2022-05-01 07:08:05 +00:00
|
|
|
{ pkgs, lib, config, ... }: {
|
2022-05-01 06:50:10 +00:00
|
|
|
services.matrix-synapse = {
|
|
|
|
enable = true;
|
|
|
|
settings = {
|
|
|
|
server_name = "chir.rs";
|
|
|
|
public_baseurl = "https://matrix.chir.rs/";
|
|
|
|
listeners = [{
|
|
|
|
port = 8008;
|
|
|
|
tls = false;
|
|
|
|
type = "http";
|
|
|
|
x_forwarded = true;
|
|
|
|
bind_addresses = [ "::1" "127.0.0.1" ];
|
|
|
|
resources = [{
|
2022-05-03 14:23:05 +00:00
|
|
|
names = [ "client" "federation" "metrics" ];
|
2022-05-01 06:50:10 +00:00
|
|
|
compress = false;
|
|
|
|
}];
|
2022-05-03 14:23:05 +00:00
|
|
|
}];
|
2022-05-01 06:50:10 +00:00
|
|
|
admin_contact = "mailto:lotte@chir.rs";
|
|
|
|
retention.enabled = true;
|
|
|
|
database = {
|
|
|
|
name = "psycopg2";
|
|
|
|
txn_limit = 10000;
|
|
|
|
args = {
|
|
|
|
host = "/run/postgresql";
|
|
|
|
user = "matrix-synapse";
|
|
|
|
database = "synapse";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
enable_media_repo = false;
|
|
|
|
url_preview_enabled = true;
|
|
|
|
url_preview_ip_range_blacklist = [
|
|
|
|
"127.0.0.0/8"
|
|
|
|
"10.0.0.0/8"
|
|
|
|
"172.16.0.0/12"
|
|
|
|
"192.168.0.0/16"
|
|
|
|
"100.64.0.0/10"
|
|
|
|
"192.0.0.0/24"
|
|
|
|
"169.254.0.0/16"
|
|
|
|
"192.88.99.0/24"
|
|
|
|
"198.18.0.0/15"
|
|
|
|
"192.0.2.0/24"
|
|
|
|
"198.51.100.0/24"
|
|
|
|
"203.0.113.0/24"
|
|
|
|
"224.0.0.0/4"
|
|
|
|
"fe80::/10"
|
|
|
|
"fc00::/7"
|
|
|
|
"2001:db8::/32"
|
|
|
|
"ff00::/8"
|
|
|
|
"fec0::/10"
|
|
|
|
];
|
|
|
|
enable_registration = false;
|
|
|
|
app_service_config_files = [
|
|
|
|
"/var/lib/mautrix-telegram/telegram-registration.yaml"
|
|
|
|
];
|
|
|
|
signing_key_path = config.sops.secrets."services/synapse/private_key".path;
|
|
|
|
encryption_enabled_by_default_for_room_type = "all";
|
2022-05-03 09:31:27 +00:00
|
|
|
enable_metrics = true;
|
2022-05-01 06:50:10 +00:00
|
|
|
};
|
|
|
|
withJemalloc = true;
|
|
|
|
};
|
|
|
|
sops.secrets."services/synapse/private_key" = { owner = "matrix-synapse"; };
|
|
|
|
services.postgresql.ensureDatabases = [
|
|
|
|
"synapse"
|
|
|
|
];
|
|
|
|
services.postgresql.ensureUsers = [{
|
|
|
|
name = "matrix-synapse";
|
|
|
|
ensurePermissions = {
|
2022-05-01 06:59:51 +00:00
|
|
|
"DATABASE synapse" = "ALL PRIVILEGES";
|
2022-05-01 06:50:10 +00:00
|
|
|
};
|
|
|
|
}];
|
2022-05-01 07:08:05 +00:00
|
|
|
systemd.services.matrix-synapse.serviceConfig.ExecStartPre = lib.mkForce (pkgs.writeShellScript "dummy" "true");
|
2022-05-01 07:04:58 +00:00
|
|
|
services.nginx.virtualHosts =
|
|
|
|
let
|
|
|
|
listenIPs = (import ../../utils/getInternalIP.nix config).listenIPs;
|
|
|
|
listenStatements = lib.concatStringsSep "\n" (builtins.map (ip: "listen ${ip}:443 http3;") listenIPs) + ''
|
|
|
|
add_header Alt-Svc 'h3=":443"';
|
|
|
|
'';
|
|
|
|
synapse = {
|
2022-05-03 14:23:05 +00:00
|
|
|
forceSSL = false;
|
|
|
|
addSSL = true;
|
2022-05-01 07:04:58 +00:00
|
|
|
listenAddresses = listenIPs;
|
|
|
|
locations."/_matrix" = {
|
|
|
|
proxyPass = "http://localhost:8008";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
in
|
|
|
|
{
|
|
|
|
"matrix.chir.rs" = synapse // {
|
|
|
|
sslCertificate = "/var/lib/acme/chir.rs/cert.pem";
|
|
|
|
sslCertificateKey = "/var/lib/acme/chir.rs/key.pem";
|
|
|
|
};
|
|
|
|
"matrix.int.chir.rs" = synapse // {
|
|
|
|
sslCertificate = "/var/lib/acme/int.chir.rs/cert.pem";
|
|
|
|
sslCertificateKey = "/var/lib/acme/int.chir.rs/key.pem";
|
|
|
|
};
|
|
|
|
};
|
2022-05-01 06:50:10 +00:00
|
|
|
}
|