migrate internal domain to home.arpa

This commit is contained in:
♥ Minnie ♥ 2024-11-22 07:15:34 +08:00
parent b636d31d9d
commit 1f776ec51d
Signed by: jasmine
GPG key ID: 8563E358D4E8040E
13 changed files with 11 additions and 50 deletions

View file

@ -8,13 +8,13 @@
programs.ssh = {
enable = true;
matchBlocks."viridian" = {
hostname = "viridian.kanto.dev";
hostname = "viridian.home.arpa";
identityFile = "/home/sajenim/.ssh/sajenim_sk";
port = 22;
};
matchBlocks."lavender" = {
hostname = "lavender.kanto.dev";
hostname = "lavender.home.arpa";
identityFile = "/home/sajenim/.ssh/sajenim_sk";
port = 22;
};

View file

@ -33,7 +33,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = {
jellyfin = {
rule = "Host(`jellyfin.kanto.dev`)";
rule = "Host(`jellyfin.home.arpa`)";
entryPoints = [
"websecure"
];

View file

@ -27,7 +27,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = {
lidarr = {
rule = "Host(`lidarr.kanto.dev`)";
rule = "Host(`lidarr.home.arpa`)";
entryPoints = [
"websecure"
];

View file

@ -24,7 +24,7 @@ in {
};
services.traefik.dynamicConfigOptions.http.routers = {
prowlarr = {
rule = "Host(`prowlarr.kanto.dev`)";
rule = "Host(`prowlarr.home.arpa`)";
entryPoints = [
"websecure"
];

View file

@ -27,7 +27,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = {
qbittorrent = {
rule = "Host(`qbittorrent.kanto.dev`)";
rule = "Host(`qbittorrent.home.arpa`)";
entryPoints = [
"websecure"
];

View file

@ -26,7 +26,7 @@ in {
};
services.traefik.dynamicConfigOptions.http.routers = {
radarr = {
rule = "Host(`radarr.kanto.dev`)";
rule = "Host(`radarr.home.arpa`)";
entryPoints = [
"websecure"
];

View file

@ -27,7 +27,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = {
sonarr = {
rule = "Host(`sonarr.kanto.dev`)";
rule = "Host(`sonarr.home.arpa`)";
entryPoints = [
"websecure"
];

View file

@ -81,7 +81,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = {
minecraft = {
rule = "Host(`minecraft.kanto.dev`)";
rule = "Host(`minecraft.home.arpa`)";
entryPoints = [
"websecure"
];

View file

@ -21,7 +21,7 @@
statdPort = 4000;
extraNfsdConfig = '''';
exports = ''
/srv/multimedia/library/music fuchsia.kanto.dev(rw,nohide,insecure,no_subtree_check)
/srv/multimedia/library/music fuchsia.home.arpa(rw,nohide,insecure,no_subtree_check)
'';
};
networking.firewall = {

View file

@ -18,7 +18,7 @@ in {
services.traefik.dynamicConfigOptions.http.routers = {
paperless-ngx = {
rule = "Host(`docs.kanto.dev`)";
rule = "Host(`docs.home.arpa`)";
entryPoints = [
"websecure"
];

View file

@ -8,9 +8,7 @@
imports = [
"${inputs.nixpkgs-unstable}/nixos/modules/services/web-servers/traefik.nix"
./routers.nix
./middlewares.nix
./services.nix
];
age.secrets.traefik = {
@ -88,11 +86,6 @@
certResolver = "lets-encrypt";
# List of domains in our network
domains = [
# Internal services
{
main = "kanto.dev";
sans = ["*.kanto.dev"];
}
# Public services
{
main = "sajenim.dev";

View file

@ -1,25 +0,0 @@
{...}: {
services.traefik.dynamicConfigOptions.http.routers = {
traefik-dashboard = {
rule = "Host(`traefik.kanto.dev`)";
entryPoints = [
"websecure"
];
middlewares = [
"internal"
];
service = "api@internal";
};
ender1 = {
rule = "Host(`e1.kanto.dev`)";
entryPoints = [
"websecure"
];
middlewares = [
"internal"
];
service = "ender1";
};
};
}

View file

@ -1,7 +0,0 @@
{...}: {
services.traefik.dynamicConfigOptions.http.services = {
ender1.loadBalancer.servers = [
{url = "http://192.168.50.202:80";}
];
};
}