Compare commits
6 Commits
Author | SHA1 | Date | |
---|---|---|---|
57d90ef8a1 | |||
cea6cddf54 | |||
b0ca4dc906 | |||
a68ef1fffc | |||
36d4ca2e6d | |||
0b23966f6e |
1
.gitignore
vendored
1
.gitignore
vendored
@ -1,4 +1,5 @@
|
|||||||
.vagrant
|
.vagrant
|
||||||
|
.vscode
|
||||||
.playbook
|
.playbook
|
||||||
/*.yml
|
/*.yml
|
||||||
/*.yaml
|
/*.yaml
|
||||||
|
@ -20,7 +20,7 @@
|
|||||||
- docker
|
- docker
|
||||||
- traefik
|
- traefik
|
||||||
- nextcloud
|
- nextcloud
|
||||||
- gitea
|
# - gitea
|
||||||
- jenkins
|
- jenkins
|
||||||
- prometheus
|
- prometheus
|
||||||
- nginx
|
- nginx
|
||||||
|
@ -47,7 +47,6 @@
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.gitea.rule: "Host(`{{ gitea_domain }}`)"
|
traefik.http.routers.gitea.rule: "Host(`{{ gitea_domain }}`)"
|
||||||
traefik.http.routers.gitea.entrypoints: websecure
|
traefik.http.routers.gitea.entrypoints: websecure
|
||||||
traefik.http.routers.gitea.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.routers.gitea.middlewares: "securehttps@file"
|
traefik.http.routers.gitea.middlewares: "securehttps@file"
|
||||||
traefik.http.services.gitea.loadbalancer.server.port: "3000"
|
traefik.http.services.gitea.loadbalancer.server.port: "3000"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
|
@ -20,7 +20,6 @@
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.jenkins.rule: "Host(`{{ jenkins_domain }}`)"
|
traefik.http.routers.jenkins.rule: "Host(`{{ jenkins_domain }}`)"
|
||||||
traefik.http.routers.jenkins.entrypoints: websecure
|
traefik.http.routers.jenkins.entrypoints: websecure
|
||||||
traefik.http.routers.jenkins.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.routers.jenkins.middlewares: "securehttps@file"
|
traefik.http.routers.jenkins.middlewares: "securehttps@file"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: "true"
|
traefik.enable: "true"
|
||||||
|
@ -32,7 +32,6 @@
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_domain }}`)"
|
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_domain }}`)"
|
||||||
traefik.http.routers.nextcloud.entrypoints: websecure
|
traefik.http.routers.nextcloud.entrypoints: websecure
|
||||||
traefik.http.routers.nextcloud.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.routers.nextcloud.middlewares: "securehttps@file,nextcloud-webdav"
|
traefik.http.routers.nextcloud.middlewares: "securehttps@file,nextcloud-webdav"
|
||||||
traefik.http.middlewares.nextcloud-webdav.redirectregex.regex: "https://(.*)/.well-known/(card|cal)dav"
|
traefik.http.middlewares.nextcloud-webdav.redirectregex.regex: "https://(.*)/.well-known/(card|cal)dav"
|
||||||
traefik.http.middlewares.nextcloud-webdav.redirectregex.replacement: "https://${1}/remote.php/dav/"
|
traefik.http.middlewares.nextcloud-webdav.redirectregex.replacement: "https://${1}/remote.php/dav/"
|
||||||
|
@ -29,9 +29,8 @@
|
|||||||
- "{{ nginx_html }}:/usr/share/nginx/html:ro"
|
- "{{ nginx_html }}:/usr/share/nginx/html:ro"
|
||||||
labels:
|
labels:
|
||||||
traefik.http.routers.nginx.rule: "Host(`{{ nginx_domain }}`)"
|
traefik.http.routers.nginx.rule: "Host(`{{ nginx_domain }}`)"
|
||||||
traefik.http.middlewares.nginxauth.basicauth.users: "{{ nginx_auth }}"
|
#traefik.http.middlewares.nginxauth.basicauth.users: "{{ nginx_auth }}"
|
||||||
traefik.http.routers.nginx.entrypoints: websecure
|
traefik.http.routers.nginx.entrypoints: websecure
|
||||||
traefik.http.routers.nginx.tls.certresolver: letsencrypt
|
traefik.http.routers.nginx.middlewares: "securehttps@file"
|
||||||
traefik.http.routers.nginx.middlewares: "securehttps@file,nginxauth"
|
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: "true"
|
traefik.enable: "true"
|
||||||
|
@ -45,7 +45,6 @@
|
|||||||
traefik.http.routers.prometheus.rule: "Host(`{{ prom_domain }}`)"
|
traefik.http.routers.prometheus.rule: "Host(`{{ prom_domain }}`)"
|
||||||
traefik.http.routers.prometheus.entrypoints: websecure
|
traefik.http.routers.prometheus.entrypoints: websecure
|
||||||
traefik.http.routers.prometheus.middlewares: "securehttps@file,localonly"
|
traefik.http.routers.prometheus.middlewares: "securehttps@file,localonly"
|
||||||
traefik.http.routers.prometheus.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.middlewares.localonly.ipwhitelist.sourcerange: "{{ traefik_localonly }}"
|
traefik.http.middlewares.localonly.ipwhitelist.sourcerange: "{{ traefik_localonly }}"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: "true"
|
traefik.enable: "true"
|
||||||
@ -65,7 +64,6 @@
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.grafana.rule: "Host(`{{ grafana_domain }}`)"
|
traefik.http.routers.grafana.rule: "Host(`{{ grafana_domain }}`)"
|
||||||
traefik.http.routers.grafana.entrypoints: websecure
|
traefik.http.routers.grafana.entrypoints: websecure
|
||||||
traefik.http.routers.grafana.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.routers.grafana.middlewares: "securehttps@file"
|
traefik.http.routers.grafana.middlewares: "securehttps@file"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: "true"
|
traefik.enable: "true"
|
||||||
|
@ -41,10 +41,9 @@
|
|||||||
- name: traefik
|
- name: traefik
|
||||||
labels:
|
labels:
|
||||||
traefik.http.routers.traefik.rule: "Host(`{{ traefik_domain }}`)"
|
traefik.http.routers.traefik.rule: "Host(`{{ traefik_domain }}`)"
|
||||||
traefik.http.middlewares.auth.basicauth.users: "{{ traefik_auth }}"
|
#traefik.http.middlewares.auth.basicauth.users: "{{ traefik_auth }}"
|
||||||
traefik.http.middlewares.localonly.ipwhitelist.sourcerange: "{{ traefik_localonly }}"
|
#traefik.http.middlewares.localonly.ipwhitelist.sourcerange: "{{ traefik_localonly }}"
|
||||||
traefik.http.routers.traefik.tls.certresolver: letsencrypt
|
traefik.http.routers.traefik.middlewares: "securehttps@file"
|
||||||
traefik.http.routers.traefik.middlewares: "securehttps@file,auth@docker,localonly"
|
|
||||||
traefik.http.routers.traefik.service: "api@internal"
|
traefik.http.routers.traefik.service: "api@internal"
|
||||||
traefik.http.routers.traefik.entrypoints: websecure
|
traefik.http.routers.traefik.entrypoints: websecure
|
||||||
traefik.http.routers.traefik.tls: "true"
|
traefik.http.routers.traefik.tls: "true"
|
||||||
|
Loading…
Reference in New Issue
Block a user