Migrate admin middleware to internal
This commit is contained in:
parent
e3185359b1
commit
a5100fe7fa
|
@ -34,7 +34,7 @@ in
|
||||||
"websecure"
|
"websecure"
|
||||||
];
|
];
|
||||||
middlewares = [
|
middlewares = [
|
||||||
"admin"
|
"internal"
|
||||||
];
|
];
|
||||||
service = "lidarr";
|
service = "lidarr";
|
||||||
};
|
};
|
||||||
|
|
|
@ -31,7 +31,7 @@ in
|
||||||
"websecure"
|
"websecure"
|
||||||
];
|
];
|
||||||
middlewares = [
|
middlewares = [
|
||||||
"admin"
|
"internal"
|
||||||
];
|
];
|
||||||
service = "prowlarr";
|
service = "prowlarr";
|
||||||
};
|
};
|
||||||
|
|
|
@ -34,7 +34,7 @@ in
|
||||||
"websecure"
|
"websecure"
|
||||||
];
|
];
|
||||||
middlewares = [
|
middlewares = [
|
||||||
"admin"
|
"internal"
|
||||||
];
|
];
|
||||||
service = "qbittorrent";
|
service = "qbittorrent";
|
||||||
};
|
};
|
||||||
|
|
|
@ -33,7 +33,7 @@ in
|
||||||
"websecure"
|
"websecure"
|
||||||
];
|
];
|
||||||
middlewares = [
|
middlewares = [
|
||||||
"admin"
|
"internal"
|
||||||
];
|
];
|
||||||
service = "radarr";
|
service = "radarr";
|
||||||
};
|
};
|
||||||
|
|
|
@ -34,7 +34,7 @@ in
|
||||||
"websecure"
|
"websecure"
|
||||||
];
|
];
|
||||||
middlewares = [
|
middlewares = [
|
||||||
"admin"
|
"internal"
|
||||||
];
|
];
|
||||||
service = "sonarr";
|
service = "sonarr";
|
||||||
};
|
};
|
||||||
|
|
|
@ -41,7 +41,7 @@
|
||||||
"websecure"
|
"websecure"
|
||||||
];
|
];
|
||||||
middlewares = [
|
middlewares = [
|
||||||
"admin"
|
"internal"
|
||||||
];
|
];
|
||||||
service = "grafana";
|
service = "grafana";
|
||||||
};
|
};
|
||||||
|
|
|
@ -10,18 +10,10 @@
|
||||||
|
|
||||||
# Attached to the routers, pieces of middleware are a means of tweaking the requests before they are sent to your service
|
# Attached to the routers, pieces of middleware are a means of tweaking the requests before they are sent to your service
|
||||||
services.traefik.dynamicConfigOptions.http.middlewares = {
|
services.traefik.dynamicConfigOptions.http.middlewares = {
|
||||||
# Restrict access to admin devices only
|
|
||||||
admin.ipwhitelist.sourcerange = [
|
|
||||||
"127.0.0.1/32" # localhost
|
|
||||||
"192.168.1.101" # fuchsia
|
|
||||||
"10.100.0.2" # Pixel 6 Pro
|
|
||||||
];
|
|
||||||
|
|
||||||
# Restrict access to internal networks
|
# Restrict access to internal networks
|
||||||
internal.ipwhitelist.sourcerange = [
|
internal.ipwhitelist.sourcerange = [
|
||||||
"127.0.0.1/32" # localhost
|
"127.0.0.1/32" # localhost
|
||||||
"192.168.1.1/24" # lan
|
"192.168.20.1/24" # lan
|
||||||
"10.100.0.0/24" # wireguard clients
|
|
||||||
];
|
];
|
||||||
|
|
||||||
# Restrict access based on geo-location
|
# Restrict access based on geo-location
|
||||||
|
|
Loading…
Reference in a new issue