Revert "vueko/murmur: Migrate to okarin"
This reverts commit 50ed985671
.
The performance on okarin is unbearably slow which makes mumble almost
unusable.
This commit is contained in:
parent
b0a87e8c9e
commit
de0b208340
|
@ -12,6 +12,9 @@ in
|
||||||
};
|
};
|
||||||
vueko = {
|
vueko = {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
|
extraModules = [
|
||||||
|
"${inputs.infinisilSystem}/config/new-modules/murmur.nix"
|
||||||
|
];
|
||||||
|
|
||||||
targetHost = "vueko.sbruder.de";
|
targetHost = "vueko.sbruder.de";
|
||||||
};
|
};
|
||||||
|
@ -40,9 +43,6 @@ in
|
||||||
};
|
};
|
||||||
okarin = {
|
okarin = {
|
||||||
system = "x86_64-linux";
|
system = "x86_64-linux";
|
||||||
extraModules = [
|
|
||||||
"${inputs.infinisilSystem}/config/new-modules/murmur.nix"
|
|
||||||
];
|
|
||||||
|
|
||||||
targetHost = "okarin.sbruder.de";
|
targetHost = "okarin.sbruder.de";
|
||||||
};
|
};
|
||||||
|
|
|
@ -10,7 +10,6 @@
|
||||||
./services/hedgedoc.nix
|
./services/hedgedoc.nix
|
||||||
./services/invidious
|
./services/invidious
|
||||||
./services/libreddit.nix
|
./services/libreddit.nix
|
||||||
./services/mumble.nix
|
|
||||||
./services/nitter.nix
|
./services/nitter.nix
|
||||||
./services/sbruder.xyz
|
./services/sbruder.xyz
|
||||||
./services/torrent.nix
|
./services/torrent.nix
|
||||||
|
|
|
@ -1,28 +0,0 @@
|
||||||
{ config, ... }:
|
|
||||||
|
|
||||||
{
|
|
||||||
sops.secrets.murmur-superuser = {
|
|
||||||
owner = config.users.users.murmur.name;
|
|
||||||
sopsFile = ../secrets.yaml;
|
|
||||||
};
|
|
||||||
|
|
||||||
users.users.murmur.isSystemUser = true; # Infinisil’s module does not set that
|
|
||||||
services.murmur = {
|
|
||||||
enable = true;
|
|
||||||
openFirewall = true;
|
|
||||||
superuserPasswordFile = config.sops.secrets.murmur-superuser.path;
|
|
||||||
acmeDomain = "mumble.sbruder.de";
|
|
||||||
config = {
|
|
||||||
bandwidth = "128000";
|
|
||||||
obfuscate = true;
|
|
||||||
logfile = ""; # log to stdout
|
|
||||||
|
|
||||||
channelname = ''[ \\-=\\w\\#\\[\\]\\{\\}\\(\\)\\@\\|]+'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.nginx.virtualHosts."mumble.sbruder.de" = {
|
|
||||||
enableACME = true;
|
|
||||||
forceSSL = true;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -58,6 +58,10 @@
|
||||||
|
|
||||||
locations."/".proxyPass = "http://localhost:5232";
|
locations."/".proxyPass = "http://localhost:5232";
|
||||||
};
|
};
|
||||||
|
"mumble.sbruder.de" = {
|
||||||
|
enableACME = true;
|
||||||
|
forceSSL = true;
|
||||||
|
};
|
||||||
"bangs.sbruder.de" = {
|
"bangs.sbruder.de" = {
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
|
@ -87,6 +91,26 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
sops.secrets.murmur-superuser = {
|
||||||
|
owner = config.users.users.murmur.name;
|
||||||
|
sopsFile = ./secrets.yaml;
|
||||||
|
};
|
||||||
|
|
||||||
|
users.users.murmur.isSystemUser = true; # Infinisil’s module does not set that
|
||||||
|
services.murmur = {
|
||||||
|
enable = true;
|
||||||
|
openFirewall = true;
|
||||||
|
superuserPasswordFile = config.sops.secrets.murmur-superuser.path;
|
||||||
|
acmeDomain = "mumble.sbruder.de";
|
||||||
|
config = {
|
||||||
|
bandwidth = "128000";
|
||||||
|
obfuscate = true;
|
||||||
|
logfile = ""; # log to stdout
|
||||||
|
|
||||||
|
channelname = ''[ \\-=\\w\\#\\[\\]\\{\\}\\(\\)\\@\\|]+'';
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
services.bang-evaluator = {
|
services.bang-evaluator = {
|
||||||
enable = true;
|
enable = true;
|
||||||
listenAddress = ":8000";
|
listenAddress = ":8000";
|
||||||
|
|
|
@ -1,3 +1,4 @@
|
||||||
|
murmur-superuser: ENC[AES256_GCM,data:jTVEa1KmbGAIxxFS2/uIlDCnnJTtGmKFZQ==,iv:YJIfcXlgKEwIRzFEY94dgReNjWZqLAqL0Rb6TG4IHIE=,tag:MVzaRkb24QyyNyFCEMwmzQ==,type:str]
|
||||||
wg-home-private-key: ENC[AES256_GCM,data:/RHNF6Zw6CTWa9ahUhGWRfkR8KIj+HdqUIojA1w6HQBFbZ/+Vo+CcYTYO5I=,iv:2sDH1P3VRjmLw6Ilkq0rw/hossHrNWP5uRvX9yr5fLE=,tag:KIT5GCfXuhg6RjA8+Nmtnw==,type:str]
|
wg-home-private-key: ENC[AES256_GCM,data:/RHNF6Zw6CTWa9ahUhGWRfkR8KIj+HdqUIojA1w6HQBFbZ/+Vo+CcYTYO5I=,iv:2sDH1P3VRjmLw6Ilkq0rw/hossHrNWP5uRvX9yr5fLE=,tag:KIT5GCfXuhg6RjA8+Nmtnw==,type:str]
|
||||||
turn-static-auth-secret: ENC[AES256_GCM,data:Nz94xw5sBuAgEqVpwiV44Rd3km16H46X6jVf2gzE+mbbVt2TXExv/7yegQtXI++eBo6q4wbpOfxwl0b1Pvsa/A==,iv:HSdqj43Vmq5McWAbMoxeNUa38UD75Xe4PJEwY5mKjOQ=,tag:cFpFsVwhisWt7JMMzJemCA==,type:str]
|
turn-static-auth-secret: ENC[AES256_GCM,data:Nz94xw5sBuAgEqVpwiV44Rd3km16H46X6jVf2gzE+mbbVt2TXExv/7yegQtXI++eBo6q4wbpOfxwl0b1Pvsa/A==,iv:HSdqj43Vmq5McWAbMoxeNUa38UD75Xe4PJEwY5mKjOQ=,tag:cFpFsVwhisWt7JMMzJemCA==,type:str]
|
||||||
sops:
|
sops:
|
||||||
|
@ -6,8 +7,8 @@ sops:
|
||||||
azure_kv: []
|
azure_kv: []
|
||||||
hc_vault: []
|
hc_vault: []
|
||||||
age: []
|
age: []
|
||||||
lastmodified: "2022-03-18T15:51:43Z"
|
lastmodified: "2021-12-01T16:49:21Z"
|
||||||
mac: ENC[AES256_GCM,data:YRZGoW0PxHTkdXp7/Af+evicxbOYD9YRL6Sze5YkZ3Bcc396aEHp8lc7Ix/Z9lX2AKLcHP5S84xP2oomq79ayeFwpomNbxQJJgiA7WJn3WD29Mw5s/tSe1cIBNBimbc11nip5Zqq4sAtb48mg8O1/CXNqaYtnJE2Hfq+3hG0tcg=,iv:qzs7Bq0va7Nr8e20LGJtdBRJ/4UlNCOiYrM0yy1z6JM=,tag:z59Q8SafZ1i8IB/E8rIu2Q==,type:str]
|
mac: ENC[AES256_GCM,data:wLy9If4/YdAVILwz1vSzCQsjG0U8Z2GvpME/+xW9pS/xmKoXTwaxP2QQpy8ReTmtikpbKS327j5pz2dSMiweqaUFSVb1nIEvUFxV4PKnxf5ubJalPZAGa82Cw0aassMKz0IAd8rDF/xK9RoB3ayRluYKAP/qnbEcFrys0BokGE0=,iv:Yw3tG1J135QImJqXEGrpSq3k8Lo++uUXfEKmCCNCpDg=,tag:FChnsJ1qIzalpVypMIilrg==,type:str]
|
||||||
pgp:
|
pgp:
|
||||||
- created_at: "2021-04-06T11:13:54Z"
|
- created_at: "2021-04-06T11:13:54Z"
|
||||||
enc: |
|
enc: |
|
||||||
|
|
Loading…
Reference in a new issue