added internal.nix

This commit is contained in:
Richie Cahill 2024-05-27 15:34:00 -04:00
parent 722fd8ca8b
commit 7a7aa94988
3 changed files with 111 additions and 1 deletions

14
.vscode/settings.json vendored
View File

@ -12,6 +12,7 @@
"autopull", "autopull",
"azuretools", "azuretools",
"BANN", "BANN",
"binhex",
"brkubnet", "brkubnet",
"btop", "btop",
"btrfs", "btrfs",
@ -50,6 +51,7 @@
"keygen", "keygen",
"KRNL", "KRNL",
"libvirtd", "libvirtd",
"localtime",
"LOGG", "LOGG",
"lsnew", "lsnew",
"luks", "luks",
@ -70,12 +72,21 @@
"nvme", "nvme",
"oderwat", "oderwat",
"pciutils", "pciutils",
"PGID",
"pipewire", "pipewire",
"pkgs", "pkgs",
"plugdev", "plugdev",
"PRIVOXY",
"prowlarr",
"proxychains", "proxychains",
"PUID",
"pulseaudio", "pulseaudio",
"pylance", "pylance",
"qbit",
"qbittorrent",
"qbittorrentvpn",
"qbitvpn",
"radarr",
"Redistributable", "Redistributable",
"ripgrep", "ripgrep",
"rtkit", "rtkit",
@ -83,6 +94,7 @@
"shellcheck", "shellcheck",
"smartd", "smartd",
"smartmontools", "smartmontools",
"sonarr",
"sshconfig", "sshconfig",
"substituters", "substituters",
"sysstat", "sysstat",
@ -91,6 +103,7 @@
"Tmpfs", "Tmpfs",
"topgrade", "topgrade",
"Toqozz", "Toqozz",
"Torenting",
"uaccess", "uaccess",
"updatekeys", "updatekeys",
"usbguard", "usbguard",
@ -99,6 +112,7 @@
"usernamehw", "usernamehw",
"vfat", "vfat",
"virtualisation", "virtualisation",
"WEBUI",
"wireshark", "wireshark",
"xhci", "xhci",
"yzhang", "yzhang",

View File

@ -1,5 +1,8 @@
{ {
imports = [ ./filebrowser.nix ]; imports = [
./filebrowser.nix
./internal.nix
];
virtualisation.oci-containers.backend = "docker"; virtualisation.oci-containers.backend = "docker";
} }

View File

@ -0,0 +1,93 @@
{
virtualisation.oci-containers.containers = {
qbit = {
image = "ghcr.io/linuxserver/qbittorrent";
ports = [
"6881:6881"
"6881:6881/udp"
"8082:8082"
"29432:29432"
];
volumes = [
"/ZFS/Media/Docker/Docker/Storage/qbit:/config"
"/ZFS/Torenting/Qbit/:/data"
];
environment = {
PUID = "998";
PGID = "100";
TZ = "America/New_York";
WEBUI_PORT = "8082";
};
autoStart = true;
};
qbitvpn = {
image = "binhex/arch-qbittorrentvpn";
ports = [
"6882:6881"
"6882:6881/udp"
"8081:8081"
"8118:8118"
];
volumes = [
"/ZFS/Media/Docker/Docker/Storage/qbitvpn:/config"
"/ZFS/Torenting/QbitVPN/:/data"
"/etc/localtime:/etc/localtime:ro"
];
environment = {
WEBUI_PORT = "8081";
PUID = "998";
PGID = "100";
VPN_ENABLED = "yes";
VPN_CLIENT = "openvpn";
STRICT_PORT_FORWARD = "yes";
ENABLE_PRIVOXY = "yes";
LAN_NETWORK = "192.168.90.0/24";
NAME_SERVERS = "192.168.90.0";
UMASK = "000";
DEBUG = "false";
DELUGE_DAEMON_LOG_LEVEL = "debug";
DELUGE_WEB_LOG_LEVEL = "debug";
environmentFiles = [ "/ZFS/Media/Docker/Docker/jeeves/internal/qbitvpn.env" ];
autoStart = true;
};
};
prowlarr = {
image = "ghcr.io/linuxserver/prowlarr";
environment = {
PUID = "998";
PGID = "100";
TZ = "America/New_York";
};
volumes = [ "/ZFS/Media/Docker/Docker/Storage/prowlarr:/config" ];
autoStart = true;
};
radarr = {
image = "ghcr.io/linuxserver/radarr";
environment = {
PUID = "998";
PGID = "100";
TZ = "America/New_York";
};
volumes = [
"/ZFS/Media/Docker/Docker/Storage/radarr:/config"
"/ZFS/Storage/Plex/Movies:/movies"
"/ZFS/Torenting/QbitVPN:/data"
];
autoStart = true;
};
sonarr = {
image = "ghcr.io/linuxserver/sonarr";
environment = {
PUID = "998";
PGID = "100";
TZ = "America/New_York";
};
volumes = [
"/ZFS/Media/Docker/Docker/Storage/sonarr:/config"
"/ZFS/Storage/Plex/TV:/tv"
"/ZFS/Torenting/QbitVPN:/data"
];
autoStart = true;
};
};
}