feat: foah ma ent
This commit is contained in:
parent
a02d6d7bba
commit
33b9d43254
3 changed files with 35 additions and 28 deletions
|
|
@ -14,12 +14,15 @@
|
||||||
return 200 '${builtins.toJSON data}';
|
return 200 '${builtins.toJSON data}';
|
||||||
'';
|
'';
|
||||||
turn = config.services.coturn;
|
turn = config.services.coturn;
|
||||||
mautrix_whatsapp_old = import (pkgs.fetchFromGitHub {
|
mautrix_whatsapp_old =
|
||||||
|
import (pkgs.fetchFromGitHub {
|
||||||
owner = "NixOS";
|
owner = "NixOS";
|
||||||
repo = "nixpkgs";
|
repo = "nixpkgs";
|
||||||
rev = "88e8a4036877dc2d328fd3e7cb4e732eb037e49c";
|
rev = "88e8a4036877dc2d328fd3e7cb4e732eb037e49c";
|
||||||
sha256 = "sha256-Rn+hvrEG0cK3pq9bGq0md0nDwOHR5p/awZeiQ12JDTs=";
|
sha256 = "sha256-Rn+hvrEG0cK3pq9bGq0md0nDwOHR5p/awZeiQ12JDTs=";
|
||||||
}) {};
|
}) {
|
||||||
|
inherit (pkgs) system;
|
||||||
|
};
|
||||||
in {
|
in {
|
||||||
age.secrets.matrix = {
|
age.secrets.matrix = {
|
||||||
file = ../../secrets/matrix.age;
|
file = ../../secrets/matrix.age;
|
||||||
|
|
@ -204,8 +207,8 @@ in {
|
||||||
settings.turn_user_lifetime = "1h";
|
settings.turn_user_lifetime = "1h";
|
||||||
};
|
};
|
||||||
|
|
||||||
# WARN: Remove once mautrix is updated
|
# WARN: Remove once mautrix whatsapp is updated
|
||||||
nixpkgs.config.permittedInsecurePackages = [
|
mautrix_whatsapp_old.config.permittedInsecurePackages = [
|
||||||
"olm-3.2.16"
|
"olm-3.2.16"
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -15,10 +15,14 @@
|
||||||
|
|
||||||
# 50202 LG Subbridge
|
# 50202 LG Subbridge
|
||||||
networking.firewall.allowedTCPPorts = [config.services.homebridge.settings.bridge.port 50202];
|
networking.firewall.allowedTCPPorts = [config.services.homebridge.settings.bridge.port 50202];
|
||||||
networking.firewall.allowedTCPPortRanges = [ {from = accessoryStart; to = accessoryEnd;} ];
|
networking.firewall.allowedTCPPortRanges = [
|
||||||
|
{
|
||||||
|
from = accessoryStart;
|
||||||
|
to = accessoryEnd;
|
||||||
|
}
|
||||||
|
];
|
||||||
networking.firewall.allowedUDPPorts = [5353]; # mDNS / Bonjour
|
networking.firewall.allowedUDPPorts = [5353]; # mDNS / Bonjour
|
||||||
|
|
||||||
|
|
||||||
services.caddy = {
|
services.caddy = {
|
||||||
enable = true;
|
enable = true;
|
||||||
virtualHosts."homebridge.saberofxebec".extraConfig = ''
|
virtualHosts."homebridge.saberofxebec".extraConfig = ''
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue