2023-02-19 11:36:43 +00:00
#!/bin/bash
2023-10-30 09:20:37 +00:00
# This file is executed during startup of DMS. Hence, the `index.sh` helper has already
# been sourced, and thus, all helper functions from `rspamd.sh` are available.
# Function called during global setup to handle the complete setup of Rspamd. Functions
# with a single `_` prefix are sourced from the `rspamd.sh` helper.
2023-05-25 23:01:41 +00:00
function _setup_rspamd( ) {
2023-05-24 07:06:59 +00:00
if _env_var_expect_zero_or_one 'ENABLE_RSPAMD' && [ [ ${ ENABLE_RSPAMD } -eq 1 ] ] ; then
2023-02-27 19:21:45 +00:00
_log 'debug' 'Enabling and configuring Rspamd'
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
__rspamd__log 'trace' '---------- Setup started ----------'
2023-02-26 10:42:14 +00:00
2023-10-30 09:20:37 +00:00
_rspamd_get_envs # must run first
__rspamd__run_early_setup_and_checks # must run second
2023-10-14 15:14:10 +00:00
__rspamd__setup_logfile
2023-04-11 07:16:57 +00:00
__rspamd__setup_redis
__rspamd__setup_postfix
__rspamd__setup_clamav
__rspamd__setup_default_modules
__rspamd__setup_learning
__rspamd__setup_greylisting
2023-04-11 16:51:23 +00:00
__rspamd__setup_hfilter_group
2023-08-08 08:43:21 +00:00
__rspamd__setup_check_authenticated
2023-10-30 09:20:37 +00:00
_rspamd_handle_user_modules_adjustments # must run last
2023-03-18 15:32:48 +00:00
2023-11-13 11:34:46 +00:00
# only performing checks, no further setup handled from here onwards
__rspamd__check_dkim_permissions
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
__rspamd__log 'trace' '---------- Setup finished ----------'
2023-02-27 19:21:45 +00:00
else
_log 'debug' 'Rspamd is disabled'
fi
2023-02-26 10:42:14 +00:00
}
2023-02-19 11:36:43 +00:00
# Just a helper to prepend the log messages with `(Rspamd setup)` so
# users know exactly where the message originated from.
#
# @param ${1} = log level
# @param ${2} = message
function __rspamd__log { _log " ${ 1 :- } " " (Rspamd setup) ${ 2 :- } " ; }
2023-04-11 07:16:57 +00:00
# Helper for explicitly enabling or disabling a specific module.
2023-02-19 11:36:43 +00:00
#
2023-04-11 07:16:57 +00:00
# @param ${1} = module name
# @param ${2} = `true` when you want to enable the module (default),
# `false` when you want to disable the module [OPTIONAL]
# @param ${3} = whether to use `local` (default) or `override` [OPTIONAL]
2023-05-25 23:01:41 +00:00
function __rspamd__helper__enable_disable_module( ) {
2023-04-11 07:16:57 +00:00
local MODULE = ${ 1 : ?Module name must be provided }
local ENABLE_MODULE = ${ 2 :- true }
local LOCAL_OR_OVERRIDE = ${ 3 :- local }
local MESSAGE = 'Enabling'
2023-02-19 11:36:43 +00:00
2023-10-16 07:51:48 +00:00
readonly MODULE ENABLE_MODULE LOCAL_OR_OVERRIDE
2023-05-24 07:06:59 +00:00
if [ [ ! ${ ENABLE_MODULE } = ~ ^( true| false ) $ ] ] ; then
2023-04-11 07:16:57 +00:00
__rspamd__log 'warn' "__rspamd__helper__enable_disable_module got non-boolean argument for deciding whether module should be enabled or not"
return 1
2023-02-19 11:36:43 +00:00
fi
2023-04-11 07:16:57 +00:00
[ [ ${ ENABLE_MODULE } = = true ] ] || MESSAGE = 'Disabling'
__rspamd__log 'trace' " ${ MESSAGE } module ' ${ MODULE } ' "
cat >" /etc/rspamd/ ${ LOCAL_OR_OVERRIDE } .d/ ${ MODULE } .conf " << EOF
# documentation: https://rspamd.com/doc/modules/${MODULE}.html
enabled = ${ ENABLE_MODULE } ;
EOF
}
# Run miscellaneous early setup tasks and checks, such as creating files needed at runtime
# or checking for other anti-spam/anti-virus software.
2023-05-25 23:01:41 +00:00
function __rspamd__run_early_setup_and_checks( ) {
2023-04-11 07:16:57 +00:00
mkdir -p /var/lib/rspamd/
: >/var/lib/rspamd/stats.ucl
2023-05-24 07:06:59 +00:00
if [ [ -d ${ RSPAMD_DMS_OVERRIDE_D } ] ] ; then
2023-10-30 09:20:37 +00:00
cp " ${ RSPAMD_DMS_OVERRIDE_D } " /* " ${ RSPAMD_OVERRIDE_D } "
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
fi
2023-05-24 07:06:59 +00:00
if [ [ ${ ENABLE_AMAVIS } -eq 1 ] ] || [ [ ${ ENABLE_SPAMASSASSIN } -eq 1 ] ] ; then
2023-04-11 07:16:57 +00:00
__rspamd__log 'warn' 'Running Amavis/SA & Rspamd at the same time is discouraged'
2023-02-19 11:36:43 +00:00
fi
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
2023-05-24 07:06:59 +00:00
if [ [ ${ ENABLE_OPENDKIM } -eq 1 ] ] ; then
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
__rspamd__log 'warn' 'Running OpenDKIM & Rspamd at the same time is discouraged - we recommend Rspamd for DKIM checks (enabled with Rspamd by default) & signing'
fi
2023-05-24 07:06:59 +00:00
if [ [ ${ ENABLE_OPENDMARC } -eq 1 ] ] ; then
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
__rspamd__log 'warn' 'Running OpenDMARC & Rspamd at the same time is discouraged - we recommend Rspamd for DMARC checks (enabled with Rspamd by default)'
fi
2023-05-24 07:06:59 +00:00
if [ [ ${ ENABLE_POLICYD_SPF } -eq 1 ] ] ; then
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
__rspamd__log 'warn' 'Running policyd-spf & Rspamd at the same time is discouraged - we recommend Rspamd for SPF checks (enabled with Rspamd by default)'
fi
2023-05-24 07:06:59 +00:00
if [ [ ${ ENABLE_POSTGREY } -eq 1 ] ] && [ [ ${ RSPAMD_GREYLISTING } -eq 1 ] ] ; then
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
__rspamd__log 'warn' 'Running Postgrey & Rspamd at the same time is discouraged - we recommend Rspamd for greylisting'
fi
2023-04-11 07:16:57 +00:00
}
2023-03-01 15:24:59 +00:00
2023-10-14 15:14:10 +00:00
# Keep in sync with `target/scripts/startup/setup.d/log.sh:_setup_logrotate()`
function __rspamd__setup_logfile( ) {
cat >/etc/logrotate.d/rspamd << EOF
/var/log/mail/rspamd.log
{
compress
copytruncate
delaycompress
rotate 4
${ LOGROTATE_INTERVAL }
}
EOF
}
2023-04-11 07:16:57 +00:00
# Sets up Redis. In case the user does not use a dedicated Redis instance, we
# supply a configuration for our local Redis instance which is started later.
2023-05-25 23:01:41 +00:00
function __rspamd__setup_redis( ) {
2023-05-24 07:06:59 +00:00
if _env_var_expect_zero_or_one 'ENABLE_RSPAMD_REDIS' && [ [ ${ ENABLE_RSPAMD_REDIS } -eq 1 ] ] ; then
2023-04-11 07:16:57 +00:00
__rspamd__log 'debug' 'Internal Redis is enabled, adding configuration'
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
cat >" ${ RSPAMD_LOCAL_D } /redis.conf " << "EOF"
2023-03-01 15:24:59 +00:00
# documentation: https://rspamd.com/doc/configuration/redis.html
servers = "127.0.0.1:6379" ;
expand_keys = true;
EOF
2023-03-04 09:45:43 +00:00
# Here we adjust the Redis default configuration that we supply to Redis
# when starting it. Note that `/var/lib/redis/` is linked to
# `/var/mail-state/redis/` (for persisting it) if `ONE_DIR=1`.
2023-04-11 07:16:57 +00:00
sedfile -i -E \
2023-03-04 09:45:43 +00:00
-e 's|^(bind).*|\1 127.0.0.1|g' \
-e 's|^(daemonize).*|\1 no|g' \
-e 's|^(port).*|\1 6379|g' \
-e 's|^(loglevel).*|\1 warning|g' \
-e 's|^(logfile).*|\1 ""|g' \
-e 's|^(dir).*|\1 /var/lib/redis|g' \
-e 's|^(dbfilename).*|\1 dms-dump.rdb|g' \
/etc/redis/redis.conf
2023-03-01 15:24:59 +00:00
else
__rspamd__log 'debug' 'Rspamd will not use internal Redis (which has been disabled)'
fi
2023-02-19 11:36:43 +00:00
}
2023-04-11 07:16:57 +00:00
# Adjust Postfix's configuration files. We only need to append Rspamd at the end of
# `smtpd_milters` in `/etc/postfix/main.cf`.
2023-05-25 23:01:41 +00:00
function __rspamd__setup_postfix( ) {
2023-04-11 07:16:57 +00:00
__rspamd__log 'debug' "Adjusting Postfix's configuration"
2023-02-26 10:42:14 +00:00
2023-04-11 07:16:57 +00:00
postconf 'rspamd_milter = inet:localhost:11332'
2023-02-19 11:36:43 +00:00
# shellcheck disable=SC2016
2023-08-22 08:03:41 +00:00
_add_to_or_update_postfix_main 'smtpd_milters' '$rspamd_milter'
2023-02-19 11:36:43 +00:00
}
2023-04-11 07:16:57 +00:00
# If ClamAV is enabled, we will integrate it into Rspamd.
2023-05-25 23:01:41 +00:00
function __rspamd__setup_clamav( ) {
2023-05-24 07:06:59 +00:00
if _env_var_expect_zero_or_one 'ENABLE_CLAMAV' && [ [ ${ ENABLE_CLAMAV } -eq 1 ] ] ; then
2023-04-11 07:16:57 +00:00
__rspamd__log 'debug' 'Enabling ClamAV integration'
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
sedfile -i -E 's|^(enabled).*|\1 = true;|g' " ${ RSPAMD_LOCAL_D } /antivirus.conf "
2023-04-11 07:16:57 +00:00
# Rspamd uses ClamAV's UNIX socket, and to be able to read it, it must be in the same group
usermod -a -G clamav _rspamd
2023-05-12 14:04:41 +00:00
2023-05-24 07:06:59 +00:00
if [ [ ${ CLAMAV_MESSAGE_SIZE_LIMIT } != '25M' ] ] ; then
2023-05-12 14:04:41 +00:00
local SIZE_IN_BYTES
SIZE_IN_BYTES = $( numfmt --from= si " ${ CLAMAV_MESSAGE_SIZE_LIMIT } " )
__rspamd__log 'trace' " Adjusting maximum size for ClamAV to ${ SIZE_IN_BYTES } bytes ( ${ CLAMAV_MESSAGE_SIZE_LIMIT } ) "
sedfile -i -E " s|(.*max_size =).*|\1 ${ SIZE_IN_BYTES } ;| " " ${ RSPAMD_LOCAL_D } /antivirus.conf "
fi
2023-04-11 07:16:57 +00:00
else
__rspamd__log 'debug' 'Rspamd will not use ClamAV (which has not been enabled)'
2023-02-19 11:36:43 +00:00
fi
}
# Disables certain modules by default. This can be overwritten by the user later.
# We disable the modules listed in `DISABLE_MODULES` as we believe these modules
# are not commonly used and the average user does not need them. As a consequence,
# disabling them saves resources.
2023-05-25 23:01:41 +00:00
function __rspamd__setup_default_modules( ) {
2023-04-11 07:16:57 +00:00
__rspamd__log 'debug' 'Disabling default modules'
2023-04-11 16:51:23 +00:00
# This array contains all the modules we disable by default. They
# can be re-enabled later (in `__rspamd__handle_user_modules_adjustments`)
# with `rspamd-modules.conf`.
2023-02-19 11:36:43 +00:00
local DISABLE_MODULES = (
clickhouse
elastic
neural
reputation
spamassassin
url_redirector
metric_exporter
)
2023-10-16 07:51:48 +00:00
readonly -a DISABLE_MODULES
2023-08-22 08:03:41 +00:00
local MODULE
2023-05-26 12:00:40 +00:00
for MODULE in " ${ DISABLE_MODULES [@] } " ; do
2023-04-11 07:16:57 +00:00
__rspamd__helper__enable_disable_module " ${ MODULE } " 'false'
2023-02-19 11:36:43 +00:00
done
}
2023-04-11 07:16:57 +00:00
# This function sets up intelligent learning of Junk, by
#
# 1. enabling auto-learn for the classifier-bayes module
# 2. setting up sieve scripts that detect when a user is moving e-mail
# from or to the "Junk" folder, and learning them as ham or spam.
2023-05-25 23:01:41 +00:00
function __rspamd__setup_learning( ) {
2023-05-24 07:06:59 +00:00
if _env_var_expect_zero_or_one 'RSPAMD_LEARN' && [ [ ${ RSPAMD_LEARN } -eq 1 ] ] ; then
2023-04-11 07:16:57 +00:00
__rspamd__log 'debug' 'Setting up intelligent learning of spam and ham'
local SIEVE_PIPE_BIN_DIR = '/usr/lib/dovecot/sieve-pipe'
2023-10-16 07:51:48 +00:00
readonly SIEVE_PIPE_BIN_DIR
2023-04-11 07:16:57 +00:00
ln -s " $( type -f -P rspamc) " " ${ SIEVE_PIPE_BIN_DIR } /rspamc "
sedfile -i -E 's|(mail_plugins =.*)|\1 imap_sieve|' /etc/dovecot/conf.d/20-imap.conf
sedfile -i -E '/^}/d' /etc/dovecot/conf.d/90-sieve.conf
cat >>/etc/dovecot/conf.d/90-sieve.conf << EOF
2023-05-13 11:59:16 +00:00
# From anyhwere to Junk
2023-04-11 07:16:57 +00:00
imapsieve_mailbox1_name = Junk
imapsieve_mailbox1_causes = COPY
imapsieve_mailbox1_before = file:${ SIEVE_PIPE_BIN_DIR } /learn-spam.sieve
2023-05-13 11:59:16 +00:00
# From Junk to Inbox
imapsieve_mailbox2_name = INBOX
2023-04-11 07:16:57 +00:00
imapsieve_mailbox2_from = Junk
imapsieve_mailbox2_causes = COPY
imapsieve_mailbox2_before = file:${ SIEVE_PIPE_BIN_DIR } /learn-ham.sieve
}
EOF
cat >" ${ SIEVE_PIPE_BIN_DIR } /learn-spam.sieve " << EOF
require [ "vnd.dovecot.pipe" , "copy" , "imapsieve" ] ;
pipe :copy "rspamc" [ "-h" , "127.0.0.1:11334" , "learn_spam" ] ;
EOF
cat >" ${ SIEVE_PIPE_BIN_DIR } /learn-ham.sieve " << EOF
require [ "vnd.dovecot.pipe" , "copy" , "imapsieve" ] ;
pipe :copy "rspamc" [ "-h" , "127.0.0.1:11334" , "learn_ham" ] ;
EOF
sievec " ${ SIEVE_PIPE_BIN_DIR } /learn-spam.sieve "
sievec " ${ SIEVE_PIPE_BIN_DIR } /learn-ham.sieve "
else
__rspamd__log 'debug' 'Intelligent learning of spam and ham is disabled'
fi
}
2023-04-11 16:51:23 +00:00
# Sets up greylisting with the greylisting module (see
# https://rspamd.com/doc/modules/greylisting.html).
2023-05-25 23:01:41 +00:00
function __rspamd__setup_greylisting( ) {
2023-05-24 07:06:59 +00:00
if _env_var_expect_zero_or_one 'RSPAMD_GREYLISTING' && [ [ ${ RSPAMD_GREYLISTING } -eq 1 ] ] ; then
2023-04-11 07:16:57 +00:00
__rspamd__log 'debug' 'Enabling greylisting'
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
sedfile -i -E "s|(enabled =).*|\1 true;|g" " ${ RSPAMD_LOCAL_D } /greylist.conf "
2023-04-11 07:16:57 +00:00
else
__rspamd__log 'debug' 'Greylisting is disabled'
fi
}
2023-04-11 16:51:23 +00:00
# This function handles setup of the Hfilter module (see
# https://www.rspamd.com/doc/modules/hfilter.html). This module is mainly
# used for hostname checks, and whether or not a reverse-DNS check
# succeeds.
2023-05-25 23:01:41 +00:00
function __rspamd__setup_hfilter_group( ) {
scripts: Rspamd stabilization pt. 1 (#3261)
* added checks whether OpenDKIM/OpenDMARC/policyd-spf are enabled
* added functions to check if VAR is 0/0 or an int
and also added tests.
I also adjusted the test file to not run in a container, because there
is no need. This also decreases test time, which, in turn, increases
maintainers' happiness.
* added more checks to Rspamd setup
I added the helpers from the previous commit to the Rspamd setup to make
the whole setup more robust, and indicate to the user that an ENV
variable's value is incorrect.
While we did not issues for this in the past, I believe it to be
worthwhile for the future.
* added canonical directory for users to place files in
This dir is canonical with DMS's optional configuration dirs, as it
lives in well-known volume mounts. Hence, users will not need to adjust
`/etc/rspamd/override.d` manually anymore, or mount a volume to this
place.
The docs explain this now, but the DKIM page needs a slight update on
this too I guess. I will follow-up here.
* misc minor improvements
* use variables for common directories
2023-04-23 10:22:54 +00:00
local MODULE_FILE = " ${ RSPAMD_LOCAL_D } /hfilter_group.conf "
2023-10-16 07:51:48 +00:00
readonly MODULE_FILE
2023-05-24 07:06:59 +00:00
if _env_var_expect_zero_or_one 'RSPAMD_HFILTER' && [ [ ${ RSPAMD_HFILTER } -eq 1 ] ] ; then
2023-04-11 16:51:23 +00:00
__rspamd__log 'debug' 'Hfilter (group) module is enabled'
# Check if we received a number first
2023-08-08 08:43:21 +00:00
if _env_var_expect_integer 'RSPAMD_HFILTER_HOSTNAME_UNKNOWN_SCORE' \
&& [ [ ${ RSPAMD_HFILTER_HOSTNAME_UNKNOWN_SCORE } -ne 6 ] ] ; then
2023-04-11 16:51:23 +00:00
__rspamd__log 'trace' " Adjusting score for 'HFILTER_HOSTNAME_UNKNOWN' in Hfilter group module to ${ RSPAMD_HFILTER_HOSTNAME_UNKNOWN_SCORE } "
sed -i -E \
" s|(.*score =).*(# __TAG__HFILTER_HOSTNAME_UNKNOWN)|\1 ${ RSPAMD_HFILTER_HOSTNAME_UNKNOWN_SCORE } ; \2|g " \
" ${ MODULE_FILE } "
else
__rspamd__log 'trace' "Not adjusting score for 'HFILTER_HOSTNAME_UNKNOWN' in Hfilter group module"
fi
else
__rspamd__log 'debug' 'Disabling Hfilter (group) module'
rm -f " ${ MODULE_FILE } "
fi
}
2023-11-13 11:34:46 +00:00
# If 'RSPAMD_CHECK_AUTHENTICATED' is enabled, then content checks for all users, i.e.
# also for authenticated users, are performed.
#
# The default that DMS ships does not check authenticated users. In case the checks are
# enabled, this function will remove the part of the Rspamd configuration that disables
# checks for authenticated users.
2023-08-08 08:43:21 +00:00
function __rspamd__setup_check_authenticated( ) {
local MODULE_FILE = " ${ RSPAMD_LOCAL_D } /settings.conf "
2023-10-16 07:51:48 +00:00
readonly MODULE_FILE
2023-08-08 08:43:21 +00:00
if _env_var_expect_zero_or_one 'RSPAMD_CHECK_AUTHENTICATED' \
&& [ [ ${ RSPAMD_CHECK_AUTHENTICATED } -eq 0 ] ]
then
__rspamd__log 'debug' 'Content checks for authenticated users are disabled'
else
__rspamd__log 'debug' 'Enabling content checks for authenticated users'
sed -i -E \
'/DMS::SED_TAG::1::START/{:a;N;/DMS::SED_TAG::1::END/!ba};/authenticated/d' \
" ${ MODULE_FILE } "
fi
}
2023-11-13 11:34:46 +00:00
# This function performs a simple check: go through DKIM configuration files, acquire
# all private key file locations and check whether they exist and whether they can be
# accessed by Rspamd.
function __rspamd__check_dkim_permissions( ) {
local DKIM_CONF_FILES DKIM_KEY_FILES
[ [ -f ${ RSPAMD_LOCAL_D } /dkim_signing.conf ] ] && DKIM_CONF_FILES += ( " ${ RSPAMD_LOCAL_D } /dkim_signing.conf " )
[ [ -f ${ RSPAMD_OVERRIDE_D } /dkim_signing.conf ] ] && DKIM_CONF_FILES += ( " ${ RSPAMD_OVERRIDE_D } /dkim_signing.conf " )
# Here, we populate DKIM_KEY_FILES which we later iterate over. DKIM_KEY_FILES
# contains all keys files configured by the user.
local FILE
for FILE in " ${ DKIM_CONF_FILES [@] } " ; do
readarray -t DKIM_KEY_FILES_TMP < <( grep -o -E 'path = .*' " ${ FILE } " | cut -d '=' -f 2 | tr -d ' ";' )
DKIM_KEY_FILES += ( " ${ DKIM_KEY_FILES_TMP [@] } " )
done
for FILE in " ${ DKIM_KEY_FILES [@] } " ; do
if [ [ -f ${ FILE } ] ] ; then
__rspamd__log 'trace' " Checking DKIM file ' ${ FILE } ' "
# See https://serverfault.com/a/829314 for an explanation on `-exec false {} +`
# We additionally resolve symbolic links to check the permissions of the actual files
if find " $( realpath -eL " ${ FILE } " ) " -user _rspamd -or -group _rspamd -or -perm -o= r -exec false { } +; then
__rspamd__log 'warn' " Rspamd DKIM private key file ' ${ FILE } ' does not appear to have correct permissions/ownership for Rspamd to use it "
else
__rspamd__log 'trace' " DKIM file ' ${ FILE } ' permissions and ownership appear correct "
fi
else
__rspamd__log 'warn' " Rspamd DKIM private key file ' ${ FILE } ' is configured for usage, but does not appear to exist "
fi
done
}