diff --git a/hosts/parsons/configuration.nix b/hosts/parsons/configuration.nix index 738b83d..f44568c 100644 --- a/hosts/parsons/configuration.nix +++ b/hosts/parsons/configuration.nix @@ -21,7 +21,6 @@ ../../services/lantifa.nix ../../services/vaultwarden.nix ../../services/uffd.nix - # ../../services/workadventure.nix ./lxc.nix ]; diff --git a/nix/sources.json b/nix/sources.json index cbc976c..ef4a8b4 100644 --- a/nix/sources.json +++ b/nix/sources.json @@ -1,10 +1,4 @@ { - "haccmap": { - "branch": "master", - "repo": "https://gitlab.infra4future.de/hacc/haccspace-rc3-map", - "rev": "9490ebf656ef379e51cb518ec0038e15d6aeaac6", - "type": "git" - }, "home-manager": { "branch": "release-21.11", "description": "Manage a user environment using Nix [maintainer=@rycee] ", @@ -92,11 +86,5 @@ "type": "tarball", "url": "https://github.com/nixos/nixpkgs/archive/ae1dc133ea5f1538d035af41e5ddbc2ebcb67b90.tar.gz", "url_template": "https://github.com///archive/.tar.gz" - }, - "workadventure": { - "branch": "master", - "repo": "https://stuebinm.eu/git/workadventure-nix", - "rev": "8db4bbc5eccaac218c68fb0853f1972dadd7a40c", - "type": "git" } } diff --git a/services/workadventure.nix b/services/workadventure.nix deleted file mode 100644 index 76bf9b9..0000000 --- a/services/workadventure.nix +++ /dev/null @@ -1,87 +0,0 @@ -{ config, lib, pkgs, modules, profiles, evalConfig, sources, ... }: -let - wapkgs = "${sources.workadventure}/wapkgs.nix"; -in -{ - services.coturn = { - enable = true; - realm = "void.hacc.space"; - no-cli = true; - lt-cred-mech = true; - - extraConfig = '' - user=turn:a4c9ad080dc51146611eabd15a27b07fc92850a9ae90c53e7745fce6c5a2c457 - fingerprint - external-ip=135.181.215.233 - server-name=void.hacc.space - prometheus - ''; - - cert = config.security.acme.certs."void.hacc.space".directory + "full.pem"; - pkey = config.security.acme.certs."void.hacc.space".directory + "key.pem"; - }; - - networking.firewall = with config.services.coturn; - let - ports = [ listening-port tls-listening-port ]; - in { - allowedTCPPorts = ports ++ [ 9641 ]; # 9641 is the port for the prometheus endpoint - allowedUDPPorts = ports; - allowedUDPPortRanges = [ - { from = min-port; to = max-port; } - ]; - }; - - - services.nginx.virtualHosts."void.hacc.space" = { - locations."/" = { - proxyPass = "http://192.168.150.3"; - proxyWebsockets = true; - }; - enableACME = true; - forceSSL = true; - }; - - containers.wa-void = { - - autoStart = true; - privateNetwork = true; - hostAddress = "192.168.150.1"; - localAddress = "192.168.150.3"; - - - path = (evalConfig {hosts = {}; groups = {};} ({ config, lib, pkgs, profiles, modules, sources, ... }: { - boot.isContainer = true; - networking.useDHCP = false; - users.users.root.hashedPassword = ""; - - imports = [ - "${sources.workadventure.outPath}/default.nix" - ((import sources.nix-hexchen) {}).profiles.nopersist - ]; - - services.workadventure."void" = { - - packageset = (import wapkgs {inherit pkgs;}).workadventure-xce; - - nginx = { - default = true; - domain = "https://void.hacc.space"; - maps.path = "${sources.haccmap.outPath}/"; - maps.serve = true; - }; - - frontend.startRoomUrl = "/_/global/void.hacc.space/maps/main.json"; - commonConfig = { - webrtc.stun.url = "stun:void.hacc.space:3478"; - webrtc.turn = { - url = "turn:135.181.215.233"; - user = "turn"; - password = "a4c9ad080dc51146611eabd15a27b07fc92850a9ae90c53e7745fce6c5a2c457"; - }; - jitsi.url = "meet.ffmuc.net"; - }; - }; - })).config.system.build.toplevel; - }; -}