chore: Restructure stack folder

This commit is contained in:
Tera << 8 2025-05-18 22:11:55 -04:00
parent 638d79477e
commit 91c8ffb787
Signed by: imterah
GPG key ID: 8FA7DD57BA6CEA37
14 changed files with 12 additions and 12 deletions

View file

@ -0,0 +1,216 @@
# Auto-generated using compose2nix v0.3.1.
{ config, pkgs, lib, ... }:
{
imports = [
../../../../system/sops.nix
];
# Containers
virtualisation.oci-containers.containers."forgejo-db" = {
image = "postgres:17.4";
environmentFiles = [ config.sops.secrets.forgejo_db_docker_env.path ];
environment = {
"POSTGRES_DB" = "forgejo";
"POSTGRES_USER" = "forgejo";
};
volumes = [
"forgejo_db:/var/lib/postgresql/data:rw"
];
log-driver = "journald";
extraOptions = [
"--network-alias=db"
"--network=forgejo_default"
];
};
systemd.services."docker-forgejo-db" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-forgejo_default.service"
"docker-volume-forgejo_db.service"
];
requires = [
"docker-network-forgejo_default.service"
"docker-volume-forgejo_db.service"
];
partOf = [
"docker-compose-forgejo-root.target"
];
wantedBy = [
"docker-compose-forgejo-root.target"
];
};
virtualisation.oci-containers.containers."forgejo-redis" = {
image = "redis:8.0.0";
volumes = [
"forgejo_redis:/data:rw"
];
log-driver = "journald";
extraOptions = [
"--network-alias=redis"
"--network=forgejo_default"
];
};
systemd.services."docker-forgejo-redis" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-forgejo_default.service"
"docker-volume-forgejo_redis.service"
];
requires = [
"docker-network-forgejo_default.service"
"docker-volume-forgejo_redis.service"
];
partOf = [
"docker-compose-forgejo-root.target"
];
wantedBy = [
"docker-compose-forgejo-root.target"
];
};
virtualisation.oci-containers.containers."forgejo-server" = {
image = "codeberg.org/forgejo/forgejo:11";
environmentFiles = [ config.sops.secrets.forgejo_server_docker_env.path ];
environment = {
"FORGEJO__cache__ADAPTER" = "redis";
"FORGEJO__cache__ENABLED" = "true";
"FORGEJO__cache__HOST" = "redis://redis:6379/0?pool_size=100&idle_timeout=180s";
"FORGEJO__database__DB_TYPE" = "postgres";
"FORGEJO__database__HOST" = "db:5432";
"FORGEJO__database__NAME" = "forgejo";
"FORGEJO__database__USER" = "forgejo";
"FORGEJO__service__REGISTER_EMAIL_CONFIRM" = "false";
"FORGEJO__service__REQUIRE_CAPTCHA_FOR_LOGIN" = "true";
"FORGEJO__service__MCAPTCHA_URL" = "https://mcaptcha.terah.dev";
"FORGEJO__service__CAPTCHA_TYPE" = "mcaptcha";
"FORGEJO__service__ENABLE_CAPTCHA" = "false";
"FORGEJO__service__REGISTER_MANUAL_CONFIRM" = "true";
"FORGEJO__service__REQUIRE_EXTERNAL_REGISTRATION_CAPTCHA" = "true";
"USER_GID" = "1000";
"USER_UID" = "1000";
};
volumes = [
"/etc/localtime:/etc/localtime:ro"
"/etc/timezone:/etc/timezone:ro"
"forgejo_forgejo:/data:rw"
];
ports = [
"222:22/tcp"
];
labels = {
"traefik.http.routers.gitterahdev.rule" = "Host(`git.terah.dev`)";
"traefik.http.services.gitterahdev.loadbalancer.server.port" = "3000";
};
dependsOn = [
"forgejo-db"
"forgejo-redis"
];
log-driver = "journald";
extraOptions = [
"--network-alias=server"
"--network=forgejo_default"
];
};
systemd.services."docker-forgejo-server" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-forgejo_default.service"
"docker-volume-forgejo_forgejo.service"
];
requires = [
"docker-network-forgejo_default.service"
"docker-volume-forgejo_forgejo.service"
];
partOf = [
"docker-compose-forgejo-root.target"
];
wantedBy = [
"docker-compose-forgejo-root.target"
];
};
# Networks
systemd.services."docker-network-forgejo_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f forgejo_default";
};
script = ''
docker network inspect forgejo_default || docker network create forgejo_default
'';
partOf = [ "docker-compose-forgejo-root.target" ];
wantedBy = [ "docker-compose-forgejo-root.target" ];
};
# Volumes
systemd.services."docker-volume-forgejo_db" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect forgejo_db || docker volume create forgejo_db
'';
partOf = [ "docker-compose-forgejo-root.target" ];
wantedBy = [ "docker-compose-forgejo-root.target" ];
};
systemd.services."docker-volume-forgejo_forgejo" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect forgejo_forgejo || docker volume create forgejo_forgejo
'';
partOf = [ "docker-compose-forgejo-root.target" ];
wantedBy = [ "docker-compose-forgejo-root.target" ];
};
systemd.services."docker-volume-forgejo_redis" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect forgejo_redis || docker volume create forgejo_redis
'';
partOf = [ "docker-compose-forgejo-root.target" ];
wantedBy = [ "docker-compose-forgejo-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-forgejo-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}

View file

@ -0,0 +1,153 @@
# Auto-generated using compose2nix v0.3.1.
{ config, pkgs, lib, ... }:
{
imports = [
../../../../system/sops.nix
];
# Containers
virtualisation.oci-containers.containers."synapse-db" = {
image = "docker.io/postgres:17.5";
environmentFiles = [ config.sops.secrets.synapse_db_docker_env.path ];
environment = {
"POSTGRES_INITDB_ARGS" = "--encoding=UTF-8 --lc-collate=C --lc-ctype=C";
"POSTGRES_USER" = "synapse";
};
volumes = [
"synapse_db:/var/lib/postgresql/data:rw"
];
log-driver = "journald";
extraOptions = [
"--network-alias=db"
"--network=synapse_default"
];
};
systemd.services."docker-synapse-db" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-synapse_default.service"
"docker-volume-synapse_db.service"
];
requires = [
"docker-network-synapse_default.service"
"docker-volume-synapse_db.service"
];
partOf = [
"docker-compose-synapse-root.target"
];
wantedBy = [
"docker-compose-synapse-root.target"
];
};
# Manually set the UID and GID to 0 in the environment and in the user configuration to fix sops issues
virtualisation.oci-containers.containers."synapse-synapse" = {
image = "docker.io/matrixdotorg/synapse:latest";
environment = {
"SYNAPSE_CONFIG_PATH" = "/data/homeserver.yaml";
# This sends a signal to Synapse's init code for ownership things: https://github.com/matrix-org/synapse/blob/develop/docker/start.py#L202
"UID" = "0";
"GID" = "0";
};
user = "0:0";
volumes = [
"synapse_synapse:/data:rw"
"/mnt/NASBox/synapse/uploads:/data/media_store:rw"
"${config.sops.secrets.synapse_synapse_docker_env.path}:/data/homeserver.yaml:ro"
"${config.sops.secrets.synapse_synapse_signing_docker_env.path}:/data/matrix.terah.dev.signing.key:ro"
];
labels = {
"traefik.http.routers.matrixterahdev.rule" = "Host(`matrix.terah.dev`)";
};
dependsOn = [
"synapse-db"
];
log-driver = "journald";
extraOptions = [
"--network-alias=synapse"
"--network=synapse_default"
];
};
systemd.services."docker-synapse-synapse" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-synapse_default.service"
"docker-volume-synapse_synapse.service"
];
requires = [
"docker-network-synapse_default.service"
"docker-volume-synapse_synapse.service"
];
partOf = [
"docker-compose-synapse-root.target"
];
wantedBy = [
"docker-compose-synapse-root.target"
];
};
# Networks
systemd.services."docker-network-synapse_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f synapse_default";
};
script = ''
docker network inspect synapse_default || docker network create synapse_default
'';
partOf = [ "docker-compose-synapse-root.target" ];
wantedBy = [ "docker-compose-synapse-root.target" ];
};
# Volumes
systemd.services."docker-volume-synapse_db" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect synapse_db || docker volume create synapse_db
'';
partOf = [ "docker-compose-synapse-root.target" ];
wantedBy = [ "docker-compose-synapse-root.target" ];
};
systemd.services."docker-volume-synapse_synapse" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect synapse_synapse || docker volume create synapse_synapse
'';
partOf = [ "docker-compose-synapse-root.target" ];
wantedBy = [ "docker-compose-synapse-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-synapse-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}

View file

@ -0,0 +1,180 @@
# Auto-generated using compose2nix v0.3.1.
{ config, pkgs, lib, ... }:
{
imports = [
../../../../system/sops.nix
];
# Containers
virtualisation.oci-containers.containers."mcaptcha-cache" = {
image = "mcaptcha/cache:latest";
log-driver = "journald";
extraOptions = [
"--network-alias=cache"
"--network=mcaptcha_default"
];
};
systemd.services."docker-mcaptcha-cache" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-mcaptcha_default.service"
];
requires = [
"docker-network-mcaptcha_default.service"
];
partOf = [
"docker-compose-mcaptcha-root.target"
];
wantedBy = [
"docker-compose-mcaptcha-root.target"
];
};
virtualisation.oci-containers.containers."mcaptcha-db" = {
image = "postgres:16.8";
environmentFiles = [ config.sops.secrets.mcaptcha_db_docker_env.path ];
environment = {
"PGDATA" = "/var/lib/postgresql/data/mcaptcha/";
};
volumes = [
"mcaptcha_db:/var/lib/postgresql:rw"
];
log-driver = "journald";
extraOptions = [
"--network-alias=db"
"--network=mcaptcha_default"
];
};
systemd.services."docker-mcaptcha-db" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-mcaptcha_default.service"
"docker-volume-mcaptcha_db.service"
];
requires = [
"docker-network-mcaptcha_default.service"
"docker-volume-mcaptcha_db.service"
];
partOf = [
"docker-compose-mcaptcha-root.target"
];
wantedBy = [
"docker-compose-mcaptcha-root.target"
];
};
virtualisation.oci-containers.containers."mcaptcha-mcaptcha" = {
image = "mcaptcha/mcaptcha:latest";
labels = {
"traefik.http.routers.mcaptchaterahdev.rule" = "Host(`mcaptcha.terah.dev`)";
"traefik.http.services.mcaptchaterahdev.loadbalancer.server.port" = "7000";
};
environmentFiles = [ config.sops.secrets.mcaptcha_mcaptcha_docker_env.path ];
environment = {
"MCAPTCHA__server_IP" = "0.0.0.0";
"MCAPTCHA_allow_demo" = "false";
"MCAPTCHA_allow_registration" = "false";
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_avg_traffic_difficulty" = "50000";
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_avg_traffic_time" = "1";
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_broke_my_site_traffic_difficulty" = "5000000";
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_broke_my_site_traffic_time" = "5";
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_duration" = "30";
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_peak_sustainable_traffic_difficulty" = "3000000";
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_peak_sustainable_traffic_time" = "3";
"MCAPTCHA_captcha_ENABLE_STATS" = "true";
"MCAPTCHA_captcha_GC" = "30";
"MCAPTCHA_captcha_QUEUE_LENGTH" = "2000";
"MCAPTCHA_captcha_RUNNERS" = "4";
"MCAPTCHA_commercial" = "false";
"MCAPTCHA_database_POOL" = "4";
"MCAPTCHA_debug" = "false";
"MCAPTCHA_redis_POOL" = "4";
"MCAPTCHA_redis_URL" = "redis://cache";
"MCAPTCHA_server_DOMAIN" = "mcaptcha.terah.dev";
"MCAPTCHA_source_code" = "https://github.com/mCaptcha/mCaptcha";
"PORT" = "7000";
};
dependsOn = [
"mcaptcha-cache"
"mcaptcha-db"
];
log-driver = "journald";
extraOptions = [
"--network-alias=mcaptcha"
"--network=mcaptcha_default"
];
};
systemd.services."docker-mcaptcha-mcaptcha" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-mcaptcha_default.service"
];
requires = [
"docker-network-mcaptcha_default.service"
];
partOf = [
"docker-compose-mcaptcha-root.target"
];
wantedBy = [
"docker-compose-mcaptcha-root.target"
];
};
# Networks
systemd.services."docker-network-mcaptcha_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f mcaptcha_default";
};
script = ''
docker network inspect mcaptcha_default || docker network create mcaptcha_default
'';
partOf = [ "docker-compose-mcaptcha-root.target" ];
wantedBy = [ "docker-compose-mcaptcha-root.target" ];
};
# Volumes
systemd.services."docker-volume-mcaptcha_db" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
};
script = ''
docker volume inspect mcaptcha_db || docker volume create mcaptcha_db
'';
partOf = [ "docker-compose-mcaptcha-root.target" ];
wantedBy = [ "docker-compose-mcaptcha-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-mcaptcha-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}

View file

@ -0,0 +1,63 @@
# Auto-generated using compose2nix v0.3.1.
{ pkgs, lib, ... }:
{
# Containers
virtualisation.oci-containers.containers."terahdev-web" = {
image = "ghcr.io/imterah/personal-www:v1.0.3";
labels = {
"traefik.http.routers.terahdev.rule" = "Host(`terah.dev`) || Host(`www.terah.dev`)";
};
log-driver = "journald";
extraOptions = [
"--network-alias=web"
"--network=terahdev_default"
];
};
systemd.services."docker-terahdev-web" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-terahdev_default.service"
];
requires = [
"docker-network-terahdev_default.service"
];
partOf = [
"docker-compose-terahdev-root.target"
];
wantedBy = [
"docker-compose-terahdev-root.target"
];
};
# Networks
systemd.services."docker-network-terahdev_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f terahdev_default";
};
script = ''
docker network inspect terahdev_default || docker network create terahdev_default
'';
partOf = [ "docker-compose-terahdev-root.target" ];
wantedBy = [ "docker-compose-terahdev-root.target" ];
};
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-terahdev-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
};
}