summaryrefslogtreecommitdiff
path: root/Omni/Cloud/Comms
diff options
context:
space:
mode:
Diffstat (limited to 'Omni/Cloud/Comms')
-rw-r--r--Omni/Cloud/Comms/Coturn.nix4
-rw-r--r--Omni/Cloud/Comms/Jitsi.nix4
-rw-r--r--Omni/Cloud/Comms/Mumble.nix8
-rw-r--r--Omni/Cloud/Comms/Xmpp.nix14
4 files changed, 15 insertions, 15 deletions
diff --git a/Omni/Cloud/Comms/Coturn.nix b/Omni/Cloud/Comms/Coturn.nix
index 93093f0..485ec66 100644
--- a/Omni/Cloud/Comms/Coturn.nix
+++ b/Omni/Cloud/Comms/Coturn.nix
@@ -1,6 +1,4 @@
-{ config, ... }:
-
-{
+{config, ...}: {
services.coturn = {
enable = true;
cert = "/var/lib/acme/${config.networking.domain}/fullchain.pem";
diff --git a/Omni/Cloud/Comms/Jitsi.nix b/Omni/Cloud/Comms/Jitsi.nix
index 17aeced..23bfc28 100644
--- a/Omni/Cloud/Comms/Jitsi.nix
+++ b/Omni/Cloud/Comms/Jitsi.nix
@@ -1,6 +1,4 @@
-{ config, ... }:
-
-{
+{config, ...}: {
services.jitsi-meet = {
enable = true;
config = {
diff --git a/Omni/Cloud/Comms/Mumble.nix b/Omni/Cloud/Comms/Mumble.nix
index 66d21a5..db332ce 100644
--- a/Omni/Cloud/Comms/Mumble.nix
+++ b/Omni/Cloud/Comms/Mumble.nix
@@ -1,7 +1,7 @@
-{ config, ... }:
-
+{config, ...}:
# mumble and related services
-let ports = import ../Ports.nix;
+let
+ ports = import ../Ports.nix;
in {
services.murmur = {
enable = true;
@@ -19,7 +19,7 @@ in {
listening_addr = "127.0.0.1";
listening_port = ports.botamusique;
};
- radio = { lofi = "https://live.hunter.fm/lofi_high"; };
+ radio = {lofi = "https://live.hunter.fm/lofi_high";};
};
};
}
diff --git a/Omni/Cloud/Comms/Xmpp.nix b/Omni/Cloud/Comms/Xmpp.nix
index ad8649b..5a8264b 100644
--- a/Omni/Cloud/Comms/Xmpp.nix
+++ b/Omni/Cloud/Comms/Xmpp.nix
@@ -1,4 +1,8 @@
-{ config, pkgs, ... }:
+{
+ config,
+ pkgs,
+ ...
+}:
#
# xmpp chat service
#
@@ -23,12 +27,12 @@ in {
services.prosody = {
enable = true;
package =
- pkgs.prosody.override { withCommunityModules = [ "conversejs" ]; };
+ pkgs.prosody.override {withCommunityModules = ["conversejs"];};
# when i learn how to use security.acme better, and use separate certs, then i
# can fix this group
group = "nginx";
- admins = [ "bsima@${rootDomain}" ];
+ admins = ["bsima@${rootDomain}"];
allowRegistration = true;
inherit ssl;
uploadHttp = {
@@ -126,7 +130,7 @@ in {
};
};
- services.prosody-filer = { enable = true; };
+ services.prosody-filer = {enable = true;};
services.nginx.virtualHosts."${rootDomain}".locations = {
"/http-bind" = {
@@ -186,7 +190,7 @@ in {
};
};
- users.users.nginx.extraGroups = [ "prosody" ];
+ users.users.nginx.extraGroups = ["prosody"];
security.acme.certs.${rootDomain}.extraDomainNames = [
# these stopped working idk why