Home Explore Blog Models CI



nixpkgs

nixos/modules/services/networking/prosody.md
9f4eb71a3c222a9a903941d1a1de364bc78ca351c649e4c70000000300000ac1
# Prosody {#module-services-prosody}

[Prosody](https://prosody.im/) is an open-source, modern XMPP server.

## Basic usage {#module-services-prosody-basic-usage}

A common struggle for most XMPP newcomers is to find the right set
of XMPP Extensions (XEPs) to setup. Forget to activate a few of
those and your XMPP experience might turn into a nightmare!

The XMPP community tackles this problem by creating a meta-XEP
listing a decent set of XEPs you should implement. This meta-XEP
is issued every year, the 2020 edition being
[XEP-0423](https://xmpp.org/extensions/xep-0423.html).

The NixOS Prosody module will implement most of these recommendend XEPs out of
the box. That being said, two components still require some
manual configuration: the
[Multi User Chat (MUC)](https://xmpp.org/extensions/xep-0045.html)
and the [HTTP File Upload](https://xmpp.org/extensions/xep-0363.html) ones.
You'll need to create a DNS subdomain for each of those. The current convention is to name your
MUC endpoint `conference.example.org` and your HTTP upload domain `upload.example.org`.

A good configuration to start with, including a
[Multi User Chat (MUC)](https://xmpp.org/extensions/xep-0045.html)
endpoint as well as a [HTTP File Upload](https://xmpp.org/extensions/xep-0363.html)
endpoint will look like this:
```nix
{
  services.prosody = {
    enable = true;
    admins = [ "root@example.org" ];
    ssl.cert = "/var/lib/acme/example.org/fullchain.pem";
    ssl.key = "/var/lib/acme/example.org/key.pem";
    virtualHosts."example.org" = {
      enabled = true;
      domain = "example.org";
      ssl.cert = "/var/lib/acme/example.org/fullchain.pem";
      ssl.key = "/var/lib/acme/example.org/key.pem";
    };
    muc = [ { domain = "conference.example.org"; } ];
    uploadHttp = {
      domain = "upload.example.org";
    };
  };
}
```

## Let's Encrypt Configuration {#module-services-prosody-letsencrypt}

As you can see in the code snippet from the
[previous section](#module-services-prosody-basic-usage),
you'll need a single TLS certificate covering your main endpoint,
the MUC one as well as the HTTP Upload one. We can generate such a
certificate by leveraging the ACME
[extraDomainNames](#opt-security.acme.certs._name_.extraDomainNames) module option.

Provided the setup detailed in the previous section, you'll need the following acme configuration to generate
a TLS certificate for the three endponits:
```nix
{
  security.acme = {
    email = "root@example.org";
    acceptTerms = true;
    certs = {
      "example.org" = {
        webroot = "/var/www/example.org";
        email = "root@example.org";
        extraDomainNames = [
          "conference.example.org"
          "upload.example.org"
        ];
      };
    };
  };
}
```

Chunks
a9b86ba0 (1st chunk of `nixos/modules/services/networking/prosody.md`)
Title: Configuring Prosody XMPP Server and Let's Encrypt
Summary
This document outlines the basic usage and configuration of Prosody, an open-source XMPP server, within NixOS. It explains that while the NixOS Prosody module implements most recommended XMPP Extensions (XEPs) like XEP-0423 out-of-the-box, Multi User Chat (MUC) and HTTP File Upload components require manual setup, including dedicated DNS subdomains (e.g., `conference.example.org`, `upload.example.org`). A NixOS configuration snippet demonstrates how to enable Prosody, configure virtual hosts, MUC, and HTTP upload. Additionally, it details how to generate a single TLS certificate covering all necessary domains (main, MUC, and HTTP upload) using Let's Encrypt via the `security.acme.certs.<name>.extraDomainNames` option in NixOS.