feat: Add calibre
This commit is contained in:
parent
21f4957a2e
commit
316ba435c9
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
plugin: "cloud.terraform.terraform_provider"
|
plugin: "cloud.terraform.terraform_provider"
|
||||||
# defaults to terraform, but we're using tofu
|
# defaults to terraform, but we're using tofu
|
||||||
binary_path: "/usr/bin/tofu"
|
binary_path: "tofu"
|
||||||
project_path: "../tf"
|
project_path: "../tf"
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
plugin: "cloud.terraform.terraform_provider"
|
plugin: "cloud.terraform.terraform_provider"
|
||||||
# defaults to terraform, but we're using tofu
|
# defaults to terraform, but we're using tofu
|
||||||
binary_path: "/usr/bin/tofu"
|
binary_path: "tofu"
|
||||||
project_path: "../tf"
|
project_path: "../tf"
|
||||||
|
@ -1,6 +1,6 @@
|
|||||||
---
|
---
|
||||||
plugin: "cloud.terraform.terraform_provider"
|
plugin: "cloud.terraform.terraform_provider"
|
||||||
# defaults to terraform, but we're using tofu
|
# defaults to terraform, but we're using tofu
|
||||||
binary_path: "/usr/bin/tofu"
|
binary_path: "tofu"
|
||||||
project_path: "../tf"
|
project_path: "../tf"
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
plugin: "cloud.terraform.terraform_provider"
|
plugin: "cloud.terraform.terraform_provider"
|
||||||
# defaults to terraform, but we're using tofu
|
# defaults to terraform, but we're using tofu
|
||||||
binary_path: "/usr/bin/tofu"
|
binary_path: "tofu"
|
||||||
project_path: "../tf"
|
project_path: "../tf"
|
||||||
|
80
docker/compose/calibre/docker-compose.yml
Normal file
80
docker/compose/calibre/docker-compose.yml
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
---
|
||||||
|
version: "3.8"
|
||||||
|
|
||||||
|
networks:
|
||||||
|
traefik:
|
||||||
|
external: true
|
||||||
|
calibre:
|
||||||
|
name: calibre
|
||||||
|
|
||||||
|
services:
|
||||||
|
calibre:
|
||||||
|
image: lscr.io/linuxserver/calibre:7.26.0
|
||||||
|
container_name: calibre
|
||||||
|
security_opt:
|
||||||
|
- seccomp:unconfined #optional
|
||||||
|
environment:
|
||||||
|
- PUID=${PUID:-8796}
|
||||||
|
- PGID=${PGID:-3005}
|
||||||
|
- TZ=America/Vancouver
|
||||||
|
# - PASSWORD= #optional
|
||||||
|
# - CLI_ARGS= #optional
|
||||||
|
volumes:
|
||||||
|
- ${CALIBRE_CONFIG:-/mnt/docker/volumes/calibre/calibre-config}:/config
|
||||||
|
- ${CALIBRE_BOOKS:-/mnt/docker/volumes/calibre/books}:/books
|
||||||
|
ports:
|
||||||
|
- 8081:8080
|
||||||
|
- 8182:8181
|
||||||
|
- 8082:8081
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- traefik
|
||||||
|
- calibre
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.calibre.rule=Host(`${CALIBRE_HOST:-calibre.jumper.mnke.org}`)"
|
||||||
|
- "traefik.http.routers.calibre.entrypoints=websecure"
|
||||||
|
- "traefik.http.routers.calibre.tls=true"
|
||||||
|
- "traefik.http.services.calibre.loadbalancer.server.port=8080"
|
||||||
|
- "traefik.docker.network=traefik"
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.15'
|
||||||
|
memory: 512M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 128M
|
||||||
|
|
||||||
|
calibre-web:
|
||||||
|
image: lscr.io/linuxserver/calibre-web:0.6.24
|
||||||
|
container_name: calibre-web
|
||||||
|
environment:
|
||||||
|
- PUID=${PUID:-8796}
|
||||||
|
- PGID=${PGID:-3005}
|
||||||
|
- TZ=America/Vancouver
|
||||||
|
# - DOCKER_MODS=linuxserver/mods:universal-calibre #optional
|
||||||
|
# - OAUTHLIB_RELAX_TOKEN_SCOPE=1 #optional
|
||||||
|
volumes:
|
||||||
|
- ${CALIBRE_WEB_CONFIG:-/mnt/docker/volumes/calibre/calibre-web-config}:/config
|
||||||
|
- ${CALIBRE_BOOKS:-/mnt/docker/volumes/calibre/books}:/books
|
||||||
|
|
||||||
|
restart: unless-stopped
|
||||||
|
networks:
|
||||||
|
- traefik
|
||||||
|
- calibre
|
||||||
|
labels:
|
||||||
|
- "traefik.enable=true"
|
||||||
|
- "traefik.http.routers.calibre-web.rule=Host(`${CALIBRE_WEB_HOST:-calibre-web.jumper.mnke.org}`)"
|
||||||
|
- "traefik.http.routers.calibre-web.entrypoints=websecure"
|
||||||
|
- "traefik.http.routers.calibre-web.tls=true"
|
||||||
|
- "traefik.http.services.calibre-web.loadbalancer.server.port=8083"
|
||||||
|
- "traefik.docker.network=traefik"
|
||||||
|
deploy:
|
||||||
|
resources:
|
||||||
|
limits:
|
||||||
|
cpus: '0.25'
|
||||||
|
memory: 512M
|
||||||
|
reservations:
|
||||||
|
cpus: '0.1'
|
||||||
|
memory: 128M
|
12
flake.lock
generated
12
flake.lock
generated
@ -2,16 +2,16 @@
|
|||||||
"nodes": {
|
"nodes": {
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1739736696,
|
"lastModified": 1740695751,
|
||||||
"narHash": "sha256-zON2GNBkzsIyALlOCFiEBcIjI4w38GYOb+P+R4S8Jsw=",
|
"narHash": "sha256-D+R+kFxy1KsheiIzkkx/6L63wEHBYX21OIwlFV8JvDs=",
|
||||||
"rev": "d74a2335ac9c133d6bbec9fc98d91a77f1604c1f",
|
"rev": "6313551cd05425cd5b3e63fe47dbc324eabb15e4",
|
||||||
"revCount": 754461,
|
"revCount": 760502,
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://api.flakehub.com/f/pinned/NixOS/nixpkgs/0.1.754461%2Brev-d74a2335ac9c133d6bbec9fc98d91a77f1604c1f/01951426-5a87-7b75-8413-1a0d9ec5ff04/source.tar.gz"
|
"url": "https://api.flakehub.com/f/pinned/NixOS/nixpkgs/0.1.760502%2Brev-6313551cd05425cd5b3e63fe47dbc324eabb15e4/01954f5d-9aa0-742c-829e-dfa0c472c2db/source.tar.gz"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://flakehub.com/f/NixOS/nixpkgs/0.1.%2A.tar.gz"
|
"url": "https://flakehub.com/f/NixOS/nixpkgs/0.1.tar.gz"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"root": {
|
"root": {
|
||||||
|
15
flake.nix
15
flake.nix
@ -14,11 +14,16 @@
|
|||||||
devShells = forEachSupportedSystem ({ pkgs }: {
|
devShells = forEachSupportedSystem ({ pkgs }: {
|
||||||
default = pkgs.mkShell {
|
default = pkgs.mkShell {
|
||||||
venvDir = ".venv";
|
venvDir = ".venv";
|
||||||
packages = with pkgs; [ python311 ] ++
|
packages = with pkgs; [
|
||||||
(with pkgs.python311Packages; [
|
python311
|
||||||
pip
|
opentofu
|
||||||
venvShellHook
|
kubectl
|
||||||
]);
|
k9s
|
||||||
|
] ++
|
||||||
|
(with pkgs.python311Packages; [
|
||||||
|
pip
|
||||||
|
venvShellHook
|
||||||
|
]);
|
||||||
};
|
};
|
||||||
});
|
});
|
||||||
};
|
};
|
||||||
|
@ -71,7 +71,7 @@ spec:
|
|||||||
enabled: true
|
enabled: true
|
||||||
storageClass: nfs-client
|
storageClass: nfs-client
|
||||||
accessMode: ReadWriteMany
|
accessMode: ReadWriteMany
|
||||||
size: 64Gi
|
size: 128Gi
|
||||||
|
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
# it takes so long for nextcloud to start up
|
# it takes so long for nextcloud to start up
|
||||||
|
Loading…
x
Reference in New Issue
Block a user