migrate internal domain to home.arpa

This commit is contained in:
♥ Minnie ♥ 2024-11-22 07:15:34 +08:00
parent b636d31d9d
commit 1f776ec51d
Signed by: jasmine
GPG key ID: 8563E358D4E8040E
13 changed files with 11 additions and 50 deletions

View file

@ -8,13 +8,13 @@
programs.ssh = { programs.ssh = {
enable = true; enable = true;
matchBlocks."viridian" = { matchBlocks."viridian" = {
hostname = "viridian.kanto.dev"; hostname = "viridian.home.arpa";
identityFile = "/home/sajenim/.ssh/sajenim_sk"; identityFile = "/home/sajenim/.ssh/sajenim_sk";
port = 22; port = 22;
}; };
matchBlocks."lavender" = { matchBlocks."lavender" = {
hostname = "lavender.kanto.dev"; hostname = "lavender.home.arpa";
identityFile = "/home/sajenim/.ssh/sajenim_sk"; identityFile = "/home/sajenim/.ssh/sajenim_sk";
port = 22; port = 22;
}; };

View file

@ -33,7 +33,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = { services.traefik.dynamicConfigOptions.http.routers = {
jellyfin = { jellyfin = {
rule = "Host(`jellyfin.kanto.dev`)"; rule = "Host(`jellyfin.home.arpa`)";
entryPoints = [ entryPoints = [
"websecure" "websecure"
]; ];

View file

@ -27,7 +27,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = { services.traefik.dynamicConfigOptions.http.routers = {
lidarr = { lidarr = {
rule = "Host(`lidarr.kanto.dev`)"; rule = "Host(`lidarr.home.arpa`)";
entryPoints = [ entryPoints = [
"websecure" "websecure"
]; ];

View file

@ -24,7 +24,7 @@ in {
}; };
services.traefik.dynamicConfigOptions.http.routers = { services.traefik.dynamicConfigOptions.http.routers = {
prowlarr = { prowlarr = {
rule = "Host(`prowlarr.kanto.dev`)"; rule = "Host(`prowlarr.home.arpa`)";
entryPoints = [ entryPoints = [
"websecure" "websecure"
]; ];

View file

@ -27,7 +27,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = { services.traefik.dynamicConfigOptions.http.routers = {
qbittorrent = { qbittorrent = {
rule = "Host(`qbittorrent.kanto.dev`)"; rule = "Host(`qbittorrent.home.arpa`)";
entryPoints = [ entryPoints = [
"websecure" "websecure"
]; ];

View file

@ -26,7 +26,7 @@ in {
}; };
services.traefik.dynamicConfigOptions.http.routers = { services.traefik.dynamicConfigOptions.http.routers = {
radarr = { radarr = {
rule = "Host(`radarr.kanto.dev`)"; rule = "Host(`radarr.home.arpa`)";
entryPoints = [ entryPoints = [
"websecure" "websecure"
]; ];

View file

@ -27,7 +27,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = { services.traefik.dynamicConfigOptions.http.routers = {
sonarr = { sonarr = {
rule = "Host(`sonarr.kanto.dev`)"; rule = "Host(`sonarr.home.arpa`)";
entryPoints = [ entryPoints = [
"websecure" "websecure"
]; ];

View file

@ -81,7 +81,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = { services.traefik.dynamicConfigOptions.http.routers = {
minecraft = { minecraft = {
rule = "Host(`minecraft.kanto.dev`)"; rule = "Host(`minecraft.home.arpa`)";
entryPoints = [ entryPoints = [
"websecure" "websecure"
]; ];

View file

@ -21,7 +21,7 @@
statdPort = 4000; statdPort = 4000;
extraNfsdConfig = ''''; extraNfsdConfig = '''';
exports = '' exports = ''
/srv/multimedia/library/music fuchsia.kanto.dev(rw,nohide,insecure,no_subtree_check) /srv/multimedia/library/music fuchsia.home.arpa(rw,nohide,insecure,no_subtree_check)
''; '';
}; };
networking.firewall = { networking.firewall = {

View file

@ -18,7 +18,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = { services.traefik.dynamicConfigOptions.http.routers = {
paperless-ngx = { paperless-ngx = {
rule = "Host(`docs.kanto.dev`)"; rule = "Host(`docs.home.arpa`)";
entryPoints = [ entryPoints = [
"websecure" "websecure"
]; ];

View file

@ -8,9 +8,7 @@
imports = [ imports = [
"${inputs.nixpkgs-unstable}/nixos/modules/services/web-servers/traefik.nix" "${inputs.nixpkgs-unstable}/nixos/modules/services/web-servers/traefik.nix"
./routers.nix
./middlewares.nix ./middlewares.nix
./services.nix
]; ];
age.secrets.traefik = { age.secrets.traefik = {
@ -88,11 +86,6 @@
certResolver = "lets-encrypt"; certResolver = "lets-encrypt";
# List of domains in our network # List of domains in our network
domains = [ domains = [
# Internal services
{
main = "kanto.dev";
sans = ["*.kanto.dev"];
}
# Public services # Public services
{ {
main = "sajenim.dev"; main = "sajenim.dev";

View file

@ -1,25 +0,0 @@
{...}: {
services.traefik.dynamicConfigOptions.http.routers = {
traefik-dashboard = {
rule = "Host(`traefik.kanto.dev`)";
entryPoints = [
"websecure"
];
middlewares = [
"internal"
];
service = "api@internal";
};
ender1 = {
rule = "Host(`e1.kanto.dev`)";
entryPoints = [
"websecure"
];
middlewares = [
"internal"
];
service = "ender1";
};
};
}

View file

@ -1,7 +0,0 @@
{...}: {
services.traefik.dynamicConfigOptions.http.services = {
ender1.loadBalancer.servers = [
{url = "http://192.168.50.202:80";}
];
};
}