Compare commits
2 Commits
303a03518a
...
da4f31287b
Author | SHA1 | Date |
---|---|---|
Lockszmith (runtipi@wolfpack) | da4f31287b | |
Lockszmith (runtipi@wolfpack) | 990ad02fa7 |
|
@ -3,3 +3,7 @@ _traefik/tls
|
|||
_traefik/shared
|
||||
**/app.env
|
||||
ddns-updater/config.json
|
||||
# This is will be a local sym-link
|
||||
*.local.yml
|
||||
*.local
|
||||
local.*
|
||||
|
|
|
@ -0,0 +1,19 @@
|
|||
http:
|
||||
middlewares:
|
||||
authentik_sysmgr:
|
||||
forwardAuth:
|
||||
address: https://auth.shefet.net/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeadersRegex: "^[Xx]-[Aa]uthentik"
|
||||
# authResponseHeaders:
|
||||
# - X-authentik-username
|
||||
# - X-authentik-groups
|
||||
# - X-authentik-email
|
||||
# - X-authentik-name
|
||||
# - X-authentik-uid
|
||||
# - X-authentik-jwt
|
||||
# - X-authentik-meta-jwks
|
||||
# - X-authentik-meta-outpost
|
||||
# - X-authentik-meta-provider
|
||||
# - X-authentik-meta-app
|
||||
# - X-authentik-meta-version
|
|
@ -0,0 +1,23 @@
|
|||
# http routing section
|
||||
http:
|
||||
routers:
|
||||
# Define a connection between requests and services
|
||||
"to-ha":
|
||||
rule: "Host(`ha.shefet.net`)"
|
||||
entrypoints:
|
||||
- websecure
|
||||
# # If the rule matches, applies the middleware
|
||||
# middlewares:
|
||||
# - test-user
|
||||
# If the rule matches, forward to the whoami service (declared below)
|
||||
service: home-assistant
|
||||
tls:
|
||||
certresolver: myresolver
|
||||
|
||||
services:
|
||||
# Define how to reach an existing service on our infrastructure
|
||||
home-assistant:
|
||||
loadBalancer:
|
||||
servers:
|
||||
- url: "http://ha.lan:8123"
|
||||
#- address: "ha.lan:8123"
|
|
@ -33,7 +33,7 @@ entryPoints:
|
|||
certificatesResolvers:
|
||||
myresolver:
|
||||
acme:
|
||||
email: acme@thisprops.com
|
||||
# email: acme@thisprops.com
|
||||
storage: /shared/acme.json
|
||||
# httpChallenge:
|
||||
# entryPoint: web
|
||||
|
|
|
@ -15,15 +15,14 @@ services:
|
|||
- vaultwarden_pg_dockge
|
||||
volumes:
|
||||
- /srv/vaultwarden/data:/data
|
||||
labels:
|
||||
# Main
|
||||
traefik.docker.network: runtipi_tipi_main_network
|
||||
# labels:
|
||||
# # Websecure
|
||||
traefik.http.routers.vaultwarden-more.rule: Host(`vault.lksz.me`)${APP_ROUTE_OPTIONAL:-}
|
||||
traefik.http.routers.vaultwarden-more.entrypoints: websecure
|
||||
traefik.http.routers.vaultwarden-more.service: vaultwarden
|
||||
traefik.http.routers.vaultwarden-more.tls: true
|
||||
traefik.http.routers.vaultwarden-more.tls.certresolver: myresolver
|
||||
# traefik.http.routers.vaultwarden.middlewares: authentik_sysmgr@file
|
||||
# traefik.http.routers.vaultwarden-more.rule: Host(`www.${ROOT_DOMAIN}`)${APP_ROUTE_OPTIONAL:-}
|
||||
# traefik.http.routers.vaultwarden-more.entrypoints: websecure
|
||||
# traefik.http.routers.vaultwarden-more.service: vaultwarden
|
||||
# traefik.http.routers.vaultwarden-more.tls: true
|
||||
# traefik.http.routers.vaultwarden-more.tls.certresolver: myresolver
|
||||
networks:
|
||||
vaultwarden_pg_dockge:
|
||||
external: true
|
||||
|
|
Loading…
Reference in New Issue