nixfleet/modules/matrix/default.nix
Andrea Ciceri 9677a6ca77
Some checks failed
EVAL aarch64-linux.sisko
BUILD aarch64-linux.sisko
UPLOAD aarch64-linux.sisko
DOWNLOAD aarch64-linux.sisko
CACHIX aarch64-linux.sisko
ATTIC aarch64-linux.sisko
/ test (push) Successful in 2m9s
Use aciceri.dev domains for VPNs too
2025-03-14 15:56:29 +01:00

70 lines
1.8 KiB
Nix

{
config,
lib,
pkgs,
...
}:
let
clientConfig = {
"m.homeserver".base_url = "https://matrix.aciceri.dev";
};
serverConfig."m.server" = "matrix.aciceri.dev:443";
mkWellKnown = data: ''
default_type application/json;
add_header Access-Control-Allow-Origin *;
return 200 '${builtins.toJSON data}';
'';
in
{
imports = [ ../nginx-base ];
services.nginx.virtualHosts = {
"aciceri.dev" = {
useACMEHost = "aciceri.dev";
forceSSL = true;
locations."= /.well-known/matrix/server".extraConfig = mkWellKnown serverConfig;
locations."= /.well-known/matrix/client".extraConfig = mkWellKnown clientConfig;
};
"matrix.aciceri.dev" = {
forceSSL = true;
enableACME = true;
locations."/".proxyPass =
"http://127.0.0.1:${builtins.toString (lib.head config.services.matrix-synapse.settings.listeners).port}";
locations."/_matrix".proxyPass = "http://localhost:8008";
locations."/_synapse/client".proxyPass = "http://localhost:8008";
};
};
systemd.tmpfiles.rules = [
"d ${config.services.matrix-synapse.dataDir} 770 matrix-synapse matrix-synapse"
];
services.matrix-synapse = {
enable = true;
dataDir = "/mnt/hd/matrix-synapse";
configureRedisLocally = true;
settings = {
server_name = "aciceri.dev";
public_baseurl = "https://matrix.aciceri.dev";
listeners = [
{
port = 8008;
bind_addresses = [ "127.0.0.1" ];
type = "http";
tls = false;
x_forwarded = true;
resources = [
{
names = [
"client"
"federation"
];
compress = true;
}
];
}
];
};
extraConfigFiles = [ config.age.secrets.matrix-registration-shared-secret.path ];
};
}