summaryrefslogtreecommitdiffstats
path: root/nixos
diff options
context:
space:
mode:
authorKim Lindberger <kim.lindberger@gmail.com>2021-09-13 15:44:18 +0200
committerGitHub <noreply@github.com>2021-09-13 15:44:18 +0200
commit460d7f63c68152187152f3b83160e1596a1ca669 (patch)
tree784f5fd4fad2a4c1203d046d710d1f564e2f2ff6 /nixos
parent1d67a676d4150227a057100c710984dd44470f40 (diff)
parent6496902fb2b1496c7d5aba78afd4571584cd751e (diff)
Merge pull request #125404 from talyz/parsedmarc
parsedmarc: Add package and NixOS module
Diffstat (limited to 'nixos')
-rw-r--r--nixos/doc/manual/from_md/release-notes/rl-2111.section.xml11
-rw-r--r--nixos/doc/manual/release-notes/rl-2111.section.md5
-rw-r--r--nixos/modules/module-list.nix1
-rw-r--r--nixos/modules/services/monitoring/parsedmarc.md113
-rw-r--r--nixos/modules/services/monitoring/parsedmarc.nix537
-rw-r--r--nixos/modules/services/monitoring/parsedmarc.xml125
-rw-r--r--nixos/modules/services/search/elasticsearch.nix7
-rw-r--r--nixos/tests/all-tests.nix1
-rw-r--r--nixos/tests/parsedmarc/default.nix224
9 files changed, 1024 insertions, 0 deletions
diff --git a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
index 57cd98db5894..6eaba9111a2b 100644
--- a/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
+++ b/nixos/doc/manual/from_md/release-notes/rl-2111.section.xml
@@ -239,6 +239,17 @@
<link xlink:href="options.html#opt-programs.git.enable">programs.git</link>.
</para>
</listitem>
+ <listitem>
+ <para>
+ <link xlink:href="https://domainaware.github.io/parsedmarc/">parsedmarc</link>,
+ a service which parses incoming
+ <link xlink:href="https://dmarc.org/">DMARC</link> reports and
+ stores or sends them to a downstream service for further
+ analysis. Documented in
+ <link linkend="module-services-parsedmarc">its manual
+ entry</link>.
+ </para>
+ </listitem>
</itemizedlist>
</section>
<section xml:id="sec-release-21.11-incompatibilities">
diff --git a/nixos/doc/manual/release-notes/rl-2111.section.md b/nixos/doc/manual/release-notes/rl-2111.section.md
index 440d063abf28..b77bd30ea17c 100644
--- a/nixos/doc/manual/release-notes/rl-2111.section.md
+++ b/nixos/doc/manual/release-notes/rl-2111.section.md
@@ -73,6 +73,11 @@ subsonic-compatible api. Available as [navidrome](#opt-services.navidrome.enable
- [git](https://git-scm.com), a distributed version control system. Available as [programs.git](options.html#opt-programs.git.enable).
+- [parsedmarc](https://domainaware.github.io/parsedmarc/), a service
+ which parses incoming [DMARC](https://dmarc.org/) reports and stores
+ or sends them to a downstream service for further analysis.
+ Documented in [its manual entry](#module-services-parsedmarc).
+
## Backward Incompatibilities {#sec-release-21.11-incompatibilities}
diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix
index fed212c0332c..c01c55b26700 100644
--- a/nixos/modules/module-list.nix
+++ b/nixos/modules/module-list.nix
@@ -621,6 +621,7 @@
./services/monitoring/munin.nix
./services/monitoring/nagios.nix
./services/monitoring/netdata.nix
+ ./services/monitoring/parsedmarc.nix
./services/monitoring/prometheus/default.nix
./services/monitoring/prometheus/alertmanager.nix
./services/monitoring/prometheus/exporters.nix
diff --git a/nixos/modules/services/monitoring/parsedmarc.md b/nixos/modules/services/monitoring/parsedmarc.md
new file mode 100644
index 000000000000..d93134a4cc76
--- /dev/null
+++ b/nixos/modules/services/monitoring/parsedmarc.md
@@ -0,0 +1,113 @@
+# parsedmarc {#module-services-parsedmarc}
+[parsedmarc](https://domainaware.github.io/parsedmarc/) is a service
+which parses incoming [DMARC](https://dmarc.org/) reports and stores
+or sends them to a downstream service for further analysis. In
+combination with Elasticsearch, Grafana and the included Grafana
+dashboard, it provides a handy overview of DMARC reports over time.
+
+## Basic usage {#module-services-parsedmarc-basic-usage}
+A very minimal setup which reads incoming reports from an external
+email address and saves them to a local Elasticsearch instance looks
+like this:
+
+```nix
+services.parsedmarc = {
+ enable = true;
+ settings.imap = {
+ host = "imap.example.com";
+ user = "alice@example.com";
+ password = "/path/to/imap_password_file";
+ watch = true;
+ };
+ provision.geoIp = false; # Not recommended!
+};
+```
+
+Note that GeoIP provisioning is disabled in the example for
+simplicity, but should be turned on for fully functional reports.
+
+## Local mail
+Instead of watching an external inbox, a local inbox can be
+automatically provisioned. The recipient's name is by default set to
+`dmarc`, but can be configured in
+[services.parsedmarc.provision.localMail.recipientName](options.html#opt-services.parsedmarc.provision.localMail.recipientName). You
+need to add an MX record pointing to the host. More concretely: for
+the example to work, an MX record needs to be set up for
+`monitoring.example.com` and the complete email address that should be
+configured in the domain's dmarc policy is
+`dmarc@monitoring.example.com`.
+
+```nix
+services.parsedmarc = {
+ enable = true;
+ provision = {
+ localMail = {
+ enable = true;
+ hostname = monitoring.example.com;
+ };
+ geoIp = false; # Not recommended!
+ };
+};
+```
+
+## Grafana and GeoIP
+The reports can be visualized and summarized with parsedmarc's
+official Grafana dashboard. For all views to work, and for the data to
+be complete, GeoIP databases are also required. The following example
+shows a basic deployment where the provisioned Elasticsearch instance
+is automatically added as a Grafana datasource, and the dashboard is
+added to Grafana as well.
+
+```nix
+services.parsedmarc = {
+ enable = true;
+ provision = {
+ localMail = {
+ enable = true;
+ hostname = url;
+ };
+ grafana = {
+ datasource = true;
+ dashboard = true;
+ };
+ };
+};
+
+# Not required, but recommended for full functionality
+services.geoipupdate = {
+ settings = {
+ AccountID = 000000;
+ LicenseKey = "/path/to/license_key_file";
+ };
+};
+
+services.grafana = {
+ enable = true;
+ addr = "0.0.0.0";
+ domain = url;
+ rootUrl = "https://" + url;
+ protocol = "socket";
+ security = {
+ adminUser = "admin";
+ adminPasswordFile = "/path/to/admin_password_file";
+ secretKeyFile = "/path/to/secret_key_file";
+ };
+};
+
+services.nginx = {
+ enable = true;
+ recommendedTlsSettings = true;
+ recommendedOptimisation = true;
+ recommendedGzipSettings = true;
+ recommendedProxySettings = true;
+ upstreams.grafana.servers."unix:/${config.services.grafana.socket}" = {};
+ virtualHosts.${url} = {
+ root = config.services.grafana.staticRootPath;
+ enableACME = true;
+ forceSSL = true;
+ locations."/".tryFiles = "$uri @grafana";
+ locations."@grafana".proxyPass = "http://grafana";
+ };
+};
+users.users.nginx.extraGroups = [ "grafana" ];
+```
diff --git a/nixos/modules/services/monitoring/parsedmarc.nix b/nixos/modules/services/monitoring/parsedmarc.nix
new file mode 100644
index 000000000000..e6a72dea0260
--- /dev/null
+++ b/nixos/modules/services/monitoring/parsedmarc.nix
@@ -0,0 +1,537 @@
+{ config, lib, pkgs, ... }:
+
+let
+ cfg = config.services.parsedmarc;
+ ini = pkgs.formats.ini {};
+in
+{
+ options.services.parsedmarc = {
+
+ enable = lib.mkEnableOption ''
+ parsedmarc, a DMARC report monitoring service
+ '';
+
+ provision = {
+ localMail = {
+ enable = lib.mkOption {
+ type = lib.types.bool;
+ default = false;
+ description = ''
+ Whether Postfix and Dovecot should be set up to receive
+ mail locally. parsedmarc will be configured to watch the
+ local inbox as the automatically created user specified in
+ <xref linkend="opt-services.parsedmarc.provision.localMail.recipientName" />
+ '';
+ };
+
+ recipientName = lib.mkOption {
+ type = lib.types.str;
+ default = "dmarc";
+ description = ''
+ The DMARC mail recipient name, i.e. the name part of the
+ email address which receives DMARC reports.
+
+ A local user with this name will be set up and assigned a
+ randomized password on service start.
+ '';
+ };
+
+ hostname = lib.mkOption {
+ type = lib.types.str;
+ default = config.networking.fqdn;
+ defaultText = "config.networking.fqdn";
+ example = "monitoring.example.com";
+ description = ''
+ The hostname to use when configuring Postfix.
+
+ Should correspond to the host's fully qualified domain
+ name and the domain part of the email address which
+ receives DMARC reports. You also have to set up an MX record
+ pointing to this domain name.
+ '';
+ };
+ };
+
+ geoIp = lib.mkOption {
+ type = lib.types.bool;
+ default = true;
+ description = ''
+ Whether to enable and configure the <link
+ linkend="opt-services.geoipupdate.enable">geoipupdate</link>
+ service to automatically fetch GeoIP databases. Not crucial,
+ but recommended for full functionality.
+
+ To finish the setup, you need to manually set the <xref
+ linkend="opt-services.geoipupdate.settings.AccountID" /> and
+ <xref linkend="opt-services.geoipupdate.settings.LicenseKey" />
+ options.
+ '';
+ };
+
+ elasticsearch = lib.mkOption {
+ type = lib.types.bool;
+ default = true;
+ description = ''
+ Whether to set up and use a local instance of Elasticsearch.
+ '';
+ };
+
+ grafana = {
+ datasource = lib.mkOption {
+ type = lib.types.bool;
+ default = cfg.provision.elasticsearch && config.services.grafana.enable;
+ apply = x: x && cfg.provision.elasticsearch;
+ description = ''
+ Whether the automatically provisioned Elasticsearch
+ instance should be added as a grafana datasource. Has no
+ effect unless
+ <xref linkend="opt-services.parsedmarc.provision.elasticsearch" />
+ is also enabled.
+ '';
+ };
+
+ dashboard = lib.mkOption {
+ type = lib.types.bool;
+ default = config.services.grafana.enable;
+ description = ''
+ Whether the official parsedmarc grafana dashboard should
+ be provisioned to the local grafana instance.
+ '';
+ };
+ };
+ };
+
+ settings = lib.mkOption {
+ description = ''
+ Configuration parameters to set in
+ <filename>parsedmarc.ini</filename>. For a full list of
+ available parameters, see
+ <link xlink:href="https://domainaware.github.io/parsedmarc/#configuration-file" />.
+ '';
+
+ type = lib.types.submodule {
+ freeformType = ini.type;
+
+ options = {
+ general = {
+ save_aggregate = lib.mkOption {
+ type = lib.types.bool;
+ default = true;
+ description = ''
+ Save aggregate report data to Elasticsearch and/or Splunk.
+ '';
+ };
+
+ save_forensic = lib.mkOption {
+ type = lib.types.bool;
+ default = true;
+ description = ''
+ Save forensic report data to Elasticsearch and/or Splunk.
+ '';
+ };
+ };
+
+ imap = {
+ host = lib.mkOption {
+ type = lib.types.str;
+ default = "localhost";
+ description = ''
+ The IMAP server hostname or IP address.
+ '';
+ };
+
+ port = lib.mkOption {
+ type = lib.types.port;
+ default = 993;
+ description = ''
+ The IMAP server port.
+ '';
+ };
+
+ ssl = lib.mkOption {
+ type = lib.types.bool;
+ default = true;
+ description = ''
+ Use an encrypted SSL/TLS connection.
+ '';
+ };
+
+ user = lib.mkOption {
+ type = with lib.types; nullOr str;
+ default = null;
+ description = ''
+ The IMAP server username.
+ '';
+ };
+
+ password = lib.mkOption {
+ type = with lib.types; nullOr path;
+ default = null;
+ description = ''
+ The path to a file containing the IMAP server password.
+ '';
+ };
+
+ watch = lib.mkOption {
+ type = lib.types.bool;
+ default = true;
+ description = ''
+ Use the IMAP IDLE command to process messages as they arrive.
+ '';
+ };
+
+ delete = lib.mkOption {
+ type = lib.types.bool;
+ default = false;
+ description = ''
+ Delete messages after processing them, instead of archiving them.
+ '';
+ };
+ };
+
+ smtp = {
+ host = lib.mkOption {
+ type = with lib.types; nullOr str;
+ default = null;
+ description = ''
+ The SMTP server hostname or IP address.
+ '';
+ };
+
+ port = lib.mkOption {
+ type = with lib.types; nullOr port;
+ default = null;
+ description = ''
+ The SMTP server port.
+ '';
+ };
+
+ ssl = lib.mkOption {
+ type = with lib.types; nullOr bool;
+ default = null;
+ description = ''
+ Use an encrypted SSL/TLS connection.
+ '';
+ };
+
+ user = lib.mkOption {
+ type = with lib.types; nullOr str;
+ default = null;
+ description = ''
+ The SMTP server username.
+ '';
+ };
+
+ password = lib.mkOption {
+ type = with lib.types; nullOr path;
+ default = null;
+ description = ''
+ The path to a file containing the SMTP server password.
+ '';
+ };
+
+ from = lib.mkOption {
+ type = with lib.types; nullOr str;
+ default = null;
+ description = ''
+ The <literal>From</literal> address to use for the
+ outgoing mail.
+ '';
+ };
+
+ to = lib.mkOption {
+ type = with lib.types; nullOr (listOf str);
+ default = null;
+ description = ''
+ The addresses to send outgoing mail to.
+ '';
+ };
+ };
+
+ elasticsearch = {
+ hosts = lib.mkOption {
+ default = [];
+ type = with lib.types; listOf str;
+ apply = x: if x == [] then null else lib.concatStringsSep "," x;
+ description = ''
+ A list of Elasticsearch hosts to push parsed reports
+ to.
+ '';
+ };
+
+ user = lib.mkOption {
+ type = with lib.types; nullOr str;
+ default = null;
+ description = ''
+ Username to use when connecting to Elasticsearch, if
+ required.
+ '';
+ };
+
+ password = lib.mkOption {
+ type = with lib.types; nullOr path;
+ default = null;
+ description = ''
+ The path to a file containing the password to use when
+ connecting to Elasticsearch, if required.
+ '';
+ };
+
+ ssl = lib.mkOption {
+ type = lib.types.bool;
+ default = false;
+ description = ''
+ Whether to use an encrypted SSL/TLS connection.
+ '';
+ };
+
+ cert_path = lib.mkOption {
+ type = lib.types.path;
+ default = "/etc/ssl/certs/ca-certificates.crt";
+ description = ''
+ The path to a TLS certificate bundle used to verify
+ the server's certificate.
+ '';
+ };
+ };
+
+ kafka = {
+ hosts = lib.mkOption {
+ default = [];
+ type = with lib.types; listOf str;
+ apply = x: if x == [] then null else lib.concatStringsSep "," x;
+ description = ''
+ A list of Apache Kafka hosts to publish parsed reports
+ to.
+ '';
+ };
+
+ user = lib.mkOption {
+ type = with lib.types; nullOr str;
+ default = null;
+ description = ''
+ Username to use when connecting to Kafka, if
+ required.
+ '';
+ };
+
+ password = lib.mkOption {
+ type = with lib.types; nullOr path;
+ default = null;
+ description = ''
+ The path to a file containing the password to use when
+ connecting to Kafka, if required.
+ '';
+ };
+
+ ssl = lib.mkOption {
+ type = with lib.types; nullOr bool;
+ default = null;
+ description = ''
+ Whether to use an encrypted SSL/TLS connection.
+ '';
+ };
+
+ aggregate_topic = lib.mkOption {
+ type = with lib.types; nullOr str;
+ default = null;
+ example = "aggregate";
+ description = ''
+ The Kafka topic to publish aggregate reports on.
+ '';
+ };
+
+ forensic_topic = lib.mkOption {
+ type = with lib.types; nullOr str;
+ default = null;
+ example = "forensic";
+ description = ''
+ The Kafka topic to publish forensic reports on.
+ '';
+ };
+ };
+
+ };
+
+ };
+ };
+
+ };
+
+ config = lib.mkIf cfg.enable {
+
+ services.elasticsearch.enable = lib.mkDefault cfg.provision.elasticsearch;
+
+ services.geoipupdate = lib.mkIf cfg.provision.geoIp {
+ enable = true;
+ settings = {
+ EditionIDs = [
+ "GeoLite2-ASN"
+ "GeoLite2-City"
+ "GeoLite2-Country"
+ ];
+ DatabaseDirectory = "/var/lib/GeoIP";
+ };
+ };
+
+ services.dovecot2 = lib.mkIf cfg.provision.localMail.enable {
+ enable = true;
+ protocols = [ "imap" ];
+ };
+
+ services.postfix = lib.mkIf cfg.provision.localMail.enable {
+ enable = true;
+ origin = cfg.provision.localMail.hostname;
+ config = {
+ myhostname = cfg.provision.localMail.hostname;
+ mydestination = cfg.provision.localMail.hostname;
+ };
+ };
+
+ services.grafana = {
+ declarativePlugins = with pkgs.grafanaPlugins;
+ lib.mkIf cfg.provision.grafana.dashboard [
+ grafana-worldmap-panel
+ grafana-piechart-panel
+ ];
+
+ provision = {
+ enable = cfg.provision.grafana.datasource || cfg.provision.grafana.dashboard;
+ datasources =
+ let
+ pkgVer = lib.getVersion config.services.elasticsearch.package;
+ esVersion =
+ if lib.versionOlder pkgVer "7" then
+ "60"
+ else if lib.versionOlder pkgVer "8" then
+ "70"
+ else
+ throw "When provisioning parsedmarc grafana datasources: unknown Elasticsearch version.";
+ in
+ lib.mkIf cfg.provision.grafana.datasource [
+ {
+ name = "dmarc-ag";
+ type = "elasticsearch";
+ access = "proxy";
+ url = "localhost:9200";
+ jsonData = {
+ timeField = "date_range";
+ inherit esVersion;
+ };
+ }
+ {
+ name = "dmarc-fo";
+ type = "elasticsearch";
+ access = "proxy";
+ url = "localhost:9200";
+ jsonData = {
+ timeField = "date_range";
+ inherit esVersion;
+ };
+ }
+ ];
+ dashboards = lib.mkIf cfg.provision.grafana.dashboard [{
+ name = "parsedmarc";
+ options.path = "${pkgs.python3Packages.parsedmarc.dashboard}";
+ }];
+ };
+ };
+
+ services.parsedmarc.settings = lib.mkMerge [
+ (lib.mkIf cfg.provision.elasticsearch {
+ elasticsearch = {
+ hosts = [ "localhost:9200" ];
+ ssl = false;
+ };
+ })
+ (lib.mkIf cfg.provision.localMail.enable {
+ imap = {
+ host = "localhost";
+ port = 143;
+ ssl = false;
+ user = cfg.provision.localMail.recipientName;
+ password = "${pkgs.writeText "imap-password" "@imap-password@"}";
+ watch = true;
+ };
+ })
+ ];
+
+ systemd.services.parsedmarc =
+ let
+ # Remove any empty attributes from the config, i.e. empty
+ # lists, empty attrsets and null. This makes it possible to
+ # list interesting options in `settings` without them always
+ # ending up in the resulting config.
+ filteredConfig = lib.converge (lib.filterAttrsRecursive (_: v: ! builtins.elem v [ null [] {} ])) cfg.settings;
+ parsedmarcConfig = ini.generate "parsedmarc.ini" filteredConfig;
+ mkSecretReplacement = file:
+ lib.optionalString (file != null) ''
+ replace-secret '${file}' '${file}' /run/parsedmarc/parsedmarc.ini
+ '';
+ in
+ {
+ wantedBy = [ "multi-user.target" ];
+ after = [ "postfix.service" "dovecot2.service" "elasticsearch.service" ];
+ path = with pkgs; [ replace-secret openssl shadow ];
+ serviceConfig = {
+ ExecStartPre = let
+ startPreFullPrivileges = ''
+ set -o errexit -o pipefail -o nounset -o errtrace
+ shopt -s inherit_errexit
+
+ umask u=rwx,g=,o=
+ cp ${parsedmarcConfig} /run/parsedmarc/parsedmarc.ini
+ chown parsedmarc:parsedmarc /run/parsedmarc/parsedmarc.ini
+ ${mkSecretReplacement cfg.settings.smtp.password}
+ ${mkSecretReplacement cfg.settings.imap.password}
+ ${mkSecretReplacement cfg.settings.elasticsearch.password}
+ ${mkSecretReplacement cfg.settings.kafka.password}
+ '' + lib.optionalString cfg.provision.localMail.enable ''
+ openssl rand -hex 64 >/run/parsedmarc/dmarc_user_passwd
+ replace-secret '@imap-password@' '/run/parsedmarc/dmarc_user_passwd' /run/parsedmarc/parsedmarc.ini
+ echo "Setting new randomized password for user '${cfg.provision.localMail.recipientName}'."
+ cat <(echo -n "${cfg.provision.localMail.recipientName}:") /run/parsedmarc/dmarc_user_passwd | chpasswd
+ '';
+ in
+ "+${pkgs.writeShellScript "parsedmarc-start-pre-full-privileges" startPreFullPrivileges}";
+ Type = "simple";
+ User = "parsedmarc";
+ Group = "parsedmarc";
+ DynamicUser = true;
+ RuntimeDirectory = "parsedmarc";
+ RuntimeDirectoryMode = 0700;
+ CapabilityBoundingSet = "";
+ PrivateDevices = true;
+ PrivateMounts = true;
+ PrivateUsers = true;
+ ProtectClock = true;
+ ProtectControlGroups = true;
+ ProtectHome = true;
+ ProtectHostname = true;
+ ProtectKernelLogs = true;
+ ProtectKernelModules = true;
+ ProtectKernelTunables = true;
+ ProtectProc = "invisible";
+ ProcSubset = "pid";
+ SystemCallFilter = [ "@system-service" "~@privileged" "~@resources" ];
+ RestrictAddressFamilies = [ "AF_UNIX" "AF_INET" "AF_INET6" ];
+ RestrictRealtime = true;
+ RestrictNamespaces = true;
+ MemoryDenyWriteExecute = true;
+ LockPersonality = true;
+ SystemCallArchitectures = "native";
+ ExecStart = "${pkgs.python3Packages.parsedmarc}/bin/parsedmarc -c /run/parsedmarc/parsedmarc.ini";
+ };
+ };
+
+ users.users.${cfg.provision.localMail.recipientName} = lib.mkIf cfg.provision.localMail.enable {
+ isNormalUser = true;
+ description = "DMARC mail recipient";
+ };
+ };
+
+ # Don't edit the docbook xml directly, edit the md and generate it:
+ # `pandoc parsedmarc.md -t docbook --top-level-division=chapter --extract-media=media -f markdown+smart > parsedmarc.xml`
+ meta.doc = ./parsedmarc.xml;
+ meta.maintainers = [ lib.maintainers.talyz ];
+}
diff --git a/nixos/modules/services/monitoring/parsedmarc.xml b/nixos/modules/services/monitoring/parsedmarc.xml
new file mode 100644
index 000000000000..7167b52d0357
--- /dev/null
+++ b/nixos/modules/services/monitoring/parsedmarc.xml
@@ -0,0 +1,125 @@
+<chapter xmlns="http://docbook.org/ns/docbook" xmlns:xlink="http://www.w3.org/1999/xlink" xml:id="module-services-parsedmarc">
+ <title>parsedmarc</title>
+ <para>
+ <link xlink:href="https://domainaware.github.io/parsedmarc/">parsedmarc</link>
+ is a service which parses incoming
+ <link xlink:href="https://dmarc.org/">DMARC</link> reports and
+ stores or sends them to a downstream service for further analysis.
+ In combination with Elasticsearch, Grafana and the included Grafana
+ dashboard, it provides a handy overview of DMARC reports over time.
+ </para>
+ <section xml:id="module-services-parsedmarc-basic-usage">
+ <title>Basic usage</title>
+ <para>
+ A very minimal setup which reads incoming reports from an external
+ email address and saves them to a local Elasticsearch instance
+ looks like this:
+ </para>
+ <programlisting language="bash">
+services.parsedmarc = {
+ enable = true;
+ settings.imap = {
+ host = &quot;imap.example.com&quot;;
+ user = &quot;alice@example.com&quot;;
+ password = &quot;/path/to/imap_password_file&quot;;
+ watch = true;
+ };
+ provision.geoIp = false; # Not recommended!
+};
+</programlisting>
+ <para>
+ Note that GeoIP provisioning is disabled in the example for
+ simplicity, but should be turned on for fully functional reports.
+ </para>
+ </section>
+ <section xml:id="local-mail">
+ <title>Local mail</title>
+ <para>
+ Instead of watching an external inbox, a local inbox can be
+ automatically provisioned. The recipient’s name is by default set
+ to <literal>dmarc</literal>, but can be configured in
+ <link xlink:href="options.html#opt-services.parsedmarc.provision.localMail.recipientName">services.parsedmarc.provision.localMail.recipientName</link>.
+ You need to add an MX record pointing to the host. More
+ concretely: for the example to work, an MX record needs to be set
+ up for <literal>monitoring.example.com</literal> and the complete
+ email address that should be configured in the domain’s dmarc
+ policy is <literal>dmarc@monitoring.example.com</literal>.
+ </para>
+ <programlisting language="bash">
+services.parsedmarc = {
+ enable = true;
+ provision = {
+ localMail = {
+ enable = true;
+ hostname = monitoring.example.com;
+ };
+ geoIp = false; # Not recommended!
+ };
+};
+</programlisting>
+ </section>
+ <section xml:id="grafana-and-geoip">
+ <title>Grafana and GeoIP</title>
+ <para>
+ The reports can be visualized and summarized with parsedmarc’s
+ official Grafana dashboard. For all views to work, and for the
+ data to be complete, GeoIP databases are also required. The
+ following example shows a basic deployment where the provisioned
+ Elasticsearch instance is automatically added as a Grafana
+ datasource, and the dashboard is added to Grafana as well.
+ </para>
+ <programlisting language="bash">
+services.parsedmarc = {
+ enable = true;
+ provision = {
+ localMail = {
+ enable = true;
+ hostname = url;
+ };
+ grafana = {
+ datasource = true;
+ dashboard = true;
+ };
+ };
+};
+
+# Not required, but recommended for full functionality
+services.geoipupdate = {
+ settings = {
+ AccountID = 000000;
+ LicenseKey = &quot;/path/to/license_key_file&quot;;
+ };
+};
+
+services.grafana = {
+ enable = true;
+ addr = &quot;0.0.0.0&quot;;
+ domain = url;
+ rootUrl = &quot;https://&quot; + url;
+ protocol = &quot;socket&quot;;
+ security = {
+ adminUser = &quot;admin&quot;;
+ adminPasswordFile = &quot;/path/to/admin_password_file&quot;;
+ secretKeyFile = &quot;/path/to/secret_key_file&quot;;
+ };
+};
+
+services.nginx = {
+ enable = true;
+ recommendedTlsSettings = true;
+ recommendedOptimisation = true;
+ recommendedGzipSettings = true;
+ recommendedProxySettings = true;
+ upstreams.grafana.servers.&quot;unix:/${config.services.grafana.socket}&quot; = {};
+ virtualHosts.${url} = {
+ root = config.services.grafana.staticRootPath;
+ enableACME = true;
+ forceSSL = true;
+ locations.&quot;/&quot;.tryFiles = &quot;$uri @grafana&quot;;
+ locations.&quot;@grafana&quot;.proxyPass = &quot;http://grafana&quot;;
+ };
+};
+users.users.nginx.extraGroups = [ &quot;grafana&quot; ];
+</programlisting>
+ </section>
+</chapter>
diff --git a/nixos/modules/services/search/elasticsearch.nix b/nixos/modules/services/search/elasticsearch.nix
index 1d7a28d5d245..3f676db27523 100644
--- a/nixos/modules/services/search/elasticsearch.nix
+++ b/nixos/modules/services/search/elasticsearch.nix
@@ -201,6 +201,13 @@ in
if [ "$(id -u)" = 0 ]; then chown -R elasticsearch:elasticsearch ${cfg.dataDir}; fi
'';
+ postStart = ''
+ # Make sure elasticsearch is up and running before dependents
+ # are started
+ while ! ${pkgs.curl}/bin/curl -sS -f http://localhost:${toString cfg.port} 2>/dev/null; do
+ sleep 1
+ done
+ '';
};
environment.systemPackages = [ cfg.package ];
diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix
index 6baa986b2bda..dab99dd8d043 100644
--- a/nixos/tests/all-tests.nix
+++ b/nixos/tests/all-tests.nix
@@ -336,6 +336,7 @@ in
pam-u2f = handleTest ./pam-u2f.nix {};
pantheon = handleTest ./pantheon.nix {};
paperless-ng = handleTest ./paperless-ng.nix {};
+ parsedmarc = handleTest ./parsedmarc {};
pdns-recursor = handleTest ./pdns-recursor.nix {};
peerflix = handleTest ./peerflix.nix {};
pgjwt = handleTest ./pgjwt.nix {};
diff --git a/nixos/tests/parsedmarc/default.nix b/nixos/tests/parsedmarc/default.nix
new file mode 100644
index 000000000000..d838d3b6a39c
--- /dev/null
+++ b/nixos/tests/parsedmarc/default.nix
@@ -0,0 +1,224 @@
+# This tests parsedmarc by sending a report to its monitored email
+# address and reading the results out of Elasticsearch.
+
+{ pkgs, ... }@args:
+let
+ inherit (import ../../lib/testing-python.nix args) makeTest;
+
+ dmarcTestReport = builtins.fetchurl {
+ name = "dmarc-test-report";
+ url = "https://github.com/domainaware/parsedmarc/raw/f45ab94e0608088e0433557608d9f4e9517d3afe/samples/aggregate/estadocuenta1.infonacot.gob.mx!example.com!1536853302!1536939702!2940.xml.zip";
+ sha256 = "0dq64cj49711kbja27pjl2hy0d3azrjxg91kqrh40x46fkn1dwkx";
+ };
+
+ sendEmail = address:
+ pkgs.writeScriptBin "send-email" ''
+ #!${pkgs.python3.interpreter}
+ import smtplib
+ from email import encoders
+ from email.mime.base i