workadventure: works but without https

feature/hass
Ingolf Wagner 2021-01-08 00:48:30 +01:00
parent 6ebfa54f6f
commit 23b93acda3
Signed by: palo
GPG Key ID: 76BF5F1928B9618B
1 changed files with 23 additions and 6 deletions

View File

@ -97,6 +97,23 @@ in {
];
};
systemd.services.workadventure-network = {
enable = true;
wantedBy = [ "multi-user.target" ];
script = ''
${pkgs.docker}/bin/docker network create --driver bridge workadventure
'';
after = [ "docker" ];
before = [
"docker-back.service"
"docker-maps.service"
"docker-messages.service"
"docker-prune.service"
"docker-uploader.service"
"docker-website.service"
];
};
virtualisation.oci-containers.backend = "docker";
#virtualisation.oci-containers.containers.reverse-proxy = {
@ -150,7 +167,7 @@ in {
#traefik.http.routers.front-ssl.tls=false
#traefik.http.routers.front-ssl.service=front
'';
in [ "--label-file" (toString labelFile) ];
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
};
systemd.services.docker-front.serviceConfig = {
StandardOutput = lib.mkForce "journal";
@ -202,7 +219,7 @@ in {
#traefik.http.routers.pusher-ssl.service=pusher
#traefik.http.middlewares.api.headers.customResponseHeaders.Access-Control-Allow-Origin=http://play.${domain}
'';
in [ "--label-file" (toString labelFile) ];
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
};
systemd.services.docker-pusher.serviceConfig = {
StandardOutput = lib.mkForce "journal";
@ -240,7 +257,7 @@ in {
#traefik.http.routers.maps-ssl.tls=false
#traefik.http.routers.maps-ssl.service=maps
'';
in [ "--label-file" (toString labelFile) ];
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
};
systemd.services.docker-maps.serviceConfig = {
StandardOutput = lib.mkForce "journal";
@ -283,7 +300,7 @@ in {
#traefik.http.routers.back-ssl.service=back
#traefik.http.middlewares.api.headers.customResponseHeaders.Access-Control-Allow-Origin=http://play.${domain}
'';
in [ "--label-file" (toString labelFile) ];
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
};
systemd.services.docker-back.serviceConfig = {
StandardOutput = lib.mkForce "journal";
@ -318,7 +335,7 @@ in {
#traefik.http.routers.uploader-ssl.tls=true
#traefik.http.routers.uploader-ssl.service=uploader
'';
in [ "--label-file" (toString labelFile) ];
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
};
systemd.services.docker-uploader.serviceConfig = {
StandardOutput = lib.mkForce "journal";
@ -353,7 +370,7 @@ in {
#traefik.http.routers.website-ssl.tls=true
#traefik.http.routers.website-ssl.service=website
'';
in [ "--label-file" (toString labelFile) ];
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
};
systemd.services.docker-website.serviceConfig = {
StandardOutput = lib.mkForce "journal";