Homelab is now internal. Made proper substitutions for names

This commit is contained in:
Andreas S. Turriff 2024-06-14 13:20:42 -07:00
parent 82775bd957
commit e8611c7a25
6 changed files with 21 additions and 29 deletions

View File

@ -5,30 +5,25 @@ networks:
config:
- subnet: 10.64.0.0/16
internal: true
homelab-bridge:
driver: overlay
ipam:
config:
- subnet: 10.96.0.0/16
secrets:
percona-root:
file: /home/andreas/secrets/percona-root
file: /home/<your user>/secrets/percona-root
ghost:
file: /home/andreas/secrets/ghost
file: /home/<your user>/secrets/ghost
postgres-root:
file: /home/andreas/secrets/postgres-root
file: /home/<your user>/secrets/postgres-root
gitea:
file: /home/andreas/secrets/gitea
file: /home/<your user>/secrets/gitea
authentik-postgres:
file: /home/andreas/secrets/authentik-postgres
file: /home/<your user>/secrets/authentik-postgres
authentik-secret:
file: /home/andreas/secrets/authentik-secret
file: /home/<your user>/secrets/authentik-secret
configs:
ghost-config:
file: /home/andreas/configs/config.production.json
file: /home/<your user>/configs/config.production.json
traefik-config:
file: /home/andreas/configs/traefik.toml
file: /home/<your user>/configs/traefik.toml
services:

View File

@ -6,7 +6,7 @@
deploy:
labels:
traefik.enable: "true"
traefik.http.routers.authentik-rtr.rule: 'Host(`authentik.turriff.net`) || HostRegexp(`{subdomain:[A-Za-z0-9](?:[A-Za-z0-9\-]{0,61}[A-Za-z0-9])?}.turriff.net`) && PathPrefix(`/outpost.goauthentik.io/`)'
traefik.http.routers.authentik-rtr.rule: 'Host(`authentik.your.domain`) || HostRegexp(`{subdomain:[A-Za-z0-9](?:[A-Za-z0-9\-]{0,61}[A-Za-z0-9])?}.your.domain`) && PathPrefix(`/outpost.goauthentik.io/`)'
traefik.http.routers.authentik-rtr.service: "authentik"
traefik.http.services.authentik.loadbalancer.server.port: "9000"
traefik.http.middlewares.authentik.forwardauth.address: "http://authentik-server:9000/outpost.goauthentik.io/auth/traefik"
@ -20,7 +20,7 @@
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/authentik-postgres"
AUTHENTIK_REDIS__HOST: "valkey"
AUTHENTIK_SECRET_KEY: "file:///run/secrets/authentik-secret"
AUTHENTIK_EMAIL__HOST: "munin.turriff.net"
AUTHENTIK_EMAIL__HOST: "munin.your.domain"
AUTHENTIK_EMAIL__FROM: "authentik@turriff.net"
hostname: "authentik-server"
image: "ghcr.io/goauthentik/server:2024.4"
@ -28,7 +28,6 @@
driver: journald
networks:
- homelab
- homelab-bridge
restart: on-failure
secrets:
- authentik-postgres
@ -52,7 +51,7 @@
AUTHENTIK_POSTGRESQL__PASSWORD: "file:///run/secrets/authentik-postgres"
AUTHENTIK_REDIS__HOST: "valkey"
AUTHENTIK_SECRET_KEY: "file:///run/secrets/authentik-secret"
AUTHENTIK_EMAIL__HOST: "munin.turriff.net"
AUTHENTIK_EMAIL__HOST: "munin.your.domain"
AUTHENTIK_EMAIL__FROM: "authentik@turriff.net"
image: "ghcr.io/goauthentik/server:2024.4"
logging:

View File

@ -7,7 +7,7 @@
labels:
traefik.enable: "true"
traefik.http.routers.ghost-rtr.entrypoints: "websecure"
traefik.http.routers.ghost-rtr.rule: "Host(`homelab.turriff.net`)"
traefik.http.routers.ghost-rtr.rule: "Host(`ghost.your.domain`)"
traefik.http.routers.ghost-rtr.service: "ghost"
traefik.http.services.ghost.loadbalancer.server.port: "2368"
image: "ghost:5"

View File

@ -5,7 +5,7 @@
labels:
traefik.enable: "true"
traefik.http.routers.gitea-http-rtr.entrypoints: websecure
traefik.http.routers.gitea-http-rtr.rule: "Host(`gitea.turriff.net`)"
traefik.http.routers.gitea-http-rtr.rule: "Host(`gitea.your.domain`)"
traefik.http.routers.gitea-http-rtr.service: "gitea"
traefik.http.services.gitea.loadbalancer.server.port: "3000"
traefik.tcp.routers.gitea-ssh-rtr.entrypoints: ssh
@ -22,18 +22,17 @@
GITEA__mailer__ENABLED: "true"
GITEA__mailer__FROM: "gitea@turriff.net"
GITEA__mailer__PROTOCOL: "smtp+starttls"
GITEA__mailer__SMTP_ADDR: "munin.turriff.net"
GITEA__mailer__SMTP_ADDR: "munin.your.domain"
GITEA__mailer__SMTP_PORT: "25"
GITEA__server__ROOT_URL: "https://gitea.turriff.net"
GITEA__server__ROOT_URL: "https://gitea.your.domain"
GITEA__cors__ENABLED: "true"
GITEA__cors__ALLOW_DOMAIN: "https://*.turriff.net"
GITEA__server__DOMAIN: "gitea.turriff.net"
GITEA__cors__ALLOW_DOMAIN: "https://*.your.domain"
GITEA__server__DOMAIN: "gitea.your.domain"
image: "gitea/gitea:1-rootless"
logging:
driver: journald
networks:
- homelab
- homelab-bridge
restart: on-failure
secrets:
- gitea

View File

@ -2,13 +2,13 @@
deploy:
replicas: 1
environment:
ND_BASEURL: "https://media.turriff.net"
ND_ENABLE_EXTERNAL_SERVICES: "false"
ND_BASEURL: "https://media.your.domain"
ND_ENABLEEXTERNALSERVICES: "false"
image: "deluan/navidrome:latest"
labels:
traefik.enable: "true"
traefik.http.routers.navidrome-rtr.entrypoint: websecure
traefik.http.routers.navidrome-rtr.rule: "Host(`media.turriff.net`)"
traefik.http.routers.navidrome-rtr.rule: "Host(`media.your.domain`)"
traefik.http.routers.navidrome-rtr.service: "navidrome"
traefix.http.services.navidrome.loadbalancer.server.port: "4533"
logging:

View File

@ -7,7 +7,7 @@
traefik.enable: "true"
traefik.http.routers.traefik-rtr.entrypoints: "websecure"
traefik.http.routers.traefik-rtr.middlewares: "traefik-allowlist@file"
traefik.http.routers.traefik-rtr.rule: "Host(`traefik.turriff.net`)"
traefik.http.routers.traefik-rtr.rule: "Host(`traefik.your.domain`)"
traefik.http.routers.traefik-rtr.service: "api@internal"
traefik.http.services.dummy-svc.loadbalancer.server.port: "9999"
replicas: 1
@ -20,7 +20,6 @@
driver: journald
networks:
- homelab
- homelab-bridge
ports:
- published: 80
target: 10080