refactor(deployment): Remove WireGuard VPN dependency and restore public service access
Remove WireGuard integration from production deployment to simplify infrastructure: - Remove docker-compose-direct-access.yml (VPN-bound services) - Remove VPN-only middlewares from Grafana, Prometheus, Portainer - Remove WireGuard middleware definitions from Traefik - Remove WireGuard IPs (10.8.0.0/24) from Traefik forwarded headers All monitoring services now publicly accessible via subdomains: - grafana.michaelschiemer.de (with Grafana native auth) - prometheus.michaelschiemer.de (with Basic Auth) - portainer.michaelschiemer.de (with Portainer native auth) All services use Let's Encrypt SSL certificates via Traefik.
This commit is contained in:
@@ -17,6 +17,8 @@ final readonly class ShowHome
|
||||
#[Route(path: '/', method: Method::GET, name: WebRoutes::HOME)]
|
||||
public function home(HomeRequest $request, string $test = 'hallo'): ViewResult
|
||||
{
|
||||
throw new \Exception('test');
|
||||
|
||||
// Production deployment trigger - scp from /workspace/repo
|
||||
$model = new HomeViewModel('Hallo Welt!');
|
||||
return new ViewResult(
|
||||
@@ -25,7 +27,9 @@ final readonly class ShowHome
|
||||
title: 'Home',
|
||||
description: 'Hallo Welt!',
|
||||
)(),
|
||||
data: ['name' => 'Michael'],
|
||||
data: [
|
||||
'name' => 'Michael',
|
||||
],
|
||||
model: $model,
|
||||
);
|
||||
}
|
||||
|
||||
Reference in New Issue
Block a user