60 lines
1.7 KiB
HCL
60 lines
1.7 KiB
HCL
resource "cloudflare_dns_record" "othrayte-one" {
|
|
comment = "othrayte.one proxy via cloudflared tunnel to traefik"
|
|
zone_id = "2616ab2a44d0645b03fbc3106c79bd99"
|
|
type = "CNAME"
|
|
name = "othrayte.one"
|
|
content = "59ca3eb1-5f0b-45e1-97ff-e373569c6689.cfargotunnel.com"
|
|
proxied = true
|
|
ttl = 1 # Auto
|
|
}
|
|
|
|
resource "cloudflare_dns_record" "star-othrayte-one" {
|
|
comment = "*.othrayte.one proxy via cloudflared tunnel to traefik"
|
|
zone_id = "2616ab2a44d0645b03fbc3106c79bd99"
|
|
type = "CNAME"
|
|
name = "*.othrayte.one"
|
|
content = "59ca3eb1-5f0b-45e1-97ff-e373569c6689.cfargotunnel.com"
|
|
proxied = true
|
|
ttl = 1 # Auto
|
|
}
|
|
|
|
resource "nomad_variable" "traefik" {
|
|
path = "nomad/jobs/traefik"
|
|
items = {
|
|
cf_tunnel_token = data.sops_file.secrets.data["traefik.cf_tunnel_token"]
|
|
kopia_basic_auth = data.sops_file.secrets.data["traefik.kopia_basic_auth"]
|
|
}
|
|
}
|
|
|
|
resource "nomad_job" "traefik" {
|
|
jobspec = templatefile("${path.module}/traefik.nomad.hcl", {
|
|
hass_magic_token = nonsensitive(data.sops_file.secrets.data["hass.magic-token"])
|
|
})
|
|
}
|
|
|
|
resource "nomad_csi_volume_registration" "unraid_appdata_traefik" {
|
|
#Note: Before chaning the definition of this volume you need to stop the jobs that are using it
|
|
depends_on = [data.nomad_plugin.smb]
|
|
plugin_id = "smb"
|
|
|
|
volume_id = "unraid_appdata_traefik"
|
|
name = "unraid_appdata_traefik"
|
|
|
|
external_id = "unraid_appdata_traefik"
|
|
|
|
capability {
|
|
access_mode = "multi-node-multi-writer"
|
|
attachment_mode = "file-system"
|
|
}
|
|
|
|
context = {
|
|
source = "//betelgeuse-seven-unraid.lan/appdata"
|
|
subDir = "traefik" # Note: Needs to be manually created on the share
|
|
}
|
|
|
|
secrets = {
|
|
"username" = "nomad"
|
|
"password" = data.sops_file.secrets.data["unraid.nomad"]
|
|
}
|
|
}
|