flora-6: init mailman with NixOS module
Docker containers were too complicated to setup
This commit is contained in:
parent
8921b406fa
commit
4a72435327
16
hosts/flora-6/README.md
Normal file
16
hosts/flora-6/README.md
Normal file
|
@ -0,0 +1,16 @@
|
||||||
|
# Mailman on NixOS docs
|
||||||
|
|
||||||
|
- add reverse DNS record for IP
|
||||||
|
|
||||||
|
Manual setup done for mailman, adapted from https://nixos.wiki/wiki/Mailman:
|
||||||
|
|
||||||
|
```
|
||||||
|
# Add DNS records in infra repo using terraform:
|
||||||
|
# https://git.pub.solar/pub-solar/infra/commit/db234cdb5b55758a3d74387ada0760e06e166b9d
|
||||||
|
|
||||||
|
# Generate initial postfix_domains.db and postfix_lmtp.db databases for Postfix
|
||||||
|
sudo -u mailman mailman aliases
|
||||||
|
# Create a django superuser account
|
||||||
|
sudo -u mailman-web mailman-web createsuperuser
|
||||||
|
# Followed outlined steps in web UI
|
||||||
|
```
|
|
@ -5,6 +5,11 @@
|
||||||
self,
|
self,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
|
# Changing the Caddyfile should only trigger a reload, not a restart
|
||||||
|
systemd.services.caddy.reloadTriggers = [
|
||||||
|
config.services.caddy.configFile
|
||||||
|
];
|
||||||
|
|
||||||
services.caddy = {
|
services.caddy = {
|
||||||
enable = lib.mkForce true;
|
enable = lib.mkForce true;
|
||||||
group = "hakkonaut";
|
group = "hakkonaut";
|
||||||
|
@ -77,7 +82,12 @@
|
||||||
output discard
|
output discard
|
||||||
'';
|
'';
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy :${services.sourcehut.lists.port}
|
handle_path /static/* {
|
||||||
|
root * /var/lib/mailman-web-static
|
||||||
|
file_server
|
||||||
|
}
|
||||||
|
|
||||||
|
reverse_proxy :18507
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
"obs-portal.pub.solar" = {
|
"obs-portal.pub.solar" = {
|
||||||
|
|
|
@ -5,53 +5,16 @@
|
||||||
self,
|
self,
|
||||||
...
|
...
|
||||||
}: let
|
}: let
|
||||||
postfixConfig = pkgs.writeTextFile {
|
# Source: https://github.com/NixOS/nixpkgs/blob/nixos-22.11/nixos/modules/services/mail/mailman.nix#L9C10-L10
|
||||||
name = "main.cf";
|
# webEnv is required by the mailman-uwsgi systemd service
|
||||||
text = builtins.readFile ./postfix/main.cf;
|
inherit (pkgs.mailmanPackages.buildEnvs {}) webEnv;
|
||||||
};
|
|
||||||
in {
|
in {
|
||||||
system.activationScripts.mkMailmanNet = let
|
networking.firewall.allowedTCPPorts = [25];
|
||||||
docker = config.virtualisation.oci-containers.backend;
|
|
||||||
dockerBin = "${pkgs.${docker}}/bin/${docker}";
|
|
||||||
in ''
|
|
||||||
${dockerBin} network inspect mailman-net >/dev/null 2>&1 || ${dockerBin} network create mailman-net --subnet 172.20.1.0/24
|
|
||||||
'';
|
|
||||||
|
|
||||||
users.users.mailman = {
|
|
||||||
description = "Mailman Service";
|
|
||||||
home = "/var/lib/mailman";
|
|
||||||
useDefaultShell = true;
|
|
||||||
uid = 993;
|
|
||||||
# Group hakkonaut so caddy can serve the static files from mailman-web directly
|
|
||||||
group = "hakkonaut";
|
|
||||||
isSystemUser = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
|
||||||
"d '/var/lib/mailman' 0750 mailman hakkonaut - -"
|
|
||||||
];
|
|
||||||
|
|
||||||
age.secrets.mailman-core-secrets = {
|
|
||||||
file = "${self}/secrets/mailman-core-secrets.age";
|
|
||||||
mode = "600";
|
|
||||||
owner = "mailman";
|
|
||||||
};
|
|
||||||
|
|
||||||
age.secrets.mailman-web-secrets = {
|
|
||||||
file = "${self}/secrets/mailman-web-secrets.age";
|
|
||||||
mode = "600";
|
|
||||||
owner = "mailman";
|
|
||||||
};
|
|
||||||
|
|
||||||
age.secrets.mailman-db-secrets = {
|
|
||||||
file = "${self}/secrets/mailman-db-secrets.age";
|
|
||||||
mode = "600";
|
|
||||||
owner = "mailman";
|
|
||||||
};
|
|
||||||
|
|
||||||
services.postfix = {
|
services.postfix = {
|
||||||
enable = true;
|
enable = true;
|
||||||
relayDomains = ["hash:/var/lib/mailman/data/postfix_domains"];
|
relayDomains = ["hash:/var/lib/mailman/data/postfix_domains"];
|
||||||
|
# FIXME: get TLS certs for list.pub.solar from caddy
|
||||||
#sslCert = config.security.acme.certs."lists.example.org".directory + "/full.pem";
|
#sslCert = config.security.acme.certs."lists.example.org".directory + "/full.pem";
|
||||||
#sslKey = config.security.acme.certs."lists.example.org".directory + "/key.pem";
|
#sslKey = config.security.acme.certs."lists.example.org".directory + "/key.pem";
|
||||||
config = {
|
config = {
|
||||||
|
@ -59,114 +22,39 @@ in {
|
||||||
local_recipient_maps = ["hash:/var/lib/mailman/data/postfix_lmtp"];
|
local_recipient_maps = ["hash:/var/lib/mailman/data/postfix_lmtp"];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
services.mailman = {
|
services.mailman = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
# We use caddy instead of nginx
|
||||||
#serve.enable = true;
|
#serve.enable = true;
|
||||||
hyperkitty.enable = true;
|
hyperkitty.enable = true;
|
||||||
webHosts = ["list.pub.solar"];
|
webHosts = ["list.pub.solar"];
|
||||||
siteOwner = "admins@pub.solar";
|
siteOwner = "admins@pub.solar";
|
||||||
};
|
};
|
||||||
|
|
||||||
#virtualisation = {
|
systemd.services.mailman-uwsgi = let
|
||||||
# docker = {
|
uwsgiConfig.uwsgi = {
|
||||||
# enable = true;
|
type = "normal";
|
||||||
# };
|
plugins = ["python3"];
|
||||||
|
home = webEnv;
|
||||||
# oci-containers = {
|
manage-script-name = true;
|
||||||
# backend = "docker";
|
mount = "/=mailman_web.wsgi:application";
|
||||||
# containers."mailman-core" = {
|
http = "127.0.0.1:18507";
|
||||||
# image = "maxking/mailman-core:0.4";
|
};
|
||||||
# autoStart = true;
|
uwsgiConfigFile = pkgs.writeText "uwsgi-mailman.json" (builtins.toJSON uwsgiConfig);
|
||||||
# #user = "993";
|
in {
|
||||||
# volumes = [
|
wantedBy = ["multi-user.target"];
|
||||||
# "/var/lib/mailman/core:/opt/mailman/"
|
after = ["postgresql.service"];
|
||||||
# ];
|
requires = ["mailman-web-setup.service" "postgresql.service"];
|
||||||
# extraOptions = [
|
restartTriggers = [config.environment.etc."mailman3/settings.py".source];
|
||||||
# "--network=mailman-net"
|
serviceConfig = {
|
||||||
# ];
|
# Since the mailman-web settings.py obstinately creates a logs
|
||||||
# environment = {
|
# dir in the cwd, change to the (writable) runtime directory before
|
||||||
# DATABASE_TYPE = "postgres";
|
# starting uwsgi.
|
||||||
# DATABASE_CLASS = "mailman.database.postgresql.PostgreSQLDatabase";
|
ExecStart = "${pkgs.coreutils}/bin/env -C $RUNTIME_DIRECTORY ${pkgs.uwsgi.override {plugins = ["python3"];}}/bin/uwsgi --json ${uwsgiConfigFile}";
|
||||||
# MTA = "postfix";
|
User = "mailman-web";
|
||||||
# };
|
Group = "mailman";
|
||||||
# environmentFiles = [
|
RuntimeDirectory = "mailman-uwsgi";
|
||||||
# config.age.secrets.mailman-core-secrets.path
|
};
|
||||||
# ];
|
};
|
||||||
# ports = [
|
|
||||||
# "127.0.0.1:8001:8001" # API
|
|
||||||
# "127.0.0.1:8024:8024" # LMTP - incoming emails
|
|
||||||
# ];
|
|
||||||
# };
|
|
||||||
|
|
||||||
# containers."mailman-web" = {
|
|
||||||
# image = "maxking/mailman-web:0.4";
|
|
||||||
# autoStart = true;
|
|
||||||
# #user = "993:992";
|
|
||||||
# volumes = [
|
|
||||||
# "/var/lib/mailman/web:/opt/mailman-web-data"
|
|
||||||
# ];
|
|
||||||
# extraOptions = [
|
|
||||||
# "--network=mailman-net"
|
|
||||||
# ];
|
|
||||||
# environment = {
|
|
||||||
# DATABASE_TYPE = "postgres";
|
|
||||||
# SERVE_FROM_DOMAIN = "list.pub.solar";
|
|
||||||
# MAILMAN_ADMIN_USER = "admin";
|
|
||||||
# MAILMAN_ADMIN_EMAIL = "admins@pub.solar";
|
|
||||||
# };
|
|
||||||
# environmentFiles = [
|
|
||||||
# config.age.secrets.mailman-web-secrets.path
|
|
||||||
# ];
|
|
||||||
# ports = [
|
|
||||||
# "127.0.0.1:8000:8000" # HTTP
|
|
||||||
# # "127.0.0.1:8080:8080" # uwsgi
|
|
||||||
# ];
|
|
||||||
# };
|
|
||||||
|
|
||||||
# containers."mailman-db" = {
|
|
||||||
# image = "postgres:14-alpine";
|
|
||||||
# autoStart = true;
|
|
||||||
# user = "993";
|
|
||||||
# extraOptions = [
|
|
||||||
# "--network=mailman-net"
|
|
||||||
# ];
|
|
||||||
# volumes = [
|
|
||||||
# "/var/lib/mailman/database:/var/lib/postgresql/data"
|
|
||||||
# ];
|
|
||||||
# environmentFiles = [
|
|
||||||
# config.age.secrets.mailman-db-secrets.path
|
|
||||||
# ];
|
|
||||||
# };
|
|
||||||
|
|
||||||
# containers."mailman-postfix" = {
|
|
||||||
# image = "mailu/postfix:1.9.46";
|
|
||||||
# autoStart = true;
|
|
||||||
# #user = "993";
|
|
||||||
# extraOptions = [
|
|
||||||
# "--hostname=list.pub.solar"
|
|
||||||
# "--network=mailman-net"
|
|
||||||
# ];
|
|
||||||
# environment = {
|
|
||||||
# HOSTNAMES = "list.pub.solar";
|
|
||||||
# FRONT_ADDRESS = "localhost";
|
|
||||||
# ADMIN_ADDRESS = "localhost";
|
|
||||||
# ANTISPAM_MILTER_ADDRESS = "localhost:11332";
|
|
||||||
# LMTP_ADDRESS = "localhost:2525";
|
|
||||||
# };
|
|
||||||
# volumes = [
|
|
||||||
# # https://mailu.io/1.9/faq.html#how-can-i-override-settings
|
|
||||||
# # Docs contain the wrong path to override main.cf, this one works
|
|
||||||
# "${postfixConfig}:/overrides/postfix.cf"
|
|
||||||
# # Configured in main.cf
|
|
||||||
# "/var/lib/mailman/postfix/mailqueue:/var/spool/postfix"
|
|
||||||
# "/var/lib/mailman/postfix/data:/var/lib/postfix"
|
|
||||||
# # Contains postfix transport_maps generated by mailman-core
|
|
||||||
# "/var/lib/mailman/core:/var/lib/mailman/core"
|
|
||||||
# ];
|
|
||||||
# environmentFiles = [
|
|
||||||
# config.age.secrets.mailman-db-secrets.path
|
|
||||||
# ];
|
|
||||||
# };
|
|
||||||
# };
|
|
||||||
#};
|
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue