Migrate from Synapse to Dendrite
This commit is contained in:
parent
d1eaf76099
commit
af18ffd29e
|
@ -122,6 +122,17 @@ with pkgs;
|
||||||
owner = "coolneng";
|
owner = "coolneng";
|
||||||
group = "users";
|
group = "users";
|
||||||
};
|
};
|
||||||
|
# HACK The owner and group is set by systemd due to the use of DynamicUser
|
||||||
|
secrets.dendrite = {
|
||||||
|
file = secrets/dendrite.age;
|
||||||
|
owner = "63026";
|
||||||
|
group = "63026";
|
||||||
|
};
|
||||||
|
secrets.dendrite-postgres = {
|
||||||
|
file = secrets/dendrite-postgres.age;
|
||||||
|
owner = "63026";
|
||||||
|
group = "63026";
|
||||||
|
};
|
||||||
identityPaths = [ "/home/coolneng/.ssh/id_ed25519" ];
|
identityPaths = [ "/home/coolneng/.ssh/id_ed25519" ];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
70
flake.lock
70
flake.lock
|
@ -20,6 +20,75 @@
|
||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"devshell": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1642188268,
|
||||||
|
"narHash": "sha256-DNz4xScpXIn7rSDohdayBpPR9H9OWCMDOgTYegX081k=",
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "devshell",
|
||||||
|
"rev": "696acc29668b644df1740b69e1601119bf6da83b",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "numtide",
|
||||||
|
"repo": "devshell",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"flake-compat": {
|
||||||
|
"flake": false,
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1641205782,
|
||||||
|
"narHash": "sha256-4jY7RCWUoZ9cKD8co0/4tFARpWB+57+r1bLLvXNJliY=",
|
||||||
|
"owner": "edolstra",
|
||||||
|
"repo": "flake-compat",
|
||||||
|
"rev": "b7547d3eed6f32d06102ead8991ec52ab0a4f1a7",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "edolstra",
|
||||||
|
"repo": "flake-compat",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nix-matrix-appservices": {
|
||||||
|
"inputs": {
|
||||||
|
"devshell": "devshell",
|
||||||
|
"flake-compat": "flake-compat",
|
||||||
|
"nixlib": "nixlib",
|
||||||
|
"nixpkgs": [
|
||||||
|
"nixpkgs"
|
||||||
|
]
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1650783069,
|
||||||
|
"narHash": "sha256-mcjuOAXVC9zZ6f5Uh67uEpiZzaTMFP6ZvW8pqanesLM=",
|
||||||
|
"owner": "coffeetables",
|
||||||
|
"repo": "nix-matrix-appservices",
|
||||||
|
"rev": "5483c1b3f73c81a4533a1d7a8cc80486ca9b5c14",
|
||||||
|
"type": "gitlab"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "coffeetables",
|
||||||
|
"repo": "nix-matrix-appservices",
|
||||||
|
"type": "gitlab"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixlib": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1643502816,
|
||||||
|
"narHash": "sha256-Wrbt6Gs+hjXD3HUICPBJHKnHEUqiyx8rzHCgvqC1Bok=",
|
||||||
|
"owner": "divnix",
|
||||||
|
"repo": "nixpkgs.lib",
|
||||||
|
"rev": "ebed7ec5bcb5d01e298535989c6c321df18b631a",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "divnix",
|
||||||
|
"repo": "nixpkgs.lib",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"nixos-hardware": {
|
"nixos-hardware": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1656933710,
|
"lastModified": 1656933710,
|
||||||
|
@ -53,6 +122,7 @@
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"agenix": "agenix",
|
"agenix": "agenix",
|
||||||
|
"nix-matrix-appservices": "nix-matrix-appservices",
|
||||||
"nixos-hardware": "nixos-hardware",
|
"nixos-hardware": "nixos-hardware",
|
||||||
"nixpkgs": "nixpkgs"
|
"nixpkgs": "nixpkgs"
|
||||||
}
|
}
|
||||||
|
|
13
flake.nix
13
flake.nix
|
@ -7,10 +7,18 @@
|
||||||
url = "github:ryantm/agenix";
|
url = "github:ryantm/agenix";
|
||||||
inputs.nixpkgs.follows = "nixpkgs";
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
};
|
};
|
||||||
nixos-hardware.url = "github:NixOS/nixos-hardware";
|
nixos-hardware = {
|
||||||
|
url = "github:NixOS/nixos-hardware";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
|
nix-matrix-appservices = {
|
||||||
|
url = "gitlab:coffeetables/nix-matrix-appservices";
|
||||||
|
inputs.nixpkgs.follows = "nixpkgs";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
outputs = { self, nixpkgs, agenix, nixos-hardware, ... }@inputs:
|
outputs = { self, nixpkgs, agenix, nixos-hardware, nix-matrix-appservices, ...
|
||||||
|
}@inputs:
|
||||||
let
|
let
|
||||||
system = "aarch64-linux";
|
system = "aarch64-linux";
|
||||||
|
|
||||||
|
@ -25,6 +33,7 @@
|
||||||
(import ./configuration.nix)
|
(import ./configuration.nix)
|
||||||
agenix.nixosModules.age
|
agenix.nixosModules.age
|
||||||
nixos-hardware.nixosModules.raspberry-pi-4
|
nixos-hardware.nixosModules.raspberry-pi-4
|
||||||
|
nix-matrix-appservices.nixosModule
|
||||||
];
|
];
|
||||||
specialArgs = { inherit inputs; };
|
specialArgs = { inherit inputs; };
|
||||||
};
|
};
|
||||||
|
|
|
@ -1,41 +1,79 @@
|
||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
{
|
with pkgs;
|
||||||
|
|
||||||
|
# NOTE Reference the environment variable set in the corresponding agenix secret
|
||||||
|
let database.connection_string = "$DB_STRING";
|
||||||
|
|
||||||
|
in {
|
||||||
# Matrix server configuration
|
# Matrix server configuration
|
||||||
services.matrix-synapse = {
|
services.dendrite = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
httpPort = 8008;
|
||||||
|
environmentFile = config.age.secrets.dendrite-postgres.path;
|
||||||
|
loadCredential = [ "private_key:${config.age.secrets.dendrite.path}" ];
|
||||||
settings = {
|
settings = {
|
||||||
|
global = {
|
||||||
server_name = "coolneng.duckdns.org";
|
server_name = "coolneng.duckdns.org";
|
||||||
public_baseurl = "https://matrix.coolneng.duckdns.org";
|
private_key = config.age.secrets.dendrite.path;
|
||||||
listeners = [{
|
inherit database;
|
||||||
port = 8008;
|
};
|
||||||
tls = false;
|
# HACK Inherit postgres connection string for the rest of the DBs
|
||||||
resources = [{
|
app_service_api = { inherit database; };
|
||||||
compress = true;
|
media_api = { inherit database; };
|
||||||
names = [ "client" ];
|
room_server = { inherit database; };
|
||||||
}];
|
push_server = { inherit database; };
|
||||||
bind_addresses = [ "127.0.0.1" ];
|
mscs = {
|
||||||
}];
|
inherit database;
|
||||||
app_service_config_files =
|
mscs = [ "msc2836" "msc2946" ];
|
||||||
[ "/var/lib/matrix-synapse/telegram-registration.yaml" ];
|
};
|
||||||
|
sync_api = { inherit database; };
|
||||||
|
key_server = { inherit database; };
|
||||||
|
federation_api = { inherit database; };
|
||||||
|
user_api = {
|
||||||
|
account_database = database;
|
||||||
|
device_database = database;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Telegram bridge for Matrix
|
# Matrix bridges
|
||||||
services.mautrix-telegram = {
|
services.matrix-appservices = {
|
||||||
enable = true;
|
homeserver = "dendrite";
|
||||||
environmentFile = /var/lib/mautrix-telegram/telegram.env;
|
addRegistrationFiles = true;
|
||||||
settings = {
|
services = {
|
||||||
homeserver = {
|
telegram = {
|
||||||
address = "https://matrix.coolneng.duckdns.org";
|
|
||||||
domain = "coolneng.duckdns.org";
|
|
||||||
};
|
|
||||||
appservice = {
|
|
||||||
address = "http://localhost:8118";
|
|
||||||
port = 8118;
|
port = 8118;
|
||||||
|
format = "mautrix-python";
|
||||||
|
package = mautrix-telegram;
|
||||||
};
|
};
|
||||||
bridge.permissions."@coolneng:coolneng.duckdns.org" = "admin";
|
facebook = {
|
||||||
|
port = 8228;
|
||||||
|
format = "mautrix-python";
|
||||||
|
package = mautrix-facebook;
|
||||||
};
|
};
|
||||||
serviceDependencies = [ "matrix-synapse.service" ];
|
signal = {
|
||||||
|
port = 8338;
|
||||||
|
format = "mautrix-python";
|
||||||
|
package = mautrix-signal;
|
||||||
|
serviceConfig = {
|
||||||
|
StateDirectory = [ "matrix-as-signal" "signald" ];
|
||||||
|
JoinNamespaceOf = "signald.service";
|
||||||
|
SupplementaryGroups = [ "signald" ];
|
||||||
};
|
};
|
||||||
|
settings.signal = {
|
||||||
|
socket_path = config.services.signald.socketPath;
|
||||||
|
outgoing_attachment_dir = "/var/lib/signald/tmp";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# Additional settings for mautrix-signal
|
||||||
|
services.signald.enable = true;
|
||||||
|
systemd.services.matrix-as-signal = {
|
||||||
|
requires = [ "signald.service" ];
|
||||||
|
after = [ "signald.service" ];
|
||||||
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -45,6 +45,7 @@
|
||||||
"rewrite ^/gitea/(.*)$ https://git.coolneng.duckdns.org/$1 last;";
|
"rewrite ^/gitea/(.*)$ https://git.coolneng.duckdns.org/$1 last;";
|
||||||
"/miniflux/".extraConfig =
|
"/miniflux/".extraConfig =
|
||||||
"rewrite ^/miniflux/(.*)$ https://rss.coolneng.duckdns.org/$1 last;";
|
"rewrite ^/miniflux/(.*)$ https://rss.coolneng.duckdns.org/$1 last;";
|
||||||
|
"/.well-known/".alias = "${../well-known}" + "/";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
"radicale.coolneng.duckdns.org" = {
|
"radicale.coolneng.duckdns.org" = {
|
||||||
|
@ -88,7 +89,13 @@
|
||||||
ssl = true;
|
ssl = true;
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
locations."/".proxyPass = "http://localhost:8008/";
|
locations."~ ^(/_matrix|/_synapse/client)" = {
|
||||||
|
proxyPass = "http://localhost:8008";
|
||||||
|
extraConfig = ''
|
||||||
|
proxy_set_header X-Forwarded-For $remote_addr;
|
||||||
|
proxy_set_header X-Forwarded-Proto $scheme;
|
||||||
|
'';
|
||||||
|
};
|
||||||
};
|
};
|
||||||
"element.coolneng.duckdns.org" = {
|
"element.coolneng.duckdns.org" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
|
@ -177,7 +184,7 @@
|
||||||
"syncthing.service"
|
"syncthing.service"
|
||||||
"miniflux.service"
|
"miniflux.service"
|
||||||
"radicale.service"
|
"radicale.service"
|
||||||
"matrix-synapse.service"
|
"dendrite.service"
|
||||||
"phpfpm-wallabag.service"
|
"phpfpm-wallabag.service"
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
@ -25,7 +25,7 @@ services=(
|
||||||
"miniflux.service"
|
"miniflux.service"
|
||||||
"phpfpm-wallabag.service"
|
"phpfpm-wallabag.service"
|
||||||
"gitea.service"
|
"gitea.service"
|
||||||
"matrix-synapse.service"
|
"dendrite.service"
|
||||||
"mautrix-telegram.service"
|
"mautrix-telegram.service"
|
||||||
"nginx.service"
|
"nginx.service"
|
||||||
"dnsmasq.service"
|
"dnsmasq.service"
|
||||||
|
|
Binary file not shown.
Binary file not shown.
|
@ -9,4 +9,6 @@ in {
|
||||||
"ddclient.age".publicKeys = [ zion ];
|
"ddclient.age".publicKeys = [ zion ];
|
||||||
"miniflux.age".publicKeys = [ zion ];
|
"miniflux.age".publicKeys = [ zion ];
|
||||||
"git.age".publicKeys = [ zion ];
|
"git.age".publicKeys = [ zion ];
|
||||||
|
"dendrite.age".publicKeys = [ zion ];
|
||||||
|
"dendrite-postgres.age".publicKeys = [ zion ];
|
||||||
}
|
}
|
||||||
|
|
|
@ -0,0 +1 @@
|
||||||
|
{ "m.server": "matrix.coolneng.duckdns.org:443" }
|
Loading…
Reference in New Issue