this repo has no description
0
fork

Configure Feed

Select the types of activity you want to include in your feed.

fix!: switch from nip.io to sslip.io

RIP Roopinder Singh 🙏

Khue Doan b001b739 38c9d995

+41 -41
+2 -2
apps/finance/actualbudget/local.yaml
··· 22 22 annotations: 23 23 cert-manager.io/cluster-issuer: letsencrypt-prod 24 24 hosts: 25 - - host: budget.127-0-0-1.nip.io 25 + - host: budget.127.0.0.1.sslip.io 26 26 paths: 27 27 - path: / 28 28 pathType: Prefix ··· 31 31 port: http 32 32 tls: 33 33 - hosts: 34 - - budget.127-0-0-1.nip.io 34 + - budget.127.0.0.1.sslip.io 35 35 secretName: actualbudget-tls-certificate 36 36 persistence: 37 37 data:
+2 -2
apps/khuedoan/blog/local.yaml
··· 24 24 annotations: 25 25 cert-manager.io/cluster-issuer: letsencrypt-prod 26 26 hosts: 27 - - host: www.127-0-0-1.nip.io 27 + - host: www.127.0.0.1.sslip.io 28 28 paths: 29 29 - path: / 30 30 pathType: Prefix ··· 33 33 port: 3000 34 34 tls: 35 35 - hosts: 36 - - www.127-0-0-1.nip.io 36 + - www.127.0.0.1.sslip.io 37 37 secretName: blog-tls-certificate
+2 -2
apps/khuedoan/homelab-docs/local.yaml
··· 51 51 annotations: 52 52 cert-manager.io/cluster-issuer: letsencrypt-prod 53 53 hosts: 54 - - host: homelab.127-0-0-1.nip.io 54 + - host: homelab.127.0.0.1.sslip.io 55 55 paths: 56 56 - path: / 57 57 pathType: ImplementationSpecific ··· 60 60 port: http 61 61 tls: 62 62 - hosts: 63 - - homelab.127-0-0-1.nip.io 63 + - homelab.127.0.0.1.sslip.io 64 64 secretName: homelab-docs-tls-certificate 65 65 persistence: 66 66 source:
+2 -2
apps/khuedoan/notes/local.yaml
··· 25 25 annotations: 26 26 cert-manager.io/cluster-issuer: letsencrypt-prod 27 27 hosts: 28 - - host: notes.127-0-0-1.nip.io 28 + - host: notes.127.0.0.1.sslip.io 29 29 paths: 30 30 - path: / 31 31 pathType: Prefix ··· 34 34 port: 3000 35 35 tls: 36 36 - hosts: 37 - - notes.127-0-0-1.nip.io 37 + - notes.127.0.0.1.sslip.io 38 38 secretName: notes-tls-certificate 39 39 persistence: 40 40 data:
+1 -1
infra/modules/bootstrap/argocd.tf
··· 10 10 values = [ 11 11 yamlencode({ 12 12 global = { 13 - domain = "argocd.127-0-0-1.nip.io" 13 + domain = "argocd.127.0.0.1.sslip.io" 14 14 # TODO override to use the latest development version for first class OCI support 15 15 # Remove once ArgoCD 3.1.0 stable is released 16 16 image = {
+1 -1
infra/modules/bootstrap/registry.tf
··· 44 44 pathtype = "Prefix" 45 45 hosts = [ 46 46 { 47 - host = "registry.127-0-0-1.nip.io" 47 + host = "registry.127.0.0.1.sslip.io" 48 48 paths = [ 49 49 { 50 50 path = "/"
+1 -1
infra/modules/bootstrap/variables.tf
··· 13 13 14 14 variable "cluster_domain" { 15 15 type = string 16 - default = "127-0-0-1.nip.io" 16 + default = "127.0.0.1.sslip.io" 17 17 } 18 18 19 19 variable "platform" {
+1 -1
infra/modules/local-cluster/main.tf
··· 41 41 # node. That means this development cluster can only have 1 node unless 42 42 # we have RWX and use a DaemonSet for the in-cluster registry. 43 43 # See also the nodePort in ../../system/registry.yaml 44 - "registry.127-0-0-1.nip.io" = { 44 + "registry.127.0.0.1.sslip.io" = { 45 45 endpoint = [ 46 46 "http://localhost:30000" 47 47 ]
+8 -8
platform/local/dex.yaml
··· 24 24 helm: 25 25 valuesObject: 26 26 config: 27 - issuer: https://dex.127-0-0-1.nip.io 27 + issuer: https://dex.127.0.0.1.sslip.io 28 28 storage: 29 29 type: kubernetes 30 30 config: ··· 35 35 enablePasswordDB: true 36 36 staticPasswords: 37 37 - username: admin 38 - email: admin@127-0-0-1.nip.io 38 + email: admin@127.0.0.1.sslip.io 39 39 userID: "b34bd9d2-70ed-4ee1-8d22-6e4fc84f8d17" 40 40 hashFromEnv: ADMIN_PASSWORD_HASH 41 41 staticClients: 42 42 - id: argocd 43 43 name: ArgoCD 44 44 redirectURIs: 45 - - 'https://argocd.127-0-0-1.nip.io/auth/callback' 45 + - 'https://argocd.127.0.0.1.sslip.io/auth/callback' 46 46 secretEnv: ARGOCD_CLIENT_SECRET 47 47 - id: grafana 48 48 name: Grafana 49 49 redirectURIs: 50 - - 'https://grafana.127-0-0-1.nip.io/login/generic_oauth' 50 + - 'https://grafana.127.0.0.1.sslip.io/login/generic_oauth' 51 51 secretEnv: GRAFANA_CLIENT_SECRET 52 52 - id: kiali 53 53 name: Kiali 54 54 redirectURIs: 55 - - 'https://kiali.127-0-0-1.nip.io' 55 + - 'https://kiali.127.0.0.1.sslip.io' 56 56 secretEnv: KIALI_CLIENT_SECRET 57 57 - id: temporal 58 58 name: Temporal 59 59 redirectURIs: 60 - - 'https://temporal.127-0-0-1.nip.io/auth/sso/callback' 60 + - 'https://temporal.127.0.0.1.sslip.io/auth/sso/callback' 61 61 secretEnv: TEMPORAL_CLIENT_SECRET 62 62 envFrom: 63 63 - secretRef: ··· 68 68 annotations: 69 69 cert-manager.io/cluster-issuer: letsencrypt-prod 70 70 hosts: 71 - - host: dex.127-0-0-1.nip.io 71 + - host: dex.127.0.0.1.sslip.io 72 72 paths: 73 73 - path: / 74 74 pathType: ImplementationSpecific 75 75 tls: 76 76 - secretName: dex-tls-certificate 77 77 hosts: 78 - - dex.127-0-0-1.nip.io 78 + - dex.127.0.0.1.sslip.io
+6 -6
platform/local/grafana.yaml
··· 29 29 annotations: 30 30 cert-manager.io/cluster-issuer: letsencrypt-prod 31 31 hosts: 32 - - grafana.127-0-0-1.nip.io 32 + - grafana.127.0.0.1.sslip.io 33 33 tls: 34 34 - secretName: grafana-general-tls 35 35 hosts: 36 - - grafana.127-0-0-1.nip.io 36 + - grafana.127.0.0.1.sslip.io 37 37 sidecar: 38 38 dashboards: 39 39 enabled: true ··· 42 42 envFromSecret: grafana-secrets 43 43 grafana.ini: 44 44 server: 45 - root_url: https://grafana.127-0-0-1.nip.io 45 + root_url: https://grafana.127.0.0.1.sslip.io 46 46 auth.generic_oauth: 47 47 enabled: true 48 48 allow_sign_up: true ··· 50 50 client_id: grafana 51 51 client_secret: $__env{SSO_CLIENT_SECRET} 52 52 scopes: openid profile email groups 53 - auth_url: https://dex.127-0-0-1.nip.io/auth 54 - token_url: https://dex.127-0-0-1.nip.io/token 55 - api_url: https://dex.127-0-0-1.nip.io/userinfo 53 + auth_url: https://dex.127.0.0.1.sslip.io/auth 54 + token_url: https://dex.127.0.0.1.sslip.io/token 55 + api_url: https://dex.127.0.0.1.sslip.io/userinfo
+4 -4
platform/local/kiali.yaml
··· 27 27 strategy: openid 28 28 openid: 29 29 client_id: kiali 30 - issuer_uri: https://dex.127-0-0-1.nip.io 30 + issuer_uri: https://dex.127.0.0.1.sslip.io 31 31 disable_rbac: true 32 32 external_services: 33 33 prometheus: ··· 45 45 spec: 46 46 ingressClassName: nginx 47 47 rules: 48 - - host: kiali.127-0-0-1.nip.io 48 + - host: kiali.127.0.0.1.sslip.io 49 49 http: 50 50 paths: 51 51 - backend: ··· 57 57 pathType: Prefix 58 58 tls: 59 59 - hosts: 60 - - kiali.127-0-0-1.nip.io 60 + - kiali.127.0.0.1.sslip.io 61 61 secretName: kiali-tls-certificate 62 62 server: 63 - web_fqdn: kiali.127-0-0-1.nip.io 63 + web_fqdn: kiali.127.0.0.1.sslip.io 64 64 web_root: /
+3 -3
platform/local/micropaas.yaml
··· 39 39 REGISTRY_HOST: docker.io/khuedoan 40 40 GITOPS_REPO: cloudlab 41 41 GIT_USER_NAME: Khue's Bot 42 - GIT_USER_EMAIL: mail@127-0-0-1.nip.io 42 + GIT_USER_EMAIL: mail@127.0.0.1.sslip.io 43 43 ARGOCD_WEBHOOK_ENDPOINT: http://argocd-server.argocd.svc.cluster.local/api/webhook 44 44 docker: 45 45 image: ··· 74 74 annotations: 75 75 cert-manager.io/cluster-issuer: letsencrypt-prod 76 76 hosts: 77 - - host: micropaas.127-0-0-1.nip.io 77 + - host: micropaas.127.0.0.1.sslip.io 78 78 paths: 79 79 - path: / 80 80 pathType: Prefix ··· 83 83 port: 80 84 84 tls: 85 85 - hosts: 86 - - micropaas.127-0-0-1.nip.io 86 + - micropaas.127.0.0.1.sslip.io 87 87 secretName: micropaas-tls-certificate 88 88 persistence: 89 89 data:
+3 -3
platform/local/radicle.yaml
··· 38 38 - sh 39 39 - -c 40 40 - | 41 - rad auth --alias=radicle.127-0-0-1.nip.io 41 + rad auth --alias=radicle.127.0.0.1.sslip.io 42 42 rad seed rad:zGtLfDcgmBqBUya1qTpzRzpBpoHx 43 43 rad seed rad:z38YiLVx2e4JC5Xo2qMNDGoMPHE7U 44 44 rad seed rad:z3pkjF1uaT1cZBrB8tBcCDtXGnrLQ ··· 112 112 annotations: 113 113 cert-manager.io/cluster-issuer: letsencrypt-prod 114 114 hosts: 115 - - host: radicle.127-0-0-1.nip.io 115 + - host: radicle.127.0.0.1.sslip.io 116 116 paths: 117 117 - path: / 118 118 pathType: Prefix ··· 128 128 port: 80 129 129 tls: 130 130 - hosts: 131 - - radicle.127-0-0-1.nip.io 131 + - radicle.127.0.0.1.sslip.io 132 132 - code.khuedoan.com 133 133 secretName: radicle-tls-certificate 134 134 persistence:
+5 -5
platform/local/temporal.yaml
··· 49 49 - name: TEMPORAL_AUTH_ENABLED 50 50 value: "true" 51 51 - name: TEMPORAL_AUTH_PROVIDER_URL 52 - value: "https://dex.c127-0-0-1.nip.io" 52 + value: "https://dex.c127.0.0.1.sslip.io" 53 53 - name: TEMPORAL_AUTH_ISSUER_URL 54 - value: "https://dex.127-0-0-1.nip.io" 54 + value: "https://dex.127.0.0.1.sslip.io" 55 55 - name: TEMPORAL_AUTH_CLIENT_ID 56 56 value: "temporal" 57 57 - name: TEMPORAL_AUTH_CALLBACK_URL 58 - value: "https://temporal.127-0-0-1.nip.io/auth/sso/callback" 58 + value: "https://temporal.127.0.0.1.sslip.io/auth/sso/callback" 59 59 - name: TEMPORAL_AUTH_SCOPES 60 60 value: "openid,profile,email" 61 61 additionalEnvSecretName: temporal-web ··· 65 65 annotations: 66 66 cert-manager.io/cluster-issuer: letsencrypt-prod 67 67 hosts: 68 - - temporal.127-0-0-1.nip.io 68 + - temporal.127.0.0.1.sslip.io 69 69 tls: 70 70 - secretName: temporal-tls-certificate 71 71 hosts: 72 - - temporal.127-0-0-1.nip.io 72 + - temporal.127.0.0.1.sslip.io