Compare commits
No commits in common. "b6c1431526c820fe9308f01d1916514008d6e291" and "d13a06c7f6ab37649fd36399ce3f0aa4beb50916" have entirely different histories.
b6c1431526
...
d13a06c7f6
17 changed files with 144 additions and 146 deletions
|
@ -49,8 +49,8 @@ in {
|
||||||
postgres = {condition = "service_healthy";};
|
postgres = {condition = "service_healthy";};
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/auth/authentik_media:/media"
|
"/storage/dataset/docker/auth/authentik_media:/media"
|
||||||
"/home/ghoscht/.docker/auth/authentik_custom_templates:/templates"
|
"/storage/dataset/docker/auth/authentik_custom_templates:/templates"
|
||||||
];
|
];
|
||||||
networks = [
|
networks = [
|
||||||
"dmz"
|
"dmz"
|
||||||
|
@ -74,8 +74,8 @@ in {
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/var/run/docker.sock:/var/run/docker.sock"
|
"/var/run/docker.sock:/var/run/docker.sock"
|
||||||
"/home/ghoscht/.docker/auth/authentik_media:/media"
|
"/storage/dataset/docker/auth/authentik_media:/media"
|
||||||
"/home/ghoscht/.docker/auth/authentik_custom_templates:/templates"
|
"/storage/dataset/docker/auth/authentik_custom_templates:/templates"
|
||||||
];
|
];
|
||||||
restart = "always";
|
restart = "always";
|
||||||
user = "root";
|
user = "root";
|
||||||
|
@ -98,7 +98,7 @@ in {
|
||||||
};
|
};
|
||||||
restart = "always";
|
restart = "always";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/auth/redis_data:/data"
|
"/storage/dataset/docker/auth/redis_data:/data"
|
||||||
];
|
];
|
||||||
networks = [
|
networks = [
|
||||||
"internal"
|
"internal"
|
||||||
|
@ -111,7 +111,7 @@ in {
|
||||||
"/home/ghoscht/.docker/auth/postgres.env"
|
"/home/ghoscht/.docker/auth/postgres.env"
|
||||||
];
|
];
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/auth/postgres_data:/var/lib/postgresql/data"
|
"/storage/dataset/docker/auth/postgres_data:/var/lib/postgresql/data"
|
||||||
];
|
];
|
||||||
healthcheck = {
|
healthcheck = {
|
||||||
test = [
|
test = [
|
||||||
|
|
|
@ -29,9 +29,9 @@
|
||||||
"/home/ghoscht/.docker/dashboard/homarr.env"
|
"/home/ghoscht/.docker/dashboard/homarr.env"
|
||||||
];
|
];
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/dashboard/homarr_data:/data"
|
"/storage/dataset/docker/dashboard/homarr_data:/data"
|
||||||
"/home/ghoscht/.docker/dashboard/homarr_config:/app/data/configs"
|
"/storage/dataset/docker/dashboard/homarr_config:/app/data/configs"
|
||||||
"/home/ghoscht/.docker/dashboard/homarr_icons:/app/public/imgs"
|
"/storage/dataset/docker/dashboard/homarr_icons:/app/public/imgs"
|
||||||
];
|
];
|
||||||
restart = "always";
|
restart = "always";
|
||||||
networks = [
|
networks = [
|
||||||
|
|
|
@ -17,11 +17,11 @@
|
||||||
./smarthome
|
./smarthome
|
||||||
./signal
|
./signal
|
||||||
./feed
|
./feed
|
||||||
# ./matrix
|
./matrix
|
||||||
./headscale
|
./headscale
|
||||||
./auth
|
./auth
|
||||||
./minio
|
./minio
|
||||||
# ./stats
|
./stats
|
||||||
./wiki
|
./wiki
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
@ -11,9 +11,9 @@
|
||||||
driver = "bridge";
|
driver = "bridge";
|
||||||
ipam.config = [
|
ipam.config = [
|
||||||
{
|
{
|
||||||
subnet = "172.29.1.0/24";
|
subnet = "172.28.1.0/24";
|
||||||
ip_range = "172.29.1.4/30";
|
ip_range = "172.28.1.5/30";
|
||||||
gateway = "172.29.1.1";
|
gateway = "172.28.1.1";
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
@ -30,8 +30,8 @@
|
||||||
VIRTUAL_HOST = "pihole.ghoscht.com";
|
VIRTUAL_HOST = "pihole.ghoscht.com";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/dns/pihole_data:/etc/pihole"
|
"/storage/dataset/docker/dns/pihole_data:/etc/pihole"
|
||||||
"/home/ghoscht/.docker/dns/pihole_dnsmasq:/etc/dnsmasq.d"
|
"/storage/dataset/docker/dns/pihole_dnsmasq:/etc/dnsmasq.d"
|
||||||
];
|
];
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
@ -46,7 +46,7 @@
|
||||||
networks = {
|
networks = {
|
||||||
dmz = {};
|
dmz = {};
|
||||||
dns = {
|
dns = {
|
||||||
ipv4_address = "172.29.1.6";
|
ipv4_address = "172.28.1.6";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
capabilities = {
|
capabilities = {
|
||||||
|
@ -61,13 +61,14 @@
|
||||||
unbound.service = {
|
unbound.service = {
|
||||||
image = "mvance/unbound:1.19.3";
|
image = "mvance/unbound:1.19.3";
|
||||||
container_name = "unbound";
|
container_name = "unbound";
|
||||||
|
useHostStore = true;
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/dns/unbound_data:/opt/unbound/etc/unbound"
|
"/storage/dataset/docker/dns/unbound_data:/opt/unbound/etc/unbound"
|
||||||
];
|
];
|
||||||
restart = "always";
|
restart = "always";
|
||||||
networks = {
|
networks = {
|
||||||
dns = {
|
dns = {
|
||||||
ipv4_address = "172.29.1.5";
|
ipv4_address = "172.28.1.5";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -32,7 +32,7 @@
|
||||||
feed-db.service = {
|
feed-db.service = {
|
||||||
image = "postgres:13-alpine";
|
image = "postgres:13-alpine";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/feed/ttrss_db:/var/lib/postgresql/data"
|
"/storage/dataset/docker/feed/ttrss_db:/var/lib/postgresql/data"
|
||||||
];
|
];
|
||||||
env_file = [
|
env_file = [
|
||||||
"/home/ghoscht/.docker/feed/ttrss.env"
|
"/home/ghoscht/.docker/feed/ttrss.env"
|
||||||
|
|
|
@ -33,7 +33,7 @@
|
||||||
"traefik.http.routers.forgejo-external.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.forgejo-external.tls.certresolver" = "letsencrypt";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/git/forgejo_data:/data"
|
"/storage/dataset/docker/git/forgejo_data:/data"
|
||||||
"/etc/localtime:/etc/localtime:ro"
|
"/etc/localtime:/etc/localtime:ro"
|
||||||
];
|
];
|
||||||
ports = [
|
ports = [
|
||||||
|
@ -60,7 +60,7 @@
|
||||||
"/home/ghoscht/.docker/git/forgejo-db.env"
|
"/home/ghoscht/.docker/git/forgejo-db.env"
|
||||||
];
|
];
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/git/forgejo_db:/var/lib/postgresql/data"
|
"/storage/dataset/docker/git/forgejo_db:/var/lib/postgresql/data"
|
||||||
];
|
];
|
||||||
restart = "unless-stopped";
|
restart = "unless-stopped";
|
||||||
networks = [
|
networks = [
|
||||||
|
|
|
@ -29,8 +29,8 @@
|
||||||
"traefik.http.routers.headscale-external.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.headscale-external.tls.certresolver" = "letsencrypt";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/headscale/headscale_config:/etc/headscale"
|
"/storage/dataset/docker/headscale/headscale_config:/etc/headscale"
|
||||||
"/home/ghoscht/.docker/headscale/headscale_data:/var/lib/headscale"
|
"/storage/dataset/docker/headscale/headscale_data:/var/lib/headscale"
|
||||||
];
|
];
|
||||||
networks = [
|
networks = [
|
||||||
"dmz"
|
"dmz"
|
||||||
|
|
|
@ -41,7 +41,7 @@
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/infrastructure/traefik_config/traefik.yml:/traefik.yml:ro"
|
"/home/ghoscht/.docker/infrastructure/traefik_config/traefik.yml:/traefik.yml:ro"
|
||||||
"/home/ghoscht/.docker/infrastructure/traefik_config/conf:/conf:ro"
|
"/home/ghoscht/.docker/infrastructure/traefik_config/conf:/conf:ro"
|
||||||
"/home/ghoscht/.docker/infrastructure/traefik_data/acme.json:/acme.json"
|
"/storage/dataset/docker/infrastructure/traefik_data/acme.json:/acme.json"
|
||||||
"/var/run/docker.sock:/var/run/docker.sock:ro"
|
"/var/run/docker.sock:/var/run/docker.sock:ro"
|
||||||
"traefik-logs:/var/log/traefik"
|
"traefik-logs:/var/log/traefik"
|
||||||
];
|
];
|
||||||
|
@ -61,11 +61,11 @@
|
||||||
COLLECTIONS = "crowdsecurity/linux crowdsecurity/traefik firix/authentik LePresidente/gitea Dominic-Wagner/vaultwarden";
|
COLLECTIONS = "crowdsecurity/linux crowdsecurity/traefik firix/authentik LePresidente/gitea Dominic-Wagner/vaultwarden";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/infrastructure/crowdsec_config/acquis.yaml:/etc/crowdsec/acquis.yaml"
|
"/storage/dataset/docker/infrastructure/crowdsec_config/acquis.yaml:/etc/crowdsec/acquis.yaml"
|
||||||
"/home/ghoscht/.docker/infrastructure/crowdsec_config/profiles.yaml:/etc/crowdsec/profiles.yaml"
|
"/storage/dataset/docker/infrastructure/crowdsec_config/profiles.yaml:/etc/crowdsec/profiles.yaml"
|
||||||
"/home/ghoscht/.docker/infrastructure/crowdsec_config/ntfy.yaml:/etc/crowdsec/notifications/ntfy.yaml"
|
"/storage/dataset/docker/infrastructure/crowdsec_config/ntfy.yaml:/etc/crowdsec/notifications/ntfy.yaml"
|
||||||
"/home/ghoscht/.docker/infrastructure/crowdsec_db:/var/lib/crowdsec/data/"
|
"/storage/dataset/docker/infrastructure/crowdsec_db:/var/lib/crowdsec/data/"
|
||||||
"/home/ghoscht/.docker/infrastructure/crowdsec_data:/etc/crowdsec/"
|
"/storage/dataset/docker/infrastructure/crowdsec_data:/etc/crowdsec/"
|
||||||
"traefik-logs:/var/log/traefik/:ro"
|
"traefik-logs:/var/log/traefik/:ro"
|
||||||
"/var/run/docker.sock:/var/run/docker.sock:ro"
|
"/var/run/docker.sock:/var/run/docker.sock:ro"
|
||||||
];
|
];
|
||||||
|
@ -115,8 +115,8 @@
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/run/udev:/run/udev:ro"
|
"/run/udev:/run/udev:ro"
|
||||||
"/home/ghoscht/.docker/infrastructure/scrutiny_data:/opt/scrutiny/config"
|
"/storage/dataset/docker/infrastructure/scrutiny_data:/opt/scrutiny/config"
|
||||||
"/home/ghoscht/.docker/infrastructure/scrutiny_influxdb_data:/opt/scrutiny/influxdb"
|
"/storage/dataset/docker/infrastructure/scrutiny_influxdb_data:/opt/scrutiny/influxdb"
|
||||||
];
|
];
|
||||||
devices = [
|
devices = [
|
||||||
"/dev/nvme0"
|
"/dev/nvme0"
|
||||||
|
@ -136,7 +136,7 @@
|
||||||
container_name = "diun";
|
container_name = "diun";
|
||||||
restart = "always";
|
restart = "always";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/infrastructure/diun_data:/data"
|
"/storage/dataset/docker/infrastructure/diun_data:/data"
|
||||||
"/var/run/docker.sock:/var/run/docker.sock"
|
"/var/run/docker.sock:/var/run/docker.sock"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
|
|
|
@ -31,7 +31,7 @@
|
||||||
"traefik.http.routers.synapse-external.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.synapse-external.tls.certresolver" = "letsencrypt";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/matrix/synapse_data:/data"
|
"/storage/dataset/docker/matrix/synapse_data:/data"
|
||||||
];
|
];
|
||||||
env_file = [
|
env_file = [
|
||||||
"/home/ghoscht/.docker/matrix/synapse.env"
|
"/home/ghoscht/.docker/matrix/synapse.env"
|
||||||
|
@ -53,7 +53,7 @@
|
||||||
"/home/ghoscht/.docker/matrix/synapse.env"
|
"/home/ghoscht/.docker/matrix/synapse.env"
|
||||||
];
|
];
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/matrix/synapse_db:/var/lib/postgresql/data"
|
"/storage/dataset/docker/matrix/synapse_db:/var/lib/postgresql/data"
|
||||||
];
|
];
|
||||||
restart = "unless-stopped";
|
restart = "unless-stopped";
|
||||||
networks = [
|
networks = [
|
||||||
|
@ -64,8 +64,8 @@
|
||||||
container_name = "matrix-nginx";
|
container_name = "matrix-nginx";
|
||||||
image = "nginx:1.25.4";
|
image = "nginx:1.25.4";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/matrix/nginx_data/matrix.conf:/etc/nginx/conf.d/matrix.conf"
|
"/storage/dataset/docker/matrix/nginx_data/matrix.conf:/etc/nginx/conf.d/matrix.conf"
|
||||||
"/home/ghoscht/.docker/matrix/nginx_data/www:/var/www/"
|
"/storage/dataset/docker/matrix/nginx_data/www:/var/www/"
|
||||||
];
|
];
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
@ -94,7 +94,7 @@
|
||||||
element.service = {
|
element.service = {
|
||||||
image = "vectorim/element-web:v1.11.64";
|
image = "vectorim/element-web:v1.11.64";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/matrix/element_data/element-config.json:/app/config.json"
|
"/storage/dataset/docker/matrix/element_data/element-config.json:/app/config.json"
|
||||||
];
|
];
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
|
|
@ -28,7 +28,7 @@
|
||||||
"diun.exclude_tags" = "\\d{4,}";
|
"diun.exclude_tags" = "\\d{4,}";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/jellyfin_data:/config"
|
"/storage/dataset/docker/media/jellyfin_data:/config"
|
||||||
"/storage/dataset/data/media/tv:/tv"
|
"/storage/dataset/data/media/tv:/tv"
|
||||||
"/storage/dataset/data/media/anime:/anime"
|
"/storage/dataset/data/media/anime:/anime"
|
||||||
"/storage/dataset/data/media/movies:/movies"
|
"/storage/dataset/data/media/movies:/movies"
|
||||||
|
@ -66,7 +66,7 @@
|
||||||
"traefik.http.routers.navidrome-external.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.navidrome-external.tls.certresolver" = "letsencrypt";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/navidrome_data:/data"
|
"/storage/dataset/docker/media/navidrome_data:/data"
|
||||||
"/storage/dataset/data/media/music:/music"
|
"/storage/dataset/data/media/music:/music"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
|
@ -92,7 +92,7 @@
|
||||||
"traefik.http.routers.kavita.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.kavita.tls.certresolver" = "letsencrypt";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/kavita_data:/kavita/config"
|
"/storage/dataset/docker/media/kavita_data:/kavita/config"
|
||||||
"/storage/dataset/data/media/manga:/manga"
|
"/storage/dataset/data/media/manga:/manga"
|
||||||
"/storage/dataset/data/media/comics:/comics"
|
"/storage/dataset/data/media/comics:/comics"
|
||||||
];
|
];
|
||||||
|
@ -115,7 +115,7 @@
|
||||||
"traefik.http.routers.transmission.middlewares" = "authentik@file";
|
"traefik.http.routers.transmission.middlewares" = "authentik@file";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/transmission_data:/config"
|
"/storage/dataset/docker/media/transmission_data:/config"
|
||||||
"/storage/dataset/data/:/data"
|
"/storage/dataset/data/:/data"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
|
@ -161,7 +161,7 @@
|
||||||
"traefik.http.routers.prowlarr.middlewares" = "authentik@file";
|
"traefik.http.routers.prowlarr.middlewares" = "authentik@file";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/prowlarr_data:/config"
|
"/storage/dataset/docker/media/prowlarr_data:/config"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = 1000;
|
PUID = 1000;
|
||||||
|
@ -190,7 +190,7 @@
|
||||||
"traefik.http.routers.sonarr.middlewares" = "authentik@file";
|
"traefik.http.routers.sonarr.middlewares" = "authentik@file";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/sonarr_data:/config"
|
"/storage/dataset/docker/media/sonarr_data:/config"
|
||||||
"/storage/dataset/data/:/data"
|
"/storage/dataset/data/:/data"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
|
@ -221,7 +221,7 @@
|
||||||
"traefik.http.routers.radarr.middlewares" = "authentik@file";
|
"traefik.http.routers.radarr.middlewares" = "authentik@file";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/radarr_data:/config"
|
"/storage/dataset/docker/media/radarr_data:/config"
|
||||||
"/storage/dataset/data/:/data"
|
"/storage/dataset/data/:/data"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
|
@ -255,9 +255,9 @@
|
||||||
"diun.exclude_tags" = "\\d{4,}";
|
"diun.exclude_tags" = "\\d{4,}";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/lidarr_data:/config"
|
"/storage/dataset/docker/media/lidarr_data:/config"
|
||||||
"/home/ghoscht/.docker/media/lidarr_addons/custom-services.d:/custom-services.d"
|
"/storage/dataset/docker/media/lidarr_addons/custom-services.d:/custom-services.d"
|
||||||
"/home/ghoscht/.docker/media/lidarr_addons/custom-cont-init.d:/custom-cont-init.d"
|
"/storage/dataset/docker/media/lidarr_addons/custom-cont-init.d:/custom-cont-init.d"
|
||||||
"/storage/dataset/data/:/data"
|
"/storage/dataset/data/:/data"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
|
@ -286,7 +286,7 @@
|
||||||
"traefik.http.routers.bazarr.middlewares" = "authentik@file";
|
"traefik.http.routers.bazarr.middlewares" = "authentik@file";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/bazarr_data:/config"
|
"/storage/dataset/docker/media/bazarr_data:/config"
|
||||||
"/storage/dataset/data/:/data"
|
"/storage/dataset/data/:/data"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
|
@ -310,7 +310,7 @@
|
||||||
"traefik.http.routers.jellyseerr.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.jellyseerr.tls.certresolver" = "letsencrypt";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/jellyseerr_data:/app/config"
|
"/storage/dataset/docker/media/jellyseerr_data:/app/config"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = 1000;
|
PUID = 1000;
|
||||||
|
@ -337,7 +337,7 @@
|
||||||
"diun.include_tags" = "^v\\d+\\.\\d+\\.\\d+$$";
|
"diun.include_tags" = "^v\\d+\\.\\d+\\.\\d+$$";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/autobrr_data:/config"
|
"/storage/dataset/docker/media/autobrr_data:/config"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = 1000;
|
PUID = 1000;
|
||||||
|
@ -353,33 +353,33 @@
|
||||||
};
|
};
|
||||||
restart = "always";
|
restart = "always";
|
||||||
};
|
};
|
||||||
# deemix.service = {
|
deemix.service = {
|
||||||
# image = "finniedj/deemix:latest";
|
image = "finniedj/deemix:latest";
|
||||||
# container_name = "deemix";
|
container_name = "deemix";
|
||||||
# labels = {
|
labels = {
|
||||||
# "traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
# "traefik.http.routers.deemix.entrypoints" = "websecure";
|
"traefik.http.routers.deemix.entrypoints" = "websecure";
|
||||||
# "traefik.http.routers.deemix.rule" = "Host(`deemix.ghoscht.com`)";
|
"traefik.http.routers.deemix.rule" = "Host(`deemix.ghoscht.com`)";
|
||||||
# "traefik.http.services.deemix.loadbalancer.server.port" = "6595";
|
"traefik.http.services.deemix.loadbalancer.server.port" = "6595";
|
||||||
# "traefik.docker.network" = "dmz";
|
"traefik.docker.network" = "dmz";
|
||||||
# "traefik.http.routers.deemix.tls" = "true";
|
"traefik.http.routers.deemix.tls" = "true";
|
||||||
# "traefik.http.routers.deemix.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.deemix.tls.certresolver" = "letsencrypt";
|
||||||
# };
|
};
|
||||||
# volumes = [
|
volumes = [
|
||||||
# "/home/ghoscht/.data/deemix:/downloads"
|
"/storage/dataset/data/deemix:/downloads"
|
||||||
# ];
|
];
|
||||||
# environment = {
|
environment = {
|
||||||
# PUID = 1000;
|
PUID = 1000;
|
||||||
# PGID = 1000;
|
PGID = 1000;
|
||||||
# UMASK_SET = 022;
|
UMASK_SET = 022;
|
||||||
# TZ = "Europe/Berlin";
|
TZ = "Europe/Berlin";
|
||||||
# };
|
};
|
||||||
# network_mode = "service:vpn";
|
network_mode = "service:vpn";
|
||||||
# depends_on = {
|
depends_on = {
|
||||||
# vpn = {condition = "service_healthy";};
|
vpn = {condition = "service_healthy";};
|
||||||
# };
|
};
|
||||||
# restart = "always";
|
restart = "always";
|
||||||
# };
|
};
|
||||||
unpackerr.service = {
|
unpackerr.service = {
|
||||||
image = "golift/unpackerr:0.13";
|
image = "golift/unpackerr:0.13";
|
||||||
container_name = "unpackerr";
|
container_name = "unpackerr";
|
||||||
|
@ -433,10 +433,10 @@
|
||||||
restart = "always";
|
restart = "always";
|
||||||
};
|
};
|
||||||
port-refresh.service = {
|
port-refresh.service = {
|
||||||
image = "git.ghoscht.com/ghoscht/deluge-windscribe-ephemeral-port:v3-beta";
|
image = "ghoscht/windscribe-ephemeral-port:latest";
|
||||||
container_name = "port-refresh";
|
container_name = "port-refresh";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/media/port-refresh_config/config.yml:/config/config.yaml"
|
"/storage/dataset/docker/media/port-refresh_config/config.yml:/config/config.yaml"
|
||||||
];
|
];
|
||||||
networks = [
|
networks = [
|
||||||
"internal"
|
"internal"
|
||||||
|
|
|
@ -22,8 +22,7 @@
|
||||||
"traefik.http.routers.nextcloud.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.nextcloud.tls.certresolver" = "letsencrypt";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/storage/dataset/docker/nextcloud/nextcloud_data/data:/var/www/html/data"
|
"/storage/dataset/docker/nextcloud/nextcloud_data:/var/www/html"
|
||||||
"/home/ghoscht/.docker/nextcloud/nextcloud_data:/var/www/html"
|
|
||||||
];
|
];
|
||||||
hostname = "nextcloud.ghoscht.com";
|
hostname = "nextcloud.ghoscht.com";
|
||||||
environment = {
|
environment = {
|
||||||
|
@ -42,7 +41,7 @@
|
||||||
"/home/ghoscht/.docker/nextcloud/nextcloud.env"
|
"/home/ghoscht/.docker/nextcloud/nextcloud.env"
|
||||||
];
|
];
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/nextcloud/nextcloud_db:/var/lib/mysql"
|
"/storage/dataset/docker/nextcloud/nextcloud_db:/var/lib/mysql"
|
||||||
];
|
];
|
||||||
restart = "unless-stopped";
|
restart = "unless-stopped";
|
||||||
command = "--transaction-isolation=READ-COMMITTED --binlog-format=ROW";
|
command = "--transaction-isolation=READ-COMMITTED --binlog-format=ROW";
|
||||||
|
|
|
@ -8,7 +8,7 @@
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
vaultwarden.service = {
|
vaultwarden.service = {
|
||||||
image = "vaultwarden/server:1.32.4";
|
image = "vaultwarden/server:1.32.0";
|
||||||
container_name = "vaultwarden";
|
container_name = "vaultwarden";
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
@ -30,7 +30,7 @@
|
||||||
"traefik.http.routers.vaultwarden-external.tls.certresolver" = "letsencrypt";
|
"traefik.http.routers.vaultwarden-external.tls.certresolver" = "letsencrypt";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/passwords/vaultwarden_data/:/data"
|
"/storage/dataset/docker/passwords/vaultwarden_data/:/data"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
DOMAIN = "http://vaultwarden.ghoscht.com";
|
DOMAIN = "http://vaultwarden.ghoscht.com";
|
||||||
|
|
|
@ -21,7 +21,7 @@
|
||||||
# "traefik.http.routers.homeassistant.middlewares" = "authentik@file";
|
# "traefik.http.routers.homeassistant.middlewares" = "authentik@file";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/smarthome/homeassistant_data:/config"
|
"/storage/dataset/docker/smarthome/homeassistant_data:/config"
|
||||||
"/etc/localtime:/etc/localtime:ro"
|
"/etc/localtime:/etc/localtime:ro"
|
||||||
"/run/dbus:/run/dbus:ro"
|
"/run/dbus:/run/dbus:ro"
|
||||||
];
|
];
|
||||||
|
|
|
@ -39,7 +39,7 @@
|
||||||
"/home/ghoscht/.docker/stats/grafana.env"
|
"/home/ghoscht/.docker/stats/grafana.env"
|
||||||
];
|
];
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/stats/grafana_data:/var/lib/grafana"
|
"/storage/dataset/docker/stats/grafana_data:/var/lib/grafana"
|
||||||
];
|
];
|
||||||
networks = [
|
networks = [
|
||||||
"dmz"
|
"dmz"
|
||||||
|
@ -49,7 +49,7 @@
|
||||||
loki.service = {
|
loki.service = {
|
||||||
image = "grafana/loki:3.0.0";
|
image = "grafana/loki:3.0.0";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/stats/loki_data:/etc/loki"
|
"/storage/dataset/docker/stats/loki_data:/etc/loki"
|
||||||
];
|
];
|
||||||
ports = [
|
ports = [
|
||||||
"3100:3100"
|
"3100:3100"
|
||||||
|
@ -63,7 +63,7 @@
|
||||||
image = "grafana/promtail:3.0.0";
|
image = "grafana/promtail:3.0.0";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/var/log:/var/log"
|
"/var/log:/var/log"
|
||||||
"/home/ghoscht/.docker/stats/promtail_data/promtail-config.yml:/etc/promtail/promtail-config.yml"
|
"/storage/dataset/docker/stats/promtail_data/promtail-config.yml:/etc/promtail/promtail-config.yml"
|
||||||
];
|
];
|
||||||
command = "-config.file=/etc/promtail/promtail-config.yml";
|
command = "-config.file=/etc/promtail/promtail-config.yml";
|
||||||
networks = [
|
networks = [
|
||||||
|
@ -73,8 +73,8 @@
|
||||||
prometheus.service = {
|
prometheus.service = {
|
||||||
image = "prom/prometheus:v2.53.0";
|
image = "prom/prometheus:v2.53.0";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/stats/prometheus_config/prometheus.yml:/etc/prometheus/prometheus.yml"
|
"/storage/dataset/docker/stats/prometheus_config/prometheus.yml:/etc/prometheus/prometheus.yml"
|
||||||
"/home/ghoscht/.docker/stats/prometheus_data:/prometheus"
|
"/storage/dataset/docker/stats/prometheus_data:/prometheus"
|
||||||
];
|
];
|
||||||
command = [
|
command = [
|
||||||
"--config.file=/etc/prometheus/prometheus.yml"
|
"--config.file=/etc/prometheus/prometheus.yml"
|
||||||
|
|
|
@ -24,36 +24,36 @@ in {
|
||||||
'';
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
# systemd.services.add-loki-logging-driver = {
|
systemd.services.add-loki-logging-driver = {
|
||||||
# description = "Add grafana loki docker driver";
|
description = "Add grafana loki docker driver";
|
||||||
# after = ["network.target"];
|
after = ["network.target"];
|
||||||
# wantedBy = ["multi-user.target"];
|
wantedBy = ["multi-user.target"];
|
||||||
#
|
|
||||||
# serviceConfig.Type = "oneshot";
|
|
||||||
# script = let
|
|
||||||
# dockercli = "${config.virtualisation.docker.package}/bin/docker";
|
|
||||||
# in ''
|
|
||||||
# # Put a true at the end to prevent getting non-zero return code, which will
|
|
||||||
# # crash the whole service.
|
|
||||||
# check=$(${dockercli} plugin ls | grep "loki" || true)
|
|
||||||
# if [ -z "$check" ]; then
|
|
||||||
# ${dockercli} plugin install grafana/loki-docker-driver:latest --alias loki --grant-all-permissions
|
|
||||||
# else
|
|
||||||
# echo "loki docker driver already exists in docker"
|
|
||||||
# fi
|
|
||||||
# '';
|
|
||||||
# };
|
|
||||||
|
|
||||||
# virtualisation.docker.daemon.settings = {
|
serviceConfig.Type = "oneshot";
|
||||||
# debug = true;
|
script = let
|
||||||
# log-driver = "loki";
|
dockercli = "${config.virtualisation.docker.package}/bin/docker";
|
||||||
# log-opts = {
|
in ''
|
||||||
# loki-url = "http://localhost:3100/loki/api/v1/push";
|
# Put a true at the end to prevent getting non-zero return code, which will
|
||||||
# loki-batch-size = "400";
|
# crash the whole service.
|
||||||
# loki-max-backoff = "800ms";
|
check=$(${dockercli} plugin ls | grep "loki" || true)
|
||||||
# loki-retries = "2";
|
if [ -z "$check" ]; then
|
||||||
# loki-timeout = "1s";
|
${dockercli} plugin install grafana/loki-docker-driver:latest --alias loki --grant-all-permissions
|
||||||
# keep-file = "true";
|
else
|
||||||
# };
|
echo "loki docker driver already exists in docker"
|
||||||
# };
|
fi
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
virtualisation.docker.daemon.settings = {
|
||||||
|
debug = true;
|
||||||
|
log-driver = "loki";
|
||||||
|
log-opts = {
|
||||||
|
loki-url = "http://localhost:3100/loki/api/v1/push";
|
||||||
|
loki-batch-size = "400";
|
||||||
|
loki-max-backoff = "800ms";
|
||||||
|
loki-retries = "2";
|
||||||
|
loki-timeout = "1s";
|
||||||
|
keep-file = "true";
|
||||||
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -55,7 +55,7 @@
|
||||||
command = "--save 60 1 --loglevel warning";
|
command = "--save 60 1 --loglevel warning";
|
||||||
restart = "always";
|
restart = "always";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/wiki/redis_data:/data"
|
"/storage/dataset/docker/wiki/redis_data:/data"
|
||||||
];
|
];
|
||||||
networks = [
|
networks = [
|
||||||
"internal"
|
"internal"
|
||||||
|
@ -65,7 +65,7 @@
|
||||||
image = "postgres:12.18";
|
image = "postgres:12.18";
|
||||||
restart = "always";
|
restart = "always";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/home/ghoscht/.docker/wiki/postgres_data:/var/lib/postgresql/data"
|
"/storage/dataset/docker/wiki/postgres_data:/var/lib/postgresql/data"
|
||||||
];
|
];
|
||||||
networks = [
|
networks = [
|
||||||
"internal"
|
"internal"
|
||||||
|
|
|
@ -80,7 +80,7 @@ in {
|
||||||
|
|
||||||
locations:
|
locations:
|
||||||
dashboard:
|
dashboard:
|
||||||
from: /home/ghoscht/.docker/dashboard
|
from: /storage/dataset/docker/dashboard
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -93,7 +93,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/dashboard/arion-compose.nix -p ${arionPath}/dashboard/arion-pkgs.nix start
|
- arion -f ${arionPath}/dashboard/arion-compose.nix -p ${arionPath}/dashboard/arion-pkgs.nix start
|
||||||
dns:
|
dns:
|
||||||
from: /home/ghoscht/.docker/dns
|
from: /storage/dataset/docker/dns
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -106,7 +106,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/dns/arion-compose.nix -p ${arionPath}/dns/arion-pkgs.nix start
|
- arion -f ${arionPath}/dns/arion-compose.nix -p ${arionPath}/dns/arion-pkgs.nix start
|
||||||
feed:
|
feed:
|
||||||
from: /home/ghoscht/.docker/feed
|
from: /storage/dataset/docker/feed
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -119,7 +119,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/feed/arion-compose.nix -p ${arionPath}/feed/arion-pkgs.nix start
|
- arion -f ${arionPath}/feed/arion-compose.nix -p ${arionPath}/feed/arion-pkgs.nix start
|
||||||
git:
|
git:
|
||||||
from: /home/ghoscht/.docker/git
|
from: /storage/dataset/docker/git
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -131,7 +131,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/git/arion-compose.nix -p ${arionPath}/git/arion-pkgs.nix start
|
- arion -f ${arionPath}/git/arion-compose.nix -p ${arionPath}/git/arion-pkgs.nix start
|
||||||
media:
|
media:
|
||||||
from: /home/ghoscht/.docker/media
|
from: /storage/dataset/docker/media
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -143,9 +143,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/media/arion-compose.nix -p ${arionPath}/media/arion-pkgs.nix start
|
- arion -f ${arionPath}/media/arion-compose.nix -p ${arionPath}/media/arion-pkgs.nix start
|
||||||
nextcloud:
|
nextcloud:
|
||||||
from:
|
from: /storage/dataset/docker/nextcloud
|
||||||
- /storage/dataset/docker/nextcloud/nextcloud_data/data
|
|
||||||
- /home/ghoscht/.docker/nextcloud/
|
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -157,7 +155,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/nextcloud/arion-compose.nix -p ${arionPath}/nextcloud/arion-pkgs.nix start
|
- arion -f ${arionPath}/nextcloud/arion-compose.nix -p ${arionPath}/nextcloud/arion-pkgs.nix start
|
||||||
smarthome:
|
smarthome:
|
||||||
from: /home/ghoscht/.docker/smarthome
|
from: /storage/dataset/docker/smarthome
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -170,10 +168,10 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/smarthome/arion-compose.nix -p ${arionPath}/smarthome/arion-pkgs.nix start
|
- arion -f ${arionPath}/smarthome/arion-compose.nix -p ${arionPath}/smarthome/arion-pkgs.nix start
|
||||||
passwords:
|
passwords:
|
||||||
from: /home/ghoscht/.docker/passwords
|
from: /storage/dataset/docker/passwords
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
# - ssd
|
- ssd
|
||||||
- eustachius
|
- eustachius
|
||||||
cron: '0 4 * * *' # Every Day at 4:00
|
cron: '0 4 * * *' # Every Day at 4:00
|
||||||
hooks:
|
hooks:
|
||||||
|
@ -183,7 +181,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/passwords/arion-compose.nix -p ${arionPath}/passwords/arion-pkgs.nix start
|
- arion -f ${arionPath}/passwords/arion-compose.nix -p ${arionPath}/passwords/arion-pkgs.nix start
|
||||||
matrix:
|
matrix:
|
||||||
from: /home/ghoscht/.docker/matrix
|
from: /storage/dataset/docker/matrix
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -207,7 +205,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/media/arion-compose.nix -p ${arionPath}/media/arion-pkgs.nix start
|
- arion -f ${arionPath}/media/arion-compose.nix -p ${arionPath}/media/arion-pkgs.nix start
|
||||||
headscale:
|
headscale:
|
||||||
from: /home/ghoscht/.docker/headscale
|
from: /storage/dataset/docker/headscale
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
forget: prune
|
forget: prune
|
||||||
|
@ -219,7 +217,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/headscale/arion-compose.nix -p ${arionPath}/headscale/arion-pkgs.nix start
|
- arion -f ${arionPath}/headscale/arion-compose.nix -p ${arionPath}/headscale/arion-pkgs.nix start
|
||||||
auth:
|
auth:
|
||||||
from: /home/ghoscht/.docker/auth
|
from: /storage/dataset/docker/auth
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -232,7 +230,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/auth/arion-compose.nix -p ${arionPath}/auth/arion-pkgs.nix start
|
- arion -f ${arionPath}/auth/arion-compose.nix -p ${arionPath}/auth/arion-pkgs.nix start
|
||||||
infrastructure:
|
infrastructure:
|
||||||
from: /home/ghoscht/.docker/infrastructure
|
from: /storage/dataset/docker/infrastructure
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -245,7 +243,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/infrastructure/arion-compose.nix -p ${arionPath}/infrastructure/arion-pkgs.nix start
|
- arion -f ${arionPath}/infrastructure/arion-compose.nix -p ${arionPath}/infrastructure/arion-pkgs.nix start
|
||||||
wiki:
|
wiki:
|
||||||
from: /home/ghoscht/.docker/wiki
|
from: /storage/dataset/docker/wiki
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -258,7 +256,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/wiki/arion-compose.nix -p ${arionPath}/wiki/arion-pkgs.nix start
|
- arion -f ${arionPath}/wiki/arion-compose.nix -p ${arionPath}/wiki/arion-pkgs.nix start
|
||||||
stats:
|
stats:
|
||||||
from: /home/ghoscht/.docker/stats
|
from: /storage/dataset/docker/stats
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -271,7 +269,7 @@ in {
|
||||||
after:
|
after:
|
||||||
- arion -f ${arionPath}/stats/arion-compose.nix -p ${arionPath}/stats/arion-pkgs.nix start
|
- arion -f ${arionPath}/stats/arion-compose.nix -p ${arionPath}/stats/arion-pkgs.nix start
|
||||||
minio:
|
minio:
|
||||||
from: /storage/dataset/docker/minio
|
from: /storage/dataset/docker/stats
|
||||||
to:
|
to:
|
||||||
- zfs
|
- zfs
|
||||||
- eustachius
|
- eustachius
|
||||||
|
@ -299,10 +297,10 @@ in {
|
||||||
type: local
|
type: local
|
||||||
path: /storage/dataset/backups
|
path: /storage/dataset/backups
|
||||||
key: '${config.sops.placeholder."autorestic/zfs_key"}'
|
key: '${config.sops.placeholder."autorestic/zfs_key"}'
|
||||||
# ssd:
|
ssd:
|
||||||
# type: local
|
type: local
|
||||||
# path: /home/ghoscht/Backups
|
path: /home/ghoscht/Backups
|
||||||
# key: '${config.sops.placeholder."autorestic/ssd_key"}'
|
key: '${config.sops.placeholder."autorestic/ssd_key"}'
|
||||||
eustachius:
|
eustachius:
|
||||||
type: rest
|
type: rest
|
||||||
path: http://100.64.0.3:8000/franz
|
path: http://100.64.0.3:8000/franz
|
||||||
|
|
Loading…
Reference in a new issue