expose remaining disabled endpoints on port 444

This commit is contained in:
Pim Kunis 2024-04-08 20:56:24 +02:00
parent f78631e3ae
commit e184254dee
3 changed files with 207 additions and 112 deletions

View file

@ -686,113 +686,184 @@
}; };
}; };
# transmission.spec = { transmission = {
# ingressClassName = "traefik"; metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# rules = [{ spec = {
# host = "transmission.kun.is"; ingressClassName = "traefik";
# http.paths = [{ rules = [{
# path = "/"; host = "transmission.kun.is";
# pathType = "Prefix";
# backend.service = { http.paths = [{
# name = "transmission-web"; path = "/";
# port.number = 80; pathType = "Prefix";
# };
# }];
# }];
# };
# jellyseerr.spec = { backend.service = {
# ingressClassName = "traefik"; name = "transmission-web";
port.number = 80;
};
}];
}];
# rules = [{ tls = [{
# host = "jellyseerr.kun.is"; secretName = "transmission-tls";
hosts = [ "transmission.kun.is" ];
}];
};
};
# http.paths = [{ jellyseerr = {
# path = "/"; metadata.annotations = {
# pathType = "Prefix"; "cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# backend.service = { spec = {
# name = "jellyseerr"; ingressClassName = "traefik";
# port.number = 80;
# };
# }];
# }];
# };
# radarr.spec = { rules = [{
# ingressClassName = "traefik"; host = "jellyseerr.kun.is";
# rules = [{ http.paths = [{
# host = "radarr.kun.is"; path = "/";
pathType = "Prefix";
# http.paths = [{ backend.service = {
# path = "/"; name = "jellyseerr";
# pathType = "Prefix"; port.number = 80;
};
}];
}];
# backend.service = { tls = [{
# name = "radarr"; secretName = "jellyseerr-tls";
# port.number = 80; hosts = [ "jellyseerr.kun.is" ];
# }; }];
# }]; };
# }]; };
# };
# prowlarr.spec = { radarr = {
# ingressClassName = "traefik"; metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# rules = [{ spec = {
# host = "prowlarr.kun.is"; ingressClassName = "traefik";
# http.paths = [{ rules = [{
# path = "/"; host = "radarr.kun.is";
# pathType = "Prefix";
# backend.service = { http.paths = [{
# name = "prowlarr"; path = "/";
# port.number = 80; pathType = "Prefix";
# };
# }];
# }];
# };
# sonarr.spec = { backend.service = {
# ingressClassName = "traefik"; name = "radarr";
port.number = 80;
};
}];
}];
# rules = [{ tls = [{
# host = "sonarr.kun.is"; secretName = "radarr-tls";
hosts = [ "radarr.kun.is" ];
}];
};
};
# http.paths = [{ prowlarr = {
# path = "/"; metadata.annotations = {
# pathType = "Prefix"; "cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# backend.service = { spec = {
# name = "sonarr"; ingressClassName = "traefik";
# port.number = 80;
# };
# }];
# }];
# };
# bazarr.spec = { rules = [{
# ingressClassName = "traefik"; host = "prowlarr.kun.is";
# rules = [{ http.paths = [{
# host = "bazarr.kun.is"; path = "/";
pathType = "Prefix";
# http.paths = [{ backend.service = {
# path = "/"; name = "prowlarr";
# pathType = "Prefix"; port.number = 80;
};
}];
}];
# backend.service = { tls = [{
# name = "bazarr"; secretName = "prowlarr-tls";
# port.number = 80; hosts = [ "prowlarr.kun.is" ];
# }; }];
# }]; };
# }]; };
# };
sonarr = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
spec = {
ingressClassName = "traefik";
rules = [{
host = "sonarr.kun.is";
http.paths = [{
path = "/";
pathType = "Prefix";
backend.service = {
name = "sonarr";
port.number = 80;
};
}];
}];
tls = [{
secretName = "sonarr-tls";
hosts = [ "sonarr.kun.is" ];
}];
};
};
bazarr = {
metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
spec = {
ingressClassName = "traefik";
rules = [{
host = "bazarr.kun.is";
http.paths = [{
path = "/";
pathType = "Prefix";
backend.service = {
name = "bazarr";
port.number = 80;
};
}];
}];
tls = [{
secretName = "bazarr-tls";
hosts = [ "bazarr.kun.is" ];
}];
};
};
}; };
}; };
} }

View file

@ -131,22 +131,34 @@
}; };
}; };
# ingresses.pihole-web.spec = { ingresses.pihole-web = {
# ingressClassName = "traefik"; metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# rules = [{ spec = {
# host = "pihole.kun.is"; ingressClassName = "traefik";
# http.paths = [{ rules = [{
# path = "/"; host = "pihole.kun.is";
# pathType = "Prefix";
# backend.service = { http.paths = [{
# name = "pihole-web"; path = "/";
# port.number = 80; pathType = "Prefix";
# };
# }]; backend.service = {
# }]; name = "pihole-web";
# }; port.number = 80;
};
}];
}];
tls = [{
secretName = "pihole-tls";
hosts = [ "pihole.kun.is" ];
}];
};
};
}; };
} }

View file

@ -79,22 +79,34 @@
}]; }];
}; };
# ingresses.syncthing.spec = { ingresses.syncthing = {
# ingressClassName = "traefik"; metadata.annotations = {
"cert-manager.io/cluster-issuer" = "letsencrypt";
"traefik.ingress.kubernetes.io/router.entrypoints" = "localsecure";
};
# rules = [{ spec = {
# host = "sync.kun.is"; ingressClassName = "traefik";
# http.paths = [{ rules = [{
# path = "/"; host = "sync.kun.is";
# pathType = "Prefix";
# backend.service = { http.paths = [{
# name = "syncthing"; path = "/";
# port.number = 80; pathType = "Prefix";
# };
# }]; backend.service = {
# }]; name = "syncthing";
# }; port.number = 80;
};
}];
}];
tls = [{
secretName = "syncthing-tls";
hosts = [ "sync.kun.is" ];
}];
};
};
}; };
} }