feat: foah ma ent

This commit is contained in:
s-prechtl 2025-12-10 14:20:39 +01:00
parent a02d6d7bba
commit 33b9d43254
3 changed files with 35 additions and 28 deletions

View file

@ -14,12 +14,15 @@
return 200 '${builtins.toJSON data}';
'';
turn = config.services.coturn;
mautrix_whatsapp_old = import (pkgs.fetchFromGitHub {
owner = "NixOS";
repo = "nixpkgs";
rev = "88e8a4036877dc2d328fd3e7cb4e732eb037e49c";
sha256 = "sha256-Rn+hvrEG0cK3pq9bGq0md0nDwOHR5p/awZeiQ12JDTs=";
}) {};
mautrix_whatsapp_old =
import (pkgs.fetchFromGitHub {
owner = "NixOS";
repo = "nixpkgs";
rev = "88e8a4036877dc2d328fd3e7cb4e732eb037e49c";
sha256 = "sha256-Rn+hvrEG0cK3pq9bGq0md0nDwOHR5p/awZeiQ12JDTs=";
}) {
inherit (pkgs) system;
};
in {
age.secrets.matrix = {
file = ../../secrets/matrix.age;
@ -204,8 +207,8 @@ in {
settings.turn_user_lifetime = "1h";
};
# WARN: Remove once mautrix is updated
nixpkgs.config.permittedInsecurePackages = [
# WARN: Remove once mautrix whatsapp is updated
mautrix_whatsapp_old.config.permittedInsecurePackages = [
"olm-3.2.16"
];

View file

@ -281,10 +281,10 @@ in {
'';
virtualHosts."jellyseer.saberofxebec" = {
extraConfig = ''
reverse_proxy :5055
tls internal
reverse_proxy :5055
tls internal
'';
serverAliases = [ "jellyseerr.saberofxebec" ];
serverAliases = ["jellyseerr.saberofxebec"];
};
virtualHosts."homarr.saberofxebec".extraConfig = ''
reverse_proxy :7575

View file

@ -1,7 +1,7 @@
{config, ...}: let
accessoryStart = 20000;
accessoryEnd = 20200;
in {
in {
services.homebridge = {
enable = true;
openFirewall = true;
@ -14,10 +14,14 @@
};
# 50202 LG Subbridge
networking.firewall.allowedTCPPorts = [ config.services.homebridge.settings.bridge.port 50202 ];
networking.firewall.allowedTCPPortRanges = [ {from = accessoryStart; to = accessoryEnd;} ];
networking.firewall.allowedUDPPorts = [ 5353 ]; # mDNS / Bonjour
networking.firewall.allowedTCPPorts = [config.services.homebridge.settings.bridge.port 50202];
networking.firewall.allowedTCPPortRanges = [
{
from = accessoryStart;
to = accessoryEnd;
}
];
networking.firewall.allowedUDPPorts = [5353]; # mDNS / Bonjour
services.caddy = {
enable = true;
@ -28,18 +32,18 @@
};
security.sudo = {
enable = true;
enable = true;
extraRules = [
{
users = [ "homebridge" ];
commands = [
{
command = "ALL";
options = [ "NOPASSWD" ];
}
];
}
];
extraRules = [
{
users = ["homebridge"];
commands = [
{
command = "ALL";
options = ["NOPASSWD"];
}
];
}
];
};
}