summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorElizabeth <elizabeth@simponic.xyz>2024-04-11 15:34:03 -0600
committerElizabeth <elizabeth@simponic.xyz>2024-04-11 15:34:03 -0600
commitdb88a4a8cc41ff604a112bda803f50b21865e3aa (patch)
tree9aebbba40e6d7a25ebba9f0f30362f1f0ee70947
parent27b3e1b24b3b816ecdbedf75759951fcc65ad84c (diff)
downloadproxy-db88a4a8cc41ff604a112bda803f50b21865e3aa.tar.gz
proxy-db88a4a8cc41ff604a112bda803f50b21865e3aa.zip
traefik!
-rw-r--r--dynamic.yml38
-rwxr-xr-xplugin.sh18
-rw-r--r--traefik.yml13
3 files changed, 35 insertions, 34 deletions
diff --git a/dynamic.yml b/dynamic.yml
index 27aeec3..c54cfd9 100644
--- a/dynamic.yml
+++ b/dynamic.yml
@@ -1,39 +1,19 @@
http:
routers:
- dashboard:
- rule: "Host(`traefik.armin.internal.simponic.xyz`)"
+ dev:
+ rule: "Host(`dev.rl.internal.simponic.xyz`)"
service: "noop@internal"
entryPoints:
- "http"
middlewares:
- "secured-redirect"
- dashboard-secured:
+ dev-secured:
entryPoints:
- "https"
- rule: "Host(`traefik.armin.internal.simponic.xyz`)"
- service: "api@internal"
+ rule: "Host(`dev.rl.internal.simponic.xyz`)"
+ service: "local"
tls:
- certResolver: "local"
- domains:
- - main: "traefik.armin.internal.simponic.xyz"
-
- karan:
- rule: "Host(`dev.armin.internal.simponic.xyz`)"
- service: "noop@internal"
- entryPoints:
- - "http"
- middlewares:
- - "secured-redirect"
- karan-secured:
- entryPoints:
- - "https"
- rule: "Host(`dev.armin.internal.simponic.xyz`)"
- service: "example-service"
- tls:
- certResolver: "local"
- options: acmeClient
- domains:
- - main: "dev.armin.internal.simponic.xyz"
+ certResolver: stepca
middlewares:
secured-redirect:
@@ -42,7 +22,7 @@ http:
permanent: true
services:
- example-service:
+ local:
loadBalancer:
passHostHeader: true
servers:
@@ -53,9 +33,9 @@ tls:
acmeClient:
clientAuth:
caFiles:
- - /Users/lizzy/armin/roots.pem
+ - /home/lizzy/proxy/roots.pem
clientAuthType: RequireAndVerifyClientCert
log:
- filePath: log-file.log # relative to current location, will be created
+ filePath: log-file.log
level: DEBUG
diff --git a/plugin.sh b/plugin.sh
new file mode 100755
index 0000000..ae234b9
--- /dev/null
+++ b/plugin.sh
@@ -0,0 +1,18 @@
+#!/bin/bash
+
+unset REQUESTS_CA_BUNDLE
+
+API_KEY_FILE=/home/lizzy/git/hc-cert-dns/apikey.secret
+ENDPOINT=https://hatecomputers.club
+PUBLIC_SUFFIXES=.hatecomputers.club
+
+CERTBOT_DOMAIN=$(echo $2 | sed 's/^_acme-challenge\.//')
+CERTBOT_VALIDATION=$3
+
+/home/lizzy/git/hc-cert-dns/main.py --certbot \
+ --public-suffixes=$PUBLIC_SUFFIXES \
+ --certbot-domain=$CERTBOT_DOMAIN \
+ --certbot-validation=$CERTBOT_VALIDATION \
+ --endpoint=$ENDPOINT \
+ --api-key-file=$API_KEY_FILE \
+ --dns-propogate-time=5
diff --git a/traefik.yml b/traefik.yml
index 2ee3550..9dd7b8a 100644
--- a/traefik.yml
+++ b/traefik.yml
@@ -16,13 +16,16 @@ log:
level: DEBUG
providers:
file:
- filename: /Users/lizzy/armin/dynamic.yml
+ filename: /home/lizzy/proxy/dynamic.yml
serversTransport:
insecureSkipVerify: true
certificatesResolvers:
- local:
+ stepca:
acme:
+ certificatesDuration: 12
caserver: https://ca.internal.simponic.xyz/acme/ACME/directory
- storage: /Users/lizzy/armin/acme.json
- httpChallenge:
- entryPoint: http
+ storage: /home/lizzy/proxy/acme.json
+ email: elizabeth@simponic.xyz
+ dnsChallenge:
+ provider: "exec"
+ disablePropagationCheck: true