Compare commits
5 commits
48fb68c2fd
...
a7f56a7cf7
| Author | SHA1 | Date | |
|---|---|---|---|
| a7f56a7cf7 | |||
| ac47ec4689 | |||
| d0d6fac7ef | |||
| d693c4a93b | |||
| c294e159e2 |
10 changed files with 265 additions and 26 deletions
|
|
@ -4,6 +4,8 @@ let
|
||||||
cfg = config.homelab.apps.arr;
|
cfg = config.homelab.apps.arr;
|
||||||
|
|
||||||
networkName = "arrStack";
|
networkName = "arrStack";
|
||||||
|
proxyNet = config.homelab.apps.traefik.sharedNetworkName;
|
||||||
|
|
||||||
appNames = [ "bazarr" "lidarr" "prowlarr" "qbittorrent" "radarr" "sonarr" ];
|
appNames = [ "bazarr" "lidarr" "prowlarr" "qbittorrent" "radarr" "sonarr" ];
|
||||||
inUse = builtins.any (app: cfg.${app}.enable) appNames;
|
inUse = builtins.any (app: cfg.${app}.enable) appNames;
|
||||||
|
|
||||||
|
|
@ -233,6 +235,7 @@ in {
|
||||||
];
|
];
|
||||||
extraOptions = [
|
extraOptions = [
|
||||||
"--network=${networkName}"
|
"--network=${networkName}"
|
||||||
|
"--network=${proxyNet}"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = toString config.users.users.bazarr.uid;
|
PUID = toString config.users.users.bazarr.uid;
|
||||||
|
|
@ -250,6 +253,7 @@ in {
|
||||||
];
|
];
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
"traefik.docker.network" = proxyNet;
|
||||||
"traefik.http.routers.bazarr.rule" = "Host(`bazarr.depeuter.dev`)";
|
"traefik.http.routers.bazarr.rule" = "Host(`bazarr.depeuter.dev`)";
|
||||||
"traefik.http.services.bazarr.loadbalancer.server.port" = toString port;
|
"traefik.http.services.bazarr.loadbalancer.server.port" = toString port;
|
||||||
};
|
};
|
||||||
|
|
@ -267,6 +271,7 @@ in {
|
||||||
];
|
];
|
||||||
extraOptions = [
|
extraOptions = [
|
||||||
"--network=${networkName}"
|
"--network=${networkName}"
|
||||||
|
"--network=${proxyNet}"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = toString config.users.users.lidarr.uid;
|
PUID = toString config.users.users.lidarr.uid;
|
||||||
|
|
@ -279,6 +284,12 @@ in {
|
||||||
# TODO Fix path
|
# TODO Fix path
|
||||||
"/srv/lidarr-backup:/media/Backups"
|
"/srv/lidarr-backup:/media/Backups"
|
||||||
];
|
];
|
||||||
|
labels = {
|
||||||
|
"traefik.enable" = "true";
|
||||||
|
"traefik.docker.network" = proxyNet;
|
||||||
|
"traefik.http.routers.lidarr.rule" = "Host(`lidarr.depeuter.dev`)";
|
||||||
|
"traefik.http.services.lidarr.loadbalancer.server.port" = toString port;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
prowlarr = let
|
prowlarr = let
|
||||||
|
|
@ -293,6 +304,7 @@ in {
|
||||||
];
|
];
|
||||||
extraOptions = [
|
extraOptions = [
|
||||||
"--network=${networkName}"
|
"--network=${networkName}"
|
||||||
|
"--network=${proxyNet}"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = toString config.users.users.prowlarr.uid;
|
PUID = toString config.users.users.prowlarr.uid;
|
||||||
|
|
@ -306,6 +318,7 @@ in {
|
||||||
];
|
];
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
"traefik.docker.network" = proxyNet;
|
||||||
"traefik.http.routers.prowlarr.rule" = "Host(`prowlarr.depeuter.dev`)";
|
"traefik.http.routers.prowlarr.rule" = "Host(`prowlarr.depeuter.dev`)";
|
||||||
"traefik.http.services.prowlarr.loadbalancer.server.port" = toString port;
|
"traefik.http.services.prowlarr.loadbalancer.server.port" = toString port;
|
||||||
};
|
};
|
||||||
|
|
@ -324,6 +337,7 @@ in {
|
||||||
];
|
];
|
||||||
extraOptions = [
|
extraOptions = [
|
||||||
"--network=${networkName}"
|
"--network=${networkName}"
|
||||||
|
"--network=${proxyNet}"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = toString config.users.users.qbittorrent.uid;
|
PUID = toString config.users.users.qbittorrent.uid;
|
||||||
|
|
@ -338,6 +352,7 @@ in {
|
||||||
];
|
];
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
"traefik.docker.network" = proxyNet;
|
||||||
"traefik.http.routers.qbittorrent.rule" = "Host(`qb.depeuter.dev`)";
|
"traefik.http.routers.qbittorrent.rule" = "Host(`qb.depeuter.dev`)";
|
||||||
"traefik.http.services.qbittorrent.loadbalancer.server.port" = toString port;
|
"traefik.http.services.qbittorrent.loadbalancer.server.port" = toString port;
|
||||||
};
|
};
|
||||||
|
|
@ -355,6 +370,7 @@ in {
|
||||||
];
|
];
|
||||||
extraOptions = [
|
extraOptions = [
|
||||||
"--network=${networkName}"
|
"--network=${networkName}"
|
||||||
|
"--network=${proxyNet}"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = toString config.users.users.radarr.uid;
|
PUID = toString config.users.users.radarr.uid;
|
||||||
|
|
@ -371,6 +387,7 @@ in {
|
||||||
];
|
];
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
"traefik.docker.network" = proxyNet;
|
||||||
"traefik.http.routers.radarr.rule" = "Host(`radarr.depeuter.dev`)";
|
"traefik.http.routers.radarr.rule" = "Host(`radarr.depeuter.dev`)";
|
||||||
"traefik.http.services.radarr.loadbalancer.server.port" = toString port;
|
"traefik.http.services.radarr.loadbalancer.server.port" = toString port;
|
||||||
};
|
};
|
||||||
|
|
@ -388,6 +405,7 @@ in {
|
||||||
];
|
];
|
||||||
extraOptions = [
|
extraOptions = [
|
||||||
"--network=${networkName}"
|
"--network=${networkName}"
|
||||||
|
"--network=${proxyNet}"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
PUID = toString config.users.users.sonarr.uid;
|
PUID = toString config.users.users.sonarr.uid;
|
||||||
|
|
@ -404,6 +422,7 @@ in {
|
||||||
];
|
];
|
||||||
labels = {
|
labels = {
|
||||||
"traefik.enable" = "true";
|
"traefik.enable" = "true";
|
||||||
|
"traefik.docker.network" = proxyNet;
|
||||||
"traefik.http.routers.sonarr.rule" = "Host(`sonarr.depeuter.dev`)";
|
"traefik.http.routers.sonarr.rule" = "Host(`sonarr.depeuter.dev`)";
|
||||||
"traefik.http.services.sonarr.loadbalancer.server.port" = toString port;
|
"traefik.http.services.sonarr.loadbalancer.server.port" = toString port;
|
||||||
};
|
};
|
||||||
|
|
|
||||||
16
modules/apps/bind9/db.depeuter.dev
Normal file
16
modules/apps/bind9/db.depeuter.dev
Normal file
|
|
@ -0,0 +1,16 @@
|
||||||
|
$TTL 604800
|
||||||
|
@ IN SOA ns1.depeuter.dev. admin.depeuter.dev. (
|
||||||
|
5 ; Serial
|
||||||
|
604800 ; Refresh
|
||||||
|
86400 ; Retry
|
||||||
|
2419200 ; Expire
|
||||||
|
604800 ) ; Negative Cache TTL
|
||||||
|
|
||||||
|
; name servers - NS records
|
||||||
|
IN NS ns1.depeuter.dev.
|
||||||
|
; IN NS ns2.depeuter.dev.
|
||||||
|
|
||||||
|
ns1.depeuter.dev. IN A 192.168.0.91
|
||||||
|
;ns1.depeuter.dev. IN A 192.158.0.X
|
||||||
|
|
||||||
|
hugo.depeuter.dev. IN A 192.168.0.11
|
||||||
54
modules/apps/bind9/default.nix
Normal file
54
modules/apps/bind9/default.nix
Normal file
|
|
@ -0,0 +1,54 @@
|
||||||
|
{ config, lib, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.homelab.apps.bind9;
|
||||||
|
in {
|
||||||
|
options.homelab.apps.bind9.enable = lib.mkEnableOption "ISC BIND 9 (Docker)";
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
homelab.virtualisation.containers.enable = true;
|
||||||
|
|
||||||
|
environment.etc = {
|
||||||
|
"bind/named.conf" = {
|
||||||
|
source = ./named.conf;
|
||||||
|
mode = "0555";
|
||||||
|
};
|
||||||
|
"bind/named.conf.options" = {
|
||||||
|
source = ./named.conf.options;
|
||||||
|
mode = "0555";
|
||||||
|
};
|
||||||
|
"bind/named.conf.local" = {
|
||||||
|
source = ./named.conf.local;
|
||||||
|
mode = "0555";
|
||||||
|
};
|
||||||
|
"bind/zones/db.depeuter.dev" = {
|
||||||
|
source = ./db.depeuter.dev;
|
||||||
|
mode = "0555";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
virtualisation.oci-containers.containers.bind9 = {
|
||||||
|
hostname = "bind9";
|
||||||
|
#image = "internetsystemsconsortium/bind9:9.20"; # Current stable
|
||||||
|
image = "ubuntu/bind9"; # Current stable
|
||||||
|
autoStart = true;
|
||||||
|
ports = [
|
||||||
|
"53:53/udp"
|
||||||
|
"53:53/tcp"
|
||||||
|
"953:953/tcp"
|
||||||
|
];
|
||||||
|
extraOptions = [
|
||||||
|
];
|
||||||
|
environment = {
|
||||||
|
};
|
||||||
|
volumes = [
|
||||||
|
"/etc/bind:/etc/bind" # For configuration, your `named.conf` lives here
|
||||||
|
"bind9-cache:/var/cache/bind"
|
||||||
|
#"...:/var/lib/bind" # Secondary zones
|
||||||
|
"bind9-logs:/var/log" # Logfiles
|
||||||
|
];
|
||||||
|
labels = {
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
2
modules/apps/bind9/named.conf
Normal file
2
modules/apps/bind9/named.conf
Normal file
|
|
@ -0,0 +1,2 @@
|
||||||
|
include "/etc/bind/named.conf.options";
|
||||||
|
include "/etc/bind/named.conf.local";
|
||||||
4
modules/apps/bind9/named.conf.local
Normal file
4
modules/apps/bind9/named.conf.local
Normal file
|
|
@ -0,0 +1,4 @@
|
||||||
|
zone "depeuter.dev" {
|
||||||
|
type primary;
|
||||||
|
file "/etc/bind/zones/db.depeuter.dev";
|
||||||
|
};
|
||||||
35
modules/apps/bind9/named.conf.options
Normal file
35
modules/apps/bind9/named.conf.options
Normal file
|
|
@ -0,0 +1,35 @@
|
||||||
|
http local {
|
||||||
|
endpoints { "/dns-query"; };
|
||||||
|
};
|
||||||
|
|
||||||
|
acl bogusnets {
|
||||||
|
};
|
||||||
|
|
||||||
|
acl trusted {
|
||||||
|
192.168.0.0/16;
|
||||||
|
};
|
||||||
|
|
||||||
|
options {
|
||||||
|
directory "/var/cache/bind";
|
||||||
|
|
||||||
|
version "not currently available";
|
||||||
|
|
||||||
|
listen-on { any; };
|
||||||
|
listen-on-v6 { any; };
|
||||||
|
listen-on tls ephemeral { any; };
|
||||||
|
listen-on-v6 tls ephemeral { any; };
|
||||||
|
listen-on tls ephemeral http local { any; };
|
||||||
|
listen-on-v6 tls ephemeral http local { any; };
|
||||||
|
|
||||||
|
recursion yes;
|
||||||
|
forwarders {
|
||||||
|
9.9.9.9;
|
||||||
|
149.112.112.112;
|
||||||
|
};
|
||||||
|
forward only;
|
||||||
|
|
||||||
|
allow-query { any; };
|
||||||
|
allow-recursion { any; };
|
||||||
|
allow-transfer { none; };
|
||||||
|
blackhole { bogusnets; };
|
||||||
|
};
|
||||||
|
|
@ -6,24 +6,28 @@ let
|
||||||
PUID = toString config.users.users.calibre.uid;
|
PUID = toString config.users.users.calibre.uid;
|
||||||
PGID = toString config.users.groups.media.gid;
|
PGID = toString config.users.groups.media.gid;
|
||||||
|
|
||||||
|
books = "/srv/books";
|
||||||
|
calibre-config = "/srv/calibre-config";
|
||||||
|
calibre-web-config = "/srv/calibre-web-config";
|
||||||
|
|
||||||
networkName = "calibre";
|
networkName = "calibre";
|
||||||
in {
|
in {
|
||||||
options.homelab.apps.calibre = {
|
options.homelab.apps.calibre = {
|
||||||
enable = lib.mkEnableOption "Calibre (Desktop + Web)";
|
enable = lib.mkEnableOption "Calibre (Desktop + Web)";
|
||||||
desktop = lib.mkEnableOption "Calibre Desktop (KasmVNC)";
|
desktop.enable = lib.mkEnableOption "Calibre Desktop (KasmVNC)";
|
||||||
web = lib.mkEnableOption "Calibre Web";
|
web.enable = lib.mkEnableOption "Calibre Web";
|
||||||
};
|
};
|
||||||
|
|
||||||
config = lib.mkMerge [
|
config = lib.mkMerge [
|
||||||
{
|
{
|
||||||
homelab.apps.calibre = lib.mkIf cfg.enable {
|
homelab.apps.calibre = lib.mkIf cfg.enable {
|
||||||
desktop = true;
|
desktop.enable = true;
|
||||||
web = true;
|
web.enable = true;
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
||||||
# Common
|
# Common
|
||||||
(lib.mkIf (cfg.desktop || cfg.web) {
|
(lib.mkIf (cfg.desktop.enable || cfg.web.enable) {
|
||||||
homelab = {
|
homelab = {
|
||||||
users.media.enable = true;
|
users.media.enable = true;
|
||||||
virtualisation.containers.enable = true;
|
virtualisation.containers.enable = true;
|
||||||
|
|
@ -37,7 +41,7 @@ in {
|
||||||
shell = null;
|
shell = null;
|
||||||
};
|
};
|
||||||
|
|
||||||
fileSystems."/srv/books" = {
|
fileSystems."${books}" = {
|
||||||
device = "192.168.0.11:/mnt/SMALL/MEDIA/BOOKS";
|
device = "192.168.0.11:/mnt/SMALL/MEDIA/BOOKS";
|
||||||
fsType = "nfs";
|
fsType = "nfs";
|
||||||
options = [
|
options = [
|
||||||
|
|
@ -69,8 +73,8 @@ in {
|
||||||
})
|
})
|
||||||
|
|
||||||
# Calibre desktop
|
# Calibre desktop
|
||||||
{
|
(lib.mkIf cfg.desktop.enable {
|
||||||
fileSystems."/srv/calibre-config" = {
|
fileSystems."${calibre-config}" = {
|
||||||
device = "192.168.0.11:/mnt/SMALL/CONFIG/CALIBRE";
|
device = "192.168.0.11:/mnt/SMALL/CONFIG/CALIBRE";
|
||||||
fsType = "nfs";
|
fsType = "nfs";
|
||||||
options = [
|
options = [
|
||||||
|
|
@ -84,13 +88,15 @@ in {
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
virtualisation.oci-containers.containers.calibre = {
|
virtualisation.oci-containers.containers.calibre = let
|
||||||
|
innerPort = 8080;
|
||||||
|
in {
|
||||||
hostname = "calibre";
|
hostname = "calibre";
|
||||||
image = "lscr.io/linuxserver/calibre:latest";
|
image = "lscr.io/linuxserver/calibre:8.5.0";
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
ports = [
|
ports = [
|
||||||
# Open ports if you don't use Traefik
|
# Open ports if you don't use Traefik
|
||||||
"9480:8080" # Calibre desktop GUI
|
"9480:${toString innerPort}" # Calibre desktop GUI
|
||||||
#"9481:8181" # Calibre desktop GUI HTTPS
|
#"9481:8181" # Calibre desktop GUI HTTPS
|
||||||
#"9581:8081" # Calibre webserver gui
|
#"9581:8081" # Calibre webserver gui
|
||||||
];
|
];
|
||||||
|
|
@ -110,16 +116,21 @@ in {
|
||||||
#CLI_ARGS = "";
|
#CLI_ARGS = "";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/srv/calibre-config:/config"
|
"${calibre-config}:/config"
|
||||||
|
|
||||||
"/srv/books:/media/books"
|
"${books}:/media/books"
|
||||||
];
|
];
|
||||||
|
labels = {
|
||||||
|
"traefik.enable" = "true";
|
||||||
|
"traefik.http.routers.calibre.rule" = "Host(`calibre.depeuter.dev`)";
|
||||||
|
"traefik.http.services.calibre.loadbalancer.server.port" = toString innerPort;
|
||||||
};
|
};
|
||||||
}
|
};
|
||||||
|
})
|
||||||
|
|
||||||
# Calibre Web
|
# Calibre Web
|
||||||
{
|
(lib.mkIf cfg.web.enable {
|
||||||
fileSystems."/srv/calibre-web-config" = {
|
fileSystems."${calibre-web-config}" = {
|
||||||
device = "192.168.0.11:/mnt/SMALL/CONFIG/CALIBRE-WEB";
|
device = "192.168.0.11:/mnt/SMALL/CONFIG/CALIBRE-WEB";
|
||||||
fsType = "nfs";
|
fsType = "nfs";
|
||||||
options = [
|
options = [
|
||||||
|
|
@ -133,13 +144,15 @@ in {
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
virtualisation.oci-containers.containers.calibre-web = {
|
virtualisation.oci-containers.containers.calibre-web = let
|
||||||
|
innerPort = 8083;
|
||||||
|
in {
|
||||||
hostname = "calibre-web";
|
hostname = "calibre-web";
|
||||||
image = "lscr.io/linuxserver/calibre-web:latest";
|
image = "lscr.io/linuxserver/calibre-web:0.6.24";
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
ports = [
|
ports = [
|
||||||
# Open ports if you don't use Traefik
|
# Open ports if you don't use Traefik
|
||||||
"8083:8083" # Web UI
|
"8083:${toString innerPort}" # Web UI
|
||||||
];
|
];
|
||||||
extraOptions = [
|
extraOptions = [
|
||||||
"--network=${networkName}"
|
"--network=${networkName}"
|
||||||
|
|
@ -156,11 +169,16 @@ in {
|
||||||
#OAUTHLIB_RELAX_TOKEN_SCOPE = "1";
|
#OAUTHLIB_RELAX_TOKEN_SCOPE = "1";
|
||||||
};
|
};
|
||||||
volumes = [
|
volumes = [
|
||||||
"/srv/calibre-web-config:/config"
|
"${calibre-web-config}:/config"
|
||||||
|
|
||||||
"/srv/books:/media/books"
|
"${books}:/media/books"
|
||||||
];
|
];
|
||||||
|
labels = {
|
||||||
|
"traefik.enable" = "true";
|
||||||
|
"traefik.http.routers.calibre-web.rule" = "Host(`books.depeuter.dev`)";
|
||||||
|
"traefik.http.services.calibre-web.loadbalancer.server.port" = toString innerPort;
|
||||||
};
|
};
|
||||||
}
|
};
|
||||||
|
})
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -1,6 +1,7 @@
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./arr
|
./arr
|
||||||
|
./bind9
|
||||||
./calibre
|
./calibre
|
||||||
./changedetection
|
./changedetection
|
||||||
./freshrss
|
./freshrss
|
||||||
|
|
|
||||||
90
modules/apps/traefik/default.nix
Normal file
90
modules/apps/traefik/default.nix
Normal file
|
|
@ -0,0 +1,90 @@
|
||||||
|
{ config, lib, pkgs, ... }:
|
||||||
|
|
||||||
|
let
|
||||||
|
cfg = config.homelab.apps.traefik;
|
||||||
|
|
||||||
|
port = 8080;
|
||||||
|
in {
|
||||||
|
options.homelab.apps.traefik = {
|
||||||
|
enable = lib.mkEnableOption "Traefik Reverse Proxy";
|
||||||
|
sharedNetworkName = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = "traefik";
|
||||||
|
description = "The name of the shared network to connect the container to.";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf cfg.enable {
|
||||||
|
homelab.virtualisation.containers.enable = true;
|
||||||
|
|
||||||
|
# Make sure the Docker network exists.
|
||||||
|
systemd.services."docker-${cfg.sharedNetworkName}-create-network" = {
|
||||||
|
description = "Create Docker network for ${cfg.sharedNetworkName}";
|
||||||
|
requiredBy = [
|
||||||
|
"docker-traefik.service"
|
||||||
|
];
|
||||||
|
serviceConfig = {
|
||||||
|
Type = "oneshot";
|
||||||
|
RemainAfterExit = true;
|
||||||
|
};
|
||||||
|
script = ''
|
||||||
|
if ! ${pkgs.docker}/bin/docker network ls | grep -q ${cfg.sharedNetworkName}; then
|
||||||
|
${pkgs.docker}/bin/docker network create ${cfg.sharedNetworkName}
|
||||||
|
fi
|
||||||
|
'';
|
||||||
|
};
|
||||||
|
|
||||||
|
virtualisation.oci-containers.containers.traefik = {
|
||||||
|
hostname = "traefik";
|
||||||
|
image = "traefik:v3.4.3";
|
||||||
|
autoStart = true;
|
||||||
|
ports = [
|
||||||
|
"80:80/tcp"
|
||||||
|
"443:443/tcp"
|
||||||
|
"${toString port}:${toString port}/tcp" # Web UI (enabled by --api.insecure=true)
|
||||||
|
];
|
||||||
|
extraOptions = [
|
||||||
|
"--network=${cfg.sharedNetworkName}"
|
||||||
|
];
|
||||||
|
environmentFiles = [
|
||||||
|
/home/admin/.cloudflare.secret
|
||||||
|
];
|
||||||
|
cmd = [
|
||||||
|
"--api.insecure=true"
|
||||||
|
|
||||||
|
# Add Docker provider
|
||||||
|
"--providers.docker=true"
|
||||||
|
"--providers.docker.exposedByDefault=false"
|
||||||
|
|
||||||
|
# Add web entrypoint
|
||||||
|
"--entrypoints.web.address=:80/tcp"
|
||||||
|
"--entrypoints.web.http.redirections.entrypoint.to=websecure"
|
||||||
|
"--entrypoints.web.http.redirections.entrypoint.scheme=https"
|
||||||
|
|
||||||
|
# Add websecure entrypoint
|
||||||
|
"--entrypoints.websecure.address=:443/tcp"
|
||||||
|
"--entrypoints.websecure.http.tls=true"
|
||||||
|
"--entrypoints.websecure.http.tls.certResolver=letsencrypt"
|
||||||
|
"--entrypoints.websecure.http.tls.domains[0].main=depeuter.dev"
|
||||||
|
"--entrypoints.websecure.http.tls.domains[0].sans=*.depeuter.dev"
|
||||||
|
"--entrypoints.websecure.http.tls.domains[1].sans=*.${config.networking.hostName}.depeuter.dev"
|
||||||
|
|
||||||
|
# Certificates
|
||||||
|
"--certificatesresolvers.letsencrypt.acme.dnschallenge=true"
|
||||||
|
"--certificatesresolvers.letsencrypt.acme.dnschallenge.provider=cloudflare"
|
||||||
|
"--certificatesresolvers.letsencrypt.acme.email=tibo.depeuter@telenet.be"
|
||||||
|
"--certificatesresolvers.letsencrypt.acme.storage=/letsencrypt/acme.json"
|
||||||
|
];
|
||||||
|
volumes = [
|
||||||
|
"letsencryp:/letsencrypt"
|
||||||
|
|
||||||
|
"/var/run/docker.sock:/var/run/docker.sock:ro"
|
||||||
|
];
|
||||||
|
labels = {
|
||||||
|
"traefik.enable" = "true";
|
||||||
|
"traefik.http.routers.traefik.rule" = "Host(`traefik.${config.networking.hostName}.depeuter.dev`)";
|
||||||
|
"traefik.http.services.traefik.loadbalancer.server.port" = toString port;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -54,7 +54,7 @@ in {
|
||||||
dbHostname = "vaultwarden-db";
|
dbHostname = "vaultwarden-db";
|
||||||
dbPort = 5432;
|
dbPort = 5432;
|
||||||
in {
|
in {
|
||||||
vaultwarden-db = {
|
vaultwardenDb = {
|
||||||
hostname = dbHostname;
|
hostname = dbHostname;
|
||||||
image = "postgres:15.8-alpine";
|
image = "postgres:15.8-alpine";
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
|
|
@ -77,7 +77,7 @@ in {
|
||||||
dataDir = "/data";
|
dataDir = "/data";
|
||||||
in {
|
in {
|
||||||
hostname = "vaultwarden";
|
hostname = "vaultwarden";
|
||||||
image = "vaultwarden/server:1.33.2-alpine";
|
image = "vaultwarden/server:1.34.3-alpine";
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
ports = [
|
ports = [
|
||||||
"${toString cfg.port}:80/tcp"
|
"${toString cfg.port}:80/tcp"
|
||||||
|
|
@ -86,7 +86,7 @@ in {
|
||||||
"--network=${networkName}"
|
"--network=${networkName}"
|
||||||
];
|
];
|
||||||
dependsOn = [
|
dependsOn = [
|
||||||
dbHostname
|
"vaultwardenDb"
|
||||||
];
|
];
|
||||||
volumes = [
|
volumes = [
|
||||||
"vaultwarden:${dataDir}"
|
"vaultwarden:${dataDir}"
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue