2023-06-24 19:11:16 -04:00
|
|
|
{config, ...}: {
|
|
|
|
sops.secrets.cloudflare-api-key = {};
|
2023-10-07 10:29:47 -04:00
|
|
|
networking.firewall.allowedTCPPorts = [80 443 2222];
|
2023-06-24 19:11:16 -04:00
|
|
|
systemd.services.traefik = {
|
|
|
|
environment = {
|
|
|
|
CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev";
|
|
|
|
};
|
|
|
|
serviceConfig = {
|
|
|
|
EnvironmentFile = [config.sops.secrets.cloudflare-api-key.path];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
services.traefik = {
|
|
|
|
enable = true;
|
|
|
|
dynamicConfigOptions = {
|
2023-10-07 17:06:51 -04:00
|
|
|
tcp = {
|
|
|
|
routers = {
|
|
|
|
gitssh = {
|
|
|
|
rule = "HostSNI(`*`)";
|
|
|
|
entrypoints = ["gitssh"];
|
|
|
|
service = "gitssh";
|
|
|
|
tls.passthrough = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2023-06-24 19:11:16 -04:00
|
|
|
http = {
|
|
|
|
middlewares.authelia = {
|
|
|
|
forwardauth = {
|
|
|
|
address = "http://100.121.201.47:9091/api/verify?rd=https://passport.notohh.dev/";
|
|
|
|
trustForwardHeader = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
routers = {
|
|
|
|
api = {
|
|
|
|
rule = "PathPrefix(`/api/`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "api@internal";
|
|
|
|
};
|
|
|
|
uptime-kuma = {
|
2023-10-03 14:24:26 -04:00
|
|
|
rule = "Host(`status.flake.sh`)";
|
2023-06-24 19:11:16 -04:00
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "uptime-kuma";
|
2023-10-03 14:24:26 -04:00
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
2023-06-24 19:11:16 -04:00
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
2023-09-19 16:02:44 -04:00
|
|
|
gotify = {
|
2023-10-03 14:24:26 -04:00
|
|
|
rule = "Host(`gotify.flake.sh`)";
|
2023-09-19 16:02:44 -04:00
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "gotify";
|
2023-10-03 14:24:26 -04:00
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
2023-09-18 18:28:26 -04:00
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
2023-09-25 12:49:20 -04:00
|
|
|
conduit = {
|
2023-10-03 14:24:26 -04:00
|
|
|
rule = "Host(`matrix.flake.sh`)";
|
2023-09-25 12:49:20 -04:00
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "conduit";
|
2023-10-03 14:24:26 -04:00
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
2023-09-25 12:49:20 -04:00
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
2023-10-04 21:49:22 -04:00
|
|
|
authelia = {
|
|
|
|
rule = "Host(`passport.notohh.dev`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "authelia";
|
|
|
|
tls.domains = [{main = "*.notohh.dev";}];
|
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
2023-10-07 10:29:47 -04:00
|
|
|
foundryvtt = {
|
|
|
|
rule = "Host(`foundry.flake.sh`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "foundryvtt";
|
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
|
|
|
forgejo = {
|
|
|
|
rule = "Host(`git.flake.sh`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "forgejo";
|
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
|
|
|
rustypaste = {
|
|
|
|
rule = "Host(`i.flake.sh`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "rustypaste";
|
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
|
|
|
grafana = {
|
|
|
|
rule = "Host(`metrics.flake.sh`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "grafana";
|
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
|
|
|
hedgedoc = {
|
|
|
|
rule = "Host(`scratch.flake.sh`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "hedgedoc";
|
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
|
|
|
vaultwarden = {
|
|
|
|
rule = "Host(`vault.flake.sh`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "vaultwarden";
|
|
|
|
tls.domains = [{main = "*.flake.sh";}];
|
|
|
|
tls.certresolver = "production";
|
|
|
|
};
|
2023-06-24 19:11:16 -04:00
|
|
|
};
|
|
|
|
services = {
|
|
|
|
uptime-kuma.loadBalancer.servers = [{url = "http://100.87.54.48:4000";}];
|
2023-09-19 16:02:44 -04:00
|
|
|
gotify.loadBalancer.servers = [{url = "http://100.87.54.48:3000";}];
|
2023-09-28 17:06:50 -04:00
|
|
|
conduit.loadBalancer.servers = [{url = "http://100.121.201.47:6167";}];
|
2023-10-04 21:49:22 -04:00
|
|
|
authelia.loadBalancer.servers = [{url = "http://100.121.201.47:9091";}];
|
2023-10-07 10:29:47 -04:00
|
|
|
foundryvtt.loadBalancer.servers = [{url = "http://100.121.201.47:30000";}];
|
|
|
|
forgejo.loadBalancer.servers = [{url = "http://100.121.201.47:3200";}];
|
|
|
|
rustypaste.loadBalancer.servers = [{url = "http://100.121.201.47:8000";}];
|
|
|
|
grafana.loadBalancer.servers = [{url = "http://100.121.201.47:3100";}];
|
|
|
|
hedgedoc.loadBalancer.servers = [{url = "http://100.121.201.47:3300";}];
|
|
|
|
vaultwarden.loadBalancer.servers = [{url = "http://100.121.201.47:8222";}];
|
2023-10-07 17:06:51 -04:00
|
|
|
gitssh.loadBalancer.servers = [{url = "tcp://100.121.201.47:2222";}];
|
2023-06-24 19:11:16 -04:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
staticConfigOptions = {
|
|
|
|
log.level = "DEBUG";
|
|
|
|
api.dashboard = false;
|
|
|
|
api.insecure = false;
|
|
|
|
global = {
|
|
|
|
checkNewVersion = false;
|
|
|
|
sendAnonymousUsage = false;
|
|
|
|
};
|
|
|
|
entryPoints = {
|
|
|
|
websecure = {
|
|
|
|
address = ":443";
|
|
|
|
};
|
|
|
|
web = {
|
|
|
|
address = ":80";
|
|
|
|
};
|
2023-10-07 17:06:51 -04:00
|
|
|
gitssh = {
|
|
|
|
address = ":2222";
|
|
|
|
};
|
2023-06-24 19:11:16 -04:00
|
|
|
};
|
|
|
|
metrics = {
|
|
|
|
prometheus = {
|
|
|
|
addServicesLabels = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
certificatesResolvers = {
|
|
|
|
staging.acme = {
|
|
|
|
email = "x3xr6n66@notohh.dev";
|
|
|
|
storage = "/var/lib/traefik/acme.json";
|
|
|
|
caServer = "https://acme-staging-v02.api.letsencrypt.org/directory";
|
|
|
|
dnsChallenge = {
|
|
|
|
provider = "cloudflare";
|
|
|
|
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
|
|
|
|
delayBeforeCheck = "0";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
production.acme = {
|
|
|
|
email = "x3xr6n66@notohh.dev";
|
|
|
|
storage = "/var/lib/traefik/acme.json";
|
|
|
|
caServer = "https://acme-v02.api.letsencrypt.org/directory";
|
|
|
|
dnsChallenge = {
|
|
|
|
provider = "cloudflare";
|
|
|
|
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
|
|
|
|
delayBeforeCheck = "0";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|