230 lines
7.1 KiB
Plaintext
230 lines
7.1 KiB
Plaintext
local compose = import 'compose.libsonnet';
|
|
local Compose = compose.Compose;
|
|
local Command = compose.Command;
|
|
local Port = compose.Port;
|
|
local MediaService = compose.MediaService;
|
|
local MediaMounts = compose.MediaMounts;
|
|
local HomelabDomain = compose.HomelabDomain;
|
|
|
|
function(secrets={})
|
|
Compose({
|
|
gluetun: {
|
|
image: 'qmcgaw/gluetun',
|
|
cap_add: ['NET_ADMIN'],
|
|
devices: ['/dev/net/tun:/dev/net/tun'],
|
|
environment: {
|
|
TZ: 'America/New_York',
|
|
// VPN_SERVICE_PROVIDER: 'custom',
|
|
// VPN_TYPE: 'wireguard',
|
|
// VPN_PORT_FORWARDING_PROVIDER: 'protonvpn',
|
|
// VPN_ENDPOINT_IP: std.get(secrets, 'VPN_ENDPOINT_IP'),
|
|
// VPN_ENDPOINT_PORT: std.get(secrets, 'VPN_ENDPOINT_PORT'),
|
|
// WIREGUARD_PUBLIC_KEY: std.get(secrets, 'WIREGUARD_PUBLIC_KEY'),
|
|
// WIREGUARD_PRIVATE_KEY: std.get(secrets, 'WIREGUARD_PRIVATE_KEY'),
|
|
// WIREGUARD_ADDRESSES: std.get(secrets, 'WIREGUARD_ADDRESSES'),
|
|
VPN_SERVICE_PROVIDER: 'protonvpn',
|
|
VPN_PORT_FORWARDING: 'on',
|
|
OPENVPN_USER: std.get(secrets, 'OPENVPN_USER'),
|
|
OPENVPN_PASSWORD: std.get(secrets, 'OPENVPN_PASSWORD'),
|
|
SERVER_HOSTNAMES: 'node-ch-08.protonvpn.net',
|
|
},
|
|
ports: [
|
|
// http proxy
|
|
// Port(8888),
|
|
// shadowsocks proxy
|
|
// Port(8388),
|
|
// Port(8388, kind='udp'),
|
|
// app local ports
|
|
// deluge
|
|
// Port(58846),
|
|
// Port(58846, kind='udp'),
|
|
// transmission
|
|
Port(9091),
|
|
Port(9091, kind='udp'),
|
|
],
|
|
webPort:: 8000,
|
|
volumes: { gluetun_data: '/gluetun' },
|
|
},
|
|
traefik: {
|
|
image: 'traefik:latest',
|
|
command: Command({
|
|
'log.level': 'DEBUG',
|
|
'api.insecure': 'true',
|
|
'providers.docker': 'true',
|
|
'providers.docker.exposedbydefault': 'false',
|
|
'entrypoints.web.address': ':80',
|
|
'entrypoints.web-tls.address': ':443',
|
|
'entrypoints.web-tls.http.tls.domains[0].main': HomelabDomain,
|
|
'entrypoints.web-tls.http.tls.domains[0].sans': '*.%s' % HomelabDomain,
|
|
'entrypoints.web-tls.http.tls.certresolver': 'letsencrypt',
|
|
'certificatesresolvers.letsencrypt.acme.dnschallenge': true,
|
|
'certificatesresolvers.letsencrypt.acme.dnschallenge.provider': 'luadns',
|
|
'certificatesresolvers.letsencrypt.acme.email': 'mat@mat.services',
|
|
'certificatesresolvers.letsencrypt.acme.storage': '/letsencrypt/acme.json',
|
|
}),
|
|
docker:: true,
|
|
webPort:: 8080,
|
|
ports: [
|
|
Port(80),
|
|
Port(443),
|
|
],
|
|
environment: {
|
|
LUADNS_API_USERNAME: 'mat@mat.services',
|
|
LUADNS_API_TOKEN: std.get(secrets, 'LETSENCRYPT_DNS_PROVIDER_KEY'),
|
|
},
|
|
traefik:: {
|
|
// 'traefik.http.routers.http-catchall.rule': 'hostregexp(`{host:.+}`)'
|
|
// 'traefik.http.routers.http-catchall.entrypoints': 'web'
|
|
// 'traefik.http.routers.http-catchall.middlewares': 'redirect-to-https'
|
|
// 'traefik.http.middlewares.redirect-to-https.redirectscheme.scheme': 'https'
|
|
},
|
|
volumes: { letsencrypt_data: '/letsencrypt' }
|
|
},
|
|
portainer: {
|
|
image: 'portainer/portainer-ce:latest',
|
|
docker:: true,
|
|
volumes: { portainer_portainer_data: '/data' },
|
|
webPort:: 9000,
|
|
// useful when traefik is having issues
|
|
// ports: [Port(9443)],
|
|
},
|
|
transmission: MediaService(
|
|
name='transmission',
|
|
env={
|
|
USER: 'mat',
|
|
PASS: std.get(secrets, 'TRANSMISSION_PASS'),
|
|
PEERPORT: 55249,
|
|
},
|
|
mounts={ torrents: '/downloads' },
|
|
webPort=9091,
|
|
extras={ gluetun:: true },
|
|
),
|
|
// deluge: MediaService(
|
|
// name='deluge',
|
|
// env={ DELUGE_LOGLEVEL: 'error' },
|
|
// mounts={ torrents: '/downloads' },
|
|
// webPort=8112,
|
|
// extras={ gluetun:: true },
|
|
// external=true,
|
|
// ),
|
|
prowlarr: MediaService(
|
|
name='prowlarr',
|
|
tag='develop',
|
|
webPort=9696,
|
|
mounts={
|
|
torrents: '/downloads',
|
|
'passport-5tb': '/passport-5tb',
|
|
'passport-1tb': '/passport-1tb',
|
|
},
|
|
extras={ gluetun:: true },
|
|
external=true,
|
|
),
|
|
bazarr: MediaService(
|
|
name='bazarr',
|
|
webPort=6767,
|
|
mounts={
|
|
'passport-5tb': '/passport-5tb',
|
|
'passport-1tb': '/passport-1tb',
|
|
},
|
|
extras={ gluetun:: true },
|
|
external=true,
|
|
),
|
|
radarr: MediaService(
|
|
name='radarr',
|
|
webPort=7878,
|
|
mounts={
|
|
'passport-5tb/movies': '/passport-5tb',
|
|
'passport-1tb/movies': '/passport-1tb',
|
|
torrents: '/downloads',
|
|
},
|
|
extras={ gluetun:: true },
|
|
external=true,
|
|
),
|
|
sonarr: MediaService(
|
|
name='sonarr',
|
|
webPort=8989,
|
|
mounts={
|
|
'passport-5tb/tv': '/passport-5tb',
|
|
'passport-1tb/tv': '/passport-1tb',
|
|
torrents: '/downloads',
|
|
},
|
|
extras={ gluetun:: true },
|
|
external=true,
|
|
),
|
|
plex: {
|
|
image: 'plexinc/pms-docker',
|
|
environment: {
|
|
TZ: 'America/New_York',
|
|
PLEX_CLAIM: std.get(secrets, 'PLEX_CLAIM'),
|
|
// ADVERTISE_IP: std.get(secrets, 'PLEX_ADVERTISE_IP'),
|
|
},
|
|
volumes: { media_plex_config: '/config' },
|
|
mounts:: MediaMounts({
|
|
'torrents/plex-transcode': '/transcode',
|
|
'passport-5tb': '/passport-5tb',
|
|
'passport-1tb': '/passport-1tb',
|
|
}),
|
|
devices: ['/dev/dri:/dev/dri'],
|
|
webPort:: 32400,
|
|
ports: [
|
|
// plex
|
|
Port(32400),
|
|
// companion
|
|
Port(3005),
|
|
// dlna
|
|
Port(32469),
|
|
Port(1900, kind='udp'),
|
|
// gdm network discovery
|
|
Port(32410, kind='udp'),
|
|
Port(32412, kind='udp'),
|
|
Port(32413, kind='udp'),
|
|
Port(32414, kind='udp'),
|
|
// bonjour/avahi
|
|
// Port(5353, kind='udp'),
|
|
// plex for roku via companion
|
|
// Port(8324),
|
|
],
|
|
},
|
|
archivebox: {
|
|
image: 'archivebox/archivebox:dev',
|
|
command: 'server --quick-init 0.0.0.0:8000',
|
|
// TODO: hack to workaround https://github.com/ArchiveBox/ArchiveBox/issues/1002
|
|
// entrypoint: '/bin/bash',
|
|
// command: '-c "chown -R archivebox:archivebox /app/archivebox/core/migrations && /app/bin/docker_entrypoint.sh server --quick-init 0.0.0.0:8000"',
|
|
environment: {
|
|
ALLOWED_HOSTS: '*',
|
|
MEDIA_MAX_SIZE: '750m',
|
|
RESOLUTION: '1024,768',
|
|
},
|
|
mounts:: MediaMounts({ 'passport-5tb/archivebox': '/data' }),
|
|
webPort:: 8000,
|
|
host:: 'archive',
|
|
},
|
|
firefly: {
|
|
image: 'fireflyiii/core:latest',
|
|
environment: {
|
|
DB_CONNECTION: 'sqlite',
|
|
APP_DEBUG: true,
|
|
SITE_OWNER: 'mat@mat.services',
|
|
APP_KEY: std.get(secrets, 'FIREFLY_APP_KEY'),
|
|
TZ: 'America/New_York',
|
|
TRUSTED_PROXIES: '**',
|
|
},
|
|
volumes: {
|
|
firefly_data: '/storage',
|
|
firefly_uploads: '/var/www/html/storage/upload',
|
|
},
|
|
webPort:: 8080,
|
|
},
|
|
actual: {
|
|
image: 'jlongster/actual-server:latest',
|
|
environment: {
|
|
userFilesPath: '/data/user',
|
|
serverFilesPath: '/data/server',
|
|
externalPort: 5006,
|
|
},
|
|
volumes: { actual_data: '/data' },
|
|
webPort:: 5006,
|
|
},
|
|
})
|