Compare commits

...

2 commits

Author SHA1 Message Date
fc5acf594f
sora: init traefik
All checks were successful
ci/woodpecker/push/checks Pipeline was successful
2023-06-24 19:11:16 -04:00
f7b54ac3bd
traefik: remove bazarr 2023-06-24 19:10:59 -04:00
4 changed files with 87 additions and 7 deletions

View file

@ -25,11 +25,6 @@ _: {
entrypoints = ["web"];
service = "prowlarr";
};
bazarr = {
rule = "Host(`bazarr.home.arpa`)";
entrypoints = ["web"];
service = "bazarr";
};
qbittorrent = {
rule = "Host(`torrent.home.arpa`)";
entrypoints = ["web"];
@ -40,7 +35,6 @@ _: {
sonarr.loadBalancer.servers = [{url = "http://localhost:8989";}];
radarr.loadBalancer.servers = [{url = "http://localhost:7878";}];
prowlarr.loadBalancer.servers = [{url = "http://localhost:9696";}];
bazarr.loadBalancer.servers = [{url = "http://localhost:6767";}];
qbittorrent.loadBalancer.servers = [{url = "http://localhost:8080";}];
};
};

View file

@ -1,5 +1,6 @@
{...}: {
imports = [
./traefik.nix
./uptimekuma.nix
];
}

View file

@ -0,0 +1,86 @@
{config, ...}: {
sops.secrets.cloudflare-api-key = {};
networking.firewall.allowedTCPPorts = [80 443];
systemd.services.traefik = {
environment = {
CLOUDFLARE_EMAIL = "jch0tm2e@notohh.dev";
};
serviceConfig = {
EnvironmentFile = [config.sops.secrets.cloudflare-api-key.path];
};
};
services.traefik = {
enable = true;
dynamicConfigOptions = {
http = {
middlewares.authelia = {
forwardauth = {
address = "http://100.121.201.47:9091/api/verify?rd=https://passport.notohh.dev/";
trustForwardHeader = true;
};
};
routers = {
api = {
rule = "PathPrefix(`/api/`)";
entrypoints = ["websecure"];
service = "api@internal";
};
uptime-kuma = {
rule = "Host(`status.notohh.dev`)";
entrypoints = ["websecure"];
service = "uptime-kuma";
tls.domains = [{main = "*.notohh.dev";}];
tls.certresolver = "production";
};
};
services = {
uptime-kuma.loadBalancer.servers = [{url = "http://100.87.54.48:4000";}];
};
};
};
staticConfigOptions = {
log.level = "DEBUG";
api.dashboard = false;
api.insecure = false;
global = {
checkNewVersion = false;
sendAnonymousUsage = false;
};
entryPoints = {
websecure = {
address = ":443";
};
web = {
address = ":80";
};
};
metrics = {
prometheus = {
addServicesLabels = true;
};
};
certificatesResolvers = {
staging.acme = {
email = "x3xr6n66@notohh.dev";
storage = "/var/lib/traefik/acme.json";
caServer = "https://acme-staging-v02.api.letsencrypt.org/directory";
dnsChallenge = {
provider = "cloudflare";
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
delayBeforeCheck = "0";
};
};
production.acme = {
email = "x3xr6n66@notohh.dev";
storage = "/var/lib/traefik/acme.json";
caServer = "https://acme-v02.api.letsencrypt.org/directory";
dnsChallenge = {
provider = "cloudflare";
resolvers = ["1.1.1.1:53" "1.0.0.1:53"];
delayBeforeCheck = "0";
};
};
};
};
};
}

View file

@ -1,5 +1,4 @@
_: {
networking.firewall.allowedTCPPorts = [4000];
services.uptime-kuma = {
enable = true;
settings = {