From e214c2f94232ac09f182e0357448b7db5bfcf5e5 Mon Sep 17 00:00:00 2001 From: jacekpoz Date: Thu, 13 Jul 2023 16:39:27 +0200 Subject: [PATCH] conduit maybe will work?? --- flake.nix | 5 +- hosts/chmura/conduit.nix | 158 ++++++++++++++++++++++++ hosts/chmura/configuration.nix | 2 +- hosts/chmura/hardware-configuration.nix | 2 - 4 files changed, 163 insertions(+), 4 deletions(-) create mode 100644 hosts/chmura/conduit.nix diff --git a/flake.nix b/flake.nix index 5d280ce0..782a4451 100644 --- a/flake.nix +++ b/flake.nix @@ -22,6 +22,9 @@ inputs.nixpkgs.follows = "nixpkgs"; }; - nixneovim.url = "github:nixneovim/nixneovim"; + conduit = { + url = "gitlab:famedly/conduit"; + inputs.nixpkgs.follows = "nixpkgs"; + }; }; } diff --git a/hosts/chmura/conduit.nix b/hosts/chmura/conduit.nix new file mode 100644 index 00000000..e2db4baa --- /dev/null +++ b/hosts/chmura/conduit.nix @@ -0,0 +1,158 @@ +{ + config, + pkgs, + inputs, + ... +}: + +let + # You'll need to edit these values + + # The hostname that will appear in your user and room IDs + server_name = "jacekpoz.pl"; + + # The hostname that Conduit actually runs on + # + # This can be the same as `server_name` if you want. This is only necessary + # when Conduit is running on a different machine than the one hosting your + # root domain. This configuration also assumes this is all running on a single + # machine, some tweaks will need to be made if this is not the case. + matrix_hostname = "matrix.${server_name}"; + + # An admin email for TLS certificate notifications + admin_email = "jacekpoz@cock.li"; + + # These ones you can leave alone + + # Build a dervation that stores the content of `${server_name}/.well-known/matrix/server` + well_known_server = pkgs.writeText "well-known-matrix-server" '' + { + "m.server": "${matrix_hostname}" + } + ''; + + # Build a dervation that stores the content of `${server_name}/.well-known/matrix/client` + well_known_client = pkgs.writeText "well-known-matrix-client" '' + { + "m.homeserver": { + "base_url": "https://${matrix_hostname}" + } + } + ''; +in + +{ + # Configure Conduit itself + services.matrix-conduit = { + enable = true; + + # This causes NixOS to use the flake defined in this repository instead of + # the build of Conduit built into nixpkgs. + package = inputs.conduit.packages.${pkgs.system}.default; + + settings.global = { + inherit server_name; + }; + }; + + # Configure automated TLS acquisition/renewal + security.acme = { + acceptTerms = true; + defaults = { + email = admin_email; + }; + }; + + # ACME data must be readable by the NGINX user + users.users.nginx.extraGroups = [ + "acme" + ]; + + # Configure NGINX as a reverse proxy + services.nginx = { + enable = true; + recommendedProxySettings = true; + + virtualHosts = { + "${matrix_hostname}" = { + forceSSL = true; + enableACME = true; + + listen = [ + { + addr = "0.0.0.0"; + port = 443; + ssl = true; + } + { + addr = "[::]"; + port = 443; + ssl = true; + } { + addr = "0.0.0.0"; + port = 8448; + ssl = true; + } + { + addr = "[::]"; + port = 8448; + ssl = true; + } + ]; + + locations."/_matrix/" = { + proxyPass = "http://backend_conduit$request_uri"; + proxyWebsockets = true; + extraConfig = '' + proxy_set_header Host $host; + proxy_buffering off; + ''; + }; + + extraConfig = '' + merge_slashes off; + ''; + }; + + "${server_name}" = { + forceSSL = true; + enableACME = true; + + locations."=/.well-known/matrix/server" = { + # Use the contents of the derivation built previously + alias = "${well_known_server}"; + + extraConfig = '' + # Set the header since by default NGINX thinks it's just bytes + default_type application/json; + ''; + }; + + locations."=/.well-known/matrix/client" = { + # Use the contents of the derivation built previously + alias = "${well_known_client}"; + + extraConfig = '' + # Set the header since by default NGINX thinks it's just bytes + default_type application/json; + + # https://matrix.org/docs/spec/client_server/r0.4.0#web-browser-clients + add_header Access-Control-Allow-Origin "*"; + ''; + }; + }; + }; + + upstreams = { + "backend_conduit" = { + servers = { + "localhost:${toString config.services.matrix-conduit.settings.global.port}" = { }; + }; + }; + }; + }; + + # Open firewall ports for HTTP, HTTPS, and Matrix federation + networking.firewall.allowedTCPPorts = [ 80 443 8448 ]; + networking.firewall.allowedUDPPorts = [ 80 443 8448 ]; +} diff --git a/hosts/chmura/configuration.nix b/hosts/chmura/configuration.nix index a94149c6..b053a548 100644 --- a/hosts/chmura/configuration.nix +++ b/hosts/chmura/configuration.nix @@ -49,7 +49,7 @@ services.openssh = { enable = true; - passwordAuthentication = true; + settings.PasswordAuthentication = true; }; networking.firewall.allowedTCPPorts = [ 80 443 22 ]; diff --git a/hosts/chmura/hardware-configuration.nix b/hosts/chmura/hardware-configuration.nix index 97f8ad0f..9054d260 100644 --- a/hosts/chmura/hardware-configuration.nix +++ b/hosts/chmura/hardware-configuration.nix @@ -41,6 +41,4 @@ nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; powerManagement.cpuFreqGovernor = lib.mkDefault "ondemand"; hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; - # high-resolution display - hardware.video.hidpi.enable = lib.mkDefault true; }