Upgrade to 22.05

This commit is contained in:
Oystein Kristoffer Tveit 2022-06-12 00:23:10 +02:00
parent 8e3f28bc31
commit 2eae0e5ebf
4 changed files with 50 additions and 54 deletions

View File

@ -2,10 +2,10 @@
description = "Mmmmmh, Spaghetti"; description = "Mmmmmh, Spaghetti";
inputs = { inputs = {
nixpkgs.url = "nixpkgs/nixos-21.11"; nixpkgs.url = "nixpkgs/nixos-22.05";
home-manager = { home-manager = {
url = "github:nix-community/home-manager/release-21.11"; url = "github:nix-community/home-manager/release-22.05";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
@ -97,7 +97,7 @@
}; };
username = "h7x4"; username = "h7x4";
homeDirectory = "/home/h7x4"; homeDirectory = "/home/h7x4";
stateVersion = "21.11"; stateVersion = "22.05";
configuration = { configuration = {
imports = [ imports = [

View File

@ -39,7 +39,7 @@ in {
]; ];
home = { home = {
stateVersion = "21.11"; stateVersion = "22.05";
username = "h7x4"; username = "h7x4";
homeDirectory = "/home/h7x4"; homeDirectory = "/home/h7x4";
file = { file = {

View File

@ -115,7 +115,8 @@ in {
liberation_ttf liberation_ttf
migmix migmix
noto-fonts noto-fonts
noto-fonts-cjk noto-fonts-cjk-sans
noto-fonts-cjk-serif
noto-fonts-emoji noto-fonts-emoji
open-sans open-sans
source-han-sans source-han-sans

View File

@ -3,64 +3,59 @@
# TODO: configure synapse to point users to coturn # TODO: configure synapse to point users to coturn
services.matrix-synapse = { services.matrix-synapse = {
enable = true; enable = true;
turn_uris = let settings = {
inherit (config.services.coturn) realm; turn_uris = let
p = toString secrets.ports.matrix.default; inherit (config.services.coturn) realm;
in ["turn:${realm}:${p}?transport=udp" "turn:${realm}:${p}?transport=tcp"]; p = toString secrets.ports.matrix.default;
turn_shared_secret = config.services.coturn.static-auth-secret; in ["turn:${realm}:${p}?transport=udp" "turn:${realm}:${p}?transport=tcp"];
turn_user_lifetime = "1h"; turn_shared_secret = config.services.coturn.static-auth-secret;
turn_user_lifetime = "1h";
server_name = "nani.wtf"; server_name = "nani.wtf";
public_baseurl = "https://matrix.nani.wtf"; public_baseurl = "https://matrix.nani.wtf";
registration_shared_secret = secrets.keys.matrix.registration-shared-secret; registration_shared_secret = secrets.keys.matrix.registration-shared-secret;
enable_metrics = true; enable_metrics = true;
listeners = [ listeners = [
{ {
port = secrets.ports.matrix.listener; port = secrets.ports.matrix.listener;
bind_address = "::1"; bind_address = "::1";
type = "http"; type = "http";
tls = false; tls = false;
x_forwarded = true; x_forwarded = true;
resources = [ resources = [
{ {
names = [ "client" "federation" "metrics" ]; names = [ "client" "federation" "metrics" ];
compress = false; compress = false;
} }
]; ];
} }
]; ];
enable_registration = false; enable_registration = false;
# password_config.enabled = lib.mkForce false; # password_config.enabled = lib.mkForce false;
dataDir = "/data/var/matrix"; dataDir = "/data/var/matrix";
database_type = "psycopg2"; database_type = "psycopg2";
database_args = { database_args = {
password = "synapse"; password = "synapse";
};
# TODO: Figure out a way to do this declaratively.
# The files need to be owned by matrix-synapse
app_service_config_files = [
"/var/lib/matrix-synapse/discord-registration.yaml"
# (pkgs.writeText "facebook-registrations.yaml" (builtins.toJSON config.services.mautrix-facebook.registrationData))
"/var/lib/matrix-synapse/facebook-registration.yaml"
];
# redis.enabled = true;
max_upload_size = "100M";
}; };
# TODO: Figure out a way to do this declaratively.
# The files need to be owned by matrix-synapse
app_service_config_files = [
"/var/lib/matrix-synapse/discord-registration.yaml"
# (pkgs.writeText "facebook-registrations.yaml" (builtins.toJSON config.services.mautrix-facebook.registrationData))
"/var/lib/matrix-synapse/facebook-registration.yaml"
];
# redis.enabled = true;
max_upload_size = "100M";
# settings = {
# };
}; };
services.redis.enable = true; services.redis.enable = true;