snowflake/modules/services/traefik.nix

107 lines
3.4 KiB
Nix
Raw Normal View History

2023-05-14 09:56:51 -04:00
{config, ...}: {
sops.secrets.cloudflare-api-key = {};
2023-05-13 23:20:57 -04:00
networking.firewall.allowedTCPPorts = [80 443 8080];
2023-05-14 09:56:51 -04:00
systemd.user.services.traefik.after = ["docker.service"];
systemd.services.traefik = {
environment = {
CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev";
};
serviceConfig = {
EnvironmentFile = config.sops.secrets.cloudflare-api-key.path;
};
};
services.traefik = {
enable = true;
dynamicConfigOptions = {
http = {
services = {
homepage.loadBalancer.servers = [{url = "http://localhost:3005";}];
searxng.loadBalancer.servers = [{url = "http://localhost:8085";}];
hugo.loadBalancer.servers = [{url = "http://localhost:1313";}];
stash.loadBalancer.servers = [{url = "http://localhost:9999";}];
foundryvtt.loadBalancer.servers = [{url = "http://localhost:30000";}];
gitea.loadBalancer.servers = [{url = "http://localhost:3000";}];
};
routers = {
2023-05-13 23:20:57 -04:00
api = {
rule = "PathPrefix(`/api/`)";
entryPoints = ["websecure"];
service = "api@internal";
};
homepage = {
2023-05-14 09:56:51 -04:00
rule = "Host(`dashboard.lab`)";
2023-05-13 23:20:57 -04:00
entrypoints = ["web"];
service = "homepage";
2023-05-13 23:20:57 -04:00
};
searxng = {
2023-05-14 09:56:51 -04:00
rule = "Host(`searxng.lab`)";
2023-05-13 23:20:57 -04:00
entrypoints = ["web"];
service = "searxng";
};
stash = {
rule = "Host(`stash.lab`)";
entrypoints = ["web"];
service = "stash";
2023-05-13 23:20:57 -04:00
};
hugo = {
2023-05-14 09:56:51 -04:00
rule = "Host(`notohh.dev`)";
entryPoints = ["websecure"];
service = "hugo";
2023-05-14 09:56:51 -04:00
tls.domains = [{main = "*.notohh.dev";}];
tls.certresolver = "staging";
};
2023-05-14 09:56:51 -04:00
foundryvtt = {
rule = "Host(`foundry.notohh.dev`)";
entrypoints = ["websecure"];
service = "foundryvtt";
tls.domains = [{main = "*.notohh.dev";}];
tls.certresolver = "staging";
};
gitea = {
rule = "Host(`git.notohh.dev`)";
entrypoints = ["websecure"];
service = "gitea";
2023-05-14 09:56:51 -04:00
tls.domains = [{main = "*.notohh.dev";}];
tls.certresolver = "staging";
};
};
};
};
staticConfigOptions = {
2023-05-14 09:56:51 -04:00
log.level = "DEBUG";
2023-05-13 23:20:57 -04:00
api.dashboard = true;
api.insecure = true;
global = {
checkNewVersion = false;
sendAnonymousUsage = false;
};
entryPoints = {
websecure.address = ":443";
web.address = ":80";
};
2023-05-13 23:20:57 -04:00
certificatesResolvers = {
staging.acme = {
email = "x3xr6n66@notohh.dev";
storage = "/var/lib/traefik/acme.json";
caServer = "https://acme-staging-v02.api.letsencrypt.org/directory";
dnsChallenge = {
provider = "cloudflare";
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
2023-05-14 09:56:51 -04:00
delayBeforeCheck = "0";
2023-05-13 23:20:57 -04:00
};
};
production.acme = {
email = "x3xr6n66@notohh.dev";
storage = "/var/lib/traefik/acme.json";
caServer = "https://acme-v02.api.letsencrypt.org/directory";
dnsChallenge = {
provider = "cloudflare";
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
2023-05-14 09:56:51 -04:00
delayBeforeCheck = "0";
2023-05-13 23:20:57 -04:00
};
};
};
};
};
}