mirror of
https://github.com/docker-mailserver/docker-mailserver
synced 2025-04-05 20:49:08 +02:00
Refactoring this `setup` CLI command as part of the effort to unify our DKIM feature support between OpenDKIM + Rspamd: - Adds a `main()` method similar to other setup CLI commands. - Help text more aligned with equivalent rspamd DKIM setup CLI command. - DRY some repetition such as hard-coded paths to use variables. - OpenDKIM config files are created / initialized early on now with `_create_opendkim_configs()`. `while` loop only needs to append entries, so is easier to grok. - `_create_dkim_key()` to scope just the logic (_and additional notes_) to key generation via `opendkim-genkey` - Now overall logic with the `while` loop of the script occurs in `_generate_dkim_keys()`: - Ownership fixes are now applied after the `while` loop as that seems more appropriate than per iteration. - Temporary VHOST config is now removed since it's no longer useful after running. - Tests adjusted for one new log for adding of default trusted hosts content. Overall this should be nicer to grok/maintain. Some of this logic will be reused for the unified DKIM generation command in future, which is more likely to shift towards all domains using the same keypair by default with rspamd/opendkim config generated at runtime rather than reliant upon DMS config volume to provide that (_still expected for private key_). --------- Co-authored-by: Casper <casperklein@users.noreply.github.com> Co-authored-by: Georg Lauterbach <44545919+georglauterbach@users.noreply.github.com>
236 lines
7.6 KiB
Bash
Executable File
236 lines
7.6 KiB
Bash
Executable File
#!/bin/bash
|
|
|
|
# shellcheck source=../scripts/helpers/index.sh
|
|
source /usr/local/bin/helpers/index.sh
|
|
|
|
if [[ -f /etc/dms-settings ]] && [[ $(_get_dms_env_value 'ENABLE_RSPAMD') -eq 1 ]]; then
|
|
if [[ $(_get_dms_env_value 'ENABLE_OPENDKIM') -eq 1 ]]; then
|
|
_log 'warn' "Conflicting DKIM support, both Rspamd and OpenDKIM enabled - OpenDKIM will manage DKIM keys"
|
|
else
|
|
/usr/local/bin/rspamd-dkim "${@}"
|
|
exit
|
|
fi
|
|
fi
|
|
|
|
function _main() {
|
|
# Default parameters (updated by `_parse_arguments()`):
|
|
local KEYSIZE=2048
|
|
local SELECTOR=mail
|
|
local DMS_DOMAINS=
|
|
|
|
_require_n_parameters_or_print_usage 0 "${@}"
|
|
_parse_arguments "${@}"
|
|
|
|
_generate_dkim_keys
|
|
}
|
|
|
|
function __usage() {
|
|
printf '%s' "${PURPLE}OPEN-DKIM${RED}(${YELLOW}8${RED})
|
|
|
|
${ORANGE}NAME${RESET}
|
|
open-dkim - Configure DKIM (DomainKeys Identified Mail)
|
|
|
|
${ORANGE}SYNOPSIS${RESET}
|
|
setup config dkim [ OPTIONS${RED}...${RESET} ]
|
|
|
|
${ORANGE}DESCRIPTION${RESET}
|
|
Creates DKIM keys and configures them within DMS for OpenDKIM.
|
|
OPTIONS can be used when your requirements are not met by the defaults.
|
|
When not using 'ACCOUNT_PROVISIONER=FILE' (default), you may need to explicitly
|
|
use the 'domain' option to generate DKIM keys for your mail account domains.
|
|
|
|
${ORANGE}OPTIONS${RESET}
|
|
${BLUE}Generic Program Information${RESET}
|
|
help Print the usage information.
|
|
|
|
${BLUE}Configuration adjustments${RESET}
|
|
keysize Set the size of the keys to be generated.
|
|
Possible values: 1024, 2048 and 4096
|
|
Default: 2048
|
|
selector Set a manual selector for the key.
|
|
Default: mail
|
|
domain Provide the domain(s) for which to generate keys for.
|
|
Default: The FQDN assigned to DMS, excluding any subdomain.
|
|
'ACCOUNT_PROVISIONER=FILE' also sources domains from mail accounts.
|
|
|
|
${ORANGE}EXAMPLES${RESET}
|
|
${LWHITE}setup config dkim keysize 4096${RESET}
|
|
Creates keys with their length increased to a size of 4096-bit.
|
|
|
|
${LWHITE}setup config dkim keysize 1024 selector 2023-dkim${RESET}
|
|
Creates 1024-bit sized keys, and changes the DKIM selector to '2023-dkim'.
|
|
|
|
${LWHITE}setup config dkim domain 'example.com,another-example.com'${RESET}
|
|
Only generates DKIM keys for the specified domains: 'example.com' and 'another-example.com'.
|
|
|
|
${ORANGE}EXIT STATUS${RESET}
|
|
Exit status is 0 if command was successful. If wrong arguments are provided or arguments contain
|
|
errors, the script will exit early with a non-zero exit status.
|
|
|
|
"
|
|
}
|
|
|
|
function _parse_arguments() {
|
|
# Parse the command args through iteration:
|
|
while [[ ${#} -gt 0 ]]; do
|
|
case "${1}" in
|
|
|
|
( 'keysize' )
|
|
if [[ -n ${2:-} ]]; then
|
|
KEYSIZE="${2}"
|
|
_log 'trace' "Keysize set to '${KEYSIZE}'"
|
|
else
|
|
_exit_with_error "No keysize provided after 'keysize' argument"
|
|
fi
|
|
;;
|
|
|
|
( 'selector' )
|
|
if [[ -n ${2:-} ]]; then
|
|
SELECTOR="${2}"
|
|
_log 'trace' "Selector set to '${SELECTOR}'"
|
|
else
|
|
_exit_with_error "No selector provided after 'selector' argument"
|
|
fi
|
|
;;
|
|
|
|
( 'domain' )
|
|
if [[ -n ${2:-} ]]; then
|
|
DMS_DOMAINS="${2}"
|
|
_log 'trace' "Domain(s) set to '${DMS_DOMAINS}'"
|
|
else
|
|
_exit_with_error "No domain(s) provided after 'domain' argument"
|
|
fi
|
|
;;
|
|
|
|
( 'help' )
|
|
__usage
|
|
exit 0
|
|
;;
|
|
|
|
( * )
|
|
__usage
|
|
_exit_with_error "Unknown option(s) ${*}"
|
|
;;
|
|
esac
|
|
|
|
# Discard these two args (option + value) now that they've been processed:
|
|
shift 2
|
|
done
|
|
}
|
|
|
|
function _generate_dkim_keys() {
|
|
_generate_domains_config
|
|
if [[ ! -s ${DATABASE_VHOST} ]]; then
|
|
_log 'warn' 'No entries found, no keys to make'
|
|
exit 0
|
|
fi
|
|
|
|
# Initialize OpenDKIM configs if necessary:
|
|
_create_opendkim_configs
|
|
|
|
# Generate a keypair per domain and add reference to OpenDKIM configs:
|
|
local ENTRY_KEY KEY_TABLE_ENTRY SIGNING_TABLE_ENTRY
|
|
while read -r DKIM_DOMAIN; do
|
|
_create_dkim_key "${DKIM_DOMAIN}"
|
|
|
|
# Create / Update OpenDKIM configs with new DKIM key:
|
|
ENTRY_KEY="${SELECTOR}._domainkey.${DKIM_DOMAIN}"
|
|
KEY_TABLE_ENTRY="${ENTRY_KEY} ${DKIM_DOMAIN}:${SELECTOR}:/etc/opendkim/keys/${DKIM_DOMAIN}/${SELECTOR}.private"
|
|
SIGNING_TABLE_ENTRY="*@${DKIM_DOMAIN} ${ENTRY_KEY}"
|
|
|
|
# If no existing entry, add one:
|
|
if ! grep -q "${KEY_TABLE_ENTRY}" "${KEY_TABLE_FILE}"; then
|
|
echo "${KEY_TABLE_ENTRY}" >> "${KEY_TABLE_FILE}"
|
|
fi
|
|
if ! grep -q "${SIGNING_TABLE_ENTRY}" "${SIGNING_TABLE_FILE}"; then
|
|
echo "${SIGNING_TABLE_ENTRY}" >> "${SIGNING_TABLE_FILE}"
|
|
fi
|
|
done < <(_get_valid_lines_from_file "${DATABASE_VHOST}")
|
|
|
|
# No longer needed, remove:
|
|
rm "${DATABASE_VHOST}"
|
|
|
|
# Ensure ownership is consistent for all content belonging to the base directory,
|
|
# During container startup, an internal copy will be made via `_setup_opendkim()`
|
|
# with ownership we expect, while this chown is for the benefit of the users ownership.
|
|
chown -R "$(stat -c '%U:%G' "${OPENDKIM_BASE_DIR}")" "${OPENDKIM_BASE_DIR}"
|
|
}
|
|
|
|
# Prepare a file with one domain per line (iterated via while loop as DKIM_DOMAIN):
|
|
# Depends on methods from `scripts/helpers/postfix.sh`:
|
|
DATABASE_VHOST='/tmp/vhost.dkim'
|
|
function _generate_domains_config() {
|
|
local TMP_VHOST='/tmp/vhost.dkim.tmp'
|
|
|
|
# Generate the default vhost (equivalent to /etc/postfix/vhost),
|
|
# unless CLI arg DMS_DOMAINS provided an alternative list to use instead:
|
|
if [[ -z ${DMS_DOMAINS:-} ]]; then
|
|
_obtain_hostname_and_domainname
|
|
# uses TMP_VHOST:
|
|
_vhost_collect_postfix_domains
|
|
else
|
|
tr ',' '\n' <<< "${DMS_DOMAINS}" >"${TMP_VHOST}"
|
|
fi
|
|
|
|
# Uses DATABASE_VHOST + TMP_VHOST:
|
|
_create_vhost
|
|
}
|
|
|
|
# `opendkim-genkey` generates two files at the configured `--directory`:
|
|
# - <selector>.private (Private key, PEM encoded)
|
|
# - <selector>.txt (Public key, formatted as a TXT record for a RFC 1035 DNS Zone file)
|
|
function _create_dkim_key() {
|
|
DKIM_DOMAIN=${1?Expected to be provided a domain}
|
|
|
|
OPENDKIM_DOMAINKEY_DIR="${OPENDKIM_BASE_DIR}/keys/${DKIM_DOMAIN}"
|
|
mkdir -p "${OPENDKIM_DOMAINKEY_DIR}"
|
|
|
|
DKIM_KEY_FILE="${OPENDKIM_DOMAINKEY_DIR}/${SELECTOR}.private"
|
|
if [[ ! -f "${DKIM_KEY_FILE}" ]]; then
|
|
_log 'info' "Creating DKIM private key '${DKIM_KEY_FILE}'"
|
|
|
|
# NOTE:
|
|
# --domain only affects a comment in the generated DNS Zone file
|
|
# --subdomains is the default,
|
|
# --nosubdomains would add `t=s` to the DNS TXT record generated
|
|
# http://www.opendkim.org/opendkim-genkey.8.html
|
|
opendkim-genkey \
|
|
--bits="${KEYSIZE}" \
|
|
--subdomains \
|
|
--domain="${DKIM_DOMAIN}" \
|
|
--selector="${SELECTOR}" \
|
|
--directory="${OPENDKIM_DOMAINKEY_DIR}"
|
|
fi
|
|
}
|
|
|
|
OPENDKIM_BASE_DIR='/tmp/docker-mailserver/opendkim'
|
|
KEY_TABLE_FILE="${OPENDKIM_BASE_DIR}/KeyTable"
|
|
SIGNING_TABLE_FILE="${OPENDKIM_BASE_DIR}/SigningTable"
|
|
TRUSTED_HOSTS_FILE="${OPENDKIM_BASE_DIR}/TrustedHosts"
|
|
# Create configs if missing:
|
|
function _create_opendkim_configs() {
|
|
mkdir -p "${OPENDKIM_BASE_DIR}"
|
|
local OPENDKIM_CONFIGS=(
|
|
"${KEY_TABLE_FILE}"
|
|
"${SIGNING_TABLE_FILE}"
|
|
"${TRUSTED_HOSTS_FILE}"
|
|
)
|
|
|
|
# Only create if the file doesn't exist (avoids modifying mtime):
|
|
for FILE in "${OPENDKIM_CONFIGS[@]}"; do
|
|
if [[ ! -f "${FILE}" ]]; then
|
|
_log 'debug' "Creating OpenDKIM config '${FILE}'"
|
|
touch "${FILE}"
|
|
fi
|
|
done
|
|
|
|
# If file exists but is empty, add default hosts to trust:
|
|
if [[ ! -s "${TRUSTED_HOSTS_FILE}" ]]; then
|
|
_log 'debug' 'Adding default trust to OpenDKIM TrustedHosts config'
|
|
echo "127.0.0.1" > "${TRUSTED_HOSTS_FILE}"
|
|
echo "localhost" >> "${TRUSTED_HOSTS_FILE}"
|
|
fi
|
|
}
|
|
|
|
_main "${@}"
|