expose remaining disabled endpoints on port 444

This commit is contained in:
Pim Kunis 2024-04-08 20:56:24 +02:00
parent f78631e3ae
commit e184254dee
3 changed files with 207 additions and 112 deletions

View file

@ -686,113 +686,184 @@
};
};
# transmission.spec = {
# ingressClassName = "traefik";
transmission = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# rules = [{
# host = "transmission.kun.is";
spec = {
ingressClassName = "traefik";
# http.paths = [{
# path = "/";
# pathType = "Prefix";
rules = [{
host = "transmission.kun.is";
# backend.service = {
# name = "transmission-web";
# port.number = 80;
# };
# }];
# }];
# };
http.paths = [{
path = "/";
pathType = "Prefix";
# jellyseerr.spec = {
# ingressClassName = "traefik";
backend.service = {
name = "transmission-web";
port.number = 80;
};
}];
}];
# rules = [{
# host = "jellyseerr.kun.is";
tls = [{
secretName = "transmission-tls";
hosts = [ "transmission.kun.is" ];
}];
};
};
# http.paths = [{
# path = "/";
# pathType = "Prefix";
jellyseerr = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# backend.service = {
# name = "jellyseerr";
# port.number = 80;
# };
# }];
# }];
# };
spec = {
ingressClassName = "traefik";
# radarr.spec = {
# ingressClassName = "traefik";
rules = [{
host = "jellyseerr.kun.is";
# rules = [{
# host = "radarr.kun.is";
http.paths = [{
path = "/";
pathType = "Prefix";
# http.paths = [{
# path = "/";
# pathType = "Prefix";
backend.service = {
name = "jellyseerr";
port.number = 80;
};
}];
}];
# backend.service = {
# name = "radarr";
# port.number = 80;
# };
# }];
# }];
# };
tls = [{
secretName = "jellyseerr-tls";
hosts = [ "jellyseerr.kun.is" ];
}];
};
};
# prowlarr.spec = {
# ingressClassName = "traefik";
radarr = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# rules = [{
# host = "prowlarr.kun.is";
spec = {
ingressClassName = "traefik";
# http.paths = [{
# path = "/";
# pathType = "Prefix";
rules = [{
host = "radarr.kun.is";
# backend.service = {
# name = "prowlarr";
# port.number = 80;
# };
# }];
# }];
# };
http.paths = [{
path = "/";
pathType = "Prefix";
# sonarr.spec = {
# ingressClassName = "traefik";
backend.service = {
name = "radarr";
port.number = 80;
};
}];
}];
# rules = [{
# host = "sonarr.kun.is";
tls = [{
secretName = "radarr-tls";
hosts = [ "radarr.kun.is" ];
}];
};
};
# http.paths = [{
# path = "/";
# pathType = "Prefix";
prowlarr = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# backend.service = {
# name = "sonarr";
# port.number = 80;
# };
# }];
# }];
# };
spec = {
ingressClassName = "traefik";
# bazarr.spec = {
# ingressClassName = "traefik";
rules = [{
host = "prowlarr.kun.is";
# rules = [{
# host = "bazarr.kun.is";
http.paths = [{
path = "/";
pathType = "Prefix";
# http.paths = [{
# path = "/";
# pathType = "Prefix";
backend.service = {
name = "prowlarr";
port.number = 80;
};
}];
}];
# backend.service = {
# name = "bazarr";
# port.number = 80;
# };
# }];
# }];
# };
tls = [{
secretName = "prowlarr-tls";
hosts = [ "prowlarr.kun.is" ];
}];
};
};
sonarr = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
spec = {
ingressClassName = "traefik";
rules = [{
host = "sonarr.kun.is";
http.paths = [{
path = "/";
pathType = "Prefix";
backend.service = {
name = "sonarr";
port.number = 80;
};
}];
}];
tls = [{
secretName = "sonarr-tls";
hosts = [ "sonarr.kun.is" ];
}];
};
};
bazarr = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
spec = {
ingressClassName = "traefik";
rules = [{
host = "bazarr.kun.is";
http.paths = [{
path = "/";
pathType = "Prefix";
backend.service = {
name = "bazarr";
port.number = 80;
};
}];
}];
tls = [{
secretName = "bazarr-tls";
hosts = [ "bazarr.kun.is" ];
}];
};
};
};
};
}

View file

@ -131,22 +131,34 @@
};
};
# ingresses.pihole-web.spec = {
# ingressClassName = "traefik";
ingresses.pihole-web = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# rules = [{
# host = "pihole.kun.is";
spec = {
ingressClassName = "traefik";
# http.paths = [{
# path = "/";
# pathType = "Prefix";
rules = [{
host = "pihole.kun.is";
# backend.service = {
# name = "pihole-web";
# port.number = 80;
# };
# }];
# }];
# };
http.paths = [{
path = "/";
pathType = "Prefix";
backend.service = {
name = "pihole-web";
port.number = 80;
};
}];
}];
tls = [{
secretName = "pihole-tls";
hosts = [ "pihole.kun.is" ];
}];
};
};
};
}

View file

@ -79,22 +79,34 @@
}];
};
# ingresses.syncthing.spec = {
# ingressClassName = "traefik";
ingresses.syncthing = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# rules = [{
# host = "sync.kun.is";
spec = {
ingressClassName = "traefik";
# http.paths = [{
# path = "/";
# pathType = "Prefix";
rules = [{
host = "sync.kun.is";
# backend.service = {
# name = "syncthing";
# port.number = 80;
# };
# }];
# }];
# };
http.paths = [{
path = "/";
pathType = "Prefix";
backend.service = {
name = "syncthing";
port.number = 80;
};
}];
}];
tls = [{
secretName = "syncthing-tls";
hosts = [ "sync.kun.is" ];
}];
};
};
};
}