2023-05-14 09:56:51 -04:00
|
|
|
{config, ...}: {
|
2023-05-14 23:03:38 -04:00
|
|
|
sops.secrets.cloudflare-api-key = {};
|
2023-05-13 23:20:57 -04:00
|
|
|
networking.firewall.allowedTCPPorts = [80 443 8080];
|
2023-05-14 09:56:51 -04:00
|
|
|
systemd.user.services.traefik.after = ["docker.service"];
|
|
|
|
systemd.services.traefik = {
|
|
|
|
environment = {
|
|
|
|
CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev";
|
|
|
|
};
|
|
|
|
serviceConfig = {
|
|
|
|
EnvironmentFile = config.sops.secrets.cloudflare-api-key.path;
|
|
|
|
};
|
|
|
|
};
|
2023-05-12 08:18:42 -04:00
|
|
|
services.traefik = {
|
|
|
|
enable = true;
|
|
|
|
group = "docker";
|
|
|
|
dynamicConfigOptions = {
|
|
|
|
http = {
|
|
|
|
routers = {
|
2023-05-13 23:20:57 -04:00
|
|
|
api = {
|
|
|
|
rule = "PathPrefix(`/api/`)";
|
|
|
|
entryPoints = ["websecure"];
|
|
|
|
service = "api@internal";
|
|
|
|
};
|
2023-05-12 08:18:42 -04:00
|
|
|
homepage = {
|
2023-05-14 09:56:51 -04:00
|
|
|
rule = "Host(`dashboard.lab`)";
|
2023-05-13 23:20:57 -04:00
|
|
|
entrypoints = ["web"];
|
|
|
|
service = "homepage@docker";
|
|
|
|
};
|
|
|
|
searxng = {
|
2023-05-14 09:56:51 -04:00
|
|
|
rule = "Host(`searxng.lab`)";
|
2023-05-13 23:20:57 -04:00
|
|
|
entrypoints = ["web"];
|
|
|
|
service = "searxng@docker";
|
|
|
|
};
|
|
|
|
hugo = {
|
2023-05-14 09:56:51 -04:00
|
|
|
rule = "Host(`notohh.dev`)";
|
2023-05-12 08:18:42 -04:00
|
|
|
entryPoints = ["websecure"];
|
2023-05-13 23:20:57 -04:00
|
|
|
service = "hugo@docker";
|
2023-05-14 09:56:51 -04:00
|
|
|
tls.domains = [{main = "*.notohh.dev";}];
|
|
|
|
tls.certresolver = "staging";
|
2023-05-12 08:18:42 -04:00
|
|
|
};
|
2023-05-14 00:50:11 -04:00
|
|
|
stash = {
|
|
|
|
rule = "Host(`stash.lab`)";
|
|
|
|
entrypoints = ["web"];
|
|
|
|
service = "stash@docker";
|
|
|
|
};
|
2023-05-14 09:56:51 -04:00
|
|
|
foundryvtt = {
|
|
|
|
rule = "Host(`foundry.notohh.dev`)";
|
|
|
|
entrypoints = ["websecure"];
|
|
|
|
service = "foundryvtt@docker";
|
|
|
|
tls.domains = [{main = "*.notohh.dev";}];
|
|
|
|
tls.certresolver = "staging";
|
|
|
|
};
|
2023-05-12 08:18:42 -04:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
staticConfigOptions = {
|
2023-05-14 09:56:51 -04:00
|
|
|
log.level = "DEBUG";
|
2023-05-13 23:20:57 -04:00
|
|
|
api.dashboard = true;
|
|
|
|
api.insecure = true;
|
|
|
|
providers.docker = true;
|
2023-05-12 08:18:42 -04:00
|
|
|
global = {
|
|
|
|
checkNewVersion = false;
|
|
|
|
sendAnonymousUsage = false;
|
|
|
|
};
|
|
|
|
entryPoints = {
|
|
|
|
websecure.address = ":443";
|
|
|
|
web.address = ":80";
|
|
|
|
};
|
2023-05-13 23:20:57 -04:00
|
|
|
certificatesResolvers = {
|
|
|
|
staging.acme = {
|
|
|
|
email = "x3xr6n66@notohh.dev";
|
|
|
|
storage = "/var/lib/traefik/acme.json";
|
|
|
|
caServer = "https://acme-staging-v02.api.letsencrypt.org/directory";
|
|
|
|
dnsChallenge = {
|
|
|
|
provider = "cloudflare";
|
2023-05-14 09:56:51 -04:00
|
|
|
delayBeforeCheck = "0";
|
2023-05-13 23:20:57 -04:00
|
|
|
};
|
|
|
|
};
|
|
|
|
production.acme = {
|
|
|
|
email = "x3xr6n66@notohh.dev";
|
|
|
|
storage = "/var/lib/traefik/acme.json";
|
|
|
|
caServer = "https://acme-v02.api.letsencrypt.org/directory";
|
|
|
|
dnsChallenge = {
|
|
|
|
provider = "cloudflare";
|
2023-05-14 09:56:51 -04:00
|
|
|
delayBeforeCheck = "0";
|
2023-05-13 23:20:57 -04:00
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2023-05-12 08:18:42 -04:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|