summaryrefslogtreecommitdiff
path: root/hosts/chaski/services
diff options
context:
space:
mode:
authorstuebinm2022-01-18 09:43:24 +0100
committerstuebinm2022-01-20 13:19:44 +0100
commit0bcabe1c4b1dd74af233674dfa6c6ec3011ce2c0 (patch)
tree5c58943f99245ff7f745f50b46c34ae288c3e503 /hosts/chaski/services
parentdb83a406bc6e63289e47ff5d2228c08430832655 (diff)
restructuring directories
Diffstat (limited to '')
-rw-r--r--chaski/services/VaaS/.gitignore (renamed from hosts/chaski/services/VaaS/.gitignore)0
-rw-r--r--chaski/services/VaaS/CHANGELOG.md (renamed from hosts/chaski/services/VaaS/CHANGELOG.md)0
-rw-r--r--chaski/services/VaaS/app/Main.hs (renamed from hosts/chaski/services/VaaS/app/Main.hs)0
-rw-r--r--chaski/services/VaaS/default.nix (renamed from hosts/chaski/services/VaaS/default.nix)0
-rw-r--r--chaski/services/VaaS/haskell.cabal (renamed from hosts/chaski/services/VaaS/haskell.cabal)0
-rw-r--r--chaski/services/VaaS/index.html (renamed from hosts/chaski/services/VaaS/index.html)0
-rw-r--r--chaski/services/geolocation.nix (renamed from hosts/chaski/services/geolocation.nix)2
-rw-r--r--chaski/services/gtfs.nix (renamed from hosts/chaski/services/gtfs.nix)0
-rw-r--r--chaski/services/jitsi.nix (renamed from hosts/chaski/services/jitsi.nix)0
-rw-r--r--chaski/services/uplcg.nix (renamed from hosts/chaski/services/uplcg.nix)0
-rw-r--r--chaski/services/woitb.nix (renamed from hosts/chaski/services/woitb.nix)0
-rw-r--r--chaski/services/woitb/index.html (renamed from hosts/chaski/services/woitb/index.html)0
-rw-r--r--chaski/services/woitb/info.html (renamed from hosts/chaski/services/woitb/info.html)0
-rw-r--r--hosts/chaski/services/exneuland.nix58
-rw-r--r--hosts/chaski/services/workadventure.nix93
15 files changed, 1 insertions, 152 deletions
diff --git a/hosts/chaski/services/VaaS/.gitignore b/chaski/services/VaaS/.gitignore
index b5e3679..b5e3679 100644
--- a/hosts/chaski/services/VaaS/.gitignore
+++ b/chaski/services/VaaS/.gitignore
diff --git a/hosts/chaski/services/VaaS/CHANGELOG.md b/chaski/services/VaaS/CHANGELOG.md
index 500a0d0..500a0d0 100644
--- a/hosts/chaski/services/VaaS/CHANGELOG.md
+++ b/chaski/services/VaaS/CHANGELOG.md
diff --git a/hosts/chaski/services/VaaS/app/Main.hs b/chaski/services/VaaS/app/Main.hs
index b5697d7..b5697d7 100644
--- a/hosts/chaski/services/VaaS/app/Main.hs
+++ b/chaski/services/VaaS/app/Main.hs
diff --git a/hosts/chaski/services/VaaS/default.nix b/chaski/services/VaaS/default.nix
index 427270c..427270c 100644
--- a/hosts/chaski/services/VaaS/default.nix
+++ b/chaski/services/VaaS/default.nix
diff --git a/hosts/chaski/services/VaaS/haskell.cabal b/chaski/services/VaaS/haskell.cabal
index 262b65f..262b65f 100644
--- a/hosts/chaski/services/VaaS/haskell.cabal
+++ b/chaski/services/VaaS/haskell.cabal
diff --git a/hosts/chaski/services/VaaS/index.html b/chaski/services/VaaS/index.html
index a7f59e0..a7f59e0 100644
--- a/hosts/chaski/services/VaaS/index.html
+++ b/chaski/services/VaaS/index.html
diff --git a/hosts/chaski/services/geolocation.nix b/chaski/services/geolocation.nix
index 4b095bd..9fe0973 100644
--- a/hosts/chaski/services/geolocation.nix
+++ b/chaski/services/geolocation.nix
@@ -2,5 +2,5 @@
{
services.nginx.virtualHosts."ilztal.live".locations."/geolocation".root =
- ../../../assets/ilztal.live;
+ ../ilztal.live;
}
diff --git a/hosts/chaski/services/gtfs.nix b/chaski/services/gtfs.nix
index 61837a1..61837a1 100644
--- a/hosts/chaski/services/gtfs.nix
+++ b/chaski/services/gtfs.nix
diff --git a/hosts/chaski/services/jitsi.nix b/chaski/services/jitsi.nix
index d6f398b..d6f398b 100644
--- a/hosts/chaski/services/jitsi.nix
+++ b/chaski/services/jitsi.nix
diff --git a/hosts/chaski/services/uplcg.nix b/chaski/services/uplcg.nix
index 5605046..5605046 100644
--- a/hosts/chaski/services/uplcg.nix
+++ b/chaski/services/uplcg.nix
diff --git a/hosts/chaski/services/woitb.nix b/chaski/services/woitb.nix
index 0c50617..0c50617 100644
--- a/hosts/chaski/services/woitb.nix
+++ b/chaski/services/woitb.nix
diff --git a/hosts/chaski/services/woitb/index.html b/chaski/services/woitb/index.html
index 8d08826..8d08826 100644
--- a/hosts/chaski/services/woitb/index.html
+++ b/chaski/services/woitb/index.html
diff --git a/hosts/chaski/services/woitb/info.html b/chaski/services/woitb/info.html
index e68d728..e68d728 100644
--- a/hosts/chaski/services/woitb/info.html
+++ b/chaski/services/woitb/info.html
diff --git a/hosts/chaski/services/exneuland.nix b/hosts/chaski/services/exneuland.nix
deleted file mode 100644
index 3ec3451..0000000
--- a/hosts/chaski/services/exneuland.nix
+++ /dev/null
@@ -1,58 +0,0 @@
-{ config, lib, pkgs, ... }:
-
-let
- workadventure-nix = builtins.fetchGit {
- url = "https://stuebinm.eu/git/workadventure-nix";
- ref = "master";
- };
- wapkgs = import "${workadventure-nix.outPath}/wapkgs.nix" {
- inherit pkgs;
- lib = pkgs.lib;
- };
- frontdrv = wapkgs.workadventure-tcm.front.override {
- environment = {
- PUSHER_URL = "https://exneuland.stuebinm.eu/pusher";
- START_ROOM_URL = "/_/global/world.di.c3voc.de/maps/main.json";
- };
- };
- exneuland = import ../../../pkgs/exneuland.nix;
-in
-{
- services.nginx = {
- enable = true;
- recommendedProxySettings = false;
- virtualHosts."exneuland.stuebinm.eu" = {
- root = "${frontdrv}/dist";
- locations."/_/".tryFiles = "/index.html =404";
-
- locations."/pusher" = {
- proxyPass = "http://localhost:4000";
- proxyWebsockets = true;
- extraConfig = ''
- add_header Access-Control-Allow-Origin https://exneuland.stuebinm.eu;
- proxy_pass_request_headers on;
- proxy_set_header Host $host;
- proxy_set_header X-Real-IP $remote_addr;
- proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
- proxy_set_header X-Forwarded-Proto $scheme;
- proxy_set_header X-Forwarded-Host $http_host;
- proxy_set_header Upgrade $http_upgrade;
- proxy_set_header Connection $http_connection;
- '';
- };
-
- enableACME = true;
- forceSSL = true;
- };
- };
-
- systemd.services.exneuland = {
- wantedBy = [ "multi-user.target" ];
- after = [ "network.target" ];
- description = "exneuland backend for workadventure";
- serviceConfig = {
- ExecStart = "${exneuland}/bin/exneuland start";
- Restart = "always";
- };
- };
-}
diff --git a/hosts/chaski/services/workadventure.nix b/hosts/chaski/services/workadventure.nix
deleted file mode 100644
index c2b704f..0000000
--- a/hosts/chaski/services/workadventure.nix
+++ /dev/null
@@ -1,93 +0,0 @@
-{pkgs, lib, config, ...}:
-
-let
- sources = import ../../../nix/sources.nix {};
- # why the double outPath? Dunno, just niv things …
- workadventure-nix = sources.workadventure.outPath.outPath;
- packageset = (
- import "${workadventure-nix}/wapkgs.nix" {
- inherit pkgs lib;
- }
- ).workadventure-xce;
-in
-{
- # not the most intuitive of container names, but "workadventure" is too long
- containers.wa-space = {
-
- # we'll need the outer config to get the turn secret inside the container,
- # and I'm feeling haskelly so config' it is!
- config = let config' = config; in {config, pkgs, ...}: {
- imports = [ workadventure-nix ];
- networking.firewall.allowedTCPPorts = [ 80 ];
-
- services.workadventure."space.stuebinm.eu" = {
- inherit packageset;
-
- nginx = {
- default = true;
- domain = "space.stuebinm.eu";
- maps.serve = true;
- maps.path = "/workadventuremaps/";
- };
-
- frontend.startRoomUrl = "/_/global/space.stuebinm.eu/maps/Floor0/floor0.json";
-
- commonConfig = {
- webrtc.stun.url = "stun:space.stuebinm.eu:3478";
- webrtc.turn = {
- url = "turn:95.217.159.23";
- user = "turn";
- password = config'.services.coturn.static-auth-secret;
- };
- jitsi.url = "meet.ffmuc.net";
- };
- };
- };
-
- privateNetwork = true;
- hostAddress6 = "fd00::42:14";
- localAddress6 = "fd00::42:16";
-
- autoStart = true;
-
- };
-
- services.coturn = {
- enable = true;
- realm = "turn.hacc.space";
- # this is a static "secret" that is also compiled into workadventure,
- # so it seems ok to put it into the nix store
- static-auth-secret = "1c496cea367f9608c77a754c1ef78079a512e013";
- use-auth-secret = true;
- no-cli = true;
- no-tcp-relay = true;
-
- cert = config.security.acme.certs."space.stuebinm.eu".directory + "full.pem";
- pkey = config.security.acme.certs."space.stuebinm.eu".directory + "key.pem";
- };
-
-
- services.nginx = {
- virtualHosts."space.stuebinm.eu" = {
- forceSSL = true;
- enableACME = true;
- locations."/" = {
- proxyPass = "http://[${config.containers.wa-space.localAddress6}]";
- proxyWebsockets = true;
- };
- };
- };
-
-
- networking.firewall = with config.services.coturn;
- let
- ports = [ listening-port tls-listening-port ];
- in {
- allowedTCPPorts = [ 80 ] ++ ports;
- allowedUDPPorts = ports;
- allowedUDPPortRanges = [
- { from = min-port; to = max-port; }
- ];
- };
-
-}