Compare commits

..

3 commits

Author SHA1 Message Date
45830f76f9
Fix gedit exclusion after upgrade 2024-11-02 11:20:05 +01:00
2a47f10731
Fix JavaFX 2024-11-02 11:19:17 +01:00
1da72f7350
Pin Java to JDK17 2024-10-21 11:22:07 +02:00
10 changed files with 102 additions and 78 deletions

View file

@ -137,11 +137,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1729281548, "lastModified": 1727359191,
"narHash": "sha256-MuojlSnwAJAwfhgmW8ZtZrwm2Sko4fqubCvReqbUzYw=", "narHash": "sha256-5PltTychnExFwzpEnY3WhOywaMV/M6NxYI/y3oXuUtw=",
"owner": "nix-community", "owner": "nix-community",
"repo": "disko", "repo": "disko",
"rev": "a6a3179ddf396dfc28a078e2f169354d0c137125", "rev": "67dc29be3036cc888f0b9d4f0a788ee0f6768700",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -159,11 +159,11 @@
}, },
"locked": { "locked": {
"dir": "pkgs/firefox-addons", "dir": "pkgs/firefox-addons",
"lastModified": 1729321532, "lastModified": 1727409802,
"narHash": "sha256-3/d/mbLQhrkE1qK2Ut/mrMElE6fP9t6ITJoRQ6F+D7o=", "narHash": "sha256-bTdztNxJL+dAcQ1yCtXy2upnvPt1FWerbRvzg3quhbU=",
"owner": "rycee", "owner": "rycee",
"repo": "nur-expressions", "repo": "nur-expressions",
"rev": "70087c8c6e491dcc0bbff459073b480b1a72ac1c", "rev": "7964499d31675bc17b042f5ba46abe6bc2ea79af",
"type": "gitlab" "type": "gitlab"
}, },
"original": { "original": {
@ -340,11 +340,11 @@
"utils": "utils" "utils": "utils"
}, },
"locked": { "locked": {
"lastModified": 1728804768, "lastModified": 1725688145,
"narHash": "sha256-WG8KWmT72SA1XrmixxJwI1RRWrT9D97kkYSE5OfOJdg=", "narHash": "sha256-WCdR85Psl7yfl1/gDruytzZcDUtj+V3GBxwb0kMWbts=",
"owner": "GermanBread", "owner": "GermanBread",
"repo": "declarative-flatpak", "repo": "declarative-flatpak",
"rev": "42cc2c4d97a03889d551cc82c43a0b124fd403f6", "rev": "1cd36d4068cdeb3fa3fb815f8c9bfbc1217f445d",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -378,11 +378,11 @@
}, },
"hardware": { "hardware": {
"locked": { "locked": {
"lastModified": 1728729581, "lastModified": 1727040444,
"narHash": "sha256-oazkQ/z7r43YkDLLQdMg8oIB3CwWNb+2ZrYOxtLEWTQ=", "narHash": "sha256-19FNN5QT9Z11ZUMfftRplyNN+2PgcHKb3oq8KMW/hDA=",
"owner": "nixos", "owner": "nixos",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "a8dd1b21995964b115b1e3ec639dd6ce24ab9806", "rev": "d0cb432a9d28218df11cbd77d984a2a46caeb5ac",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -778,11 +778,11 @@
}, },
"nixpkgs-stable_2": { "nixpkgs-stable_2": {
"locked": { "locked": {
"lastModified": 1728156290, "lastModified": 1725762081,
"narHash": "sha256-uogSvuAp+1BYtdu6UWuObjHqSbBohpyARXDWqgI12Ss=", "narHash": "sha256-vNv+aJUW5/YurRy1ocfvs4q/48yVESwlC/yHzjkZSP8=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "17ae88b569bb15590549ff478bab6494dde4a907", "rev": "dc454045f5b5d814e5862a6d057e7bb5c29edc05",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -794,11 +794,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1729070438, "lastModified": 1727122398,
"narHash": "sha256-KOTTUfPkugH52avUvXGxvWy8ibKKj4genodIYUED+Kc=", "narHash": "sha256-o8VBeCWHBxGd4kVMceIayf5GApqTavJbTa44Xcg5Rrk=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5785b6bb5eaae44e627d541023034e1601455827", "rev": "30439d93eb8b19861ccbe3e581abf97bdc91b093",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -906,11 +906,11 @@
}, },
"nixpkgs_3": { "nixpkgs_3": {
"locked": { "locked": {
"lastModified": 1727907660, "lastModified": 1724316499,
"narHash": "sha256-QftbyPoieM5M50WKUMzQmWtBWib/ZJbHo7mhj5riQec=", "narHash": "sha256-Qb9MhKBUTCfWg/wqqaxt89Xfi6qTD3XpTzQ9eXi3JmE=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5966581aa04be7eff830b9e1457d56dc70a0b798", "rev": "797f7dc49e0bc7fab4b57c021cdf68f595e47841",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -954,11 +954,11 @@
}, },
"nixpkgs_6": { "nixpkgs_6": {
"locked": { "locked": {
"lastModified": 1729181673, "lastModified": 1727264057,
"narHash": "sha256-LDiPhQ3l+fBjRATNtnuDZsBS7hqoBtPkKBkhpoBHv3I=", "narHash": "sha256-KQPI8CTTnB9CrJ7LrmLC4VWbKZfljEPBXOFGZFRpxao=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "4eb33fe664af7b41a4c446f87d20c9a0a6321fa3", "rev": "759537f06e6999e141588ff1c9be7f3a5c060106",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1002,11 +1002,11 @@
}, },
"nixpkgs_9": { "nixpkgs_9": {
"locked": { "locked": {
"lastModified": 1728093190, "lastModified": 1725534445,
"narHash": "sha256-CAZF2NRuHmqTtRTNAruWpHA43Gg2UvuCNEIzabP0l6M=", "narHash": "sha256-Yd0FK9SkWy+ZPuNqUgmVPXokxDgMJoGuNpMEtkfcf84=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "e2f08f4d8b3ecb5cf5c9fd9cb2d53bb3c71807da", "rev": "9bb1e7571aadf31ddb4af77fc64b2d59580f9a39",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1082,11 +1082,11 @@
"nixpkgs-stable": "nixpkgs-stable_2" "nixpkgs-stable": "nixpkgs-stable_2"
}, },
"locked": { "locked": {
"lastModified": 1728345710, "lastModified": 1727423009,
"narHash": "sha256-lpunY1+bf90ts+sA2/FgxVNIegPDKCpEoWwOPu4ITTQ=", "narHash": "sha256-+4B/dQm2EnORIk0k2wV3aHGaE0WXTBjColXjj7qWh10=",
"owner": "Mic92", "owner": "Mic92",
"repo": "sops-nix", "repo": "sops-nix",
"rev": "06535d0e3d0201e6a8080dd32dbfde339b94f01b", "rev": "127a96f49ddc377be6ba76964411bab11ae27803",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -1229,11 +1229,11 @@
"systems": "systems_2" "systems": "systems_2"
}, },
"locked": { "locked": {
"lastModified": 1726560853, "lastModified": 1710146030,
"narHash": "sha256-X6rJYSESBVr3hBoH0WbKE5KvhPU5bloyZ2L4K60/fPQ=", "narHash": "sha256-SZ5L6eA7HJ/nmkzGG7/ISclqe6oZdOZTNoesiInkXPQ=",
"owner": "numtide", "owner": "numtide",
"repo": "flake-utils", "repo": "flake-utils",
"rev": "c1dfcf08411b08f6b8615f7d8971a2bfa81d5e8a", "rev": "b1d9ab70662946ef0850d488da1c9019f3a9752a",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -1,5 +1,9 @@
{pkgs, ...}: { {pkgs, ...}: {
home.packages = with pkgs.unstable; [ home.packages = [
(jetbrains.plugins.addPlugins jetbrains.idea-ultimate ["ideavim"]) (pkgs.unstable.jetbrains.plugins.addPlugins pkgs.unstable.jetbrains.idea-ultimate ["ideavim"])
]; ];
home.sessionVariables = {
JAVA_HOME = "${pkgs.openjdk17}/lib/openjdk";
LD_LIBRARY_PATH = "${pkgs.libGL}/lib:${pkgs.gtk3}/lib:${pkgs.glib.out}/lib:${pkgs.xorg.libXtst}/lib";
};
} }

View file

@ -34,12 +34,12 @@
(with pkgs; [ (with pkgs; [
# Ignored Packages # Ignored Packages
gnome-tour gnome-tour
gedit
]) ])
++ (with pkgs.gnome; [ ++ (with pkgs.gnome; [
atomix atomix
epiphany epiphany
geary geary
gedit
gnome-characters gnome-characters
gnome-contacts gnome-contacts
gnome-initial-setup gnome-initial-setup

View file

@ -15,7 +15,6 @@
useHostStore = true; useHostStore = true;
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.docker.network" = "dmz"; "traefik.docker.network" = "dmz";
"traefik.http.services.forgejo.loadbalancer.server.port" = "3000"; "traefik.http.services.forgejo.loadbalancer.server.port" = "3000";
@ -31,6 +30,12 @@
"traefik.http.routers.forgejo-external.entrypoints" = "websecure-external"; "traefik.http.routers.forgejo-external.entrypoints" = "websecure-external";
"traefik.http.routers.forgejo-external.tls" = "true"; "traefik.http.routers.forgejo-external.tls" = "true";
"traefik.http.routers.forgejo-external.tls.certresolver" = "letsencrypt"; "traefik.http.routers.forgejo-external.tls.certresolver" = "letsencrypt";
"diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.sort_tags" = "semver";
"diun.include_tags" = "^\\d+\\.\\d+\\.\\d+$$";
"diun.exclude_tags" = "\\b\\d{4,}\\b";
}; };
volumes = [ volumes = [
"/storage/dataset/docker/git/forgejo_data:/data" "/storage/dataset/docker/git/forgejo_data:/data"

View file

@ -12,7 +12,7 @@
services = { services = {
traefik.service = { traefik.service = {
image = "traefik:3.1.4"; image = "traefik:v3.1.4";
container_name = "traefik"; container_name = "traefik";
useHostStore = true; useHostStore = true;
ports = [ ports = [
@ -24,8 +24,6 @@
]; ];
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.http.routers.dashboard.rule" = "Host(`traefik.ghoscht.com`)"; "traefik.http.routers.dashboard.rule" = "Host(`traefik.ghoscht.com`)";
"traefik.http.routers.dashboard.entrypoints" = "websecure"; "traefik.http.routers.dashboard.entrypoints" = "websecure";
"traefik.http.services.dashboard.loadbalancer.server.port" = "8080"; "traefik.http.services.dashboard.loadbalancer.server.port" = "8080";
@ -37,6 +35,11 @@
"traefik.http.middlewares.traefik-https-redirect.redirectscheme.scheme" = "https"; "traefik.http.middlewares.traefik-https-redirect.redirectscheme.scheme" = "https";
"traefik.http.middlewares.sslheader.headers.customrequestheaders.X-Forwarded-Proto" = "https"; "traefik.http.middlewares.sslheader.headers.customrequestheaders.X-Forwarded-Proto" = "https";
"diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.sort_tags" = "semver";
"diun.include_tags" = "^v\\d+\\.\\d+\\.\\d+$$";
}; };
volumes = [ volumes = [
"/home/ghoscht/.docker/infrastructure/traefik_config/traefik.yml:/traefik.yml:ro" "/home/ghoscht/.docker/infrastructure/traefik_config/traefik.yml:/traefik.yml:ro"
@ -71,6 +74,8 @@
]; ];
labels = { labels = {
"diun.enable" = "true"; "diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.sort_tags" = "semver";
"diun.include_tags" = "^v\\d+\\.\\d+\\.\\d+$$"; "diun.include_tags" = "^v\\d+\\.\\d+\\.\\d+$$";
}; };
depends_on = [ depends_on = [
@ -135,6 +140,7 @@
image = "crazymax/diun:4.28"; image = "crazymax/diun:4.28";
container_name = "diun"; container_name = "diun";
restart = "always"; restart = "always";
command = "serve";
volumes = [ volumes = [
"/storage/dataset/docker/infrastructure/diun_data:/data" "/storage/dataset/docker/infrastructure/diun_data:/data"
"/var/run/docker.sock:/var/run/docker.sock" "/var/run/docker.sock:/var/run/docker.sock"
@ -149,9 +155,6 @@
DIUN_WATCH_RUNONSTARTUP = "true"; DIUN_WATCH_RUNONSTARTUP = "true";
DIUN_PROVIDERS_DOCKER = "true"; DIUN_PROVIDERS_DOCKER = "true";
DIUN_DEFAULTS_SORTTAGS = "semver";
DIUN_DEFAULTS_INCLUDETAGS = "^\\d+\\.\\d+\\.\\d+$$";
DIUN_DEFAULTS_WATCHREPO = "true";
DIUN_DEFAULTS_MAXTAGS = 1; DIUN_DEFAULTS_MAXTAGS = 1;
DIUN_DEFAULTS_NOTIFYON = "new"; DIUN_DEFAULTS_NOTIFYON = "new";

View file

@ -16,8 +16,6 @@
]; ];
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.http.routers.jellyfin.entrypoints" = "websecure"; "traefik.http.routers.jellyfin.entrypoints" = "websecure";
"traefik.http.routers.jellyfin.rule" = "Host(`jellyfin.ghoscht.com`)"; "traefik.http.routers.jellyfin.rule" = "Host(`jellyfin.ghoscht.com`)";
"traefik.http.services.jellyfin.loadbalancer.server.port" = "8096"; "traefik.http.services.jellyfin.loadbalancer.server.port" = "8096";
@ -25,7 +23,11 @@
"traefik.http.routers.jellyfin.tls" = "true"; "traefik.http.routers.jellyfin.tls" = "true";
"traefik.http.routers.jellyfin.tls.certresolver" = "letsencrypt"; "traefik.http.routers.jellyfin.tls.certresolver" = "letsencrypt";
"diun.exclude_tags" = "\\d{4,}"; "diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.sort_tags" = "semver";
"diun.include_tags" = "^\\d+\\.\\d+\\.\\d+$$";
"diun.exclude_tags" = "\\b\\d{4,}\\b";
}; };
volumes = [ volumes = [
"/storage/dataset/docker/media/jellyfin_data:/config" "/storage/dataset/docker/media/jellyfin_data:/config"
@ -48,7 +50,6 @@
container_name = "navidrome"; container_name = "navidrome";
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.docker.network" = "dmz"; "traefik.docker.network" = "dmz";
"traefik.http.services.navidrome.loadbalancer.server.port" = "4533"; "traefik.http.services.navidrome.loadbalancer.server.port" = "4533";
@ -64,6 +65,12 @@
"traefik.http.routers.navidrome-external.entrypoints" = "websecure-external"; "traefik.http.routers.navidrome-external.entrypoints" = "websecure-external";
"traefik.http.routers.navidrome-external.tls" = "true"; "traefik.http.routers.navidrome-external.tls" = "true";
"traefik.http.routers.navidrome-external.tls.certresolver" = "letsencrypt"; "traefik.http.routers.navidrome-external.tls.certresolver" = "letsencrypt";
"diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.sort_tags" = "semver";
"diun.include_tags" = "^\\d+\\.\\d+\\.\\d+$$";
"diun.exclude_tags" = "\\b\\d{4,}\\b";
}; };
volumes = [ volumes = [
"/storage/dataset/docker/media/navidrome_data:/data" "/storage/dataset/docker/media/navidrome_data:/data"
@ -150,8 +157,6 @@
container_name = "prowlarr"; container_name = "prowlarr";
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.http.routers.prowlarr.entrypoints" = "websecure"; "traefik.http.routers.prowlarr.entrypoints" = "websecure";
"traefik.http.routers.prowlarr.rule" = "Host(`prowlarr.ghoscht.com`)"; "traefik.http.routers.prowlarr.rule" = "Host(`prowlarr.ghoscht.com`)";
"traefik.http.services.prowlarr.loadbalancer.server.port" = "9696"; "traefik.http.services.prowlarr.loadbalancer.server.port" = "9696";
@ -159,6 +164,11 @@
"traefik.http.routers.prowlarr.tls" = "true"; "traefik.http.routers.prowlarr.tls" = "true";
"traefik.http.routers.prowlarr.tls.certresolver" = "letsencrypt"; "traefik.http.routers.prowlarr.tls.certresolver" = "letsencrypt";
"traefik.http.routers.prowlarr.middlewares" = "authentik@file"; "traefik.http.routers.prowlarr.middlewares" = "authentik@file";
"diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.sort_tags" = "semver";
"diun.include_tags" = "^\\d+\\.\\d+\\.\\d+$$";
}; };
volumes = [ volumes = [
"/storage/dataset/docker/media/prowlarr_data:/config" "/storage/dataset/docker/media/prowlarr_data:/config"
@ -179,8 +189,6 @@
container_name = "sonarr"; container_name = "sonarr";
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.http.routers.sonarr.entrypoints" = "websecure"; "traefik.http.routers.sonarr.entrypoints" = "websecure";
"traefik.http.routers.sonarr.rule" = "Host(`sonarr.ghoscht.com`)"; "traefik.http.routers.sonarr.rule" = "Host(`sonarr.ghoscht.com`)";
"traefik.http.services.sonarr.loadbalancer.server.port" = "8989"; "traefik.http.services.sonarr.loadbalancer.server.port" = "8989";
@ -188,6 +196,10 @@
"traefik.http.routers.sonarr.tls" = "true"; "traefik.http.routers.sonarr.tls" = "true";
"traefik.http.routers.sonarr.tls.certresolver" = "letsencrypt"; "traefik.http.routers.sonarr.tls.certresolver" = "letsencrypt";
"traefik.http.routers.sonarr.middlewares" = "authentik@file"; "traefik.http.routers.sonarr.middlewares" = "authentik@file";
"diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.include_tags" = "^\\d+\\.\\d+\\.\\d+$$";
}; };
volumes = [ volumes = [
"/storage/dataset/docker/media/sonarr_data:/config" "/storage/dataset/docker/media/sonarr_data:/config"
@ -210,8 +222,6 @@
container_name = "radarr"; container_name = "radarr";
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.http.routers.radarr.entrypoints" = "websecure"; "traefik.http.routers.radarr.entrypoints" = "websecure";
"traefik.http.routers.radarr.rule" = "Host(`radarr.ghoscht.com`)"; "traefik.http.routers.radarr.rule" = "Host(`radarr.ghoscht.com`)";
"traefik.http.services.radarr.loadbalancer.server.port" = "7878"; "traefik.http.services.radarr.loadbalancer.server.port" = "7878";
@ -219,6 +229,10 @@
"traefik.http.routers.radarr.tls" = "true"; "traefik.http.routers.radarr.tls" = "true";
"traefik.http.routers.radarr.tls.certresolver" = "letsencrypt"; "traefik.http.routers.radarr.tls.certresolver" = "letsencrypt";
"traefik.http.routers.radarr.middlewares" = "authentik@file"; "traefik.http.routers.radarr.middlewares" = "authentik@file";
"diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.include_tags" = "^\\d+\\.\\d+\\.\\d+$$";
}; };
volumes = [ volumes = [
"/storage/dataset/docker/media/radarr_data:/config" "/storage/dataset/docker/media/radarr_data:/config"
@ -237,12 +251,10 @@
restart = "always"; restart = "always";
}; };
lidarr.service = { lidarr.service = {
image = "linuxserver/lidarr:2.5.3"; image = "linuxserver/lidarr:2.4.3";
container_name = "lidarr"; container_name = "lidarr";
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.http.routers.lidarr.entrypoints" = "websecure"; "traefik.http.routers.lidarr.entrypoints" = "websecure";
"traefik.http.routers.lidarr.rule" = "Host(`lidarr.ghoscht.com`)"; "traefik.http.routers.lidarr.rule" = "Host(`lidarr.ghoscht.com`)";
"traefik.http.services.lidarr.loadbalancer.server.port" = "8686"; "traefik.http.services.lidarr.loadbalancer.server.port" = "8686";
@ -251,8 +263,6 @@
"traefik.http.routers.lidarr.tls" = "true"; "traefik.http.routers.lidarr.tls" = "true";
"traefik.http.routers.lidarr.tls.certresolver" = "letsencrypt"; "traefik.http.routers.lidarr.tls.certresolver" = "letsencrypt";
"traefik.http.routers.lidarr.middlewares" = "authentik@file"; "traefik.http.routers.lidarr.middlewares" = "authentik@file";
"diun.exclude_tags" = "\\d{4,}";
}; };
volumes = [ volumes = [
"/storage/dataset/docker/media/lidarr_data:/config" "/storage/dataset/docker/media/lidarr_data:/config"
@ -325,8 +335,6 @@
container_name = "autobrr"; container_name = "autobrr";
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.http.routers.autobrr.entrypoints" = "websecure"; "traefik.http.routers.autobrr.entrypoints" = "websecure";
"traefik.http.routers.autobrr.rule" = "Host(`autobrr.ghoscht.com`)"; "traefik.http.routers.autobrr.rule" = "Host(`autobrr.ghoscht.com`)";
"traefik.http.services.autobrr.loadbalancer.server.port" = "7474"; "traefik.http.services.autobrr.loadbalancer.server.port" = "7474";
@ -334,6 +342,8 @@
"traefik.http.routers.autobrr.tls" = "true"; "traefik.http.routers.autobrr.tls" = "true";
"traefik.http.routers.autobrr.tls.certresolver" = "letsencrypt"; "traefik.http.routers.autobrr.tls.certresolver" = "letsencrypt";
"diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.include_tags" = "^v\\d+\\.\\d+\\.\\d+$$"; "diun.include_tags" = "^v\\d+\\.\\d+\\.\\d+$$";
}; };
volumes = [ volumes = [

View file

@ -66,8 +66,8 @@ in {
mode = "0775"; mode = "0775";
content = '' content = ''
UN_SONARR_0_API_KEY="${config.sops.placeholder."unpackerr/sonarr_api_key"}" UN_SONARR_0_API_KEY="${config.sops.placeholder."unpackerr/sonarr_api_key"}"
UN_LIDARR_0_API_KEY="${config.sops.placeholder."unpackerr/lidarr_api_key"}" UN_RADARR_0_API_KEY="${config.sops.placeholder."unpackerr/lidarr_api_key"}"
UN_RADARR_0_API_KEY="${config.sops.placeholder."unpackerr/radarr_api_key"}" UN_LIDARR_0_API_KEY="${config.sops.placeholder."unpackerr/radarr_api_key"}"
''; '';
}; };
} }

View file

@ -12,7 +12,6 @@
container_name = "vaultwarden"; container_name = "vaultwarden";
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"diun.enable" = "true";
"traefik.docker.network" = "dmz"; "traefik.docker.network" = "dmz";
"traefik.http.services.vaultwarden.loadbalancer.server.port" = "80"; "traefik.http.services.vaultwarden.loadbalancer.server.port" = "80";
@ -28,6 +27,12 @@
"traefik.http.routers.vaultwarden-external.entrypoints" = "websecure-external"; "traefik.http.routers.vaultwarden-external.entrypoints" = "websecure-external";
"traefik.http.routers.vaultwarden-external.tls" = "true"; "traefik.http.routers.vaultwarden-external.tls" = "true";
"traefik.http.routers.vaultwarden-external.tls.certresolver" = "letsencrypt"; "traefik.http.routers.vaultwarden-external.tls.certresolver" = "letsencrypt";
"diun.enable" = "true";
"diun.watch_repo" = "true";
"diun.sort_tags" = "semver";
"diun.include_tags" = "^\\d+\\.\\d+\\.\\d+$$";
"diun.exclude_tags" = "\\b\\d{4,}\\b";
}; };
volumes = [ volumes = [
"/storage/dataset/docker/passwords/vaultwarden_data/:/data" "/storage/dataset/docker/passwords/vaultwarden_data/:/data"

View file

@ -64,11 +64,8 @@ in {
version: 2 version: 2
global: global:
forget: forget:
keep-last: 5 keep-weekly: 7
keep-weekly: 1
keep-monthly: 12 keep-monthly: 12
keep-yearly: 7
keep-within: '14d'
extras: extras:
default_hooks: &default_hooks default_hooks: &default_hooks
@ -84,7 +81,6 @@ in {
to: to:
- zfs - zfs
- eustachius - eustachius
forget: prune
cron: '0 4 * * 0' # Every Sunday at 4:00 cron: '0 4 * * 0' # Every Sunday at 4:00
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -96,8 +92,8 @@ in {
from: /storage/dataset/docker/dns from: /storage/dataset/docker/dns
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
forget: prune
cron: '0 4 * * 0' # Every Sunday at 4:00 cron: '0 4 * * 0' # Every Sunday at 4:00
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -110,7 +106,6 @@ in {
to: to:
- zfs - zfs
- eustachius - eustachius
forget: prune
cron: '0 4 * * 0' # Every Sunday at 4:00 cron: '0 4 * * 0' # Every Sunday at 4:00
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -122,6 +117,7 @@ in {
from: /storage/dataset/docker/git from: /storage/dataset/docker/git
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
cron: '0 4 * * *' # Every Day at 4:00 cron: '0 4 * * *' # Every Day at 4:00
hooks: hooks:
@ -134,6 +130,7 @@ in {
from: /storage/dataset/docker/media from: /storage/dataset/docker/media
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
cron: '0 4 * * *' # Every Day at 4:00 cron: '0 4 * * *' # Every Day at 4:00
hooks: hooks:
@ -146,6 +143,7 @@ in {
from: /storage/dataset/docker/nextcloud from: /storage/dataset/docker/nextcloud
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
cron: '0 4 * * *' # Every Day at 4:00 cron: '0 4 * * *' # Every Day at 4:00
hooks: hooks:
@ -159,7 +157,6 @@ in {
to: to:
- zfs - zfs
- eustachius - eustachius
forget: prune
cron: '0 4 * * 0' # Every Sunday at 4:00 cron: '0 4 * * 0' # Every Sunday at 4:00
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -185,7 +182,6 @@ in {
to: to:
- zfs - zfs
- eustachius - eustachius
forget: prune
cron: '0 4 * * 0' # Every Sunday at 4:00 cron: '0 4 * * 0' # Every Sunday at 4:00
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -208,7 +204,6 @@ in {
from: /storage/dataset/docker/headscale from: /storage/dataset/docker/headscale
to: to:
- zfs - zfs
forget: prune
cron: '55 3 * * *' # Every Day at 3:55 cron: '55 3 * * *' # Every Day at 3:55
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -220,8 +215,8 @@ in {
from: /storage/dataset/docker/auth from: /storage/dataset/docker/auth
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
forget: prune
cron: '55 3 * * *' # Every Day at 3:55 cron: '55 3 * * *' # Every Day at 3:55
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -233,8 +228,8 @@ in {
from: /storage/dataset/docker/infrastructure from: /storage/dataset/docker/infrastructure
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
forget: prune
cron: '55 3 * * *' # Every Day at 3:55 cron: '55 3 * * *' # Every Day at 3:55
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -246,8 +241,8 @@ in {
from: /storage/dataset/docker/wiki from: /storage/dataset/docker/wiki
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
forget: prune
cron: '55 3 * * *' # Every Day at 3:55 cron: '55 3 * * *' # Every Day at 3:55
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -259,8 +254,8 @@ in {
from: /storage/dataset/docker/stats from: /storage/dataset/docker/stats
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
forget: prune
cron: '55 3 * * *' # Every Day at 3:55 cron: '55 3 * * *' # Every Day at 3:55
hooks: hooks:
<<: *default_hooks <<: *default_hooks
@ -272,6 +267,7 @@ in {
from: /storage/dataset/docker/stats from: /storage/dataset/docker/stats
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
cron: '55 3 * * *' # Every Day at 3:55 cron: '55 3 * * *' # Every Day at 3:55
options: options:
@ -288,6 +284,7 @@ in {
from: /storage/dataset/nas from: /storage/dataset/nas
to: to:
- zfs - zfs
- ssd
- eustachius - eustachius
cron: '55 3 * * *' # Every Day at 3:55 cron: '55 3 * * *' # Every Day at 3:55
hooks: hooks:

View file

@ -28,7 +28,7 @@
path = "/storage/dataset/data/torrents/misc"; path = "/storage/dataset/data/torrents/misc";
browseable = "yes"; browseable = "yes";
"read only" = "yes"; "read only" = "yes";
"guest ok" = "yes"; "guest ok" = "no";
"create mask" = "0644"; "create mask" = "0644";
"directory mask" = "0755"; "directory mask" = "0755";
"force user" = "ghoscht"; "force user" = "ghoscht";