nixos-config/config/services/matrix-media-repo.nix

119 lines
4 KiB
Nix

{ config, pkgs, lib, ... }:
let
matrix-media-repo = pkgs.callPackage ../../packages/matrix/matrix-media-repo.nix { };
config-yml = pkgs.writeText "matrix-media-repo.yaml" (lib.generators.toYAML { } {
repo = {
bindAddress = "127.0.0.1";
port = 8008;
};
database.postgres = "postgresql:///matrix_media_repo?sslmode=disable&host=/run/postgresql";
homeservers = [{
name = "matrix.chir.rs";
csApi = "https://matrix.chir.rs";
}];
admins = [ "@lotte:chir.rs" ];
datastores = [{
type = "s3";
enabled = true;
forKinds = [ "all" ];
opts = {
tempPath = "/tmp/mediarepo_s3_upload";
endpoint = "s3.us-west-000.backblazeb2.com";
accessKeyId = "#ACCESS_KEY_ID#";
accessSecret = "#SECRET_ACCESS_KEY#";
ssl = true;
bucketName = "matrix-chir-rs";
region = "us-west-000";
};
}];
});
in
{
systemd.services.matrix-media-repo = {
description = "Matrix Media Repo";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
path = [ matrix-media-repo ];
preStart = ''
akid=$(cat ${config.sops.secrets."services/matrix-media-repo/access-key-id".path})
sak=$(cat ${config.sops.secrets."services/matrix-media-repo/secret-access-key".path})
cat ${config-yml} > /var/lib/matrix-media-repo/config.yml
sed -i "s|#ACCESS_KEY_ID#|$akid|g" /var/lib/matrix-media-repo/config.yml
sed -i "s|#SECRET_ACCESS_KEY#|$sak|g" /var/lib/matrix-media-repo/config.yml
'';
serviceConfig = {
Type = "simple";
User = "matrix-media-repo";
Group = "matrix-media-repo";
Restart = "always";
ExecStart = "${matrix-media-repo}/bin/media_repo -config /var/lib/matrix-media-repo/config.yml";
};
};
sops.secrets."services/matrix-media-repo/access-key-id".owner = "matrix-media-repo";
sops.secrets."services/matrix-media-repo/secret-access-key".owner = "matrix-media-repo";
users.users.matrix-media-repo = {
description = "Matrix Media Repository";
home = "/var/lib/matrix-media-repo";
useDefaultShell = true;
group = "matrix-media-repo";
isSystemUser = true;
};
users.groups.matrix-media-repo = { };
systemd.tmpfiles.rules = [
"d '/var/lib/matrix-media-repo' 0750 matrix-media-repo matrix-media-repo - -"
];
services.postgresql.ensureDatabases = [
"matrix_media_repo"
];
services.postgresql.ensureUsers = [{
name = "matrix-media-repo";
ensurePermissions = {
"DATABASE matrix_media_repo" = "ALL PRIVILEGES";
};
}];
services.nginx.virtualHosts."matrix.chir.rs" = {
sslCertificate = "/var/lib/acme/chir.rs/cert.pem";
sslCertificateKey = "/var/lib/acme/chir.rs/key.pem";
locations."/_matrix" = {
proxyPass = "https://matrix.int.chir.rs";
proxyWebsockets = true;
extraConfig = ''
proxy_ssl_server_name on;
proxy_hide_header Access-Control-Allow-Origin;
add_header Access-Control-Allow-Origin '*' always;
'';
};
locations."/_matrix/media" = {
proxyPass = "http://localhost:8008";
proxyWebsockets = true;
extraConfig = ''
proxy_hide_header Access-Control-Allow-Origin;
add_header Access-Control-Allow-Origin '*' always;
'';
};
locations."/.well-known/matrix/server" = {
extraConfig = ''
return 200 '{ "m.server": "matrix.chir.rs:443" }';
'';
};
locations."/.well-known/matrix/client" = {
extraConfig = ''
add_header Access-Control-Allow-Origin '*';
return 200 '{ "m.homeserver": { "base_url": "https://matrix.chir.rs" } }';
'';
};
};
services.nginx.virtualHosts."chir.rs" = {
locations."/.well-known/matrix/server" = {
extraConfig = ''
return 200 '{ "m.server": "matrix.chir.rs:443" }';
'';
};
locations."/.well-known/matrix/client" = {
extraConfig = ''
add_header Access-Control-Allow-Origin '*';
return 200 '{ "m.homeserver": { "base_url": "https://matrix.chir.rs" } }';
'';
};
};
}