forked from hacc/haccfiles
remove workadventure
This commit is contained in:
parent
052e1ac126
commit
cde949ac5b
3 changed files with 0 additions and 100 deletions
|
@ -21,7 +21,6 @@
|
||||||
../../services/lantifa.nix
|
../../services/lantifa.nix
|
||||||
../../services/vaultwarden.nix
|
../../services/vaultwarden.nix
|
||||||
../../services/uffd.nix
|
../../services/uffd.nix
|
||||||
# ../../services/workadventure.nix
|
|
||||||
|
|
||||||
./lxc.nix
|
./lxc.nix
|
||||||
];
|
];
|
||||||
|
|
|
@ -1,10 +1,4 @@
|
||||||
{
|
{
|
||||||
"haccmap": {
|
|
||||||
"branch": "master",
|
|
||||||
"repo": "https://gitlab.infra4future.de/hacc/haccspace-rc3-map",
|
|
||||||
"rev": "9490ebf656ef379e51cb518ec0038e15d6aeaac6",
|
|
||||||
"type": "git"
|
|
||||||
},
|
|
||||||
"home-manager": {
|
"home-manager": {
|
||||||
"branch": "release-21.11",
|
"branch": "release-21.11",
|
||||||
"description": "Manage a user environment using Nix [maintainer=@rycee] ",
|
"description": "Manage a user environment using Nix [maintainer=@rycee] ",
|
||||||
|
@ -92,11 +86,5 @@
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://github.com/nixos/nixpkgs/archive/ae1dc133ea5f1538d035af41e5ddbc2ebcb67b90.tar.gz",
|
"url": "https://github.com/nixos/nixpkgs/archive/ae1dc133ea5f1538d035af41e5ddbc2ebcb67b90.tar.gz",
|
||||||
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
"url_template": "https://github.com/<owner>/<repo>/archive/<rev>.tar.gz"
|
||||||
},
|
|
||||||
"workadventure": {
|
|
||||||
"branch": "master",
|
|
||||||
"repo": "https://stuebinm.eu/git/workadventure-nix",
|
|
||||||
"rev": "8db4bbc5eccaac218c68fb0853f1972dadd7a40c",
|
|
||||||
"type": "git"
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,87 +0,0 @@
|
||||||
{ config, lib, pkgs, modules, profiles, evalConfig, sources, ... }:
|
|
||||||
let
|
|
||||||
wapkgs = "${sources.workadventure}/wapkgs.nix";
|
|
||||||
in
|
|
||||||
{
|
|
||||||
services.coturn = {
|
|
||||||
enable = true;
|
|
||||||
realm = "void.hacc.space";
|
|
||||||
no-cli = true;
|
|
||||||
lt-cred-mech = true;
|
|
||||||
|
|
||||||
extraConfig = ''
|
|
||||||
user=turn:a4c9ad080dc51146611eabd15a27b07fc92850a9ae90c53e7745fce6c5a2c457
|
|
||||||
fingerprint
|
|
||||||
external-ip=135.181.215.233
|
|
||||||
server-name=void.hacc.space
|
|
||||||
prometheus
|
|
||||||
'';
|
|
||||||
|
|
||||||
cert = config.security.acme.certs."void.hacc.space".directory + "full.pem";
|
|
||||||
pkey = config.security.acme.certs."void.hacc.space".directory + "key.pem";
|
|
||||||
};
|
|
||||||
|
|
||||||
networking.firewall = with config.services.coturn;
|
|
||||||
let
|
|
||||||
ports = [ listening-port tls-listening-port ];
|
|
||||||
in {
|
|
||||||
allowedTCPPorts = ports ++ [ 9641 ]; # 9641 is the port for the prometheus endpoint
|
|
||||||
allowedUDPPorts = ports;
|
|
||||||
allowedUDPPortRanges = [
|
|
||||||
{ from = min-port; to = max-port; }
|
|
||||||
];
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."void.hacc.space" = {
|
|
||||||
locations."/" = {
|
|
||||||
proxyPass = "http://192.168.150.3";
|
|
||||||
proxyWebsockets = true;
|
|
||||||
};
|
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
containers.wa-void = {
|
|
||||||
|
|
||||||
autoStart = true;
|
|
||||||
privateNetwork = true;
|
|
||||||
hostAddress = "192.168.150.1";
|
|
||||||
localAddress = "192.168.150.3";
|
|
||||||
|
|
||||||
|
|
||||||
path = (evalConfig {hosts = {}; groups = {};} ({ config, lib, pkgs, profiles, modules, sources, ... }: {
|
|
||||||
boot.isContainer = true;
|
|
||||||
networking.useDHCP = false;
|
|
||||||
users.users.root.hashedPassword = "";
|
|
||||||
|
|
||||||
imports = [
|
|
||||||
"${sources.workadventure.outPath}/default.nix"
|
|
||||||
((import sources.nix-hexchen) {}).profiles.nopersist
|
|
||||||
];
|
|
||||||
|
|
||||||
services.workadventure."void" = {
|
|
||||||
|
|
||||||
packageset = (import wapkgs {inherit pkgs;}).workadventure-xce;
|
|
||||||
|
|
||||||
nginx = {
|
|
||||||
default = true;
|
|
||||||
domain = "https://void.hacc.space";
|
|
||||||
maps.path = "${sources.haccmap.outPath}/";
|
|
||||||
maps.serve = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
frontend.startRoomUrl = "/_/global/void.hacc.space/maps/main.json";
|
|
||||||
commonConfig = {
|
|
||||||
webrtc.stun.url = "stun:void.hacc.space:3478";
|
|
||||||
webrtc.turn = {
|
|
||||||
url = "turn:135.181.215.233";
|
|
||||||
user = "turn";
|
|
||||||
password = "a4c9ad080dc51146611eabd15a27b07fc92850a9ae90c53e7745fce6c5a2c457";
|
|
||||||
};
|
|
||||||
jitsi.url = "meet.ffmuc.net";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
})).config.system.build.toplevel;
|
|
||||||
};
|
|
||||||
}
|
|
Loading…
Reference in a new issue