Change-Id: I47b5313bee84893d405f86aefb3682cda3cfc6d7 Reviewed-on: https://cl.tvl.fyi/c/depot/+/7637 Autosubmit: tazjin <tazjin@tvl.su> Tested-by: BuildkiteCI Reviewed-by: flokli <flokli@flokli.de>
		
			
				
	
	
		
			148 lines
		
	
	
	
		
			3.9 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			148 lines
		
	
	
	
		
			3.9 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| # public-inbox configuration for depot@tvl.su
 | |
| #
 | |
| # The account itself is a Yandex 360 account in the tvl.su organisation, which
 | |
| # is accessed via IMAP. Yandex takes care of spam filtering for us, so there is
 | |
| # no particular SpamAssassin or other configuration.
 | |
| { config, depot, lib, pkgs, ... }:
 | |
| 
 | |
| let
 | |
|   cfg = config.services.depot.inbox;
 | |
| 
 | |
|   imapConfig = pkgs.writeText "offlineimaprc" ''
 | |
|     [general]
 | |
|     accounts = depot
 | |
| 
 | |
|     [Account depot]
 | |
|     localrepository = Local
 | |
|     remoterepository = Remote
 | |
| 
 | |
|     [Repository Local]
 | |
|     type = Maildir
 | |
|     localfolders = /var/lib/public-inbox/depot-imap
 | |
| 
 | |
|     [Repository Remote]
 | |
|     type = IMAP
 | |
|     ssl = yes
 | |
|     sslcacertfile = /etc/ssl/certs/ca-bundle.crt
 | |
|     remotehost = imap.yandex.ru
 | |
|     remoteuser = depot@tvl.su
 | |
|     remotepassfile = /var/run/agenix/depot-inbox-imap
 | |
|   '';
 | |
| in
 | |
| {
 | |
|   options.services.depot.inbox = with lib; {
 | |
|     enable = mkEnableOption "Enable public-inbox for depot@tvl.su";
 | |
| 
 | |
|     depotPath = mkOption {
 | |
|       description = "path to local depot replica";
 | |
|       type = types.str;
 | |
|       default = "/var/lib/depot";
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   config = lib.mkIf cfg.enable {
 | |
|     # Having nginx *and* other services use ACME certificates for the
 | |
|     # same hostname is unsupported in NixOS without resorting to doing
 | |
|     # all ACME configuration manually.
 | |
|     #
 | |
|     # To work around this, we duplicate the TLS certificate used by
 | |
|     # nginx to a location that is readable by public-inbox daemons.
 | |
|     systemd.services.inbox-cert-sync = {
 | |
|       startAt = "daily";
 | |
| 
 | |
|       script = ''
 | |
|         ${pkgs.coreutils}/bin/install -D -g ${config.users.groups."public-inbox".name} -m 0440 \
 | |
|           /var/lib/acme/inbox.tvl.su/fullchain.pem /var/lib/public-inbox/tls/fullchain.pem
 | |
| 
 | |
|         ${pkgs.coreutils}/bin/install -D -g ${config.users.groups."public-inbox".name} -m 0440 \
 | |
|           /var/lib/acme/inbox.tvl.su/key.pem /var/lib/public-inbox/tls/key.pem
 | |
|       '';
 | |
|     };
 | |
| 
 | |
|     services.public-inbox = {
 | |
|       enable = true;
 | |
| 
 | |
|       http.enable = true;
 | |
|       http.port = 8053;
 | |
| 
 | |
|       imap = {
 | |
|         enable = true;
 | |
|         port = 993;
 | |
|         cert = "/var/lib/public-inbox/tls/fullchain.pem";
 | |
|         key = "/var/lib/public-inbox/tls/key.pem";
 | |
|       };
 | |
| 
 | |
|       nntp = {
 | |
|         enable = true;
 | |
|         port = 563;
 | |
|         cert = "/var/lib/public-inbox/tls/fullchain.pem";
 | |
|         key = "/var/lib/public-inbox/tls/key.pem";
 | |
|       };
 | |
| 
 | |
|       inboxes.depot = rec {
 | |
|         address = [
 | |
|           "depot@tvl.su" # primary address
 | |
|           "depot@tazj.in" # legacy address
 | |
|         ];
 | |
| 
 | |
|         description = "TVL depot development (mail to depot@tvl.su)";
 | |
|         coderepo = [ "depot" ];
 | |
|         url = "https://inbox.tvl.su/depot";
 | |
| 
 | |
|         watch = [
 | |
|           "maildir:/var/lib/public-inbox/depot-imap/INBOX/"
 | |
|         ];
 | |
| 
 | |
|         newsgroup = "su.tvl.depot";
 | |
|       };
 | |
| 
 | |
|       settings.coderepo.depot = {
 | |
|         dir = cfg.depotPath;
 | |
|         cgitUrl = "https://code.tvl.fyi";
 | |
|       };
 | |
| 
 | |
|       settings.publicinbox = {
 | |
|         wwwlisting = "all";
 | |
|         nntpserver = [ "inbox.tvl.su" ];
 | |
|         imapserver = "inbox.tvl.su";
 | |
| 
 | |
|         depot.obfuscate = true;
 | |
|         noObfuscate = [
 | |
|           "tvl.su"
 | |
|           "tvl.fyi"
 | |
|         ];
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     networking.firewall.allowedTCPPorts = [
 | |
|       993 # imap
 | |
|       563 # nntp
 | |
|     ];
 | |
| 
 | |
|     age.secrets.depot-inbox-imap = {
 | |
|       file = depot.ops.secrets."depot-inbox-imap.age";
 | |
|       mode = "0440";
 | |
|       group = config.users.groups."public-inbox".name;
 | |
|     };
 | |
| 
 | |
|     systemd.services.offlineimap-depot = {
 | |
|       description = "download mail for depot@tvl.su";
 | |
|       wantedBy = [ "multi-user.target" ];
 | |
|       startAt = "minutely";
 | |
| 
 | |
|       script = ''
 | |
|         mkdir -p /var/lib/public-inbox/depot-imap
 | |
|         ${pkgs.offlineimap}/bin/offlineimap -c ${imapConfig}
 | |
|       '';
 | |
| 
 | |
|       serviceConfig = {
 | |
|         Type = "oneshot";
 | |
| 
 | |
|         # Run in the same user context as public-inbox itself to avoid
 | |
|         # permissions trouble.
 | |
|         User = config.users.users."public-inbox".name;
 | |
|         Group = config.users.groups."public-inbox".name;
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| }
 |