workadventure: works but without https
This commit is contained in:
parent
6ebfa54f6f
commit
23b93acda3
1 changed files with 23 additions and 6 deletions
|
@ -97,6 +97,23 @@ in {
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
|
systemd.services.workadventure-network = {
|
||||||
|
enable = true;
|
||||||
|
wantedBy = [ "multi-user.target" ];
|
||||||
|
script = ''
|
||||||
|
${pkgs.docker}/bin/docker network create --driver bridge workadventure
|
||||||
|
'';
|
||||||
|
after = [ "docker" ];
|
||||||
|
before = [
|
||||||
|
"docker-back.service"
|
||||||
|
"docker-maps.service"
|
||||||
|
"docker-messages.service"
|
||||||
|
"docker-prune.service"
|
||||||
|
"docker-uploader.service"
|
||||||
|
"docker-website.service"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
virtualisation.oci-containers.backend = "docker";
|
virtualisation.oci-containers.backend = "docker";
|
||||||
|
|
||||||
#virtualisation.oci-containers.containers.reverse-proxy = {
|
#virtualisation.oci-containers.containers.reverse-proxy = {
|
||||||
|
@ -150,7 +167,7 @@ in {
|
||||||
#traefik.http.routers.front-ssl.tls=false
|
#traefik.http.routers.front-ssl.tls=false
|
||||||
#traefik.http.routers.front-ssl.service=front
|
#traefik.http.routers.front-ssl.service=front
|
||||||
'';
|
'';
|
||||||
in [ "--label-file" (toString labelFile) ];
|
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
|
||||||
};
|
};
|
||||||
systemd.services.docker-front.serviceConfig = {
|
systemd.services.docker-front.serviceConfig = {
|
||||||
StandardOutput = lib.mkForce "journal";
|
StandardOutput = lib.mkForce "journal";
|
||||||
|
@ -202,7 +219,7 @@ in {
|
||||||
#traefik.http.routers.pusher-ssl.service=pusher
|
#traefik.http.routers.pusher-ssl.service=pusher
|
||||||
#traefik.http.middlewares.api.headers.customResponseHeaders.Access-Control-Allow-Origin=http://play.${domain}
|
#traefik.http.middlewares.api.headers.customResponseHeaders.Access-Control-Allow-Origin=http://play.${domain}
|
||||||
'';
|
'';
|
||||||
in [ "--label-file" (toString labelFile) ];
|
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
|
||||||
};
|
};
|
||||||
systemd.services.docker-pusher.serviceConfig = {
|
systemd.services.docker-pusher.serviceConfig = {
|
||||||
StandardOutput = lib.mkForce "journal";
|
StandardOutput = lib.mkForce "journal";
|
||||||
|
@ -240,7 +257,7 @@ in {
|
||||||
#traefik.http.routers.maps-ssl.tls=false
|
#traefik.http.routers.maps-ssl.tls=false
|
||||||
#traefik.http.routers.maps-ssl.service=maps
|
#traefik.http.routers.maps-ssl.service=maps
|
||||||
'';
|
'';
|
||||||
in [ "--label-file" (toString labelFile) ];
|
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
|
||||||
};
|
};
|
||||||
systemd.services.docker-maps.serviceConfig = {
|
systemd.services.docker-maps.serviceConfig = {
|
||||||
StandardOutput = lib.mkForce "journal";
|
StandardOutput = lib.mkForce "journal";
|
||||||
|
@ -283,7 +300,7 @@ in {
|
||||||
#traefik.http.routers.back-ssl.service=back
|
#traefik.http.routers.back-ssl.service=back
|
||||||
#traefik.http.middlewares.api.headers.customResponseHeaders.Access-Control-Allow-Origin=http://play.${domain}
|
#traefik.http.middlewares.api.headers.customResponseHeaders.Access-Control-Allow-Origin=http://play.${domain}
|
||||||
'';
|
'';
|
||||||
in [ "--label-file" (toString labelFile) ];
|
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
|
||||||
};
|
};
|
||||||
systemd.services.docker-back.serviceConfig = {
|
systemd.services.docker-back.serviceConfig = {
|
||||||
StandardOutput = lib.mkForce "journal";
|
StandardOutput = lib.mkForce "journal";
|
||||||
|
@ -318,7 +335,7 @@ in {
|
||||||
#traefik.http.routers.uploader-ssl.tls=true
|
#traefik.http.routers.uploader-ssl.tls=true
|
||||||
#traefik.http.routers.uploader-ssl.service=uploader
|
#traefik.http.routers.uploader-ssl.service=uploader
|
||||||
'';
|
'';
|
||||||
in [ "--label-file" (toString labelFile) ];
|
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
|
||||||
};
|
};
|
||||||
systemd.services.docker-uploader.serviceConfig = {
|
systemd.services.docker-uploader.serviceConfig = {
|
||||||
StandardOutput = lib.mkForce "journal";
|
StandardOutput = lib.mkForce "journal";
|
||||||
|
@ -353,7 +370,7 @@ in {
|
||||||
#traefik.http.routers.website-ssl.tls=true
|
#traefik.http.routers.website-ssl.tls=true
|
||||||
#traefik.http.routers.website-ssl.service=website
|
#traefik.http.routers.website-ssl.service=website
|
||||||
'';
|
'';
|
||||||
in [ "--label-file" (toString labelFile) ];
|
in [ "--label-file" (toString labelFile) "--network=workadventure" ];
|
||||||
};
|
};
|
||||||
systemd.services.docker-website.serviceConfig = {
|
systemd.services.docker-website.serviceConfig = {
|
||||||
StandardOutput = lib.mkForce "journal";
|
StandardOutput = lib.mkForce "journal";
|
||||||
|
|
Loading…
Reference in a new issue