf types.str;
|
|
|
|
|
default = [];
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
List of files to include in configuration
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
extraConfig = mkOption {
|
|
|
|
|
type = types.lines;
|
|
|
|
|
default = "";
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc "Additional entries to put verbatim into worker section of rspamd config file.";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
config = mkIf (name == "normal" || name == "controller" || name == "fuzzy" || name == "rspamd_proxy") {
|
|
|
|
|
type = mkDefault name;
|
|
|
|
|
includes = mkDefault [ "$CONFDIR/worker-${if name == "rspamd_proxy" then "proxy" else name}.inc" ];
|
|
|
|
|
bindSockets =
|
|
|
|
|
let
|
|
|
|
|
unixSocket = name: {
|
|
|
|
|
mode = "0660";
|
|
|
|
|
socket = "/run/rspamd/${name}.sock";
|
|
|
|
|
owner = cfg.user;
|
|
|
|
|
group = cfg.group;
|
|
|
|
|
};
|
|
|
|
|
in mkDefault (if name == "normal" then [(unixSocket "rspamd")]
|
|
|
|
|
else if name == "controller" then [ "localhost:11334" ]
|
|
|
|
|
else if name == "rspamd_proxy" then [ (unixSocket "proxy") ]
|
|
|
|
|
else [] );
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
isUnixSocket = socket: hasPrefix "/" (if (isString socket) then socket else socket.socket);
|
|
|
|
|
|
|
|
|
|
mkBindSockets = enabled: socks: concatStringsSep "\n "
|
|
|
|
|
(flatten (map (each: "bind_socket = \"${each.rawEntry}\";") socks));
|
|
|
|
|
|
|
|
|
|
rspamdConfFile = pkgs.writeText "rspamd.conf"
|
|
|
|
|
''
|
|
|
|
|
.include "$CONFDIR/common.conf"
|
|
|
|
|
|
|
|
|
|
options {
|
|
|
|
|
pidfile = "$RUNDIR/rspamd.pid";
|
|
|
|
|
.include "$CONFDIR/options.inc"
|
|
|
|
|
.include(try=true; priority=1,duplicate=merge) "$LOCAL_CONFDIR/local.d/options.inc"
|
|
|
|
|
.include(try=true; priority=10) "$LOCAL_CONFDIR/override.d/options.inc"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
logging {
|
|
|
|
|
type = "syslog";
|
|
|
|
|
.include "$CONFDIR/logging.inc"
|
|
|
|
|
.include(try=true; priority=1,duplicate=merge) "$LOCAL_CONFDIR/local.d/logging.inc"
|
|
|
|
|
.include(try=true; priority=10) "$LOCAL_CONFDIR/override.d/logging.inc"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
${concatStringsSep "\n" (mapAttrsToList (name: value: let
|
|
|
|
|
includeName = if name == "rspamd_proxy" then "proxy" else name;
|
2020-10-27 00:29:36 +00:00
|
|
|
|
tryOverride = boolToString (value.extraConfig == "");
|
2020-04-24 23:36:52 +00:00
|
|
|
|
in ''
|
|
|
|
|
worker "${value.type}" {
|
|
|
|
|
type = "${value.type}";
|
|
|
|
|
${optionalString (value.enable != null)
|
|
|
|
|
"enabled = ${if value.enable != false then "yes" else "no"};"}
|
|
|
|
|
${mkBindSockets value.enable value.bindSockets}
|
|
|
|
|
${optionalString (value.count != null) "count = ${toString value.count};"}
|
|
|
|
|
${concatStringsSep "\n " (map (each: ".include \"${each}\"") value.includes)}
|
|
|
|
|
.include(try=true; priority=1,duplicate=merge) "$LOCAL_CONFDIR/local.d/worker-${includeName}.inc"
|
|
|
|
|
.include(try=${tryOverride}; priority=10) "$LOCAL_CONFDIR/override.d/worker-${includeName}.inc"
|
|
|
|
|
}
|
|
|
|
|
'') cfg.workers)}
|
|
|
|
|
|
|
|
|
|
${optionalString (cfg.extraConfig != "") ''
|
|
|
|
|
.include(priority=10) "$LOCAL_CONFDIR/override.d/extra-config.inc"
|
|
|
|
|
''}
|
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
filterFiles = files: filterAttrs (n: v: v.enable) files;
|
|
|
|
|
rspamdDir = pkgs.linkFarm "etc-rspamd-dir" (
|
|
|
|
|
(mapAttrsToList (name: file: { name = "local.d/${name}"; path = file.source; }) (filterFiles cfg.locals)) ++
|
|
|
|
|
(mapAttrsToList (name: file: { name = "override.d/${name}"; path = file.source; }) (filterFiles cfg.overrides)) ++
|
|
|
|
|
(optional (cfg.localLuaRules != null) { name = "rspamd.local.lua"; path = cfg.localLuaRules; }) ++
|
|
|
|
|
[ { name = "rspamd.conf"; path = rspamdConfFile; } ]
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
configFileModule = prefix: { name, config, ... }: {
|
|
|
|
|
options = {
|
|
|
|
|
enable = mkOption {
|
|
|
|
|
type = types.bool;
|
|
|
|
|
default = true;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Whether this file ${prefix} should be generated. This
|
|
|
|
|
option allows specific ${prefix} files to be disabled.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
text = mkOption {
|
|
|
|
|
default = null;
|
|
|
|
|
type = types.nullOr types.lines;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc "Text of the file.";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
source = mkOption {
|
|
|
|
|
type = types.path;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc "Path of the source file.";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
config = {
|
|
|
|
|
source = mkIf (config.text != null) (
|
|
|
|
|
let name' = "rspamd-${prefix}-" + baseNameOf name;
|
|
|
|
|
in mkDefault (pkgs.writeText name' config.text));
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
configOverrides =
|
|
|
|
|
(mapAttrs' (n: v: nameValuePair "worker-${if n == "rspamd_proxy" then "proxy" else n}.inc" {
|
|
|
|
|
text = v.extraConfig;
|
|
|
|
|
})
|
|
|
|
|
(filterAttrs (n: v: v.extraConfig != "") cfg.workers))
|
|
|
|
|
// (if cfg.extraConfig == "" then {} else {
|
|
|
|
|
"extra-config.inc".text = cfg.extraConfig;
|
|
|
|
|
});
|
|
|
|
|
in
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
|
|
|
|
services.rspamd = {
|
|
|
|
|
|
2022-09-09 14:08:57 +00:00
|
|
|
|
enable = mkEnableOption (lib.mdDoc "rspamd, the Rapid spam filtering system");
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
|
|
debug = mkOption {
|
|
|
|
|
type = types.bool;
|
|
|
|
|
default = false;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc "Whether to run the rspamd daemon in debug mode.";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
locals = mkOption {
|
|
|
|
|
type = with types; attrsOf (submodule (configFileModule "locals"));
|
|
|
|
|
default = {};
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
|
Local configuration files, written into {file}`/etc/rspamd/local.d/{name}`.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
2021-10-06 13:57:05 +00:00
|
|
|
|
example = literalExpression ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
{ "redis.conf".source = "/nix/store/.../etc/dir/redis.conf";
|
|
|
|
|
"arc.conf".text = "allow_envfrom_empty = true;";
|
|
|
|
|
}
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
overrides = mkOption {
|
|
|
|
|
type = with types; attrsOf (submodule (configFileModule "overrides"));
|
|
|
|
|
default = {};
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
|
Overridden configuration files, written into {file}`/etc/rspamd/override.d/{name}`.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
2021-10-06 13:57:05 +00:00
|
|
|
|
example = literalExpression ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
{ "redis.conf".source = "/nix/store/.../etc/dir/redis.conf";
|
|
|
|
|
"arc.conf".text = "allow_envfrom_empty = true;";
|
|
|
|
|
}
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
localLuaRules = mkOption {
|
|
|
|
|
default = null;
|
|
|
|
|
type = types.nullOr types.path;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
|
|
|
|
Path of file to link to {file}`/etc/rspamd/rspamd.local.lua` for local
|
2020-04-24 23:36:52 +00:00
|
|
|
|
rules written in Lua
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
workers = mkOption {
|
|
|
|
|
type = with types; attrsOf (submodule workerOpts);
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Attribute set of workers to start.
|
|
|
|
|
'';
|
|
|
|
|
default = {
|
|
|
|
|
normal = {};
|
|
|
|
|
controller = {};
|
|
|
|
|
};
|
2021-10-06 13:57:05 +00:00
|
|
|
|
example = literalExpression ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
{
|
|
|
|
|
normal = {
|
|
|
|
|
includes = [ "$CONFDIR/worker-normal.inc" ];
|
|
|
|
|
bindSockets = [{
|
|
|
|
|
socket = "/run/rspamd/rspamd.sock";
|
|
|
|
|
mode = "0660";
|
2021-12-19 01:06:50 +00:00
|
|
|
|
owner = "''${config.${opt.user}}";
|
|
|
|
|
group = "''${config.${opt.group}}";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
}];
|
|
|
|
|
};
|
|
|
|
|
controller = {
|
|
|
|
|
includes = [ "$CONFDIR/worker-controller.inc" ];
|
|
|
|
|
bindSockets = [ "[::1]:11334" ];
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
extraConfig = mkOption {
|
|
|
|
|
type = types.lines;
|
|
|
|
|
default = "";
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Extra configuration to add at the end of the rspamd configuration
|
|
|
|
|
file.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
user = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "rspamd";
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
User to use when no root privileges are required.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
group = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "rspamd";
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Group to use when no root privileges are required.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
postfix = {
|
|
|
|
|
enable = mkOption {
|
|
|
|
|
type = types.bool;
|
|
|
|
|
default = false;
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc "Add rspamd milter to postfix main.conf";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
config = mkOption {
|
|
|
|
|
type = with types; attrsOf (oneOf [ bool str (listOf str) ]);
|
2022-08-12 12:06:08 +00:00
|
|
|
|
description = lib.mdDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Addon to postfix configuration
|
|
|
|
|
'';
|
|
|
|
|
default = {
|
|
|
|
|
smtpd_milters = ["unix:/run/rspamd/rspamd-milter.sock"];
|
|
|
|
|
non_smtpd_milters = ["unix:/run/rspamd/rspamd-milter.sock"];
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
|
services.rspamd.overrides = configOverrides;
|
|
|
|
|
services.rspamd.workers = mkIf cfg.postfix.enable {
|
|
|
|
|
controller = {};
|
|
|
|
|
rspamd_proxy = {
|
|
|
|
|
bindSockets = [ {
|
|
|
|
|
mode = "0660";
|
|
|
|
|
socket = "/run/rspamd/rspamd-milter.sock";
|
|
|
|
|
owner = cfg.user;
|
|
|
|
|
group = postfixCfg.group;
|
|
|
|
|
} ];
|
|
|
|
|
extraConfig = ''
|
|
|
|
|
upstream "local" {
|
|
|
|
|
default = yes; # Self-scan upstreams are always default
|
|
|
|
|
self_scan = yes; # Enable self-scan
|
|
|
|
|
}
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
services.postfix.config = mkIf cfg.postfix.enable cfg.postfix.config;
|
|
|
|
|
|
2021-08-23 08:02:39 +00:00
|
|
|
|
systemd.services.postfix = mkIf cfg.postfix.enable {
|
|
|
|
|
serviceConfig.SupplementaryGroups = [ postfixCfg.group ];
|
|
|
|
|
};
|
2020-12-03 08:41:04 +00:00
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
|
# Allow users to run 'rspamc' and 'rspamadm'.
|
|
|
|
|
environment.systemPackages = [ pkgs.rspamd ];
|
|
|
|
|
|
|
|
|
|
users.users.${cfg.user} = {
|
|
|
|
|
description = "rspamd daemon";
|
|
|
|
|
uid = config.ids.uids.rspamd;
|
|
|
|
|
group = cfg.group;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
users.groups.${cfg.group} = {
|
|
|
|
|
gid = config.ids.gids.rspamd;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
environment.etc.rspamd.source = rspamdDir;
|
|
|
|
|
|
|
|
|
|
systemd.services.rspamd = {
|
|
|
|
|
description = "Rspamd Service";
|
|
|
|
|
|
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
|
after = [ "network.target" ];
|
|
|
|
|
restartTriggers = [ rspamdDir ];
|
|
|
|
|
|
|
|
|
|
serviceConfig = {
|
2020-12-03 08:41:04 +00:00
|
|
|
|
ExecStart = "${pkgs.rspamd}/bin/rspamd ${optionalString cfg.debug "-d"} -c /etc/rspamd/rspamd.conf -f";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Restart = "always";
|
2020-12-03 08:41:04 +00:00
|
|
|
|
|
|
|
|
|
User = "${cfg.user}";
|
|
|
|
|
Group = "${cfg.group}";
|
|
|
|
|
SupplementaryGroups = mkIf cfg.postfix.enable [ postfixCfg.group ];
|
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
|
RuntimeDirectory = "rspamd";
|
2020-12-03 08:41:04 +00:00
|
|
|
|
RuntimeDirectoryMode = "0755";
|
|
|
|
|
StateDirectory = "rspamd";
|
|
|
|
|
StateDirectoryMode = "0700";
|
|
|
|
|
|
|
|
|
|
AmbientCapabilities = [];
|
2021-05-03 20:48:10 +00:00
|
|
|
|
CapabilityBoundingSet = "";
|
2020-12-03 08:41:04 +00:00
|
|
|
|
DevicePolicy = "closed";
|
|
|
|
|
LockPersonality = true;
|
|
|
|
|
NoNewPrivileges = true;
|
|
|
|
|
PrivateDevices = true;
|
|
|
|
|
PrivateMounts = true;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
PrivateTmp = true;
|
2020-12-03 08:41:04 +00:00
|
|
|
|
# we need to chown socket to rspamd-milter
|
|
|
|
|
PrivateUsers = !cfg.postfix.enable;
|
|
|
|
|
ProtectClock = true;
|
|
|
|
|
ProtectControlGroups = true;
|
|
|
|
|
ProtectHome = true;
|
|
|
|
|
ProtectHostname = true;
|
|
|
|
|
ProtectKernelLogs = true;
|
|
|
|
|
ProtectKernelModules = true;
|
|
|
|
|
ProtectKernelTunables = true;
|
|
|
|
|
ProtectSystem = "strict";
|
|
|
|
|
RemoveIPC = true;
|
|
|
|
|
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" ];
|
|
|
|
|
RestrictNamespaces = true;
|
|
|
|
|
RestrictRealtime = true;
|
|
|
|
|
RestrictSUIDSGID = true;
|
|
|
|
|
SystemCallArchitectures = "native";
|
|
|
|
|
SystemCallFilter = "@system-service";
|
|
|
|
|
UMask = "0077";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
imports = [
|
|
|
|
|
(mkRemovedOptionModule [ "services" "rspamd" "socketActivation" ]
|
2020-11-24 20:58:05 +00:00
|
|
|
|
"Socket activation never worked correctly and could at this time not be fixed and so was removed")
|
2020-04-24 23:36:52 +00:00
|
|
|
|
(mkRenamedOptionModule [ "services" "rspamd" "bindSocket" ] [ "services" "rspamd" "workers" "normal" "bindSockets" ])
|
|
|
|
|
(mkRenamedOptionModule [ "services" "rspamd" "bindUISocket" ] [ "services" "rspamd" "workers" "controller" "bindSockets" ])
|
|
|
|
|
(mkRemovedOptionModule [ "services" "rmilter" ] "Use services.rspamd.* instead to set up milter service")
|
|
|
|
|
];
|
|
|
|
|
}
|