+10
-8
flake.nix
+10
-8
flake.nix
···
···
+28
-36
man/default.nix
+28
-36
man/default.nix
···
···
+7
-15
modules/default.nix
+7
-15
modules/default.nix
···
···
+6
-7
modules/dns.nix
+6
-7
modules/dns.nix
············
············
+22
-17
modules/gitea.nix
+22
-17
modules/gitea.nix
···-proxyPass = "http://localhost:${builtins.toString config.services.gitea.settings.server.HTTP_PORT}/";······-iptables -A PREROUTING -t nat -i ${config.eilean.publicInterface} -p tcp --dport 22 -j REDIRECT --to-port ${builtins.toString cfg.gitea.sshPort}-ip6tables -A PREROUTING -t nat -i ${config.eilean.publicInterface} -p tcp --dport 22 -j REDIRECT --to-port ${builtins.toString cfg.gitea.sshPort}-iptables -A OUTPUT -d ${config.eilean.serverIpv4} -t nat -p tcp --dport 22 -j REDIRECT --to-port ${builtins.toString cfg.gitea.sshPort}-ip6tables -A OUTPUT -d ${config.eilean.serverIpv6} -t nat -p tcp --dport 22 -j REDIRECT --to-port ${builtins.toString cfg.gitea.sshPort}
·········+iptables -A PREROUTING -t nat -i ${config.eilean.publicInterface} -p tcp --dport 22 -j REDIRECT --to-port ${+ip6tables -A PREROUTING -t nat -i ${config.eilean.publicInterface} -p tcp --dport 22 -j REDIRECT --to-port ${+iptables -A OUTPUT -d ${config.eilean.serverIpv4} -t nat -p tcp --dport 22 -j REDIRECT --to-port ${+ip6tables -A OUTPUT -d ${config.eilean.serverIpv6} -t nat -p tcp --dport 22 -j REDIRECT --to-port ${
+8
-14
modules/headscale.nix
+8
-14
modules/headscale.nix
············
············
+12
-7
modules/mailserver.nix
+12
-7
modules/mailserver.nix
······-data = "\"v=DKIM1; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC6YmYYvoFF7VqtGcozpVQa78aaGgZdvc5ZIHqzmkKdCBEyDF2FRbCEK4s2AlC8hhc8O4mSSe3S4AzEhlRgHXbU22GBaUZ3s2WHS8JJwZvWeTjsbXQwjN/U7xpkqXPHLH9IVfOJbHlp4HQmCAXw4NaypgkkxIGK0jaZHm2j6/1izQIDAQAB\"";
······+"v=DKIM1; p=MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQC6YmYYvoFF7VqtGcozpVQa78aaGgZdvc5ZIHqzmkKdCBEyDF2FRbCEK4s2AlC8hhc8O4mSSe3S4AzEhlRgHXbU22GBaUZ3s2WHS8JJwZvWeTjsbXQwjN/U7xpkqXPHLH9IVfOJbHlp4HQmCAXw4NaypgkkxIGK0jaZHm2j6/1izQIDAQAB"'';
+15
-18
modules/mastodon.nix
+15
-18
modules/mastodon.nix
············
············
+25
-29
modules/matrix/mautrix-instagram.nix
+25
-29
modules/matrix/mautrix-instagram.nix
···-settingsFileUnsubstituted = settingsFormat.generate "mautrix-instagram-config-unsubstituted.json" cfg.settings;······-enable = lib.mkEnableOption (lib.mdDoc "mautrix-instagram, a puppeting/relaybot bridge between Matrix and Instagram.");······-default = lib.optional config.services.matrix-synapse.enable config.services.matrix-synapse.serviceUnit;······
·····················
+25
-29
modules/matrix/mautrix-messenger.nix
+25
-29
modules/matrix/mautrix-messenger.nix
···-settingsFileUnsubstituted = settingsFormat.generate "mautrix-messenger-config-unsubstituted.json" cfg.settings;······-enable = lib.mkEnableOption (lib.mdDoc "mautrix-messenger, a puppeting/relaybot bridge between Matrix and Messenger.");······-default = lib.optional config.services.matrix-synapse.enable config.services.matrix-synapse.serviceUnit;······
·····················
+26
-29
modules/matrix/mautrix-signal.nix
+26
-29
modules/matrix/mautrix-signal.nix
···-settingsFileUnsubstituted = settingsFormat.generate "mautrix-signal-config-unsubstituted.json" cfg.settings;······-enable = lib.mkEnableOption (lib.mdDoc "mautrix-signal, a puppeting/relaybot bridge between Matrix and Signal.");······-default = lib.optional config.services.matrix-synapse.enable config.services.matrix-synapse.serviceUnit;·········
························
+91
-82
modules/matrix/synapse.nix
+91
-82
modules/matrix/synapse.nix
······# set other headers due to https://github.com/yandex/gixy/blob/master/docs/en/plugins/addheaderredefinition.md-add_header Content-Security-Policy "default-src 'self'; base-uri 'self'; frame-src 'self'; frame-ancestors 'self'; form-action 'self';" always;···-(optional cfg.matrix.bridges.whatsapp "/var/lib/mautrix-whatsapp/whatsapp-registration.yaml") ++-(optional cfg.matrix.bridges.instagram "/var/lib/mautrix-instagram/instagram-registration.yaml") ++-(optional cfg.matrix.bridges.messenger "/var/lib/mautrix-messenger/messenger-registration.yaml");···-echo "turn_shared_secret: $(cat '${config.services.coturn.static-auth-secret-file}')" > '${turnSharedSecretFile}'-chown ${config.systemd.services.matrix-synapse.serviceConfig.User}:${config.systemd.services.matrix-synapse.serviceConfig.Group} '${turnSharedSecretFile}'-systemd.services."matrix-synapse".after = mkIf cfg.matrix.turn [ "matrix-synapse-turn-shared-secret-generator.service" ];-systemd.services."matrix-synapse".requires = mkIf cfg.matrix.turn [ "matrix-synapse-turn-shared-secret-generator.service" ];-(optional cfg.matrix.bridges.whatsapp config.systemd.services.mautrix-whatsapp.serviceConfig.Group) ++-(optional cfg.matrix.bridges.signal config.systemd.services.mautrix-signal.serviceConfig.Group) ++-(optional cfg.matrix.bridges.instagram config.systemd.services.mautrix-instagram.serviceConfig.Group) ++-(optional cfg.matrix.bridges.messenger config.systemd.services.mautrix-messenger.serviceConfig.Group);-settings.bridge.permissions."@${config.eilean.username}:${config.networking.domain}" = "admin";-settings.bridge.permissions."@${config.eilean.username}:${config.networking.domain}" = "admin";-settings.bridge.permissions."@${config.eilean.username}:${config.networking.domain}" = "admin";-settings.bridge.permissions."@${config.eilean.username}:${config.networking.domain}" = "admin";
······# set other headers due to https://github.com/yandex/gixy/blob/master/docs/en/plugins/addheaderredefinition.md+add_header Content-Security-Policy "default-src 'self'; base-uri 'self'; frame-src 'self'; frame-ancestors 'self'; form-action 'self';" always;······+echo "turn_shared_secret: $(cat '${config.services.coturn.static-auth-secret-file}')" > '${turnSharedSecretFile}'+chown ${config.systemd.services.matrix-synapse.serviceConfig.User}:${config.systemd.services.matrix-synapse.serviceConfig.Group} '${turnSharedSecretFile}'
+19
-20
modules/services/dns/bind.nix
+19
-20
modules/services/dns/bind.nix
······
······
+12
-23
modules/services/dns/default.nix
+12
-23
modules/services/dns/default.nix
·········
·········
+4
-12
modules/services/dns/zonefile.nix
+4
-12
modules/services/dns/zonefile.nix
······-(builtins.map (rr: "${rr.name} IN ${builtins.toString rr.ttl} ${rr.type} ${rr.data}") zone.records)
······
+12
-20
modules/turn.nix
+12
-20
modules/turn.nix
···············
···············
+40
-52
modules/wireguard/default.nix
+40
-52
modules/wireguard/default.nix
···············
···············
+2
-1
pkgs/mautrix-meta.nix
+2
-1
pkgs/mautrix-meta.nix
+2
-4
template/configuration.nix
+2
-4
template/configuration.nix
······
······
+17
-16
template/flake.nix
+17
-16
template/flake.nix
···
···