wip: added configuration changes to tuwunel, livekit, lk-jwt-service

This commit is contained in:
2026-02-23 21:53:20 -05:00
parent aea71bb49b
commit f2ae159c67
3 changed files with 112 additions and 46 deletions

View File

@@ -3,19 +3,25 @@
pkgs,
userName,
...
}: {
}:let
livekitKeyFile = "/var/lib/livekit/livekit.key";
matrixRegistrationTokenFile = "/var/lib/matrix.key";
in {
imports = [
../../pwrMgmt
../../networking/core.nix
];
# Enable flakes for NixOS
nix.settings.experimental-features = ["nix-command" "flakes"];
nix.settings = {
download-buffer-size = 134217728; # 128 MiB in bytes
};
# Custom kernel/boot stuff
boot.kernelPackages = pkgs.linuxPackages_latest;
boot.loader.systemd-boot.enable = true; # TODO: check on this
boot.loader.efi.canTouchEfiVariables = true;
# boot.loader.systemd-boot.enable = true; # TODO: check on this
# boot.loader.efi.canTouchEfiVariables = true;
# Set your timezone
time.timeZone = "America/Detroit";
@@ -23,8 +29,8 @@
# Enable OpenSSH
services.openssh = {
enable = true;
PermitRootLogin = "no";
PasswordAuthentication = "no";
settings.PermitRootLogin = "no";
settings.PasswordAuthentication = false;
};
# Enable keyring
@@ -49,32 +55,34 @@
powertop.enable = false;
};
# Core networking module (see ../../networking/core.nix)
network = {
networkManager.enable = true;
};
# Firewall settings (fallback, upstream way of doing things)
networking.firewall = {
enable = true;
allowedTCPPorts = [
80
443
8448
3478
5349
7880
7881
8080
8081
];
allowedUDPPorts = [
3478
8448
];
allowedUDPPortRanges =[
{
# TURN UDP relays
{
from = 49000;
to = 50000;
}
#
{
from = 50100;
to = 50200;
@@ -109,17 +117,17 @@
package = pkgs.matrix-tuwunel;
settings = {
global = {
server_name = "wyattjmiller.com";
server_name = "chat.wyattjmiller.com";
allow_encryption = true;
allow_federation = true;
allow_registration = false;
allow_registration = true;
registration_token = matrixRegistrationTokenFile;
allow_unstable_room_versions = false;
allow_experimental_room_versions = false;
encryption_enabled_by_default_for_room_type = "all";
# encryption_enabled_by_default_for_room_type = false;
zstd_compression = true;
new_user_displayname_suffix = "";
max_request_size = 1048575600; # 100MB in bytes, for file uploads
database_path = "/var/lib/tuwunel";
database_backup_path = "/var/lib/tuwunel/database_backups";
database_backups_to_keep = 2;
@@ -133,22 +141,39 @@
client = "https://chat.wyattjmiller.com";
server = "chat.wyattjmiller.com:443";
support_email = "wyatt@wyattjmiller.com";
support_mxid = "@wymiller:wyattjmiller.com";
support_mxid = "@wymiller:chat.wyattjmiller.com";
rtc_transports = {
rtc_transports = [{
type = "livekit";
livekit_service_url = "https://rtc.wyattjmiller.com";
};
}];
};
};
};
};
# TURN/STUN server
services.coturn = {
enable = true;
no-cli = false;
no-tcp-relay = false;
realm = "turn.wyattjmiller.com";
min-port = 49000;
max-port = 50000;
# TODO: fill out this extraConfig option a bit more with denial of private IP addresses
extraConfig = ''
verbose
no-multicast-peers
'';
};
# LiveKit (Matrix RTC)
services.livekit = {
enable = true;
package = pkgs.livekit;
openFirewall = true;
keyFile = livekitKeyFile;
settings = {
port = 7880;
room.auto_create = true;
@@ -169,7 +194,7 @@
reverse_proxy localhost:8008
'';
};
"chat.wyattjmiller.com:8443" = {
"chat.wyattjmiller.com:8448" = {
extraConfig = ''
encode zstd gzip
reverse_proxy localhost:8008
@@ -196,20 +221,40 @@
};
};
# TURN/STUN server
services.coturn = {
# LiveKit JWT service
services.lk-jwt-service = {
enable = true;
no-cli = false;
no-tcp-relay = false;
realm = "turn.wyattjmiller.com";
min-port = 49000;
max-port = 50000;
port = 8080;
livekitUrl = "wss://rtc.wyattjmiller.com";
keyFile = livekitKeyFile;
# settings = {
# keys = {
# "2rew2444" = "aAssWw18asef3fa5ldehHhjunlijj8x=";
# };
# };
};
# TODO: fill out this extraConfig option a bit more with denial of private IP addresses
extraConfig = ''
verbose
no-multicast-peers
# Generate LiveKit key if it doesn't exist
systemd.services.livekit-key = {
before = [
"lk-jwt-service.service"
"livekit.service"
];
wantedBy = [ "multi-user.target" ];
path = with pkgs; [
livekit
coreutils
gawk
];
script = ''
echo "Key missing, generating key"
echo "lk-jwt-service: $(livekit-server generate-keys | tail -1 | awk '{print $3}')" > "${livekitKeyFile}"
'';
serviceConfig = {
Type = "oneshot";
User = "root";
};
unitConfig.ConditionPathExists = "!${livekitKeyFile}";
};
system.stateVersion = "25.11";