proper setup

feature/hass
Ingolf Wagner 2021-01-10 12:57:28 +01:00
parent 419d87e03b
commit baf77cd607
Signed by: palo
GPG Key ID: 76BF5F1928B9618B
4 changed files with 19 additions and 9 deletions

View File

@ -40,6 +40,16 @@ here (e.g. NixOps, Ansible, ... )
## Steps
* `example-prepare`: to create ssh keys.
* `example-ssh`: to run terranix and terraform do create server.
* `example-cleanup`: to delete server, ssh keys and terraform data. (don't forget that step, or else it gets costly)
* `terraform-prepare`: to create ssh keys.
* `terraform-build`: to run terranix and terraform do create server.
* `terraform-destroy`: to delete server (don't forget that step, or else it gets costly)
* `terraform-cleanup`: to delete ssh keys and terraform data.
## DNS
define domains with your nameserver and update `jitsi.nix` and `workadventure.nix`.
* `meet.${domain}` to given ip4 address
* `party.${domain}` to given ip4 address
* `*.*party.${domain}` to given ip4 address

View File

@ -10,9 +10,6 @@
environment.systemPackages =
[ pkgs.git pkgs.docker-compose pkgs.ag pkgs.htop ];
virtualisation.docker.enable = true;
boot.kernel.sysctl."net.ipv4.ip_forward" = true;
networking.hostName = "host";
security.acme.email = "contact@ingolf-wagner.de";

View File

@ -25,7 +25,7 @@
# This is a one server setup
services.jitsi-meet = {
enable = true;
hostName = "meet.palovandalo.com";
hostName = "meet.ingolf-wagner.de";
# JItsi COnference FOcus is a server side focus component used in Jitsi Meet conferences.
# https://github.com/jitsi/jicofo

View File

@ -11,9 +11,9 @@ let
workadventureSecretKey = "YXNkZnNkZmxranNhZGxma2phc2RsZmtqYXNsa2Zkago=";
jitsiURL = "meet.palovandalo.com";
jitsiURL = "meet.ingolf-wagner.de";
domain = "workadventure.palovandalo.com";
domain = "party.ingolf-wagner.de";
# domain will redirect to this map. (not play.${domain})
defaultMap = "git.ingolf-wagner.de/palo/world-home/raw/master/main.json";
@ -36,6 +36,9 @@ let
in {
virtualisation.docker.enable = true;
boot.kernel.sysctl."net.ipv4.ip_forward" = true;
networking.firewall = {
allowedTCPPorts = [ 80 443 ];
allowedUDPPorts = [ 80 443 ];