vaultwarden, calibre, cleanup
This commit is contained in:
@@ -33,6 +33,7 @@ include:
|
|||||||
|
|
||||||
- path:
|
- path:
|
||||||
- ${MEDIA_PATH}/audiobookshelf/audiobookshelf.yml
|
- ${MEDIA_PATH}/audiobookshelf/audiobookshelf.yml
|
||||||
|
- ${MEDIA_PATH}/calibre/calibre.yml
|
||||||
- ${MEDIA_PATH}/immich/immich.yml
|
- ${MEDIA_PATH}/immich/immich.yml
|
||||||
- ${MEDIA_PATH}/prowlarr/prowlarr.yml
|
- ${MEDIA_PATH}/prowlarr/prowlarr.yml
|
||||||
- ${MEDIA_PATH}/qbittorrent/qbittorrent.yml
|
- ${MEDIA_PATH}/qbittorrent/qbittorrent.yml
|
||||||
@@ -51,8 +52,8 @@ include:
|
|||||||
- ${SERVICE_PATH}/paperless-ngx/paperless-ngx.yml
|
- ${SERVICE_PATH}/paperless-ngx/paperless-ngx.yml
|
||||||
- ${SERVICE_PATH}/radicale/radicale.yml
|
- ${SERVICE_PATH}/radicale/radicale.yml
|
||||||
- ${SERVICE_PATH}/shlink/shlink.yml
|
- ${SERVICE_PATH}/shlink/shlink.yml
|
||||||
- ${SERVICE_PATH}/sponsorblock/sponsorblock.yml
|
|
||||||
- ${SERVICE_PATH}/stirling-pdf/stirling-pdf.yml
|
- ${SERVICE_PATH}/stirling-pdf/stirling-pdf.yml
|
||||||
|
- ${SERVICE_PATH}/vaultwarden/vaultwarden.yml
|
||||||
- ${SERVICE_PATH}/vikunja/vikunja.yml
|
- ${SERVICE_PATH}/vikunja/vikunja.yml
|
||||||
env_file: ${SERVICE_PATH}/.env
|
env_file: ${SERVICE_PATH}/.env
|
||||||
|
|
||||||
@@ -72,4 +73,4 @@ networks:
|
|||||||
# config:
|
# config:
|
||||||
# # - subnet: "2a04:ee41:86:9397::/64"
|
# # - subnet: "2a04:ee41:86:9397::/64"
|
||||||
# - subnet: "2001:db8:2:/64"
|
# - subnet: "2001:db8:2:/64"
|
||||||
# - gateway: "2001:db8:2::1"
|
# - gateway: "2001:db8:2::1"
|
||||||
|
|||||||
52
project/media/calibre/calibre.yml
Normal file
52
project/media/calibre/calibre.yml
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
services:
|
||||||
|
calibre:
|
||||||
|
extends:
|
||||||
|
file: ${TEMPLATES_PATH}
|
||||||
|
service: default
|
||||||
|
image: lscr.io/linuxserver/calibre:latest
|
||||||
|
container_name: calibre
|
||||||
|
environment:
|
||||||
|
- PASSWORD= #optional
|
||||||
|
- CLI_ARGS= #optional
|
||||||
|
volumes:
|
||||||
|
- ${MEDIA_PATH}/data/media/ebooks:/config
|
||||||
|
ports:
|
||||||
|
- 2005:8080 # gui
|
||||||
|
- 2006:8181 # gui https
|
||||||
|
- 2007:8081 # webserver ui
|
||||||
|
networks:
|
||||||
|
- ip4net
|
||||||
|
labels:
|
||||||
|
# Watchtower
|
||||||
|
- "com.centurylinklabs.watchtower.enable=true"
|
||||||
|
# Traefik
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.calibre.rule=Host(`calibre.${LOCAL_DOMAIN}`)"
|
||||||
|
- "traefik.http.routers.calibre.entrypoints=https"
|
||||||
|
- 'traefik.http.routers.calibre.tls=true'
|
||||||
|
|
||||||
|
calibre-web:
|
||||||
|
extends:
|
||||||
|
file: ${TEMPLATES_PATH}
|
||||||
|
service: default
|
||||||
|
image: lscr.io/linuxserver/calibre-web:latest
|
||||||
|
container_name: calibre-web
|
||||||
|
environment:
|
||||||
|
- DOCKER_MODS=linuxserver/mods:universal-calibre #optional
|
||||||
|
# - OAUTHLIB_RELAX_TOKEN_SCOPE=1 #optional
|
||||||
|
volumes:
|
||||||
|
- /path/to/calibre-web/data:/config
|
||||||
|
- ${MEDIA_PATH}/calibre/data:/config
|
||||||
|
- ${MEDIA_PATH}/data/media/ebooks:/books
|
||||||
|
ports:
|
||||||
|
- 2008:8083
|
||||||
|
networks:
|
||||||
|
- ip6net
|
||||||
|
labels:
|
||||||
|
# Watchtower
|
||||||
|
- "com.centurylinklabs.watchtower.enable=true"
|
||||||
|
# Traefik
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.calibre-web.rule=Host(`calibre-web.${LOCAL_DOMAIN}`)"
|
||||||
|
- "traefik.http.routers.calibre-web.entrypoints=https"
|
||||||
|
- 'traefik.http.routers.calibre-web.tls=true'
|
||||||
@@ -12,7 +12,7 @@ services:
|
|||||||
DB_DATABASE_NAME: immich
|
DB_DATABASE_NAME: immich
|
||||||
REDIS_HOSTNAME: redis
|
REDIS_HOSTNAME: redis
|
||||||
volumes:
|
volumes:
|
||||||
# to mount the trueNas external library: sudo mount 192.168.1.212:/mnt/hdd-storage/vm-external-storage/immich /mnt/external-storage/immich/
|
# to mount the trueNas external library: sudo mount 192.168.178.36:/mnt/hdd-storage/vm-external-storage/immich /mnt/external-storage/immich/
|
||||||
- ${IMMICH_EXTERNAL_PATH}:/usr/src/app/external:ro
|
- ${IMMICH_EXTERNAL_PATH}:/usr/src/app/external:ro
|
||||||
- ${MEDIA_PATH}/immich/data/library:/usr/src/app/upload
|
- ${MEDIA_PATH}/immich/data/library:/usr/src/app/upload
|
||||||
- /etc/localtime:/etc/localtime:ro
|
- /etc/localtime:/etc/localtime:ro
|
||||||
@@ -38,6 +38,8 @@ services:
|
|||||||
service: default
|
service: default
|
||||||
container_name: immich_machine_learning
|
container_name: immich_machine_learning
|
||||||
image: ghcr.io/immich-app/immich-machine-learning:release
|
image: ghcr.io/immich-app/immich-machine-learning:release
|
||||||
|
ports:
|
||||||
|
- 3003:3003
|
||||||
volumes:
|
volumes:
|
||||||
- ${MEDIA_PATH}/immich/data/model-cache:/cache
|
- ${MEDIA_PATH}/immich/data/model-cache:/cache
|
||||||
labels:
|
labels:
|
||||||
|
|||||||
@@ -1,11 +0,0 @@
|
|||||||
services:
|
|
||||||
sponsorblock:
|
|
||||||
extends:
|
|
||||||
file: ${TEMPLATES_PATH}
|
|
||||||
service: default
|
|
||||||
image: ghcr.io/dmunozv04/isponsorblocktv
|
|
||||||
container_name: sponsorblock
|
|
||||||
networks:
|
|
||||||
- ip4net
|
|
||||||
volumes:
|
|
||||||
- ${SERVICE_PATH}/sponsorblock/data:/app/data
|
|
||||||
26
project/service/vaultwarden/vaultwarden.yml
Normal file
26
project/service/vaultwarden/vaultwarden.yml
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
services:
|
||||||
|
vaultwarden:
|
||||||
|
extends:
|
||||||
|
file: ${TEMPLATES_PATH}
|
||||||
|
service: default
|
||||||
|
image: vaultwarden/server:latest
|
||||||
|
container_name: vaultwarden
|
||||||
|
ports:
|
||||||
|
- 4018:80
|
||||||
|
networks:
|
||||||
|
- ip6net
|
||||||
|
environment:
|
||||||
|
DOMAIN: "https://vaultwarden.${PUBLIC_DOMAIN}"
|
||||||
|
volumes:
|
||||||
|
- ${SERVICE_PATH}/vaultwarden/data:/data/
|
||||||
|
labels:
|
||||||
|
# Watchtower
|
||||||
|
- "com.centurylinklabs.watchtower.enable=true"
|
||||||
|
# Traefik
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.vaultwarden.rule=Host(`vaultwarden.${PUBLIC_DOMAIN}`)"
|
||||||
|
- "traefik.http.routers.vaultwarden.entrypoints=https"
|
||||||
|
- "traefik.http.routers.vaultwarden.tls=true"
|
||||||
|
- "traefik.http.routers.vaultwarden.tls.certresolver=myresolver"
|
||||||
|
# Middlewares
|
||||||
|
- "traefik.http.routers.vaultwarden.middlewares=crowdsec-bouncer@file"
|
||||||
Reference in New Issue
Block a user