Compare commits
No commits in common. "da4f31287be4322f8bcc64abba2037de8f0a38c3" and "303a03518a8e9e3fe90676b640904e1fdbfa741a" have entirely different histories.
da4f31287b
...
303a03518a
|
@ -3,7 +3,3 @@ _traefik/tls
|
||||||
_traefik/shared
|
_traefik/shared
|
||||||
**/app.env
|
**/app.env
|
||||||
ddns-updater/config.json
|
ddns-updater/config.json
|
||||||
# This is will be a local sym-link
|
|
||||||
*.local.yml
|
|
||||||
*.local
|
|
||||||
local.*
|
|
||||||
|
|
|
@ -1,19 +0,0 @@
|
||||||
http:
|
|
||||||
middlewares:
|
|
||||||
authentik_sysmgr:
|
|
||||||
forwardAuth:
|
|
||||||
address: https://auth.shefet.net/outpost.goauthentik.io/auth/traefik
|
|
||||||
trustForwardHeader: true
|
|
||||||
authResponseHeadersRegex: "^[Xx]-[Aa]uthentik"
|
|
||||||
# authResponseHeaders:
|
|
||||||
# - X-authentik-username
|
|
||||||
# - X-authentik-groups
|
|
||||||
# - X-authentik-email
|
|
||||||
# - X-authentik-name
|
|
||||||
# - X-authentik-uid
|
|
||||||
# - X-authentik-jwt
|
|
||||||
# - X-authentik-meta-jwks
|
|
||||||
# - X-authentik-meta-outpost
|
|
||||||
# - X-authentik-meta-provider
|
|
||||||
# - X-authentik-meta-app
|
|
||||||
# - X-authentik-meta-version
|
|
|
@ -1,23 +0,0 @@
|
||||||
# http routing section
|
|
||||||
http:
|
|
||||||
routers:
|
|
||||||
# Define a connection between requests and services
|
|
||||||
"to-ha":
|
|
||||||
rule: "Host(`ha.shefet.net`)"
|
|
||||||
entrypoints:
|
|
||||||
- websecure
|
|
||||||
# # If the rule matches, applies the middleware
|
|
||||||
# middlewares:
|
|
||||||
# - test-user
|
|
||||||
# If the rule matches, forward to the whoami service (declared below)
|
|
||||||
service: home-assistant
|
|
||||||
tls:
|
|
||||||
certresolver: myresolver
|
|
||||||
|
|
||||||
services:
|
|
||||||
# Define how to reach an existing service on our infrastructure
|
|
||||||
home-assistant:
|
|
||||||
loadBalancer:
|
|
||||||
servers:
|
|
||||||
- url: "http://ha.lan:8123"
|
|
||||||
#- address: "ha.lan:8123"
|
|
|
@ -33,7 +33,7 @@ entryPoints:
|
||||||
certificatesResolvers:
|
certificatesResolvers:
|
||||||
myresolver:
|
myresolver:
|
||||||
acme:
|
acme:
|
||||||
# email: acme@thisprops.com
|
email: acme@thisprops.com
|
||||||
storage: /shared/acme.json
|
storage: /shared/acme.json
|
||||||
# httpChallenge:
|
# httpChallenge:
|
||||||
# entryPoint: web
|
# entryPoint: web
|
||||||
|
|
|
@ -15,14 +15,15 @@ services:
|
||||||
- vaultwarden_pg_dockge
|
- vaultwarden_pg_dockge
|
||||||
volumes:
|
volumes:
|
||||||
- /srv/vaultwarden/data:/data
|
- /srv/vaultwarden/data:/data
|
||||||
# labels:
|
labels:
|
||||||
# # Websecure
|
# Main
|
||||||
# traefik.http.routers.vaultwarden.middlewares: authentik_sysmgr@file
|
traefik.docker.network: runtipi_tipi_main_network
|
||||||
# traefik.http.routers.vaultwarden-more.rule: Host(`www.${ROOT_DOMAIN}`)${APP_ROUTE_OPTIONAL:-}
|
# # Websecure
|
||||||
# traefik.http.routers.vaultwarden-more.entrypoints: websecure
|
traefik.http.routers.vaultwarden-more.rule: Host(`vault.lksz.me`)${APP_ROUTE_OPTIONAL:-}
|
||||||
# traefik.http.routers.vaultwarden-more.service: vaultwarden
|
traefik.http.routers.vaultwarden-more.entrypoints: websecure
|
||||||
# traefik.http.routers.vaultwarden-more.tls: true
|
traefik.http.routers.vaultwarden-more.service: vaultwarden
|
||||||
# traefik.http.routers.vaultwarden-more.tls.certresolver: myresolver
|
traefik.http.routers.vaultwarden-more.tls: true
|
||||||
|
traefik.http.routers.vaultwarden-more.tls.certresolver: myresolver
|
||||||
networks:
|
networks:
|
||||||
vaultwarden_pg_dockge:
|
vaultwarden_pg_dockge:
|
||||||
external: true
|
external: true
|
||||||
|
|
Loading…
Reference in New Issue