Compare commits

...

5 commits

10 changed files with 265 additions and 26 deletions

View file

@ -4,6 +4,8 @@ let
cfg = config.homelab.apps.arr; cfg = config.homelab.apps.arr;
networkName = "arrStack"; networkName = "arrStack";
proxyNet = config.homelab.apps.traefik.sharedNetworkName;
appNames = [ "bazarr" "lidarr" "prowlarr" "qbittorrent" "radarr" "sonarr" ]; appNames = [ "bazarr" "lidarr" "prowlarr" "qbittorrent" "radarr" "sonarr" ];
inUse = builtins.any (app: cfg.${app}.enable) appNames; inUse = builtins.any (app: cfg.${app}.enable) appNames;
@ -233,6 +235,7 @@ in {
]; ];
extraOptions = [ extraOptions = [
"--network=${networkName}" "--network=${networkName}"
"--network=${proxyNet}"
]; ];
environment = { environment = {
PUID = toString config.users.users.bazarr.uid; PUID = toString config.users.users.bazarr.uid;
@ -250,6 +253,7 @@ in {
]; ];
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"traefik.docker.network" = proxyNet;
"traefik.http.routers.bazarr.rule" = "Host(`bazarr.depeuter.dev`)"; "traefik.http.routers.bazarr.rule" = "Host(`bazarr.depeuter.dev`)";
"traefik.http.services.bazarr.loadbalancer.server.port" = toString port; "traefik.http.services.bazarr.loadbalancer.server.port" = toString port;
}; };
@ -267,6 +271,7 @@ in {
]; ];
extraOptions = [ extraOptions = [
"--network=${networkName}" "--network=${networkName}"
"--network=${proxyNet}"
]; ];
environment = { environment = {
PUID = toString config.users.users.lidarr.uid; PUID = toString config.users.users.lidarr.uid;
@ -279,6 +284,12 @@ in {
# TODO Fix path # TODO Fix path
"/srv/lidarr-backup:/media/Backups" "/srv/lidarr-backup:/media/Backups"
]; ];
labels = {
"traefik.enable" = "true";
"traefik.docker.network" = proxyNet;
"traefik.http.routers.lidarr.rule" = "Host(`lidarr.depeuter.dev`)";
"traefik.http.services.lidarr.loadbalancer.server.port" = toString port;
};
}; };
prowlarr = let prowlarr = let
@ -293,6 +304,7 @@ in {
]; ];
extraOptions = [ extraOptions = [
"--network=${networkName}" "--network=${networkName}"
"--network=${proxyNet}"
]; ];
environment = { environment = {
PUID = toString config.users.users.prowlarr.uid; PUID = toString config.users.users.prowlarr.uid;
@ -306,6 +318,7 @@ in {
]; ];
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"traefik.docker.network" = proxyNet;
"traefik.http.routers.prowlarr.rule" = "Host(`prowlarr.depeuter.dev`)"; "traefik.http.routers.prowlarr.rule" = "Host(`prowlarr.depeuter.dev`)";
"traefik.http.services.prowlarr.loadbalancer.server.port" = toString port; "traefik.http.services.prowlarr.loadbalancer.server.port" = toString port;
}; };
@ -324,6 +337,7 @@ in {
]; ];
extraOptions = [ extraOptions = [
"--network=${networkName}" "--network=${networkName}"
"--network=${proxyNet}"
]; ];
environment = { environment = {
PUID = toString config.users.users.qbittorrent.uid; PUID = toString config.users.users.qbittorrent.uid;
@ -338,6 +352,7 @@ in {
]; ];
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"traefik.docker.network" = proxyNet;
"traefik.http.routers.qbittorrent.rule" = "Host(`qb.depeuter.dev`)"; "traefik.http.routers.qbittorrent.rule" = "Host(`qb.depeuter.dev`)";
"traefik.http.services.qbittorrent.loadbalancer.server.port" = toString port; "traefik.http.services.qbittorrent.loadbalancer.server.port" = toString port;
}; };
@ -355,6 +370,7 @@ in {
]; ];
extraOptions = [ extraOptions = [
"--network=${networkName}" "--network=${networkName}"
"--network=${proxyNet}"
]; ];
environment = { environment = {
PUID = toString config.users.users.radarr.uid; PUID = toString config.users.users.radarr.uid;
@ -371,6 +387,7 @@ in {
]; ];
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"traefik.docker.network" = proxyNet;
"traefik.http.routers.radarr.rule" = "Host(`radarr.depeuter.dev`)"; "traefik.http.routers.radarr.rule" = "Host(`radarr.depeuter.dev`)";
"traefik.http.services.radarr.loadbalancer.server.port" = toString port; "traefik.http.services.radarr.loadbalancer.server.port" = toString port;
}; };
@ -388,6 +405,7 @@ in {
]; ];
extraOptions = [ extraOptions = [
"--network=${networkName}" "--network=${networkName}"
"--network=${proxyNet}"
]; ];
environment = { environment = {
PUID = toString config.users.users.sonarr.uid; PUID = toString config.users.users.sonarr.uid;
@ -404,6 +422,7 @@ in {
]; ];
labels = { labels = {
"traefik.enable" = "true"; "traefik.enable" = "true";
"traefik.docker.network" = proxyNet;
"traefik.http.routers.sonarr.rule" = "Host(`sonarr.depeuter.dev`)"; "traefik.http.routers.sonarr.rule" = "Host(`sonarr.depeuter.dev`)";
"traefik.http.services.sonarr.loadbalancer.server.port" = toString port; "traefik.http.services.sonarr.loadbalancer.server.port" = toString port;
}; };

View file

@ -0,0 +1,16 @@
$TTL 604800
@ IN SOA ns1.depeuter.dev. admin.depeuter.dev. (
5 ; Serial
604800 ; Refresh
86400 ; Retry
2419200 ; Expire
604800 ) ; Negative Cache TTL
; name servers - NS records
IN NS ns1.depeuter.dev.
; IN NS ns2.depeuter.dev.
ns1.depeuter.dev. IN A 192.168.0.91
;ns1.depeuter.dev. IN A 192.158.0.X
hugo.depeuter.dev. IN A 192.168.0.11

View file

@ -0,0 +1,54 @@
{ config, lib, ... }:
let
cfg = config.homelab.apps.bind9;
in {
options.homelab.apps.bind9.enable = lib.mkEnableOption "ISC BIND 9 (Docker)";
config = lib.mkIf cfg.enable {
homelab.virtualisation.containers.enable = true;
environment.etc = {
"bind/named.conf" = {
source = ./named.conf;
mode = "0555";
};
"bind/named.conf.options" = {
source = ./named.conf.options;
mode = "0555";
};
"bind/named.conf.local" = {
source = ./named.conf.local;
mode = "0555";
};
"bind/zones/db.depeuter.dev" = {
source = ./db.depeuter.dev;
mode = "0555";
};
};
virtualisation.oci-containers.containers.bind9 = {
hostname = "bind9";
#image = "internetsystemsconsortium/bind9:9.20"; # Current stable
image = "ubuntu/bind9"; # Current stable
autoStart = true;
ports = [
"53:53/udp"
"53:53/tcp"
"953:953/tcp"
];
extraOptions = [
];
environment = {
};
volumes = [
"/etc/bind:/etc/bind" # For configuration, your `named.conf` lives here
"bind9-cache:/var/cache/bind"
#"...:/var/lib/bind" # Secondary zones
"bind9-logs:/var/log" # Logfiles
];
labels = {
};
};
};
}

View file

@ -0,0 +1,2 @@
include "/etc/bind/named.conf.options";
include "/etc/bind/named.conf.local";

View file

@ -0,0 +1,4 @@
zone "depeuter.dev" {
type primary;
file "/etc/bind/zones/db.depeuter.dev";
};

View file

@ -0,0 +1,35 @@
http local {
endpoints { "/dns-query"; };
};
acl bogusnets {
};
acl trusted {
192.168.0.0/16;
};
options {
directory "/var/cache/bind";
version "not currently available";
listen-on { any; };
listen-on-v6 { any; };
listen-on tls ephemeral { any; };
listen-on-v6 tls ephemeral { any; };
listen-on tls ephemeral http local { any; };
listen-on-v6 tls ephemeral http local { any; };
recursion yes;
forwarders {
9.9.9.9;
149.112.112.112;
};
forward only;
allow-query { any; };
allow-recursion { any; };
allow-transfer { none; };
blackhole { bogusnets; };
};

View file

@ -6,24 +6,28 @@ let
PUID = toString config.users.users.calibre.uid; PUID = toString config.users.users.calibre.uid;
PGID = toString config.users.groups.media.gid; PGID = toString config.users.groups.media.gid;
books = "/srv/books";
calibre-config = "/srv/calibre-config";
calibre-web-config = "/srv/calibre-web-config";
networkName = "calibre"; networkName = "calibre";
in { in {
options.homelab.apps.calibre = { options.homelab.apps.calibre = {
enable = lib.mkEnableOption "Calibre (Desktop + Web)"; enable = lib.mkEnableOption "Calibre (Desktop + Web)";
desktop = lib.mkEnableOption "Calibre Desktop (KasmVNC)"; desktop.enable = lib.mkEnableOption "Calibre Desktop (KasmVNC)";
web = lib.mkEnableOption "Calibre Web"; web.enable = lib.mkEnableOption "Calibre Web";
}; };
config = lib.mkMerge [ config = lib.mkMerge [
{ {
homelab.apps.calibre = lib.mkIf cfg.enable { homelab.apps.calibre = lib.mkIf cfg.enable {
desktop = true; desktop.enable = true;
web = true; web.enable = true;
}; };
} }
# Common # Common
(lib.mkIf (cfg.desktop || cfg.web) { (lib.mkIf (cfg.desktop.enable || cfg.web.enable) {
homelab = { homelab = {
users.media.enable = true; users.media.enable = true;
virtualisation.containers.enable = true; virtualisation.containers.enable = true;
@ -37,7 +41,7 @@ in {
shell = null; shell = null;
}; };
fileSystems."/srv/books" = { fileSystems."${books}" = {
device = "192.168.0.11:/mnt/SMALL/MEDIA/BOOKS"; device = "192.168.0.11:/mnt/SMALL/MEDIA/BOOKS";
fsType = "nfs"; fsType = "nfs";
options = [ options = [
@ -69,8 +73,8 @@ in {
}) })
# Calibre desktop # Calibre desktop
{ (lib.mkIf cfg.desktop.enable {
fileSystems."/srv/calibre-config" = { fileSystems."${calibre-config}" = {
device = "192.168.0.11:/mnt/SMALL/CONFIG/CALIBRE"; device = "192.168.0.11:/mnt/SMALL/CONFIG/CALIBRE";
fsType = "nfs"; fsType = "nfs";
options = [ options = [
@ -84,13 +88,15 @@ in {
]; ];
}; };
virtualisation.oci-containers.containers.calibre = { virtualisation.oci-containers.containers.calibre = let
innerPort = 8080;
in {
hostname = "calibre"; hostname = "calibre";
image = "lscr.io/linuxserver/calibre:latest"; image = "lscr.io/linuxserver/calibre:8.5.0";
autoStart = true; autoStart = true;
ports = [ ports = [
# Open ports if you don't use Traefik # Open ports if you don't use Traefik
"9480:8080" # Calibre desktop GUI "9480:${toString innerPort}" # Calibre desktop GUI
#"9481:8181" # Calibre desktop GUI HTTPS #"9481:8181" # Calibre desktop GUI HTTPS
#"9581:8081" # Calibre webserver gui #"9581:8081" # Calibre webserver gui
]; ];
@ -110,16 +116,21 @@ in {
#CLI_ARGS = ""; #CLI_ARGS = "";
}; };
volumes = [ volumes = [
"/srv/calibre-config:/config" "${calibre-config}:/config"
"/srv/books:/media/books" "${books}:/media/books"
]; ];
labels = {
"traefik.enable" = "true";
"traefik.http.routers.calibre.rule" = "Host(`calibre.depeuter.dev`)";
"traefik.http.services.calibre.loadbalancer.server.port" = toString innerPort;
};
}; };
} })
# Calibre Web # Calibre Web
{ (lib.mkIf cfg.web.enable {
fileSystems."/srv/calibre-web-config" = { fileSystems."${calibre-web-config}" = {
device = "192.168.0.11:/mnt/SMALL/CONFIG/CALIBRE-WEB"; device = "192.168.0.11:/mnt/SMALL/CONFIG/CALIBRE-WEB";
fsType = "nfs"; fsType = "nfs";
options = [ options = [
@ -133,13 +144,15 @@ in {
]; ];
}; };
virtualisation.oci-containers.containers.calibre-web = { virtualisation.oci-containers.containers.calibre-web = let
innerPort = 8083;
in {
hostname = "calibre-web"; hostname = "calibre-web";
image = "lscr.io/linuxserver/calibre-web:latest"; image = "lscr.io/linuxserver/calibre-web:0.6.24";
autoStart = true; autoStart = true;
ports = [ ports = [
# Open ports if you don't use Traefik # Open ports if you don't use Traefik
"8083:8083" # Web UI "8083:${toString innerPort}" # Web UI
]; ];
extraOptions = [ extraOptions = [
"--network=${networkName}" "--network=${networkName}"
@ -156,11 +169,16 @@ in {
#OAUTHLIB_RELAX_TOKEN_SCOPE = "1"; #OAUTHLIB_RELAX_TOKEN_SCOPE = "1";
}; };
volumes = [ volumes = [
"/srv/calibre-web-config:/config" "${calibre-web-config}:/config"
"/srv/books:/media/books" "${books}:/media/books"
]; ];
labels = {
"traefik.enable" = "true";
"traefik.http.routers.calibre-web.rule" = "Host(`books.depeuter.dev`)";
"traefik.http.services.calibre-web.loadbalancer.server.port" = toString innerPort;
};
}; };
} })
]; ];
} }

View file

@ -1,6 +1,7 @@
{ {
imports = [ imports = [
./arr ./arr
./bind9
./calibre ./calibre
./changedetection ./changedetection
./freshrss ./freshrss

View file

@ -0,0 +1,90 @@
{ config, lib, pkgs, ... }:
let
cfg = config.homelab.apps.traefik;
port = 8080;
in {
options.homelab.apps.traefik = {
enable = lib.mkEnableOption "Traefik Reverse Proxy";
sharedNetworkName = lib.mkOption {
type = lib.types.str;
default = "traefik";
description = "The name of the shared network to connect the container to.";
};
};
config = lib.mkIf cfg.enable {
homelab.virtualisation.containers.enable = true;
# Make sure the Docker network exists.
systemd.services."docker-${cfg.sharedNetworkName}-create-network" = {
description = "Create Docker network for ${cfg.sharedNetworkName}";
requiredBy = [
"docker-traefik.service"
];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
if ! ${pkgs.docker}/bin/docker network ls | grep -q ${cfg.sharedNetworkName}; then
${pkgs.docker}/bin/docker network create ${cfg.sharedNetworkName}
fi
'';
};
virtualisation.oci-containers.containers.traefik = {
hostname = "traefik";
image = "traefik:v3.4.3";
autoStart = true;
ports = [
"80:80/tcp"
"443:443/tcp"
"${toString port}:${toString port}/tcp" # Web UI (enabled by --api.insecure=true)
];
extraOptions = [
"--network=${cfg.sharedNetworkName}"
];
environmentFiles = [
/home/admin/.cloudflare.secret
];
cmd = [
"--api.insecure=true"
# Add Docker provider
"--providers.docker=true"
"--providers.docker.exposedByDefault=false"
# Add web entrypoint
"--entrypoints.web.address=:80/tcp"
"--entrypoints.web.http.redirections.entrypoint.to=websecure"
"--entrypoints.web.http.redirections.entrypoint.scheme=https"
# Add websecure entrypoint
"--entrypoints.websecure.address=:443/tcp"
"--entrypoints.websecure.http.tls=true"
"--entrypoints.websecure.http.tls.certResolver=letsencrypt"
"--entrypoints.websecure.http.tls.domains[0].main=depeuter.dev"
"--entrypoints.websecure.http.tls.domains[0].sans=*.depeuter.dev"
"--entrypoints.websecure.http.tls.domains[1].sans=*.${config.networking.hostName}.depeuter.dev"
# Certificates
"--certificatesresolvers.letsencrypt.acme.dnschallenge=true"
"--certificatesresolvers.letsencrypt.acme.dnschallenge.provider=cloudflare"
"--certificatesresolvers.letsencrypt.acme.email=tibo.depeuter@telenet.be"
"--certificatesresolvers.letsencrypt.acme.storage=/letsencrypt/acme.json"
];
volumes = [
"letsencryp:/letsencrypt"
"/var/run/docker.sock:/var/run/docker.sock:ro"
];
labels = {
"traefik.enable" = "true";
"traefik.http.routers.traefik.rule" = "Host(`traefik.${config.networking.hostName}.depeuter.dev`)";
"traefik.http.services.traefik.loadbalancer.server.port" = toString port;
};
};
};
}

View file

@ -54,7 +54,7 @@ in {
dbHostname = "vaultwarden-db"; dbHostname = "vaultwarden-db";
dbPort = 5432; dbPort = 5432;
in { in {
vaultwarden-db = { vaultwardenDb = {
hostname = dbHostname; hostname = dbHostname;
image = "postgres:15.8-alpine"; image = "postgres:15.8-alpine";
autoStart = true; autoStart = true;
@ -77,7 +77,7 @@ in {
dataDir = "/data"; dataDir = "/data";
in { in {
hostname = "vaultwarden"; hostname = "vaultwarden";
image = "vaultwarden/server:1.33.2-alpine"; image = "vaultwarden/server:1.34.3-alpine";
autoStart = true; autoStart = true;
ports = [ ports = [
"${toString cfg.port}:80/tcp" "${toString cfg.port}:80/tcp"
@ -86,7 +86,7 @@ in {
"--network=${networkName}" "--network=${networkName}"
]; ];
dependsOn = [ dependsOn = [
dbHostname "vaultwardenDb"
]; ];
volumes = [ volumes = [
"vaultwarden:${dataDir}" "vaultwarden:${dataDir}"