132 lines
5.3 KiB
Nix
132 lines
5.3 KiB
Nix
|
{ config, lib, pkgs, ... }:
|
||
|
|
||
|
let
|
||
|
phppoolName = "roundcube_pool";
|
||
|
roundcubeDataDir = config.services.mymailserver.internal.roundcubeDataDir;
|
||
|
roundcubeUser = config.services.mymailserver.internal.roundcubeUser;
|
||
|
roundcubeGroup = config.services.mymailserver.internal.roundcubeGroup;
|
||
|
|
||
|
roundcube = (pkgs.callPackage ./pkg-roundcube.nix {
|
||
|
conf = pkgs.writeText "roundcube-config.inc.php" ''
|
||
|
<?php
|
||
|
$config = array();
|
||
|
$config['db_dsnw'] = 'sqlite:///${roundcubeDataDir}/roundcube.sqlite?mode=0600';
|
||
|
$config['default_host'] = 'tls://${config.services.mymailserver.mailFQDN}';
|
||
|
$config['smtp_server'] = 'tls://${config.services.mymailserver.mailFQDN}';
|
||
|
$config['smtp_port'] = 587;
|
||
|
$config['smtp_user'] = '%u';
|
||
|
$config['smtp_pass'] = '%p';
|
||
|
$config['product_name'] = 'Webmail';
|
||
|
$config['des_key'] = file_get_contents("${roundcubeDataDir}/des_key");;
|
||
|
$config['cipher_method'] = 'AES-256-CBC';
|
||
|
$config['plugins'] = array(
|
||
|
'archive',
|
||
|
'managesieve',
|
||
|
'zipdownload',
|
||
|
);
|
||
|
$config['skin'] = 'larry';
|
||
|
'';
|
||
|
temp = "${roundcubeDataDir}/temp";
|
||
|
logs = "${roundcubeDataDir}/logs";
|
||
|
} );
|
||
|
in
|
||
|
{
|
||
|
services.nginx.virtualHosts."${config.services.mymailserver.roundcubeFQDN}" = {
|
||
|
http2 = false;
|
||
|
forceSSL = true;
|
||
|
enableACME = true;
|
||
|
root = "${roundcube}/public_html";
|
||
|
extraConfig = ''
|
||
|
access_log off;
|
||
|
resolver ${ lib.concatStringsSep " " ( builtins.map (v: if ((builtins.match ".*:.*" v) == []) then "[${v}]" else v) config.networking.nameservers ) };
|
||
|
etag off;
|
||
|
add_header etag "\"${builtins.substring 11 32 roundcube}\"";
|
||
|
add_header Permissions-Policy "interest-cohort=()" always;
|
||
|
'';
|
||
|
locations."~ ^/favicon.ico/.*$" = {
|
||
|
extraConfig = ''
|
||
|
try_files $uri kins/larry/images/$uri;
|
||
|
'';
|
||
|
};
|
||
|
locations."/" = {
|
||
|
extraConfig = ''
|
||
|
index index.php;
|
||
|
try_files $uri /public/$uri /index.php$is_args$args;
|
||
|
'';
|
||
|
};
|
||
|
locations."~ [^/]\.php(/|$)" = {
|
||
|
extraConfig = ''
|
||
|
fastcgi_split_path_info ^(.+?\.php)(/.*)$;
|
||
|
if (!-f $document_root$fastcgi_script_name) {
|
||
|
return 404;
|
||
|
}
|
||
|
|
||
|
fastcgi_pass unix:${config.services.phpfpm.pools."${phppoolName}".socket};
|
||
|
fastcgi_index index.php;
|
||
|
|
||
|
fastcgi_param QUERY_STRING $query_string;
|
||
|
fastcgi_param REQUEST_METHOD $request_method;
|
||
|
fastcgi_param CONTENT_TYPE $content_type;
|
||
|
fastcgi_param CONTENT_LENGTH $content_length;
|
||
|
|
||
|
fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name;
|
||
|
fastcgi_param SCRIPT_NAME $fastcgi_script_name;
|
||
|
fastcgi_param PATH_INFO $fastcgi_path_info;
|
||
|
fastcgi_param PATH_TRANSLATED $document_root$fastcgi_path_info;
|
||
|
fastcgi_param REQUEST_URI $request_uri;
|
||
|
fastcgi_param DOCUMENT_URI $document_uri;
|
||
|
fastcgi_param DOCUMENT_ROOT $document_root;
|
||
|
fastcgi_param SERVER_PROTOCOL $server_protocol;
|
||
|
|
||
|
fastcgi_param GATEWAY_INTERFACE CGI/1.1;
|
||
|
fastcgi_param SERVER_SOFTWARE nginx/$nginx_version;
|
||
|
|
||
|
fastcgi_param REMOTE_ADDR $remote_addr;
|
||
|
fastcgi_param REMOTE_PORT $remote_port;
|
||
|
fastcgi_param SERVER_ADDR $server_addr;
|
||
|
fastcgi_param SERVER_PORT $server_port;
|
||
|
fastcgi_param SERVER_NAME $server_name;
|
||
|
|
||
|
fastcgi_param HTTPS $https;
|
||
|
fastcgi_param HTTP_PROXY "";
|
||
|
'';
|
||
|
};
|
||
|
};
|
||
|
systemd.services.roundcube-install = {
|
||
|
serviceConfig.Type = "oneshot";
|
||
|
wantedBy = [ "multi-user.target" ];
|
||
|
script = ''
|
||
|
mkdir -p ${roundcubeDataDir}/temp ${roundcubeDataDir}/logs
|
||
|
chown -Rc ${roundcubeUser}:${roundcubeGroup} ${roundcubeDataDir}
|
||
|
chmod -c 700 ${roundcubeDataDir}
|
||
|
# Regenerate the key every now and then. This invalidates all sessions, but during reboot should be good enough.
|
||
|
[ -f "${roundcubeDataDir}/des_key" ] && ${pkgs.coreutils}/bin/shred "${roundcubeDataDir}/des_key"
|
||
|
${pkgs.coreutils}/bin/dd if=/dev/urandom bs=32 count=1 2>/dev/null | ${pkgs.coreutils}/bin/base64 > "${roundcubeDataDir}/des_key"
|
||
|
chown -c "${roundcubeUser}":root "${roundcubeDataDir}/des_key"
|
||
|
chmod -c 400 "${roundcubeDataDir}/des_key"
|
||
|
if [ -s "${roundcubeDataDir}/roundcube.sqlite" ]; then
|
||
|
# Just go ahead and remove the sessions, the key to decrypt them has just been destroyed anyway.
|
||
|
${pkgs.sqlite}/bin/sqlite3 "${roundcubeDataDir}/roundcube.sqlite" "DELETE FROM session;"
|
||
|
fi
|
||
|
'';
|
||
|
};
|
||
|
services.phpfpm.pools."${phppoolName}" = {
|
||
|
user = "${roundcubeUser}";
|
||
|
group = "${roundcubeGroup}";
|
||
|
settings = {
|
||
|
"listen.owner" = "nginx";
|
||
|
"listen.group" = "nginx";
|
||
|
"user" = "${roundcubeUser}";
|
||
|
"group" = "${roundcubeGroup}";
|
||
|
"pm" = "dynamic";
|
||
|
"pm.max_children" = "75";
|
||
|
"pm.min_spare_servers" = "5";
|
||
|
"pm.max_spare_servers" = "20";
|
||
|
"pm.max_requests" = "10";
|
||
|
"catch_workers_output" = "1";
|
||
|
};
|
||
|
};
|
||
|
users.users."${roundcubeUser}" = { group = "${roundcubeGroup}"; isSystemUser = true; };
|
||
|
users.groups."${roundcubeGroup}" = { };
|
||
|
}
|