121 lines
3.6 KiB
Nix
121 lines
3.6 KiB
Nix
{ config, lib, pkgs, inputs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.modules.services.matrix;
|
|
domain = "vimium.com";
|
|
clientConfig = {
|
|
"m.homeserver" = {
|
|
base_url = "https://matrix.${domain}";
|
|
server_name = domain;
|
|
};
|
|
"m.identity_server" = {};
|
|
};
|
|
serverConfig."m.server" = "matrix.${domain}:443";
|
|
mkWellKnown = data: ''
|
|
more_set_headers 'Content-Type: application/json';
|
|
return 200 '${builtins.toJSON data}';
|
|
'';
|
|
in {
|
|
options.modules.services.matrix = {
|
|
enable = mkOption {
|
|
default = false;
|
|
example = true;
|
|
};
|
|
coturn = mkOption {
|
|
default = config.services.coturn.enable;
|
|
example = true;
|
|
};
|
|
elementWeb = mkOption {
|
|
default = true;
|
|
example = true;
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
networking.firewall = {
|
|
allowedTCPPorts = [
|
|
8448 # Matrix federation
|
|
];
|
|
};
|
|
|
|
services.nginx = {
|
|
virtualHosts = {
|
|
"${domain}" = {
|
|
# Assume this listener is already setup
|
|
locations."= /.well-known/matrix/server".extraConfig = (mkWellKnown serverConfig);
|
|
locations."= /.well-known/matrix/client".extraConfig = (mkWellKnown clientConfig);
|
|
};
|
|
"matrix.${domain}" = {
|
|
forceSSL = true;
|
|
useACMEHost = "matrix.${domain}";
|
|
listen = [
|
|
{ addr = "0.0.0.0"; port = 443; ssl = true; }
|
|
{ addr = "0.0.0.0"; port = 80; }
|
|
{ addr = "0.0.0.0"; port = 8448; ssl = true; }
|
|
{ addr = "[::1]"; port = 443; ssl = true; }
|
|
{ addr = "[::1]"; port = 80; }
|
|
{ addr = "[::1]"; port = 8448; ssl = true; }
|
|
];
|
|
locations = {
|
|
"/" = {
|
|
proxyPass = "http://localhost:8008";
|
|
extraConfig = ''
|
|
proxy_set_header X-Forwarded-For $remote_addr;
|
|
'';
|
|
};
|
|
"/_matrix" = {
|
|
proxyPass = "http://localhost:8008";
|
|
extraConfig = ''
|
|
proxy_set_header X-Forwarded-For $remote_addr;
|
|
client_max_body_size ${services.matrix-synapse.settings.max_upload_size};
|
|
'';
|
|
};
|
|
"/_synapse/client".proxyPass = "http://localhost:8008";
|
|
};
|
|
};
|
|
"chat.${domain}" = mkIf cfg.elementWeb {
|
|
forceSSL = true;
|
|
useACMEHost = "matrix.${domain}";
|
|
root = pkgs.element-web.override {
|
|
conf = {
|
|
default_server_config = clientConfig;
|
|
brand = "Vimium Chat";
|
|
branding = {
|
|
auth_header_logo_url = "https://vimium.com/images/logo.svg";
|
|
auth_footer_links = [
|
|
{ text = "Vimium.com"; url = "https://www.vimium.com"; }
|
|
];
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
services.matrix-synapse = {
|
|
enable = true;
|
|
settings = {
|
|
database.name = "sqlite3";
|
|
enable_registration = false;
|
|
server_name = domain;
|
|
turn_shared_secret_file = mkIf cfg.coturn config.age.secrets."passwords/services/coturn/secret".path;
|
|
turn_uris = mkIf cfg.coturn [
|
|
"turn:${config.services.coturn.realm}:5349?transport=udp"
|
|
"turn:${config.services.coturn.realm}:5350?transport=udp"
|
|
"turn:${config.services.coturn.realm}:5349?transport=tcp"
|
|
"turn:${config.services.coturn.realm}:5350?transport=tcp"
|
|
];
|
|
};
|
|
};
|
|
|
|
security.acme.certs = {
|
|
"matrix.${domain}" = {
|
|
extraDomainNames = mkIf cfg.elementWeb [ "chat.${domain}" ];
|
|
reloadServices = [ "matrix-synapse" ];
|
|
};
|
|
};
|
|
};
|
|
}
|