summaryrefslogtreecommitdiff
path: root/hosts
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--hosts/flora/configuration.nix1
-rw-r--r--hosts/flora/services/daemoniones.nix4
-rw-r--r--hosts/flora/services/picarones.nix26
3 files changed, 29 insertions, 2 deletions
diff --git a/hosts/flora/configuration.nix b/hosts/flora/configuration.nix
index 0d1788d..adf3ba8 100644
--- a/hosts/flora/configuration.nix
+++ b/hosts/flora/configuration.nix
@@ -9,6 +9,7 @@
./services/workadventure.nix
#./../../../nginx/vod.nix
./services/pleroma.nix
+ ./services/picarones.nix
];
# Use the GRUB 2 boot loader.
diff --git a/hosts/flora/services/daemoniones.nix b/hosts/flora/services/daemoniones.nix
index 6c96b3c..ae9d3cb 100644
--- a/hosts/flora/services/daemoniones.nix
+++ b/hosts/flora/services/daemoniones.nix
@@ -12,7 +12,7 @@
in {
choclo = simpledaemon "choclo signalling server" "/root/simple-signalling/target/release/chaski -b 127.0.0.1:5000";
wasi = simpledaemon "wasi backend" "/root/wasi-minimal/target/release/wasi";
- picarones = simpledaemon "picarones backend" "/root/picarones-server/target/release/picarones -b 127.0.0.1:6000";
+# picarones = simpledaemon "picarones backend" "/root/picarones-server/target/release/picarones -b 127.0.0.1:6000";
};
services.nginx = {
@@ -26,7 +26,7 @@
in {
"wasi.stuebinm.eu" = websocketproxy "http://127.0.0.1:9000";
"choclo.stuebinm.eu" = websocketproxy "http://127.0.0.1:5000";
- "picarones.stuebinm.eu" = websocketproxy "http://127.0.0.1:6000";
+# "picarones.stuebinm.eu" = websocketproxy "http://127.0.0.1:6000";
};
};
diff --git a/hosts/flora/services/picarones.nix b/hosts/flora/services/picarones.nix
new file mode 100644
index 0000000..06e8ab1
--- /dev/null
+++ b/hosts/flora/services/picarones.nix
@@ -0,0 +1,26 @@
+{config, pkgs, ...}:
+let
+ source = builtins.fetchGit {
+ url = "https://stuebinm.eu/git/picarones/";
+ rev = "393186f9ebf0bf43a1add8bd8d0e37be566ae8cc";
+ };
+in
+{
+
+ imports = [ source.outPath ];
+
+ services.picarones = {
+ enable = true;
+ frontend = {
+ enable = true;
+ domain = "picarones.stuebinm.eu";
+ proxyBackend = true;
+ config = {
+ enableACME = true;
+ forceSSL = true;
+ };
+ };
+ };
+
+ networking.firewall.allowedTCPPorts = [ 80 443 ];
+}