From b754a3d53f85798fa2ba3d4f92a11cb7ca1824d3 Mon Sep 17 00:00:00 2001 From: andromeda Date: Tue, 13 Jan 2026 10:48:56 +0100 Subject: matrix-synapse? --- modules/nixos/matrix-synapse.nix | 65 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 65 insertions(+) create mode 100644 modules/nixos/matrix-synapse.nix (limited to 'modules') diff --git a/modules/nixos/matrix-synapse.nix b/modules/nixos/matrix-synapse.nix new file mode 100644 index 0000000..3966cd4 --- /dev/null +++ b/modules/nixos/matrix-synapse.nix @@ -0,0 +1,65 @@ +{ + pkgs, + lib, + config, + ... +}: let + fqdn = "${config.networking.hostName}.${config.networking.domain}"; + baseUrl = "https://${fqdn}"; + clientConfig."m.homeserver".base_url = baseUrl; + serverConfig."m.server" = "${fqdn}:443"; + mkWellKnown = data: '' + default_type application/json; + add_header Access-Control-Allow-Origin *; + return 200 '${builtins.toJSON data}'; + ''; +in { + services.postgresql.enable = true; + services.nginx = { + enable = true; + recommendedTlsSettings = true; + recommendedOptimisation = true; + recommendedGzipSettings = true; + recommendedProxySettings = true; + virtualHosts = { + "${config.networking.domain}" = { + enableACME = true; + forceSSL = true; + locations."= /.well-known/matrix/server".extraConfig = mkWellKnown serverConfig; + locations."= /.well-known/matrix/client".extraConfig = mkWellKnown clientConfig; + }; + }; + "${fqdn}" = { + enableACME = true; + forceSSL = true; + locations."/".extraConfig = '' + return 404; + ''; + locations."/_matrix".proxyPass = "http://[::1]:8008"; + locations."/_synapse/client".proxyPass = "http://[::1]:8008"; + }; + }; + services.matrix-synapse = { + enable = true; + settings.server_name = config.networking.domain; + settings.public_baseurl = baseUrl; + settings.listeners = [ + { + port = 8008; + bind_addresses = ["::1"]; + type = "http"; + tls = false; + x_forwarded = true; + resources = [ + { + names = [ + "client" + "federation" + ]; + compress = true; + } + ]; + } + ]; + }; +} -- cgit v1.3