Compare commits

..

2 Commits

Author SHA1 Message Date
Lockszmith (runtipi@wolfpack) da4f31287b cleanup vaultwarden's compose 2024-12-13 10:55:30 -05:00
Lockszmith (runtipi@wolfpack) 990ad02fa7 Modify local traefik configs 2024-12-13 10:54:22 -05:00
7 changed files with 55 additions and 10 deletions

4
.gitignore vendored
View File

@ -3,3 +3,7 @@ _traefik/tls
_traefik/shared _traefik/shared
**/app.env **/app.env
ddns-updater/config.json ddns-updater/config.json
# This is will be a local sym-link
*.local.yml
*.local
local.*

View File

@ -0,0 +1,19 @@
http:
middlewares:
authentik_sysmgr:
forwardAuth:
address: https://auth.shefet.net/outpost.goauthentik.io/auth/traefik
trustForwardHeader: true
authResponseHeadersRegex: "^[Xx]-[Aa]uthentik"
# authResponseHeaders:
# - X-authentik-username
# - X-authentik-groups
# - X-authentik-email
# - X-authentik-name
# - X-authentik-uid
# - X-authentik-jwt
# - X-authentik-meta-jwks
# - X-authentik-meta-outpost
# - X-authentik-meta-provider
# - X-authentik-meta-app
# - X-authentik-meta-version

View File

@ -0,0 +1,23 @@
# http routing section
http:
routers:
# Define a connection between requests and services
"to-ha":
rule: "Host(`ha.shefet.net`)"
entrypoints:
- websecure
# # If the rule matches, applies the middleware
# middlewares:
# - test-user
# If the rule matches, forward to the whoami service (declared below)
service: home-assistant
tls:
certresolver: myresolver
services:
# Define how to reach an existing service on our infrastructure
home-assistant:
loadBalancer:
servers:
- url: "http://ha.lan:8123"
#- address: "ha.lan:8123"

View File

@ -33,7 +33,7 @@ entryPoints:
certificatesResolvers: certificatesResolvers:
myresolver: myresolver:
acme: acme:
email: acme@thisprops.com # email: acme@thisprops.com
storage: /shared/acme.json storage: /shared/acme.json
# httpChallenge: # httpChallenge:
# entryPoint: web # entryPoint: web

View File

@ -15,15 +15,14 @@ services:
- vaultwarden_pg_dockge - vaultwarden_pg_dockge
volumes: volumes:
- /srv/vaultwarden/data:/data - /srv/vaultwarden/data:/data
labels: # labels:
# Main # # Websecure
traefik.docker.network: runtipi_tipi_main_network # traefik.http.routers.vaultwarden.middlewares: authentik_sysmgr@file
# # Websecure # traefik.http.routers.vaultwarden-more.rule: Host(`www.${ROOT_DOMAIN}`)${APP_ROUTE_OPTIONAL:-}
traefik.http.routers.vaultwarden-more.rule: Host(`vault.lksz.me`)${APP_ROUTE_OPTIONAL:-} # traefik.http.routers.vaultwarden-more.entrypoints: websecure
traefik.http.routers.vaultwarden-more.entrypoints: websecure # traefik.http.routers.vaultwarden-more.service: vaultwarden
traefik.http.routers.vaultwarden-more.service: vaultwarden # traefik.http.routers.vaultwarden-more.tls: true
traefik.http.routers.vaultwarden-more.tls: true # traefik.http.routers.vaultwarden-more.tls.certresolver: myresolver
traefik.http.routers.vaultwarden-more.tls.certresolver: myresolver
networks: networks:
vaultwarden_pg_dockge: vaultwarden_pg_dockge:
external: true external: true