83627f9931
GitOrigin-RevId: 2893f56de08021cffd9b6b6dfc70fd9ccd51eb60
146 lines
4.6 KiB
Nix
146 lines
4.6 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.stalwart-mail;
|
|
configFormat = pkgs.formats.toml { };
|
|
configFile = configFormat.generate "stalwart-mail.toml" cfg.settings;
|
|
dataDir = "/var/lib/stalwart-mail";
|
|
useLegacyStorage = versionOlder config.system.stateVersion "24.11";
|
|
|
|
in {
|
|
options.services.stalwart-mail = {
|
|
enable = mkEnableOption "the Stalwart all-in-one email server";
|
|
|
|
package = mkPackageOption pkgs "stalwart-mail" { };
|
|
|
|
settings = mkOption {
|
|
inherit (configFormat) type;
|
|
default = { };
|
|
description = ''
|
|
Configuration options for the Stalwart email server.
|
|
See <https://stalw.art/docs/category/configuration> for available options.
|
|
|
|
By default, the module is configured to store everything locally.
|
|
'';
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
# Default config: all local
|
|
services.stalwart-mail.settings = {
|
|
tracer.stdout = {
|
|
type = mkDefault "stdout";
|
|
level = mkDefault "info";
|
|
ansi = mkDefault false; # no colour markers to journald
|
|
enable = mkDefault true;
|
|
};
|
|
store = if useLegacyStorage then {
|
|
# structured data in SQLite, blobs on filesystem
|
|
db.type = mkDefault "sqlite";
|
|
db.path = mkDefault "${dataDir}/data/index.sqlite3";
|
|
fs.type = mkDefault "fs";
|
|
fs.path = mkDefault "${dataDir}/data/blobs";
|
|
} else {
|
|
# everything in RocksDB
|
|
db.type = mkDefault "rocksdb";
|
|
db.path = mkDefault "${dataDir}/db";
|
|
db.compression = mkDefault "lz4";
|
|
};
|
|
storage.data = mkDefault "db";
|
|
storage.fts = mkDefault "db";
|
|
storage.lookup = mkDefault "db";
|
|
storage.blob = mkDefault (if useLegacyStorage then "fs" else "db");
|
|
directory.internal.type = mkDefault "internal";
|
|
directory.internal.store = mkDefault "db";
|
|
storage.directory = mkDefault "internal";
|
|
resolver.type = mkDefault "system";
|
|
resolver.public-suffix = lib.mkDefault [
|
|
"file://${pkgs.publicsuffix-list}/share/publicsuffix/public_suffix_list.dat"
|
|
];
|
|
config.resource = {
|
|
spam-filter = lib.mkDefault "file://${cfg.package}/etc/stalwart/spamfilter.toml";
|
|
};
|
|
};
|
|
|
|
# This service stores a potentially large amount of data.
|
|
# Running it as a dynamic user would force chown to be run everytime the
|
|
# service is restarted on a potentially large number of files.
|
|
# That would cause unnecessary and unwanted delays.
|
|
users = {
|
|
groups.stalwart-mail = { };
|
|
users.stalwart-mail = {
|
|
isSystemUser = true;
|
|
group = "stalwart-mail";
|
|
};
|
|
};
|
|
|
|
systemd = {
|
|
packages = [ cfg.package ];
|
|
services.stalwart-mail = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "local-fs.target" "network.target" ];
|
|
|
|
preStart = if useLegacyStorage then ''
|
|
mkdir -p ${dataDir}/data/blobs
|
|
'' else ''
|
|
mkdir -p ${dataDir}/db
|
|
'';
|
|
|
|
serviceConfig = {
|
|
ExecStart = [
|
|
""
|
|
"${cfg.package}/bin/stalwart-mail --config=${configFile}"
|
|
];
|
|
|
|
StandardOutput = "journal";
|
|
StandardError = "journal";
|
|
|
|
StateDirectory = "stalwart-mail";
|
|
|
|
# Bind standard privileged ports
|
|
AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ];
|
|
CapabilityBoundingSet = [ "CAP_NET_BIND_SERVICE" ];
|
|
|
|
# Hardening
|
|
DeviceAllow = [ "" ];
|
|
LockPersonality = true;
|
|
MemoryDenyWriteExecute = true;
|
|
PrivateDevices = true;
|
|
PrivateUsers = false; # incompatible with CAP_NET_BIND_SERVICE
|
|
ProcSubset = "pid";
|
|
PrivateTmp = true;
|
|
ProtectClock = true;
|
|
ProtectControlGroups = true;
|
|
ProtectHome = true;
|
|
ProtectHostname = true;
|
|
ProtectKernelLogs = true;
|
|
ProtectKernelModules = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectProc = "invisible";
|
|
ProtectSystem = "strict";
|
|
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" ];
|
|
RestrictNamespaces = true;
|
|
RestrictRealtime = true;
|
|
RestrictSUIDSGID = true;
|
|
SystemCallArchitectures = "native";
|
|
SystemCallFilter = [ "@system-service" "~@privileged" ];
|
|
UMask = "0077";
|
|
};
|
|
unitConfig.ConditionPathExists = [
|
|
""
|
|
"${configFile}"
|
|
];
|
|
};
|
|
};
|
|
|
|
# Make admin commands available in the shell
|
|
environment.systemPackages = [ cfg.package ];
|
|
};
|
|
|
|
meta = {
|
|
maintainers = with maintainers; [ happysalada pacien onny ];
|
|
};
|
|
}
|