x509: send the key once for root, not one per service
authorJulien Moutinho <julm@sourcephile.fr>
Fri, 31 Jan 2020 01:58:07 +0000 (02:58 +0100)
committerJulien Moutinho <julm@sourcephile.fr>
Fri, 31 Jan 2020 01:58:07 +0000 (02:58 +0100)
servers/mermet/dovecot.nix
servers/mermet/keys.nix [new file with mode: 0644]
servers/mermet/nginx.nix
servers/mermet/openldap/sourcephile.nix
servers/mermet/postfix.nix
servers/mermet/production.nix
servers/mermet/staging.nix
shell/x509.nix

index 3daf41e366fe6222065adc3b4d6abbd50ff22535..5b3364b8eda106960c7fa6ba787d4fb241c11f91 100644 (file)
@@ -60,470 +60,461 @@ let
   };
 in
 {
-  imports = [
-    dovecot/autoconfig.nix
+imports = [
+  dovecot/autoconfig.nix
+];
+systemd.services.dovecot2 = {
+  after = [
+    "postfix.service"
+    "openldap.service"
+    "${networking.domain}.key.pem-key.service"
   ];
-  systemd.services.dovecot2 = {
-    after = [
-      "postfix.service"
-      "openldap.service"
-      "dovecot.${networking.domainBase}.key.pem-key.service"
-    ];
-  };
-  deployment.keys = {
-    "dovecot.${networking.domainBase}.key.pem" = {
-      text        = pass "x509/${networking.domainBase}/key.pem";
-      user        = dovecot2.user;
-      group       = "root";
-      destDir     = "/run/keys/";
-      permissions = "0400"; # WARNING: not enforced when deployment.storeKeysOnMachine = true
-    };
+};
+#users.users."${dovecot2.mailUser}".isSystemUser = true; # Fix nixpkgs
+services.dovecot2 = {
+  enable    = true;
+  modules   = [
+    pkgs.dovecot_pigeonhole
+    pkgs.dovecot_fts_xapian
+  ];
+  enablePAM = false;
+  enableImap = true;
+  enableLmtp = true;
+  enablePop3 = true;
+  protocols = [ "sieve" ];
+  mailLocation = "sdbox:${stateDir}/mail/%d/%n/mail.d:UTF-8:CONTROL=${stateDir}/control/%d/%n:INDEX=${stateDir}/index/%d/%n";
+  createMailUser = false;
+  mailUser = "";
+  mailGroup = "";
+  sslServerCert = null;
+  sieveScripts = {
+    global = dovecot/sieve/global;
   };
-  #users.users."${dovecot2.mailUser}".isSystemUser = true; # Fix nixpkgs
-  services.dovecot2 = {
-    enable    = true;
-    modules   = [
-      pkgs.dovecot_pigeonhole
-      pkgs.dovecot_fts_xapian
-    ];
-    enablePAM = false;
-    enableImap = true;
-    enableLmtp = true;
-    enablePop3 = true;
-    protocols = [ "sieve" ];
-    mailLocation = "sdbox:${stateDir}/mail/%d/%n/mail.d:UTF-8:CONTROL=${stateDir}/control/%d/%n:INDEX=${stateDir}/index/%d/%n";
-    createMailUser = false;
-    mailUser = "";
-    mailGroup = "";
-    sslServerCert = null;
-    sieveScripts = {
-      global = dovecot/sieve/global;
-    };
-    extraConfig = ''
-      auth_verbose = no
-      auth_debug = no
-      mail_debug = yes
-      verbose_ssl = no
-      log_timestamp = "%Y-%m-%d %H:%M:%S "
+  extraConfig = ''
+    auth_verbose = no
+    auth_debug = no
+    mail_debug = yes
+    verbose_ssl = no
+    log_timestamp = "%Y-%m-%d %H:%M:%S "
 
-      ssl = required
-      ssl_dh = <${../../../sec/openssl/dh.pem}
-      ssl_cipher_list = HIGH:!LOW:!SSLv2:!EXP:!aNULL
-      ssl_cert = <${loadFile (../../../sec + "/openssl/${networking.domainBase}/cert.self-signed.pem")}
-      ssl_key = </run/keys/dovecot.${networking.domainBase}.key.pem
-      #ssl_ca = <''${caPath}
-      #ssl_verify_client_cert = yes
+    ssl = required
+    ssl_dh = <${../../../sec/openssl/dh.pem}
+    ssl_cipher_list = HIGH:!LOW:!SSLv2:!EXP:!aNULL
+    ssl_cert = <${loadFile (../../../sec + "/openssl/${networking.domain}/cert.self-signed.pem")}
+    ssl_key = </run/keys/${networking.domain}.key.pem
+    #ssl_ca = <''${caPath}
+    #ssl_verify_client_cert = yes
 
-      listen = *
-      # If needed, may be overrided by userdb_mail
-      mail_home = ${stateDir}/mail/%d/%n
-      # Read multiple mails in parallel, improves performance
-      mail_prefetch_count = 20
-      # Default VSZ (virtual memory size) limit for service processes. This is mainly
-      # intended to catch and kill processes that leak memory before they eat up everything.
-      # Increased for fts_xapian.
-      default_vsz_limit = 1G
+    listen = *
+    # If needed, may be overrided by userdb_mail
+    mail_home = ${stateDir}/mail/%d/%n
+    # Read multiple mails in parallel, improves performance
+    mail_prefetch_count = 20
+    # Default VSZ (virtual memory size) limit for service processes. This is mainly
+    # intended to catch and kill processes that leak memory before they eat up everything.
+    # Increased for fts_xapian.
+    default_vsz_limit = 1G
 
-      passdb {
-        driver = ldap
-        args = ${loadFile (dovecot/ldap + "/${networking.domainBase}.conf")}
-        default_fields = userdb_mail_access_groups=${networking.domainBase}
-        override_fields =
+    passdb {
+      driver = ldap
+      args = ${loadFile (dovecot/ldap + "/${networking.domainBase}.conf")}
+      default_fields = userdb_mail_access_groups=${networking.domainBase}
+      override_fields =
+    }
+    userdb {
+      driver = prefetch
+    }
+    userdb {
+      # NOTE: this userdb is only used by lda.
+      driver = ldap
+      args = ${loadFile (dovecot/ldap + "/${networking.domainBase}.conf")}
+      default_fields = mail_access_groups=${networking.domainBase}
+      override_fields =
+      skip = found
+    }
+    service auth {
+      # FIXME: may be user=dovecot-auth with LDAP?
+      user = root
+      unix_listener auth-userdb {
+        user  = ${dovecot2.user}
+        group = ${dovecot2.group}
+        mode  = 0660
       }
-      userdb {
-        driver = prefetch
-      }
-      userdb {
-        # NOTE: this userdb is only used by lda.
-        driver = ldap
-        args = ${loadFile (dovecot/ldap + "/${networking.domainBase}.conf")}
-        default_fields = mail_access_groups=${networking.domainBase}
-        override_fields =
-        skip = found
-      }
-      service auth {
-        # FIXME: may be user=dovecot-auth with LDAP?
-        user = root
-        unix_listener auth-userdb {
-          user  = ${dovecot2.user}
-          group = ${dovecot2.group}
-          mode  = 0660
-        }
-        unix_listener /var/lib/postfix/queue/private/auth {
-          user  = ${postfix.user}
-          group = ${postfix.group}
-          mode  = 0660
-        }
+      unix_listener /var/lib/postfix/queue/private/auth {
+        user  = ${postfix.user}
+        group = ${postfix.group}
+        mode  = 0660
       }
-      auth_cache_verify_password_with_worker = yes
-      # NOTE: if needed, may be overrided by userdb_mail
-      # NOTE: INDEX and CONTROL are on a partition without quota, as explain in the doc.
-      # SEE: http://wiki2.dovecot.org/Quota/FS
-      auth_mechanisms = plain login
-      # NOTE: postfix does not supply a client cert.
-      auth_ssl_require_client_cert = no
-      #auth_ssl_username_from_cert = yes
-      # NOTE: lowercase the username, help with LDAP?
-      auth_username_format = %Lu
-      # NOTE: sync with LDAP's data.
-      first_valid_uid = 1000
-      disable_plaintext_auth = yes
+    }
+    auth_cache_verify_password_with_worker = yes
+    # NOTE: if needed, may be overrided by userdb_mail
+    # NOTE: INDEX and CONTROL are on a partition without quota, as explain in the doc.
+    # SEE: http://wiki2.dovecot.org/Quota/FS
+    auth_mechanisms = plain login
+    # NOTE: postfix does not supply a client cert.
+    auth_ssl_require_client_cert = no
+    #auth_ssl_username_from_cert = yes
+    # NOTE: lowercase the username, help with LDAP?
+    auth_username_format = %Lu
+    # NOTE: sync with LDAP's data.
+    first_valid_uid = 1000
+    disable_plaintext_auth = yes
 
-      #passdb {
-      #  driver = passwd-file
-      #  args   = scheme=crypt username_format=%n ${stateDir}/passwd/%d
-      #}
-      #userdb {
-      #  # NOTE: this userdb is only used by LDA.
-      #  driver = passwd-file
-      #  args = username_format=%n ${stateDir}/passwd/%d
-      #  #default_fields = home=${stateDir}/mail/%d/%n
-      #  skip = found
-      #}
+    #passdb {
+    #  driver = passwd-file
+    #  args   = scheme=crypt username_format=%n ${stateDir}/passwd/%d
+    #}
+    #userdb {
+    #  # NOTE: this userdb is only used by LDA.
+    #  driver = passwd-file
+    #  args = username_format=%n ${stateDir}/passwd/%d
+    #  #default_fields = home=${stateDir}/mail/%d/%n
+    #  skip = found
+    #}
 
-      # No dirty syncs for maildir: locations which may be used directly by neomutt
-      maildir_very_dirty_syncs = no
-      namespace Inbox {
-        type      = private
-        inbox     = yes
-        hidden    = no
-        list      = yes
-        prefix    =
-        separator = +
-      }
-      namespace Shared {
-        type = shared
-        #list = children
-        # NOTE: always listed in the LIST command.
-        list = yes
-        # NOTE: how to access the other users' mailboxes.
-        # NOTE: %var expands to the logged in user's variable, while
-        #       %%var expands to the other users' variables.
-        # NOTE: INDEX and CONTROL are shared, INDEXPVT is not.
-        location = sdbox:${stateDir}/mail/%%d/%%n/${stateDir}/mail.d:UTF-8:CONTROL=${stateDir}/control/%%d/%%n/Shared:INDEX=${stateDir}/index/%%d/%%n/Shared:INDEXPVT=${stateDir}/index/%d/%n/Shared/%%n
-        prefix = Partages+%%n+
-        separator = +
-        subscriptions = yes
-      }
-      mail_plugins = $mail_plugins virtual
-      namespace Virtual {
-        prefix = Virtual+
-        separator = +
-        hidden = no
-        list = yes
-        subscriptions = no
-        location = virtual:${dovecot-virtual}:UTF-8:INDEX=${stateDir}/index/%d/%n/virtual
-      }
+    # No dirty syncs for maildir: locations which may be used directly by neomutt
+    maildir_very_dirty_syncs = no
+    namespace Inbox {
+      type      = private
+      inbox     = yes
+      hidden    = no
+      list      = yes
+      prefix    =
+      separator = +
+    }
+    namespace Shared {
+      type = shared
+      #list = children
+      # NOTE: always listed in the LIST command.
+      list = yes
+      # NOTE: how to access the other users' mailboxes.
+      # NOTE: %var expands to the logged in user's variable, while
+      #       %%var expands to the other users' variables.
+      # NOTE: INDEX and CONTROL are shared, INDEXPVT is not.
+      location = sdbox:${stateDir}/mail/%%d/%%n/${stateDir}/mail.d:UTF-8:CONTROL=${stateDir}/control/%%d/%%n/Shared:INDEX=${stateDir}/index/%%d/%%n/Shared:INDEXPVT=${stateDir}/index/%d/%n/Shared/%%n
+      prefix = Partages+%%n+
+      separator = +
+      subscriptions = yes
+    }
+    mail_plugins = $mail_plugins virtual
+    namespace Virtual {
+      prefix = Virtual+
+      separator = +
+      hidden = no
+      list = yes
+      subscriptions = no
+      location = virtual:${dovecot-virtual}:UTF-8:INDEX=${stateDir}/index/%d/%n/virtual
+    }
 
-      mail_plugins = $mail_plugins acl
-      plugin {
-        acl = vfile:/etc/dovecot/acl/global.d
-        acl_anyone = allow
-        # NOTE: to let users LIST mailboxes shared by other users,
-        #       Dovecot needs a shared mailbox dictionary.
-        # FIXME: %d not working with userdb ldap
-        acl_shared_dict = file:${stateDir}/acl/%d/acl.db
-      }
+    mail_plugins = $mail_plugins acl
+    plugin {
+      acl = vfile:/etc/dovecot/acl/global.d
+      acl_anyone = allow
+      # NOTE: to let users LIST mailboxes shared by other users,
+      #       Dovecot needs a shared mailbox dictionary.
+      # FIXME: %d not working with userdb ldap
+      acl_shared_dict = file:${stateDir}/acl/%d/acl.db
+    }
 
-      mail_plugins = $mail_plugins fts fts_xapian
-      plugin {
-        plugin = fts fts_xapian
-        fts = xapian
-        fts_autoindex = yes
-        fts_autoindex_exclude = \Junk
-        fts_autoindex_exclude2 = \Trash
-        fts_enforced = yes
-        # 2 and 20 are the NGram values for header fields, which means the
-        # keywords created for fields (To, Cc, ...) are between is 2 and 20 chars long.
-        # Full words are also added by default.
-        fts_xapian = partial=2 full=20 verbose=0
-      }
+    mail_plugins = $mail_plugins fts fts_xapian
+    plugin {
+      plugin = fts fts_xapian
+      fts = xapian
+      fts_autoindex = yes
+      fts_autoindex_exclude = \Junk
+      fts_autoindex_exclude2 = \Trash
+      fts_enforced = yes
+      # 2 and 20 are the NGram values for header fields, which means the
+      # keywords created for fields (To, Cc, ...) are between is 2 and 20 chars long.
+      # Full words are also added by default.
+      fts_xapian = partial=2 full=20 verbose=0
+    }
 
-      mail_plugins = $mail_plugins quota
-      plugin {
-        quota = maildir:User quota
-        quota_rule = *:storage=256M
-        quota_rule2 = Trash:storage=+64M
-        quota_max_mail_size = 20M
-        #quota_exceeded_message = </path/to/quota_exceeded_message.txt
-        quota_warning  = storage=95%% quota-warning 95 %u
-        quota_warning2 = storage=80%% quota-warning 80 %u
-        quota_warning3 = -storage=100%% quota-warning below %u
-      }
+    mail_plugins = $mail_plugins quota
+    plugin {
+      quota = maildir:User quota
+      quota_rule = *:storage=256M
+      quota_rule2 = Trash:storage=+64M
+      quota_max_mail_size = 20M
+      #quota_exceeded_message = </path/to/quota_exceeded_message.txt
+      quota_warning  = storage=95%% quota-warning 95 %u
+      quota_warning2 = storage=80%% quota-warning 80 %u
+      quota_warning3 = -storage=100%% quota-warning below %u
+    }
 
-      protocol lda {
-        auth_socket_path = /var/run/dovecot/auth-userdb
-        hostname         = ${networking.domain}
-        info_log_path    =
-        log_path         =
-        mail_plugins     = $mail_plugins sieve
-        postmaster_address = postmaster+dovecot+lda@${networking.domain}
-        syslog_facility = mail
-      }
-      lda_mailbox_autocreate = yes
-      lda_mailbox_autosubscribe = yes
+    protocol lda {
+      auth_socket_path = /var/run/dovecot/auth-userdb
+      hostname         = ${networking.domain}
+      info_log_path    =
+      log_path         =
+      mail_plugins     = $mail_plugins sieve
+      postmaster_address = postmaster+dovecot+lda@${networking.domain}
+      syslog_facility = mail
+    }
+    lda_mailbox_autocreate = yes
+    lda_mailbox_autosubscribe = yes
 
-      protocol lmtp {
-        #info_log_path = /tmp/dovecot-lmtp.log
-        mail_plugins = $mail_plugins sieve
-        postmaster_address = postmaster+dovecot+lmtp@${networking.domain}
-      }
-      service lmtp {
-        #executable = lmtp -L
-        process_min_avail = ${toString config.nix.maxJobs}
-        unix_listener /var/lib/postfix/queue/private/dovecot-lmtp {
-          user  = ${postfix.user}
-          group = ${postfix.group}
-          mode  = 0600
-        }
-        #user = mail
-      }
-      plugin {
-        # Let extension.sieve do the handling of the detail
-        #lmtp_save_to_detail_mailbox = yes
-        recipient_delimiter = ${postfix.recipientDelimiter}
+    protocol lmtp {
+      #info_log_path = /tmp/dovecot-lmtp.log
+      mail_plugins = $mail_plugins sieve
+      postmaster_address = postmaster+dovecot+lmtp@${networking.domain}
+    }
+    service lmtp {
+      #executable = lmtp -L
+      process_min_avail = ${toString config.nix.maxJobs}
+      unix_listener /var/lib/postfix/queue/private/dovecot-lmtp {
+        user  = ${postfix.user}
+        group = ${postfix.group}
+        mode  = 0600
       }
+      #user = mail
+    }
+    plugin {
+      # Let extension.sieve do the handling of the detail
+      #lmtp_save_to_detail_mailbox = yes
+      recipient_delimiter = ${postfix.recipientDelimiter}
+    }
 
-      service imap {
-        # Most of the memory goes to mmap()ing files.
-        # You may need to increase this limit if you have huge mailboxes.
-        #vsz_limit =
-        process_limit = 1024
-      }
-      service imap-login {
-        #inet_listener imap {
-        #  address = 127.0.0.1
-        #  port    = 143
-        #  ssl     = no
-        #}
-        inet_listener imaps {
-          port = 993
-          ssl  = yes
-        }
+    service imap {
+      # Most of the memory goes to mmap()ing files.
+      # You may need to increase this limit if you have huge mailboxes.
+      #vsz_limit =
+      process_limit = 1024
+    }
+    service imap-login {
+      #inet_listener imap {
+      #  address = 127.0.0.1
+      #  port    = 143
+      #  ssl     = no
+      #}
+      inet_listener imaps {
+        port = 993
+        ssl  = yes
       }
-      # Store METADATA information within user's HOME directory
-      mail_attribute_dict = file:%h/dovecot-attributes
-      # If you have Dovecot v2.2.8+ you may get a significant performance improvement with fetch-headers:
-      imapc_features = $imapc_features fetch-headers
-      protocol imap {
-        #mail_max_userip_connections = 10
-        mail_plugins = $mail_plugins imap_acl imap_quota imap_sieve virtual
-        imap_metadata = yes
+    }
+    # Store METADATA information within user's HOME directory
+    mail_attribute_dict = file:%h/dovecot-attributes
+    # If you have Dovecot v2.2.8+ you may get a significant performance improvement with fetch-headers:
+    imapc_features = $imapc_features fetch-headers
+    protocol imap {
+      #mail_max_userip_connections = 10
+      mail_plugins = $mail_plugins imap_acl imap_quota imap_sieve virtual
+      imap_metadata = yes
 
-        # DOC: https://wiki.dovecot.org/MailboxSettings
-        # Due to a bug in Dovecot v2.2.30+ if special-use flags are used,
-        # SPECIAL-USE needs to be added to post-login CAPABILITY response as RFC 6154 mandates.
-        imap_capability = +SPECIAL-USE
+      # DOC: https://wiki.dovecot.org/MailboxSettings
+      # Due to a bug in Dovecot v2.2.30+ if special-use flags are used,
+      # SPECIAL-USE needs to be added to post-login CAPABILITY response as RFC 6154 mandates.
+      imap_capability = +SPECIAL-USE
 
-        namespace Inbox {
-          mailbox "Archives" {
-            auto = subscribe
-            special_use = \Archive
-          }
-          mailbox "Drafts" {
-            auto = no
-            special_use = \Drafts
-          }
-          mailbox "Brouillons" {
-            auto = subscribe
-            special_use = \Drafts
-          }
-          mailbox "Junk" {
-            auto = no
-            #autoexpunge = 30d
-            special_use = \Junk
-          }
-          mailbox "Spams" {
-            auto = no
-            special_use = \Junk
-          }
-          mailbox "Spam" {
-            auto = no
-            special_use = \Junk
-          }
-          mailbox "Pourriels" {
-            auto = no
-            special_use = \Junk
-          }
-          mailbox "Pourriel" {
-            auto = no
-            special_use = \Junk
-          }
-          mailbox "Sent" {
-            auto = no
-            special_use = \Sent
-          }
-          mailbox "Sent Items" {
-            auto = no
-            special_use = \Sent
-          }
-          mailbox "Sent Messages" {
-            auto = no
-            special_use = \Sent
-          }
-          mailbox "Envoyés" {
-            auto = no
-            special_use = \Sent
-          }
-          mailbox "Trash" {
-            auto = no
-            special_use = \Trash
-            #autoexpunge = 30d
-          }
-          mailbox "Corbeille" {
-            auto = no
-            special_use = \Trash
-          }
+      namespace Inbox {
+        mailbox "Archives" {
+          auto = subscribe
+          special_use = \Archive
+        }
+        mailbox "Drafts" {
+          auto = no
+          special_use = \Drafts
         }
-        namespace Virtual {
-          mailbox All {
-            auto = no
-            comment = All messages from all mailboxes
-            special_use = \All
-          }
-          mailbox Recents {
-            auto = no
-            comment = All messages from all mailboxes arrived in the past 48h
-          }
+        mailbox "Brouillons" {
+          auto = subscribe
+          special_use = \Drafts
+        }
+        mailbox "Junk" {
+          auto = no
+          #autoexpunge = 30d
+          special_use = \Junk
+        }
+        mailbox "Spams" {
+          auto = no
+          special_use = \Junk
+        }
+        mailbox "Spam" {
+          auto = no
+          special_use = \Junk
+        }
+        mailbox "Pourriels" {
+          auto = no
+          special_use = \Junk
+        }
+        mailbox "Pourriel" {
+          auto = no
+          special_use = \Junk
+        }
+        mailbox "Sent" {
+          auto = no
+          special_use = \Sent
+        }
+        mailbox "Sent Items" {
+          auto = no
+          special_use = \Sent
+        }
+        mailbox "Sent Messages" {
+          auto = no
+          special_use = \Sent
+        }
+        mailbox "Envoyés" {
+          auto = no
+          special_use = \Sent
+        }
+        mailbox "Trash" {
+          auto = no
+          special_use = \Trash
+          #autoexpunge = 30d
+        }
+        mailbox "Corbeille" {
+          auto = no
+          special_use = \Trash
+        }
+      }
+      namespace Virtual {
+        mailbox All {
+          auto = no
+          comment = All messages from all mailboxes
+          special_use = \All
+        }
+        mailbox Recents {
+          auto = no
+          comment = All messages from all mailboxes arrived in the past 48h
         }
       }
-      plugin {
-        #sieve_default = file:${stateDir}/mail/%u/default.sieve
-        #sieve_default_name = default
-        sieve_plugins = sieve_imapsieve sieve_extprograms
-        sieve_global_extensions = +vnd.dovecot.pipe +vnd.dovecot.environment
-        #sieve_extensions = +editheader
-        sieve = file:~/sieve.d;active=~/sieve
-        sieve_pipe_bin_dir = ${sieve_pipe_bin_dir}/bin
-        sieve_max_script_size = 1M
-        sieve_quota_max_scripts = 0
-        sieve_quota_max_storage = 10M
-        #sieve_spamtest_max_value = 10
-        #sieve_spamtest_status_header = X-Spam-Score
-        #sieve_spamtest_status_type = strlen
-        sieve_user_log = /var/log/dovecot/%d/sieve.%n.log
-        # Enables support for user Sieve scripts in IMAP
-        #imapsieve_url = sieve://mail.${networking.domain}:4190
+    }
+    plugin {
+      #sieve_default = file:${stateDir}/mail/%u/default.sieve
+      #sieve_default_name = default
+      sieve_plugins = sieve_imapsieve sieve_extprograms
+      sieve_global_extensions = +vnd.dovecot.pipe +vnd.dovecot.environment
+      #sieve_extensions = +editheader
+      sieve = file:~/sieve.d;active=~/sieve
+      sieve_pipe_bin_dir = ${sieve_pipe_bin_dir}/bin
+      sieve_max_script_size = 1M
+      sieve_quota_max_scripts = 0
+      sieve_quota_max_storage = 10M
+      #sieve_spamtest_max_value = 10
+      #sieve_spamtest_status_header = X-Spam-Score
+      #sieve_spamtest_status_type = strlen
+      sieve_user_log = /var/log/dovecot/%d/sieve.%n.log
+      # Enables support for user Sieve scripts in IMAP
+      #imapsieve_url = sieve://mail.${networking.domain}:4190
 
-        # When a flag changes, spam or ham according to the \Junk or \NonJunk flags
-        imapsieve_mailbox1_name = *
-        imapsieve_mailbox1_causes = FLAG
-        imapsieve_mailbox1_before = file:${stateDir}/sieve/global/spam-or-ham.sieve
+      # When a flag changes, spam or ham according to the \Junk or \NonJunk flags
+      imapsieve_mailbox1_name = *
+      imapsieve_mailbox1_causes = FLAG
+      imapsieve_mailbox1_before = file:${stateDir}/sieve/global/spam-or-ham.sieve
 
-        # From elsewhere to Junk folder
-        imapsieve_mailbox2_name = Pourriel
-        imapsieve_mailbox2_causes = COPY APPEND
-        imapsieve_mailbox2_before = file:${stateDir}/sieve/global/report-spam.sieve
+      # From elsewhere to Junk folder
+      imapsieve_mailbox2_name = Pourriel
+      imapsieve_mailbox2_causes = COPY APPEND
+      imapsieve_mailbox2_before = file:${stateDir}/sieve/global/report-spam.sieve
 
-        # From Junk folder to elsewhere
-        imapsieve_mailbox3_name = *
-        imapsieve_mailbox3_from = Pourriel
-        imapsieve_mailbox3_causes = COPY
-        imapsieve_mailbox3_before = file:${stateDir}/sieve/global/report-ham.sieve
-      }
-      protocol sieve {
-        # Maximum number of ManageSieve connections allowed for a user from each IP address.
-        # NOTE: The username is compared case-sensitively.
-        mail_max_userip_connections = 10
+      # From Junk folder to elsewhere
+      imapsieve_mailbox3_name = *
+      imapsieve_mailbox3_from = Pourriel
+      imapsieve_mailbox3_causes = COPY
+      imapsieve_mailbox3_before = file:${stateDir}/sieve/global/report-ham.sieve
+    }
+    protocol sieve {
+      # Maximum number of ManageSieve connections allowed for a user from each IP address.
+      # NOTE: The username is compared case-sensitively.
+      mail_max_userip_connections = 10
 
-        # To fool ManageSieve clients that are focused on CMU's timesieved you can specify
-        # the IMPLEMENTATION capability that the dovecot reports to clients.
-        # For example: 'Cyrus timsieved v2.2.13'
-        managesieve_implementation_string = Dovecot Pigeonhole
+      # To fool ManageSieve clients that are focused on CMU's timesieved you can specify
+      # the IMPLEMENTATION capability that the dovecot reports to clients.
+      # For example: 'Cyrus timsieved v2.2.13'
+      managesieve_implementation_string = Dovecot Pigeonhole
 
-        # The maximum number of compile errors that are returned to the client upon script
-        # upload or script verification.
-        managesieve_max_compile_errors = 5
+      # The maximum number of compile errors that are returned to the client upon script
+      # upload or script verification.
+      managesieve_max_compile_errors = 5
 
-        #mail_max_userip_connections = 10
-        #managesieve_implementation_string = Dovecot Pigeonhole
-        managesieve_max_compile_errors = 5
-        #managesieve_max_line_length = 65536
-        #managesieve_notify_capability = mailto
-        #managesieve_sieve_capability = fileinto reject envelope encoded-character vacation subaddress comparator-i;ascii-numeric relational regex imap4flags copy include variables body enotify environment mailbox date ihave
+      #mail_max_userip_connections = 10
+      #managesieve_implementation_string = Dovecot Pigeonhole
+      managesieve_max_compile_errors = 5
+      #managesieve_max_line_length = 65536
+      #managesieve_notify_capability = mailto
+      #managesieve_sieve_capability = fileinto reject envelope encoded-character vacation subaddress comparator-i;ascii-numeric relational regex imap4flags copy include variables body enotify environment mailbox date ihave
+    }
+    service managesieve-login {
+      inet_listener sieve {
+        port = 4190
+        #ssl  = yes
       }
-      service managesieve-login {
-        inet_listener sieve {
-          port = 4190
-          #ssl  = yes
-        }
 
-        # Number of connections to handle before starting a new process. Typically
-        # the only useful values are 0 (unlimited) or 1. 1 is more secure, but 0
-        # is faster. <doc/wiki/LoginProcess.txt>
-        service_count = 1
+      # Number of connections to handle before starting a new process. Typically
+      # the only useful values are 0 (unlimited) or 1. 1 is more secure, but 0
+      # is faster. <doc/wiki/LoginProcess.txt>
+      service_count = 1
 
-        # Number of processes to always keep waiting for more connections.
-        process_min_avail = 0
-
-        # If you set service_count=0, you probably need to grow this.
-        #vsz_limit = 64M
-      }
+      # Number of processes to always keep waiting for more connections.
+      process_min_avail = 0
 
-      service quota-warning {
-        executable = script ${
-          pkgs.writeScript "quota-warning" ''
-            #!/bin/sh -eu
-            PERCENT=$1
-            USER=$2
-            cat << EOF | ${pkgs.dovecot}/libexec/dovecot/dovecot-lda -d $USER -o
-            "plugin/quota=maildir:User quota:noenforcing"
-            From: postmaster@${networking.domain}
-            Subject: [WARNING] your mailbox is now $PERCENT% full.
+      # If you set service_count=0, you probably need to grow this.
+      #vsz_limit = 64M
+    }
 
-            Please remove some mails to make room for new ones.
-            EOF
-          ''
-        }
-        # use some unprivileged user for executing the quota warnings
-        user = ${dovecot2.user}
-        unix_listener quota-warning {
-        }
-      }
+    service quota-warning {
+      executable = script ${
+        pkgs.writeScript "quota-warning" ''
+          #!/bin/sh -eu
+          PERCENT=$1
+          USER=$2
+          cat << EOF | ${pkgs.dovecot}/libexec/dovecot/dovecot-lda -d $USER -o
+          "plugin/quota=maildir:User quota:noenforcing"
+          From: postmaster@${networking.domain}
+          Subject: [WARNING] your mailbox is now $PERCENT% full.
 
-      protocol pop3 {
-        mail_plugins = $mail_plugins virtual
-        #mail_max_userip_connections = 10
-        # Virtual namespace for the virtual INBOX.
-        # Use a global directory for dovecot-virtual files.
-        #namespace Inbox {
-        #  hidden    = yes
-        #  list      = no
-        #  location  = virtual:''${dovecot-virtual-pop3}/pop3:INDEX=${stateDir}/index/%d/%n/virtual/pop3:LAYOUT=fs
-        #  prefix    = pop3+
-        #}
-        pop3_client_workarounds =
-        pop3_fast_size_lookups = yes
-        pop3_lock_session = yes
-        pop3_no_flag_updates = yes
-        # Use GUIDs to avoid accidental POP3 UIDL changes instead of IMAP UIDs.
-        pop3_uidl_format = %g
+          Please remove some mails to make room for new ones.
+          EOF
+        ''
       }
-      service pop3 {
-        process_limit = 1024
+      # use some unprivileged user for executing the quota warnings
+      user = ${dovecot2.user}
+      unix_listener quota-warning {
       }
-      service pop3-login {
-        inet_listener pop3s {
-          port = 995
-          ssl  = yes
-        }
+    }
+
+    protocol pop3 {
+      mail_plugins = $mail_plugins virtual
+      #mail_max_userip_connections = 10
+      # Virtual namespace for the virtual INBOX.
+      # Use a global directory for dovecot-virtual files.
+      #namespace Inbox {
+      #  hidden    = yes
+      #  list      = no
+      #  location  = virtual:''${dovecot-virtual-pop3}/pop3:INDEX=${stateDir}/index/%d/%n/virtual/pop3:LAYOUT=fs
+      #  prefix    = pop3+
+      #}
+      pop3_client_workarounds =
+      pop3_fast_size_lookups = yes
+      pop3_lock_session = yes
+      pop3_no_flag_updates = yes
+      # Use GUIDs to avoid accidental POP3 UIDL changes instead of IMAP UIDs.
+      pop3_uidl_format = %g
+    }
+    service pop3 {
+      process_limit = 1024
+    }
+    service pop3-login {
+      inet_listener pop3s {
+        port = 995
+        ssl  = yes
       }
-    '';
-    #${lib.concatMapStringsSep "\n"
-    #    (dom: ''
-    #      local_name mail.${dom} {
-    #        #ssl_ca   = <''${caPath}
-    #        ssl_cert = <${x509.cert dom}
-    #        ssl_key  = <${x509.key dom}
-    #        }
-    #    '')
-    #    dovecot2.domains
-    #}
-  };
-  #services.postfix.mapFiles."transport-dovecot" =
-  #  toFile "transport-dovecot"
-  #   (unlines
-  #     (lib.mapAttrsToList
-  #       (dom: {...}: "${transportSubDomain}.${dom} lmtp:unix:private/dovecot-lmtp")
-  #       dovecot2.domains));
+    }
+  '';
+  #${lib.concatMapStringsSep "\n"
+  #    (dom: ''
+  #      local_name mail.${dom} {
+  #        #ssl_ca   = <''${caPath}
+  #        ssl_cert = <${x509.cert dom}
+  #        ssl_key  = <${x509.key dom}
+  #        }
+  #    '')
+  #    dovecot2.domains
+  #}
+};
+#services.postfix.mapFiles."transport-dovecot" =
+#  toFile "transport-dovecot"
+#   (unlines
+#     (lib.mapAttrsToList
+#       (dom: {...}: "${transportSubDomain}.${dom} lmtp:unix:private/dovecot-lmtp")
+#       dovecot2.domains));
 }
diff --git a/servers/mermet/keys.nix b/servers/mermet/keys.nix
new file mode 100644 (file)
index 0000000..5fd26fc
--- /dev/null
@@ -0,0 +1,16 @@
+{ pkgs, lib, config, ... }:
+let
+  inherit (builtins.extraBuiltins) pass;
+  inherit (config) networking;
+in
+{
+  deployment.keys = {
+    "${networking.domain}.key.pem" = {
+      text        = pass "x509/${networking.domain}/key.pem";
+      user        = "root";
+      group       = "root";
+      destDir     = "/run/keys/";
+      permissions = "0400"; # WARNING: not enforced when deployment.storeKeysOnMachine = true
+    };
+  };
+}
index 02e3f4bbeaf88bc6efba064e7aa6c8c8494a1122..6e2901b4bdedc54bdeaab12ee932b42591449e0f 100644 (file)
@@ -1,11 +1,12 @@
 {pkgs, lib, config, system, ...}:
-let inherit (builtins) readFile;
-    inherit (builtins.extraBuiltins) pass;
-    inherit (lib) types;
-    inherit (pkgs.lib) loadFile;
-    inherit (config) networking;
-    inherit (config.services) nginx;
-    domainDir = dom: lib.concatStringsSep "/" (lib.reverseList (lib.splitString "." dom));
+let
+  inherit (builtins) readFile;
+  inherit (builtins.extraBuiltins) pass;
+  inherit (lib) types;
+  inherit (pkgs.lib) loadFile;
+  inherit (config) networking;
+  inherit (config.services) nginx;
+  domainDir = dom: lib.concatStringsSep "/" (lib.reverseList (lib.splitString "." dom));
 in
 {
 imports = [
@@ -29,15 +30,6 @@ options = {
   };
 };
 config = {
-  deployment.keys = {
-    "nginx.${networking.domainBase}.key.pem" = {
-      text        = pass "x509/${networking.domainBase}/key.pem";
-      user        = nginx.user;
-      group       = "root";
-      destDir     = "/run/keys/";
-      permissions = "0400"; # WARNING: not enforced when deployment.storeKeysOnMachine = true
-    };
-  };
   systemd.services.nginx = {
     preStart = lib.mkBefore ''
       install -D -d -o ${nginx.user} -g ${nginx.group} -m 0700 \
@@ -46,7 +38,7 @@ config = {
        ${nginx.logDir}
     '';
     after = [
-      "nginx.${networking.domainBase}.key.pem-key.service"
+      "${networking.domain}.key.pem-key.service"
     ];
   };
   services.nginx = {
@@ -224,8 +216,8 @@ config = {
       forceSSL = false;
       # Convoluted way to load the certificate in the store and using ${networking.domainBase} to find it.
       # NOTE: no ssl_stapling while the certificate remains self-signed.
-      sslCertificate = loadFile (../../../sec + "/openssl/${networking.domainBase}/cert.self-signed.pem");
-      sslCertificateKey = "/run/keys/nginx.${networking.domainBase}.key.pem";
+      sslCertificate = loadFile (../../../sec + "/openssl/${networking.domain}/cert.self-signed.pem");
+      sslCertificateKey = "/run/keys/${networking.domain}.key.pem";
     };
   };
 };
index 6df9495e37a4be36488ed606aac0d17a68fe154e..aa4c1dbd01741241af1d7916045b4354cfe97499 100644 (file)
@@ -163,7 +163,8 @@ in
                 in
                 # I'm personnaly using "maildir:" instead of "sdbox:" to be able to use a local (neo)mutt on it,
                 # bypassing IMAP because (neo)mutt support of IMAP is very bad
-                # (can't even have a decent $folder_format (with %n or %m) working).
+                # (can't even have a decent $folder_format (with %n or %m) working,
+                # neither sorting them by date).
                 "maildir:${stateDir}/mail/${d}/${uid}/mail.d:LAYOUT=maildir++:UTF-8:CONTROL=${stateDir}/control/${d}/${uid}:INDEX=${stateDir}/index/${d}/${uid}";
             }
             #{ uid="sevy"; uidNumber=10001; cn="Séverine Popek"; sn="sévy";
index 4803c1183286a19d6fe450de9e1007e967730cde..bd02fcf986cbde8a519ae127d06cbb4b68c34789 100644 (file)
@@ -22,17 +22,8 @@ in
 {
 systemd.services.postfix.after = [
   "openldap.service"
-  "postfix.${networking.domainBase}.key.pem-key.service"
+  "${networking.domain}.key.pem-key.service"
 ];
-deployment.keys = {
-  "postfix.${networking.domainBase}.key.pem" = {
-    text        = pass "x509/${networking.domainBase}/key.pem";
-    user        = postfix.user;
-    group       = "root";
-    destDir     = "/run/keys/";
-    permissions = "0400"; # WARNING: not enforced when deployment.storeKeysOnMachine = true
-  };
-};
 services.postfix = {
   enable = true;
   aliases = {
@@ -84,8 +75,8 @@ services.postfix = {
     result_format    = %s
     result_attribute = mailForwardingAddress
   '';
-  sslCert = loadFile (../../../sec/openssl + "/${networking.domainBase}/cert.self-signed.pem");
-  sslKey = "/run/keys/postfix.${networking.domainBase}.key.pem";
+  sslCert = loadFile (../../../sec/openssl + "/${networking.domain}/cert.self-signed.pem");
+  sslKey = "/run/keys/${networking.domain}.key.pem";
   #enableSubmission = true;
   #enableSmtp = true;
   destination = [
index b1f0d29d70ff5d59047ea7d929ed953a908d2119..03f43438af4a4ab666343982f75de5a499814372 100644 (file)
@@ -5,7 +5,8 @@
 let inherit (config) networking; in
 {
 imports =
-  [ production/apu2e4.nix
+  [ ./keys.nix
+    production/apu2e4.nix
     production/lesptts.nix
     production/zfs.nix
     production/shorewall.nix
index 232726563709683173a463f552bf9d3433968f7a..1b127e4cec3adcc9c3e92663cb70cbad5a89baf7 100644 (file)
@@ -5,7 +5,8 @@
 let inherit (config) networking; in
 {
 imports =
-  [ staging/shorewall.nix
+  [ ./keys.nix
+    staging/shorewall.nix
   ];
 config = {
   services.nsd.interfaces = [ networking.privateIPv4 ];
index 62e4d9eaeca12d3e23d3edda8c3cfef7651213c7..ae0c601b550920ecc0f86d475920a7b09b16b423 100644 (file)
@@ -1,5 +1,5 @@
 {
-"sourcephile" = {
+"sourcephile.fr" = {
   host = "sourcephile.fr";
   domains = ["*.sourcephile.fr"];
   passPrefix = "x509";