Compare commits
2 Commits
Author | SHA1 | Date | |
---|---|---|---|
e86a669d9d | |||
ed9100bc8f
|
3
.gitignore
vendored
3
.gitignore
vendored
@@ -1,5 +1,4 @@
|
|||||||
.vagrant
|
.vagrant
|
||||||
.vscode
|
|
||||||
.playbook
|
.playbook
|
||||||
/*.yml
|
/*.yml
|
||||||
/*.yaml
|
/*.yaml
|
||||||
@@ -9,5 +8,7 @@
|
|||||||
!dockerbox.yml
|
!dockerbox.yml
|
||||||
!hypervisor.yml
|
!hypervisor.yml
|
||||||
!minecraft.yml
|
!minecraft.yml
|
||||||
|
!mkdocs.yml
|
||||||
!unifi.yml
|
!unifi.yml
|
||||||
/environments/
|
/environments/
|
||||||
|
/site/
|
||||||
|
2
Vagrantfile
vendored
2
Vagrantfile
vendored
@@ -20,7 +20,7 @@ else
|
|||||||
end
|
end
|
||||||
|
|
||||||
Vagrant.configure("2") do |config|
|
Vagrant.configure("2") do |config|
|
||||||
config.vm.box = "debian/contrib-buster64"
|
config.vm.box = "debian/bullseye64"
|
||||||
config.vm.network "private_network", type: "dhcp"
|
config.vm.network "private_network", type: "dhcp"
|
||||||
config.vm.synced_folder ".", "/vagrant", disabled: true
|
config.vm.synced_folder ".", "/vagrant", disabled: true
|
||||||
config.vm.synced_folder "./scratch", "/vagrant/scratch"
|
config.vm.synced_folder "./scratch", "/vagrant/scratch"
|
||||||
|
@@ -20,7 +20,7 @@
|
|||||||
- docker
|
- docker
|
||||||
- traefik
|
- traefik
|
||||||
- nextcloud
|
- nextcloud
|
||||||
# - gitea
|
- gitea
|
||||||
- jenkins
|
- jenkins
|
||||||
- prometheus
|
- prometheus
|
||||||
- nginx
|
- nginx
|
||||||
|
1
docs/.gitignore
vendored
Normal file
1
docs/.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
|||||||
|
python
|
23
mkdocs.yml
Normal file
23
mkdocs.yml
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
site_name: moxie
|
||||||
|
site_author: Kris Lamoureux
|
||||||
|
copyright: Copyright © 2021 Kris Lamoureux
|
||||||
|
|
||||||
|
# Repository
|
||||||
|
repo_name: krislamo/moxie
|
||||||
|
repo_url: https://github.com/krislamo/moxie
|
||||||
|
|
||||||
|
theme:
|
||||||
|
name: material
|
||||||
|
palette:
|
||||||
|
primary: black
|
||||||
|
icon:
|
||||||
|
logo: material/server
|
||||||
|
|
||||||
|
extra:
|
||||||
|
generator: false
|
||||||
|
social:
|
||||||
|
- icon: fontawesome/brands/github
|
||||||
|
link: https://github.com/krislamo
|
||||||
|
|
||||||
|
#nav:
|
||||||
|
# - Home: index.md
|
@@ -47,6 +47,7 @@
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.gitea.rule: "Host(`{{ gitea_domain }}`)"
|
traefik.http.routers.gitea.rule: "Host(`{{ gitea_domain }}`)"
|
||||||
traefik.http.routers.gitea.entrypoints: websecure
|
traefik.http.routers.gitea.entrypoints: websecure
|
||||||
|
traefik.http.routers.gitea.tls.certresolver: letsencrypt
|
||||||
traefik.http.routers.gitea.middlewares: "securehttps@file"
|
traefik.http.routers.gitea.middlewares: "securehttps@file"
|
||||||
traefik.http.services.gitea.loadbalancer.server.port: "3000"
|
traefik.http.services.gitea.loadbalancer.server.port: "3000"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
|
@@ -20,6 +20,7 @@
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.jenkins.rule: "Host(`{{ jenkins_domain }}`)"
|
traefik.http.routers.jenkins.rule: "Host(`{{ jenkins_domain }}`)"
|
||||||
traefik.http.routers.jenkins.entrypoints: websecure
|
traefik.http.routers.jenkins.entrypoints: websecure
|
||||||
|
traefik.http.routers.jenkins.tls.certresolver: letsencrypt
|
||||||
traefik.http.routers.jenkins.middlewares: "securehttps@file"
|
traefik.http.routers.jenkins.middlewares: "securehttps@file"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: "true"
|
traefik.enable: "true"
|
||||||
|
@@ -32,6 +32,7 @@
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_domain }}`)"
|
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_domain }}`)"
|
||||||
traefik.http.routers.nextcloud.entrypoints: websecure
|
traefik.http.routers.nextcloud.entrypoints: websecure
|
||||||
|
traefik.http.routers.nextcloud.tls.certresolver: letsencrypt
|
||||||
traefik.http.routers.nextcloud.middlewares: "securehttps@file,nextcloud-webdav"
|
traefik.http.routers.nextcloud.middlewares: "securehttps@file,nextcloud-webdav"
|
||||||
traefik.http.middlewares.nextcloud-webdav.redirectregex.regex: "https://(.*)/.well-known/(card|cal)dav"
|
traefik.http.middlewares.nextcloud-webdav.redirectregex.regex: "https://(.*)/.well-known/(card|cal)dav"
|
||||||
traefik.http.middlewares.nextcloud-webdav.redirectregex.replacement: "https://${1}/remote.php/dav/"
|
traefik.http.middlewares.nextcloud-webdav.redirectregex.replacement: "https://${1}/remote.php/dav/"
|
||||||
|
@@ -29,8 +29,9 @@
|
|||||||
- "{{ nginx_html }}:/usr/share/nginx/html:ro"
|
- "{{ nginx_html }}:/usr/share/nginx/html:ro"
|
||||||
labels:
|
labels:
|
||||||
traefik.http.routers.nginx.rule: "Host(`{{ nginx_domain }}`)"
|
traefik.http.routers.nginx.rule: "Host(`{{ nginx_domain }}`)"
|
||||||
#traefik.http.middlewares.nginxauth.basicauth.users: "{{ nginx_auth }}"
|
traefik.http.middlewares.nginxauth.basicauth.users: "{{ nginx_auth }}"
|
||||||
traefik.http.routers.nginx.entrypoints: websecure
|
traefik.http.routers.nginx.entrypoints: websecure
|
||||||
traefik.http.routers.nginx.middlewares: "securehttps@file"
|
traefik.http.routers.nginx.tls.certresolver: letsencrypt
|
||||||
|
traefik.http.routers.nginx.middlewares: "securehttps@file,nginxauth"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: "true"
|
traefik.enable: "true"
|
||||||
|
@@ -45,6 +45,7 @@
|
|||||||
traefik.http.routers.prometheus.rule: "Host(`{{ prom_domain }}`)"
|
traefik.http.routers.prometheus.rule: "Host(`{{ prom_domain }}`)"
|
||||||
traefik.http.routers.prometheus.entrypoints: websecure
|
traefik.http.routers.prometheus.entrypoints: websecure
|
||||||
traefik.http.routers.prometheus.middlewares: "securehttps@file,localonly"
|
traefik.http.routers.prometheus.middlewares: "securehttps@file,localonly"
|
||||||
|
traefik.http.routers.prometheus.tls.certresolver: letsencrypt
|
||||||
traefik.http.middlewares.localonly.ipwhitelist.sourcerange: "{{ traefik_localonly }}"
|
traefik.http.middlewares.localonly.ipwhitelist.sourcerange: "{{ traefik_localonly }}"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: "true"
|
traefik.enable: "true"
|
||||||
@@ -64,6 +65,7 @@
|
|||||||
labels:
|
labels:
|
||||||
traefik.http.routers.grafana.rule: "Host(`{{ grafana_domain }}`)"
|
traefik.http.routers.grafana.rule: "Host(`{{ grafana_domain }}`)"
|
||||||
traefik.http.routers.grafana.entrypoints: websecure
|
traefik.http.routers.grafana.entrypoints: websecure
|
||||||
|
traefik.http.routers.grafana.tls.certresolver: letsencrypt
|
||||||
traefik.http.routers.grafana.middlewares: "securehttps@file"
|
traefik.http.routers.grafana.middlewares: "securehttps@file"
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: "true"
|
traefik.enable: "true"
|
||||||
|
@@ -41,9 +41,10 @@
|
|||||||
- name: traefik
|
- name: traefik
|
||||||
labels:
|
labels:
|
||||||
traefik.http.routers.traefik.rule: "Host(`{{ traefik_domain }}`)"
|
traefik.http.routers.traefik.rule: "Host(`{{ traefik_domain }}`)"
|
||||||
#traefik.http.middlewares.auth.basicauth.users: "{{ traefik_auth }}"
|
traefik.http.middlewares.auth.basicauth.users: "{{ traefik_auth }}"
|
||||||
#traefik.http.middlewares.localonly.ipwhitelist.sourcerange: "{{ traefik_localonly }}"
|
traefik.http.middlewares.localonly.ipwhitelist.sourcerange: "{{ traefik_localonly }}"
|
||||||
traefik.http.routers.traefik.middlewares: "securehttps@file"
|
traefik.http.routers.traefik.tls.certresolver: letsencrypt
|
||||||
|
traefik.http.routers.traefik.middlewares: "securehttps@file,auth@docker,localonly"
|
||||||
traefik.http.routers.traefik.service: "api@internal"
|
traefik.http.routers.traefik.service: "api@internal"
|
||||||
traefik.http.routers.traefik.entrypoints: websecure
|
traefik.http.routers.traefik.entrypoints: websecure
|
||||||
traefik.http.routers.traefik.tls: "true"
|
traefik.http.routers.traefik.tls: "true"
|
||||||
|
6
serve-docs.sh
Executable file
6
serve-docs.sh
Executable file
@@ -0,0 +1,6 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
[ ! -d "./docs/python" ] && python3 -m venv ./docs/python
|
||||||
|
. ./docs/python/bin/activate
|
||||||
|
pip install mkdocs-material==7.3.3
|
||||||
|
mkdocs serve
|
||||||
|
deactivate
|
Reference in New Issue
Block a user