working on orbi tinc support
This commit is contained in:
parent
29d2d1e7fd
commit
b6d944e595
6 changed files with 138 additions and 10 deletions
|
@ -1470,11 +1470,11 @@
|
||||||
"secrets": {
|
"secrets": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1704582381,
|
"lastModified": 1709496928,
|
||||||
"narHash": "sha256-GC56ZF7qAtRqxF/SchmlVN86mA4BMwRFRz411utqUvc=",
|
"narHash": "sha256-g9dipr2h98QommLyv5uGF6T9Oqp5OQAyyxCugr4B6+A=",
|
||||||
"ref": "main",
|
"ref": "main",
|
||||||
"rev": "cd333595c000cd2b1cbce7b2a6027fd6c3f07769",
|
"rev": "e38a0471afe70fa2d262ba0a86a68bfbae8c2c26",
|
||||||
"revCount": 62,
|
"revCount": 63,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git"
|
"url": "ssh://gitea@git.ingolf-wagner.de/palo/nixos-secrets.git"
|
||||||
},
|
},
|
||||||
|
|
|
@ -16,8 +16,10 @@ let
|
||||||
chungus = "10.23.42.28";
|
chungus = "10.23.42.28";
|
||||||
cherry = "10.23.42.29";
|
cherry = "10.23.42.29";
|
||||||
robi = "10.23.42.111";
|
robi = "10.23.42.111";
|
||||||
|
orbi = "10.23.42.100";
|
||||||
};
|
};
|
||||||
subDomains = {
|
subDomains = {
|
||||||
|
# orbi
|
||||||
# robi
|
# robi
|
||||||
"grafana.robi" = hosts.robi;
|
"grafana.robi" = hosts.robi;
|
||||||
"loki.robi" = hosts.robi;
|
"loki.robi" = hosts.robi;
|
||||||
|
@ -97,6 +99,11 @@ in
|
||||||
subnets = [{ address = hosts.robi; }];
|
subnets = [{ address = hosts.robi; }];
|
||||||
settings.Ed25519PublicKey = "bZUbSdME4fwudNVbUoNO7PpoOS2xALsyTs81F260KbL";
|
settings.Ed25519PublicKey = "bZUbSdME4fwudNVbUoNO7PpoOS2xALsyTs81F260KbL";
|
||||||
};
|
};
|
||||||
|
orbi = {
|
||||||
|
addresses = [{ address = "95.216.66.212"; }];
|
||||||
|
subnets = [{ address = hosts.orbi; }];
|
||||||
|
settings.Ed25519PublicKey = "/1OE8xsnRT6egxd/+iH9TE+tzlwiUJeNsGFIIWyc70A";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -5,7 +5,6 @@
|
||||||
|
|
||||||
../../system/all/defaults.nix
|
../../system/all/defaults.nix
|
||||||
|
|
||||||
|
|
||||||
../../components
|
../../components
|
||||||
../../modules
|
../../modules
|
||||||
|
|
||||||
|
@ -21,7 +20,7 @@
|
||||||
#./nginx.nix
|
#./nginx.nix
|
||||||
#./nginx-wkd.nix
|
#./nginx-wkd.nix
|
||||||
|
|
||||||
#./network-tinc.nix
|
./network-tinc.nix
|
||||||
#./network-wireguard.nix
|
#./network-wireguard.nix
|
||||||
|
|
||||||
#./media-share.nix
|
#./media-share.nix
|
||||||
|
@ -35,6 +34,7 @@
|
||||||
#./sync-torrent.nix
|
#./sync-torrent.nix
|
||||||
|
|
||||||
#./social-jitsi.nix
|
#./social-jitsi.nix
|
||||||
|
./social-matrix.nix
|
||||||
|
|
||||||
# matrix
|
# matrix
|
||||||
# ------
|
# ------
|
||||||
|
@ -62,7 +62,6 @@
|
||||||
security.acme.acceptTerms = true;
|
security.acme.acceptTerms = true;
|
||||||
security.acme.defaults.email = "contact@ingolf-wagner.de";
|
security.acme.defaults.email = "contact@ingolf-wagner.de";
|
||||||
|
|
||||||
# todo create your own
|
sops.defaultSopsFile = ../../secrets/orbi.yaml;
|
||||||
sops.defaultSopsFile = ../../secrets/robi.yaml;
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -74,6 +74,7 @@ in
|
||||||
hostKeys = [
|
hostKeys = [
|
||||||
# make sure you use --copy-host-keys during nixos-anywhere
|
# make sure you use --copy-host-keys during nixos-anywhere
|
||||||
# (you can create ne ssh keys later, again)
|
# (you can create ne ssh keys later, again)
|
||||||
|
# rm /etc/ssh/ssh_host_* && systemctl restart sshd.service
|
||||||
/etc/ssh/ssh_host_rsa_key
|
/etc/ssh/ssh_host_rsa_key
|
||||||
/etc/ssh/ssh_host_ed25519_key
|
/etc/ssh/ssh_host_ed25519_key
|
||||||
];
|
];
|
||||||
|
|
|
@ -7,9 +7,9 @@
|
||||||
};
|
};
|
||||||
|
|
||||||
tinc.private.enable = true;
|
tinc.private.enable = true;
|
||||||
tinc.private.ipv4 = "10.23.42.111";
|
tinc.private.ipv4 = "10.23.42.100";
|
||||||
|
|
||||||
tinc.secret.enable = true;
|
tinc.secret.enable = true;
|
||||||
tinc.secret.ipv4 = "10.123.42.123";
|
tinc.secret.ipv4 = "10.123.42.100";
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
121
nixos/machines/orbi/social-matrix.nix
Normal file
121
nixos/machines/orbi/social-matrix.nix
Normal file
|
@ -0,0 +1,121 @@
|
||||||
|
{ config, pkgs, ... }:
|
||||||
|
let
|
||||||
|
|
||||||
|
inherit (config.services.dendrite.settings.global) server_name;
|
||||||
|
|
||||||
|
nginx-vhost = "matrix.terranix.org";
|
||||||
|
element-web-terranix.org =
|
||||||
|
pkgs.runCommand "element-web-with-config"
|
||||||
|
{
|
||||||
|
nativeBuildInputs = [ pkgs.buildPackages.jq ];
|
||||||
|
} ''
|
||||||
|
cp -r ${pkgs.element-web} $out
|
||||||
|
chmod -R u+w $out
|
||||||
|
jq '."default_server_config"."m.homeserver" = { "base_url": "https://${nginx-vhost}:443", "server_name": "${server_name}" }' \
|
||||||
|
> $out/config.json < ${pkgs.element-web}/config.json
|
||||||
|
ln -s $out/config.json $out/config.${nginx-vhost}.json
|
||||||
|
'';
|
||||||
|
in
|
||||||
|
{
|
||||||
|
|
||||||
|
# postgresql instance dedicated to matrix
|
||||||
|
# todo : mount postgresql folder in a dedicated zfs pool
|
||||||
|
containers.synapse-postgresql = {
|
||||||
|
autoStart = true;
|
||||||
|
privateNetwork = false;
|
||||||
|
config = { config, pkgs, lib, ... }: {
|
||||||
|
system.stateVersion = "23.11";
|
||||||
|
services.postgresql.enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# $ nix-shell -p dendrite --run 'generate-keys --private-key /tmp/key'
|
||||||
|
#sops.secrets.matrix-server-key = { };
|
||||||
|
|
||||||
|
#services.dendrite = {
|
||||||
|
# enable = true;
|
||||||
|
# httpPort = 8448;
|
||||||
|
# settings = {
|
||||||
|
# global = {
|
||||||
|
# server_name = "terranix.org";
|
||||||
|
# # `private_key` has the type `path`
|
||||||
|
# # prefix a `/` to make `path` happy
|
||||||
|
# private_key = "/$CREDENTIALS_DIRECTORY/matrix-server-key";
|
||||||
|
# trusted_third_party_id_servers = [
|
||||||
|
# "matrix.org"
|
||||||
|
# "vector.im"
|
||||||
|
# "xaos.space"
|
||||||
|
# "lassul.us"
|
||||||
|
# "thalheim.io"
|
||||||
|
# "nixos.org"
|
||||||
|
# ];
|
||||||
|
# metrics.enabled = false;
|
||||||
|
# };
|
||||||
|
# logging = [
|
||||||
|
# {
|
||||||
|
# type = "std";
|
||||||
|
# level = "warn";
|
||||||
|
# }
|
||||||
|
# ];
|
||||||
|
# client_api = {
|
||||||
|
# registration_disabled = true;
|
||||||
|
# rate_limiting.enabled = false;
|
||||||
|
# # set only for the first admin account, than remove.
|
||||||
|
# #registration_shared_secret = ""; # disable once first admin account is created
|
||||||
|
# };
|
||||||
|
# media_api = {
|
||||||
|
# dynamic_thumbnails = true;
|
||||||
|
# };
|
||||||
|
# mscs = {
|
||||||
|
# mscs = [ "msc2836" "msc2946" ];
|
||||||
|
# };
|
||||||
|
# sync_api = {
|
||||||
|
# real_ip_header = "X-Real-IP";
|
||||||
|
# };
|
||||||
|
# federation_api = {
|
||||||
|
# key_perspectives = [
|
||||||
|
# {
|
||||||
|
# server_name = "matrix.org";
|
||||||
|
# keys = [
|
||||||
|
# {
|
||||||
|
# key_id = "ed25519:auto";
|
||||||
|
# public_key = "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw";
|
||||||
|
# }
|
||||||
|
# {
|
||||||
|
# key_id = "ed25519:a_RXGa";
|
||||||
|
# public_key = "l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ";
|
||||||
|
# }
|
||||||
|
# ];
|
||||||
|
# }
|
||||||
|
# ];
|
||||||
|
# prefer_direct_fetch = false;
|
||||||
|
# };
|
||||||
|
# };
|
||||||
|
#};
|
||||||
|
|
||||||
|
#systemd.services.dendrite.serviceConfig.LoadCredential = [
|
||||||
|
# "matrix-server-key:${config.sops.secrets.matrix-server-key.path}"
|
||||||
|
#];
|
||||||
|
|
||||||
|
#services.nginx.virtualHosts.${nginx-vhost} = {
|
||||||
|
# forceSSL = true;
|
||||||
|
# enableACME = true;
|
||||||
|
# extraConfig = ''
|
||||||
|
# proxy_set_header Host $host;
|
||||||
|
# proxy_set_header X-Real-IP $remote_addr;
|
||||||
|
# proxy_read_timeout 600;
|
||||||
|
# '';
|
||||||
|
# locations."/_matrix".proxyPass = "http://127.0.0.1:${toString config.services.dendrite.httpPort}";
|
||||||
|
# # for remote admin access
|
||||||
|
# locations."/_synapse".proxyPass = "http://127.0.0.1:${toString config.services.dendrite.httpPort}";
|
||||||
|
# locations."/".root = element-web-terranix.org;
|
||||||
|
#};
|
||||||
|
|
||||||
|
#services.nginx.virtualHosts.${server_name} = {
|
||||||
|
# locations."= /.well-known/matrix/server".alias =
|
||||||
|
# pkgs.writeText "matrix-server" (builtins.toJSON { "m.server" = "${nginx-vhost}:443"; });
|
||||||
|
# locations."= /.well-known/matrix/client".alias =
|
||||||
|
# pkgs.writeText "matrix-client" (builtins.toJSON { "m.homeserver".base_url = "https://${nginx-vhost}"; });
|
||||||
|
#};
|
||||||
|
|
||||||
|
}
|
Loading…
Reference in a new issue