chore: Restructure stack folder
This commit is contained in:
parent
638d79477e
commit
91c8ffb787
14 changed files with 12 additions and 12 deletions
216
hosts/andromeda/stacks/public/git.terah.dev/docker-compose.nix
Normal file
216
hosts/andromeda/stacks/public/git.terah.dev/docker-compose.nix
Normal file
|
@ -0,0 +1,216 @@
|
|||
# Auto-generated using compose2nix v0.3.1.
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
../../../../system/sops.nix
|
||||
];
|
||||
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."forgejo-db" = {
|
||||
image = "postgres:17.4";
|
||||
environmentFiles = [ config.sops.secrets.forgejo_db_docker_env.path ];
|
||||
environment = {
|
||||
"POSTGRES_DB" = "forgejo";
|
||||
"POSTGRES_USER" = "forgejo";
|
||||
};
|
||||
volumes = [
|
||||
"forgejo_db:/var/lib/postgresql/data:rw"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=db"
|
||||
"--network=forgejo_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-forgejo-db" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-forgejo_default.service"
|
||||
"docker-volume-forgejo_db.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-forgejo_default.service"
|
||||
"docker-volume-forgejo_db.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-forgejo-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-forgejo-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."forgejo-redis" = {
|
||||
image = "redis:8.0.0";
|
||||
volumes = [
|
||||
"forgejo_redis:/data:rw"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=redis"
|
||||
"--network=forgejo_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-forgejo-redis" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-forgejo_default.service"
|
||||
"docker-volume-forgejo_redis.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-forgejo_default.service"
|
||||
"docker-volume-forgejo_redis.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-forgejo-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-forgejo-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."forgejo-server" = {
|
||||
image = "codeberg.org/forgejo/forgejo:11";
|
||||
environmentFiles = [ config.sops.secrets.forgejo_server_docker_env.path ];
|
||||
environment = {
|
||||
"FORGEJO__cache__ADAPTER" = "redis";
|
||||
"FORGEJO__cache__ENABLED" = "true";
|
||||
"FORGEJO__cache__HOST" = "redis://redis:6379/0?pool_size=100&idle_timeout=180s";
|
||||
"FORGEJO__database__DB_TYPE" = "postgres";
|
||||
"FORGEJO__database__HOST" = "db:5432";
|
||||
"FORGEJO__database__NAME" = "forgejo";
|
||||
"FORGEJO__database__USER" = "forgejo";
|
||||
"FORGEJO__service__REGISTER_EMAIL_CONFIRM" = "false";
|
||||
"FORGEJO__service__REQUIRE_CAPTCHA_FOR_LOGIN" = "true";
|
||||
"FORGEJO__service__MCAPTCHA_URL" = "https://mcaptcha.terah.dev";
|
||||
"FORGEJO__service__CAPTCHA_TYPE" = "mcaptcha";
|
||||
"FORGEJO__service__ENABLE_CAPTCHA" = "false";
|
||||
"FORGEJO__service__REGISTER_MANUAL_CONFIRM" = "true";
|
||||
"FORGEJO__service__REQUIRE_EXTERNAL_REGISTRATION_CAPTCHA" = "true";
|
||||
"USER_GID" = "1000";
|
||||
"USER_UID" = "1000";
|
||||
};
|
||||
volumes = [
|
||||
"/etc/localtime:/etc/localtime:ro"
|
||||
"/etc/timezone:/etc/timezone:ro"
|
||||
"forgejo_forgejo:/data:rw"
|
||||
];
|
||||
ports = [
|
||||
"222:22/tcp"
|
||||
];
|
||||
labels = {
|
||||
"traefik.http.routers.gitterahdev.rule" = "Host(`git.terah.dev`)";
|
||||
"traefik.http.services.gitterahdev.loadbalancer.server.port" = "3000";
|
||||
};
|
||||
dependsOn = [
|
||||
"forgejo-db"
|
||||
"forgejo-redis"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=server"
|
||||
"--network=forgejo_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-forgejo-server" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-forgejo_default.service"
|
||||
"docker-volume-forgejo_forgejo.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-forgejo_default.service"
|
||||
"docker-volume-forgejo_forgejo.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-forgejo-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-forgejo-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."docker-network-forgejo_default" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "docker network rm -f forgejo_default";
|
||||
};
|
||||
script = ''
|
||||
docker network inspect forgejo_default || docker network create forgejo_default
|
||||
'';
|
||||
partOf = [ "docker-compose-forgejo-root.target" ];
|
||||
wantedBy = [ "docker-compose-forgejo-root.target" ];
|
||||
};
|
||||
|
||||
# Volumes
|
||||
systemd.services."docker-volume-forgejo_db" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect forgejo_db || docker volume create forgejo_db
|
||||
'';
|
||||
partOf = [ "docker-compose-forgejo-root.target" ];
|
||||
wantedBy = [ "docker-compose-forgejo-root.target" ];
|
||||
};
|
||||
|
||||
systemd.services."docker-volume-forgejo_forgejo" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect forgejo_forgejo || docker volume create forgejo_forgejo
|
||||
'';
|
||||
partOf = [ "docker-compose-forgejo-root.target" ];
|
||||
wantedBy = [ "docker-compose-forgejo-root.target" ];
|
||||
};
|
||||
|
||||
systemd.services."docker-volume-forgejo_redis" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect forgejo_redis || docker volume create forgejo_redis
|
||||
'';
|
||||
partOf = [ "docker-compose-forgejo-root.target" ];
|
||||
wantedBy = [ "docker-compose-forgejo-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."docker-compose-forgejo-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
|
@ -0,0 +1,153 @@
|
|||
# Auto-generated using compose2nix v0.3.1.
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
../../../../system/sops.nix
|
||||
];
|
||||
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."synapse-db" = {
|
||||
image = "docker.io/postgres:17.5";
|
||||
environmentFiles = [ config.sops.secrets.synapse_db_docker_env.path ];
|
||||
environment = {
|
||||
"POSTGRES_INITDB_ARGS" = "--encoding=UTF-8 --lc-collate=C --lc-ctype=C";
|
||||
"POSTGRES_USER" = "synapse";
|
||||
};
|
||||
volumes = [
|
||||
"synapse_db:/var/lib/postgresql/data:rw"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=db"
|
||||
"--network=synapse_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-synapse-db" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-synapse_default.service"
|
||||
"docker-volume-synapse_db.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-synapse_default.service"
|
||||
"docker-volume-synapse_db.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-synapse-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-synapse-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Manually set the UID and GID to 0 in the environment and in the user configuration to fix sops issues
|
||||
virtualisation.oci-containers.containers."synapse-synapse" = {
|
||||
image = "docker.io/matrixdotorg/synapse:latest";
|
||||
environment = {
|
||||
"SYNAPSE_CONFIG_PATH" = "/data/homeserver.yaml";
|
||||
# This sends a signal to Synapse's init code for ownership things: https://github.com/matrix-org/synapse/blob/develop/docker/start.py#L202
|
||||
"UID" = "0";
|
||||
"GID" = "0";
|
||||
};
|
||||
user = "0:0";
|
||||
volumes = [
|
||||
"synapse_synapse:/data:rw"
|
||||
"/mnt/NASBox/synapse/uploads:/data/media_store:rw"
|
||||
"${config.sops.secrets.synapse_synapse_docker_env.path}:/data/homeserver.yaml:ro"
|
||||
"${config.sops.secrets.synapse_synapse_signing_docker_env.path}:/data/matrix.terah.dev.signing.key:ro"
|
||||
];
|
||||
labels = {
|
||||
"traefik.http.routers.matrixterahdev.rule" = "Host(`matrix.terah.dev`)";
|
||||
};
|
||||
dependsOn = [
|
||||
"synapse-db"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=synapse"
|
||||
"--network=synapse_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-synapse-synapse" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-synapse_default.service"
|
||||
"docker-volume-synapse_synapse.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-synapse_default.service"
|
||||
"docker-volume-synapse_synapse.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-synapse-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-synapse-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."docker-network-synapse_default" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "docker network rm -f synapse_default";
|
||||
};
|
||||
script = ''
|
||||
docker network inspect synapse_default || docker network create synapse_default
|
||||
'';
|
||||
partOf = [ "docker-compose-synapse-root.target" ];
|
||||
wantedBy = [ "docker-compose-synapse-root.target" ];
|
||||
};
|
||||
|
||||
# Volumes
|
||||
systemd.services."docker-volume-synapse_db" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect synapse_db || docker volume create synapse_db
|
||||
'';
|
||||
partOf = [ "docker-compose-synapse-root.target" ];
|
||||
wantedBy = [ "docker-compose-synapse-root.target" ];
|
||||
};
|
||||
|
||||
systemd.services."docker-volume-synapse_synapse" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect synapse_synapse || docker volume create synapse_synapse
|
||||
'';
|
||||
partOf = [ "docker-compose-synapse-root.target" ];
|
||||
wantedBy = [ "docker-compose-synapse-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."docker-compose-synapse-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
|
@ -0,0 +1,180 @@
|
|||
# Auto-generated using compose2nix v0.3.1.
|
||||
{ config, pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
../../../../system/sops.nix
|
||||
];
|
||||
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."mcaptcha-cache" = {
|
||||
image = "mcaptcha/cache:latest";
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=cache"
|
||||
"--network=mcaptcha_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-mcaptcha-cache" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-mcaptcha_default.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-mcaptcha_default.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-mcaptcha-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-mcaptcha-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."mcaptcha-db" = {
|
||||
image = "postgres:16.8";
|
||||
environmentFiles = [ config.sops.secrets.mcaptcha_db_docker_env.path ];
|
||||
environment = {
|
||||
"PGDATA" = "/var/lib/postgresql/data/mcaptcha/";
|
||||
};
|
||||
volumes = [
|
||||
"mcaptcha_db:/var/lib/postgresql:rw"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=db"
|
||||
"--network=mcaptcha_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-mcaptcha-db" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-mcaptcha_default.service"
|
||||
"docker-volume-mcaptcha_db.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-mcaptcha_default.service"
|
||||
"docker-volume-mcaptcha_db.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-mcaptcha-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-mcaptcha-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
virtualisation.oci-containers.containers."mcaptcha-mcaptcha" = {
|
||||
image = "mcaptcha/mcaptcha:latest";
|
||||
labels = {
|
||||
"traefik.http.routers.mcaptchaterahdev.rule" = "Host(`mcaptcha.terah.dev`)";
|
||||
"traefik.http.services.mcaptchaterahdev.loadbalancer.server.port" = "7000";
|
||||
};
|
||||
environmentFiles = [ config.sops.secrets.mcaptcha_mcaptcha_docker_env.path ];
|
||||
environment = {
|
||||
"MCAPTCHA__server_IP" = "0.0.0.0";
|
||||
"MCAPTCHA_allow_demo" = "false";
|
||||
"MCAPTCHA_allow_registration" = "false";
|
||||
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_avg_traffic_difficulty" = "50000";
|
||||
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_avg_traffic_time" = "1";
|
||||
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_broke_my_site_traffic_difficulty" = "5000000";
|
||||
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_broke_my_site_traffic_time" = "5";
|
||||
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_duration" = "30";
|
||||
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_peak_sustainable_traffic_difficulty" = "3000000";
|
||||
"MCAPTCHA_captcha_DEFAULT_DIFFICULTY_STRATEGY_peak_sustainable_traffic_time" = "3";
|
||||
"MCAPTCHA_captcha_ENABLE_STATS" = "true";
|
||||
"MCAPTCHA_captcha_GC" = "30";
|
||||
"MCAPTCHA_captcha_QUEUE_LENGTH" = "2000";
|
||||
"MCAPTCHA_captcha_RUNNERS" = "4";
|
||||
"MCAPTCHA_commercial" = "false";
|
||||
"MCAPTCHA_database_POOL" = "4";
|
||||
"MCAPTCHA_debug" = "false";
|
||||
"MCAPTCHA_redis_POOL" = "4";
|
||||
"MCAPTCHA_redis_URL" = "redis://cache";
|
||||
"MCAPTCHA_server_DOMAIN" = "mcaptcha.terah.dev";
|
||||
"MCAPTCHA_source_code" = "https://github.com/mCaptcha/mCaptcha";
|
||||
"PORT" = "7000";
|
||||
};
|
||||
dependsOn = [
|
||||
"mcaptcha-cache"
|
||||
"mcaptcha-db"
|
||||
];
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=mcaptcha"
|
||||
"--network=mcaptcha_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-mcaptcha-mcaptcha" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-mcaptcha_default.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-mcaptcha_default.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-mcaptcha-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-mcaptcha-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."docker-network-mcaptcha_default" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "docker network rm -f mcaptcha_default";
|
||||
};
|
||||
script = ''
|
||||
docker network inspect mcaptcha_default || docker network create mcaptcha_default
|
||||
'';
|
||||
partOf = [ "docker-compose-mcaptcha-root.target" ];
|
||||
wantedBy = [ "docker-compose-mcaptcha-root.target" ];
|
||||
};
|
||||
|
||||
# Volumes
|
||||
systemd.services."docker-volume-mcaptcha_db" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
};
|
||||
script = ''
|
||||
docker volume inspect mcaptcha_db || docker volume create mcaptcha_db
|
||||
'';
|
||||
partOf = [ "docker-compose-mcaptcha-root.target" ];
|
||||
wantedBy = [ "docker-compose-mcaptcha-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."docker-compose-mcaptcha-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
63
hosts/andromeda/stacks/public/terah.dev/docker-compose.nix
Normal file
63
hosts/andromeda/stacks/public/terah.dev/docker-compose.nix
Normal file
|
@ -0,0 +1,63 @@
|
|||
# Auto-generated using compose2nix v0.3.1.
|
||||
{ pkgs, lib, ... }:
|
||||
|
||||
{
|
||||
# Containers
|
||||
virtualisation.oci-containers.containers."terahdev-web" = {
|
||||
image = "ghcr.io/imterah/personal-www:v1.0.3";
|
||||
labels = {
|
||||
"traefik.http.routers.terahdev.rule" = "Host(`terah.dev`) || Host(`www.terah.dev`)";
|
||||
};
|
||||
log-driver = "journald";
|
||||
extraOptions = [
|
||||
"--network-alias=web"
|
||||
"--network=terahdev_default"
|
||||
];
|
||||
};
|
||||
|
||||
systemd.services."docker-terahdev-web" = {
|
||||
serviceConfig = {
|
||||
Restart = lib.mkOverride 90 "always";
|
||||
RestartMaxDelaySec = lib.mkOverride 90 "1m";
|
||||
RestartSec = lib.mkOverride 90 "100ms";
|
||||
RestartSteps = lib.mkOverride 90 9;
|
||||
};
|
||||
after = [
|
||||
"docker-network-terahdev_default.service"
|
||||
];
|
||||
requires = [
|
||||
"docker-network-terahdev_default.service"
|
||||
];
|
||||
partOf = [
|
||||
"docker-compose-terahdev-root.target"
|
||||
];
|
||||
wantedBy = [
|
||||
"docker-compose-terahdev-root.target"
|
||||
];
|
||||
};
|
||||
|
||||
# Networks
|
||||
systemd.services."docker-network-terahdev_default" = {
|
||||
path = [ pkgs.docker ];
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
RemainAfterExit = true;
|
||||
ExecStop = "docker network rm -f terahdev_default";
|
||||
};
|
||||
script = ''
|
||||
docker network inspect terahdev_default || docker network create terahdev_default
|
||||
'';
|
||||
partOf = [ "docker-compose-terahdev-root.target" ];
|
||||
wantedBy = [ "docker-compose-terahdev-root.target" ];
|
||||
};
|
||||
|
||||
# Root service
|
||||
# When started, this will automatically create all resources and start
|
||||
# the containers. When stopped, this will teardown all resources.
|
||||
systemd.targets."docker-compose-terahdev-root" = {
|
||||
unitConfig = {
|
||||
Description = "Root target generated by compose2nix.";
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
}
|
Loading…
Add table
Add a link
Reference in a new issue