From 1e27bfa170e5d2abfe66bcea7fada6a4fd1e06d9 Mon Sep 17 00:00:00 2001 From: Elara Musayelyan Date: Sat, 29 Jul 2023 21:32:34 -0700 Subject: [PATCH] Update domain --- authelia/authelia.nomad | 2 +- gitea/gitea.nomad | 4 ++-- go-import-redirector/README.md | 2 +- .../go-import-redirector.nomad | 8 ++++---- homer/README.md | 2 +- homer/config.yml | 18 +++++++++--------- homer/homer.nomad | 2 +- lms/lms.nomad | 2 +- lure-web/README.md | 2 +- lure-web/lure-web.nomad | 4 ++-- minio/minio.nomad | 4 ++-- .../nextcloud-onlyoffice.nomad | 6 +++--- searxng/searxng.nomad | 4 ++-- traefik/traefik.nomad | 4 ++-- woodpecker-ci/woodpecker.nomad | 6 +++--- 15 files changed, 35 insertions(+), 35 deletions(-) diff --git a/authelia/authelia.nomad b/authelia/authelia.nomad index 82a7b1d..d134792 100644 --- a/authelia/authelia.nomad +++ b/authelia/authelia.nomad @@ -45,7 +45,7 @@ job "authelia" { tags = [ "traefik.enable=true", - "traefik.http.routers.authelia.rule=Host(`auth.arsenm.dev`)", + "traefik.http.routers.authelia.rule=Host(`auth.elara.ws`)", "traefik.http.routers.authelia.tls.certResolver=letsencrypt", ] } diff --git a/gitea/gitea.nomad b/gitea/gitea.nomad index 2ff0380..c315750 100644 --- a/gitea/gitea.nomad +++ b/gitea/gitea.nomad @@ -48,7 +48,7 @@ job "gitea" { RUN_MODE = "prod" SSH_DOMAIN = "CHANGE ME" SSH_PORT = "$NOMAD_PORT_ssh" - ROOT_URL = "https://gitea.arsenm.dev/" + ROOT_URL = "https://gitea.elara.ws/" USER_UID = "1002" USER_GID = "1002" GITEA__server__START_SSH_SERVER = "true" @@ -65,7 +65,7 @@ job "gitea" { tags = [ "traefik.enable=true", - "traefik.http.routers.gitea.rule=Host(`gitea.arsenm.dev`)", + "traefik.http.routers.gitea.rule=Host(`gitea.elara.ws`)", "traefik.http.routers.gitea.tls.certResolver=letsencrypt" ] } diff --git a/go-import-redirector/README.md b/go-import-redirector/README.md index e69991d..391b0bb 100644 --- a/go-import-redirector/README.md +++ b/go-import-redirector/README.md @@ -1,6 +1,6 @@ # Go Import Redirector -This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.arsenm.dev/Arsen6331/itd@latest`, they can just use `go install go.arsenm.dev/itd@latest` and this service will redirect them. +This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.elara.ws/Arsen6331/itd@latest`, they can just use `go install go.elara.ws/itd@latest` and this service will redirect them. This job file downloads an archive containing `go-import-redirector` executables for `x86_64` and `aarch64`, as well as a script that runs the correct one, from my minio instance. diff --git a/go-import-redirector/go-import-redirector.nomad b/go-import-redirector/go-import-redirector.nomad index a594cc4..6318391 100644 --- a/go-import-redirector/go-import-redirector.nomad +++ b/go-import-redirector/go-import-redirector.nomad @@ -17,13 +17,13 @@ job "go-import-redirector" { command = "local/exec.sh" args = [ "-addr", ":${NOMAD_PORT_http}", - "go.arsenm.dev/*", - "https://gitea.arsenm.dev/Arsen6331/*" + "go.elara.ws/*", + "https://gitea.elara.ws/Arsen6331/*" ] } artifact { - source = "https://api.minio.arsenm.dev/adl/go-import-redirector.tar.gz" + source = "https://api.minio.elara.ws/adl/go-import-redirector.tar.gz" } resources { @@ -37,7 +37,7 @@ job "go-import-redirector" { tags = [ "traefik.enable=true", - "traefik.http.routers.go-import-redirector.rule=Host(`go.arsenm.dev`)", + "traefik.http.routers.go-import-redirector.rule=Host(`go.elara.ws`)", "traefik.http.routers.go-import-redirector.tls.certResolver=letsencrypt" ] } diff --git a/homer/README.md b/homer/README.md index 1d4fdd8..691702a 100644 --- a/homer/README.md +++ b/homer/README.md @@ -2,4 +2,4 @@ This is the nomad job file I use for the [Homer](https://github.com/bastienwirtz/homer/) dashboard. It takes its config file from the Consul Key/Value store. This means that whenever the config is edited, Nomad automatically installs the new file and restarts the container. It also means that Homer is completely stateless, and therefore can be freely moved around by Nomad. -This directory also contains the config I use for my dashboard at https://dashboard.arsenm.dev. This is placed into the Consul K/V store as `homer/config.yml`. \ No newline at end of file +This directory also contains the config I use for my dashboard at https://dashboard.elara.ws. This is placed into the Consul K/V store as `homer/config.yml`. \ No newline at end of file diff --git a/homer/config.yml b/homer/config.yml index 3ad32ae..2dbe8a6 100644 --- a/homer/config.yml +++ b/homer/config.yml @@ -35,27 +35,27 @@ services: - name: "SearXNG" icon: "fa-solid fa-magnifying-glass" subtitle: "Metasearch engine" - url: "https://search.arsenm.dev/" + url: "https://search.elara.ws/" - name: "Nextcloud" icon: "fa-solid fa-cloud" subtitle: "Cloud file storage" - url: "https://nextcloud.arsenm.dev/" + url: "https://nextcloud.elara.ws/" - name: "Home Assistant" icon: "fa-solid fa-house" subtitle: "Home automation hub" - url: "https://hass.arsenm.dev/" + url: "https://hass.elara.ws/" - name: "Gitea" icon: "fa-solid fa-code-branch" subtitle: "Web interface for Git" - url: "https://gitea.arsenm.dev/" + url: "https://gitea.elara.ws/" - name: "Minio" icon: "fa-solid fa-box" subtitle: "Open source S3 implementation" - url: "https://minio.arsenm.dev/" + url: "https://minio.elara.ws/" - name: "LMS" icon: "fa-solid fa-music" subtitle: "Lightweight music server" - url: "https://music.arsenm.dev/" + url: "https://music.elara.ws/" - name: "Piracy" icon: "fa-solid fa-skull-crossbones" items: @@ -73,12 +73,12 @@ services: - name: "Traefik" icon: "fa fa-globe" subtitle: "Reverse proxy" - url: "https://traefik.arsenm.dev/" + url: "https://traefik.elara.ws/" - name: "Nomad" icon: "fa-solid fa-circle-nodes" subtitle: "Cluster orchestrator" - url: "https://nomad.arsenm.dev/" + url: "https://nomad.elara.ws/" - name: "Consul" icon: "fa-solid fa-database" subtitle: "Service discovery and K/V store" - url: "https://consul.arsenm.dev/" \ No newline at end of file + url: "https://consul.elara.ws/" \ No newline at end of file diff --git a/homer/homer.nomad b/homer/homer.nomad index 5c114ec..dd5ea0a 100644 --- a/homer/homer.nomad +++ b/homer/homer.nomad @@ -37,7 +37,7 @@ job "homer" { tags = [ "traefik.enable=true", - "traefik.http.routers.homer.rule=Host(`dashboard.arsenm.dev`)", + "traefik.http.routers.homer.rule=Host(`dashboard.elara.ws`)", "traefik.http.routers.homer.tls.certResolver=letsencrypt", ] } diff --git a/lms/lms.nomad b/lms/lms.nomad index 5c36c22..911d8c2 100644 --- a/lms/lms.nomad +++ b/lms/lms.nomad @@ -50,7 +50,7 @@ job "lms" { tags = [ "traefik.enable=true", - "traefik.http.routers.lms.rule=Host(`music.arsenm.dev`)", + "traefik.http.routers.lms.rule=Host(`music.elara.ws`)", "traefik.http.routers.lms.tls.certResolver=letsencrypt", ] } diff --git a/lure-web/README.md b/lure-web/README.md index 98ae7a4..2ca1ec7 100644 --- a/lure-web/README.md +++ b/lure-web/README.md @@ -1,6 +1,6 @@ # LURE Web -This nomad file is for one of my other projects, [LURE](https://gitea.arsenm.dev/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.arsenm.dev) and its backend API server. +This nomad file is for one of my other projects, [LURE](https://gitea.elara.ws/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.elara.ws) and its backend API server. This job requires no volumes. The only thing that needs to be changed is the Github API secret. This is for a Github webhook, so that the API server knows when the LURE repo changes so it can update its database. diff --git a/lure-web/lure-web.nomad b/lure-web/lure-web.nomad index cc76f20..64c46d3 100644 --- a/lure-web/lure-web.nomad +++ b/lure-web/lure-web.nomad @@ -31,7 +31,7 @@ job "lure-web" { port = "api" tags = [ "traefik.enable=true", - "traefik.http.routers.lure-api-server.rule=Host(`api.lure.arsenm.dev`)", + "traefik.http.routers.lure-api-server.rule=Host(`api.lure.elara.ws`)", "traefik.http.routers.lure-api-server.tls.certresolver=letsencrypt" ] @@ -58,7 +58,7 @@ job "lure-web" { port = "http" tags = [ "traefik.enable=true", - "traefik.http.routers.lure-web.rule=Host(`lure.arsenm.dev`)", + "traefik.http.routers.lure-web.rule=Host(`lure.elara.ws`)", "traefik.http.routers.lure-web.tls.certresolver=letsencrypt", ] } diff --git a/minio/minio.nomad b/minio/minio.nomad index 556cceb..5969f70 100644 --- a/minio/minio.nomad +++ b/minio/minio.nomad @@ -45,7 +45,7 @@ job "minio" { name = "minio" tags = [ "traefik.enable=true", - "traefik.http.routers.minio.rule=Host(`minio.arsenm.dev`)", + "traefik.http.routers.minio.rule=Host(`minio.elara.ws`)", "traefik.http.routers.minio.tls.certResolver=letsencrypt" ] @@ -66,7 +66,7 @@ job "minio" { tags = [ "traefik.enable=true", - "traefik.http.routers.minio-api.rule=Host(`api.minio.arsenm.dev`)", + "traefik.http.routers.minio-api.rule=Host(`api.minio.elara.ws`)", "traefik.http.routers.minio-api.tls.certResolver=letsencrypt" ] } diff --git a/nextcloud-onlyoffice/nextcloud-onlyoffice.nomad b/nextcloud-onlyoffice/nextcloud-onlyoffice.nomad index 999ca22..3524160 100644 --- a/nextcloud-onlyoffice/nextcloud-onlyoffice.nomad +++ b/nextcloud-onlyoffice/nextcloud-onlyoffice.nomad @@ -33,7 +33,7 @@ job "nextcloud" { env { NEXTCLOUD_ADMIN_USER = "CHANGE ME" NEXTCLOUD_ADMIN_PASSWORD = "CHANGE ME" - NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.arsenm.dev" + NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.elara.ws" } volume_mount { @@ -52,7 +52,7 @@ job "nextcloud" { port = "http" tags = [ "traefik.enable=true", - "traefik.http.routers.nextcloud.rule=Host(`nextcloud.arsenm.dev`)", + "traefik.http.routers.nextcloud.rule=Host(`nextcloud.elara.ws`)", "traefik.http.routers.nextcloud.tls.certresolver=letsencrypt" ] @@ -112,7 +112,7 @@ job "nextcloud" { port = "onlyoffice-http" tags = [ "traefik.enable=true", - "traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.arsenm.dev`)", + "traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.elara.ws`)", "traefik.http.routers.onlyoffice.tls.certresolver=letsencrypt", "traefik.http.routers.onlyoffice.middlewares=onlyoffice-headers", "traefik.http.middlewares.onlyoffice-headers.headers.customrequestheaders.X-Forwarded-Proto=https" diff --git a/searxng/searxng.nomad b/searxng/searxng.nomad index 05643f7..a106ddf 100644 --- a/searxng/searxng.nomad +++ b/searxng/searxng.nomad @@ -15,7 +15,7 @@ job "searxng" { env { BIND_ADDRESS = "0.0.0.0:${NOMAD_PORT_searx}" - SEARXNG_BASE_URL = "https://search.arsenm.dev" + SEARXNG_BASE_URL = "https://search.elara.ws" SEARXNG_SECRET = "CHANGE ME" } @@ -39,7 +39,7 @@ job "searxng" { tags = [ "traefik.enable=true", - "traefik.http.routers.searxng.rule=Host(`search.arsenm.dev`)", + "traefik.http.routers.searxng.rule=Host(`search.elara.ws`)", "traefik.http.routers.searxng.tls.certResolver=letsencrypt", "traefik.http.routers.searxng.middlewares=searxng-headers", "traefik.http.middlewares.searxng-headers.headers.customrequestheaders.X-Robots-Tag=noindex, noarchive, nofollow" diff --git a/traefik/traefik.nomad b/traefik/traefik.nomad index 5604d43..2cedb5d 100644 --- a/traefik/traefik.nomad +++ b/traefik/traefik.nomad @@ -43,12 +43,12 @@ job "traefik" { "traefik.http.routers.http-catchall.middlewares=https-redirect", // Forward requests to protected services to Authelia. Remove this if not running Authelia. - "traefik.http.middlewares.authelia.forwardauth.address=http:///api/verify?rd=https://auth.arsenm.dev/", + "traefik.http.middlewares.authelia.forwardauth.address=http:///api/verify?rd=https://auth.elara.ws/", "traefik.http.middlewares.authelia.forwardauth.trustforwardheader=true", "traefik.http.middlewares.authelia.forwardauth.authresponseheaders=Remote-User, Remote-Groups", // Expose Traefik API with authentication. Remove this if not running Authelia. - "traefik.http.routers.traefik.rule=Host(`traefik.arsenm.dev`)", + "traefik.http.routers.traefik.rule=Host(`traefik.elara.ws`)", "traefik.http.routers.traefik.tls.certResolver=letsencrypt", "traefik.http.routers.traefik.middlewares=authelia", ] diff --git a/woodpecker-ci/woodpecker.nomad b/woodpecker-ci/woodpecker.nomad index 3c7305b..ed9a218 100644 --- a/woodpecker-ci/woodpecker.nomad +++ b/woodpecker-ci/woodpecker.nomad @@ -43,9 +43,9 @@ job "woodpecker" { env { WOODPECKER_OPEN = "true" - WOODPECKER_HOST = "https://ci.arsenm.dev" + WOODPECKER_HOST = "https://ci.elara.ws" WOODPECKER_GITEA = "true" - WOODPECKER_GITEA_URL = "https://gitea.arsenm.dev" + WOODPECKER_GITEA_URL = "https://gitea.elara.ws" WOODPECKER_GITEA_CLIENT = "CHANGE ME" WOODPECKER_GITEA_SECRET = "CHANGE ME" WOODPECKER_AGENT_SECRET = "CHANGE ME" @@ -57,7 +57,7 @@ job "woodpecker" { tags = [ "traefik.enable=true", - "traefik.http.routers.woodpecker-ci.rule=Host(`ci.arsenm.dev`)", + "traefik.http.routers.woodpecker-ci.rule=Host(`ci.elara.ws`)", "traefik.http.routers.woodpecker-ci.tls.certResolver=letsencrypt" ] }