Update domain

This commit is contained in:
Elara 2023-07-29 21:32:34 -07:00
parent 5735912ffc
commit 1e27bfa170
15 changed files with 35 additions and 35 deletions

View File

@ -45,7 +45,7 @@ job "authelia" {
tags = [
"traefik.enable=true",
"traefik.http.routers.authelia.rule=Host(`auth.arsenm.dev`)",
"traefik.http.routers.authelia.rule=Host(`auth.elara.ws`)",
"traefik.http.routers.authelia.tls.certResolver=letsencrypt",
]
}

View File

@ -48,7 +48,7 @@ job "gitea" {
RUN_MODE = "prod"
SSH_DOMAIN = "CHANGE ME"
SSH_PORT = "$NOMAD_PORT_ssh"
ROOT_URL = "https://gitea.arsenm.dev/"
ROOT_URL = "https://gitea.elara.ws/"
USER_UID = "1002"
USER_GID = "1002"
GITEA__server__START_SSH_SERVER = "true"
@ -65,7 +65,7 @@ job "gitea" {
tags = [
"traefik.enable=true",
"traefik.http.routers.gitea.rule=Host(`gitea.arsenm.dev`)",
"traefik.http.routers.gitea.rule=Host(`gitea.elara.ws`)",
"traefik.http.routers.gitea.tls.certResolver=letsencrypt"
]
}

View File

@ -1,6 +1,6 @@
# Go Import Redirector
This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.arsenm.dev/Arsen6331/itd@latest`, they can just use `go install go.arsenm.dev/itd@latest` and this service will redirect them.
This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.elara.ws/Arsen6331/itd@latest`, they can just use `go install go.elara.ws/itd@latest` and this service will redirect them.
This job file downloads an archive containing `go-import-redirector` executables for `x86_64` and `aarch64`, as well as a script that runs the correct one, from my minio instance.

View File

@ -17,13 +17,13 @@ job "go-import-redirector" {
command = "local/exec.sh"
args = [
"-addr", ":${NOMAD_PORT_http}",
"go.arsenm.dev/*",
"https://gitea.arsenm.dev/Arsen6331/*"
"go.elara.ws/*",
"https://gitea.elara.ws/Arsen6331/*"
]
}
artifact {
source = "https://api.minio.arsenm.dev/adl/go-import-redirector.tar.gz"
source = "https://api.minio.elara.ws/adl/go-import-redirector.tar.gz"
}
resources {
@ -37,7 +37,7 @@ job "go-import-redirector" {
tags = [
"traefik.enable=true",
"traefik.http.routers.go-import-redirector.rule=Host(`go.arsenm.dev`)",
"traefik.http.routers.go-import-redirector.rule=Host(`go.elara.ws`)",
"traefik.http.routers.go-import-redirector.tls.certResolver=letsencrypt"
]
}

View File

@ -2,4 +2,4 @@
This is the nomad job file I use for the [Homer](https://github.com/bastienwirtz/homer/) dashboard. It takes its config file from the Consul Key/Value store. This means that whenever the config is edited, Nomad automatically installs the new file and restarts the container. It also means that Homer is completely stateless, and therefore can be freely moved around by Nomad.
This directory also contains the config I use for my dashboard at https://dashboard.arsenm.dev. This is placed into the Consul K/V store as `homer/config.yml`.
This directory also contains the config I use for my dashboard at https://dashboard.elara.ws. This is placed into the Consul K/V store as `homer/config.yml`.

View File

@ -35,27 +35,27 @@ services:
- name: "SearXNG"
icon: "fa-solid fa-magnifying-glass"
subtitle: "Metasearch engine"
url: "https://search.arsenm.dev/"
url: "https://search.elara.ws/"
- name: "Nextcloud"
icon: "fa-solid fa-cloud"
subtitle: "Cloud file storage"
url: "https://nextcloud.arsenm.dev/"
url: "https://nextcloud.elara.ws/"
- name: "Home Assistant"
icon: "fa-solid fa-house"
subtitle: "Home automation hub"
url: "https://hass.arsenm.dev/"
url: "https://hass.elara.ws/"
- name: "Gitea"
icon: "fa-solid fa-code-branch"
subtitle: "Web interface for Git"
url: "https://gitea.arsenm.dev/"
url: "https://gitea.elara.ws/"
- name: "Minio"
icon: "fa-solid fa-box"
subtitle: "Open source S3 implementation"
url: "https://minio.arsenm.dev/"
url: "https://minio.elara.ws/"
- name: "LMS"
icon: "fa-solid fa-music"
subtitle: "Lightweight music server"
url: "https://music.arsenm.dev/"
url: "https://music.elara.ws/"
- name: "Piracy"
icon: "fa-solid fa-skull-crossbones"
items:
@ -73,12 +73,12 @@ services:
- name: "Traefik"
icon: "fa fa-globe"
subtitle: "Reverse proxy"
url: "https://traefik.arsenm.dev/"
url: "https://traefik.elara.ws/"
- name: "Nomad"
icon: "fa-solid fa-circle-nodes"
subtitle: "Cluster orchestrator"
url: "https://nomad.arsenm.dev/"
url: "https://nomad.elara.ws/"
- name: "Consul"
icon: "fa-solid fa-database"
subtitle: "Service discovery and K/V store"
url: "https://consul.arsenm.dev/"
url: "https://consul.elara.ws/"

View File

@ -37,7 +37,7 @@ job "homer" {
tags = [
"traefik.enable=true",
"traefik.http.routers.homer.rule=Host(`dashboard.arsenm.dev`)",
"traefik.http.routers.homer.rule=Host(`dashboard.elara.ws`)",
"traefik.http.routers.homer.tls.certResolver=letsencrypt",
]
}

View File

@ -50,7 +50,7 @@ job "lms" {
tags = [
"traefik.enable=true",
"traefik.http.routers.lms.rule=Host(`music.arsenm.dev`)",
"traefik.http.routers.lms.rule=Host(`music.elara.ws`)",
"traefik.http.routers.lms.tls.certResolver=letsencrypt",
]
}

View File

@ -1,6 +1,6 @@
# LURE Web
This nomad file is for one of my other projects, [LURE](https://gitea.arsenm.dev/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.arsenm.dev) and its backend API server.
This nomad file is for one of my other projects, [LURE](https://gitea.elara.ws/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.elara.ws) and its backend API server.
This job requires no volumes. The only thing that needs to be changed is the Github API secret. This is for a Github webhook, so that the API server knows when the LURE repo changes so it can update its database.

View File

@ -31,7 +31,7 @@ job "lure-web" {
port = "api"
tags = [
"traefik.enable=true",
"traefik.http.routers.lure-api-server.rule=Host(`api.lure.arsenm.dev`)",
"traefik.http.routers.lure-api-server.rule=Host(`api.lure.elara.ws`)",
"traefik.http.routers.lure-api-server.tls.certresolver=letsencrypt"
]
@ -58,7 +58,7 @@ job "lure-web" {
port = "http"
tags = [
"traefik.enable=true",
"traefik.http.routers.lure-web.rule=Host(`lure.arsenm.dev`)",
"traefik.http.routers.lure-web.rule=Host(`lure.elara.ws`)",
"traefik.http.routers.lure-web.tls.certresolver=letsencrypt",
]
}

View File

@ -45,7 +45,7 @@ job "minio" {
name = "minio"
tags = [
"traefik.enable=true",
"traefik.http.routers.minio.rule=Host(`minio.arsenm.dev`)",
"traefik.http.routers.minio.rule=Host(`minio.elara.ws`)",
"traefik.http.routers.minio.tls.certResolver=letsencrypt"
]
@ -66,7 +66,7 @@ job "minio" {
tags = [
"traefik.enable=true",
"traefik.http.routers.minio-api.rule=Host(`api.minio.arsenm.dev`)",
"traefik.http.routers.minio-api.rule=Host(`api.minio.elara.ws`)",
"traefik.http.routers.minio-api.tls.certResolver=letsencrypt"
]
}

View File

@ -33,7 +33,7 @@ job "nextcloud" {
env {
NEXTCLOUD_ADMIN_USER = "CHANGE ME"
NEXTCLOUD_ADMIN_PASSWORD = "CHANGE ME"
NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.arsenm.dev"
NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.elara.ws"
}
volume_mount {
@ -52,7 +52,7 @@ job "nextcloud" {
port = "http"
tags = [
"traefik.enable=true",
"traefik.http.routers.nextcloud.rule=Host(`nextcloud.arsenm.dev`)",
"traefik.http.routers.nextcloud.rule=Host(`nextcloud.elara.ws`)",
"traefik.http.routers.nextcloud.tls.certresolver=letsencrypt"
]
@ -112,7 +112,7 @@ job "nextcloud" {
port = "onlyoffice-http"
tags = [
"traefik.enable=true",
"traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.arsenm.dev`)",
"traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.elara.ws`)",
"traefik.http.routers.onlyoffice.tls.certresolver=letsencrypt",
"traefik.http.routers.onlyoffice.middlewares=onlyoffice-headers",
"traefik.http.middlewares.onlyoffice-headers.headers.customrequestheaders.X-Forwarded-Proto=https"

View File

@ -15,7 +15,7 @@ job "searxng" {
env {
BIND_ADDRESS = "0.0.0.0:${NOMAD_PORT_searx}"
SEARXNG_BASE_URL = "https://search.arsenm.dev"
SEARXNG_BASE_URL = "https://search.elara.ws"
SEARXNG_SECRET = "CHANGE ME"
}
@ -39,7 +39,7 @@ job "searxng" {
tags = [
"traefik.enable=true",
"traefik.http.routers.searxng.rule=Host(`search.arsenm.dev`)",
"traefik.http.routers.searxng.rule=Host(`search.elara.ws`)",
"traefik.http.routers.searxng.tls.certResolver=letsencrypt",
"traefik.http.routers.searxng.middlewares=searxng-headers",
"traefik.http.middlewares.searxng-headers.headers.customrequestheaders.X-Robots-Tag=noindex, noarchive, nofollow"

View File

@ -43,12 +43,12 @@ job "traefik" {
"traefik.http.routers.http-catchall.middlewares=https-redirect",
// Forward requests to protected services to Authelia. Remove this if not running Authelia.
"traefik.http.middlewares.authelia.forwardauth.address=http://<authelia address>/api/verify?rd=https://auth.arsenm.dev/",
"traefik.http.middlewares.authelia.forwardauth.address=http://<authelia address>/api/verify?rd=https://auth.elara.ws/",
"traefik.http.middlewares.authelia.forwardauth.trustforwardheader=true",
"traefik.http.middlewares.authelia.forwardauth.authresponseheaders=Remote-User, Remote-Groups",
// Expose Traefik API with authentication. Remove this if not running Authelia.
"traefik.http.routers.traefik.rule=Host(`traefik.arsenm.dev`)",
"traefik.http.routers.traefik.rule=Host(`traefik.elara.ws`)",
"traefik.http.routers.traefik.tls.certResolver=letsencrypt",
"traefik.http.routers.traefik.middlewares=authelia",
]

View File

@ -43,9 +43,9 @@ job "woodpecker" {
env {
WOODPECKER_OPEN = "true"
WOODPECKER_HOST = "https://ci.arsenm.dev"
WOODPECKER_HOST = "https://ci.elara.ws"
WOODPECKER_GITEA = "true"
WOODPECKER_GITEA_URL = "https://gitea.arsenm.dev"
WOODPECKER_GITEA_URL = "https://gitea.elara.ws"
WOODPECKER_GITEA_CLIENT = "CHANGE ME"
WOODPECKER_GITEA_SECRET = "CHANGE ME"
WOODPECKER_AGENT_SECRET = "CHANGE ME"
@ -57,7 +57,7 @@ job "woodpecker" {
tags = [
"traefik.enable=true",
"traefik.http.routers.woodpecker-ci.rule=Host(`ci.arsenm.dev`)",
"traefik.http.routers.woodpecker-ci.rule=Host(`ci.elara.ws`)",
"traefik.http.routers.woodpecker-ci.tls.certResolver=letsencrypt"
]
}