Compare commits

..

18 Commits

Author SHA1 Message Date
836335711e Update Traefik services 2026-01-18 20:59:14 +01:00
be842e7cff Update Traefik services 2026-01-18 20:57:39 +01:00
15b374870a fix fefan entry 2026-01-18 20:52:47 +01:00
aaddb266c6 Update Traefik services 2026-01-18 20:44:09 +01:00
656cb5ef80 Update Traefik services 2026-01-18 20:37:38 +01:00
403cb50bb4 fix service 2026-01-18 20:24:45 +01:00
1bd848118c Update Traefik services 2026-01-18 20:18:25 +01:00
2187296989 Update Traefik services 2026-01-18 19:08:19 +01:00
dc4ea265a6 Update Traefik services 2026-01-18 19:04:33 +01:00
7f7ad081f4 Update Traefik services 2026-01-18 18:49:49 +01:00
560fa3c015 Update Traefik services 2026-01-18 18:46:47 +01:00
0d0208fb25 Update Traefik services 2026-01-18 18:38:12 +01:00
124bdb1b67 Merge pull request 'traefik' (#1) from traefik into main
Reviewed-on: #1
2026-01-18 18:16:18 +01:00
bed2f5a163 Update Traefik services 2026-01-18 11:06:59 +01:00
d781f7d716 remove service 2026-01-18 11:06:41 +01:00
b5c5c994c5 Update Traefik services 2026-01-18 11:04:27 +01:00
9e01be6e6d add traefik branch 2026-01-18 09:56:59 +01:00
d2be739590 add nginx config files 2026-01-11 16:59:07 +01:00

140
services.yml Normal file
View File

@@ -0,0 +1,140 @@
# testt
http:
routers:
http-catchall:
rule: "HostRegexp(`{host:.+}`)"
entryPoints:
- web
middlewares:
- redirect-to-https
service: noop
bookshelf:
rule: "Host(`bookshelf.aldon.fr`)"
entryPoints:
- websecure
service: bookshelf
tls:
certResolver: letsencrypt
gitea:
rule: "Host(`gitea.aldon.fr`)"
entryPoints:
- websecure
service: gitea
tls:
certResolver: letsencrypt
nextcloud:
rule: "Host(`nextcloud.aldon.fr`)"
entryPoints:
- websecure
service: nextcloud
tls:
certResolver: letsencrypt
rocket:
rule: "Host(`discussion.fefan.fr`)"
entryPoints:
- websecure
service: rocket
tls:
certResolver: letsencrypt
wiki:
rule: "Host(`benoit.mathieu.wiki`)"
entryPoints:
- websecure
service: wiki
tls:
certResolver: letsencrypt
vaultwarden:
rule: "Host(`vaultwarden.aldon.fr`)"
entryPoints:
- websecure
service: vaultwarden
tls:
certResolver: letsencrypt
keycloak:
rule: "Host(`keycloak.aldon.fr`)"
entryPoints:
- websecure
service: keycloak
tls:
certResolver: letsencrypt
fefan:
rule: "Host(`fefan.fr`)"
entryPoints:
- websecure
service: fefan
tls:
certResolver: letsencrypt
content-fefan:
rule: "Host(`content.fefan.fr`)"
entryPoints:
- websecure
service: content-fefan
tls:
certResolver: letsencrypt
services:
bookshelf:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.91:80"
gitea:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.90:3000"
noop:
loadBalancer:
servers:
- url: "http://127.0.0.1"
nextcloud:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.30:11000"
rocket:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.15:3000"
wiki:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.38:8080"
vaultwarden:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.36:80"
keycloak:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.34:8080"
fefan:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.11:3000"
content-fefan:
loadBalancer:
passHostHeader: true
servers:
- url: "http://192.168.1.11:1337"
middlewares:
redirect-to-https:
redirectScheme:
scheme: https