dist: Add systemd unit files

This commit is contained in:
fox.cpp 2019-09-15 01:28:19 +03:00
parent 163997c40a
commit 86f1089d77
No known key found for this signature in database
GPG key ID: E76D97CCEDE90B6C
3 changed files with 141 additions and 0 deletions

17
dist/README.md vendored Normal file
View file

@ -0,0 +1,17 @@
# Distribution files for maddy
## systemd unit
`maddy.service` launches using default config path (/etc/maddy/maddy.conf).
`maddy@.service` launches maddy using custom config path. E.g.
`maddy@foo.service` will use /etc/maddy/foo.conf.
Both unit files use DynamicUser to allocate user account for maddy, hence you don't need
to create it explicitly. Also, they use \*Directory options, so required directories
will be created as well.
Additionally, unit files apply strict sandboxing, limiting maddy permissions on
the system to a bare minimum. Subset of these options makes it impossible for
privileged authentication helper binaries to gain required permissions, so you
may have to disable it when using system account-based authentication with
maddy running as a unprivilieged user.

64
dist/maddy.service vendored Normal file
View file

@ -0,0 +1,64 @@
[Unit]
Description=maddy mail server
After=network.target
[Service]
# For systemd before 235. Assumes pre-existing user & group.
User=maddy
Group=maddy
# cd to state directory to make sure any relative paths
# in config will be relative to it unless handled specially.
WorkingDirectory=/var/lib/maddy
# For systemd 235+. systemd will take care of user accounts
# directories and permissions.
DynamicUser=true
ConfigurationDirectory=maddy
StateDirectory=maddy
ReadOnlyPaths=/usr/lib/maddy
# Strict sandboxing. You have no reason to trust code written by strangers from GitHub.
PrivateTmp=true
ProtectHome=true
ProtectSystem=strict
ProtectKernelTunables=true
ProtectHostname=true
ProtectControlGroups=true
# Additional sandboxing. You need to disable all of these options
# for privileged helper binaries (for system auth) to work correctly.
NoNewPrivileges=true
PrivateDevices=true
DeviceAllow=/dev/syslog
RestrictSUIDSGID=true
ProtectKernelModules=true
MemoryDenyWriteExecute=true
RestrictNamespaces=true
RestrictRealtime=true
LockPersonality=true
# Graceful shutdown with a reasonable timeout.
TimeoutStopSec=7s
KillMode=mixed
KillSignal=SIGTERM
# Required to bind on ports lower than 1024.
AmbientCapabilities=CAP_NET_BIND_SERVICE
# Force all files created by maddy to be only readable by it.
UMask=0027
# Bump FD limitations. Even idle mail server can have a lot of FDs open (think
# of idle IMAP connections, especially ones abandoned on the other end and
# slowly timing out).
LimitNOFILE=131072
# Limit processes count to something reasonable to
# prevent resources exhausting due to big amounts of helper
# processes launched.
LimitNPROC=512
Restart=on-abnormal
ExecStart=/usr/bin/maddy

60
dist/maddy@.service vendored Normal file
View file

@ -0,0 +1,60 @@
[Unit]
Description=maddy mail server (using %i.conf)
After=network.target
[Service]
# For systemd before 235. Assumes pre-existing user & group.
User=maddy
Group=maddy
# For systemd 235+. systemd will take care of user accounts
# and permissions.
DynamicUser=true
ConfigurationDirectory=maddy
StateDirectory=maddy
ReadOnlyPaths=/usr/lib/maddy
# Strict sandboxing. You have no reason to trust code written by strangers from GitHub.
PrivateTmp=true
PrivateHome=true
ProtectSystem=strict
ProtectKernelTunables=true
ProtectHostname=true
ProtectControlGroups=true
DeviceAllow=/dev/syslog
# Additional sandboxing. You need to disable all of these options
# for privileged helper binaries (for system auth) to work correctly.
NoNewPrivileges=true
PrivateDevices=true
RestrictSUIDSGID=true
ProtectKernelModules=true
MemoryDenyWriteExecute=true
RestrictNamespaces=true
RestrictRealtime=true
LockPersonality=true
# Graceful shutdown with a reasonable timeout.
TimeoutStopSec=7s
KillMode=mixed
KillSignal=SIGTERM
# Required to bind on ports lower than 1024.
AmbientCapabilities=CAP_NET_BIND_SERVICE
# Force all files created by maddy to be only readable by it.
UMask=0027
# Bump FD limitations. Even idle mail server can have a lot of FDs open (think
# of idle IMAP connections, especially ones abandoned on the other end and
# slowly timing out).
LimitNOFILE=131072
# Limit processes count to something reasonable to
# prevent resources exhausting due to big amounts of helper
# processes launched.
LimitNPROC=512
Restart=on-abnormal
ExecStart=/usr/bin/maddy -config /etc/maddy/%i.conf