Update domain
This commit is contained in:
parent
5735912ffc
commit
1e27bfa170
@ -45,7 +45,7 @@ job "authelia" {
|
|||||||
|
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.authelia.rule=Host(`auth.arsenm.dev`)",
|
"traefik.http.routers.authelia.rule=Host(`auth.elara.ws`)",
|
||||||
"traefik.http.routers.authelia.tls.certResolver=letsencrypt",
|
"traefik.http.routers.authelia.tls.certResolver=letsencrypt",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -48,7 +48,7 @@ job "gitea" {
|
|||||||
RUN_MODE = "prod"
|
RUN_MODE = "prod"
|
||||||
SSH_DOMAIN = "CHANGE ME"
|
SSH_DOMAIN = "CHANGE ME"
|
||||||
SSH_PORT = "$NOMAD_PORT_ssh"
|
SSH_PORT = "$NOMAD_PORT_ssh"
|
||||||
ROOT_URL = "https://gitea.arsenm.dev/"
|
ROOT_URL = "https://gitea.elara.ws/"
|
||||||
USER_UID = "1002"
|
USER_UID = "1002"
|
||||||
USER_GID = "1002"
|
USER_GID = "1002"
|
||||||
GITEA__server__START_SSH_SERVER = "true"
|
GITEA__server__START_SSH_SERVER = "true"
|
||||||
@ -65,7 +65,7 @@ job "gitea" {
|
|||||||
|
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.gitea.rule=Host(`gitea.arsenm.dev`)",
|
"traefik.http.routers.gitea.rule=Host(`gitea.elara.ws`)",
|
||||||
"traefik.http.routers.gitea.tls.certResolver=letsencrypt"
|
"traefik.http.routers.gitea.tls.certResolver=letsencrypt"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# Go Import Redirector
|
# Go Import Redirector
|
||||||
|
|
||||||
This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.arsenm.dev/Arsen6331/itd@latest`, they can just use `go install go.arsenm.dev/itd@latest` and this service will redirect them.
|
This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.elara.ws/Arsen6331/itd@latest`, they can just use `go install go.elara.ws/itd@latest` and this service will redirect them.
|
||||||
|
|
||||||
This job file downloads an archive containing `go-import-redirector` executables for `x86_64` and `aarch64`, as well as a script that runs the correct one, from my minio instance.
|
This job file downloads an archive containing `go-import-redirector` executables for `x86_64` and `aarch64`, as well as a script that runs the correct one, from my minio instance.
|
||||||
|
|
||||||
|
@ -17,13 +17,13 @@ job "go-import-redirector" {
|
|||||||
command = "local/exec.sh"
|
command = "local/exec.sh"
|
||||||
args = [
|
args = [
|
||||||
"-addr", ":${NOMAD_PORT_http}",
|
"-addr", ":${NOMAD_PORT_http}",
|
||||||
"go.arsenm.dev/*",
|
"go.elara.ws/*",
|
||||||
"https://gitea.arsenm.dev/Arsen6331/*"
|
"https://gitea.elara.ws/Arsen6331/*"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
artifact {
|
artifact {
|
||||||
source = "https://api.minio.arsenm.dev/adl/go-import-redirector.tar.gz"
|
source = "https://api.minio.elara.ws/adl/go-import-redirector.tar.gz"
|
||||||
}
|
}
|
||||||
|
|
||||||
resources {
|
resources {
|
||||||
@ -37,7 +37,7 @@ job "go-import-redirector" {
|
|||||||
|
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.go-import-redirector.rule=Host(`go.arsenm.dev`)",
|
"traefik.http.routers.go-import-redirector.rule=Host(`go.elara.ws`)",
|
||||||
"traefik.http.routers.go-import-redirector.tls.certResolver=letsencrypt"
|
"traefik.http.routers.go-import-redirector.tls.certResolver=letsencrypt"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,4 +2,4 @@
|
|||||||
|
|
||||||
This is the nomad job file I use for the [Homer](https://github.com/bastienwirtz/homer/) dashboard. It takes its config file from the Consul Key/Value store. This means that whenever the config is edited, Nomad automatically installs the new file and restarts the container. It also means that Homer is completely stateless, and therefore can be freely moved around by Nomad.
|
This is the nomad job file I use for the [Homer](https://github.com/bastienwirtz/homer/) dashboard. It takes its config file from the Consul Key/Value store. This means that whenever the config is edited, Nomad automatically installs the new file and restarts the container. It also means that Homer is completely stateless, and therefore can be freely moved around by Nomad.
|
||||||
|
|
||||||
This directory also contains the config I use for my dashboard at https://dashboard.arsenm.dev. This is placed into the Consul K/V store as `homer/config.yml`.
|
This directory also contains the config I use for my dashboard at https://dashboard.elara.ws. This is placed into the Consul K/V store as `homer/config.yml`.
|
@ -35,27 +35,27 @@ services:
|
|||||||
- name: "SearXNG"
|
- name: "SearXNG"
|
||||||
icon: "fa-solid fa-magnifying-glass"
|
icon: "fa-solid fa-magnifying-glass"
|
||||||
subtitle: "Metasearch engine"
|
subtitle: "Metasearch engine"
|
||||||
url: "https://search.arsenm.dev/"
|
url: "https://search.elara.ws/"
|
||||||
- name: "Nextcloud"
|
- name: "Nextcloud"
|
||||||
icon: "fa-solid fa-cloud"
|
icon: "fa-solid fa-cloud"
|
||||||
subtitle: "Cloud file storage"
|
subtitle: "Cloud file storage"
|
||||||
url: "https://nextcloud.arsenm.dev/"
|
url: "https://nextcloud.elara.ws/"
|
||||||
- name: "Home Assistant"
|
- name: "Home Assistant"
|
||||||
icon: "fa-solid fa-house"
|
icon: "fa-solid fa-house"
|
||||||
subtitle: "Home automation hub"
|
subtitle: "Home automation hub"
|
||||||
url: "https://hass.arsenm.dev/"
|
url: "https://hass.elara.ws/"
|
||||||
- name: "Gitea"
|
- name: "Gitea"
|
||||||
icon: "fa-solid fa-code-branch"
|
icon: "fa-solid fa-code-branch"
|
||||||
subtitle: "Web interface for Git"
|
subtitle: "Web interface for Git"
|
||||||
url: "https://gitea.arsenm.dev/"
|
url: "https://gitea.elara.ws/"
|
||||||
- name: "Minio"
|
- name: "Minio"
|
||||||
icon: "fa-solid fa-box"
|
icon: "fa-solid fa-box"
|
||||||
subtitle: "Open source S3 implementation"
|
subtitle: "Open source S3 implementation"
|
||||||
url: "https://minio.arsenm.dev/"
|
url: "https://minio.elara.ws/"
|
||||||
- name: "LMS"
|
- name: "LMS"
|
||||||
icon: "fa-solid fa-music"
|
icon: "fa-solid fa-music"
|
||||||
subtitle: "Lightweight music server"
|
subtitle: "Lightweight music server"
|
||||||
url: "https://music.arsenm.dev/"
|
url: "https://music.elara.ws/"
|
||||||
- name: "Piracy"
|
- name: "Piracy"
|
||||||
icon: "fa-solid fa-skull-crossbones"
|
icon: "fa-solid fa-skull-crossbones"
|
||||||
items:
|
items:
|
||||||
@ -73,12 +73,12 @@ services:
|
|||||||
- name: "Traefik"
|
- name: "Traefik"
|
||||||
icon: "fa fa-globe"
|
icon: "fa fa-globe"
|
||||||
subtitle: "Reverse proxy"
|
subtitle: "Reverse proxy"
|
||||||
url: "https://traefik.arsenm.dev/"
|
url: "https://traefik.elara.ws/"
|
||||||
- name: "Nomad"
|
- name: "Nomad"
|
||||||
icon: "fa-solid fa-circle-nodes"
|
icon: "fa-solid fa-circle-nodes"
|
||||||
subtitle: "Cluster orchestrator"
|
subtitle: "Cluster orchestrator"
|
||||||
url: "https://nomad.arsenm.dev/"
|
url: "https://nomad.elara.ws/"
|
||||||
- name: "Consul"
|
- name: "Consul"
|
||||||
icon: "fa-solid fa-database"
|
icon: "fa-solid fa-database"
|
||||||
subtitle: "Service discovery and K/V store"
|
subtitle: "Service discovery and K/V store"
|
||||||
url: "https://consul.arsenm.dev/"
|
url: "https://consul.elara.ws/"
|
@ -37,7 +37,7 @@ job "homer" {
|
|||||||
|
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.homer.rule=Host(`dashboard.arsenm.dev`)",
|
"traefik.http.routers.homer.rule=Host(`dashboard.elara.ws`)",
|
||||||
"traefik.http.routers.homer.tls.certResolver=letsencrypt",
|
"traefik.http.routers.homer.tls.certResolver=letsencrypt",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -50,7 +50,7 @@ job "lms" {
|
|||||||
|
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.lms.rule=Host(`music.arsenm.dev`)",
|
"traefik.http.routers.lms.rule=Host(`music.elara.ws`)",
|
||||||
"traefik.http.routers.lms.tls.certResolver=letsencrypt",
|
"traefik.http.routers.lms.tls.certResolver=letsencrypt",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
# LURE Web
|
# LURE Web
|
||||||
|
|
||||||
This nomad file is for one of my other projects, [LURE](https://gitea.arsenm.dev/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.arsenm.dev) and its backend API server.
|
This nomad file is for one of my other projects, [LURE](https://gitea.elara.ws/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.elara.ws) and its backend API server.
|
||||||
|
|
||||||
This job requires no volumes. The only thing that needs to be changed is the Github API secret. This is for a Github webhook, so that the API server knows when the LURE repo changes so it can update its database.
|
This job requires no volumes. The only thing that needs to be changed is the Github API secret. This is for a Github webhook, so that the API server knows when the LURE repo changes so it can update its database.
|
||||||
|
|
||||||
|
@ -31,7 +31,7 @@ job "lure-web" {
|
|||||||
port = "api"
|
port = "api"
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.lure-api-server.rule=Host(`api.lure.arsenm.dev`)",
|
"traefik.http.routers.lure-api-server.rule=Host(`api.lure.elara.ws`)",
|
||||||
"traefik.http.routers.lure-api-server.tls.certresolver=letsencrypt"
|
"traefik.http.routers.lure-api-server.tls.certresolver=letsencrypt"
|
||||||
]
|
]
|
||||||
|
|
||||||
@ -58,7 +58,7 @@ job "lure-web" {
|
|||||||
port = "http"
|
port = "http"
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.lure-web.rule=Host(`lure.arsenm.dev`)",
|
"traefik.http.routers.lure-web.rule=Host(`lure.elara.ws`)",
|
||||||
"traefik.http.routers.lure-web.tls.certresolver=letsencrypt",
|
"traefik.http.routers.lure-web.tls.certresolver=letsencrypt",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -45,7 +45,7 @@ job "minio" {
|
|||||||
name = "minio"
|
name = "minio"
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.minio.rule=Host(`minio.arsenm.dev`)",
|
"traefik.http.routers.minio.rule=Host(`minio.elara.ws`)",
|
||||||
"traefik.http.routers.minio.tls.certResolver=letsencrypt"
|
"traefik.http.routers.minio.tls.certResolver=letsencrypt"
|
||||||
]
|
]
|
||||||
|
|
||||||
@ -66,7 +66,7 @@ job "minio" {
|
|||||||
|
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.minio-api.rule=Host(`api.minio.arsenm.dev`)",
|
"traefik.http.routers.minio-api.rule=Host(`api.minio.elara.ws`)",
|
||||||
"traefik.http.routers.minio-api.tls.certResolver=letsencrypt"
|
"traefik.http.routers.minio-api.tls.certResolver=letsencrypt"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -33,7 +33,7 @@ job "nextcloud" {
|
|||||||
env {
|
env {
|
||||||
NEXTCLOUD_ADMIN_USER = "CHANGE ME"
|
NEXTCLOUD_ADMIN_USER = "CHANGE ME"
|
||||||
NEXTCLOUD_ADMIN_PASSWORD = "CHANGE ME"
|
NEXTCLOUD_ADMIN_PASSWORD = "CHANGE ME"
|
||||||
NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.arsenm.dev"
|
NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.elara.ws"
|
||||||
}
|
}
|
||||||
|
|
||||||
volume_mount {
|
volume_mount {
|
||||||
@ -52,7 +52,7 @@ job "nextcloud" {
|
|||||||
port = "http"
|
port = "http"
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.nextcloud.rule=Host(`nextcloud.arsenm.dev`)",
|
"traefik.http.routers.nextcloud.rule=Host(`nextcloud.elara.ws`)",
|
||||||
"traefik.http.routers.nextcloud.tls.certresolver=letsencrypt"
|
"traefik.http.routers.nextcloud.tls.certresolver=letsencrypt"
|
||||||
]
|
]
|
||||||
|
|
||||||
@ -112,7 +112,7 @@ job "nextcloud" {
|
|||||||
port = "onlyoffice-http"
|
port = "onlyoffice-http"
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.arsenm.dev`)",
|
"traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.elara.ws`)",
|
||||||
"traefik.http.routers.onlyoffice.tls.certresolver=letsencrypt",
|
"traefik.http.routers.onlyoffice.tls.certresolver=letsencrypt",
|
||||||
"traefik.http.routers.onlyoffice.middlewares=onlyoffice-headers",
|
"traefik.http.routers.onlyoffice.middlewares=onlyoffice-headers",
|
||||||
"traefik.http.middlewares.onlyoffice-headers.headers.customrequestheaders.X-Forwarded-Proto=https"
|
"traefik.http.middlewares.onlyoffice-headers.headers.customrequestheaders.X-Forwarded-Proto=https"
|
||||||
|
@ -15,7 +15,7 @@ job "searxng" {
|
|||||||
|
|
||||||
env {
|
env {
|
||||||
BIND_ADDRESS = "0.0.0.0:${NOMAD_PORT_searx}"
|
BIND_ADDRESS = "0.0.0.0:${NOMAD_PORT_searx}"
|
||||||
SEARXNG_BASE_URL = "https://search.arsenm.dev"
|
SEARXNG_BASE_URL = "https://search.elara.ws"
|
||||||
SEARXNG_SECRET = "CHANGE ME"
|
SEARXNG_SECRET = "CHANGE ME"
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -39,7 +39,7 @@ job "searxng" {
|
|||||||
|
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.searxng.rule=Host(`search.arsenm.dev`)",
|
"traefik.http.routers.searxng.rule=Host(`search.elara.ws`)",
|
||||||
"traefik.http.routers.searxng.tls.certResolver=letsencrypt",
|
"traefik.http.routers.searxng.tls.certResolver=letsencrypt",
|
||||||
"traefik.http.routers.searxng.middlewares=searxng-headers",
|
"traefik.http.routers.searxng.middlewares=searxng-headers",
|
||||||
"traefik.http.middlewares.searxng-headers.headers.customrequestheaders.X-Robots-Tag=noindex, noarchive, nofollow"
|
"traefik.http.middlewares.searxng-headers.headers.customrequestheaders.X-Robots-Tag=noindex, noarchive, nofollow"
|
||||||
|
@ -43,12 +43,12 @@ job "traefik" {
|
|||||||
"traefik.http.routers.http-catchall.middlewares=https-redirect",
|
"traefik.http.routers.http-catchall.middlewares=https-redirect",
|
||||||
|
|
||||||
// Forward requests to protected services to Authelia. Remove this if not running Authelia.
|
// Forward requests to protected services to Authelia. Remove this if not running Authelia.
|
||||||
"traefik.http.middlewares.authelia.forwardauth.address=http://<authelia address>/api/verify?rd=https://auth.arsenm.dev/",
|
"traefik.http.middlewares.authelia.forwardauth.address=http://<authelia address>/api/verify?rd=https://auth.elara.ws/",
|
||||||
"traefik.http.middlewares.authelia.forwardauth.trustforwardheader=true",
|
"traefik.http.middlewares.authelia.forwardauth.trustforwardheader=true",
|
||||||
"traefik.http.middlewares.authelia.forwardauth.authresponseheaders=Remote-User, Remote-Groups",
|
"traefik.http.middlewares.authelia.forwardauth.authresponseheaders=Remote-User, Remote-Groups",
|
||||||
|
|
||||||
// Expose Traefik API with authentication. Remove this if not running Authelia.
|
// Expose Traefik API with authentication. Remove this if not running Authelia.
|
||||||
"traefik.http.routers.traefik.rule=Host(`traefik.arsenm.dev`)",
|
"traefik.http.routers.traefik.rule=Host(`traefik.elara.ws`)",
|
||||||
"traefik.http.routers.traefik.tls.certResolver=letsencrypt",
|
"traefik.http.routers.traefik.tls.certResolver=letsencrypt",
|
||||||
"traefik.http.routers.traefik.middlewares=authelia",
|
"traefik.http.routers.traefik.middlewares=authelia",
|
||||||
]
|
]
|
||||||
|
@ -43,9 +43,9 @@ job "woodpecker" {
|
|||||||
|
|
||||||
env {
|
env {
|
||||||
WOODPECKER_OPEN = "true"
|
WOODPECKER_OPEN = "true"
|
||||||
WOODPECKER_HOST = "https://ci.arsenm.dev"
|
WOODPECKER_HOST = "https://ci.elara.ws"
|
||||||
WOODPECKER_GITEA = "true"
|
WOODPECKER_GITEA = "true"
|
||||||
WOODPECKER_GITEA_URL = "https://gitea.arsenm.dev"
|
WOODPECKER_GITEA_URL = "https://gitea.elara.ws"
|
||||||
WOODPECKER_GITEA_CLIENT = "CHANGE ME"
|
WOODPECKER_GITEA_CLIENT = "CHANGE ME"
|
||||||
WOODPECKER_GITEA_SECRET = "CHANGE ME"
|
WOODPECKER_GITEA_SECRET = "CHANGE ME"
|
||||||
WOODPECKER_AGENT_SECRET = "CHANGE ME"
|
WOODPECKER_AGENT_SECRET = "CHANGE ME"
|
||||||
@ -57,7 +57,7 @@ job "woodpecker" {
|
|||||||
|
|
||||||
tags = [
|
tags = [
|
||||||
"traefik.enable=true",
|
"traefik.enable=true",
|
||||||
"traefik.http.routers.woodpecker-ci.rule=Host(`ci.arsenm.dev`)",
|
"traefik.http.routers.woodpecker-ci.rule=Host(`ci.elara.ws`)",
|
||||||
"traefik.http.routers.woodpecker-ci.tls.certResolver=letsencrypt"
|
"traefik.http.routers.woodpecker-ci.tls.certResolver=letsencrypt"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
Loading…
Reference in New Issue
Block a user