summary refs log tree commit diff
path: root/host
diff options
context:
space:
mode:
authorRory& <root@rory.gay>2025-05-05 19:35:44 +0200
committerRory& <root@rory.gay>2025-05-05 19:35:44 +0200
commitf9eb5f50e449243477848905bae2a0c8b162e98d (patch)
treead60b82091e760c02a06ac627d4713d8db60f705 /host
parentUse current kernel for perf (diff)
downloadRory-Open-Architecture-f9eb5f50e449243477848905bae2a0c8b162e98d.tar.xz
Rory-nginx cleanup, fix Rory-desktop
Diffstat (limited to 'host')
-rw-r--r--host/Rory-desktop/configuration.nix11
-rw-r--r--host/Rory-nginx/configuration.nix14
-rwxr-xr-xhost/Rory-nginx/hooks/post-rebuild.sh1
-rw-r--r--host/Rory-nginx/services/containers/draupnir-cme/container.nix32
-rw-r--r--host/Rory-nginx/services/containers/draupnir-cme/root.nix16
-rw-r--r--host/Rory-nginx/services/containers/draupnir-cme/services/draupnir.nix23
-rw-r--r--host/Rory-nginx/services/containers/draupnir-fedora/container.nix32
-rw-r--r--host/Rory-nginx/services/containers/draupnir-fedora/root.nix16
-rw-r--r--host/Rory-nginx/services/containers/draupnir-fedora/services/draupnir.nix23
-rw-r--r--host/Rory-nginx/services/containers/draupnir-linux-mint/container.nix32
-rw-r--r--host/Rory-nginx/services/containers/draupnir-linux-mint/root.nix16
-rw-r--r--host/Rory-nginx/services/containers/draupnir-linux-mint/services/draupnir.nix26
-rw-r--r--host/Rory-nginx/services/email/autoconfig.nix18
-rw-r--r--host/Rory-nginx/services/email/maddy.conf124
-rw-r--r--host/Rory-nginx/services/email/maddy.nix49
-rw-r--r--host/Rory-nginx/services/email/nginx.nix32
-rw-r--r--host/Rory-nginx/services/email/root.nix8
-rw-r--r--host/Rory-nginx/services/matrix/coturn.nix52
-rw-r--r--host/Rory-nginx/services/matrix/draupnir.nix55
-rw-r--r--host/Rory-nginx/services/matrix/matrix-appservice-discord.nix25
-rw-r--r--host/Rory-nginx/services/matrix/sliding-sync.nix12
-rwxr-xr-xhost/Rory-ovh/hooks/post-rebuild.sh1
22 files changed, 6 insertions, 612 deletions
diff --git a/host/Rory-desktop/configuration.nix b/host/Rory-desktop/configuration.nix

index de58678..d93b66d 100644 --- a/host/Rory-desktop/configuration.nix +++ b/host/Rory-desktop/configuration.nix
@@ -27,7 +27,7 @@ args@{ #./optional/gui/x11.nix ./optional/gui/wayland.nix - ./printing.nix +# ./printing.nix # ./ollama.nix ]; @@ -105,6 +105,7 @@ args@{ ''; settings.PermitRootLogin = "yes"; }; + pulseaudio.enable = false; pipewire = { enable = true; audio.enable = true; @@ -129,9 +130,9 @@ args@{ # - IDEs #jetbrains-toolbox - #jetbrains.rider (jetbrains.plugins.addPlugins jetbrains.webstorm [ "github-copilot" ]) - (jetbrains.plugins.addPlugins jetbrains.clion [ "github-copilot" "string-manipulation" "nixidea" "visual-studio-keymap" ]) + (jetbrains.plugins.addPlugins jetbrains.clion [ "github-copilot" "nixidea" "visual-studio-keymap" ]) #"string-manipulation" + #jetbrains.rider #jetbrains.clion #github-copilot-intellij-agent @@ -264,10 +265,6 @@ args@{ sudo.wheelNeedsPassword = false; }; - hardware = { - pulseaudio.enable = false; - }; - programs.dconf.enable = true; #networking.wireguard.interfaces = { diff --git a/host/Rory-nginx/configuration.nix b/host/Rory-nginx/configuration.nix
index d6873ee..9448569 100644 --- a/host/Rory-nginx/configuration.nix +++ b/host/Rory-nginx/configuration.nix
@@ -90,20 +90,6 @@ # conduit = conduit; #}; - services.pgadmin = { - enable = false; - initialEmail = "root@localhost.localdomain"; - initialPasswordFile = "/etc/matrix-user-pass"; - }; - containers."draupnir-cme" = import ./services/containers/draupnir-cme/container.nix { - inherit pkgs lib nixpkgs-Draupnir; - }; - containers."draupnir-fedora" = import ./services/containers/draupnir-fedora/container.nix { - inherit pkgs lib nixpkgs-Draupnir; - }; - - #containers."draupnir-linux-mint" = import ./services/containers/draupnir-linux-mint/container.nix { inherit pkgs lib nixpkgs-Draupnir; }; - system.stateVersion = "22.11"; # DO NOT EDIT! environment.systemPackages = with pkgs; [ waypipe ]; diff --git a/host/Rory-nginx/hooks/post-rebuild.sh b/host/Rory-nginx/hooks/post-rebuild.sh
index 9b0c17c..198b7e6 100755 --- a/host/Rory-nginx/hooks/post-rebuild.sh +++ b/host/Rory-nginx/hooks/post-rebuild.sh
@@ -1,6 +1,7 @@ #!/usr/bin/env nix-shell #!nix-shell -i bash -p curl gnused nix coreutils jq openssl #set -x +exit REG_KEY=`cat /var/lib/matrix-synapse/registration_shared_secret.txt` LOCALPART='rory.gay' REACHABLE_DOMAIN='http://localhost:8008' diff --git a/host/Rory-nginx/services/containers/draupnir-cme/container.nix b/host/Rory-nginx/services/containers/draupnir-cme/container.nix deleted file mode 100644
index 7b87264..0000000 --- a/host/Rory-nginx/services/containers/draupnir-cme/container.nix +++ /dev/null
@@ -1,32 +0,0 @@ -{ nixpkgs-Draupnir, ... }: - -{ - privateNetwork = true; - autoStart = true; - specialArgs = { - inherit nixpkgs-Draupnir; - }; - config = - { lib, pkgs, ... }: - { - imports = [ - ../shared.nix - ./root.nix - ./services/draupnir.nix - "${nixpkgs-Draupnir}/nixos/modules/services/matrix/draupnir.nix" - ]; - nixpkgs.overlays = [ - (final: prev: { - draupnir = nixpkgs-Draupnir.legacyPackages.${pkgs.stdenv.hostPlatform.system}.draupnir; - }) - ]; - }; - hostAddress = "192.168.100.1"; - localAddress = "192.168.100.17"; - - bindMounts."draupnir-access-token" = { - hostPath = "/etc/draupnir-cme-access-token"; - mountPoint = "/etc/draupnir-access-token"; - isReadOnly = true; - }; -} diff --git a/host/Rory-nginx/services/containers/draupnir-cme/root.nix b/host/Rory-nginx/services/containers/draupnir-cme/root.nix deleted file mode 100644
index 0ebce9e..0000000 --- a/host/Rory-nginx/services/containers/draupnir-cme/root.nix +++ /dev/null
@@ -1,16 +0,0 @@ -{ ... }: - -{ - networking.useHostResolvConf = true; - - networking.hosts = { - "192.168.100.1" = [ - "matrix.rory.gay" - "rory.gay" - ]; - }; - - networking.firewall = { - enable = true; - }; -} diff --git a/host/Rory-nginx/services/containers/draupnir-cme/services/draupnir.nix b/host/Rory-nginx/services/containers/draupnir-cme/services/draupnir.nix deleted file mode 100644
index cf59809..0000000 --- a/host/Rory-nginx/services/containers/draupnir-cme/services/draupnir.nix +++ /dev/null
@@ -1,23 +0,0 @@ -{ ... }: - -{ - services.draupnir = { - enable = true; - accessTokenFile = "/etc/draupnir-access-token"; - homeserverUrl = "https://matrix.rory.gay"; - - settings = { - managementRoom = "#draupnir-cme:rory.gay"; - recordIgnoredInvites = true; # We want to be aware of invites - autojoinOnlyIfManager = true; # ... but we don't want the bot to be invited to eg. Matrix HQ... - automaticallyRedactForReasons = [ "*" ]; # Always autoredact - fasterMembershipChecks = true; - - backgroundDelayMS = 10; # delay isn't needed, I don't mind the performance hit - pollReports = false; - - admin.enableMakeRoomAdminCommand = false; - commands.ban.defaultReasons = [ "spam" ]; - }; - }; -} diff --git a/host/Rory-nginx/services/containers/draupnir-fedora/container.nix b/host/Rory-nginx/services/containers/draupnir-fedora/container.nix deleted file mode 100644
index 82683d7..0000000 --- a/host/Rory-nginx/services/containers/draupnir-fedora/container.nix +++ /dev/null
@@ -1,32 +0,0 @@ -{ nixpkgs-Draupnir, ... }: - -{ - privateNetwork = true; - autoStart = true; - specialArgs = { - inherit nixpkgs-Draupnir; - }; - config = - { lib, pkgs, ... }: - { - imports = [ - ../shared.nix - ./root.nix - ./services/draupnir.nix - "${nixpkgs-Draupnir}/nixos/modules/services/matrix/draupnir.nix" - ]; - nixpkgs.overlays = [ - (final: prev: { - draupnir = nixpkgs-Draupnir.legacyPackages.${pkgs.stdenv.hostPlatform.system}.draupnir; - }) - ]; - }; - hostAddress = "192.168.100.1"; - localAddress = "192.168.100.18"; - - bindMounts."draupnir-access-token" = { - hostPath = "/etc/draupnir-fedora-access-token"; - mountPoint = "/etc/draupnir-access-token"; - isReadOnly = true; - }; -} diff --git a/host/Rory-nginx/services/containers/draupnir-fedora/root.nix b/host/Rory-nginx/services/containers/draupnir-fedora/root.nix deleted file mode 100644
index 0ebce9e..0000000 --- a/host/Rory-nginx/services/containers/draupnir-fedora/root.nix +++ /dev/null
@@ -1,16 +0,0 @@ -{ ... }: - -{ - networking.useHostResolvConf = true; - - networking.hosts = { - "192.168.100.1" = [ - "matrix.rory.gay" - "rory.gay" - ]; - }; - - networking.firewall = { - enable = true; - }; -} diff --git a/host/Rory-nginx/services/containers/draupnir-fedora/services/draupnir.nix b/host/Rory-nginx/services/containers/draupnir-fedora/services/draupnir.nix deleted file mode 100644
index 6573f4c..0000000 --- a/host/Rory-nginx/services/containers/draupnir-fedora/services/draupnir.nix +++ /dev/null
@@ -1,23 +0,0 @@ -{ ... }: - -{ - services.draupnir = { - enable = true; - accessTokenFile = "/etc/draupnir-access-token"; - homeserverUrl = "https://matrix.rory.gay"; - - settings = { - managementRoom = "#draupnir-fedora-mgmt:rory.gay"; - recordIgnoredInvites = true; # We want to be aware of invites - autojoinOnlyIfManager = true; # ... but we don't want the bot to be invited to eg. Matrix HQ... - automaticallyRedactForReasons = [ "*" ]; # Always autoredact - fasterMembershipChecks = true; - - backgroundDelayMS = 10; # delay isn't needed, I don't mind the performance hit - pollReports = false; - - admin.enableMakeRoomAdminCommand = false; - commands.ban.defaultReasons = [ "spam" ]; - }; - }; -} diff --git a/host/Rory-nginx/services/containers/draupnir-linux-mint/container.nix b/host/Rory-nginx/services/containers/draupnir-linux-mint/container.nix deleted file mode 100644
index 41d25c5..0000000 --- a/host/Rory-nginx/services/containers/draupnir-linux-mint/container.nix +++ /dev/null
@@ -1,32 +0,0 @@ -{ nixpkgs-Draupnir, ... }: - -{ - privateNetwork = true; - autoStart = true; - specialArgs = { - inherit nixpkgs-Draupnir; - }; - config = - { lib, pkgs, ... }: - { - imports = [ - ../shared.nix - ./root.nix - ./services/draupnir.nix - "${nixpkgs-Draupnir}/nixos/modules/services/matrix/draupnir.nix" - ]; - nixpkgs.overlays = [ - (final: prev: { - draupnir = nixpkgs-Draupnir.legacyPackages.${pkgs.stdenv.hostPlatform.system}.draupnir; - }) - ]; - }; - hostAddress = "192.168.100.1"; - localAddress = "192.168.100.19"; - - bindMounts."draupnir-access-token" = { - hostPath = "/etc/draupnir-linux-mint-access-token"; - mountPoint = "/etc/draupnir-access-token"; - isReadOnly = true; - }; -} diff --git a/host/Rory-nginx/services/containers/draupnir-linux-mint/root.nix b/host/Rory-nginx/services/containers/draupnir-linux-mint/root.nix deleted file mode 100644
index 2adac62..0000000 --- a/host/Rory-nginx/services/containers/draupnir-linux-mint/root.nix +++ /dev/null
@@ -1,16 +0,0 @@ -{ pkgs, ... }: - -{ - networking.useHostResolvConf = true; - - networking.hosts = { - "192.168.100.18" = [ - "matrix.rory.gay" - "rory.gay" - ]; - }; - - networking.firewall = { - enable = true; - }; -} diff --git a/host/Rory-nginx/services/containers/draupnir-linux-mint/services/draupnir.nix b/host/Rory-nginx/services/containers/draupnir-linux-mint/services/draupnir.nix deleted file mode 100644
index 042651a..0000000 --- a/host/Rory-nginx/services/containers/draupnir-linux-mint/services/draupnir.nix +++ /dev/null
@@ -1,26 +0,0 @@ -{ ... }: - -{ - services.draupnir = { - enable = true; - accessTokenFile = "/etc/draupnir-access-token"; - homeserverUrl = "https://matrix.rory.gay"; - - settings = { - managementRoom = "#draupnir-linux-mint:rory.gay"; - recordIgnoredInvites = true; # We want to be aware of invites - autojoinOnlyIfManager = true; # ... but we don't want the bot to be invited to eg. Matrix HQ... - automaticallyRedactForReasons = [ "*" ]; # Always autoredact - fasterMembershipChecks = true; - - backgroundDelayMS = 10; # delay isn't needed, I don't mind the performance hit - pollReports = false; - - admin.enableMakeRoomAdminCommand = false; - commands.ban.defaultReasons = [ - "spam" - "code of conduct violation" - ]; - }; - }; -} diff --git a/host/Rory-nginx/services/email/autoconfig.nix b/host/Rory-nginx/services/email/autoconfig.nix deleted file mode 100644
index d258046..0000000 --- a/host/Rory-nginx/services/email/autoconfig.nix +++ /dev/null
@@ -1,18 +0,0 @@ -{ ... }: -{ - services.go-autoconfig = { - enable = true; - settings = { - service_addr = ":1323"; - domain = "autoconfig.rory.gay"; - imap = { - server = "rory.gay"; - port = 993; - }; - smtp = { - server = "rory.gay"; - port = 587; - }; - }; - }; -} diff --git a/host/Rory-nginx/services/email/maddy.conf b/host/Rory-nginx/services/email/maddy.conf deleted file mode 100644
index 1d3eb2f..0000000 --- a/host/Rory-nginx/services/email/maddy.conf +++ /dev/null
@@ -1,124 +0,0 @@ - -# Minimal configuration with TLS disabled, adapted from upstream example -# configuration here https://github.com/foxcpp/maddy/blob/master/maddy.conf -# Do not use this in production! - -auth.pass_table local_authdb { - table sql_table { - driver sqlite3 - dsn credentials.db - table_name passwords - } -} - -storage.imapsql local_mailboxes { - driver sqlite3 - dsn imapsql.db -} - -table.chain local_rewrites { - optional_step regexp "(.+)\+(.+)@(.+)" "$1@$3" - optional_step static { - entry postmaster root@$(primary_domain) - } - optional_step file /etc/maddy/aliases -} - -msgpipeline local_routing { - destination postmaster $(local_domains) { - modify { - replace_rcpt &local_rewrites - } - deliver_to &local_mailboxes - } - default_destination { - reject 550 5.1.1 "User doesn't exist" - } -} - -smtp tcp://0.0.0.0:25 { - limits { - all rate 20 1s - all concurrency 10 - } - dmarc yes - check { - require_mx_record - dkim - spf - } - source $(local_domains) { - reject 501 5.1.8 "Use Submission for outgoing SMTP" - } - default_source { - destination postmaster $(local_domains) { - deliver_to &local_routing - } - default_destination { - reject 550 5.1.1 "User doesn't exist" - } - } -} - -submission tls://0.0.0.0:465 tcp://0.0.0.0:587 { - limits { - all rate 50 1s - } - auth &local_authdb - source $(local_domains) { - check { - authorize_sender { - prepare_email &local_rewrites - user_to_email identity - } - } - destination postmaster $(local_domains) { - deliver_to &local_routing - } - default_destination { - modify { - dkim $(primary_domain) $(local_domains) default - } - deliver_to &remote_queue - } - } - default_source { - reject 501 5.1.8 "Non-local sender domain" - } -} - -target.remote outbound_delivery { - limits { - destination rate 20 1s - destination concurrency 10 - } - mx_auth { - dane - mtasts { - cache fs - fs_dir mtasts_cache/ - } - local_policy { - min_tls_level encrypted - min_mx_level none - } - } -} - -target.queue remote_queue { - target &outbound_delivery - autogenerated_msg_domain $(primary_domain) - bounce { - destination postmaster $(local_domains) { - deliver_to &local_routing - } - default_destination { - reject 550 5.0.0 "Refusing to send DSNs to non-local addresses" - } - } -} - -imap tls://0.0.0.0:993 tcp://0.0.0.0:143 { - auth &local_authdb - storage &local_mailboxes -} \ No newline at end of file diff --git a/host/Rory-nginx/services/email/maddy.nix b/host/Rory-nginx/services/email/maddy.nix deleted file mode 100644
index 07b6e72..0000000 --- a/host/Rory-nginx/services/email/maddy.nix +++ /dev/null
@@ -1,49 +0,0 @@ -{ - pkgs, - options, - config, - ... -}: -{ - services.maddy = { - enable = true; - primaryDomain = "rory.gay"; - hostname = "mail.rory.gay"; - ensureAccounts = [ - "root@rory.gay" - ]; - ensureCredentials = { - "root@rory.gay".passwordFile = "/var/lib/maddy/passwd/root"; - }; - config = builtins.readFile ./maddy.conf; - # builtins.replaceStrings - # [ - # "imap tcp://0.0.0.0:143" - # "submission tcp://0.0.0.0:587" - # "entry postmaster postmaster@$(primary_domain)" - # ] - # [ - # "imap tls://0.0.0.0:993 tcp://0.0.0.0:143" - # "submission tls://0.0.0.0:465 tcp://0.0.0.0:587" - # "entry postmaster root@$(primary_domain)" - # ] - # options.services.maddy.config.default; - - tls = { - loader = "file"; - certificates = [ - { - certPath = "/var/lib/acme/mail.rory.gay/fullchain.pem"; - keyPath = "/var/lib/acme/mail.rory.gay/key.pem"; - } - ]; - }; - }; - - networking.firewall.allowedTCPPorts = [ - 993 - 465 - ]; - - users.users.maddy.extraGroups = [ "nginx" ]; -} diff --git a/host/Rory-nginx/services/email/nginx.nix b/host/Rory-nginx/services/email/nginx.nix deleted file mode 100644
index 812993a..0000000 --- a/host/Rory-nginx/services/email/nginx.nix +++ /dev/null
@@ -1,32 +0,0 @@ -{ config, ... }: -{ - services.nginx.virtualHosts = { - "mta-sts.rory.gay" = { - enableACME = true; - forceSSL = true; - locations = { - "/.well-known/mta-sts.txt" = { - # age 604800 - return = '' - 200 "version: STSv1 - mode: enforce - max_age: 120 - mx: mail.rory.gay - "''; - }; - }; - }; - "mail.rory.gay" = { - enableACME = true; - forceSSL = true; - locations = { - "/".return = "200 'OK'"; - }; - }; - "autoconfig.rory.gay" = { - enableACME = true; - forceSSL = true; - locations."/".proxyPass = "http://localhost:1323"; - }; - }; -} diff --git a/host/Rory-nginx/services/email/root.nix b/host/Rory-nginx/services/email/root.nix deleted file mode 100644
index 7db85d8..0000000 --- a/host/Rory-nginx/services/email/root.nix +++ /dev/null
@@ -1,8 +0,0 @@ -{ ... }: -{ - imports = [ - ./autoconfig.nix - ./maddy.nix - ./nginx.nix - ]; -} diff --git a/host/Rory-nginx/services/matrix/coturn.nix b/host/Rory-nginx/services/matrix/coturn.nix deleted file mode 100644
index 805faa9..0000000 --- a/host/Rory-nginx/services/matrix/coturn.nix +++ /dev/null
@@ -1,52 +0,0 @@ -{ ... }: - -{ - # coturn (WebRTC) - services.coturn = { - enable = false; # Alicia - figure out secret first... - no-cli = true; - no-tcp-relay = true; - min-port = 49000; - max-port = 50000; - use-auth-secret = true; - static-auth-secret = "will be world readable for local users :("; - realm = "turn.example.com"; - # Alicia - figure out how to get this to work, since nginx runs on separate machine... - #cert = "${config.security.acme.certs.${realm}.directory}/full.pem"; - #pkey = "${config.security.acme.certs.${realm}.directory}/key.pem"; - extraConfig = '' - # for debugging - verbose - # ban private IP ranges - no-multicast-peers - denied-peer-ip=0.0.0.0-0.255.255.255 - denied-peer-ip=10.0.0.0-10.255.255.255 - denied-peer-ip=100.64.0.0-100.127.255.255 - denied-peer-ip=127.0.0.0-127.255.255.255 - denied-peer-ip=169.254.0.0-169.254.255.255 - denied-peer-ip=172.16.0.0-172.31.255.255 - denied-peer-ip=192.0.0.0-192.0.0.255 - denied-peer-ip=192.0.2.0-192.0.2.255 - denied-peer-ip=192.88.99.0-192.88.99.255 - denied-peer-ip=192.168.0.0-192.168.255.255 - denied-peer-ip=198.18.0.0-198.19.255.255 - denied-peer-ip=198.51.100.0-198.51.100.255 - denied-peer-ip=203.0.113.0-203.0.113.255 - denied-peer-ip=240.0.0.0-255.255.255.255 - denied-peer-ip=::1 - denied-peer-ip=64:ff9b::-64:ff9b::ffff:ffff - denied-peer-ip=::ffff:0.0.0.0-::ffff:255.255.255.255 - denied-peer-ip=100::-100::ffff:ffff:ffff:ffff - denied-peer-ip=2001::-2001:1ff:ffff:ffff:ffff:ffff:ffff:ffff - denied-peer-ip=2002::-2002:ffff:ffff:ffff:ffff:ffff:ffff:ffff - denied-peer-ip=fc00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff - denied-peer-ip=fe80::-febf:ffff:ffff:ffff:ffff:ffff:ffff:ffff - ''; - }; - #services.matrix-synapse = with config.services.coturn; { - # turn_uris = ["turn:${realm}:3478?transport=udp" "turn:${realm}:3478?transport=tcp"]; - # turn_shared_secret = static-auth-secret; - # turn_user_lifetime = "1h"; - #}; - -} diff --git a/host/Rory-nginx/services/matrix/draupnir.nix b/host/Rory-nginx/services/matrix/draupnir.nix deleted file mode 100644
index 40d1489..0000000 --- a/host/Rory-nginx/services/matrix/draupnir.nix +++ /dev/null
@@ -1,55 +0,0 @@ -{ pkgs, draupnirSrc, ... }: - -{ - services.draupnir = { - #package = (pkgs.draupnir.overrideAttrs (oldAttrs: { - # src = draupnirSrc; - # version = draupnirSrc.rev; - #})); - - enable = true; - homeserverUrl = "https://matrix.rory.gay"; - accessTokenFile = "/etc/draupnir-access-token"; - - #pantalaimon = { - # enable = false; - # username = "draupnir"; - # passwordFile = "/etc/draupnir-password"; - # options = { - #homeserver = "http://localhost:8008"; - #ssl = false; - # }; - #}; - settings = { - managementRoom = "#draupnir-mgmt:rory.gay"; - verboseLogging = false; - recordIgnoredInvites = true; # Let's log ignored invites, just incase - autojoinOnlyIfManager = true; # Let's not open ourselves up to DoS attacks - automaticallyRedactForReasons = [ "*" ]; # I always want autoredact - fasterMembershipChecks = true; - #roomStateBackingStore.enabled = true; # broken under nix. - - backgroundDelayMS = 10; # delay isn't needed, I don't mind the performance hit - pollReports = false; # this is a single person homeserver... let's save ourself the work - - admin.enableMakeRoomAdminCommand = true; - commands.ban.defaultReasons = [ - "spam" - "harassment" - "transphobia" - "scam" - ]; - protections = { - wordlist = { - words = [ - "tranny" - "faggot" - "ywnbaw" - "nigger" - ]; - minutesBeforeTrusting = 0; - }; - }; - }; - }; -} diff --git a/host/Rory-nginx/services/matrix/matrix-appservice-discord.nix b/host/Rory-nginx/services/matrix/matrix-appservice-discord.nix deleted file mode 100644
index 3041aaa..0000000 --- a/host/Rory-nginx/services/matrix/matrix-appservice-discord.nix +++ /dev/null
@@ -1,25 +0,0 @@ -{ ... }: - -{ - # Discord bridge - services.matrix-appservice-discord = { - enable = false; # Alicia - figure out secret first... - environmentFile = /etc/keyring/matrix-appservice-discord/tokens.env; - # The appservice is pre-configured to use SQLite by default. - # It's also possible to use PostgreSQL. - settings = { - bridge = { - domain = "rory.gay"; - homeserverUrl = "https://matrix.rory.gay"; - }; - - # The service uses SQLite by default, but it's also possible to use - # PostgreSQL instead: - database = { - # filename = ""; # empty value to disable sqlite - connString = "postgres://postgres@127.0.0.1/matrix-appservice-discord"; - }; - }; - }; - -} diff --git a/host/Rory-nginx/services/matrix/sliding-sync.nix b/host/Rory-nginx/services/matrix/sliding-sync.nix deleted file mode 100644
index a8fbd0c..0000000 --- a/host/Rory-nginx/services/matrix/sliding-sync.nix +++ /dev/null
@@ -1,12 +0,0 @@ -{ ... }: -{ - services.matrix-sliding-sync = { - enable = true; - settings = { - "SYNCV3_SERVER" = "http://matrix.rory.gay"; - "SYNCV3_DB" = "postgresql://%2Frun%2Fpostgresql/syncv3"; - "SYNCV3_BINDADDR" = "0.0.0.0:8100"; - }; - environmentFile = "/etc/sliding-sync.env"; - }; -} diff --git a/host/Rory-ovh/hooks/post-rebuild.sh b/host/Rory-ovh/hooks/post-rebuild.sh
index fcab049..f4f5896 100755 --- a/host/Rory-ovh/hooks/post-rebuild.sh +++ b/host/Rory-ovh/hooks/post-rebuild.sh
@@ -1,6 +1,7 @@ #!/usr/bin/env nix-shell #!nix-shell -i bash -p curl gnused nix coreutils jq openssl #set -x +exit REG_KEY=`cat /var/lib/matrix-synapse/registration_shared_secret.txt` LOCALPART='rory.gay' REACHABLE_DOMAIN='http://localhost:8008'