{ pkgs, lib, config, ... }: { services.matrix-synapse = { enable = true; settings = { server_name = "chir.rs"; public_baseurl = "https://matrix.chir.rs/"; listeners = [ { port = 8008; tls = false; type = "http"; x_forwarded = true; bind_addresses = ["::1" "127.0.0.1"]; resources = [ { names = ["client" "federation" "metrics"]; compress = false; } ]; } ]; admin_contact = "mailto:lotte@chir.rs"; retention.enabled = true; database = { name = "psycopg2"; txn_limit = 10000; args = { host = "/run/postgresql"; user = "matrix-synapse"; database = "synapse"; }; }; enable_media_repo = false; url_preview_enabled = true; url_preview_ip_range_blacklist = [ "127.0.0.0/8" "10.0.0.0/8" "172.16.0.0/12" "192.168.0.0/16" "100.64.0.0/10" "192.0.0.0/24" "169.254.0.0/16" "192.88.99.0/24" "198.18.0.0/15" "192.0.2.0/24" "198.51.100.0/24" "203.0.113.0/24" "224.0.0.0/4" "fe80::/10" "fc00::/7" "2001:db8::/32" "ff00::/8" "fec0::/10" ]; enable_registration = false; app_service_config_files = [ "/var/lib/mautrix-telegram/telegram-registration.yaml" #config.sops.secrets."services/synapse/discord-dev-registration.yaml".path ]; signing_key_path = config.sops.secrets."services/synapse/private_key".path; encryption_enabled_by_default_for_room_type = "all"; enable_metrics = true; experimental_features = { msc2716_enabled = true; spaces_enabled = true; }; #sentry.dsn = "https://18e36e6f16b5490c83364101717cddba@o253952.ingest.sentry.io/6449283"; }; withJemalloc = true; }; sops.secrets."services/synapse/private_key" = {owner = "matrix-synapse";}; sops.secrets."services/synapse/discord-dev-registration.yaml" = {owner = "matrix-synapse";}; services.postgresql.ensureDatabases = [ "synapse" ]; services.postgresql.ensureUsers = [ { name = "matrix-synapse"; ensurePermissions = { "DATABASE synapse" = "ALL PRIVILEGES"; }; } ]; systemd.services.matrix-synapse.serviceConfig.ExecStartPre = lib.mkForce (pkgs.writeShellScript "dummy" "true"); services.nginx.virtualHosts = let inherit ((import ../../utils/getInternalIP.nix config)) listenIPs; listenStatements = lib.concatStringsSep "\n" (builtins.map (ip: "listen ${ip}:443 http3;") listenIPs) + '' add_header Alt-Svc 'h3=":443"'; ''; synapse = { forceSSL = false; addSSL = true; listenAddresses = listenIPs; locations."/_matrix" = { proxyPass = "http://localhost:8008"; }; locations."/_synapse" = { proxyPass = "http://localhost:8008"; }; locations."/_matrix/media" = { proxyPass = "https://matrix.chir.rs"; proxyWebsockets = true; extraConfig = '' proxy_hide_header Access-Control-Allow-Origin; add_header Access-Control-Allow-Origin '*' always; ''; }; }; in { "matrix.chir.rs" = synapse // { sslCertificate = "/var/lib/acme/chir.rs/cert.pem"; sslCertificateKey = "/var/lib/acme/chir.rs/key.pem"; }; "matrix.int.chir.rs" = synapse // { sslCertificate = "/var/lib/acme/int.chir.rs/cert.pem"; sslCertificateKey = "/var/lib/acme/int.chir.rs/key.pem"; }; }; }