forked from hacc/haccfiles
remove workadventure
This commit is contained in:
parent
052e1ac126
commit
cde949ac5b
3 changed files with 0 additions and 100 deletions
|
@ -21,7 +21,6 @@
|
|||
../../services/lantifa.nix
|
||||
../../services/vaultwarden.nix
|
||||
../../services/uffd.nix
|
||||
# ../../services/workadventure.nix
|
||||
|
||||
./lxc.nix
|
||||
];
|
||||
|
|
|
@ -1,10 +1,4 @@
|
|||
{
|
||||
"haccmap": {
|
||||
"branch": "master",
|
||||
"repo": "https://gitlab.infra4future.de/hacc/haccspace-rc3-map",
|
||||
"rev": "9490ebf656ef379e51cb518ec0038e15d6aeaac6",
|
||||
"type": "git"
|
||||
},
|
||||
"home-manager": {
|
||||
"branch": "release-21.11",
|
||||
"description": "Manage a user environment using Nix [maintainer=@rycee] ",
|
||||
|
@ -92,11 +86,5 @@
|
|||
"type": "tarball",
|
||||
"url": "https://github.com/nixos/nixpkgs/archive/ae1dc133ea5f1538d035af41e5ddbc2ebcb67b90.tar.gz",
|
||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||
},
|
||||
"workadventure": {
|
||||
"branch": "master",
|
||||
"repo": "https://stuebinm.eu/git/workadventure-nix",
|
||||
"rev": "8db4bbc5eccaac218c68fb0853f1972dadd7a40c",
|
||||
"type": "git"
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1,87 +0,0 @@
|
|||
{ config, lib, pkgs, modules, profiles, evalConfig, sources, ... }:
|
||||
let
|
||||
wapkgs = "${sources.workadventure}/wapkgs.nix";
|
||||
in
|
||||
{
|
||||
services.coturn = {
|
||||
enable = true;
|
||||
realm = "void.hacc.space";
|
||||
no-cli = true;
|
||||
lt-cred-mech = true;
|
||||
|
||||
extraConfig = ''
|
||||
user=turn:a4c9ad080dc51146611eabd15a27b07fc92850a9ae90c53e7745fce6c5a2c457
|
||||
fingerprint
|
||||
external-ip=135.181.215.233
|
||||
server-name=void.hacc.space
|
||||
prometheus
|
||||
'';
|
||||
|
||||
cert = config.security.acme.certs."void.hacc.space".directory + "full.pem";
|
||||
pkey = config.security.acme.certs."void.hacc.space".directory + "key.pem";
|
||||
};
|
||||
|
||||
networking.firewall = with config.services.coturn;
|
||||
let
|
||||
ports = [ listening-port tls-listening-port ];
|
||||
in {
|
||||
allowedTCPPorts = ports ++ [ 9641 ]; # 9641 is the port for the prometheus endpoint
|
||||
allowedUDPPorts = ports;
|
||||
allowedUDPPortRanges = [
|
||||
{ from = min-port; to = max-port; }
|
||||
];
|
||||
};
|
||||
|
||||
|
||||
services.nginx.virtualHosts."void.hacc.space" = {
|
||||
locations."/" = {
|
||||
proxyPass = "http://192.168.150.3";
|
||||
proxyWebsockets = true;
|
||||
};
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
};
|
||||
|
||||
containers.wa-void = {
|
||||
|
||||
autoStart = true;
|
||||
privateNetwork = true;
|
||||
hostAddress = "192.168.150.1";
|
||||
localAddress = "192.168.150.3";
|
||||
|
||||
|
||||
path = (evalConfig {hosts = {}; groups = {};} ({ config, lib, pkgs, profiles, modules, sources, ... }: {
|
||||
boot.isContainer = true;
|
||||
networking.useDHCP = false;
|
||||
users.users.root.hashedPassword = "";
|
||||
|
||||
imports = [
|
||||
"${sources.workadventure.outPath}/default.nix"
|
||||
((import sources.nix-hexchen) {}).profiles.nopersist
|
||||
];
|
||||
|
||||
services.workadventure."void" = {
|
||||
|
||||
packageset = (import wapkgs {inherit pkgs;}).workadventure-xce;
|
||||
|
||||
nginx = {
|
||||
default = true;
|
||||
domain = "https://void.hacc.space";
|
||||
maps.path = "${sources.haccmap.outPath}/";
|
||||
maps.serve = true;
|
||||
};
|
||||
|
||||
frontend.startRoomUrl = "/_/global/void.hacc.space/maps/main.json";
|
||||
commonConfig = {
|
||||
webrtc.stun.url = "stun:void.hacc.space:3478";
|
||||
webrtc.turn = {
|
||||
url = "turn:135.181.215.233";
|
||||
user = "turn";
|
||||
password = "a4c9ad080dc51146611eabd15a27b07fc92850a9ae90c53e7745fce6c5a2c457";
|
||||
};
|
||||
jitsi.url = "meet.ffmuc.net";
|
||||
};
|
||||
};
|
||||
})).config.system.build.toplevel;
|
||||
};
|
||||
}
|
Loading…
Reference in a new issue