Compare commits

..

No commits in common. "da4f31287be4322f8bcc64abba2037de8f0a38c3" and "303a03518a8e9e3fe90676b640904e1fdbfa741a" have entirely different histories.

7 changed files with 10 additions and 55 deletions

4
.gitignore vendored
View File

@ -3,7 +3,3 @@ _traefik/tls
_traefik/shared _traefik/shared
**/app.env **/app.env
ddns-updater/config.json ddns-updater/config.json
# This is will be a local sym-link
*.local.yml
*.local
local.*

View File

@ -1,19 +0,0 @@
http:
middlewares:
authentik_sysmgr:
forwardAuth:
address: https://auth.shefet.net/outpost.goauthentik.io/auth/traefik
trustForwardHeader: true
authResponseHeadersRegex: "^[Xx]-[Aa]uthentik"
# authResponseHeaders:
# - X-authentik-username
# - X-authentik-groups
# - X-authentik-email
# - X-authentik-name
# - X-authentik-uid
# - X-authentik-jwt
# - X-authentik-meta-jwks
# - X-authentik-meta-outpost
# - X-authentik-meta-provider
# - X-authentik-meta-app
# - X-authentik-meta-version

View File

@ -1,23 +0,0 @@
# http routing section
http:
routers:
# Define a connection between requests and services
"to-ha":
rule: "Host(`ha.shefet.net`)"
entrypoints:
- websecure
# # If the rule matches, applies the middleware
# middlewares:
# - test-user
# If the rule matches, forward to the whoami service (declared below)
service: home-assistant
tls:
certresolver: myresolver
services:
# Define how to reach an existing service on our infrastructure
home-assistant:
loadBalancer:
servers:
- url: "http://ha.lan:8123"
#- address: "ha.lan:8123"

View File

@ -33,7 +33,7 @@ entryPoints:
certificatesResolvers: certificatesResolvers:
myresolver: myresolver:
acme: acme:
# email: acme@thisprops.com email: acme@thisprops.com
storage: /shared/acme.json storage: /shared/acme.json
# httpChallenge: # httpChallenge:
# entryPoint: web # entryPoint: web

View File

@ -15,14 +15,15 @@ services:
- vaultwarden_pg_dockge - vaultwarden_pg_dockge
volumes: volumes:
- /srv/vaultwarden/data:/data - /srv/vaultwarden/data:/data
# labels: labels:
# # Websecure # Main
# traefik.http.routers.vaultwarden.middlewares: authentik_sysmgr@file traefik.docker.network: runtipi_tipi_main_network
# traefik.http.routers.vaultwarden-more.rule: Host(`www.${ROOT_DOMAIN}`)${APP_ROUTE_OPTIONAL:-} # # Websecure
# traefik.http.routers.vaultwarden-more.entrypoints: websecure traefik.http.routers.vaultwarden-more.rule: Host(`vault.lksz.me`)${APP_ROUTE_OPTIONAL:-}
# traefik.http.routers.vaultwarden-more.service: vaultwarden traefik.http.routers.vaultwarden-more.entrypoints: websecure
# traefik.http.routers.vaultwarden-more.tls: true traefik.http.routers.vaultwarden-more.service: vaultwarden
# traefik.http.routers.vaultwarden-more.tls.certresolver: myresolver traefik.http.routers.vaultwarden-more.tls: true
traefik.http.routers.vaultwarden-more.tls.certresolver: myresolver
networks: networks:
vaultwarden_pg_dockge: vaultwarden_pg_dockge:
external: true external: true