chore: Restructure stack folder

This commit is contained in:
Tera << 8 2025-05-18 22:11:55 -04:00
parent 638d79477e
commit 91c8ffb787
Signed by: imterah
GPG key ID: 8FA7DD57BA6CEA37
14 changed files with 12 additions and 12 deletions

View file

@ -0,0 +1,221 @@
# Auto-generated using compose2nix v0.3.1.
{ config, pkgs, lib, ... }:
{
imports = [
../../../../system/sops.nix
];
# Containers
virtualisation.oci-containers.containers."immich_machine_learning" = {
image = "ghcr.io/immich-app/immich-machine-learning:release";
volumes = [
"immich_model-cache:/cache:rw"
];
log-driver = "journald";
extraOptions = [
"--network-alias=immich-machine-learning"
"--network=immich_default"
];
};
systemd.services."docker-immich_machine_learning" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-immich_default.service"
"docker-volume-immich_model-cache.service"
];
requires = [
"docker-network-immich_default.service"
"docker-volume-immich_model-cache.service"
];
partOf = [
"docker-compose-immich-root.target"
];
wantedBy = [
"docker-compose-immich-root.target"
];
};
virtualisation.oci-containers.containers."immich_postgres" = {
image = "docker.io/tensorchord/pgvecto-rs:pg14-v0.2.0@sha256:739cdd626151ff1f796dc95a6591b55a714f341c737e27f045019ceabf8e8c52";
environmentFiles = [ config.sops.secrets.immich_db_docker_env.path ];
environment = {
"POSTGRES_DB" = "immich";
"POSTGRES_INITDB_ARGS" = "--data-checksums";
"POSTGRES_USER" = "postgres";
};
volumes = [
"immich_db:/var/lib/postgresql/data:rw"
];
cmd = [ "postgres" "-c" "shared_preload_libraries=vectors.so" "-c" "search_path=\"$user\", public, vectors" "-c" "logging_collector=on" "-c" "max_wal_size=2GB" "-c" "shared_buffers=512MB" "-c" "wal_compression=on" ];
log-driver = "journald";
extraOptions = [
"--health-cmd=pg_isready --dbname=\"immich\" --username=\"postgres\" || exit 1; Chksum=\"$(psql --dbname=\"immich\" --username=\"postgress\" --tuples-only --no-align --command='SELECT COALESCE(SUM(checksum_failures), 0) FROM pg_stat_database')\"; echo \"checksum failure count is $Chksum\"; [ \"$Chksum\" = '0' ] || exit 1"
"--health-interval=5m0s"
"--health-start-interval=30s"
"--health-start-period=5m0s"
"--network-alias=database"
"--network=immich_default"
];
};
systemd.services."docker-immich_postgres" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-immich_default.service"
"docker-volume-immich_db.service"
];
requires = [
"docker-network-immich_default.service"
"docker-volume-immich_db.service"
];
partOf = [
"docker-compose-immich-root.target"
];
wantedBy = [
"docker-compose-immich-root.target"
];
};
virtualisation.oci-containers.containers."immich_redis" = {
image = "docker.io/valkey/valkey:8-bookworm@sha256:42cba146593a5ea9a622002c1b7cba5da7be248650cbb64ecb9c6c33d29794b1";
log-driver = "journald";
extraOptions = [
"--health-cmd=redis-cli ping || exit 1"
"--network-alias=redis"
"--network=immich_default"
];
};
systemd.services."docker-immich_redis" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-immich_default.service"
];
requires = [
"docker-network-immich_default.service"
];
partOf = [
"docker-compose-immich-root.target"
];
wantedBy = [
"docker-compose-immich-root.target"
];
};
virtualisation.oci-containers.containers."immich_server" = {
image = "ghcr.io/immich-app/immich-server:release";
environmentFiles = [ config.sops.secrets.immich_immich_docker_env.path ];
environment = {
"TZ" = "America/Indiana/Indianapolis";
"DB_DATABASE_NAME" = "immich";
"DB_USERNAME" = "postgres";
};
volumes = [
"/etc/localtime:/etc/localtime:ro"
"/mnt/NASBox/immich/uploads:/usr/src/app/upload:rw"
];
labels = {
"traefik.http.routers.immichhoferscloud.rule" = "Host(`immich.hofers.cloud`)";
"traefik.http.services.immichhoferscloud.loadbalancer.server.port" = "2283";
};
dependsOn = [
"immich_postgres"
"immich_redis"
];
log-driver = "journald";
extraOptions = [
"--network-alias=immich-server"
"--network=immich_default"
];
};
systemd.services."docker-immich_server" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-immich_default.service"
];
requires = [
"docker-network-immich_default.service"
];
partOf = [
"docker-compose-immich-root.target"
];
wantedBy = [
"docker-compose-immich-root.target"
];
};
# Networks
systemd.services."docker-network-immich_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f immich_default";
};
script = ''
docker network inspect immich_default || docker network create immich_default
'';
partOf = [ "docker-compose-immich-root.target" ];
wantedBy = [ "docker-compose-immich-root.target" ];
};
# Volumes
systemd.services."docker-volume-immich_db" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect immich_db || docker volume create immich_db
'';
partOf = [ "docker-compose-immich-root.target" ];
wantedBy = [ "docker-compose-immich-root.target" ];
};
systemd.services."docker-volume-immich_model-cache" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect immich_model-cache || docker volume create immich_model-cache
'';
partOf = [ "docker-compose-immich-root.target" ];
wantedBy = [ "docker-compose-immich-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-immich-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}

View file

@ -0,0 +1,167 @@
# Auto-generated using compose2nix v0.3.1.
{ config, pkgs, lib, ... }:
{
imports = [
../../../../system/sops.nix
];
# Containers
virtualisation.oci-containers.containers."passbolt-db" = {
image = "mariadb:10.11";
environmentFiles = [ config.sops.secrets.passbolt_db_docker_env.path ];
environment = {
"MYSQL_DATABASE" = "passbolt";
"MYSQL_RANDOM_ROOT_PASSWORD" = "true";
"MYSQL_USER" = "passbolt";
};
volumes = [
"passbolt_db:/var/lib/mysql:rw"
];
log-driver = "journald";
extraOptions = [
"--network-alias=db"
"--network=passbolt_default"
];
};
systemd.services."docker-passbolt-db" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-passbolt_default.service"
"docker-volume-passbolt_db.service"
];
requires = [
"docker-network-passbolt_default.service"
"docker-volume-passbolt_db.service"
];
partOf = [
"docker-compose-passbolt-root.target"
];
wantedBy = [
"docker-compose-passbolt-root.target"
];
};
virtualisation.oci-containers.containers."passbolt-passbolt" = {
image = "passbolt/passbolt:latest-ce";
environmentFiles = [ config.sops.secrets.passbolt_passbolt_docker_env.path ];
environment = {
"APP_FULL_BASE_URL" = "https://passbolt.hofers.cloud";
"DATASOURCES_DEFAULT_DATABASE" = "passbolt";
"DATASOURCES_DEFAULT_HOST" = "db";
"DATASOURCES_DEFAULT_USERNAME" = "passbolt";
};
volumes = [
"passbolt_gpg:/etc/passbolt/gpg:rw"
"passbolt_jwt:/etc/passbolt/jwt:rw"
];
labels = {
"traefik.http.routers.passbolthoferscloud.rule" = "Host(`passbolt.hofers.cloud`)";
};
cmd = [ "/usr/bin/wait-for.sh" "-t" "0" "db:3306" "--" "/docker-entrypoint.sh" ];
dependsOn = [
"passbolt-db"
];
log-driver = "journald";
extraOptions = [
"--network-alias=passbolt"
"--network=passbolt_default"
];
};
systemd.services."docker-passbolt-passbolt" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-passbolt_default.service"
"docker-volume-passbolt_gpg.service"
"docker-volume-passbolt_jwt.service"
];
requires = [
"docker-network-passbolt_default.service"
"docker-volume-passbolt_gpg.service"
"docker-volume-passbolt_jwt.service"
];
partOf = [
"docker-compose-passbolt-root.target"
];
wantedBy = [
"docker-compose-passbolt-root.target"
];
};
# Networks
systemd.services."docker-network-passbolt_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f passbolt_default";
};
script = ''
docker network inspect passbolt_default || docker network create passbolt_default
'';
partOf = [ "docker-compose-passbolt-root.target" ];
wantedBy = [ "docker-compose-passbolt-root.target" ];
};
# Volumes
systemd.services."docker-volume-passbolt_db" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect passbolt_db || docker volume create passbolt_db
'';
partOf = [ "docker-compose-passbolt-root.target" ];
wantedBy = [ "docker-compose-passbolt-root.target" ];
};
systemd.services."docker-volume-passbolt_gpg" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect passbolt_gpg || docker volume create passbolt_gpg
'';
partOf = [ "docker-compose-passbolt-root.target" ];
wantedBy = [ "docker-compose-passbolt-root.target" ];
};
systemd.services."docker-volume-passbolt_jwt" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect passbolt_jwt || docker volume create passbolt_jwt
'';
partOf = [ "docker-compose-passbolt-root.target" ];
wantedBy = [ "docker-compose-passbolt-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-passbolt-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}

View file

@ -0,0 +1,84 @@
# Auto-generated using compose2nix v0.3.1.
{ pkgs, lib, ... }:
{
# Containers
virtualisation.oci-containers.containers."portainer-portainer" = {
image = "portainer/portainer-ce:lts";
volumes = [
"/var/run/docker.sock:/var/run/docker.sock:rw"
"portainer_portainer:/data:rw"
];
labels = {
"traefik.http.routers.portainerhoferscloud.rule" = "Host(`portainer.hofers.cloud`)";
"traefik.http.services.portainerhoferscloud.loadbalancer.server.port" = "9000";
};
log-driver = "journald";
extraOptions = [
"--network-alias=portainer"
"--network=portainer_default"
];
};
systemd.services."docker-portainer-portainer" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-portainer_default.service"
"docker-volume-portainer_portainer.service"
];
requires = [
"docker-network-portainer_default.service"
"docker-volume-portainer_portainer.service"
];
partOf = [
"docker-compose-portainer-root.target"
];
wantedBy = [
"docker-compose-portainer-root.target"
];
};
# Networks
systemd.services."docker-network-portainer_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f portainer_default";
};
script = ''
docker network inspect portainer_default || docker network create portainer_default
'';
partOf = [ "docker-compose-portainer-root.target" ];
wantedBy = [ "docker-compose-portainer-root.target" ];
};
# Volumes
systemd.services."docker-volume-portainer_portainer" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect portainer_portainer || docker volume create portainer_portainer
'';
partOf = [ "docker-compose-portainer-root.target" ];
wantedBy = [ "docker-compose-portainer-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-portainer-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}

View file

@ -0,0 +1,206 @@
# Auto-generated using compose2nix v0.3.1.
{ config, pkgs, lib, ... }:
{
imports = [
../../../../system/sops.nix
];
# Containers
virtualisation.oci-containers.containers."pterodactyl-cache" = {
image = "redis:alpine";
log-driver = "journald";
extraOptions = [
"--network-alias=cache"
"--network=pterodactyl_default"
];
};
systemd.services."docker-pterodactyl-cache" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-pterodactyl_default.service"
];
requires = [
"docker-network-pterodactyl_default.service"
];
partOf = [
"docker-compose-pterodactyl-root.target"
];
wantedBy = [
"docker-compose-pterodactyl-root.target"
];
};
virtualisation.oci-containers.containers."pterodactyl-database" = {
image = "mariadb:10.11";
environmentFiles = [ config.sops.secrets.pterodactyl_db_docker_env.path ];
environment = {
"MYSQL_DATABASE" = "panel";
"MYSQL_RANDOM_ROOT_PASSWORD" = "true";
"MYSQL_USER" = "pterodactyl";
};
volumes = [
"pterodactyl_db:/var/lib/mysql:rw"
];
cmd = [ "--default-authentication-plugin=mysql_native_password" ];
log-driver = "journald";
extraOptions = [
"--network-alias=database"
"--network=pterodactyl_default"
];
};
systemd.services."docker-pterodactyl-database" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-pterodactyl_default.service"
"docker-volume-pterodactyl_db.service"
];
requires = [
"docker-network-pterodactyl_default.service"
"docker-volume-pterodactyl_db.service"
];
partOf = [
"docker-compose-pterodactyl-root.target"
];
wantedBy = [
"docker-compose-pterodactyl-root.target"
];
};
virtualisation.oci-containers.containers."pterodactyl-panel" = {
image = "ghcr.io/pterodactyl/panel:latest";
environmentFiles = [ config.sops.secrets.pterodactyl_pterodactyl_docker_env.path ];
environment = {
"APP_ENV" = "production";
"APP_ENVIRONMENT_ONLY" = "false";
"APP_SERVICE_AUTHOR" = "noreply@hofers.cloud";
"APP_TIMEZONE" = "America/Indiana/Indianapolis";
"APP_URL" = "https://pterodactyl.hofers.cloud";
"CACHE_DRIVER" = "redis";
"DB_HOST" = "database";
"DB_PORT" = "3306";
"QUEUE_DRIVER" = "redis";
"REDIS_HOST" = "cache";
"SESSION_DRIVER" = "redis";
"TRUSTED_PROXIES" = "*";
};
volumes = [
"pterodactyl_ptero_logs:/app/storage/logs:rw"
"pterodactyl_ptero_var:/app/var:rw"
];
labels = {
"traefik.http.routers.pterodactylhoferscloud.rule" = "Host(`pterodactyl.hofers.cloud`)";
};
dependsOn = [
"pterodactyl-cache"
"pterodactyl-database"
];
log-driver = "journald";
extraOptions = [
"--network-alias=panel"
"--network=pterodactyl_default"
];
};
systemd.services."docker-pterodactyl-panel" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-pterodactyl_default.service"
"docker-volume-pterodactyl_ptero_logs.service"
"docker-volume-pterodactyl_ptero_var.service"
];
requires = [
"docker-network-pterodactyl_default.service"
"docker-volume-pterodactyl_ptero_logs.service"
"docker-volume-pterodactyl_ptero_var.service"
];
partOf = [
"docker-compose-pterodactyl-root.target"
];
wantedBy = [
"docker-compose-pterodactyl-root.target"
];
};
# Networks
systemd.services."docker-network-pterodactyl_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f pterodactyl_default";
};
script = ''
docker network inspect pterodactyl_default || docker network create pterodactyl_default
'';
partOf = [ "docker-compose-pterodactyl-root.target" ];
wantedBy = [ "docker-compose-pterodactyl-root.target" ];
};
# Volumes
systemd.services."docker-volume-pterodactyl_db" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect pterodactyl_db || docker volume create pterodactyl_db
'';
partOf = [ "docker-compose-pterodactyl-root.target" ];
wantedBy = [ "docker-compose-pterodactyl-root.target" ];
};
systemd.services."docker-volume-pterodactyl_ptero_logs" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect pterodactyl_ptero_logs || docker volume create pterodactyl_ptero_logs
'';
partOf = [ "docker-compose-pterodactyl-root.target" ];
wantedBy = [ "docker-compose-pterodactyl-root.target" ];
};
systemd.services."docker-volume-pterodactyl_ptero_var" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect pterodactyl_ptero_var || docker volume create pterodactyl_ptero_var
'';
partOf = [ "docker-compose-pterodactyl-root.target" ];
wantedBy = [ "docker-compose-pterodactyl-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-pterodactyl-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}