all: remove custom tls certs
This commit is contained in:
parent
cc565332e2
commit
4b8fba39e3
8 changed files with 6 additions and 6 deletions
|
@ -7,6 +7,11 @@ _: {
|
||||||
reverse_proxy 127.0.0.1:8096
|
reverse_proxy 127.0.0.1:8096
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
"watch.local.adtya.xyz" = {
|
||||||
|
extraConfig = ''
|
||||||
|
reverse_proxy 127.0.0.1:8096
|
||||||
|
'';
|
||||||
|
};
|
||||||
"jellyfin.labs.adtya.xyz" = {
|
"jellyfin.labs.adtya.xyz" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy 127.0.0.1:8096
|
reverse_proxy 127.0.0.1:8096
|
||||||
|
|
|
@ -4,7 +4,6 @@ _: {
|
||||||
virtualHosts."alertmanager.labs.adtya.xyz" = {
|
virtualHosts."alertmanager.labs.adtya.xyz" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy 127.0.0.1:9093
|
reverse_proxy 127.0.0.1:9093
|
||||||
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -15,7 +15,6 @@ _: {
|
||||||
virtualHosts."blocky.labs.adtya.xyz" = {
|
virtualHosts."blocky.labs.adtya.xyz" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy 127.0.0.1:8080
|
reverse_proxy 127.0.0.1:8080
|
||||||
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -4,7 +4,6 @@ _: {
|
||||||
virtualHosts."grafana.labs.adtya.xyz" = {
|
virtualHosts."grafana.labs.adtya.xyz" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy 127.0.0.1:9091
|
reverse_proxy 127.0.0.1:9091
|
||||||
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -4,7 +4,6 @@ _: {
|
||||||
virtualHosts."loki.labs.adtya.xyz" = {
|
virtualHosts."loki.labs.adtya.xyz" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy 127.0.0.1:3100
|
reverse_proxy 127.0.0.1:3100
|
||||||
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -4,7 +4,6 @@ _: {
|
||||||
virtualHosts."prometheus.labs.adtya.xyz" = {
|
virtualHosts."prometheus.labs.adtya.xyz" = {
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
reverse_proxy 127.0.0.1:9090
|
reverse_proxy 127.0.0.1:9090
|
||||||
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -15,6 +15,7 @@
|
||||||
globalConfig = ''
|
globalConfig = ''
|
||||||
acme_dns digitalocean {env.DO_API_TOKEN}
|
acme_dns digitalocean {env.DO_API_TOKEN}
|
||||||
'';
|
'';
|
||||||
|
logFormat = "level INFO";
|
||||||
};
|
};
|
||||||
systemd.services.caddy.serviceConfig.EnvironmentFile = config.sops.secrets."digitalocean/token_file".path;
|
systemd.services.caddy.serviceConfig.EnvironmentFile = config.sops.secrets."digitalocean/token_file".path;
|
||||||
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
networking.firewall.allowedTCPPorts = [ 80 443 ];
|
||||||
|
|
|
@ -16,7 +16,6 @@
|
||||||
reverse_proxy ${config.services.prometheus.exporters.postgres.listenAddress}:${toString config.services.prometheus.exporters.postgres.port}
|
reverse_proxy ${config.services.prometheus.exporters.postgres.listenAddress}:${toString config.services.prometheus.exporters.postgres.port}
|
||||||
}
|
}
|
||||||
''}
|
''}
|
||||||
tls /persist/secrets/caddy/certs/default.crt /persist/secrets/caddy/certs/default.key
|
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
Loading…
Reference in a new issue