diff --git a/nixos/viridian/services/traefik/middlewares.nix b/nixos/viridian/services/traefik/middlewares.nix index cc0becb..28f84f7 100644 --- a/nixos/viridian/services/traefik/middlewares.nix +++ b/nixos/viridian/services/traefik/middlewares.nix @@ -11,7 +11,7 @@ # Restrict access to internal networks internal.ipwhitelist.sourcerange = [ "127.0.0.1/32" # localhost - "192.168.20.1/24" # lan + "192.168.50.1/24" # lan ]; # Restrict access based on geo-location diff --git a/nixos/viridian/services/traefik/routers.nix b/nixos/viridian/services/traefik/routers.nix index 0fa790c..82e5cca 100644 --- a/nixos/viridian/services/traefik/routers.nix +++ b/nixos/viridian/services/traefik/routers.nix @@ -6,7 +6,7 @@ "websecure" ]; middlewares = [ - "admin" + "internal" ]; service = "api@internal"; }; @@ -17,7 +17,7 @@ "websecure" ]; middlewares = [ - "admin" + "internal" ]; service = "ender1"; }; diff --git a/nixos/viridian/services/traefik/services.nix b/nixos/viridian/services/traefik/services.nix index b03fc0c..bfdb5fa 100644 --- a/nixos/viridian/services/traefik/services.nix +++ b/nixos/viridian/services/traefik/services.nix @@ -1,7 +1,7 @@ {...}: { services.traefik.dynamicConfigOptions.http.services = { ender1.loadBalancer.servers = [ - {url = "http://192.168.1.103:80";} + {url = "http://192.168.50.201:80";} ]; }; }