workadventure wip
This commit is contained in:
parent
7f8db23525
commit
3a4adeac88
2 changed files with 42 additions and 101 deletions
|
@ -7,7 +7,8 @@
|
|||
./workadventure.nix
|
||||
];
|
||||
|
||||
environment.systemPackages = [ pkgs.git pkgs.docker-compose pkgs.ag ];
|
||||
environment.systemPackages =
|
||||
[ pkgs.git pkgs.docker-compose pkgs.ag pkgs.htop ];
|
||||
|
||||
networking.hostName = "host";
|
||||
|
||||
|
|
|
@ -24,15 +24,12 @@ let
|
|||
jitsiISS = "";
|
||||
|
||||
#ADMIN_API_TOKEN = 123
|
||||
adminAPIToken = 123;
|
||||
|
||||
# note: container logs can be viewed by using
|
||||
# journalctrl CONTAINER_NAME=front
|
||||
# journalctrl CONTAINER_NAME=back
|
||||
adminAPIToken = "123";
|
||||
|
||||
domain = "workadventure.palovandalo.com";
|
||||
|
||||
jitsiURL = "meet.palovandalo.com";
|
||||
#jitsiURL = "meet.palovandalo.com";
|
||||
jitsiURL = "meet.jit.si";
|
||||
|
||||
mainURL = domain;
|
||||
mainPort = 9000;
|
||||
|
@ -60,10 +57,11 @@ in {
|
|||
# todo delete
|
||||
networking.firewall = {
|
||||
allowedTCPPorts = [ 80 443 ];
|
||||
allowedUDPPorts = [ 80 443 ];
|
||||
allowedUDPPorts = [ 80 443 8080 ];
|
||||
};
|
||||
|
||||
services.nginx.enable = true;
|
||||
|
||||
#services.nginx.recommendedGzipSettings = true;
|
||||
#services.nginx.recommendedOptimisation = true;
|
||||
#services.nginx.recommendedProxySettings = true;
|
||||
|
@ -101,53 +99,43 @@ in {
|
|||
UPLOADER_URL = uploaderURL;
|
||||
ADMIN_URL = adminURL;
|
||||
STARTUP_COMMAND_1 = "yarn install";
|
||||
TURN_SERVER =
|
||||
"turn:coturn.workadventu.re:443,turns:coturn.workadventu.re:443";
|
||||
TURN_USER = "workadventure";
|
||||
TURN_PASSWORD = "WorkAdventure123";
|
||||
#TURN_SERVER = "turn:coturn.workadventu.re:443,turns:coturn.workadventu.re:443";
|
||||
#TURN_USER = "workadventure";
|
||||
#TURN_PASSWORD = "WorkAdventure123";
|
||||
};
|
||||
cmd = [ "yarn" "run" "start" ];
|
||||
volumes = [ "${homeFolder}/front:/usr/src/app" ];
|
||||
#ports = [ "${toString playPort}:80" ];
|
||||
ports = [ "${toString playPort}:8080" ];
|
||||
#extraOptions = let
|
||||
# labelFile = pkgs.writeText "front-labels" ''
|
||||
# traefik.http.routers.front.rule=Host(`${playURL}`)
|
||||
# traefik.http.routers.front.entryPoints=web,traefik
|
||||
# traefik.http.services.front.loadbalancer.server.port=8080
|
||||
# traefik.http.routers.front-ssl.rule=Host(`${playURL}}`)
|
||||
# traefik.http.routers.front-ssl.entryPoints=websecure
|
||||
# traefik.http.routers.front-ssl.tls=true
|
||||
# traefik.http.routers.front-ssl.service=front
|
||||
# '';
|
||||
#in [ "--label-file" (toString labelFile) ];
|
||||
};
|
||||
systemd.services.docker-front.serviceConfig = {
|
||||
StandardOutput = lib.mkForce "journal";
|
||||
StandardError = lib.mkForce "journal";
|
||||
};
|
||||
services.nginx.virtualHosts."${playURL}" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
#enableACME = true;
|
||||
#forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString playPort}";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = ''
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
#sub_filter '${domain}:8080' '${domain}';
|
||||
#sub_filter_once on;
|
||||
'';
|
||||
};
|
||||
};
|
||||
services.nginx.virtualHosts."${adminURL}" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
#enableACME = true;
|
||||
#forceSSL = true;
|
||||
locations."/" = {
|
||||
#proxyPass = "http://localhost:${toString adminPort}";
|
||||
proxyPass = "http://localhost:${toString mainPort}";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = ''
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
#sub_filter '${domain}:8080' '${domain}';
|
||||
#sub_filter_once on;
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
@ -160,39 +148,30 @@ in {
|
|||
STARTUP_COMMAND_1 = "yarn install";
|
||||
SECRET_JITSI_KEY = secretJitsiKey;
|
||||
SECRET_KEY = "yourSecretKey";
|
||||
ADMIN_API_TOKEN = "$ADMIN_API_TOKEN";
|
||||
API_URL = "back:50051";
|
||||
ADMIN_API_TOKEN = adminAPIToken;
|
||||
#API_URL = "back:50051";
|
||||
API_URL = "back:8080";
|
||||
JITSI_URL = jitsiURL;
|
||||
JITSI_ISS = jitsiISS;
|
||||
};
|
||||
volumes = [ "${homeFolder}/pusher:/usr/src/app" ];
|
||||
#ports = [ "${toString pusherPort}:80" ];
|
||||
ports = [ "${toString pusherPort}:8080" ];
|
||||
#extraOptions = let
|
||||
# labelFile = pkgs.writeText "pusher-labels" ''
|
||||
# traefik.http.routers.pusher.rule=Host(`${pusherURL}`)
|
||||
# traefik.http.routers.pusher.entryPoints=web
|
||||
# traefik.http.services.pusher.loadbalancer.server.port=8080
|
||||
# traefik.http.routers.pusher-ssl.rule=Host(`${pusherURL}`)
|
||||
# traefik.http.routers.pusher-ssl.entryPoints=websecure
|
||||
# traefik.http.routers.pusher-ssl.tls=true
|
||||
# traefik.http.routers.pusher-ssl.service=pusher
|
||||
# '';
|
||||
#in [ "--label-file" (toString labelFile) ];
|
||||
};
|
||||
systemd.services.docker-pusher.serviceConfig = {
|
||||
StandardOutput = lib.mkForce "journal";
|
||||
StandardError = lib.mkForce "journal";
|
||||
};
|
||||
services.nginx.virtualHosts."${pusherURL}" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
#enableACME = true;
|
||||
#forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString pusherPort}";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = ''
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
#sub_filter '${domain}:8080' '${domain}';
|
||||
#sub_filter_once on;
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
@ -209,31 +188,22 @@ in {
|
|||
};
|
||||
volumes = [ "${homeFolder}/maps:/var/www/html" ];
|
||||
ports = [ "${toString mapsPort}:80" ];
|
||||
#extraOptions = let
|
||||
# labelFile = pkgs.writeText "maps-labels" ''
|
||||
# traefik.http.routers.maps.rule=Host(`${mapsURL}`)
|
||||
# traefik.http.routers.maps.entryPoints=web,traefik
|
||||
# traefik.http.services.maps.loadbalancer.server.port=80
|
||||
# traefik.http.routers.maps-ssl.rule=Host(`${mapsURL}`)
|
||||
# traefik.http.routers.maps-ssl.entryPoints=websecure
|
||||
# traefik.http.routers.maps-ssl.tls=true
|
||||
# traefik.http.routers.maps-ssl.service=maps
|
||||
# '';
|
||||
#in [ "--label-file" (toString labelFile) ];
|
||||
};
|
||||
systemd.services.docker-maps.serviceConfig = {
|
||||
StandardOutput = lib.mkForce "journal";
|
||||
StandardError = lib.mkForce "journal";
|
||||
};
|
||||
services.nginx.virtualHosts."${mapsURL}" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
#enableACME = true;
|
||||
#forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString mapsPort}";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = ''
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
#sub_filter '${domain}:8080' '${domain}';
|
||||
#sub_filter_once on;
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
@ -247,38 +217,28 @@ in {
|
|||
SECRET_KEY = "yourSecretKey";
|
||||
SECRET_JITSI_KEY = secretJitsiKey;
|
||||
ALLOW_ARTILLERY = "true";
|
||||
ADMIN_API_TOKEN = "$ADMIN_API_TOKEN";
|
||||
ADMIN_API_TOKEN = adminAPIToken;
|
||||
JITSI_URL = jitsiURL;
|
||||
JITSI_ISS = jitsiISS;
|
||||
};
|
||||
volumes = [ "${homeFolder}/back:/usr/src/app" ];
|
||||
#ports = [ "${toString apiPort}:80" ];
|
||||
ports = [ "${toString apiPort}:8080" ];
|
||||
#extraOptions = let
|
||||
# labelFile = pkgs.writeText "back-labels" ''
|
||||
# traefik.http.routers.back.rule=Host(`${apiURL}`)
|
||||
# traefik.http.routers.back.entryPoints=web
|
||||
# traefik.http.services.back.loadbalancer.server.port=8080
|
||||
# traefik.http.routers.back-ssl.rule=Host(`${apiURL}`)
|
||||
# traefik.http.routers.back-ssl.entryPoints=websecure
|
||||
# traefik.http.routers.back-ssl.tls=true
|
||||
# traefik.http.routers.back-ssl.service=back
|
||||
# '';
|
||||
#in [ "--label-file" (toString labelFile) ];
|
||||
};
|
||||
systemd.services.docker-back.serviceConfig = {
|
||||
StandardOutput = lib.mkForce "journal";
|
||||
StandardError = lib.mkForce "journal";
|
||||
};
|
||||
services.nginx.virtualHosts."${apiURL}" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
#enableACME = true;
|
||||
#forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString apiPort}";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = ''
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
#sub_filter '${domain}:8080' '${domain}';
|
||||
#sub_filter_once on;
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
@ -291,33 +251,23 @@ in {
|
|||
STARTUP_COMMAND_1 = "yarn install";
|
||||
};
|
||||
volumes = [ "${homeFolder}/uploader:/usr/src/app" ];
|
||||
#ports = [ "${toString uploaderPort}:80" ];
|
||||
ports = [ "${toString uploaderPort}:8080" ];
|
||||
#extraOptions = let
|
||||
# labelFile = pkgs.writeText "uploader-labels" ''
|
||||
# traefik.http.routers.uploader.rule=Host(`${uploaderURL}`)
|
||||
# traefik.http.routers.uploader.entryPoints=web
|
||||
# traefik.http.services.uploader.loadbalancer.server.port=8080
|
||||
# traefik.http.routers.uploader-ssl.rule=Host(`${uploaderURL}`)
|
||||
# traefik.http.routers.uploader-ssl.entryPoints=websecure
|
||||
# traefik.http.routers.uploader-ssl.tls=true
|
||||
# traefik.http.routers.uploader-ssl.service=uploader
|
||||
# '';
|
||||
#in [ "--label-file" (toString labelFile) ];
|
||||
};
|
||||
systemd.services.docker-uploader.serviceConfig = {
|
||||
StandardOutput = lib.mkForce "journal";
|
||||
StandardError = lib.mkForce "journal";
|
||||
};
|
||||
services.nginx.virtualHosts."${uploaderURL}" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
#enableACME = true;
|
||||
#forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString uploaderPort}";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = ''
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
#sub_filter '${domain}:8080' '${domain}';
|
||||
#sub_filter_once on;
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
@ -331,32 +281,22 @@ in {
|
|||
};
|
||||
volumes = [ "${homeFolder}/website:/var/www/html" ];
|
||||
ports = [ "${toString mainPort}:80" ];
|
||||
#ports = [ "${toString mainPort}:8080" ];
|
||||
#extraOptions = let
|
||||
# labelFile = pkgs.writeText "website-labels" ''
|
||||
# traefik.http.routers.website.rule=Host(`${domain}`)
|
||||
# traefik.http.routers.website.entryPoints=web
|
||||
# traefik.http.services.website.loadbalancer.server.port=8080
|
||||
# traefik.http.routers.website-ssl.rule=Host(`${domain}`)
|
||||
# traefik.http.routers.website-ssl.entryPoints=websecure
|
||||
# traefik.http.routers.website-ssl.tls=true
|
||||
# traefik.http.routers.website-ssl.service=website
|
||||
# '';
|
||||
#in [ "--label-file" (toString labelFile) ];
|
||||
};
|
||||
systemd.services.docker-website.serviceConfig = {
|
||||
StandardOutput = lib.mkForce "journal";
|
||||
StandardError = lib.mkForce "journal";
|
||||
};
|
||||
services.nginx.virtualHosts."${mainURL}" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
#enableACME = true;
|
||||
#forceSSL = true;
|
||||
locations."/" = {
|
||||
proxyPass = "http://localhost:${toString mainPort}";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = ''
|
||||
proxy_set_header Host $host;
|
||||
proxy_set_header X-Forwarded-For $remote_addr;
|
||||
#sub_filter '${domain}:8080' '${domain}';
|
||||
#sub_filter_once on;
|
||||
'';
|
||||
};
|
||||
};
|
||||
|
|
Loading…
Reference in a new issue