chore: Restructure stack folder
This commit is contained in:
parent
638d79477e
commit
91c8ffb787
14 changed files with 12 additions and 12 deletions
|
@ -0,0 +1,221 @@
|
|||
# Auto-generated using compose2nix v0.3.1.
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
../../../../system/sops.nix
|
||||
];
|
||||
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."immich_machine_learning" = {
|
||||
image = "ghcr.io/immich-app/immich-machine-learning:release";
|
||||
volumes = [
|
||||
"immich_model-cache:/cache:rw"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=immich-machine-learning"
|
||||
"--network=immich_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-immich_machine_learning" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-immich_default.service"
|
||||
"docker-volume-immich_model-cache.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-immich_default.service"
|
||||
"docker-volume-immich_model-cache.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-immich-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-immich-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."immich_postgres" = {
|
||||
image = "docker.io/tensorchord/pgvecto-rs:pg14-v0.2.0@sha256:739cdd626151ff1f796dc95a6591b55a714f341c737e27f045019ceabf8e8c52";
|
||||
environmentFiles = [ config.sops.secrets.immich_db_docker_env.path ];
|
||||
environment = {
|
||||
"POSTGRES_DB" = "immich";
|
||||
"POSTGRES_INITDB_ARGS" = "--data-checksums";
|
||||
"POSTGRES_USER" = "postgres";
|
||||
};
|
||||
volumes = [
|
||||
"immich_db:/var/lib/postgresql/data:rw"
|
||||
];
|
||||
cmd = [ "postgres" "-c" "shared_preload_libraries=vectors.so" "-c" "search_path=\"$user\", public, vectors" "-c" "logging_collector=on" "-c" "max_wal_size=2GB" "-c" "shared_buffers=512MB" "-c" "wal_compression=on" ];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--health-cmd=pg_isready --dbname=\"immich\" --username=\"postgres\" || exit 1; Chksum=\"$(psql --dbname=\"immich\" --username=\"postgress\" --tuples-only --no-align --command='SELECT COALESCE(SUM(checksum_failures), 0) FROM pg_stat_database')\"; echo \"checksum failure count is $Chksum\"; [ \"$Chksum\" = '0' ] || exit 1"
|
||||
"--health-interval=5m0s"
|
||||
"--health-start-interval=30s"
|
||||
"--health-start-period=5m0s"
|
||||
"--network-alias=database"
|
||||
"--network=immich_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-immich_postgres" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-immich_default.service"
|
||||
"docker-volume-immich_db.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-immich_default.service"
|
||||
"docker-volume-immich_db.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-immich-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-immich-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."immich_redis" = {
|
||||
image = "docker.io/valkey/valkey:8-bookworm@sha256:42cba146593a5ea9a622002c1b7cba5da7be248650cbb64ecb9c6c33d29794b1";
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--health-cmd=redis-cli ping || exit 1"
|
||||
"--network-alias=redis"
|
||||
"--network=immich_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-immich_redis" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-immich_default.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-immich_default.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-immich-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-immich-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."immich_server" = {
|
||||
image = "ghcr.io/immich-app/immich-server:release";
|
||||
environmentFiles = [ config.sops.secrets.immich_immich_docker_env.path ];
|
||||
environment = {
|
||||
"TZ" = "America/Indiana/Indianapolis";
|
||||
"DB_DATABASE_NAME" = "immich";
|
||||
"DB_USERNAME" = "postgres";
|
||||
};
|
||||
volumes = [
|
||||
"/etc/localtime:/etc/localtime:ro"
|
||||
"/mnt/NASBox/immich/uploads:/usr/src/app/upload:rw"
|
||||
];
|
||||
labels = {
|
||||
"traefik.http.routers.immichhoferscloud.rule" = "Host(`immich.hofers.cloud`)";
|
||||
"traefik.http.services.immichhoferscloud.loadbalancer.server.port" = "2283";
|
||||
};
|
||||
dependsOn = [
|
||||
"immich_postgres"
|
||||
"immich_redis"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=immich-server"
|
||||
"--network=immich_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-immich_server" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-immich_default.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-immich_default.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-immich-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-immich-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."docker-network-immich_default" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "docker network rm -f immich_default";
|
||||
};
|
||||
script = ''
|
||||
docker network inspect immich_default || docker network create immich_default
|
||||
'';
|
||||
partOf = [ "docker-compose-immich-root.target" ];
|
||||
wantedBy = [ "docker-compose-immich-root.target" ];
|
||||
};
|
||||
|
||||
# Volumes
|
||||
systemd.services."docker-volume-immich_db" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect immich_db || docker volume create immich_db
|
||||
'';
|
||||
partOf = [ "docker-compose-immich-root.target" ];
|
||||
wantedBy = [ "docker-compose-immich-root.target" ];
|
||||
};
|
||||
|
||||
systemd.services."docker-volume-immich_model-cache" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect immich_model-cache || docker volume create immich_model-cache
|
||||
'';
|
||||
partOf = [ "docker-compose-immich-root.target" ];
|
||||
wantedBy = [ "docker-compose-immich-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."docker-compose-immich-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
|
@ -0,0 +1,167 @@
|
|||
# Auto-generated using compose2nix v0.3.1.
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
../../../../system/sops.nix
|
||||
];
|
||||
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."passbolt-db" = {
|
||||
image = "mariadb:10.11";
|
||||
environmentFiles = [ config.sops.secrets.passbolt_db_docker_env.path ];
|
||||
environment = {
|
||||
"MYSQL_DATABASE" = "passbolt";
|
||||
"MYSQL_RANDOM_ROOT_PASSWORD" = "true";
|
||||
"MYSQL_USER" = "passbolt";
|
||||
};
|
||||
volumes = [
|
||||
"passbolt_db:/var/lib/mysql:rw"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=db"
|
||||
"--network=passbolt_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-passbolt-db" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-passbolt_default.service"
|
||||
"docker-volume-passbolt_db.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-passbolt_default.service"
|
||||
"docker-volume-passbolt_db.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-passbolt-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-passbolt-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."passbolt-passbolt" = {
|
||||
image = "passbolt/passbolt:latest-ce";
|
||||
environmentFiles = [ config.sops.secrets.passbolt_passbolt_docker_env.path ];
|
||||
environment = {
|
||||
"APP_FULL_BASE_URL" = "https://passbolt.hofers.cloud";
|
||||
"DATASOURCES_DEFAULT_DATABASE" = "passbolt";
|
||||
"DATASOURCES_DEFAULT_HOST" = "db";
|
||||
"DATASOURCES_DEFAULT_USERNAME" = "passbolt";
|
||||
};
|
||||
volumes = [
|
||||
"passbolt_gpg:/etc/passbolt/gpg:rw"
|
||||
"passbolt_jwt:/etc/passbolt/jwt:rw"
|
||||
];
|
||||
labels = {
|
||||
"traefik.http.routers.passbolthoferscloud.rule" = "Host(`passbolt.hofers.cloud`)";
|
||||
};
|
||||
cmd = [ "/usr/bin/wait-for.sh" "-t" "0" "db:3306" "--" "/docker-entrypoint.sh" ];
|
||||
dependsOn = [
|
||||
"passbolt-db"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=passbolt"
|
||||
"--network=passbolt_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-passbolt-passbolt" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-passbolt_default.service"
|
||||
"docker-volume-passbolt_gpg.service"
|
||||
"docker-volume-passbolt_jwt.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-passbolt_default.service"
|
||||
"docker-volume-passbolt_gpg.service"
|
||||
"docker-volume-passbolt_jwt.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-passbolt-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-passbolt-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."docker-network-passbolt_default" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "docker network rm -f passbolt_default";
|
||||
};
|
||||
script = ''
|
||||
docker network inspect passbolt_default || docker network create passbolt_default
|
||||
'';
|
||||
partOf = [ "docker-compose-passbolt-root.target" ];
|
||||
wantedBy = [ "docker-compose-passbolt-root.target" ];
|
||||
};
|
||||
|
||||
# Volumes
|
||||
systemd.services."docker-volume-passbolt_db" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect passbolt_db || docker volume create passbolt_db
|
||||
'';
|
||||
partOf = [ "docker-compose-passbolt-root.target" ];
|
||||
wantedBy = [ "docker-compose-passbolt-root.target" ];
|
||||
};
|
||||
|
||||
systemd.services."docker-volume-passbolt_gpg" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect passbolt_gpg || docker volume create passbolt_gpg
|
||||
'';
|
||||
partOf = [ "docker-compose-passbolt-root.target" ];
|
||||
wantedBy = [ "docker-compose-passbolt-root.target" ];
|
||||
};
|
||||
|
||||
systemd.services."docker-volume-passbolt_jwt" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect passbolt_jwt || docker volume create passbolt_jwt
|
||||
'';
|
||||
partOf = [ "docker-compose-passbolt-root.target" ];
|
||||
wantedBy = [ "docker-compose-passbolt-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."docker-compose-passbolt-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
|
@ -0,0 +1,84 @@
|
|||
# Auto-generated using compose2nix v0.3.1.
|
||||
{ pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."portainer-portainer" = {
|
||||
image = "portainer/portainer-ce:lts";
|
||||
volumes = [
|
||||
"/var/run/docker.sock:/var/run/docker.sock:rw"
|
||||
"portainer_portainer:/data:rw"
|
||||
];
|
||||
labels = {
|
||||
"traefik.http.routers.portainerhoferscloud.rule" = "Host(`portainer.hofers.cloud`)";
|
||||
"traefik.http.services.portainerhoferscloud.loadbalancer.server.port" = "9000";
|
||||
};
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=portainer"
|
||||
"--network=portainer_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-portainer-portainer" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-portainer_default.service"
|
||||
"docker-volume-portainer_portainer.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-portainer_default.service"
|
||||
"docker-volume-portainer_portainer.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-portainer-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-portainer-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."docker-network-portainer_default" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "docker network rm -f portainer_default";
|
||||
};
|
||||
script = ''
|
||||
docker network inspect portainer_default || docker network create portainer_default
|
||||
'';
|
||||
partOf = [ "docker-compose-portainer-root.target" ];
|
||||
wantedBy = [ "docker-compose-portainer-root.target" ];
|
||||
};
|
||||
|
||||
# Volumes
|
||||
systemd.services."docker-volume-portainer_portainer" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect portainer_portainer || docker volume create portainer_portainer
|
||||
'';
|
||||
partOf = [ "docker-compose-portainer-root.target" ];
|
||||
wantedBy = [ "docker-compose-portainer-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."docker-compose-portainer-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
|
@ -0,0 +1,206 @@
|
|||
# Auto-generated using compose2nix v0.3.1.
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
../../../../system/sops.nix
|
||||
];
|
||||
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."pterodactyl-cache" = {
|
||||
image = "redis:alpine";
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=cache"
|
||||
"--network=pterodactyl_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-pterodactyl-cache" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-pterodactyl_default.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-pterodactyl_default.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-pterodactyl-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-pterodactyl-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."pterodactyl-database" = {
|
||||
image = "mariadb:10.11";
|
||||
environmentFiles = [ config.sops.secrets.pterodactyl_db_docker_env.path ];
|
||||
environment = {
|
||||
"MYSQL_DATABASE" = "panel";
|
||||
"MYSQL_RANDOM_ROOT_PASSWORD" = "true";
|
||||
"MYSQL_USER" = "pterodactyl";
|
||||
};
|
||||
volumes = [
|
||||
"pterodactyl_db:/var/lib/mysql:rw"
|
||||
];
|
||||
cmd = [ "--default-authentication-plugin=mysql_native_password" ];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=database"
|
||||
"--network=pterodactyl_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-pterodactyl-database" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-pterodactyl_default.service"
|
||||
"docker-volume-pterodactyl_db.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-pterodactyl_default.service"
|
||||
"docker-volume-pterodactyl_db.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-pterodactyl-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-pterodactyl-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."pterodactyl-panel" = {
|
||||
image = "ghcr.io/pterodactyl/panel:latest";
|
||||
environmentFiles = [ config.sops.secrets.pterodactyl_pterodactyl_docker_env.path ];
|
||||
environment = {
|
||||
"APP_ENV" = "production";
|
||||
"APP_ENVIRONMENT_ONLY" = "false";
|
||||
"APP_SERVICE_AUTHOR" = "noreply@hofers.cloud";
|
||||
"APP_TIMEZONE" = "America/Indiana/Indianapolis";
|
||||
"APP_URL" = "https://pterodactyl.hofers.cloud";
|
||||
"CACHE_DRIVER" = "redis";
|
||||
"DB_HOST" = "database";
|
||||
"DB_PORT" = "3306";
|
||||
"QUEUE_DRIVER" = "redis";
|
||||
"REDIS_HOST" = "cache";
|
||||
"SESSION_DRIVER" = "redis";
|
||||
"TRUSTED_PROXIES" = "*";
|
||||
};
|
||||
volumes = [
|
||||
"pterodactyl_ptero_logs:/app/storage/logs:rw"
|
||||
"pterodactyl_ptero_var:/app/var:rw"
|
||||
];
|
||||
labels = {
|
||||
"traefik.http.routers.pterodactylhoferscloud.rule" = "Host(`pterodactyl.hofers.cloud`)";
|
||||
};
|
||||
dependsOn = [
|
||||
"pterodactyl-cache"
|
||||
"pterodactyl-database"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=panel"
|
||||
"--network=pterodactyl_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-pterodactyl-panel" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-pterodactyl_default.service"
|
||||
"docker-volume-pterodactyl_ptero_logs.service"
|
||||
"docker-volume-pterodactyl_ptero_var.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-pterodactyl_default.service"
|
||||
"docker-volume-pterodactyl_ptero_logs.service"
|
||||
"docker-volume-pterodactyl_ptero_var.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-pterodactyl-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-pterodactyl-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."docker-network-pterodactyl_default" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "docker network rm -f pterodactyl_default";
|
||||
};
|
||||
script = ''
|
||||
docker network inspect pterodactyl_default || docker network create pterodactyl_default
|
||||
'';
|
||||
partOf = [ "docker-compose-pterodactyl-root.target" ];
|
||||
wantedBy = [ "docker-compose-pterodactyl-root.target" ];
|
||||
};
|
||||
|
||||
# Volumes
|
||||
systemd.services."docker-volume-pterodactyl_db" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect pterodactyl_db || docker volume create pterodactyl_db
|
||||
'';
|
||||
partOf = [ "docker-compose-pterodactyl-root.target" ];
|
||||
wantedBy = [ "docker-compose-pterodactyl-root.target" ];
|
||||
};
|
||||
|
||||
systemd.services."docker-volume-pterodactyl_ptero_logs" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect pterodactyl_ptero_logs || docker volume create pterodactyl_ptero_logs
|
||||
'';
|
||||
partOf = [ "docker-compose-pterodactyl-root.target" ];
|
||||
wantedBy = [ "docker-compose-pterodactyl-root.target" ];
|
||||
};
|
||||
|
||||
systemd.services."docker-volume-pterodactyl_ptero_var" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect pterodactyl_ptero_var || docker volume create pterodactyl_ptero_var
|
||||
'';
|
||||
partOf = [ "docker-compose-pterodactyl-root.target" ];
|
||||
wantedBy = [ "docker-compose-pterodactyl-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."docker-compose-pterodactyl-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue