Update domain
This commit is contained in:
parent
5735912ffc
commit
1e27bfa170
@ -45,7 +45,7 @@ job "authelia" {
|
||||
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.authelia.rule=Host(`auth.arsenm.dev`)",
|
||||
"traefik.http.routers.authelia.rule=Host(`auth.elara.ws`)",
|
||||
"traefik.http.routers.authelia.tls.certResolver=letsencrypt",
|
||||
]
|
||||
}
|
||||
|
@ -48,7 +48,7 @@ job "gitea" {
|
||||
RUN_MODE = "prod"
|
||||
SSH_DOMAIN = "CHANGE ME"
|
||||
SSH_PORT = "$NOMAD_PORT_ssh"
|
||||
ROOT_URL = "https://gitea.arsenm.dev/"
|
||||
ROOT_URL = "https://gitea.elara.ws/"
|
||||
USER_UID = "1002"
|
||||
USER_GID = "1002"
|
||||
GITEA__server__START_SSH_SERVER = "true"
|
||||
@ -65,7 +65,7 @@ job "gitea" {
|
||||
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.gitea.rule=Host(`gitea.arsenm.dev`)",
|
||||
"traefik.http.routers.gitea.rule=Host(`gitea.elara.ws`)",
|
||||
"traefik.http.routers.gitea.tls.certResolver=letsencrypt"
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
# Go Import Redirector
|
||||
|
||||
This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.arsenm.dev/Arsen6331/itd@latest`, they can just use `go install go.arsenm.dev/itd@latest` and this service will redirect them.
|
||||
This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.elara.ws/Arsen6331/itd@latest`, they can just use `go install go.elara.ws/itd@latest` and this service will redirect them.
|
||||
|
||||
This job file downloads an archive containing `go-import-redirector` executables for `x86_64` and `aarch64`, as well as a script that runs the correct one, from my minio instance.
|
||||
|
||||
|
@ -17,13 +17,13 @@ job "go-import-redirector" {
|
||||
command = "local/exec.sh"
|
||||
args = [
|
||||
"-addr", ":${NOMAD_PORT_http}",
|
||||
"go.arsenm.dev/*",
|
||||
"https://gitea.arsenm.dev/Arsen6331/*"
|
||||
"go.elara.ws/*",
|
||||
"https://gitea.elara.ws/Arsen6331/*"
|
||||
]
|
||||
}
|
||||
|
||||
artifact {
|
||||
source = "https://api.minio.arsenm.dev/adl/go-import-redirector.tar.gz"
|
||||
source = "https://api.minio.elara.ws/adl/go-import-redirector.tar.gz"
|
||||
}
|
||||
|
||||
resources {
|
||||
@ -37,7 +37,7 @@ job "go-import-redirector" {
|
||||
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.go-import-redirector.rule=Host(`go.arsenm.dev`)",
|
||||
"traefik.http.routers.go-import-redirector.rule=Host(`go.elara.ws`)",
|
||||
"traefik.http.routers.go-import-redirector.tls.certResolver=letsencrypt"
|
||||
]
|
||||
}
|
||||
|
@ -2,4 +2,4 @@
|
||||
|
||||
This is the nomad job file I use for the [Homer](https://github.com/bastienwirtz/homer/) dashboard. It takes its config file from the Consul Key/Value store. This means that whenever the config is edited, Nomad automatically installs the new file and restarts the container. It also means that Homer is completely stateless, and therefore can be freely moved around by Nomad.
|
||||
|
||||
This directory also contains the config I use for my dashboard at https://dashboard.arsenm.dev. This is placed into the Consul K/V store as `homer/config.yml`.
|
||||
This directory also contains the config I use for my dashboard at https://dashboard.elara.ws. This is placed into the Consul K/V store as `homer/config.yml`.
|
@ -35,27 +35,27 @@ services:
|
||||
- name: "SearXNG"
|
||||
icon: "fa-solid fa-magnifying-glass"
|
||||
subtitle: "Metasearch engine"
|
||||
url: "https://search.arsenm.dev/"
|
||||
url: "https://search.elara.ws/"
|
||||
- name: "Nextcloud"
|
||||
icon: "fa-solid fa-cloud"
|
||||
subtitle: "Cloud file storage"
|
||||
url: "https://nextcloud.arsenm.dev/"
|
||||
url: "https://nextcloud.elara.ws/"
|
||||
- name: "Home Assistant"
|
||||
icon: "fa-solid fa-house"
|
||||
subtitle: "Home automation hub"
|
||||
url: "https://hass.arsenm.dev/"
|
||||
url: "https://hass.elara.ws/"
|
||||
- name: "Gitea"
|
||||
icon: "fa-solid fa-code-branch"
|
||||
subtitle: "Web interface for Git"
|
||||
url: "https://gitea.arsenm.dev/"
|
||||
url: "https://gitea.elara.ws/"
|
||||
- name: "Minio"
|
||||
icon: "fa-solid fa-box"
|
||||
subtitle: "Open source S3 implementation"
|
||||
url: "https://minio.arsenm.dev/"
|
||||
url: "https://minio.elara.ws/"
|
||||
- name: "LMS"
|
||||
icon: "fa-solid fa-music"
|
||||
subtitle: "Lightweight music server"
|
||||
url: "https://music.arsenm.dev/"
|
||||
url: "https://music.elara.ws/"
|
||||
- name: "Piracy"
|
||||
icon: "fa-solid fa-skull-crossbones"
|
||||
items:
|
||||
@ -73,12 +73,12 @@ services:
|
||||
- name: "Traefik"
|
||||
icon: "fa fa-globe"
|
||||
subtitle: "Reverse proxy"
|
||||
url: "https://traefik.arsenm.dev/"
|
||||
url: "https://traefik.elara.ws/"
|
||||
- name: "Nomad"
|
||||
icon: "fa-solid fa-circle-nodes"
|
||||
subtitle: "Cluster orchestrator"
|
||||
url: "https://nomad.arsenm.dev/"
|
||||
url: "https://nomad.elara.ws/"
|
||||
- name: "Consul"
|
||||
icon: "fa-solid fa-database"
|
||||
subtitle: "Service discovery and K/V store"
|
||||
url: "https://consul.arsenm.dev/"
|
||||
url: "https://consul.elara.ws/"
|
@ -37,7 +37,7 @@ job "homer" {
|
||||
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.homer.rule=Host(`dashboard.arsenm.dev`)",
|
||||
"traefik.http.routers.homer.rule=Host(`dashboard.elara.ws`)",
|
||||
"traefik.http.routers.homer.tls.certResolver=letsencrypt",
|
||||
]
|
||||
}
|
||||
|
@ -50,7 +50,7 @@ job "lms" {
|
||||
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.lms.rule=Host(`music.arsenm.dev`)",
|
||||
"traefik.http.routers.lms.rule=Host(`music.elara.ws`)",
|
||||
"traefik.http.routers.lms.tls.certResolver=letsencrypt",
|
||||
]
|
||||
}
|
||||
|
@ -1,6 +1,6 @@
|
||||
# LURE Web
|
||||
|
||||
This nomad file is for one of my other projects, [LURE](https://gitea.arsenm.dev/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.arsenm.dev) and its backend API server.
|
||||
This nomad file is for one of my other projects, [LURE](https://gitea.elara.ws/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.elara.ws) and its backend API server.
|
||||
|
||||
This job requires no volumes. The only thing that needs to be changed is the Github API secret. This is for a Github webhook, so that the API server knows when the LURE repo changes so it can update its database.
|
||||
|
||||
|
@ -31,7 +31,7 @@ job "lure-web" {
|
||||
port = "api"
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.lure-api-server.rule=Host(`api.lure.arsenm.dev`)",
|
||||
"traefik.http.routers.lure-api-server.rule=Host(`api.lure.elara.ws`)",
|
||||
"traefik.http.routers.lure-api-server.tls.certresolver=letsencrypt"
|
||||
]
|
||||
|
||||
@ -58,7 +58,7 @@ job "lure-web" {
|
||||
port = "http"
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.lure-web.rule=Host(`lure.arsenm.dev`)",
|
||||
"traefik.http.routers.lure-web.rule=Host(`lure.elara.ws`)",
|
||||
"traefik.http.routers.lure-web.tls.certresolver=letsencrypt",
|
||||
]
|
||||
}
|
||||
|
@ -45,7 +45,7 @@ job "minio" {
|
||||
name = "minio"
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.minio.rule=Host(`minio.arsenm.dev`)",
|
||||
"traefik.http.routers.minio.rule=Host(`minio.elara.ws`)",
|
||||
"traefik.http.routers.minio.tls.certResolver=letsencrypt"
|
||||
]
|
||||
|
||||
@ -66,7 +66,7 @@ job "minio" {
|
||||
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.minio-api.rule=Host(`api.minio.arsenm.dev`)",
|
||||
"traefik.http.routers.minio-api.rule=Host(`api.minio.elara.ws`)",
|
||||
"traefik.http.routers.minio-api.tls.certResolver=letsencrypt"
|
||||
]
|
||||
}
|
||||
|
@ -33,7 +33,7 @@ job "nextcloud" {
|
||||
env {
|
||||
NEXTCLOUD_ADMIN_USER = "CHANGE ME"
|
||||
NEXTCLOUD_ADMIN_PASSWORD = "CHANGE ME"
|
||||
NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.arsenm.dev"
|
||||
NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.elara.ws"
|
||||
}
|
||||
|
||||
volume_mount {
|
||||
@ -52,7 +52,7 @@ job "nextcloud" {
|
||||
port = "http"
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.nextcloud.rule=Host(`nextcloud.arsenm.dev`)",
|
||||
"traefik.http.routers.nextcloud.rule=Host(`nextcloud.elara.ws`)",
|
||||
"traefik.http.routers.nextcloud.tls.certresolver=letsencrypt"
|
||||
]
|
||||
|
||||
@ -112,7 +112,7 @@ job "nextcloud" {
|
||||
port = "onlyoffice-http"
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.arsenm.dev`)",
|
||||
"traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.elara.ws`)",
|
||||
"traefik.http.routers.onlyoffice.tls.certresolver=letsencrypt",
|
||||
"traefik.http.routers.onlyoffice.middlewares=onlyoffice-headers",
|
||||
"traefik.http.middlewares.onlyoffice-headers.headers.customrequestheaders.X-Forwarded-Proto=https"
|
||||
|
@ -15,7 +15,7 @@ job "searxng" {
|
||||
|
||||
env {
|
||||
BIND_ADDRESS = "0.0.0.0:${NOMAD_PORT_searx}"
|
||||
SEARXNG_BASE_URL = "https://search.arsenm.dev"
|
||||
SEARXNG_BASE_URL = "https://search.elara.ws"
|
||||
SEARXNG_SECRET = "CHANGE ME"
|
||||
}
|
||||
|
||||
@ -39,7 +39,7 @@ job "searxng" {
|
||||
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.searxng.rule=Host(`search.arsenm.dev`)",
|
||||
"traefik.http.routers.searxng.rule=Host(`search.elara.ws`)",
|
||||
"traefik.http.routers.searxng.tls.certResolver=letsencrypt",
|
||||
"traefik.http.routers.searxng.middlewares=searxng-headers",
|
||||
"traefik.http.middlewares.searxng-headers.headers.customrequestheaders.X-Robots-Tag=noindex, noarchive, nofollow"
|
||||
|
@ -43,12 +43,12 @@ job "traefik" {
|
||||
"traefik.http.routers.http-catchall.middlewares=https-redirect",
|
||||
|
||||
// Forward requests to protected services to Authelia. Remove this if not running Authelia.
|
||||
"traefik.http.middlewares.authelia.forwardauth.address=http://<authelia address>/api/verify?rd=https://auth.arsenm.dev/",
|
||||
"traefik.http.middlewares.authelia.forwardauth.address=http://<authelia address>/api/verify?rd=https://auth.elara.ws/",
|
||||
"traefik.http.middlewares.authelia.forwardauth.trustforwardheader=true",
|
||||
"traefik.http.middlewares.authelia.forwardauth.authresponseheaders=Remote-User, Remote-Groups",
|
||||
|
||||
// Expose Traefik API with authentication. Remove this if not running Authelia.
|
||||
"traefik.http.routers.traefik.rule=Host(`traefik.arsenm.dev`)",
|
||||
"traefik.http.routers.traefik.rule=Host(`traefik.elara.ws`)",
|
||||
"traefik.http.routers.traefik.tls.certResolver=letsencrypt",
|
||||
"traefik.http.routers.traefik.middlewares=authelia",
|
||||
]
|
||||
|
@ -43,9 +43,9 @@ job "woodpecker" {
|
||||
|
||||
env {
|
||||
WOODPECKER_OPEN = "true"
|
||||
WOODPECKER_HOST = "https://ci.arsenm.dev"
|
||||
WOODPECKER_HOST = "https://ci.elara.ws"
|
||||
WOODPECKER_GITEA = "true"
|
||||
WOODPECKER_GITEA_URL = "https://gitea.arsenm.dev"
|
||||
WOODPECKER_GITEA_URL = "https://gitea.elara.ws"
|
||||
WOODPECKER_GITEA_CLIENT = "CHANGE ME"
|
||||
WOODPECKER_GITEA_SECRET = "CHANGE ME"
|
||||
WOODPECKER_AGENT_SECRET = "CHANGE ME"
|
||||
@ -57,7 +57,7 @@ job "woodpecker" {
|
||||
|
||||
tags = [
|
||||
"traefik.enable=true",
|
||||
"traefik.http.routers.woodpecker-ci.rule=Host(`ci.arsenm.dev`)",
|
||||
"traefik.http.routers.woodpecker-ci.rule=Host(`ci.elara.ws`)",
|
||||
"traefik.http.routers.woodpecker-ci.tls.certResolver=letsencrypt"
|
||||
]
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user