1
Fork 0
mirror of https://https.git.savannah.gnu.org/git/guix.git/ synced 2025-07-12 01:50:46 +02:00
guix/gnu/services/messaging.scm
Evgeny Pisemsky 44d178265c
services: Add mosquitto-service-type.
* gnu/services/messaging.scm (<mosquitto-configuration>): New record type.
(mosquitto-accounts): New procedure.
(mosquitto-shepherd-service): New procedure.
(mosquitto-service-type): New variable.
* doc/guix.texi (Messaging Services): Document it.

Change-Id: I3500c5b6b69084c1f4a6da66ea45bfd42c871f3f
Signed-off-by: Danny Milosavljevic <dannym@friendly-machines.com>
2025-05-09 19:47:24 +02:00

2285 lines
86 KiB
Scheme
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

;;; GNU Guix --- Functional package management for GNU
;;; Copyright © 2017, 2018 Clément Lassieur <clement@lassieur.org>
;;; Copyright © 2017 Mathieu Othacehe <m.othacehe@gmail.com>
;;; Copyright © 2015, 2017-2020, 2022-2024 Ludovic Courtès <ludo@gnu.org>
;;; Copyright © 2018 Pierre-Antoine Rouby <contact@parouby.fr>
;;; Copyright © 2025 Maxim Cournoyer <maxim.cournoyer@gmail.com>
;;; Copyright © 2024 Evgeny Pisemsky <mail@pisemsky.site>
;;;
;;; This file is part of GNU Guix.
;;;
;;; GNU Guix is free software; you can redistribute it and/or modify it
;;; under the terms of the GNU General Public License as published by
;;; the Free Software Foundation; either version 3 of the License, or (at
;;; your option) any later version.
;;;
;;; GNU Guix is distributed in the hope that it will be useful, but
;;; WITHOUT ANY WARRANTY; without even the implied warranty of
;;; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
;;; GNU General Public License for more details.
;;;
;;; You should have received a copy of the GNU General Public License
;;; along with GNU Guix. If not, see <http://www.gnu.org/licenses/>.
(define-module (gnu services messaging)
#:use-module ((gnu home services utils) #:select (object->camel-case-string))
#:use-module (gnu packages admin)
#:use-module (gnu packages base)
#:use-module (gnu packages irc)
#:use-module (gnu packages messaging)
#:use-module (gnu packages tls)
#:use-module (gnu services)
#:use-module (gnu services shepherd)
#:use-module (gnu services configuration)
#:use-module (gnu system shadow)
#:autoload (gnu build linux-container) (%namespaces)
#:use-module ((gnu system file-systems) #:select (file-system-mapping))
#:use-module (guix gexp)
#:use-module (guix modules)
#:use-module (guix records)
#:use-module (guix packages)
#:use-module (guix deprecation)
#:use-module (guix least-authority)
#:use-module (srfi srfi-1)
#:use-module (srfi srfi-26)
#:use-module (srfi srfi-35)
#:use-module (srfi srfi-71)
#:use-module (ice-9 format)
#:use-module (ice-9 match)
#:export (prosody-service-type
prosody-configuration
opaque-prosody-configuration
virtualhost-configuration
int-component-configuration
ext-component-configuration
mod-muc-configuration
ssl-configuration
%default-modules-enabled
prosody-configuration-pidfile
bitlbee-configuration
bitlbee-configuration?
bitlbee-service-type
ngircd-service-type
ngircd-configuration
ngircd-configuration?
ngircd-configuration-ngircd
ngircd-configuration-debug?
ngircd-configuration-shepherd-requirement
ngircd-configuration-global
ngircd-configuration-limits
ngircd-configuration-options
ngircd-configuration-ssl
ngircd-configuration-operators
ngircd-configuration-servers
ngircd-configuration-channels
ngircd-global
ngircd-global?
ngircd-global-name
ngircd-global-admin-info-1
ngircd-global-admin-info-2
ngircd-global-admin-email
ngircd-global-help-file
ngircd-global-info
ngircd-global-listen
ngircd-global-motd-file
ngircd-global-motd-phrase
ngircd-global-network
ngircd-global-password
ngircd-global-pid-file
ngircd-global-ports
ngircd-global-server-uid
ngircd-global-server-gid
ngircd-limits
ngircd-limits?
ngircd-limits-connect-retry
ngircd-limits-max-connections
ngircd-limits-max-connections-ip
ngircd-limits-max-joins
ngircd-limits-max-list-size
ngircd-limits-ping-timeout
ngircd-limits-pong-timeout
ngircd-options
ngircd-options?
ngircd-options-allowed-channel-types
ngircd-options-allow-remote-oper?
ngircd-options-connect-ipv4?
ngircd-options-connect-ipv6?
ngircd-options-dns?
ngircd-options-more-privacy?
ngircd-options-notice-before-registration?
ngircd-options-oper-can-use-mode?
ngircd-options-oper-chan-p-auto-op?
ngircd-options-oper-server-mode?
ngircd-options-pam?
ngircd-options-pam-is-optional?
ngircd-options-require-auth-ping?
ngircd-ssl
ngircd-ssl?
ngircd-ssl-cert-file
ngircd-ssl-key-file
ngircd-ssl-ca-file
ngircd-ssl-ports
ngircd-ssl-cipher-list
ngircd-ssl-dh-file
ngircd-operator
ngircd-operator?
ngircd-operator-name
ngircd-operator-password
ngircd-operator-mask
ngircd-server
ngircd-server?
ngircd-server-name
ngircd-server-host
ngircd-server-my-password
ngircd-server-peer-password
ngircd-server-bind
ngircd-server-port
ngircd-server-group
ngircd-server-passive?
ngircd-server-ssl-connect?
ngircd-server-ssl-verify?
ngircd-channel
ngircd-channel?
ngircd-channel-name
ngircd-channel-topic
ngircd-channel-modes
ngircd-channel-key-file
pounce-configuration
pounce-configuration-pounce
pounce-configuration-shepherd-provision
pounce-configuration-shepherd-requirement
pounce-configuration-log-file
pounce-configuration-verbose?
pounce-configuration-local-host
pounce-configuration-local-port
pounce-configuration-local-ca
pounce-configuration-local-cert
pounce-configuration-local-priv
pounce-configuration-local-pass
pounce-configuration-size
pounce-configuration-bind
pounce-configuration-host
pounce-configuration-port
pounce-configuration-pass
pounce-configuration-join
pounce-configuration-mode
pounce-configuration-user
pounce-configuration-nick
pounce-configuration-real
pounce-configuration-away
pounce-configuration-quit
pounce-configuration-no-names?
pounce-configuration-queue-interval
pounce-configuration-trust
pounce-configuration-client-cert
pounce-configuration-client-priv
pounce-configuration-sasl-plain
pounce-configuration-sasl-external?
pounce-service-type
quassel-configuration
quassel-service-type
snuik-configuration
snuik-service-type
mosquitto-configuration
mosquitto-configuration?
mosquitto-configuration-package
mosquitto-configuration-config-file
mosquitto-configuration-user
mosquitto-configuration-group
mosquitto-service-type))
;;; Commentary:
;;;
;;; Messaging services.
;;;
;;; Code:
(define-syntax define-all-configurations
(lambda (stx)
(define-syntax-rule (id ctx parts ...)
"Assemble PARTS into a raw (unhygienic) identifier."
(datum->syntax ctx (symbol-append (syntax->datum parts) ...)))
(define (make-pred arg)
(lambda (field target)
(and (memq (syntax->datum target) `(common ,arg)) field)))
(syntax-case stx ()
;; TODO Also handle (field-type) form, without a default.
((_ stem (field (field-type def) doc target) ...)
(with-syntax (((new-field-type ...)
(map (lambda (field-type target)
(if (and (eq? 'common (syntax->datum target))
(not (string-prefix?
"maybe-"
(symbol->string
(syntax->datum field-type)))))
(id #'stem #'maybe- field-type) field-type))
#'(field-type ...) #'(target ...)))
((new-def ...)
(map (lambda (def target)
(if (eq? 'common (syntax->datum target))
;; TODO Use the %unset-value variable, or
;; even better just simplify this so that it
;; doesn't interfere with
;; define-configuration and define-maybe
;; internals.
#''%unset-marker% def))
#'(def ...) #'(target ...)))
((new-doc ...)
(map (lambda (doc target)
(if (eq? 'common (syntax->datum target))
"" doc))
#'(doc ...) #'(target ...))))
#`(begin
(define #,(id #'stem #'common-fields)
'(#,@(filter-map (make-pred #f) #'(field ...) #'(target ...))))
(define-configuration #,(id #'stem #'prosody-configuration)
#,@(filter-map (make-pred 'global)
#'((field (field-type def) doc) ...)
#'(target ...)))
(define-configuration #,(id #'stem #'virtualhost-configuration)
#,@(filter-map (make-pred 'virtualhost)
#'((field (new-field-type new-def) new-doc) ...)
#'(target ...)))
(define-configuration #,(id #'stem #'int-component-configuration)
#,@(filter-map (make-pred 'int-component)
#'((field (new-field-type new-def) new-doc) ...)
#'(target ...)))
(define-configuration #,(id #'stem #'ext-component-configuration)
#,@(filter-map (make-pred 'ext-component)
#'((field (new-field-type new-def) new-doc) ...)
#'(target ...)))))))))
(define (uglify-field-name field-name)
(let ((str (symbol->string field-name)))
(string-join (string-split (if (string-suffix? "?" str)
(substring str 0 (1- (string-length str)))
str)
#\-)
"_")))
(define (serialize-field field-name val)
#~(format #f "~a = ~a;\n" #$(uglify-field-name field-name) #$val))
(define (serialize-field-list field-name val)
(serialize-field field-name #~(format #f "{\n~@{~a;\n~}}" #$@val)))
(define (serialize-boolean field-name val)
(serialize-field field-name (if val "true" "false")))
(define-maybe boolean)
(define (string-or-boolean? val)
(or (string? val) (boolean? val)))
(define (serialize-string-or-boolean field-name val)
(if (string? val)
(serialize-string field-name val)
(serialize-boolean field-name val)))
(define (non-negative-integer? val)
(and (exact-integer? val) (not (negative? val))))
(define (serialize-non-negative-integer field-name val)
(serialize-field field-name (number->string val)))
(define-maybe non-negative-integer)
(define (non-negative-integer-list? val)
(and (list? val) (and-map non-negative-integer? val)))
(define (serialize-non-negative-integer-list field-name val)
(serialize-field-list field-name (map number->string val)))
(define-maybe non-negative-integer-list)
(define (enclose-quotes s)
#~(string-append "\"" #$s "\""))
(define (serialize-string field-name val)
(serialize-field field-name (enclose-quotes val)))
(define-maybe string)
(define (string-list? val)
(and (list? val)
(and-map (lambda (x)
(and (string? x) (not (string-index x #\,))))
val)))
(define (serialize-string-list field-name val)
(serialize-field-list field-name (map enclose-quotes val)))
(define-maybe string-list)
(define (module-list? val)
(string-list? val))
(define (serialize-module-list field-name val)
(serialize-string-list field-name val))
(define-maybe module-list)
(define (file-name? val)
(and (string? val)
(string-prefix? "/" val)))
(define (serialize-file-name field-name val)
(serialize-string field-name val))
(define-maybe file-name)
(define (file-name-list? val)
(and (list? val) (and-map file-name? val)))
(define (serialize-file-name-list field-name val)
(serialize-string-list field-name val))
(define-maybe file-name-list)
(define (file-object? val)
(or (file-like? val) (file-name? val)))
(define (serialize-file-object field-name val)
(serialize-string field-name val))
(define-maybe file-object)
(define (file-object-list? val)
(and (list? val) (and-map file-object? val)))
(define (serialize-file-object-list field-name val)
(serialize-string-list field-name val))
(define-maybe file-object-list)
(define (raw-content? val)
(maybe-value-set? val))
(define (serialize-raw-content field-name val)
val)
(define-maybe raw-content)
(define-configuration mod-muc-configuration
(name
(string "Prosody Chatrooms")
"The name to return in service discovery responses.")
(restrict-room-creation
(string-or-boolean #f)
"If @samp{#t}, this will only allow admins to create new chatrooms.
Otherwise anyone can create a room. The value @samp{\"local\"} restricts room
creation to users on the service's parent domain. E.g. @samp{user@@example.com}
can create rooms on @samp{rooms.example.com}. The value @samp{\"admin\"}
restricts to service administrators only.")
(max-history-messages
(non-negative-integer 20)
"Maximum number of history messages that will be sent to the member that has
just joined the room."))
(define (serialize-mod-muc-configuration field-name val)
(serialize-configuration val mod-muc-configuration-fields))
(define-maybe mod-muc-configuration)
(define-configuration ssl-configuration
(protocol
maybe-string
"This determines what handshake to use.")
(key
maybe-file-name
"Path to your private key file.")
(certificate
maybe-file-name
"Path to your certificate file.")
(capath
(file-object "/etc/ssl/certs")
"Path to directory containing root certificates that you wish Prosody to
trust when verifying the certificates of remote servers.")
(cafile
maybe-file-object
"Path to a file containing root certificates that you wish Prosody to trust.
Similar to @code{capath} but with all certificates concatenated together.")
(verify
maybe-string-list
"A list of verification options (these mostly map to OpenSSL's
@code{set_verify()} flags).")
(options
maybe-string-list
"A list of general options relating to SSL/TLS. These map to OpenSSL's
@code{set_options()}. For a full list of options available in LuaSec, see the
LuaSec source.")
(depth
maybe-non-negative-integer
"How long a chain of certificate authorities to check when looking for a
trusted root certificate.")
(ciphers
maybe-string
"An OpenSSL cipher string. This selects what ciphers Prosody will offer to
clients, and in what order.")
(dhparam
maybe-file-name
"A path to a file containing parameters for Diffie-Hellman key exchange. You
can create such a file with:
@code{openssl dhparam -out /etc/prosody/certs/dh-2048.pem 2048}")
(curve
maybe-string
"Curve for Elliptic curve Diffie-Hellman. Prosody's default is
@samp{\"secp384r1\"}.")
(verifyext
maybe-string-list
"A list of \"extra\" verification options.")
(password
maybe-string
"Password for encrypted private keys."))
(define (serialize-ssl-configuration field-name val)
#~(format #f "ssl = {\n~a};\n"
#$(serialize-configuration val ssl-configuration-fields)))
(define-maybe ssl-configuration)
(define %default-modules-enabled
'("roster"
"saslauth"
"tls"
"dialback"
"disco"
"carbons"
"private"
"blocklist"
"vcard"
"version"
"uptime"
"time"
"ping"
"pep"
"register"
"admin_adhoc"))
;; Guile bug. Use begin wrapper, because otherwise virtualhost-configuration
;; is assumed to be a function. See
;; https://www.gnu.org/software/guile/manual/html_node/R6RS-Incompatibilities.html
(begin
(define (virtualhost-configuration-list? val)
(and (list? val) (and-map virtualhost-configuration? val)))
(define (serialize-virtualhost-configuration-list l)
#~(string-append
#$@(map (lambda (val)
(serialize-virtualhost-configuration val)) l)))
(define (int-component-configuration-list? val)
(and (list? val) (and-map int-component-configuration? val)))
(define (serialize-int-component-configuration-list l)
#~(string-append
#$@(map (lambda (val)
(serialize-int-component-configuration val)) l)))
(define (ext-component-configuration-list? val)
(and (list? val) (and-map ext-component-configuration? val)))
(define (serialize-ext-component-configuration-list l)
#~(string-append
#$@(map (lambda (val)
(serialize-ext-component-configuration val)) l)))
(define-all-configurations prosody-configuration
(prosody
(file-like prosody)
"The Prosody package."
global)
(data-path
(file-name "/var/lib/prosody")
"Location of the Prosody data storage directory. See
@url{https://prosody.im/doc/configure}."
global)
(plugin-paths
(file-object-list '())
"Additional plugin directories. They are searched in all the specified
paths in order. See @url{https://prosody.im/doc/plugins_directory}."
global)
(certificates
(file-name "/etc/prosody/certs")
"Every virtual host and component needs a certificate so that clients and
servers can securely verify its identity. Prosody will automatically load
certificates/keys from the directory specified here."
global)
(admins
(string-list '())
"This is a list of accounts that are admins for the server. Note that you
must create the accounts separately. See @url{https://prosody.im/doc/admins} and
@url{https://prosody.im/doc/creating_accounts}.
Example: @code{(admins '(\"user1@@example.com\" \"user2@@example.net\"))}"
common)
(use-libevent?
(boolean #f)
"Enable use of libevent for better performance under high load. See
@url{https://prosody.im/doc/libevent}."
common)
(modules-enabled
(module-list %default-modules-enabled)
"This is the list of modules Prosody will load on startup. It looks for
@code{mod_modulename.lua} in the plugins folder, so make sure that exists too.
Documentation on modules can be found at:
@url{https://prosody.im/doc/modules}."
common)
(modules-disabled
(string-list '())
"@samp{\"offline\"}, @samp{\"c2s\"} and @samp{\"s2s\"} are auto-loaded, but
should you want to disable them then add them to this list."
common)
(groups-file
(file-object "/var/lib/prosody/sharedgroups.txt")
"Path to a text file where the shared groups are defined. If this path is
empty then @samp{mod_groups} does nothing. See
@url{https://prosody.im/doc/modules/mod_groups}."
common)
(allow-registration?
(boolean #f)
"Disable account creation by default, for security. See
@url{https://prosody.im/doc/creating_accounts}."
common)
(ssl
(maybe-ssl-configuration (ssl-configuration))
"These are the SSL/TLS-related settings. Most of them are disabled so to
use Prosody's defaults. If you do not completely understand these options, do
not add them to your config, it is easy to lower the security of your server
using them. See @url{https://prosody.im/doc/advanced_ssl_config}."
common)
(c2s-require-encryption?
(boolean #f)
"Whether to force all client-to-server connections to be encrypted or not.
See @url{https://prosody.im/doc/modules/mod_tls}."
common)
(disable-sasl-mechanisms
(string-list '("DIGEST-MD5"))
"Set of mechanisms that will never be offered. See
@url{https://prosody.im/doc/modules/mod_saslauth}."
common)
(insecure-sasl-mechanisms
(string-list '("PLAIN" "LOGIN"))
"Set of mechanisms that will not be offered on unencrypted connections.
See @url{https://prosody.im/doc/modules/mod_saslauth}."
common)
(s2s-require-encryption?
(boolean #f)
"Whether to force all server-to-server connections to be encrypted or not.
See @url{https://prosody.im/doc/modules/mod_tls}."
common)
(s2s-secure-auth?
(boolean #f)
"Whether to require encryption and certificate authentication. This
provides ideal security, but requires servers you communicate with to support
encryption AND present valid, trusted certificates. See
@url{https://prosody.im/doc/s2s#security}."
common)
(s2s-insecure-domains
(string-list '())
"Many servers don't support encryption or have invalid or self-signed
certificates. You can list domains here that will not be required to
authenticate using certificates. They will be authenticated using DNS. See
@url{https://prosody.im/doc/s2s#security}."
common)
(s2s-secure-domains
(string-list '())
"Even if you leave @code{s2s-secure-auth?} disabled, you can still require
valid certificates for some domains by specifying a list here. See
@url{https://prosody.im/doc/s2s#security}."
common)
(authentication
(string "internal_plain")
"Select the authentication backend to use. The default provider stores
passwords in plaintext and uses Prosody's configured data storage to store the
authentication data. If you do not trust your server please see
@url{https://prosody.im/doc/modules/mod_auth_internal_hashed} for information
about using the hashed backend. See also
@url{https://prosody.im/doc/authentication}"
common)
;; TODO: Handle more complicated log structures.
(log
(maybe-string "*syslog")
"Set logging options. Advanced logging configuration is not yet supported
by the Prosody service. See @url{https://prosody.im/doc/logging}."
common)
(pidfile
(file-name "/var/run/prosody/prosody.pid")
"File to write pid in. See @url{https://prosody.im/doc/modules/mod_posix}."
global)
(http-max-content-size
(maybe-non-negative-integer %unset-value)
"Maximum allowed size of the HTTP body (in bytes)."
common)
(http-external-url
(maybe-string %unset-value)
"Some modules expose their own URL in various ways. This URL is built
from the protocol, host and port used. If Prosody sits behind a proxy, the
public URL will be @code{http-external-url} instead. See
@url{https://prosody.im/doc/http#external_url}."
common)
(virtualhosts
(virtualhost-configuration-list
(list (virtualhost-configuration
(domain "localhost"))))
"A host in Prosody is a domain on which user accounts can be created. For
example if you want your users to have addresses like
@samp{\"john.smith@@example.com\"} then you need to add a host
@samp{\"example.com\"}. All options in this list will apply only to this host.
Note: the name \"virtual\" host is used in configuration to avoid confusion with
the actual physical host that Prosody is installed on. A single Prosody
instance can serve many domains, each one defined as a VirtualHost entry in
Prosody's configuration. Conversely a server that hosts a single domain would
have just one VirtualHost entry.
See @url{https://prosody.im/doc/configure#virtual_host_settings}."
global)
(int-components
(int-component-configuration-list '())
"Components are extra services on a server which are available to clients,
usually on a subdomain of the main server (such as
@samp{\"mycomponent.example.com\"}). Example components might be chatroom
servers, user directories, or gateways to other protocols.
Internal components are implemented with Prosody-specific plugins. To add an
internal component, you simply fill the hostname field, and the plugin you wish
to use for the component.
See @url{https://prosody.im/doc/components}."
global)
(ext-components
(ext-component-configuration-list '())
"External components use XEP-0114, which most standalone components
support. To add an external component, you simply fill the hostname field. See
@url{https://prosody.im/doc/components}."
global)
(component-secret
(string (configuration-missing-field 'ext-component 'component-secret))
"Password which the component will use to log in."
ext-component)
(component-ports
(non-negative-integer-list '(5347))
"Port(s) Prosody listens on for component connections."
global)
(component-interface
(string "127.0.0.1")
"Interface Prosody listens on for component connections."
global)
(domain
(string (configuration-missing-field 'virtualhost 'domain))
"Domain you wish Prosody to serve."
virtualhost)
(hostname
(string (configuration-missing-field 'int-component 'hostname))
"Hostname of the component."
int-component)
(plugin
(string (configuration-missing-field 'int-component 'plugin))
"Plugin you wish to use for the component."
int-component)
(mod-muc
(maybe-mod-muc-configuration %unset-value)
"Multi-user chat (MUC) is Prosody's module for allowing you to create
hosted chatrooms/conferences for XMPP users.
General information on setting up and using multi-user chatrooms can be found
in the \"Chatrooms\" documentation (@url{https://prosody.im/doc/chatrooms}),
which you should read if you are new to XMPP chatrooms.
See also @url{https://prosody.im/doc/modules/mod_muc}."
int-component)
(hostname
(string (configuration-missing-field 'ext-component 'hostname))
"Hostname of the component."
ext-component)
(raw-content
(maybe-raw-content %unset-value)
"Raw content that will be added to the configuration file."
common)))
;; Serialize Virtualhost line first.
(define (serialize-virtualhost-configuration config)
(define (rest? field)
(not (memq (configuration-field-name field)
'(domain))))
(let ((domain (virtualhost-configuration-domain config))
(rest (filter rest? virtualhost-configuration-fields)))
#~(string-append
#$(format #f "VirtualHost \"~a\"\n" domain)
#$(serialize-configuration config rest))))
;; Serialize Component line first.
(define (serialize-int-component-configuration config)
(define (rest? field)
(not (memq (configuration-field-name field)
'(hostname plugin))))
(let ((hostname (int-component-configuration-hostname config))
(plugin (int-component-configuration-plugin config))
(rest (filter rest? int-component-configuration-fields)))
#~(string-append
#$(format #f "Component \"~a\" \"~a\"\n" hostname plugin)
#$(serialize-configuration config rest))))
;; Serialize Component line first.
(define (serialize-ext-component-configuration config)
(define (rest? field)
(not (memq (configuration-field-name field)
'(hostname))))
(let ((hostname (ext-component-configuration-hostname config))
(rest (filter rest? ext-component-configuration-fields)))
#~(string-append
#$(format #f "Component \"~a\"\n" hostname)
#$(serialize-configuration config rest))))
;; Serialize virtualhosts and components last.
(define (serialize-prosody-configuration config)
(define (rest? field)
(not (memq (configuration-field-name field)
'(virtualhosts int-components ext-components))))
#~(string-append
#$(let ((rest (filter rest? prosody-configuration-fields)))
(serialize-configuration config rest))
#$(serialize-virtualhost-configuration-list
(prosody-configuration-virtualhosts config))
#$(serialize-int-component-configuration-list
(prosody-configuration-int-components config))
#$(serialize-ext-component-configuration-list
(prosody-configuration-ext-components config))))
(define-configuration opaque-prosody-configuration
(prosody
(file-like prosody)
"The prosody package.")
(prosody.cfg.lua
(string (configuration-missing-field 'opaque-prosody-configuration
'prosody.cfg.lua))
"The contents of the @code{prosody.cfg.lua} to use."))
(define (prosody-shepherd-service config)
"Return a <shepherd-service> for Prosody with CONFIG."
(let* ((prosody (if (opaque-prosody-configuration? config)
(opaque-prosody-configuration-prosody config)
(prosody-configuration-prosody config)))
(prosodyctl-bin (file-append prosody "/bin/prosodyctl"))
(pid-file (prosody-configuration-pidfile config))
(prosodyctl-action (lambda args
#~(lambda _
(invoke #$prosodyctl-bin #$@args)
(match '#$args
(("start")
(call-with-input-file #$pid-file read))
(_ #t))))))
(list (shepherd-service
(documentation "Run the Prosody XMPP server")
(provision '(prosody xmpp-daemon))
(requirement '(networking syslogd user-processes))
(modules `((ice-9 match)
,@%default-modules))
(start (prosodyctl-action "start"))
(stop (prosodyctl-action "stop"))))))
(define %prosody-accounts
(list (user-group (name "prosody") (system? #t))
(user-account
(name "prosody")
(group "prosody")
(system? #t)
(comment "Prosody daemon user")
(home-directory "/var/empty")
(shell (file-append shadow "/sbin/nologin")))))
(define (prosody-activation config)
"Return the activation gexp for CONFIG."
(let* ((config-dir "/etc/prosody")
(default-certs-dir "/etc/prosody/certs")
(data-path (prosody-configuration-data-path config))
(pidfile-dir (dirname (prosody-configuration-pidfile config)))
(config-str (if (opaque-prosody-configuration? config)
(opaque-prosody-configuration-prosody.cfg.lua config)
#~(begin
(use-modules (ice-9 format))
#$(serialize-prosody-configuration config))))
(config-file (mixed-text-file "prosody.cfg.lua" config-str)))
#~(begin
(use-modules (guix build utils))
(define %user (getpw "prosody"))
(mkdir-p #$config-dir)
(chown #$config-dir (passwd:uid %user) (passwd:gid %user))
(copy-file #$config-file (string-append #$config-dir
"/prosody.cfg.lua"))
(mkdir-p #$default-certs-dir)
(chown #$default-certs-dir (passwd:uid %user) (passwd:gid %user))
(chmod #$default-certs-dir #o750)
(mkdir-p #$data-path)
(chown #$data-path (passwd:uid %user) (passwd:gid %user))
(chmod #$data-path #o750)
(mkdir-p #$pidfile-dir)
(chown #$pidfile-dir (passwd:uid %user) (passwd:gid %user)))))
(define prosody-service-type
(service-type (name 'prosody)
(extensions
(list (service-extension shepherd-root-service-type
prosody-shepherd-service)
(service-extension account-service-type
(const %prosody-accounts))
(service-extension activation-service-type
prosody-activation)))
(default-value (prosody-configuration
(virtualhosts
(list
(virtualhost-configuration
(domain "localhost"))))))
(description
"Run Prosody, a modern XMPP communication server.")))
;; A little helper to make it easier to document all those fields.
(define (generate-documentation)
(define documentation
`((prosody-configuration
,prosody-configuration-fields
(ssl ssl-configuration)
(virtualhosts virtualhost-configuration)
(int-components int-component-configuration)
(ext-components ext-component-configuration))
(ssl-configuration ,ssl-configuration-fields)
(int-component-configuration ,int-component-configuration-fields
(mod-muc mod-muc-configuration))
(ext-component-configuration ,ext-component-configuration-fields)
(mod-muc-configuration ,mod-muc-configuration-fields)
(virtualhost-configuration ,virtualhost-configuration-fields)
(opaque-prosody-configuration ,opaque-prosody-configuration-fields)))
(define (generate configuration-name)
(match (assq-ref documentation configuration-name)
((fields . sub-documentation)
(format #t "\nAvailable @code{~a} fields are:\n\n" configuration-name)
(when (memq configuration-name
'(virtualhost-configuration
int-component-configuration
ext-component-configuration))
(format #t "all these @code{prosody-configuration} fields: ~a, plus:\n"
(string-join (map (lambda (s)
(format #f "@code{~a}" s)) common-fields)
", ")))
(for-each
(lambda (f)
(let ((field-name (configuration-field-name f))
(field-type (configuration-field-type f))
(field-docs (string-trim-both
(configuration-field-documentation f)))
(default (catch #t
(configuration-field-default-value-thunk f)
(lambda _ 'nope))))
(define (escape-chars str chars escape)
(with-output-to-string
(lambda ()
(string-for-each (lambda (c)
(when (char-set-contains? chars c)
(display escape))
(display c))
str))))
(define (show-default? val)
(or (string? val) (number? val) (boolean? val)
(and (list? val) (and-map show-default? val))))
(format #t "@deftypevr {@code{~a} parameter} ~a ~a\n~a\n"
configuration-name field-type field-name field-docs)
(when (show-default? default)
(format #t "Defaults to @samp{~a}.\n"
(escape-chars (format #f "~s" default)
(char-set #\@ #\{ #\})
#\@)))
(for-each generate (or (assq-ref sub-documentation field-name) '()))
(format #t "@end deftypevr\n\n")))
(filter (lambda (f)
(not (string=? "" (configuration-field-documentation f))))
fields)))))
(generate 'prosody-configuration)
(format #t "It could be that you just want to get a @code{prosody.cfg.lua}
up and running. In that case, you can pass an
@code{opaque-prosody-configuration} record as the value of
@code{prosody-service-type}. As its name indicates, an opaque configuration
does not have easy reflective capabilities.")
(generate 'opaque-prosody-configuration)
(format #t "For example, if your @code{prosody.cfg.lua} is just the empty
string, you could instantiate a prosody service like this:
@example
(service prosody-service-type
(opaque-prosody-configuration
(prosody.cfg.lua \"\")))
@end example"))
;;;
;;; BitlBee.
;;;
(define-record-type* <bitlbee-configuration>
bitlbee-configuration make-bitlbee-configuration
bitlbee-configuration?
(bitlbee bitlbee-configuration-bitlbee
(default bitlbee))
(interface bitlbee-configuration-interface
(default "127.0.0.1"))
(port bitlbee-configuration-port
(default 6667))
(plugins bitlbee-plugins
(default '()))
(extra-settings bitlbee-configuration-extra-settings
(default "")))
(define bitlbee-shepherd-service
(match-lambda
(($ <bitlbee-configuration> bitlbee interface port
plugins extra-settings)
(let* ((plugins (directory-union "bitlbee-plugins" plugins))
(conf (mixed-text-file "bitlbee.conf"
"
[settings]
User = bitlbee
ConfigDir = /var/lib/bitlbee
DaemonInterface = " interface "
DaemonPort = " (number->string port) "
PluginDir = " plugins "/lib/bitlbee
" extra-settings))
(bitlbee* (least-authority-wrapper
(file-append bitlbee "/sbin/bitlbee")
#:name "bitlbee"
#:preserved-environment-variables
'("PURPLE_PLUGIN_PATH" "GUIX_LOCPATH" "LC_ALL")
#:mappings (list (file-system-mapping
(source "/var/lib/bitlbee")
(target source)
(writable? #t))
(file-system-mapping
(source "/run/current-system/locale")
(target source))
(file-system-mapping
(source conf)
(target conf)))
#:namespaces (delq 'net %namespaces))))
(list (shepherd-service
(provision '(bitlbee))
;; Note: If networking is not up, then /etc/resolv.conf
;; doesn't get mapped in the container, hence the dependency
;; on 'networking'.
(requirement '(user-processes networking))
(start #~(make-inetd-constructor
(list #$bitlbee* "-I" "-c" #$conf)
(list (endpoint
(addrinfo:addr
(car (getaddrinfo #$interface
#$(number->string port)
(logior AI_NUMERICHOST
AI_NUMERICSERV))))))
#:requirements '#$requirement
#:service-name-stem "bitlbee"
#:user "bitlbee" #:group "bitlbee"
;; Allow 'bitlbee-purple' to use libpurple plugins.
#:environment-variables
(list (string-append "PURPLE_PLUGIN_PATH="
#$plugins "/lib/purple-2")
"GUIX_LOCPATH=/run/current-system/locale")))
(stop #~(make-inetd-destructor))))))))
(define %bitlbee-accounts
;; User group and account to run BitlBee.
(list (user-group (name "bitlbee") (system? #t))
(user-account
(name "bitlbee")
(group "bitlbee")
(system? #t)
(comment "BitlBee daemon user")
(home-directory "/var/empty")
(shell (file-append shadow "/sbin/nologin")))))
(define %bitlbee-activation
;; Activation gexp for BitlBee.
#~(begin
(use-modules (guix build utils))
;; This directory is used to store OTR data.
(mkdir-p "/var/lib/bitlbee")
(let ((user (getpwnam "bitlbee")))
(chown "/var/lib/bitlbee"
(passwd:uid user) (passwd:gid user)))))
(define bitlbee-service-type
(service-type (name 'bitlbee)
(extensions
(list (service-extension shepherd-root-service-type
bitlbee-shepherd-service)
(service-extension account-service-type
(const %bitlbee-accounts))
(service-extension activation-service-type
(const %bitlbee-activation))))
(default-value (bitlbee-configuration))
(description
"Run @url{http://bitlbee.org,BitlBee}, a daemon that acts as
a gateway between IRC and chat networks.")))
;;;
;;; ngIRCd.
;;;
(define-maybe string
(prefix ngircd-))
(define-maybe file-like
(prefix ngircd-))
(define-maybe list-of-strings
(prefix ngircd-))
(define (port? x)
(and (number? x)
(and (>= x 0) (<= x 65535))))
(define list-of-ports?
(list-of port?))
(define-maybe port
(prefix ngircd-))
(define-maybe list-of-ports
(prefix ngircd-))
(define-maybe number
(prefix ngircd-))
(define-maybe boolean
(prefix ngircd-))
(define (pascal-case text)
(object->camel-case-string text 'upper))
(define (ngircd-serialize-string field value)
(format #f "~a = ~a~%" (pascal-case field) value))
(define (ngircd-serialize-boolean field value)
(let* ((field (symbol->string field))
(name (if (string-suffix? "?" field)
(string-drop-right field 1)
field)))
(format #f "~a = ~:[false~;true~]~%" (pascal-case name) value)))
(define (ngircd-serialize-file-like field value)
#~(format #f "~a = ~a~%" #$(pascal-case field) #$value))
(define (ngircd-serialize-list-of-strings field value)
(format #f "~a = ~{~a~^,~}~%" (pascal-case field) value))
(define ngircd-serialize-list-of-ports
ngircd-serialize-list-of-strings)
(define ngircd-serialize-number ngircd-serialize-string)
(define ngircd-serialize-port ngircd-serialize-number)
(define (string-or-number? x)
(or (string? x) (number? x)))
(define ngircd-serialize-string-or-number ngircd-serialize-string)
(define-configuration ngircd-global ;[Global]
(name
maybe-string
"Server name in the IRC network. This is an individual name of the IRC
server, it is not related to the DNS host name. It must be unique in the IRC
network and must contain at least one dot (@samp{.}) character. When not set,
ngIRCd tries to deduce a valid IRC server name from the local host name.")
(admin-info-1
maybe-string
"First administrator information.")
(admin-info-2
maybe-string
"Second administrator information.")
(admin-email
maybe-string
"Email to reach administrators.")
(help-file
maybe-file-like
"File-like containing the ngIRCd help text.")
(info
maybe-string
"Info text of the server. This will be shown by WHOIS and LINKS requests
for example.")
(listen
(list-of-strings (list "::" "0.0.0.0"))
"A list of IP address on which the server should listen. By default it
listens on all configured IP addresses and interfaces.")
(motd-file
;; Provide an empty default file to avoid a warning when running
;; --configtest to validate the configuration file.
(file-like (plain-file "ngircd.motd" ""))
"Text file with the @i{message of the day} (MOTD). This message will be
shown to all users connecting to the server.")
(motd-phrase
maybe-string
"A simple phrase (<127 chars) to use if you don't want to use a MOTD
file.")
(network
maybe-string
"The name of the IRC network to which this server belongs. This name is
optional, should only contain ASCII characters, and can't contain spaces. It
is only used to inform clients.")
(password
maybe-string
"Global password or all users needed to connect to the server. By default,
no password is required. PAM must be disabled for this option to have an
effect.")
(pid-file
(string "/run/ngircd/ngircd.pid")
"The file name where the PID of ngIRCd should be written after it starts.")
(ports
(list-of-ports (list 6667))
"Port number(s) on which the server should listen for @emph{unencrypted}
connections.")
(server-uid
(string-or-number "ngircd")
"The user that the @command{ngircd} command should run as.")
(server-gid
(string-or-number "ngircd")
"The group that the @command{ngircd} command should run as.")
(prefix ngircd-))
(define (serialize-ngircd-global _ config)
#~(string-append
"[Global]\n"
#$(serialize-configuration config ngircd-global-fields)))
(define-configuration ngircd-limits ;[Limits]
(connect-retry
(maybe-number 60)
"The number of seconds the server should wait before re-attempting to
establish a link to not yet (or no longer) connected servers.")
(max-connections
(maybe-number 0)
"Maximum number of simultaneous in- and outbound connections the server is
allowed to accept. There is no limit by default.")
(max-connections-ip
(maybe-number 5)
"Maximum number of simultaneous connections from a single IP address that
the server will accept. This configuration options lowers the risk of denial
of service attacks (DoS). Set to 0 to remove the limit.")
(max-joins
(maybe-number 10)
"Maximum number of channels a user can be member of. Set to 0 to remove
the limit.")
(max-list-size
(maybe-number 100)
"Maximum number of channels returned in response to a LIST command.")
(ping-timeout
(maybe-number 120)
"Number of seconds of inactivity after which the server will send a PING to
the peer to test whether it is alive or not.")
(pong-timeout
(maybe-number 20)
"If a client fails to answer a PING with a PONG within this amount of
seconds, it will be disconnected by the server.")
(prefix ngircd-))
(define (serialize-ngircd-limits _ config)
#~(string-append
"\n[Limits]\n"
#$(serialize-configuration config ngircd-limits-fields)))
(define-maybe ngircd-limits)
(define-configuration ngircd-options ;[Options]
(allowed-channel-types
(maybe-string "#&+")
"List of allowed channel types (channel prefixes) for newly created
channels on the local server. By default, all supported channel types are
allowed.")
(allow-remote-oper?
(maybe-boolean #f)
"If this option is active, IRC operators connected to remote servers are
allowed to control this local server using administrative commands, for
example like CONNECT, DIE, SQUIT, etc.")
(connect-ipv4?
(maybe-boolean #t)
"Set to @code{#f} to prevent ngIRCd from connecting to other IRC servers
using the IPv4 protocol, allowed by default.")
(connect-ipv6?
(maybe-boolean #t)
"Set to @code{#f} to prevent ngIRCd from connecting to other IRC servers
using the IPv6 protocol, allowed by default.")
(dns?
(maybe-boolean #t)
"Set to @code{#f} to disable DNS lookups when clients connect. If you
configure the daemon to connect to other servers, ngIRCd may still perform a
DNS lookup if required.")
(more-privacy?
(maybe-boolean #f)
"Set this to @code{#t} to have ngIRCd censor user idle time, logon time as
well as the PART/QUIT messages (that sometimes used to inform everyone about
which client software is being used). WHOWAS requests are also silently
ignored, and NAMES output doesn't list any clients for non-members. This
option is most useful when ngIRCd is being used together with anonymizing
software such as TOR or I2P and one does not wish to make it too easy to
collect statistics on the users.")
(notice-before-registration?
(maybe-boolean #f)
"Normally ngIRCd doesn't send any messages to a client until it is
registered. Enable this option to let the daemon send @samp{NOTICE *}
messages to clients while connecting.")
(oper-can-use-mode?
(maybe-boolean #f)
"Should IRC Operators be allowed to use the MODE command even if they are
not(!) channel-operators?")
(oper-chan-p-auto-op?
(maybe-boolean #t)
"Should IRC Operators get AutoOp (+o) in persistent (+P) channels?")
(oper-server-mode?
(maybe-boolean #f)
"If @code{open-can-use-mode?} is @code{#t}, this may lead the compatibility
problems with servers that run the ircd-irc2 software. This option masks mode
requests by non-chanops as if they were coming from the server. Only enable
this if you have ircd-irc2 servers in your IRC network.")
(pam?
(boolean #f)
"Set to @code{#t} to enable calls to the PAM library at runtime; all users
connecting without password are allowed to connect, all passwords given will
fail. Users identified without PAM are registered with a tilde (@samp{~})
prepended to their user name. This defaults to @code{#f} in Guix because the
service runs as an unprivileged user and thus cannot authenticate other users
via the @code{pam_unix} PAM module.")
(pam-is-optional?
(maybe-boolean #f)
"Set to @code{#t} to make PAM authentication optional, causing clients not
sending a password to still be able to connect, but won't become identified
and keep the tilder (@samp{~}) character prepended to their supplied user
name.")
(require-auth-ping?
(maybe-boolean #f)
"Set to @code{#t} to have ngIRCd send an authentication PING when a new
client connects, and register this client only after receiving the
corresponding PONG reply.")
(prefix ngircd-))
(define (serialize-ngircd-options _ config)
#~(string-append
"\n[Options]\n"
#$(serialize-configuration config ngircd-options-fields)))
(define-maybe ngircd-options)
(define-configuration ngircd-ssl ;[SSL]
(cert-file
maybe-string
"SSL certificate file of the private server key.")
(key-file
maybe-string
"File name of the SSL Server Key to be used for SSL connections, which is
required for SSL/TLS support.")
(ca-file
(maybe-string "/etc/ssl/certs/ca-certificates.crt")
"A file listing all the certificates of the trusted Certificate
Authorities.")
(ports
maybe-list-of-ports
"Like the global configuration's @code{port} option, except that ngIRCd
will expect incoming connections to be SSL/TLS encrypted. Common port numbers
for SSL-encrypted IRC are 6669 and 6697.")
(cipher-list
maybe-string
"The GnuTLS cipher suites allowed for SSL/TLS connections, a value such as
@code{\"SECURE128:-VERS-SSL3.0\"}. Refer to @samp{man 3 gnutls_priority_init}
for details.")
(dh-file
maybe-file-like
"A file-like containing the Diffie-Hellman parameters, which can be created
with GnuTLS via @samp{certtool --generate-dh-params}. If this file is not
present, the Diffie-Hellman parameters will be computed on startup, which may
take some time.")
(prefix ngircd-))
(define (serialize-ngircd-ssl _ config)
#~(string-append
"\n[SSL]\n"
#$(serialize-configuration config ngircd-ssl-fields)))
(define-maybe ngircd-ssl)
(define-configuration ngircd-operator ;[Operator]
(name
string
"ID of the operator (may be different of the nickname).")
(password
string
"Password of the IRC operator.")
(mask
maybe-string
"Mask that is to be checked before an /OPER for this account is accepted,
for example: @code{\"nick!ident@@*.example.com\"}.")
(prefix ngircd-))
(define list-of-ngircd-operators?
(list-of ngircd-operator?))
(define (serialize-ngircd-operator _ operator)
#~(string-append
"\n[Operator]\n"
#$(serialize-configuration operator ngircd-operator-fields)))
(define (serialize-list-of-ngircd-operators _ operators)
#~(string-append #$@(map (cut serialize-ngircd-operator #f <>) operators)))
(define-maybe list-of-ngircd-operators)
(define-configuration ngircd-server ;[Server]
(name
string
"IRC name of the remote server.")
(host
string
"Internet host name (or IP address) of the peer.")
(my-password
string
"Own password for this connection. This password has to be configured as
@code{peer-password} on the other server and must not have @samp{:} as first
character.")
(peer-password
string
"Foreign password for this connection. This password has to be configured
as @code{my-password} on the other server.")
(bind
maybe-string
"IP address to use as source IP for the outgoing connection. The default
is to let the operating system decide.")
(port
maybe-port
"Port of the remote server to which ngIRCd should connect (active). If no
port is assigned to a configured server, the daemon only waits for incoming
connections (passive, which is the default).")
(group
maybe-number
"Group of this server.")
(passive?
(maybe-boolean #f)
"Set to @code{#t} to disable automatic connection even if the port value is
specified.")
(ssl-connect?
(maybe-boolean #f)
"Set to @code{#t} to enforce the use of TLS to connect to the remote
server.")
(ssl-verify?
(maybe-boolean #t)
"Set to @code{#f} to disable the verification of the TLS certificate
presented by the remote server. This can be useful if the remote server uses
a self-signed certificate. Beware that this degrades security by enabling
man-in-the-middle attacks, as the @emph{remote site is not verified at all}.")
(prefix ngircd-))
(define list-of-ngircd-servers?
(list-of ngircd-server?))
(define (serialize-ngircd-server _ server)
#~(string-append
"\n[Server]\n"
#$(serialize-configuration server ngircd-server-fields)))
(define (serialize-list-of-ngircd-servers _ servers)
#~(string-append #$@(map (cut serialize-ngircd-server #f <>) servers)))
(define-maybe list-of-ngircd-servers)
(define-configuration ngircd-channel ;[Channel]
(name
string
"Name of the channel, including channel prefix (\"#\" or \"&\").")
(topic
maybe-string
"Topic for this channel.")
(modes
maybe-list-of-strings
"Initial channel modes, as used in MODE commands. Modifying lists (ban
list, invite list, exception list) is supported. If multiple MODE strings are
specified, they are evaluated in the order listed (left to right)."
(serializer (lambda (_ value)
;; Special case: each mode string gets serialized to a
;; separate option.
(format #f "~{Modes = ~a~%~}" value))))
(key-file
maybe-file-like
"Path and file name of a ngIRCd key file containing individual channel keys
for different users. Refer to @samp{man 5 ngircd.conf} for more details.")
(prefix ngircd-))
(define list-of-ngircd-channels?
(list-of ngircd-channel?))
(define (serialize-ngircd-channel _ channel)
#~(string-append
"\n[Channel]\n"
#$(serialize-configuration channel ngircd-channel-fields)))
(define (serialize-list-of-ngircd-channels _ channels)
#~(string-append #$@(map (cut serialize-ngircd-channel #f <>) channels)))
(define-maybe list-of-ngircd-channels)
(define-configuration ngircd-configuration
(ngircd
(file-like ngircd)
"The @code{ngircd} package to use.")
(debug?
(boolean #f)
"Turn on debugging messages."
(serializer empty-serializer))
(shepherd-requirement
(list-of-symbols '(user-processes networking))
"Shepherd requirements the service should depend on."
(serializer empty-serializer))
(global
;; Always use a ngircd-global default to ensure 'pid-file' is defined.
(ngircd-global (ngircd-global))
"A ngircd-global record object used to specify global options.")
(limits
maybe-ngircd-limits
"The ngircd-limits record object used to specify limits options.")
;; Always use a ngircd-options default to ensure PAM is disabled by default.
(options
(ngircd-options (ngircd-options))
"The ngircd-options record object used to specify optional features and
configuration options.")
(ssl
maybe-ngircd-ssl
"The ngircd-ssl record object used to specify the SSL-related options.")
(operators
maybe-list-of-ngircd-operators
"A list of ngircd-operator record objects used to specify the operators.")
(servers
maybe-list-of-ngircd-servers
"A list of ngircd-server record objects used to specify other remote
servers to connect to.")
(channels
maybe-list-of-ngircd-channels
"A list of ngircd-channels record objects specifying pre-defined channels
to be created by the server when starting up."))
(define (ngircd-generate-documentation)
(configuration->documentation 'ngircd-configuration)
(configuration->documentation 'ngircd-global)
(configuration->documentation 'ngircd-limits)
(configuration->documentation 'ngircd-options)
(configuration->documentation 'ngircd-ssl)
(configuration->documentation 'ngircd-operator)
(configuration->documentation 'ngircd-server)
(configuration->documentation 'ngircd-channel))
(define (ngircd-user+group config)
"Return the Global->ServerUID and Global->ServerGID configuration options as
values."
(let* ((global (ngircd-configuration-global config))
(user (ngircd-global-server-uid global))
(group (ngircd-global-server-gid global)))
(values user group)))
(define (ngircd-account config)
(let* ((user group (ngircd-user+group config))
(group-name (if (string? group)
group
"ngircd"))
(user-name (if (string? user)
user
"ngircd"))
(gid (if (number? group)
group
#f))
(uid (if (number? user)
user
#f)))
(list (user-group
(name group-name)
(id gid)
(system? #t))
(user-account
(name user-name)
(uid uid)
(group group-name)
(system? #t)
(comment "Ngircd daemon user")
(home-directory "/var/empty")
(shell (file-append shadow "/sbin/nologin"))))))
(define (serialize-ngircd-configuration config)
"Return a file-like object corresponding to the serialized
<ngircd-configuration> record."
(let ((ngircd (file-append (ngircd-configuration-ngircd config)
"/sbin/ngircd"))
(ngircd.conf (mixed-text-file "unvalidated-ngircd.conf"
(serialize-configuration
config ngircd-configuration-fields))))
(computed-file
"ngircd.conf"
(with-imported-modules '((guix build utils))
#~(begin
(use-modules (guix build utils))
;; Ensure stdin is not connected to a TTY source to avoid ngircd
;; configtest blocking with a confirmation prompt.
(parameterize ((current-input-port (%make-void-port "r")))
(invoke #+ngircd "--config" #$ngircd.conf "--configtest" ))
(copy-file #$ngircd.conf #$output))))))
(define (ngircd-wrapper config)
"Take CONFIG, a <ngircd-configuration> object, and provide a least-authority
wrapper for the 'ngircd' command."
(let* ((ngircd.conf (serialize-ngircd-configuration config))
(user group (ngircd-user+group config))
(global (ngircd-configuration-global config))
(pid-file (ngircd-global-pid-file global))
(help-file (ngircd-global-help-file global))
(motd-file (ngircd-global-motd-file global))
(ssl (ngircd-configuration-ssl config))
(channels (ngircd-configuration-channels config)))
(least-authority-wrapper
(file-append (ngircd-configuration-ngircd config) "/sbin/ngircd")
#:name "ngircd-pola-wrapper"
;; Expose all needed files, such as all options corresponding to
;; file-like objects and string file names.
#:mappings
(append
(list (file-system-mapping
(source "/var/log/ngircd.log")
(target source)
(writable? #t))
(file-system-mapping
(source ngircd.conf)
(target source))
(file-system-mapping
(source (string-append (dirname pid-file)))
(target source)
(writable? #t)))
(if (maybe-value-set? help-file)
(list (file-system-mapping
(source help-file)
(target source)))
'())
(if (maybe-value-set? motd-file)
(list (file-system-mapping
(source motd-file)
(target source)))
'())
(if (maybe-value-set? ssl)
;; When SSL is used, expose the specified keys and certificates.
(filter-map (lambda (value)
(if (maybe-value-set? value)
(file-system-mapping
(source value)
(target source))
#f))
(list (ngircd-ssl-ca-file ssl)
(ngircd-ssl-cert-file ssl)
(ngircd-ssl-key-file ssl)
(ngircd-ssl-dh-file ssl)))
'())
(if (maybe-value-set? channels)
(filter-map (lambda (channel)
(let ((key-file (ngircd-channel-key-file channel)))
(and (maybe-value-set? key-file)
key-file)))
channels)
'()))
#:user user
#:group group
;; ngircd wants to look up users in /etc/passwd so run in the global user
;; namespace. Also preserve the PID namespaces otherwise the PID file
;; would contain an unrelated PID number and confuse Shepherd.
#:namespaces (fold delq %namespaces '(net pid user)))))
(define (ngircd-shepherd-service config)
(match-record config <ngircd-configuration>
(debug? global shepherd-requirement ssl)
(let* ((ngircd.conf (serialize-ngircd-configuration config))
(pid-file (ngircd-global-pid-file global)))
(list (shepherd-service
(provision '(ngircd))
(requirement shepherd-requirement)
(modules (cons '(srfi srfi-1) %default-modules))
(actions (list (shepherd-configuration-action ngircd.conf)))
;; Sadly, 'make-systemd-constructor' doesn't work with TLS
;; connections, which hang up (see:
;; https://github.com/ngircd/ngircd/issues/330).
(start #~(make-forkexec-constructor
(append (list #$(ngircd-wrapper config)
"--nodaemon"
"--config" #$ngircd.conf)
(if #$debug?
'("--debug")
'()))
#:pid-file #$pid-file
#:log-file "/var/log/ngircd.log"))
(stop #~(make-kill-destructor)))))))
(define (ngircd-activation config)
(let* ((pid-file (ngircd-global-pid-file
(ngircd-configuration-global config)))
(user _ (ngircd-user+group config)))
#~(begin
(use-modules (guix build utils)
(ice-9 match))
(define pw (match #$user
((? number?) (getpwuid #$user))
((? string?) (getpwnam #$user))))
(mkdir-p/perms #$(dirname pid-file) pw #o755))))
(define ngircd-service-type
(service-type
(name 'ngircd)
(extensions
(list (service-extension shepherd-root-service-type
ngircd-shepherd-service)
(service-extension profile-service-type
(compose list ngircd-configuration-ngircd))
(service-extension account-service-type
ngircd-account)
(service-extension activation-service-type
ngircd-activation)))
(default-value (ngircd-configuration))
(description
"Run @url{https://ngircd.barton.de/, ngIRCd}, a lightweight @acronym{IRC,
Internet Relay Chat} daemon.")))
;;;
;;; Pounce.
;;;
(define (pounce-serialize-boolean field value)
"Boolean arguments for pounce serialize to their field name, minus the
trailing '?'."
(let ((name (symbol->string field)))
(string-append (if (string-suffix? "?" name)
(string-drop-right name 1)
name)
"\n")))
(define (pounce-serialize-string field value)
(format #f "~a=~a~%" field value))
(define (pounce-serialize-list-of-strings field value)
(format #f "~a=~{~a~^,~}~%" field value))
(define (pounce-serialize-pair field value)
(match value
((head . tail)
(format #f "~a=~a:~a~%" field head tail))))
(define (power-of-two? x)
"Predicate to check if X is an exact power of two."
(exact-integer? (sqrt x)))
(define pounce-serialize-number pounce-serialize-string)
(define pounce-serialize-power-of-two pounce-serialize-number)
(define pounce-serialize-port pounce-serialize-number)
(define-maybe boolean (prefix pounce-))
(define-maybe number (prefix pounce-))
(define-maybe pair (prefix pounce-))
(define-maybe port (prefix pounce-))
(define-maybe power-of-two (prefix pounce-))
(define-maybe string (prefix pounce-))
(define-maybe list-of-strings (prefix pounce-))
;;; For a reference w.r.t. which options require an argument, refer to the
;;; `options' array defined in bounce.c.
(define-configuration pounce-configuration
(pounce
(file-like pounce)
"The @code{pounce} package to use."
(serializer empty-serializer))
(shepherd-provision
(list-of-symbols '(pounce))
"The name(s) of the service."
(serializer empty-serializer))
(shepherd-requirement
(list-of-symbols '(user-processes networking))
"Shepherd requirements the service should depend on."
(serializer empty-serializer))
(log-file
(string "/var/log/pounce.log")
"The log file name to use."
(serializer empty-serializer))
(verbose?
maybe-boolean
"When true, log IRC messages to standard output.")
;; Client options.
(local-host
(maybe-string "localhost")
"The host to bind to.")
(local-port
(maybe-port 6697)
"The port to bind to.")
(local-ca
maybe-string
"Require clients to authenticate using a TLS client certificate either
contained in or signed by a certificate in the file loaded from
@code{local-ca}, a file name. The file is reloaded when the SIGUSR1 signal is
received.")
(local-cert
maybe-string
"File name of the TLS certificate to load. The file is reloaded when the
SIGUSR1 signal is received. Unless specified, a self-signed certificate is
generated at @file{/var/lib/pounce/.config/pounce/@var{host}.pem}, where
@var{host} corresponds to the value of the @code{local-host} field.")
(local-priv
maybe-string
"File name of the private TLS key to load. Unless specified, a key is
generated at @file{/var/lib/pounce/.config/pounce/@var{host}.key}, where
@var{host} corresponds to the value of the @code{local-host} field.")
(local-pass
maybe-string
"Require the server password pass for clients to connect. The pass string
must be hashed using @samp{pounce -x}.")
(size
(maybe-power-of-two 4096)
"Set the number of messages contained in the buffer to @var{size}. This
sets the maximum number of recent messages which can be relayed to a
reconnecting client. The size must be a power of two.")
;; Server options.
(bind
maybe-string
"Host to bind the @emph{source} address to when connecting to the server.
To connect from any address over IPv4 only, use @samp{0.0.0.0}. To connect
from any address over IPv6 only, use @samp{::}." )
(host
string
"The host name to connect to.")
(port
maybe-port
"The port number to connect to.")
(pass
maybe-string
"Password to use to log in with the server. The password must have been
hashed via the @samp{pounce -x} command.")
(join
maybe-list-of-strings
"The list of channels to join.")
(mode maybe-string "The user mode.")
(user
maybe-string
"To set the username. The default username is the same as the nickname.")
(nick
(maybe-string "pounce")
"Set nickname to @var{nick}.")
(real
maybe-string
"Set the real name. The default is @code{nick}.")
(away
maybe-string
"The away status to use when no clients are connected and no other away
status has been set.")
(quit
maybe-string
"The message to use when quitting.")
(no-names?
maybe-boolean
"Do not request @samp{NAMES} for each channel when a client connects. This
avoids already connected clients receiving unsolicited responses but prevents
new clients from populating user lists.")
(queue-interval
(maybe-number 200)
"Set the server send queue interval in milliseconds. The queue is used to
send automated messages from pounce to the server. Messages from clients are
sent to the server directly.")
(trust
maybe-string
"File name of a certificate to trust. When used, server name verification
is disabled.")
(client-cert
maybe-string
"The file name of the TLS client. If the private key is in a separate
file, it is loaded with @code{client-priv}. With @code{sasl-external?},
authenticate using SASL EXTERNAL. Certificates can be generated with
@samp{pounce -g}. For more details, refer to ``Generating Client
Certificates'' in @samp{man 1 pounce}.")
(client-priv
maybe-string
"The file name of the TLS client private key.")
(sasl-plain
maybe-pair
"A pair of the username and password in plain text to authenticate using
SASL PLAIN. Since this method requires the account password in plain text, it
is recommended to use CertFP instead with @code{sasl-external}.")
(sasl-external?
maybe-boolean
"Authenticate using SASL EXTERNAL, also known as CertFP. The TLS client
certificate is loaded from @code{client-cert}.")
(prefix pounce-))
(define %pounce-account
(list (user-group (name "pounce") (system? #t))
(user-account
(name "pounce")
(group "pounce")
(system? #t)
(comment "Pounce daemon user")
(home-directory "/var/lib/pounce")
(shell (file-append shadow "/sbin/nologin")))))
(define (pounce-activation config)
"Create the HOME directory for pounce as well as the default TLS certificate
and key, if not explicitly provided."
(match-record config <pounce-configuration>
( local-host local-ca local-cert local-priv
trust client-cert client-priv)
(with-imported-modules (source-module-closure
'((gnu build activation)))
#~(begin
(use-modules (gnu build activation)
(srfi srfi-34))
(let* ((home "/var/lib/pounce")
(user (getpwnam "pounce"))
(confdir (string-append home "/.config/pounce"))
(default-cert (string-append confdir "/" #$local-host ".pem"))
(default-key (string-append confdir "/" #$local-host ".key")))
(define* (sanitize-permissions file #:optional (mode #o400))
(guard (c (#t #t))
(chown file (passwd:uid user) (passwd:gid user))
(chmod file mode)))
;; Create home directory for pounce user.
(mkdir-p/perms home user #o755)
;; Best effort at sanitizing the ownership/permissions of the
;; certificate/keys. Since a cert file may incorporate the
;; security key, keep the permissions as tight as possible (owner
;; read-only / #o400).
(when #$(maybe-value-set? local-ca)
(sanitize-permissions #$local-ca))
(if #$(maybe-value-set? local-cert)
(sanitize-permissions #$local-cert)
(sanitize-permissions default-cert))
(if #$(maybe-value-set? local-priv)
(sanitize-permissions #$local-priv)
(sanitize-permissions default-key))
(when #$(maybe-value-set? trust)
(sanitize-permissions #$trust))
(when #$(maybe-value-set? client-cert)
(sanitize-permissions #$client-cert))
(when #$(maybe-value-set? client-priv)
(sanitize-permissions #$client-priv))
;; Generate a default self-signed TLS certificate and private key
;; unless explicitly provided.
(unless #$(maybe-value-set? local-cert)
(unless (file-exists? default-cert)
(mkdir-p/perms confdir user #o755)
(let ((openssl #$(file-append openssl "/bin/openssl"))
(args `("req" "-newkey" "rsa" "-x509" "-days" "3650"
"-noenc" "-subj" "/C=CA/CN=Pounce Certificate"
,@(if #$(maybe-value-set? local-priv)
'() ;XXX: likely bogus case
(list "-keyout" default-key))
"-out" ,default-cert)))
;; XXX: Manually guard against and report exceptions until
;; bug#77365 is addressed.
(guard (c ((invoke-error? c)
(format (current-error-port)
"pounce: error generating pounce tls \
certificate: ~a~%" c)))
(apply invoke openssl args))
(sanitize-permissions default-cert #o444)
(unless #$(maybe-value-set? local-priv)
(sanitize-permissions default-key #o400))))))))))
(define (serialize-pounce-configuration config)
"Return a file-like object corresponding to the serialized CONFIG
<pounce-configuration> record."
(mixed-text-file "pounce.conf"
(serialize-configuration config
pounce-configuration-fields)))
(define (pounce-wrapper config)
"Take CONFIG, a <pounce-configuration> object, and provide a least-authority
wrapper for the 'ngircd' command."
(match-record config <pounce-configuration>
(local-ca local-cert local-priv trust client-cert client-priv)
(let* ((pounce.conf (serialize-pounce-configuration config)))
(least-authority-wrapper
(file-append (pounce-configuration-pounce config) "/bin/pounce")
#:name "pounce-pola-wrapper"
;; Expose all needed files, such as options corresponding to string
;; file names.
#:mappings
(append
(list (file-system-mapping
(source pounce.conf)
(target source))
(file-system-mapping
(source "/var/lib/pounce")
(target source)
(writable? #t))
(file-system-mapping
(source "/var/log/pounce.log")
(target source)
(writable? #t)))
(filter-map (lambda (value)
(if (maybe-value-set? value)
(file-system-mapping
(source value)
(target source))
#f))
(list local-ca local-cert local-priv
trust client-cert client-priv)))
#:user "pounce"
#:group "pounce"
#:preserved-environment-variables
(cons "HOME" %default-preserved-environment-variables)
;; Without preserving the user namespace, pounce fails to access the
;; provisioned TLS certificates due to permission errors.
#:namespaces (fold delq %namespaces '(net user))))))
(define (pounce-shepherd-service config)
(let ((pounce.cfg (serialize-pounce-configuration config)))
(list (shepherd-service
(provision (pounce-configuration-shepherd-provision config))
(requirement (pounce-configuration-shepherd-requirement config))
(actions (list (shepherd-configuration-action pounce.cfg)))
(start #~(make-forkexec-constructor
(list #$(pounce-wrapper config) #$pounce.cfg)
#:environment-variables (list "HOME=/var/lib/pounce")
#:log-file #$(pounce-configuration-log-file config)))
(stop #~(make-kill-destructor))))))
(define pounce-service-type
(service-type
(name 'pounce)
(extensions
(list (service-extension shepherd-root-service-type
pounce-shepherd-service)
(service-extension profile-service-type
(compose list pounce-configuration-pounce))
(service-extension account-service-type
(const %pounce-account))
(service-extension activation-service-type
pounce-activation)))
(description
"Run @url{https://git.causal.agency/pounce/about/, pounce},
the IRC bouncer.")))
;;;
;;; Quassel.
;;;
(define-record-type* <quassel-configuration>
quassel-configuration make-quassel-configuration
quassel-configuration?
(quassel quassel-configuration-quassel
(default quassel))
(interface quassel-configuration-interface
(default "::,0.0.0.0"))
(port quassel-configuration-port
(default 4242))
(loglevel quassel-configuration-loglevel
(default "Info")))
(define quassel-shepherd-service
(match-lambda
(($ <quassel-configuration> quassel interface port loglevel)
(let ((quassel (least-authority-wrapper
(file-append quassel "/bin/quasselcore")
#:name "quasselcore"
#:mappings (list (file-system-mapping
(source "/var/lib/quassel")
(target source)
(writable? #t))
(file-system-mapping
(source "/var/log/quassel")
(target source)
(writable? #t)))
;; XXX: The daemon needs to live in the main user
;; namespace, as root, so it can access /var/lib/quassel
;; owned by "quasselcore".
#:namespaces (fold delq %namespaces '(net user)))))
(list (shepherd-service
(provision '(quassel))
(requirement '(user-processes networking))
(start #~(make-forkexec-constructor
(list #$quassel
"--configdir=/var/lib/quassel"
"--logfile=/var/log/quassel/core.log"
(string-append "--loglevel=" #$loglevel)
(string-append "--port=" (number->string #$port))
(string-append "--listen=" #$interface))))
(stop #~(make-kill-destructor))))))))
(define %quassel-account
(list (user-group (name "quassel") (system? #t))
(user-account
(name "quasselcore")
(group "quassel")
(system? #t)
(comment "Quassel daemon user")
(home-directory "/var/lib/quassel")
(shell (file-append shadow "/sbin/nologin")))))
(define %quassel-activation
#~(begin
(use-modules (guix build utils))
(mkdir-p "/var/lib/quassel")
(mkdir-p "/var/log/quassel")
(let ((cert "/var/lib/quassel/quasselCert.pem"))
(unless (file-exists? cert)
(invoke #$(file-append openssl "/bin/openssl")
"req" "-x509" "-nodes" "-batch" "-days" "680" "-newkey"
"rsa" "-keyout" cert "-out" cert)))))
(define quassel-service-type
(service-type (name 'quassel)
(extensions
(list (service-extension shepherd-root-service-type
quassel-shepherd-service)
(service-extension profile-service-type
(compose list quassel-configuration-quassel))
(service-extension account-service-type
(const %quassel-account))
(service-extension activation-service-type
(const %quassel-activation))))
(default-value (quassel-configuration))
(description
"Run @url{https://quassel-irc.org/,quasselcore}, the backend
for the distributed IRC client quassel, which allows you to connect from
multiple machines simultaneously.")))
;;;
;;; Mosquitto.
;;;
(define-record-type* <mosquitto-configuration>
mosquitto-configuration
make-mosquitto-configuration
mosquitto-configuration?
(package mosquitto-configuration-package
(default mosquitto))
(config-file mosquitto-configuration-config-file
(default #f))
(user mosquitto-configuration-user
(default "mosquitto"))
(group mosquitto-configuration-group
(default "mosquitto")))
(define (mosquitto-accounts config)
(match-record config <mosquitto-configuration>
(user group)
(filter identity
(list
(and (equal? group "mosquitto")
(user-group
(name "mosquitto")
(system? #t)))
(and (equal? user "mosquitto")
(user-account
(name "mosquitto")
(group group)
(system? #t)
(comment "bzzz")
(home-directory "/var/empty")
(shell (file-append shadow "/sbin/nologin"))))))))
(define (mosquitto-shepherd-service config)
(match-record config <mosquitto-configuration>
(package config-file user group)
(list (shepherd-service
(documentation "Run the Mosquitto MQTT broker.")
(provision '(mosquitto))
(requirement '(networking syslogd user-processes))
(start #~(make-forkexec-constructor
(list #$(file-append package "/sbin/mosquitto")
#$@(if config-file
(list "-c" config-file)
'()))
#:user #$user
#:group #$group))
(stop #~(make-kill-destructor))))))
(define mosquitto-service-type
(service-type
(description "Run the Mosquitto MQTT broker.")
(name 'mosquitto)
(extensions
(list (service-extension account-service-type mosquitto-accounts)
(service-extension shepherd-root-service-type mosquitto-shepherd-service)))
(default-value (mosquitto-configuration))))
;;;
;;; Snuik.
;;;
(define-maybe integer (no-serialization))
(define-configuration/no-serialization snuik-configuration
(snuik (package snuik) "The snuik package to use.")
(server maybe-string "The IRC server to connect to.")
(port maybe-integer "The port used by the IRC server.")
(nick maybe-string "The nickname for snuik to use.")
(password maybe-string "The password to use when logging in.")
(password-file maybe-string "The file to read the password from.")
(channels (list-of-strings '()) "The channels for snuik to join.")
(extra-options (list-of-strings '()) "Extra options to be passed to snuik.")
(home-service? (boolean for-home?) "Running as home service?"))
(define (snuik-services config)
"Return a <shepherd-service> for snuik with CONFIG."
(match-record config
<snuik-configuration>
(snuik server port nick password password-file channels extra-options
home-service?)
(let* ((password-file (snuik-configuration-password-file config))
(mappings `(,@(if home-service?
'()
`(,(file-system-mapping
(source "/var/run/snuik")
(target source)
(writable? #t))
,@(if password-file
(list (file-system-mapping
(source password-file)
(target source)))
'())))))
(snuik (least-authority-wrapper
(file-append snuik "/bin/snuik")
#:name "snuik"
#:mappings mappings
#:namespaces (delq 'net %namespaces)))
(command
#~'(#$snuik
#$@(if (and server (not (eq? server %unset-value)))
(list (string-append "--server=" server))
#~())
#$@(if (and port (not (eq? port %unset-value)))
(list (string-append "--port=" (number->string port)))
#~())
#$@(if (and nick (not (eq? nick %unset-value)))
(list (string-append "--nick=" nick))
#~())
#$@(if (and password (not (eq? password %unset-value)))
(list (string-append "--password=" password))
#~())
#$@(if (and password-file (not (eq? password-file %unset-value)))
(list (string-append "--password-file=" password-file))
#~())
#$@(if (pair? channels)
(list (string-append "--channels=" (string-join channels ",")))
#~())
#$@extra-options))
(log-file #~(string-append
#$(if home-service? #~%user-log-dir "/var/log")
"/snuik.log")))
(list (shepherd-service
(documentation "Run the snuik IRC bot.")
(provision '(snuik))
(requirement (if home-service? '() '(user-processes networking)))
(modules (if home-service?
'((shepherd support)) ;for '%user-log-dir'
'()))
(start #~(make-forkexec-constructor
#$command
#:log-file #$log-file
#:user #$(and (not home-service?) "snuik")
#:group #$(and (not home-service?) "snuik")))
(stop #~(make-kill-destructor)))))))
(define snuik-activation
(with-imported-modules '((guix build utils))
#~(begin
(use-modules (guix build utils))
(let* ((user (getpw "snuik"))
(directory "/var/run/snuik"))
(mkdir-p directory)
(chown directory (passwd:uid user) (passwd:gid user))))))
(define %snuik-accounts
(list (user-group (name "snuik") (system? #t))
(user-account
(name "snuik")
(group "snuik")
(system? #t)
(comment "Snuik IRC bot user")
(home-directory "/var/run/snuik")
(shell (file-append shadow "/sbin/nologin")))))
(define snuik-service-type
(service-type
(name 'home-snuik)
(description "Run the Snuik IRC bot.")
(default-value (snuik-configuration))
(extensions
(list (service-extension activation-service-type
(const snuik-activation))
(service-extension account-service-type
(const %snuik-accounts))
(service-extension shepherd-root-service-type
snuik-services)))))