Compare commits
2 Commits
main
...
nginx-prox
Author | SHA1 | Date |
---|---|---|
greglebreton | 041e887a8b | 2 years ago |
greglebreton | a96cfffdb4 | 2 years ago |
@ -1,75 +0,0 @@ |
||||
# The base domain |
||||
DOMAIN=adventure.nom-domain.tld |
||||
DEBUG_MODE=false |
||||
# JITSI_URL=meet.jit.si |
||||
JITSI_URL=jitsi.nom-domain.tld |
||||
# If your Jitsi environment has authentication set up, you MUST set JITSI_PRIVATE_MODE to "true" and you MUST pass a SECRET_JITSI_KEY to generate the JWT secret |
||||
JITSI_PRIVATE_MODE=false |
||||
JITSI_ISS= |
||||
SECRET_JITSI_KEY= |
||||
# URL of the TURN server (needed to "punch a hole" through some networks for P2P connections) |
||||
#TURN_SERVER=turn:numb.viagenie.ca |
||||
#TURN_USER=webrtc@live.com |
||||
#TURN_PASSWORD=muazkh |
||||
|
||||
DATA_DIR=./wa |
||||
|
||||
TURN_SERVER=turn:turn.adventure.nom-de-domaine.tld:3478?transport=tcp |
||||
TURN_USER=workadventure |
||||
TURN_PASSWORD=workadventure123 |
||||
|
||||
# The URL used by default, in the form: "/_/global/map/url.json" |
||||
START_ROOM_URL=/_/global/thecodingmachine.github.io/workadventure-map-starter-kit/map.json |
||||
|
||||
# The email address used by Let's encrypt to send renewal warnings (compulsory) |
||||
ACME_EMAIL=email@nom-domain.tld |
||||
|
||||
# Set to true to allow using this instance as a target for the apiUrl property |
||||
FEDERATE_PUSHER=false |
||||
|
||||
# Server settings |
||||
MAX_PER_GROUP=4 |
||||
MAX_USERNAME_LENGTH=25 |
||||
DISABLE_NOTIFICATIONS=false |
||||
SKIP_RENDER_OPTIMIZATIONS=false |
||||
|
||||
# Secrets |
||||
SECRET_KEY="some-long-string-of-letters-and-numbers" |
||||
ADMIN_API_TOKEN="some-other-long-string-of-letters-and-numbers" |
||||
ADMIN_API_URL= |
||||
|
||||
|
||||
# CONTAINERS ADRESSES |
||||
FRONT_URL=play.adventure.nom-domain.tld |
||||
PUSHER_HOST=pusher.adventure.nom-domain.tld |
||||
BACK_HOST=api.adventure.nom-domain.tld |
||||
UPLOADER_HOST=uploader.adventure.nom-domain.tld |
||||
CHAT_URL=chat.adventure.nom-domain.tld |
||||
CHAT_HOST=chat.adventure.nom-domain.tld |
||||
ICON_HOST=icon.adventure.nom-domain.tld |
||||
MAP_HOST=map.adventure.nom-domain.tld |
||||
|
||||
# OIDC |
||||
ENABLE_OPENID=true |
||||
OPID_CLIENT_ID=adventure |
||||
OPID_CLIENT_SECRET=<keycloak-secret> |
||||
OPID_CLIENT_ISSUER=https://keycloak.nom-domain.tld/auth/realms/<realm>/.well-known/openid-configuration |
||||
OPID_CLIENT_REDIRECT_URL=https://pusher.adventure.nom-domain.tld/openid-callback |
||||
OPID_PROFILE_SCREEN_PROVIDER=http://pusher.adventure.nom-domain.tld/login-screen |
||||
DISABLE_ANONYMOUS=true |
||||
OPID_USERNAME_CLAIM=preferred_username |
||||
|
||||
# chat |
||||
ENABLE_CHAT=true |
||||
ENABLE_CHAT_UPLOAD=true |
||||
UPLOAD_MAX_FILESIZE=10485760 |
||||
|
||||
# redis |
||||
#UPLOADER_REDIS_HOST= |
||||
#UPLOADER_REDIS_PORT= |
||||
UPLOADER_REDIS_DB_NUMBER=0 |
||||
|
||||
# ejabberd |
||||
#EJABBERD_DOMAIN=ejabberd |
||||
#EJABBERD_WS_URI=ws://ejabberd:5443/ws |
||||
#EJABBERD_API_URI=https://ejabberd:5443/api |
@ -1,268 +0,0 @@ |
||||
version: "3.8" |
||||
|
||||
services: |
||||
|
||||
reverse-proxy: |
||||
image: traefik:v2.5.6 |
||||
container_name: adventure_traefik |
||||
command: |
||||
# for web ui traefik |
||||
- "--api.insecure=true" |
||||
- "--providers.docker=true" |
||||
- "--providers.docker.swarmmode=false" |
||||
- "--log.level=DEBUG" |
||||
- "--providers.docker.exposedByDefault=false" |
||||
- "--entryPoints.web.address=:80" |
||||
- "--entryPoints.websecure.address=:443" |
||||
- "--certificatesResolvers.le.acme.email=${ACME_EMAIL}" |
||||
- "--certificatesResolvers.le.acme.storage=/acme/acme.json" |
||||
- "--certificatesResolvers.le.acme.httpChallenge=true" |
||||
- "--certificatesResolvers.le.acme.httpChallenge.entryPoint=web" |
||||
- "--certificatesresolvers.le.acme.caserver=https://acme-v02.api.letsencrypt.org/directory" |
||||
ports: |
||||
- "443:443" |
||||
- "80:80" |
||||
# The Web UI (enabled by --api.insecure=true) |
||||
- "8082:8080" |
||||
volumes: |
||||
- /var/run/docker.sock:/var/run/docker.sock |
||||
- acme:/acme |
||||
networks: |
||||
adventure_net: |
||||
|
||||
front: |
||||
image: thecodingmachine/workadventure-front:v1.12.10 |
||||
environment: |
||||
DEBUG_MODE: "false" |
||||
JITSI_URL: "meet.jit.si" |
||||
JITSI_PRIVATE_MODE: "false" |
||||
PUSHER_URL: https://${PUSHER_URL} |
||||
CHAT_URL: https://${CHAT_URL} |
||||
ICON_URL: https://${ICON_URL} |
||||
# CHANGE ME ----------------------------------------------------- |
||||
TURN_SERVER: ${TURN_SERVER} |
||||
TURN_USER: ${TURN_USER} |
||||
TURN_PASSWORD: ${TURN_PASSWORD} |
||||
MAX_PER_GROUP: 4 |
||||
MAX_USERNAME_LENGTH: 15 |
||||
START_ROOM_URL: ${START_ROOM_URL} |
||||
ENABLE_OPENID: ${ENABLE_OPENID} |
||||
DISABLE_ANONYMOUS: ${DISABLE_ANONYMOUS} |
||||
ENABLE_CHAT: ${ENABLE_CHAT} |
||||
labels: |
||||
- traefik.enable=true |
||||
- traefik.http.routers.adventure-front.rule=Host(`play.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-front.entryPoints=web |
||||
- traefik.http.services.adventure-front.loadbalancer.server.port=80 |
||||
- traefik.http.routers.adventure-front.middlewares=https_redirect |
||||
|
||||
- traefik.http.routers.adventure-front-ssl.rule=Host(`play.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-front-ssl.entryPoints=websecure |
||||
- traefik.http.routers.adventure-front-ssl.tls=true |
||||
- traefik.http.routers.adventure-front-ssl.service=adventure-front |
||||
- traefik.http.routers.adventure-front-ssl.tls.certresolver=le |
||||
- traefik.http.routers.adventure-front-ssl.middlewares=redir |
||||
# middlewares |
||||
- traefik.http.middlewares.redir.redirectregex.regex=^https://www\.(.+) |
||||
- traefik.http.middlewares.redir.redirectregex.replacement=https://$${1} |
||||
- traefik.http.middlewares.redir.redirectregex.permanent=true |
||||
- traefik.http.middlewares.https_redirect.redirectscheme.scheme=https |
||||
- traefik.http.middlewares.https_redirect.redirectscheme.permanent=true |
||||
restart: unless-stopped |
||||
networks: |
||||
adventure_net: |
||||
|
||||
pusher: |
||||
image: thecodingmachine/workadventure-pusher:v1.12.10 |
||||
environment: |
||||
# SECRET_JITSI_KEY: "${SECRET_JITSI_KEY}" |
||||
SECRET_KEY: yourSecretKey |
||||
API_URL: back:50051 |
||||
# ADMIN_API_URL: "${ADMIN_API_URL}" |
||||
# ADMIN_API_TOKEN: "${ADMIN_API_TOKEN}" |
||||
JITSI_URL: ${JITSI_URL} |
||||
# JITSI_ISS: ${JITSI_ISS} |
||||
FRONT_URL : ${FRONT_URL} |
||||
ENABLE_CHAT: ${ENABLE_CHAT} |
||||
OPID_CLIENT_ID: ${OPID_CLIENT_ID} |
||||
OPID_CLIENT_SECRET: ${OPID_CLIENT_SECRET} |
||||
OPID_CLIENT_ISSUER: ${OPID_CLIENT_ISSUER} |
||||
OPID_CLIENT_REDIRECT_URL: ${OPID_CLIENT_REDIRECT_URL} |
||||
OPID_PROFILE_SCREEN_PROVIDER: ${OPID_PROFILE_SCREEN_PROVIDER} |
||||
DISABLE_ANONYMOUS: ${DISABLE_ANONYMOUS} |
||||
# OPID_USERNAME_CLAIM: ${OPID_USERNAME_CLAIM} |
||||
EJABBERD_API_URI: http://ejabberd:5443/api |
||||
EJABBERD_DOMAIN: ejabberd |
||||
EJABBERD_WS_URI: ws://ejabberd:5443/ws |
||||
EJABBERD_JWT_SECRET: mySecretJwtToken |
||||
START_ROOM_URL: "/_/global/garagenum.github.io/garage-wa-map/map.json" |
||||
labels: |
||||
- traefik.enable=true |
||||
- traefik.http.routers.adventure-pusher.rule=Host(`pusher.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-pusher.entryPoints=web |
||||
- traefik.http.services.adventure-pusher.loadbalancer.server.port=8080 |
||||
- traefik.http.routers.adventure-pusher-ssl.rule=Host(`pusher.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-pusher-ssl.entryPoints=websecure |
||||
- traefik.http.routers.adventure-pusher-ssl.tls=true |
||||
- traefik.http.routers.adventure-pusher-ssl.service=adventure-pusher |
||||
- traefik.http.routers.adventure-pusher-ssl.tls.certresolver=le |
||||
restart: unless-stopped |
||||
networks: |
||||
adventure_net: |
||||
|
||||
back: |
||||
image: thecodingmachine/workadventure-back:v1.12.10 |
||||
command: yarn run runprod |
||||
environment: |
||||
# SECRET_KEY: ${SECRET_KEY} |
||||
# SECRET_JITSI_KEY: "${SECRET_JITSI_KEY}" |
||||
ADMIN_API_TOKEN: "${ADMIN_API_TOKEN}" |
||||
ADMIN_API_URL: "${ADMIN_API_URL}" |
||||
JITSI_URL: ${JITSI_URL} |
||||
JITSI_ISS: "" |
||||
MAX_PER_GROUP: 4 |
||||
# TURN_STATIC_AUTH_SECRET: "${TURN_STATIC_AUTH_SECRET}" |
||||
REDIS_HOST: redis |
||||
ENABLE_CHAT: ${ENABLE_CHAT} |
||||
EJABBERD_API_URI: http://ejabberd:5443/api |
||||
EJABBERD_DOMAIN: //xmpp.${DOMAIN} |
||||
labels: |
||||
- traefik.enable=true |
||||
- traefik.http.routers.adventure-back.rule=Host(`api.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-back.entryPoints=web |
||||
- traefik.http.services.adventure-back.loadbalancer.server.port=8080 |
||||
- traefik.http.routers.adventure-back-ssl.rule=Host(`api.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-back-ssl.entryPoints=websecure |
||||
- traefik.http.routers.adventure-back-ssl.tls=true |
||||
- traefik.http.routers.adventure-back-ssl.service=adventure-back |
||||
- traefik.http.routers.adventure-back-ssl.tls.certresolver=le |
||||
restart: unless-stopped |
||||
networks: |
||||
adventure_net: |
||||
|
||||
# wont work for now |
||||
uploader: |
||||
image: thecodingmachine/workadventure-uploader:v1.12.10 |
||||
environment: |
||||
UPLOADER_URL: //uploader |
||||
#REDIS |
||||
REDIS_HOST: redis |
||||
REDIS_PORT: 6379 |
||||
UPLOADER_REDIS_DB_NUMBER: 0 |
||||
#CHAT |
||||
ADMIN_API_URL: |
||||
ENABLE_CHAT_UPLOAD: "false" |
||||
UPLOAD_MAX_FILESIZE: 10485760 |
||||
labels: |
||||
- traefik.enable=true |
||||
- traefik.http.routers.adventure-uploader.rule=Host(`uploader.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-uploader.entryPoints=web |
||||
- traefik.http.services.adventure-uploader.loadbalancer.server.port=8080 |
||||
- traefik.http.routers.adventure-uploader-ssl.rule=Host(`uploader.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-uploader-ssl.entryPoints=websecure |
||||
- traefik.http.routers.adventure-uploader-ssl.service=adventure-uploader |
||||
- traefik.http.routers.adventure-uploader-ssl.tls=true |
||||
- traefik.http.routers.adventure-uploader-ssl.tls.certresolver=le |
||||
networks: |
||||
adventure_net: |
||||
|
||||
chat: |
||||
image: thecodingmachine/workadventure-chat:v1.12.10 |
||||
environment: |
||||
PUSHER_URL: //pusher.${DOMAIN} |
||||
UPLOADER_URL: //uploader.${DOMAIN} |
||||
# EMBEDLY_KEY: ${EMBEDLY_KEY} |
||||
ENABLE_CHAT_UPLOAD: "false" |
||||
EJABBERD_DOMAIN: //xmpp.${DOMAIN} |
||||
ENABLE_OPENID: 1 |
||||
|
||||
labels: |
||||
- traefik.enable=true |
||||
- traefik.http.routers.adventure-chat.rule=Host(`chat.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-chat.entryPoints=web |
||||
- traefik.http.services.adventure-chat.loadbalancer.server.port=80 |
||||
- traefik.http.routers.adventure-chat-ssl.rule=Host(`chat.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-chat-ssl.entryPoints=websecure |
||||
- traefik.http.routers.adventure-chat-ssl.service=adventure-chat |
||||
- traefik.http.routers.adventure-chat-ssl.tls=true |
||||
- traefik.http.routers.adventure-chat-ssl.tls.certresolver=le |
||||
networks: |
||||
adventure_net: |
||||
|
||||
icon: |
||||
image: matthiasluedtke/iconserver:v3.13.0 |
||||
labels: |
||||
- traefik.enable=true |
||||
- traefik.http.routers.adventure-icon.rule=Host(`icon.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-icon.entryPoints=web,traefik |
||||
- traefik.http.services.adventure-icon.loadbalancer.server.port=8080 |
||||
- traefik.http.routers.adventure-icon-ssl.rule=Host(`icon.${DOMAIN}`) |
||||
- traefik.http.routers.adventure-icon-ssl.entryPoints=websecure |
||||
- traefik.http.routers.adventure-icon-ssl.tls=true |
||||
- traefik.http.routers.adventure-icon-ssl.service=adventure-icon |
||||
- traefik.http.routers.adventure-icon-ssl.tls.certresolver=le |
||||
networks: |
||||
adventure_net: |
||||
|
||||
ejabberd: |
||||
container_name: adventure-ejabberd |
||||
image: ghcr.io/processone/ejabberd:22.05 |
||||
networks: |
||||
adventure_net: |
||||
volumes: |
||||
- ./ejabberd.yml:/opt/ejabberd/conf/ejabberd.yml |
||||
labels: |
||||
- traefik.enable=true |
||||
- traefik.http.routers.xmpp.rule=Host(`xmpp.${DOMAIN}`) |
||||
- traefik.http.routers.xmpp.entryPoints=web |
||||
- traefik.http.services.xmpp.loadbalancer.server.port=5380 |
||||
- traefik.http.routers.xmpp-ssl.rule=Host(`xmpp.${DOMAIN}`) |
||||
- traefik.http.routers.xmpp-ssl.entryPoints=websecure |
||||
- traefik.http.routers.xmpp-ssl.tls=true |
||||
- traefik.http.routers.xmpp-ssl.service=xmpp |
||||
|
||||
|
||||
redis: |
||||
container_name: adventure-redis |
||||
image: redis:6 |
||||
volumes: |
||||
- redisdata:/data |
||||
networks: |
||||
adventure_net: |
||||
|
||||
|
||||
coturn: |
||||
image: coturn/coturn:4.5.2 |
||||
command: |
||||
- turnserver |
||||
#- -c=/etc/coturn/turnserver.conf |
||||
- --log-file=stdout |
||||
|
||||
# change me |
||||
- --external-ip=92.243.20.228 |
||||
- --realm=turn.${DOMAIN} |
||||
- --server-name=turn.${DOMAIN} |
||||
|
||||
- --listening-port=3478 |
||||
- --min-port=10002 |
||||
- --max-port=10100 |
||||
- --tls-listening-port=5349 |
||||
- --listening-ip=0.0.0.0 |
||||
- --lt-cred-mech |
||||
# Enable Coturn REST API to validate temporary passwords. |
||||
#- --use-auth-secret |
||||
#- --static-auth-secret=SomeStaticAuthSecret |
||||
#- --userdb=/var/lib/turn/turndb |
||||
- --user=workadventure:WorkAdventure123 |
||||
# use real-valid certificate/privatekey files |
||||
#- --cert=/root/letsencrypt/fullchain.pem |
||||
#- --pkey=/root/letsencrypt/privkey.pem |
||||
network_mode: host |
||||
|
||||
|
||||
networks: |
||||
adventure_net: |
||||
|
||||
volumes: |
||||
acme: |
||||
redisdata: |
@ -1,264 +0,0 @@ |
||||
### |
||||
### ejabberd configuration file |
||||
### |
||||
### The parameters used in this configuration file are explained at |
||||
### |
||||
### https://docs.ejabberd.im/admin/configuration |
||||
### |
||||
hosts: |
||||
- ejabberd |
||||
|
||||
loglevel: 4 |
||||
log_rotate_size: 10485760 |
||||
log_rotate_count: 1 |
||||
|
||||
certfiles: |
||||
- /opt/ejabberd/conf/server.pem |
||||
|
||||
ca_file: "/opt/ejabberd/conf/cacert.pem" |
||||
|
||||
## When using let's encrypt to generate certificates |
||||
##certfiles: |
||||
## - /etc/letsencrypt/live/localhost/fullchain.pem |
||||
## - /etc/letsencrypt/live/localhost/privkey.pem |
||||
## |
||||
##ca_file: "/etc/letsencrypt/live/localhost/fullchain.pem" |
||||
|
||||
auth_method: |
||||
- anonymous |
||||
anonymous_protocol: login_anon |
||||
allow_multiple_connections: true |
||||
|
||||
#jwt_jid_field: "identifier" |
||||
#jwt_key: "/opt/ejabberd/conf/jwtKey" |
||||
|
||||
listen: |
||||
- |
||||
port: 5222 |
||||
ip: "::" |
||||
module: ejabberd_c2s |
||||
max_stanza_size: 262144 |
||||
shaper: c2s_shaper |
||||
access: c2s |
||||
starttls_required: true |
||||
- |
||||
port: 5269 |
||||
ip: "::" |
||||
module: ejabberd_s2s_in |
||||
max_stanza_size: 524288 |
||||
- |
||||
port: 5443 |
||||
ip: "::" |
||||
module: ejabberd_http |
||||
#tls: true |
||||
request_handlers: |
||||
"/admin": ejabberd_web_admin |
||||
"/api": mod_http_api |
||||
"/bosh": mod_bosh |
||||
"/captcha": ejabberd_captcha |
||||
"/upload": mod_http_upload |
||||
"/ws": ejabberd_http_ws |
||||
"/oauth": ejabberd_oauth |
||||
- |
||||
port: 5280 |
||||
ip: "::" |
||||
module: ejabberd_http |
||||
request_handlers: |
||||
#"/admin": ejabberd_web_admin |
||||
"/api": mod_http_api |
||||
"/bosh": mod_bosh |
||||
"/captcha": ejabberd_captcha |
||||
"/upload": mod_http_upload |
||||
"/ws": ejabberd_http_ws |
||||
"/oauth": ejabberd_oauth |
||||
- |
||||
port: 5380 |
||||
ip: "::" |
||||
module: ejabberd_http |
||||
request_handlers: |
||||
"/": ejabberd_web_admin |
||||
- |
||||
port: 1883 |
||||
ip: "::" |
||||
module: mod_mqtt |
||||
backlog: 1000 |
||||
|
||||
s2s_use_starttls: optional |
||||
|
||||
acl: |
||||
local: |
||||
user_regexp: "" |
||||
loopback: |
||||
ip: |
||||
- 127.0.0.0/8 |
||||
- ::1/128 |
||||
- ::FFFF:127.0.0.1/128 |
||||
admin: |
||||
user: |
||||
- "admin@ejabberd" |
||||
|
||||
access_rules: |
||||
local: |
||||
allow: local |
||||
c2s: |
||||
deny: blocked |
||||
allow: all |
||||
announce: |
||||
allow: all |
||||
configure: |
||||
allow: all |
||||
muc_create: |
||||
- allow: all |
||||
- deny: blocked |
||||
pubsub_createnode: |
||||
allow: local |
||||
trusted_network: |
||||
allow: loopback |
||||
|
||||
api_permissions: |
||||
"console commands": |
||||
from: |
||||
- ejabberd_ctl |
||||
who: all |
||||
what: "*" |
||||
"admin access": |
||||
who: |
||||
- all |
||||
what: |
||||
- "*" |
||||
- "muc_online_rooms" |
||||
- "!stop" |
||||
- "!start" |
||||
"public commands": |
||||
who: |
||||
- all |
||||
what: |
||||
- "status" |
||||
- "connected_users_number" |
||||
- "muc_online_rooms" |
||||
|
||||
shaper: |
||||
normal: 1000 |
||||
fast: 50000 |
||||
|
||||
shaper_rules: |
||||
max_user_sessions: 10 |
||||
max_user_offline_messages: |
||||
5000: admin |
||||
100: all |
||||
c2s_shaper: |
||||
none: admin |
||||
normal: all |
||||
s2s_shaper: fast |
||||
|
||||
max_fsm_queue: 10000 |
||||
|
||||
acme: |
||||
# CHANGE ME ---------------------------------------- |
||||
contact: "mailto:contact@nom-de-domain.tld" |
||||
ca_url: "https://acme-staging-v02.api.letsencrypt.org/directory" |
||||
|
||||
modules: |
||||
mod_adhoc: {} |
||||
mod_admin_extra: {} |
||||
mod_announce: |
||||
access: announce |
||||
mod_avatar: {} |
||||
mod_blocking: {} |
||||
mod_bosh: {} |
||||
mod_caps: {} |
||||
mod_carboncopy: {} |
||||
mod_client_state: {} |
||||
mod_configure: {} |
||||
mod_disco: {} |
||||
mod_fail2ban: {} |
||||
mod_http_api: {} |
||||
##mod_restful_admin: |
||||
## api: |
||||
## - path: [ "admin" ] |
||||
## module: mod_restful_admin |
||||
## params: |
||||
## key: "secret" |
||||
## allowed_commands: [ register, unregister,status, add_rosteritem, create_room, send_direct_invitation, set_room_affiliation ] |
||||
## - path: [ "register" ] |
||||
## module: mod_restful_register |
||||
## params: |
||||
## key: "secret" |
||||
mod_http_upload: |
||||
put_url: https://@HOST@:5443/upload |
||||
mod_last: {} |
||||
mod_mam: |
||||
## Mnesia is limited to 2GB, better to use an SQL backend |
||||
## For small servers SQLite is a good fit and is very easy |
||||
## to configure. Uncomment this when you have SQL configured: |
||||
## db_type: sql |
||||
assume_mam_usage: true |
||||
default: never |
||||
mod_mqtt: {} |
||||
mod_muc: |
||||
hosts: |
||||
- conference.ejabberd |
||||
access: |
||||
- allow |
||||
access_admin: |
||||
- allow: admin |
||||
access_create: muc_create |
||||
access_persistent: muc_create |
||||
access_mam: |
||||
- allow |
||||
default_room_options: |
||||
allow_subscription: true # enable MucSub |
||||
mam: true |
||||
persistent: true |
||||
anonymous: false |
||||
mod_muc_admin: {} |
||||
mod_offline: |
||||
access_max_user_messages: max_user_offline_messages |
||||
mod_ping: {} |
||||
mod_privacy: {} |
||||
mod_private: {} |
||||
mod_proxy65: |
||||
access: local |
||||
max_connections: 5 |
||||
mod_pubsub: |
||||
access_createnode: pubsub_createnode |
||||
plugins: |
||||
- flat |
||||
- pep |
||||
force_node_config: |
||||
## Avoid buggy clients to make their bookmarks public |
||||
storage:bookmarks: |
||||
access_model: whitelist |
||||
mod_push: {} |
||||
mod_push_keepalive: |
||||
resume_timeout: 72 |
||||
wake_on_start: false |
||||
wake_on_timeout: true |
||||
mod_register: |
||||
## Only accept registration requests from the "trusted" |
||||
## network (see access_rules section above). |
||||
## Think twice before enabling registration from any |
||||
## address. See the Jabber SPAM Manifesto for details: |
||||
## https://github.com/ge0rg/jabber-spam-fighting-manifesto |
||||
ip_access: trusted_network |
||||
mod_roster: |
||||
versioning: true |
||||
store_current_id: false |
||||
mod_sip: {} |
||||
mod_s2s_dialback: {} |
||||
mod_shared_roster: {} |
||||
mod_stream_mgmt: |
||||
ack_timeout: infinity |
||||
resend_on_timeout: if_offline |
||||
resume_timeout: 0 |
||||
mod_vcard: {} |
||||
mod_vcard_xupdate: {} |
||||
mod_version: |
||||
show_os: false |
||||
|
||||
websocket_ping_interval: 300 |
||||
websocket_timeout: 900 |
||||
### Local Variables: |
||||
### mode: yaml |
||||
### End: |
||||
### vim: set filetype=yaml tabstop=8 |
@ -0,0 +1,12 @@ |
||||
version: '3' |
||||
services: |
||||
app: |
||||
image: 'jc21/nginx-proxy-manager:latest' |
||||
restart: unless-stopped |
||||
ports: |
||||
- '80:80' |
||||
- '81:81' |
||||
- '443:443' |
||||
volumes: |
||||
- ./data:/data |
||||
- ./letsencrypt:/etc/letsencrypt |
@ -0,0 +1,82 @@ |
||||
#workadventure |
||||
upstream workadventure { |
||||
server 172.21.0.1:9999; |
||||
} |
||||
|
||||
# HTTP |
||||
server { |
||||
|
||||
listen 80; |
||||
server_name *.workadventure.domain.tld; |
||||
|
||||
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; |
||||
|
||||
location / { |
||||
proxy_redirect off; |
||||
proxy_pass http://workadventure; |
||||
} |
||||
|
||||
# Add Headers for proxy mode |
||||
proxy_set_header X-Forwarded-Host $host; |
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; |
||||
proxy_set_header X-Real-IP $remote_addr; |
||||
proxy_set_header Host $host; |
||||
proxy_set_header Accept-Encoding ""; |
||||
# add_header Access-Control-Allow-Origin *; |
||||
|
||||
proxy_set_header Upgrade $http_upgrade; |
||||
proxy_set_header Connection $http_connection; |
||||
proxy_http_version 1.1; |
||||
|
||||
} |
||||
|
||||
server { |
||||
listen 443 ssl; |
||||
server_name *.workadventure.domain.tld; |
||||
|
||||
# Add Headers for proxy mode |
||||
proxy_set_header X-Forwarded-Host $host; |
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; |
||||
# proxy_set_header X-Forwarded-Proto $scheme; |
||||
proxy_set_header X-Real-IP $remote_addr; |
||||
proxy_set_header Host $host; |
||||
proxy_set_header Accept-Encoding ""; |
||||
# add_header Access-Control-Allow-Origin *; |
||||
|
||||
proxy_set_header Upgrade $http_upgrade; |
||||
proxy_set_header Connection $http_connection; |
||||
proxy_http_version 1.1; |
||||
|
||||
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; |
||||
|
||||
# Upload limit and security |
||||
client_max_body_size 10000m; |
||||
server_tokens off; |
||||
|
||||
# Buffer_size |
||||
proxy_buffer_size 512k; |
||||
proxy_buffers 4 512k; |
||||
proxy_busy_buffers_size 512k; |
||||
|
||||
#fastcgi_buffers 16 32k; |
||||
#fastcgi_buffer_size 64k; |
||||
#fastcgi_busy_buffers_size 64k; |
||||
|
||||
# SSL parameters |
||||
ssl_session_timeout 30m; |
||||
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; |
||||
|
||||
# logs |
||||
access_log /var/log/nginx/workadventure.access.log; |
||||
error_log /var/log/nginx/workadventure.error.log; |
||||
|
||||
# Redirect requests to https |
||||
location / { |
||||
proxy_redirect off; |
||||
proxy_pass http://workadventure; |
||||
} |
||||
|
||||
ssl_certificate /etc/letsencrypt/live/workadventure.domaine.tld/fullchain.pem; |
||||
ssl_certificate_key /etc/letsencrypt/live/workadventure.domaine.tld/privkey.pem; |
||||
} |
||||
|
@ -0,0 +1,82 @@ |
||||
#workadventure |
||||
upstream workadventure { |
||||
server 172.21.0.1:9999; |
||||
} |
||||
|
||||
# HTTP |
||||
server { |
||||
|
||||
listen 80; |
||||
server_name *.workadventure.domain.tld; |
||||
|
||||
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; |
||||
|
||||
location / { |
||||
proxy_redirect off; |
||||
proxy_pass http://workadventure; |
||||
} |
||||
|
||||
# Add Headers for proxy mode |
||||
proxy_set_header X-Forwarded-Host $host; |
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; |
||||
proxy_set_header X-Real-IP $remote_addr; |
||||
proxy_set_header Host $host; |
||||
proxy_set_header Accept-Encoding ""; |
||||
# add_header Access-Control-Allow-Origin *; |
||||
|
||||
proxy_set_header Upgrade $http_upgrade; |
||||
proxy_set_header Connection $http_connection; |
||||
proxy_http_version 1.1; |
||||
|
||||
} |
||||
|
||||
server { |
||||
listen 443 ssl; |
||||
server_name *.workadventure.domain.tld; |
||||
|
||||
# Add Headers for proxy mode |
||||
proxy_set_header X-Forwarded-Host $host; |
||||
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; |
||||
# proxy_set_header X-Forwarded-Proto $scheme; |
||||
proxy_set_header X-Real-IP $remote_addr; |
||||
proxy_set_header Host $host; |
||||
proxy_set_header Accept-Encoding ""; |
||||
# add_header Access-Control-Allow-Origin *; |
||||
|
||||
proxy_set_header Upgrade $http_upgrade; |
||||
proxy_set_header Connection $http_connection; |
||||
proxy_http_version 1.1; |
||||
|
||||
add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; |
||||
|
||||
# Upload limit and security |
||||
client_max_body_size 10000m; |
||||
server_tokens off; |
||||
|
||||
# Buffer_size |
||||
proxy_buffer_size 512k; |
||||
proxy_buffers 4 512k; |
||||
proxy_busy_buffers_size 512k; |
||||
|
||||
#fastcgi_buffers 16 32k; |
||||
#fastcgi_buffer_size 64k; |
||||
#fastcgi_busy_buffers_size 64k; |
||||
|
||||
# SSL parameters |
||||
ssl_session_timeout 30m; |
||||
ssl_protocols TLSv1 TLSv1.1 TLSv1.2; |
||||
|
||||
# logs |
||||
access_log /var/log/nginx/workadventure.access.log; |
||||
error_log /var/log/nginx/workadventure.error.log; |
||||
|
||||
# Redirect requests to https |
||||
location / { |
||||
proxy_redirect off; |
||||
proxy_pass http://workadventure; |
||||
} |
||||
|
||||
ssl_certificate /etc/letsencrypt/live/workadventure.domaine.tld/fullchain.pem; |
||||
ssl_certificate_key /etc/letsencrypt/live/workadventure.domaine.tld/privkey.pem; |
||||
} |
||||
|
@ -0,0 +1,39 @@ |
||||
# The base domain |
||||
DOMAIN=votre-nom-de-domaine.com |
||||
DEBUG_MODE=false |
||||
JITSI_URL=meet.jit.si |
||||
|
||||
# Domain redirections |
||||
FRONT_URL=play.votre-nom-de-domaine.com |
||||
PUSHER_HOST=pusher.votre-nom-de-domaine.com |
||||
BACK_HOST=api.votre-nom-de-domaine.com |
||||
|
||||
# If your Jitsi environment has authentication set up, you MUST set JITSI_PRIVATE_MODE to> |
||||
JITSI_PRIVATE_MODE=false |
||||
JITSI_ISS= |
||||
SECRET_JITSI_KEY= |
||||
|
||||
# URL of the TURN server (needed to "punch a hole" through some networks for P2P connecti> |
||||
#TURN_SERVER= |
||||
#TURN_USER= |
||||
#TURN_PASSWORD= |
||||
|
||||
# The URL used by default, in the form: "/_/global/map/url.json" |
||||
START_ROOM_URL=/_/global/GregLebreton.github.io/adventure-map/map.json |
||||
|
||||
# The email address used by Let's encrypt to send renewal warnings (compulsory) |
||||
ACME_EMAIL= |
||||
|
||||
# Set to true to allow using this instance as a target for the apiUrl property |
||||
FEDERATE_PUSHER=false |
||||
|
||||
# Server settings |
||||
MAX_PER_GROUP=100 |
||||
MAX_USERNAME_LENGTH=25 |
||||
DISABLE_NOTIFICATIONS=false |
||||
SKIP_RENDER_OPTIMIZATIONS=false |
||||
|
||||
# Secrets |
||||
SECRET_KEY= |
||||
ADMIN_API_TOKEN= |
||||
ADMIN_API_URL= |
@ -0,0 +1,89 @@ |
||||
version: "3.3" |
||||
|
||||
services: |
||||
|
||||
reverse-proxy: |
||||
image: traefik:v2.5 |
||||
command: |
||||
- --log.level=WARN |
||||
- --providers.docker |
||||
- --entryPoints.web.address=:80 |
||||
ports: |
||||
- "9999:80" |
||||
depends_on: |
||||
- pusher |
||||
- front |
||||
volumes: |
||||
- /var/run/docker.sock:/var/run/docker.sock |
||||
restart: unless-stopped |
||||
|
||||
front: |
||||
image: thecodingmachine/workadventure-front:master |
||||
environment: |
||||
DEBUG_MODE: "$DEBUG_MODE" |
||||
JITSI_URL: $JITSI_URL |
||||
JITSI_PRIVATE_MODE: "$JITSI_PRIVATE_MODE" |
||||
PUSHER_URL: /pusher |
||||
ADMIN_URL: /admin |
||||
TURN_SERVER: "${TURN_SERVER}" |
||||
TURN_USER: "${TURN_USER}" |
||||
TURN_PASSWORD: "${TURN_PASSWORD}" |
||||
MAX_PER_GROUP: "${MAX_PER_GROUP}" |
||||
MAX_USERNAME_LENGTH: "${MAX_USERNAME_LENGTH}" |
||||
START_ROOM_URL: "${START_ROOM_URL}" |
||||
DISABLE_NOTIFICATIONS: "${DISABLE_NOTIFICATIONS}" |
||||
SKIP_RENDER_OPTIMIZATIONS: "${SKIP_RENDER_OPTIMIZATIONS}" |
||||
labels: |
||||
- "traefik.http.routers.front.rule=PathPrefix(`/`)" |
||||
- "traefik.http.routers.front.entryPoints=web" |
||||
- "traefik.http.services.front.loadbalancer.server.port=80" |
||||
- "traefik.http.routers.front.service=front" |
||||
restart: unless-stopped |
||||
|
||||
pusher: |
||||
image: thecodingmachine/workadventure-pusher:master |
||||
environment: |
||||
SECRET_JITSI_KEY: "${SECRET_JITSI_KEY}" |
||||
SECRET_KEY: ${SECRET_KEY} |
||||
API_URL: back:50051 |
||||
ADMIN_API_URL: "${ADMIN_API_URL}" |
||||
ADMIN_API_TOKEN: "${ADMIN_API_TOKEN}" |
||||
JITSI_URL: ${JITSI_URL} |
||||
JITSI_ISS: ${JITSI_ISS} |
||||
FRONT_URL : ${FRONT_URL} |
||||
labels: |
||||
- "traefik.http.middlewares.strip-pusher-prefix.stripprefix.prefixes=/pusher" |
||||
- "traefik.http.routers.pusher.rule=PathPrefix(`/pusher`)" |
||||
- "traefik.http.routers.pusher.middlewares=strip-pusher-prefix@docker" |
||||
- "traefik.http.routers.pusher.entryPoints=web" |
||||
- "traefik.http.services.pusher.loadbalancer.server.port=8080" |
||||
- "traefik.http.routers.pusher.service=pusher" |
||||
restart: unless-stopped |
||||
|
||||
|
||||
back: |
||||
image: thecodingmachine/workadventure-back:master |
||||
environment: |
||||
SECRET_KEY: ${SECRET_KEY} |
||||
STARTUP_COMMAND_1: yarn install |
||||
SECRET_JITSI_KEY: "${SECRET_JITSI_KEY}" |
||||
ADMIN_API_TOKEN: "${ADMIN_API_TOKEN}" |
||||
ADMIN_API_URL: "${ADMIN_API_URL}" |
||||
JITSI_URL: ${JITSI_URL} |
||||
JITSI_ISS: ${JITSI_ISS} |
||||
MAX_PER_GROUP: ${MAX_PER_GROUP} |
||||
TURN_STATIC_AUTH_SECRET: "${TURN_STATIC_AUTH_SECRET}" |
||||
REDIS_HOST: redis |
||||
labels: |
||||
- "traefik.http.middlewares.strip-api-prefix.stripprefix.prefixes=/api" |
||||
- "traefik.http.routers.back.rule=PathPrefix(`/api`)" |
||||
- "traefik.http.routers.back.middlewares=strip-api-prefix@docker" |
||||
- "traefik.http.routers.back.entryPoints=web" |
||||
- "traefik.http.services.back.loadbalancer.server.port=8080" |
||||
- "traefik.http.routers.back.service=back" |
||||
restart: unless-stopped |
||||
|
||||
redis: |
||||
image: redis:6 |
||||
restart: unless-stopped |
||||
|
Loading…
Reference in new issue