update container configurations
This commit is contained in:
parent
2cdee3871f
commit
b8acc1570a
|
@ -7,6 +7,7 @@
|
||||||
image = "ghcr.io/benphelps/homepage:latest";
|
image = "ghcr.io/benphelps/homepage:latest";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/srv/containers/homepage:/app/config"
|
"/srv/containers/homepage:/app/config"
|
||||||
|
"/srv/media:/srv/media:ro"
|
||||||
];
|
];
|
||||||
ports = [ "3000:3000" ];
|
ports = [ "3000:3000" ];
|
||||||
};
|
};
|
||||||
|
|
13
nixos/lavender/containers/nginx.nix
Normal file
13
nixos/lavender/containers/nginx.nix
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
# Nginx
|
||||||
|
virtualisation.oci-containers.containers."nginx" = {
|
||||||
|
autoStart = true;
|
||||||
|
image = "nginx";
|
||||||
|
volumes = [
|
||||||
|
"/srv/containers/nginx:/usr/share/nginx/html"
|
||||||
|
];
|
||||||
|
ports = [ "8282:80" ];
|
||||||
|
};
|
||||||
|
}
|
|
@ -8,14 +8,15 @@
|
||||||
volumes = [
|
volumes = [
|
||||||
"/srv/containers/pihole/etc-pihole:/etc/pihole"
|
"/srv/containers/pihole/etc-pihole:/etc/pihole"
|
||||||
"/srv/containers/pihole/etc-dnsmasq.d:/etc/dnsmasq.d"
|
"/srv/containers/pihole/etc-dnsmasq.d:/etc/dnsmasq.d"
|
||||||
|
"/srv/containers/pihole/secrets:/secrets"
|
||||||
];
|
];
|
||||||
ports = [
|
ports = [
|
||||||
"53:53/tcp"
|
"53:53/tcp"
|
||||||
"53:53/udp"
|
"53:53/udp"
|
||||||
"80:80/tcp"
|
"8181:80/tcp"
|
||||||
];
|
];
|
||||||
environment = {
|
environment = {
|
||||||
WEBPASSWORD = "";
|
WEBPASSWORD_FILE = "/secrets/admin-password";
|
||||||
DNSMASQ_LISTENING = "all";
|
DNSMASQ_LISTENING = "all";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
image = "lscr.io/linuxserver/plex:latest";
|
image = "lscr.io/linuxserver/plex:latest";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/srv/containers/plex:/config"
|
"/srv/containers/plex:/config"
|
||||||
"/srv/media:/media"
|
"/srv/data/media:/data/media:ro"
|
||||||
];
|
];
|
||||||
ports = [ "32400:32400" ];
|
ports = [ "32400:32400" ];
|
||||||
};
|
};
|
||||||
|
|
14
nixos/lavender/containers/prowlarr.nix
Normal file
14
nixos/lavender/containers/prowlarr.nix
Normal file
|
@ -0,0 +1,14 @@
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
# Prowlarr
|
||||||
|
virtualisation.oci-containers.containers."prowlarr" = {
|
||||||
|
autoStart = true;
|
||||||
|
image = "cr.hotio.dev/hotio/prowlarr";
|
||||||
|
volumes = [
|
||||||
|
"/srv/containers/prowlarr:/config"
|
||||||
|
"/srv/media:/media"
|
||||||
|
];
|
||||||
|
ports = [ "9696:9696" ];
|
||||||
|
};
|
||||||
|
}
|
|
@ -4,11 +4,14 @@
|
||||||
# Qbittorrent
|
# Qbittorrent
|
||||||
virtualisation.oci-containers.containers."qbittorrent" = {
|
virtualisation.oci-containers.containers."qbittorrent" = {
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
image = "cr.hotio.dev/hotio/qbittorrent";
|
image = "cr.hotio.dev/hotio/qbittorrent:release";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/srv/containers/qbittorrent:/config"
|
"/srv/containers/qbittorrent:/config"
|
||||||
"/srv/media:/media"
|
"/srv/data/torrents:/data/torrents"
|
||||||
|
];
|
||||||
|
ports = [
|
||||||
|
"8383:8080"
|
||||||
|
"32372:32372"
|
||||||
];
|
];
|
||||||
ports = [ "8080:8080" ];
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
image = "cr.hotio.dev/hotio/radarr";
|
image = "cr.hotio.dev/hotio/radarr";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/srv/containers/radarr:/config"
|
"/srv/containers/radarr:/config"
|
||||||
"/srv/media:/media"
|
"/srv/data:/data"
|
||||||
];
|
];
|
||||||
ports = [ "7878:7878" ];
|
ports = [ "7878:7878" ];
|
||||||
};
|
};
|
||||||
|
|
|
@ -4,10 +4,10 @@
|
||||||
# Sonarr
|
# Sonarr
|
||||||
virtualisation.oci-containers.containers."sonarr" = {
|
virtualisation.oci-containers.containers."sonarr" = {
|
||||||
autoStart = true;
|
autoStart = true;
|
||||||
image = "cr.hotio.dev/hotio/sonarr";
|
image = "cr.hotio.dev/hotio/sonarr:v4";
|
||||||
volumes = [
|
volumes = [
|
||||||
"/srv/containers/sonarr:/config"
|
"/srv/containers/sonarr:/config"
|
||||||
"/srv/media:/media"
|
"/srv/data:/data"
|
||||||
];
|
];
|
||||||
ports = [ "8989:8989" ];
|
ports = [ "8989:8989" ];
|
||||||
};
|
};
|
||||||
|
|
24
nixos/lavender/containers/traefik.nix
Normal file
24
nixos/lavender/containers/traefik.nix
Normal file
|
@ -0,0 +1,24 @@
|
||||||
|
{ ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
# Traefik
|
||||||
|
virtualisation.oci-containers.containers."traefik" = {
|
||||||
|
autoStart = true;
|
||||||
|
image = "traefik:v2.10";
|
||||||
|
volumes = [
|
||||||
|
"/srv/containers/traefik/traefik.yaml:/etc/traefik/traefik.yaml"
|
||||||
|
"/srv/containers/traefik/config:/config"
|
||||||
|
"/srv/containers/traefik/letsencrypt:/letsencrypt"
|
||||||
|
"/srv/containers/traefik/secrets:/secrets"
|
||||||
|
];
|
||||||
|
ports = [
|
||||||
|
"80:80"
|
||||||
|
"443:443"
|
||||||
|
"8080:8080"
|
||||||
|
];
|
||||||
|
environment = {
|
||||||
|
CF_API_EMAIL_FILE = "/secrets/cf-api-email";
|
||||||
|
CF_API_KEY_FILE = "/secrets/cf-api-key";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
Loading…
Reference in a new issue