Increase nginx and synapse file size limit
This commit is contained in:
parent
450ea4e1c3
commit
767d6c9a51
3
.gitignore
vendored
3
.gitignore
vendored
|
@ -1 +1,2 @@
|
||||||
/result
|
/unstable/result
|
||||||
|
/stable/result
|
||||||
|
|
|
@ -9,6 +9,9 @@
|
||||||
recommendedProxySettings = true;
|
recommendedProxySettings = true;
|
||||||
recommendedTlsSettings = true;
|
recommendedTlsSettings = true;
|
||||||
|
|
||||||
|
# 100 MB max upload
|
||||||
|
clientMaxBodySize = "100m";
|
||||||
|
|
||||||
# Only allow PFS-enabled ciphers with AES256
|
# Only allow PFS-enabled ciphers with AES256
|
||||||
sslCiphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384";
|
sslCiphers = "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384";
|
||||||
|
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
enable_registration = false;
|
enable_registration = false;
|
||||||
registration_shared_secret = builtins.toString config.secrets.files.synapse_registration_shared_secret.file;
|
registration_shared_secret = builtins.toString config.secrets.files.synapse_registration_shared_secret.file;
|
||||||
turn_shared_secret = builtins.toString config.secrets.files.turn_shared_secret.file;
|
turn_shared_secret = builtins.toString config.secrets.files.turn_shared_secret.file;
|
||||||
max_upload_size = "20M";
|
max_upload_size = "100M";
|
||||||
database_type = "psycopg2";
|
database_type = "psycopg2";
|
||||||
database_user = "synapse";
|
database_user = "synapse";
|
||||||
database_name = "synapse";
|
database_name = "synapse";
|
||||||
|
|
|
@ -17,22 +17,22 @@
|
||||||
"homepage": "",
|
"homepage": "",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixos-hardware",
|
"repo": "nixos-hardware",
|
||||||
"rev": "08cda8e3a5a4e685af525e5a589dfeb74267d505",
|
"rev": "4c9f07277bd4bc29a051ff2a0ca58c6403e3881a",
|
||||||
"sha256": "0bf3mbss7c3lyf5h8g1vwjbs0cg4h0c8ixbaz1kv24ahyy8n61y3",
|
"sha256": "0kz99f42173dh6sa7vw31vr4w348whmbv5n8yfylcjk6widhsslj",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/NixOS/nixos-hardware/archive/08cda8e3a5a4e685af525e5a589dfeb74267d505.tar.gz",
|
"url": "https://github.com/NixOS/nixos-hardware/archive/4c9f07277bd4bc29a051ff2a0ca58c6403e3881a.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"branch": "nixos-unstable-small",
|
"branch": "21.11",
|
||||||
"description": "Nix Packages collection",
|
"description": "Nix Packages collection",
|
||||||
"homepage": "",
|
"homepage": "",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "db22325869a05e376dbab1c31ea7664dd5fcf860",
|
"rev": "a7ecde854aee5c4c7cd6177f54a99d2c1ff28a31",
|
||||||
"sha256": "0pihqkl1c5bmb62657r38irvacav51ab0r4vfa2wn027ch1ry29m",
|
"sha256": "162dywda2dvfj1248afxc45kcrg83appjd0nmdb541hl7rnncf02",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/NixOS/nixpkgs/archive/db22325869a05e376dbab1c31ea7664dd5fcf860.tar.gz",
|
"url": "https://github.com/NixOS/nixpkgs/archive/a7ecde854aee5c4c7cd6177f54a99d2c1ff28a31.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
},
|
},
|
||||||
"nixus": {
|
"nixus": {
|
||||||
|
|
Binary file not shown.
Loading…
Reference in a new issue