diff --git a/docs/generated/compose-files.txt b/docs/generated/compose-files.txt index b602f4c..8b1c05c 100644 --- a/docs/generated/compose-files.txt +++ b/docs/generated/compose-files.txt @@ -4,6 +4,8 @@ apps/gramps/docker-compose.yml apps/nextcloud/docker-compose.yml apps/passbolt/docker-compose.yml apps/searxng/docker-compose.yml +apps/shift-recorder/docker-compose.yml +apps/stockfill/docker-compose.yml core/authelia/docker-compose.yml core/crowdsec/docker-compose.yml core/error-pages/docker-compose.yml diff --git a/docs/generated/compose-inventory.md b/docs/generated/compose-inventory.md index ffffaac..4354f2c 100644 --- a/docs/generated/compose-inventory.md +++ b/docs/generated/compose-inventory.md @@ -1,12 +1,12 @@ # Docker Compose Inventory -Source fingerprint: `232be78ef441` +Source fingerprint: `0fad36c3fed6` ## Summary | Item | Count | |---|---:| -| Services | 28 | +| Services | 30 | | Networks | 5 | | Volumes | 0 | @@ -40,6 +40,8 @@ Source fingerprint: `232be78ef441` | portainer | portainer | portainer/portainer-ce:latest | | monitoring, all, portainer | traefik | | unless-stopped | | prometheus | prometheus | prom/prometheus:latest | | monitoring, all, prometheus | monitor, traefik | | unless-stopped | | searxng-webapp | searxng-webapp | searxng/searxng | | apps, all, searxng | traefik | | always | +| shift-recorder-web | shift-recorder | | /home/nixos/docker/apps/shift-recorder | apps, all, shift-recorder | traefik | | unless-stopped | +| stockfill | stockfill | | /home/nixos/docker/apps/stockfill | apps, all, stockfill | traefik | | unless-stopped | | telegraf | telegraf | telegraf:latest | | monitoring, all, telegraf, prometheus | monitor | | unless-stopped | | traefik | traefik | traefik:3 | /home/nixos/docker/core | core, all, traefik | traefik | {'mode': 'ingress', 'target': 80, 'published': '80', 'protocol': 'tcp'}, {'mode': 'ingress', 'target': 443, 'published': '443', 'protocol': 'tcp'} | always | diff --git a/docs/generated/docker-compose.resolved.yml b/docs/generated/docker-compose.resolved.yml index c88d792..4b6259c 100644 --- a/docs/generated/docker-compose.resolved.yml +++ b/docs/generated/docker-compose.resolved.yml @@ -163,7 +163,7 @@ services: - no-new-privileges:true volumes: - type: bind - source: /root/.docker/config.json + source: /home/nixos/.docker/config.json target: /root/.docker/config.json read_only: true bind: @@ -280,8 +280,8 @@ services: - gotify container_name: gotify environment: - GOTIFY_DEFAULTUSER_NAME: dummy-user - GOTIFY_DEFAULTUSER_PASS: dummy-user + GOTIFY_DEFAULTUSER_NAME: admin + GOTIFY_DEFAULTUSER_PASS: R1m@dmin GOTIFY_REGISTRATION: "false" TZ: Australia/Brisbane image: gotify/server:latest @@ -379,14 +379,14 @@ services: GRAMPSWEB_CELERY_CONFIG__result_backend: redis://gramps-redis:6379/0 GRAMPSWEB_DEFAULT_FROM_EMAIL: beatz174@gmail.com GRAMPSWEB_EMAIL_HOST: smtp.gmail.com - GRAMPSWEB_EMAIL_HOST_PASSWORD: dummy@example.com - GRAMPSWEB_EMAIL_HOST_USER: dummy@example.com + GRAMPSWEB_EMAIL_HOST_PASSWORD: kqdw fvml wlag ldgv + GRAMPSWEB_EMAIL_HOST_USER: beatz174 GRAMPSWEB_EMAIL_PORT: "587" GRAMPSWEB_EMAIL_USE_SSL: "false" GRAMPSWEB_EMAIL_USE_STARTTLS: "true" GRAMPSWEB_RATELIMIT_STORAGE_URI: redis://gramps-redis:6379/1 GRAMPSWEB_REGISTRATION_DISABLED: "true" - GRAMPSWEB_SECRET_KEY: dummy-grampsweb_secret_key + GRAMPSWEB_SECRET_KEY: 8916e899404fa2eefe0a87ea08d3b5a1f5b7ab2a1cfc5ae3374bb9c7b0e1cf83 GRAMPSWEB_TREE: main TZ: Australia/Brisbane healthcheck: @@ -474,14 +474,14 @@ services: GRAMPSWEB_CELERY_CONFIG__result_backend: redis://gramps-redis:6379/0 GRAMPSWEB_DEFAULT_FROM_EMAIL: beatz174@gmail.com GRAMPSWEB_EMAIL_HOST: smtp.gmail.com - GRAMPSWEB_EMAIL_HOST_PASSWORD: dummy@example.com - GRAMPSWEB_EMAIL_HOST_USER: dummy@example.com + GRAMPSWEB_EMAIL_HOST_PASSWORD: kqdw fvml wlag ldgv + GRAMPSWEB_EMAIL_HOST_USER: beatz174 GRAMPSWEB_EMAIL_PORT: "587" GRAMPSWEB_EMAIL_USE_SSL: "false" GRAMPSWEB_EMAIL_USE_STARTTLS: "true" GRAMPSWEB_RATELIMIT_STORAGE_URI: redis://gramps-redis:6379/1 GRAMPSWEB_REGISTRATION_DISABLED: "true" - GRAMPSWEB_SECRET_KEY: dummy-grampsweb_secret_key + GRAMPSWEB_SECRET_KEY: 8916e899404fa2eefe0a87ea08d3b5a1f5b7ab2a1cfc5ae3374bb9c7b0e1cf83 GRAMPSWEB_TREE: main TZ: Australia/Brisbane healthcheck: @@ -549,7 +549,7 @@ services: DOCKER_INFLUXDB_INIT_MODE: setup DOCKER_INFLUXDB_INIT_ORG: pbs DOCKER_INFLUXDB_INIT_PASSWORD_FILE: /run/secrets/influxdb_init_password - DOCKER_INFLUXDB_INIT_USERNAME: dummy-user + DOCKER_INFLUXDB_INIT_USERNAME: admin healthcheck: test: - CMD-SHELL @@ -647,7 +647,7 @@ services: io.portainer.accesscontrol.public: "" traefik.docker.network: core_traefik traefik.enable: "true" - traefik.http.middlewares.mtls-bridge-auth.basicauth.users: "" + traefik.http.middlewares.mtls-bridge-auth.basicauth.users: beatzaplenty:$$2y$$05$$WAj1.xaHHoR0lmgx8UedwuIM4qv2Uz7eezY4gxASfM5KAdN8mPLOa traefik.http.middlewares.mtls-bridge-cors.headers.accesscontrolallowcredentials: "true" traefik.http.middlewares.mtls-bridge-cors.headers.accesscontrolallowheaders: authorization,content-type,x-grafana-action,x-grafana-device-id traefik.http.middlewares.mtls-bridge-cors.headers.accesscontrolallowmethods: GET,POST,PUT,PATCH,DELETE,OPTIONS @@ -690,9 +690,9 @@ services: MYSQL_DATABASE: nextcloud MYSQL_PASSWORD_FILE: /run/secrets/nextcloud_db_password MYSQL_ROOT_PASSWORD_FILE: /run/secrets/nextcloud_db_root_password - MYSQL_USER: dummyuser + MYSQL_USER: nextcloud NEXTCLOUD_ADMIN_PASSWORD_FILE: /run/secrets/nextcloud_admin_password - NEXTCLOUD_ADMIN_USER: dummy-user + NEXTCLOUD_ADMIN_USER: admin hostname: nextcloud_db healthcheck: test: @@ -772,12 +772,12 @@ services: condition: service_started required: true environment: - MAIL_DOMAIN: example.lan.ddnsgeek.com - MAIL_FROM_ADDRESS: dummy + MAIL_DOMAIN: gmail.com + MAIL_FROM_ADDRESS: beatz174 MYSQL_DATABASE: nextcloud MYSQL_HOST: nextcloud_db:3306 MYSQL_PASSWORD_FILE: /run/secrets/nextcloud_db_password - MYSQL_USER: dummyuser + MYSQL_USER: nextcloud NEXTCLOUD_TRUSTED_DOMAINS: nextcloud.lan.ddnsgeek.com OVERWRITECLIURL: https://nextcloud.lan.ddnsgeek.com OVERWRITEPROTOCOL: https @@ -786,7 +786,7 @@ services: REDIS_HOST_PORT: "6379" SMTP_AUTHTYPE: login SMTP_HOST: smtp.gmail.com - SMTP_NAME: dummy-name + SMTP_NAME: beatz174@gmail.com SMTP_PASSWORD_FILE: /run/secrets/nextcloud_smtp_password SMTP_PORT: "587" SMTP_SECURE: tls @@ -943,10 +943,10 @@ services: - passbolt container_name: passbolt-db environment: - MYSQL_DATABASE: dummy-passbolt_db_name + MYSQL_DATABASE: passbolt MYSQL_PASSWORD_FILE: /run/secrets/passbolt_db_password MYSQL_RANDOM_ROOT_PASSWORD: "true" - MYSQL_USER: dummyuser + MYSQL_USER: passbolt healthcheck: test: - CMD-SHELL @@ -989,11 +989,11 @@ services: required: true environment: APP_FULL_BASE_URL: https://passbolt.lan.ddnsgeek.com - DATASOURCES_DEFAULT_DATABASE: dummy-passbolt_db_name + DATASOURCES_DEFAULT_DATABASE: passbolt DATASOURCES_DEFAULT_HOST: passbolt-db DATASOURCES_DEFAULT_PASSWORD_FILE: /run/secrets/passbolt_db_password - DATASOURCES_DEFAULT_USERNAME: dummyuser - PASSBOLT_GPG_SERVER_KEY_FINGERPRINT: dummy-passbolt_gpg_server_key_fingerprint + DATASOURCES_DEFAULT_USERNAME: passbolt + PASSBOLT_GPG_SERVER_KEY_FINGERPRINT: CBBB2B8F3E9FACA114537ACB8965B750F7363586 healthcheck: test: - CMD-SHELL @@ -1037,7 +1037,7 @@ services: container_name: pihole-exporter environment: PIHOLE_HOSTNAME: pihole.sweet.home - PIHOLE_PASSWORD: dummy-pihole_password + PIHOLE_PASSWORD: "" PORT: "9617" image: ekofr/pihole-exporter:latest networks: @@ -1191,6 +1191,46 @@ services: - /tmp - /var - /run + shift-recorder-web: + profiles: + - apps + - all + - shift-recorder + build: + context: /home/nixos/docker/apps/shift-recorder + dockerfile: Dockerfile + container_name: shift-recorder + labels: + io.portainer.accesscontrol.public: "" + traefik.enable: "true" + traefik.http.routers.shifts.entrypoints: websecure + traefik.http.routers.shifts.rule: Host(`shifts.lan.ddnsgeek.com`) + traefik.http.routers.shifts.tls: "true" + traefik.http.routers.shifts.tls.certresolver: myresolver + traefik.http.services.shifts.loadbalancer.server.port: "80" + networks: + traefik: null + restart: unless-stopped + stockfill: + profiles: + - apps + - all + - stockfill + build: + context: /home/nixos/docker/apps/stockfill + dockerfile: Dockerfile + container_name: stockfill + labels: + io.portainer.accesscontrol.public: "" + traefik.enable: "true" + traefik.http.routers.stockfill.entrypoints: websecure + traefik.http.routers.stockfill.rule: Host(`stockfill.lan.ddnsgeek.com`) + traefik.http.routers.stockfill.tls: "true" + traefik.http.routers.stockfill.tls.certresolver: myresolver + traefik.http.services.stockfill.loadbalancer.server.port: "80" + networks: + traefik: null + restart: unless-stopped telegraf: profiles: - monitoring diff --git a/docs/generated/traefik-routes.md b/docs/generated/traefik-routes.md index 1e3d05c..caba96f 100644 --- a/docs/generated/traefik-routes.md +++ b/docs/generated/traefik-routes.md @@ -18,4 +18,6 @@ | portainer | portainer | Host(`portainer.lan.ddnsgeek.com`) | websecure | true | | 9000 | | prometheus | prometheus | Host(`prometheus.lan.ddnsgeek.com`) | websecure | | authelia | 9090 | | searxng-webapp | searxng | Host(`searxng.lan.ddnsgeek.com`) | websecure | | | 8080 | +| shift-recorder-web | shifts | Host(`shifts.lan.ddnsgeek.com`) | websecure | true | | 80 | +| stockfill | stockfill | Host(`stockfill.lan.ddnsgeek.com`) | websecure | true | | 80 | | traefik | traefik | Host(`traefik.lan.ddnsgeek.com`) | websecure | | authelia | |