Update domain

This commit is contained in:
Elara 2023-07-29 21:32:34 -07:00
parent 5735912ffc
commit 1e27bfa170
15 changed files with 35 additions and 35 deletions

View File

@ -45,7 +45,7 @@ job "authelia" {
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.authelia.rule=Host(`auth.arsenm.dev`)", "traefik.http.routers.authelia.rule=Host(`auth.elara.ws`)",
"traefik.http.routers.authelia.tls.certResolver=letsencrypt", "traefik.http.routers.authelia.tls.certResolver=letsencrypt",
] ]
} }

View File

@ -48,7 +48,7 @@ job "gitea" {
RUN_MODE = "prod" RUN_MODE = "prod"
SSH_DOMAIN = "CHANGE ME" SSH_DOMAIN = "CHANGE ME"
SSH_PORT = "$NOMAD_PORT_ssh" SSH_PORT = "$NOMAD_PORT_ssh"
ROOT_URL = "https://gitea.arsenm.dev/" ROOT_URL = "https://gitea.elara.ws/"
USER_UID = "1002" USER_UID = "1002"
USER_GID = "1002" USER_GID = "1002"
GITEA__server__START_SSH_SERVER = "true" GITEA__server__START_SSH_SERVER = "true"
@ -65,7 +65,7 @@ job "gitea" {
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.gitea.rule=Host(`gitea.arsenm.dev`)", "traefik.http.routers.gitea.rule=Host(`gitea.elara.ws`)",
"traefik.http.routers.gitea.tls.certResolver=letsencrypt" "traefik.http.routers.gitea.tls.certResolver=letsencrypt"
] ]
} }

View File

@ -1,6 +1,6 @@
# Go Import Redirector # Go Import Redirector
This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.arsenm.dev/Arsen6331/itd@latest`, they can just use `go install go.arsenm.dev/itd@latest` and this service will redirect them. This is the nomad job file I use for rsc's [go-import-redirector](https://github.com/rsc/go-import-redirector), which redirects the Go programming language tool to the proper github repo. For example, if someone tries to install one of my projects, rather than having to type out `go install gitea.elara.ws/Arsen6331/itd@latest`, they can just use `go install go.elara.ws/itd@latest` and this service will redirect them.
This job file downloads an archive containing `go-import-redirector` executables for `x86_64` and `aarch64`, as well as a script that runs the correct one, from my minio instance. This job file downloads an archive containing `go-import-redirector` executables for `x86_64` and `aarch64`, as well as a script that runs the correct one, from my minio instance.

View File

@ -17,13 +17,13 @@ job "go-import-redirector" {
command = "local/exec.sh" command = "local/exec.sh"
args = [ args = [
"-addr", ":${NOMAD_PORT_http}", "-addr", ":${NOMAD_PORT_http}",
"go.arsenm.dev/*", "go.elara.ws/*",
"https://gitea.arsenm.dev/Arsen6331/*" "https://gitea.elara.ws/Arsen6331/*"
] ]
} }
artifact { artifact {
source = "https://api.minio.arsenm.dev/adl/go-import-redirector.tar.gz" source = "https://api.minio.elara.ws/adl/go-import-redirector.tar.gz"
} }
resources { resources {
@ -37,7 +37,7 @@ job "go-import-redirector" {
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.go-import-redirector.rule=Host(`go.arsenm.dev`)", "traefik.http.routers.go-import-redirector.rule=Host(`go.elara.ws`)",
"traefik.http.routers.go-import-redirector.tls.certResolver=letsencrypt" "traefik.http.routers.go-import-redirector.tls.certResolver=letsencrypt"
] ]
} }

View File

@ -2,4 +2,4 @@
This is the nomad job file I use for the [Homer](https://github.com/bastienwirtz/homer/) dashboard. It takes its config file from the Consul Key/Value store. This means that whenever the config is edited, Nomad automatically installs the new file and restarts the container. It also means that Homer is completely stateless, and therefore can be freely moved around by Nomad. This is the nomad job file I use for the [Homer](https://github.com/bastienwirtz/homer/) dashboard. It takes its config file from the Consul Key/Value store. This means that whenever the config is edited, Nomad automatically installs the new file and restarts the container. It also means that Homer is completely stateless, and therefore can be freely moved around by Nomad.
This directory also contains the config I use for my dashboard at https://dashboard.arsenm.dev. This is placed into the Consul K/V store as `homer/config.yml`. This directory also contains the config I use for my dashboard at https://dashboard.elara.ws. This is placed into the Consul K/V store as `homer/config.yml`.

View File

@ -35,27 +35,27 @@ services:
- name: "SearXNG" - name: "SearXNG"
icon: "fa-solid fa-magnifying-glass" icon: "fa-solid fa-magnifying-glass"
subtitle: "Metasearch engine" subtitle: "Metasearch engine"
url: "https://search.arsenm.dev/" url: "https://search.elara.ws/"
- name: "Nextcloud" - name: "Nextcloud"
icon: "fa-solid fa-cloud" icon: "fa-solid fa-cloud"
subtitle: "Cloud file storage" subtitle: "Cloud file storage"
url: "https://nextcloud.arsenm.dev/" url: "https://nextcloud.elara.ws/"
- name: "Home Assistant" - name: "Home Assistant"
icon: "fa-solid fa-house" icon: "fa-solid fa-house"
subtitle: "Home automation hub" subtitle: "Home automation hub"
url: "https://hass.arsenm.dev/" url: "https://hass.elara.ws/"
- name: "Gitea" - name: "Gitea"
icon: "fa-solid fa-code-branch" icon: "fa-solid fa-code-branch"
subtitle: "Web interface for Git" subtitle: "Web interface for Git"
url: "https://gitea.arsenm.dev/" url: "https://gitea.elara.ws/"
- name: "Minio" - name: "Minio"
icon: "fa-solid fa-box" icon: "fa-solid fa-box"
subtitle: "Open source S3 implementation" subtitle: "Open source S3 implementation"
url: "https://minio.arsenm.dev/" url: "https://minio.elara.ws/"
- name: "LMS" - name: "LMS"
icon: "fa-solid fa-music" icon: "fa-solid fa-music"
subtitle: "Lightweight music server" subtitle: "Lightweight music server"
url: "https://music.arsenm.dev/" url: "https://music.elara.ws/"
- name: "Piracy" - name: "Piracy"
icon: "fa-solid fa-skull-crossbones" icon: "fa-solid fa-skull-crossbones"
items: items:
@ -73,12 +73,12 @@ services:
- name: "Traefik" - name: "Traefik"
icon: "fa fa-globe" icon: "fa fa-globe"
subtitle: "Reverse proxy" subtitle: "Reverse proxy"
url: "https://traefik.arsenm.dev/" url: "https://traefik.elara.ws/"
- name: "Nomad" - name: "Nomad"
icon: "fa-solid fa-circle-nodes" icon: "fa-solid fa-circle-nodes"
subtitle: "Cluster orchestrator" subtitle: "Cluster orchestrator"
url: "https://nomad.arsenm.dev/" url: "https://nomad.elara.ws/"
- name: "Consul" - name: "Consul"
icon: "fa-solid fa-database" icon: "fa-solid fa-database"
subtitle: "Service discovery and K/V store" subtitle: "Service discovery and K/V store"
url: "https://consul.arsenm.dev/" url: "https://consul.elara.ws/"

View File

@ -37,7 +37,7 @@ job "homer" {
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.homer.rule=Host(`dashboard.arsenm.dev`)", "traefik.http.routers.homer.rule=Host(`dashboard.elara.ws`)",
"traefik.http.routers.homer.tls.certResolver=letsencrypt", "traefik.http.routers.homer.tls.certResolver=letsencrypt",
] ]
} }

View File

@ -50,7 +50,7 @@ job "lms" {
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.lms.rule=Host(`music.arsenm.dev`)", "traefik.http.routers.lms.rule=Host(`music.elara.ws`)",
"traefik.http.routers.lms.tls.certResolver=letsencrypt", "traefik.http.routers.lms.tls.certResolver=letsencrypt",
] ]
} }

View File

@ -1,6 +1,6 @@
# LURE Web # LURE Web
This nomad file is for one of my other projects, [LURE](https://gitea.arsenm.dev/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.arsenm.dev) and its backend API server. This nomad file is for one of my other projects, [LURE](https://gitea.elara.ws/Arsen6331/lure). Specifically, it runs [LURE's Web interface](https://lure.elara.ws) and its backend API server.
This job requires no volumes. The only thing that needs to be changed is the Github API secret. This is for a Github webhook, so that the API server knows when the LURE repo changes so it can update its database. This job requires no volumes. The only thing that needs to be changed is the Github API secret. This is for a Github webhook, so that the API server knows when the LURE repo changes so it can update its database.

View File

@ -31,7 +31,7 @@ job "lure-web" {
port = "api" port = "api"
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.lure-api-server.rule=Host(`api.lure.arsenm.dev`)", "traefik.http.routers.lure-api-server.rule=Host(`api.lure.elara.ws`)",
"traefik.http.routers.lure-api-server.tls.certresolver=letsencrypt" "traefik.http.routers.lure-api-server.tls.certresolver=letsencrypt"
] ]
@ -58,7 +58,7 @@ job "lure-web" {
port = "http" port = "http"
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.lure-web.rule=Host(`lure.arsenm.dev`)", "traefik.http.routers.lure-web.rule=Host(`lure.elara.ws`)",
"traefik.http.routers.lure-web.tls.certresolver=letsencrypt", "traefik.http.routers.lure-web.tls.certresolver=letsencrypt",
] ]
} }

View File

@ -45,7 +45,7 @@ job "minio" {
name = "minio" name = "minio"
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.minio.rule=Host(`minio.arsenm.dev`)", "traefik.http.routers.minio.rule=Host(`minio.elara.ws`)",
"traefik.http.routers.minio.tls.certResolver=letsencrypt" "traefik.http.routers.minio.tls.certResolver=letsencrypt"
] ]
@ -66,7 +66,7 @@ job "minio" {
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.minio-api.rule=Host(`api.minio.arsenm.dev`)", "traefik.http.routers.minio-api.rule=Host(`api.minio.elara.ws`)",
"traefik.http.routers.minio-api.tls.certResolver=letsencrypt" "traefik.http.routers.minio-api.tls.certResolver=letsencrypt"
] ]
} }

View File

@ -33,7 +33,7 @@ job "nextcloud" {
env { env {
NEXTCLOUD_ADMIN_USER = "CHANGE ME" NEXTCLOUD_ADMIN_USER = "CHANGE ME"
NEXTCLOUD_ADMIN_PASSWORD = "CHANGE ME" NEXTCLOUD_ADMIN_PASSWORD = "CHANGE ME"
NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.arsenm.dev" NEXTCLOUD_TRUSTED_DOMAINS = "nextcloud.elara.ws"
} }
volume_mount { volume_mount {
@ -52,7 +52,7 @@ job "nextcloud" {
port = "http" port = "http"
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.nextcloud.rule=Host(`nextcloud.arsenm.dev`)", "traefik.http.routers.nextcloud.rule=Host(`nextcloud.elara.ws`)",
"traefik.http.routers.nextcloud.tls.certresolver=letsencrypt" "traefik.http.routers.nextcloud.tls.certresolver=letsencrypt"
] ]
@ -112,7 +112,7 @@ job "nextcloud" {
port = "onlyoffice-http" port = "onlyoffice-http"
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.arsenm.dev`)", "traefik.http.routers.onlyoffice.rule=Host(`onlyoffice.elara.ws`)",
"traefik.http.routers.onlyoffice.tls.certresolver=letsencrypt", "traefik.http.routers.onlyoffice.tls.certresolver=letsencrypt",
"traefik.http.routers.onlyoffice.middlewares=onlyoffice-headers", "traefik.http.routers.onlyoffice.middlewares=onlyoffice-headers",
"traefik.http.middlewares.onlyoffice-headers.headers.customrequestheaders.X-Forwarded-Proto=https" "traefik.http.middlewares.onlyoffice-headers.headers.customrequestheaders.X-Forwarded-Proto=https"

View File

@ -15,7 +15,7 @@ job "searxng" {
env { env {
BIND_ADDRESS = "0.0.0.0:${NOMAD_PORT_searx}" BIND_ADDRESS = "0.0.0.0:${NOMAD_PORT_searx}"
SEARXNG_BASE_URL = "https://search.arsenm.dev" SEARXNG_BASE_URL = "https://search.elara.ws"
SEARXNG_SECRET = "CHANGE ME" SEARXNG_SECRET = "CHANGE ME"
} }
@ -39,7 +39,7 @@ job "searxng" {
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.searxng.rule=Host(`search.arsenm.dev`)", "traefik.http.routers.searxng.rule=Host(`search.elara.ws`)",
"traefik.http.routers.searxng.tls.certResolver=letsencrypt", "traefik.http.routers.searxng.tls.certResolver=letsencrypt",
"traefik.http.routers.searxng.middlewares=searxng-headers", "traefik.http.routers.searxng.middlewares=searxng-headers",
"traefik.http.middlewares.searxng-headers.headers.customrequestheaders.X-Robots-Tag=noindex, noarchive, nofollow" "traefik.http.middlewares.searxng-headers.headers.customrequestheaders.X-Robots-Tag=noindex, noarchive, nofollow"

View File

@ -43,12 +43,12 @@ job "traefik" {
"traefik.http.routers.http-catchall.middlewares=https-redirect", "traefik.http.routers.http-catchall.middlewares=https-redirect",
// Forward requests to protected services to Authelia. Remove this if not running Authelia. // Forward requests to protected services to Authelia. Remove this if not running Authelia.
"traefik.http.middlewares.authelia.forwardauth.address=http://<authelia address>/api/verify?rd=https://auth.arsenm.dev/", "traefik.http.middlewares.authelia.forwardauth.address=http://<authelia address>/api/verify?rd=https://auth.elara.ws/",
"traefik.http.middlewares.authelia.forwardauth.trustforwardheader=true", "traefik.http.middlewares.authelia.forwardauth.trustforwardheader=true",
"traefik.http.middlewares.authelia.forwardauth.authresponseheaders=Remote-User, Remote-Groups", "traefik.http.middlewares.authelia.forwardauth.authresponseheaders=Remote-User, Remote-Groups",
// Expose Traefik API with authentication. Remove this if not running Authelia. // Expose Traefik API with authentication. Remove this if not running Authelia.
"traefik.http.routers.traefik.rule=Host(`traefik.arsenm.dev`)", "traefik.http.routers.traefik.rule=Host(`traefik.elara.ws`)",
"traefik.http.routers.traefik.tls.certResolver=letsencrypt", "traefik.http.routers.traefik.tls.certResolver=letsencrypt",
"traefik.http.routers.traefik.middlewares=authelia", "traefik.http.routers.traefik.middlewares=authelia",
] ]

View File

@ -43,9 +43,9 @@ job "woodpecker" {
env { env {
WOODPECKER_OPEN = "true" WOODPECKER_OPEN = "true"
WOODPECKER_HOST = "https://ci.arsenm.dev" WOODPECKER_HOST = "https://ci.elara.ws"
WOODPECKER_GITEA = "true" WOODPECKER_GITEA = "true"
WOODPECKER_GITEA_URL = "https://gitea.arsenm.dev" WOODPECKER_GITEA_URL = "https://gitea.elara.ws"
WOODPECKER_GITEA_CLIENT = "CHANGE ME" WOODPECKER_GITEA_CLIENT = "CHANGE ME"
WOODPECKER_GITEA_SECRET = "CHANGE ME" WOODPECKER_GITEA_SECRET = "CHANGE ME"
WOODPECKER_AGENT_SECRET = "CHANGE ME" WOODPECKER_AGENT_SECRET = "CHANGE ME"
@ -57,7 +57,7 @@ job "woodpecker" {
tags = [ tags = [
"traefik.enable=true", "traefik.enable=true",
"traefik.http.routers.woodpecker-ci.rule=Host(`ci.arsenm.dev`)", "traefik.http.routers.woodpecker-ci.rule=Host(`ci.elara.ws`)",
"traefik.http.routers.woodpecker-ci.tls.certResolver=letsencrypt" "traefik.http.routers.woodpecker-ci.tls.certResolver=letsencrypt"
] ]
} }