summary refs log tree commit diff
path: root/nixos/modules/services/matrix/synapse.xml
blob: 822f2c324ad9f4ae5d25070a27ff951449cc0a1f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
<chapter xmlns="http://docbook.org/ns/docbook" xmlns:xlink="http://www.w3.org/1999/xlink" xml:id="module-services-matrix">
  <title>Matrix</title>
  <para>
    <link xlink:href="https://matrix.org/">Matrix</link> is an open
    standard for interoperable, decentralised, real-time communication
    over IP. It can be used to power Instant Messaging, VoIP/WebRTC
    signalling, Internet of Things communication - or anywhere you need
    a standard HTTP API for publishing and subscribing to data whilst
    tracking the conversation history.
  </para>
  <para>
    This chapter will show you how to set up your own, self-hosted
    Matrix homeserver using the Synapse reference homeserver, and how to
    serve your own copy of the Element web client. See the
    <link xlink:href="https://matrix.org/docs/projects/try-matrix-now.html">Try
    Matrix Now!</link> overview page for links to Element Apps for
    Android and iOS, desktop clients, as well as bridges to other
    networks and other projects around Matrix.
  </para>
  <section xml:id="module-services-matrix-synapse">
    <title>Synapse Homeserver</title>
    <para>
      <link xlink:href="https://github.com/matrix-org/synapse">Synapse</link>
      is the reference homeserver implementation of Matrix from the core
      development team at matrix.org. The following configuration
      example will set up a synapse server for the
      <literal>example.org</literal> domain, served from the host
      <literal>myhostname.example.org</literal>. For more information,
      please refer to the
      <link xlink:href="https://matrix-org.github.io/synapse/latest/setup/installation.html">installation
      instructions of Synapse</link> .
    </para>
    <programlisting>
{ pkgs, lib, config, ... }:
let
  fqdn = &quot;${config.networking.hostName}.${config.networking.domain}&quot;;
  clientConfig = {
    &quot;m.homeserver&quot;.base_url = &quot;https://${fqdn}&quot;;
    &quot;m.identity_server&quot; = {};
  };
  serverConfig.&quot;m.server&quot; = &quot;${config.services.matrix-synapse.settings.server_name}:443&quot;;
  mkWellKnown = data: ''
    add_header Content-Type application/json;
    add_header Access-Control-Allow-Origin *;
    return 200 '${builtins.toJSON data}';
  '';
in {
  networking.hostName = &quot;myhostname&quot;;
  networking.domain = &quot;example.org&quot;;
  networking.firewall.allowedTCPPorts = [ 80 443 ];

  services.postgresql.enable = true;
  services.postgresql.initialScript = pkgs.writeText &quot;synapse-init.sql&quot; ''
    CREATE ROLE &quot;matrix-synapse&quot; WITH LOGIN PASSWORD 'synapse';
    CREATE DATABASE &quot;matrix-synapse&quot; WITH OWNER &quot;matrix-synapse&quot;
      TEMPLATE template0
      LC_COLLATE = &quot;C&quot;
      LC_CTYPE = &quot;C&quot;;
  '';

  services.nginx = {
    enable = true;
    recommendedTlsSettings = true;
    recommendedOptimisation = true;
    recommendedGzipSettings = true;
    recommendedProxySettings = true;
    virtualHosts = {
      # If the A and AAAA DNS records on example.org do not point on the same host as the
      # records for myhostname.example.org, you can easily move the /.well-known
      # virtualHost section of the code to the host that is serving example.org, while
      # the rest stays on myhostname.example.org with no other changes required.
      # This pattern also allows to seamlessly move the homeserver from
      # myhostname.example.org to myotherhost.example.org by only changing the
      # /.well-known redirection target.
      &quot;${config.networking.domain}&quot; = {
        enableACME = true;
        forceSSL = true;
        # This section is not needed if the server_name of matrix-synapse is equal to
        # the domain (i.e. example.org from @foo:example.org) and the federation port
        # is 8448.
        # Further reference can be found in the docs about delegation under
        # https://matrix-org.github.io/synapse/latest/delegate.html
        locations.&quot;= /.well-known/matrix/server&quot;.extraConfig = mkWellKnown serverConfig;
        # This is usually needed for homeserver discovery (from e.g. other Matrix clients).
        # Further reference can be found in the upstream docs at
        # https://spec.matrix.org/latest/client-server-api/#getwell-knownmatrixclient
        locations.&quot;= /.well-known/matrix/client&quot;.extraConfig = mkWellKnown clientConfig;
      };
      &quot;${fqdn}&quot; = {
        enableACME = true;
        forceSSL = true;
        # It's also possible to do a redirect here or something else, this vhost is not
        # needed for Matrix. It's recommended though to *not put* element
        # here, see also the section about Element.
        locations.&quot;/&quot;.extraConfig = ''
          return 404;
        '';
        # Forward all Matrix API calls to the synapse Matrix homeserver. A trailing slash
        # *must not* be used here.
        locations.&quot;/_matrix&quot;.proxyPass = &quot;http://[::1]:8008&quot;;
        # Forward requests for e.g. SSO and password-resets.
        locations.&quot;/_synapse/client&quot;.proxyPass = &quot;http://[::1]:8008&quot;;
      };
    };
  };

  services.matrix-synapse = {
    enable = true;
    settings.server_name = config.networking.domain;
    settings.listeners = [
      { port = 8008;
        bind_addresses = [ &quot;::1&quot; ];
        type = &quot;http&quot;;
        tls = false;
        x_forwarded = true;
        resources = [ {
          names = [ &quot;client&quot; &quot;federation&quot; ];
          compress = true;
        } ];
      }
    ];
  };
}
</programlisting>
  </section>
  <section xml:id="module-services-matrix-register-users">
    <title>Registering Matrix users</title>
    <para>
      If you want to run a server with public registration by anybody,
      you can then enable
      <literal>services.matrix-synapse.settings.enable_registration = true;</literal>.
      Otherwise, or you can generate a registration secret with
      <command>pwgen -s 64 1</command> and set it with
      <xref linkend="opt-services.matrix-synapse.settings.registration_shared_secret"></xref>.
      To create a new user or admin, run the following after you have
      set the secret and have rebuilt NixOS:
    </para>
    <programlisting>
$ nix-shell -p matrix-synapse
$ register_new_matrix_user -k your-registration-shared-secret http://localhost:8008
New user localpart: your-username
Password:
Confirm password:
Make admin [no]:
Success!
</programlisting>
    <para>
      In the example, this would create a user with the Matrix
      Identifier <literal>@your-username:example.org</literal>.
    </para>
    <warning>
      <para>
        When using
        <xref linkend="opt-services.matrix-synapse.settings.registration_shared_secret"></xref>,
        the secret will end up in the world-readable store. Instead it’s
        recommended to deploy the secret in an additional file like
        this:
      </para>
      <itemizedlist>
        <listitem>
          <para>
            Create a file with the following contents:
          </para>
          <programlisting>
registration_shared_secret: your-very-secret-secret
</programlisting>
        </listitem>
        <listitem>
          <para>
            Deploy the file with a secret-manager such as
            <link xlink:href="https://nixops.readthedocs.io/en/latest/overview.html#managing-keys"><option>deployment.keys</option></link>
            from
            <citerefentry><refentrytitle>nixops</refentrytitle><manvolnum>1</manvolnum></citerefentry>
            or
            <link xlink:href="https://github.com/Mic92/sops-nix/">sops-nix</link>
            to
            e.g. <filename>/run/secrets/matrix-shared-secret</filename>
            and ensure that it’s readable by
            <literal>matrix-synapse</literal>.
          </para>
        </listitem>
        <listitem>
          <para>
            Include the file like this in your configuration:
          </para>
          <programlisting>
{
  services.matrix-synapse.extraConfigFiles = [
    &quot;/run/secrets/matrix-shared-secret&quot;
  ];
}
</programlisting>
        </listitem>
      </itemizedlist>
    </warning>
    <note>
      <para>
        It’s also possible to user alternative authentication mechanism
        such as
        <link xlink:href="https://github.com/matrix-org/matrix-synapse-ldap3">LDAP
        (via <literal>matrix-synapse-ldap3</literal>)</link> or
        <link xlink:href="https://matrix-org.github.io/synapse/latest/openid.html">OpenID</link>.
      </para>
    </note>
  </section>
  <section xml:id="module-services-matrix-element-web">
    <title>Element (formerly known as Riot) Web Client</title>
    <para>
      <link xlink:href="https://github.com/vector-im/riot-web/">Element
      Web</link> is the reference web client for Matrix and developed by
      the core team at matrix.org. Element was formerly known as
      Riot.im, see the
      <link xlink:href="https://element.io/blog/welcome-to-element/">Element
      introductory blog post</link> for more information. The following
      snippet can be optionally added to the code before to complete the
      synapse installation with a web client served at
      <literal>https://element.myhostname.example.org</literal> and
      <literal>https://element.example.org</literal>. Alternatively, you
      can use the hosted copy at
      <link xlink:href="https://app.element.io/" role="uri">https://app.element.io/</link>,
      or use other web clients or native client applications. Due to the
      <literal>/.well-known</literal> urls set up done above, many
      clients should fill in the required connection details
      automatically when you enter your Matrix Identifier. See
      <link xlink:href="https://matrix.org/docs/projects/try-matrix-now.html">Try
      Matrix Now!</link> for a list of existing clients and their
      supported featureset.
    </para>
    <programlisting>
{
  services.nginx.virtualHosts.&quot;element.${fqdn}&quot; = {
    enableACME = true;
    forceSSL = true;
    serverAliases = [
      &quot;element.${config.networking.domain}&quot;
    ];

    root = pkgs.element-web.override {
      conf = {
        default_server_config = clientConfig; # see `clientConfig` from the snippet above.
      };
    };
  };
}
</programlisting>
    <note>
      <para>
        The Element developers do not recommend running Element and your
        Matrix homeserver on the same fully-qualified domain name for
        security reasons. In the example, this means that you should not
        reuse the <literal>myhostname.example.org</literal> virtualHost
        to also serve Element, but instead serve it on a different
        subdomain, like <literal>element.example.org</literal> in the
        example. See the
        <link xlink:href="https://github.com/vector-im/element-web/tree/v1.10.0#important-security-notes">Element
        Important Security Notes</link> for more information on this
        subject.
      </para>
    </note>
  </section>
</chapter>