all: remove custom tls certs

This commit is contained in:
Adithya 2024-09-14 17:16:54 +05:30
parent cc565332e2
commit 4b8fba39e3
Signed by: adtya
GPG key ID: B8857BFBA2C47B9C
8 changed files with 6 additions and 6 deletions

View file

@ -7,6 +7,11 @@ _: {
reverse_proxy 127.0.0.1:8096 reverse_proxy 127.0.0.1:8096
''; '';
}; };
"watch.local.adtya.xyz" = {
extraConfig = ''
reverse_proxy 127.0.0.1:8096
'';
};
"jellyfin.labs.adtya.xyz" = { "jellyfin.labs.adtya.xyz" = {
extraConfig = '' extraConfig = ''
reverse_proxy 127.0.0.1:8096 reverse_proxy 127.0.0.1:8096

View file

@ -4,7 +4,6 @@ _: {
virtualHosts."alertmanager.labs.adtya.xyz" = { virtualHosts."alertmanager.labs.adtya.xyz" = {
extraConfig = '' extraConfig = ''
reverse_proxy 127.0.0.1:9093 reverse_proxy 127.0.0.1:9093
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
''; '';
}; };
}; };

View file

@ -15,7 +15,6 @@ _: {
virtualHosts."blocky.labs.adtya.xyz" = { virtualHosts."blocky.labs.adtya.xyz" = {
extraConfig = '' extraConfig = ''
reverse_proxy 127.0.0.1:8080 reverse_proxy 127.0.0.1:8080
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
''; '';
}; };
}; };

View file

@ -4,7 +4,6 @@ _: {
virtualHosts."grafana.labs.adtya.xyz" = { virtualHosts."grafana.labs.adtya.xyz" = {
extraConfig = '' extraConfig = ''
reverse_proxy 127.0.0.1:9091 reverse_proxy 127.0.0.1:9091
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
''; '';
}; };
}; };

View file

@ -4,7 +4,6 @@ _: {
virtualHosts."loki.labs.adtya.xyz" = { virtualHosts."loki.labs.adtya.xyz" = {
extraConfig = '' extraConfig = ''
reverse_proxy 127.0.0.1:3100 reverse_proxy 127.0.0.1:3100
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
''; '';
}; };
}; };

View file

@ -4,7 +4,6 @@ _: {
virtualHosts."prometheus.labs.adtya.xyz" = { virtualHosts."prometheus.labs.adtya.xyz" = {
extraConfig = '' extraConfig = ''
reverse_proxy 127.0.0.1:9090 reverse_proxy 127.0.0.1:9090
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
''; '';
}; };
}; };

View file

@ -15,6 +15,7 @@
globalConfig = '' globalConfig = ''
acme_dns digitalocean {env.DO_API_TOKEN} acme_dns digitalocean {env.DO_API_TOKEN}
''; '';
logFormat = "level INFO";
}; };
systemd.services.caddy.serviceConfig.EnvironmentFile = config.sops.secrets."digitalocean/token_file".path; systemd.services.caddy.serviceConfig.EnvironmentFile = config.sops.secrets."digitalocean/token_file".path;
networking.firewall.allowedTCPPorts = [ 80 443 ]; networking.firewall.allowedTCPPorts = [ 80 443 ];

View file

@ -16,7 +16,6 @@
reverse_proxy ${config.services.prometheus.exporters.postgres.listenAddress}:${toString config.services.prometheus.exporters.postgres.port} reverse_proxy ${config.services.prometheus.exporters.postgres.listenAddress}:${toString config.services.prometheus.exporters.postgres.port}
} }
''} ''}
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
''; '';
}; };
}; };