134 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			134 lines
		
	
	
	
		
			4 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| {
 | |
|   config,
 | |
|   lib,
 | |
|   ...
 | |
| }: let
 | |
|   inherit (lib.strings) concatMapStringsSep;
 | |
| 
 | |
|   cfg = config.services.matrix-conduit;
 | |
|   domain = "matrix.${config.services.nginx.domain}";
 | |
|   turn-realm = "turn.${config.services.nginx.domain}";
 | |
| in {
 | |
|   services.matrix-conduit = {
 | |
|     enable = true;
 | |
|     settings.global = {
 | |
|       address = "127.0.0.1";
 | |
|       server_name = domain;
 | |
|       database_backend = "rocksdb";
 | |
| 
 | |
|       turn_uris = let
 | |
|         address = "${config.services.coturn.realm}:${toString config.services.coturn.listening-port}";
 | |
|         tls-address = "${config.services.coturn.realm}:${toString config.services.coturn.tls-listening-port}";
 | |
|       in [
 | |
|         "turn:${address}?transport=udp"
 | |
|         "turn:${address}?transport=tcp"
 | |
|         "turns:${tls-address}?transport=udp"
 | |
|         "turns:${tls-address}?transport=tcp"
 | |
|       ];
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   # Pass in the TURN secret via EnvironmentFile, not supported by
 | |
|   # upstream module currently.
 | |
|   #
 | |
|   # See also https://gitlab.com/famedly/conduit/-/issues/314
 | |
|   systemd.services.conduit.serviceConfig.EnvironmentFile = config.sops.secrets."turn/env".path;
 | |
| 
 | |
|   services.coturn = {
 | |
|     enable = true;
 | |
|     no-cli = true;
 | |
|     use-auth-secret = true;
 | |
|     static-auth-secret-file = config.sops.secrets."turn/secret".path;
 | |
|     realm = turn-realm;
 | |
|     relay-ips = [
 | |
|       "178.79.137.55"
 | |
|     ];
 | |
| 
 | |
|     # SSL config
 | |
|     #
 | |
|     # TODO(tlater): Switch to letsencrypt once google fix:
 | |
|     #  https://github.com/vector-im/element-android/issues/1533
 | |
|     pkey = config.sops.secrets."turn/ssl-key".path;
 | |
|     cert = config.sops.secrets."turn/ssl-cert".path;
 | |
| 
 | |
|     # Based on suggestions from
 | |
|     # https://github.com/matrix-org/synapse/blob/develop/docs/turn-howto.md
 | |
|     # and
 | |
|     # https://www.foxypossibilities.com/2018/05/19/setting-up-a-turn-sever-for-matrix-on-nixos/
 | |
|     no-tcp-relay = true;
 | |
|     secure-stun = true;
 | |
|     extraConfig = ''
 | |
|       # Deny various local IP ranges, see
 | |
|       # https://www.rtcsec.com/article/cve-2020-26262-bypass-of-coturns-access-control-protection/
 | |
|       no-multicast-peers
 | |
|       denied-peer-ip=0.0.0.0-0.255.255.255
 | |
|       denied-peer-ip=10.0.0.0-10.255.255.255
 | |
|       denied-peer-ip=100.64.0.0-100.127.255.255
 | |
|       denied-peer-ip=127.0.0.0-127.255.255.255
 | |
|       denied-peer-ip=169.254.0.0-169.254.255.255
 | |
|       denied-peer-ip=172.16.0.0-172.31.255.255
 | |
|       denied-peer-ip=192.0.0.0-192.0.0.255
 | |
|       denied-peer-ip=192.0.2.0-192.0.2.255
 | |
|       denied-peer-ip=192.88.99.0-192.88.99.255
 | |
|       denied-peer-ip=192.168.0.0-192.168.255.255
 | |
|       denied-peer-ip=198.18.0.0-198.19.255.255
 | |
|       denied-peer-ip=198.51.100.0-198.51.100.255
 | |
|       denied-peer-ip=203.0.113.0-203.0.113.255
 | |
|       denied-peer-ip=240.0.0.0-255.255.255.255 denied-peer-ip=::1
 | |
|       denied-peer-ip=64:ff9b::-64:ff9b::ffff:ffff
 | |
|       denied-peer-ip=::ffff:0.0.0.0-::ffff:255.255.255.255
 | |
|       denied-peer-ip=100::-100::ffff:ffff:ffff:ffff
 | |
|       denied-peer-ip=2001::-2001:1ff:ffff:ffff:ffff:ffff:ffff:ffff
 | |
|       denied-peer-ip=2002::-2002:ffff:ffff:ffff:ffff:ffff:ffff:ffff
 | |
|       denied-peer-ip=fc00::-fdff:ffff:ffff:ffff:ffff:ffff:ffff:ffff
 | |
|       denied-peer-ip=fe80::-febf:ffff:ffff:ffff:ffff:ffff:ffff:ffff
 | |
| 
 | |
|       # *Allow* any IP addresses that we explicitly set as relay IPs
 | |
|       ${concatMapStringsSep "\n" (ip: "allowed-peer-ip=${ip}") config.services.coturn.relay-ips}
 | |
| 
 | |
|       # Various other security settings
 | |
|       no-tlsv1
 | |
|       no-tlsv1_1
 | |
|     '';
 | |
|   };
 | |
| 
 | |
|   services.nginx.virtualHosts."${domain}" = {
 | |
|     enableACME = true;
 | |
| 
 | |
|     listen = [
 | |
|       {
 | |
|         addr = "0.0.0.0";
 | |
|         port = 443;
 | |
|         ssl = true;
 | |
|       }
 | |
|       {
 | |
|         addr = "[::0]";
 | |
|         port = 443;
 | |
|         ssl = true;
 | |
|       }
 | |
|       {
 | |
|         addr = "0.0.0.0";
 | |
|         port = 8448;
 | |
|         ssl = true;
 | |
|       }
 | |
|       {
 | |
|         addr = "[::0]";
 | |
|         port = 8488;
 | |
|         ssl = true;
 | |
|       }
 | |
|     ];
 | |
| 
 | |
|     addSSL = true;
 | |
|     extraConfig = ''
 | |
|       merge_slashes off;
 | |
|     '';
 | |
| 
 | |
|     locations."/_matrix" = {
 | |
|       proxyPass = "http://${cfg.settings.global.address}:${toString cfg.settings.global.port}";
 | |
|       # Recommended by conduit
 | |
|       extraConfig = ''
 | |
|         proxy_buffering off;
 | |
|       '';
 | |
|     };
 | |
|   };
 | |
| }
 |