Working Komodo setup with Docker

stacks not moved yet
This commit is contained in:
Chris Toph 2025-01-11 03:52:58 -05:00
parent 80306d1087
commit ac410d3628
3 changed files with 396 additions and 160 deletions

View file

@ -1,44 +1,39 @@
{ modulesPath, config, pkgs, hostName, ... }: {
modulesPath,
config,
pkgs,
hostName,
...
}:
{ {
## MODULES & IMPORTS ## ## MODULES & IMPORTS ##
imports = [ imports = [
# Common Modules # Common Modules
../../common/lxc ../../common/lxc
../../common/ssh ../../common/ssh
# Import hardware configuration. # Import hardware configuration.
./hardware.nix ./hardware.nix
# Local Modules # Local Modules
./modules/frp ./modules/frp
./modules/komodo ./modules/komodo
]; ];
## NETWORKING ## ## NETWORKING ##
networking.firewall = { networking.firewall = {
allowedTCPPorts = [ 22 80 443 9120 ]; allowedTCPPorts = [
allowedUDPPorts = [ ]; 22
interfaces.podman1 = { 80
# so that containers find eachother's names 443
allowedUDPPorts = [ 53 ]; 9120
};
};
systemd.services.create-wordpress-network = with config.virtualisation.oci-containers; {
serviceConfig.Type = "oneshot";
wantedBy = [
"${backend}-komodo.service"
"${backend}-mongo.service"
"${backend}-periphery.service"
]; ];
script = '' allowedUDPPorts = [ ];
${pkgs.podman}/bin/podman network exists komodo-net || \
${pkgs.podman}/bin/podman network create komodo-net
'';
}; };
## ENVIORMENT & PACKAGES ## ## ENVIORMENT & PACKAGES ##
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
compose2nix
git git
micro micro
openssh openssh
@ -52,7 +47,4 @@
}; };
## PROGRAMS & SERVICES ## ## PROGRAMS & SERVICES ##
# Enable podman
virtualisation.podman.enable = true;
virtualisation.oci-containers.backend = "podman";
} }

View file

@ -1,23 +1,25 @@
########################## ################################
# KOMODO COMPOSE - MONGO # # 🦎 KOMODO COMPOSE - MONGO 🦎 #
########################## ################################
## This compose file will deploy: ## This compose file will deploy:
## 1. MongoDB ## 1. MongoDB
## 2. Komodo Core ## 2. Komodo Core
## 3. Komodo Periphery ## 3. Komodo Periphery
name: komodo
services: services:
mongo: mongo:
image: mongo image: mongo
command: --quiet # suppress mongo logs a bit labels:
komodo.skip: # Prevent Komodo from stopping with StopAllContainers
command: --quiet --wiredTigerCacheSizeGB 0.25
restart: unless-stopped restart: unless-stopped
logging: logging:
driver: local # enable log rotation by default. see `https://docs.docker.com/config/containers/logging/local/` driver: ${COMPOSE_LOGGING_DRIVER:-local}
networks: networks:
- default - default
ports: # ports:
- 27017:27017 # - 27017:27017
volumes: volumes:
- mongo-data:/data/db - mongo-data:/data/db
- mongo-config:/data/configdb - mongo-config:/data/configdb
@ -26,74 +28,73 @@ services:
MONGO_INITDB_ROOT_PASSWORD: ${DB_PASSWORD} MONGO_INITDB_ROOT_PASSWORD: ${DB_PASSWORD}
core: core:
image: ghcr.io/mbecker20/komodo:latest image: ghcr.io/mbecker20/komodo:${COMPOSE_KOMODO_IMAGE_TAG:-latest}
# image: ghcr.io/mbecker20/komodo:latest-aarch64 ## Use for arm support labels:
komodo.skip: # Prevent Komodo from stopping with StopAllContainers
restart: unless-stopped restart: unless-stopped
depends_on: depends_on:
- mongo - mongo
logging: logging:
driver: local driver: ${COMPOSE_LOGGING_DRIVER:-local}
networks: networks:
- default - default
ports: ports:
- 9120:9120 - 9120:9120
# volumes: # Optionally mount a custom core.config.toml env_file: ./komodo.env
# - /path/to/core.config.toml:/config/config.toml environment:
# extra_hosts: # allows for systemd Periphery connection at "http://host.docker.internal:8120" KOMODO_DATABASE_ADDRESS: mongo:27017
KOMODO_DATABASE_USERNAME: ${DB_USERNAME}
KOMODO_DATABASE_PASSWORD: ${DB_PASSWORD}
volumes:
## Core cache for repos for latest commit hash / contents
- repo-cache:/repo-cache
## Store sync files on server
# - /path/to/syncs:/syncs
## Optionally mount a custom core.config.toml
# - /path/to/core.config.toml:/config/config.toml
## Allows for systemd Periphery connection at
## "http://host.docker.internal:8120"
# extra_hosts:
# - host.docker.internal:host-gateway # - host.docker.internal:host-gateway
environment: # https://github.com/mbecker20/komodo/blob/main/config/core.config.toml
KOMODO_HOST: ${KOMODO_HOST}
KOMODO_TITLE: ${KOMODO_TITLE}
KOMODO_ENSURE_SERVER: http://periphery:8120
## Mongo
KOMODO_MONGO_ADDRESS: mongo:27017
KOMODO_MONGO_USERNAME: ${DB_USERNAME}
KOMODO_MONGO_PASSWORD: ${DB_PASSWORD}
## Secrets
KOMODO_PASSKEY: ${KOMODO_PASSKEY}
KOMODO_WEBHOOK_SECRET: ${KOMODO_WEBHOOK_SECRET}
KOMODO_JWT_SECRET: ${KOMODO_JWT_SECRET}
## Auth
KOMODO_LOCAL_AUTH: ${KOMODO_LOCAL_AUTH}
KOMODO_DISABLE_USER_REGISTRATION: ${KOMODO_DISABLE_USER_REGISTRATION}
## Github Oauth
KOMODO_GITHUB_OAUTH_ENABLED: ${KOMODO_GITHUB_OAUTH_ENABLED}
KOMODO_GITHUB_OAUTH_ID: ${KOMODO_GITHUB_OAUTH_ID}
KOMODO_GITHUB_OAUTH_SECRET: ${KOMODO_GITHUB_OAUTH_SECRET}
## Google Oauth
KOMODO_GOOGLE_OAUTH_ENABLED: ${KOMODO_GOOGLE_OAUTH_ENABLED}
KOMODO_GOOGLE_OAUTH_ID: ${KOMODO_GOOGLE_OAUTH_ID}
KOMODO_GOOGLE_OAUTH_SECRET: ${KOMODO_GOOGLE_OAUTH_SECRET}
## Aws
KOMODO_AWS_ACCESS_KEY_ID: ${KOMODO_AWS_ACCESS_KEY_ID}
KOMODO_AWS_SECRET_ACCESS_KEY: ${KOMODO_AWS_SECRET_ACCESS_KEY}
## Hetzner
KOMODO_HETZNER_TOKEN: ${KOMODO_HETZNER_TOKEN}
## Deploy Periphery container using this block, ## Deploy Periphery container using this block,
## or deploy the Periphery binary with systemd using https://github.com/mbecker20/komodo/tree/main/scripts ## or deploy the Periphery binary with systemd using
## https://github.com/mbecker20/komodo/tree/main/scripts
periphery: periphery:
image: ghcr.io/mbecker20/periphery:latest image: ghcr.io/mbecker20/periphery:${COMPOSE_KOMODO_IMAGE_TAG:-latest}
# image: ghcr.io/mbecker20/periphery:latest-aarch64 # Use for arm support labels:
komodo.skip: # Prevent Komodo from stopping with StopAllContainers
restart: unless-stopped
logging: logging:
driver: local driver: ${COMPOSE_LOGGING_DRIVER:-local}
networks: networks:
- default - default
env_file: ./komodo.env
volumes: volumes:
## Mount external docker socket
- /var/run/docker.sock:/var/run/docker.sock - /var/run/docker.sock:/var/run/docker.sock
- repos:/etc/komodo/repos # manage repos in a docker volume, or change it to an accessible host directory. ## Allow Periphery to see processes outside of container
- stacks:/etc/komodo/stacks # manage stack files in a docker volume, or change it to an accessible host directory. - /proc:/proc
environment: ## use self signed certs in docker volume,
# If the disk size is overreporting, can use one of these to ## or mount your own signed certs.
# whitelist / blacklist the disks to filter them, whichever is easier. - ssl-certs:/etc/komodo/ssl
# Accepts comma separated list of paths. ## manage repos in a docker volume,
# Usually whitelisting just /etc/hostname gives correct size. ## or change it to an accessible host directory.
PERIPHERY_INCLUDE_DISK_MOUNTS: /etc/hostname - repos:/etc/komodo/repos
# PERIPHERY_EXCLUDE_DISK_MOUNTS: /snap,/etc/repos ## manage stack files in a docker volume,
## or change it to an accessible host directory.
- stacks:/etc/komodo/stacks
## Optionally mount a path to store compose files
# - /path/to/compose:/host/compose
volumes: volumes:
# Mongo
mongo-data: mongo-data:
mongo-config: mongo-config:
# Core
repo-cache:
# Periphery
ssl-certs:
repos: repos:
stacks: stacks:

View file

@ -1,72 +1,315 @@
{config, pkgs, ... }: # Auto-generated using compose2nix v0.3.1.
{ pkgs, lib, ... }:
{ {
config.virtualisation.oci-containers.containers = { # Runtime
mongo = { virtualisation.docker = {
image = "docker.io/mongo"; enable = true;
cmd = [ "--quiet" ]; autoPrune.enable = true;
autoStart = true; };
extraOptions = [ "--network=komodo-net" ]; virtualisation.oci-containers.backend = "docker";
log-driver = "passthrough-tty";
hostname = "mongo";
ports = [ "27017:27017" ];
volumes = [
"/mnt/DockerStorage/komodo/mongo/data:/data/db"
"/mnt/DockerStorage/komodo/mongo/config:/data/configdb"
];
environmentFiles = [ ./komodo.env ];
environment = {
MONGO_INITDB_ROOT_USERNAME = "\${DB_USERNAME}";
MONGO_INITDB_ROOT_PASSWORD = "\${DB_PASSWORD}";
};
};
komodo = { # Containers
image = "ghcr.io/mbecker20/komodo:latest"; virtualisation.oci-containers.containers."komodo-core" = {
autoStart = true; image = "ghcr.io/mbecker20/komodo:latest";
extraOptions = [ "--network=komodo-net" ]; environment = {
dependsOn = [ "mongo" ]; "COMPOSE_KOMODO_IMAGE_TAG" = "latest";
log-driver = "passthrough"; "DB_PASSWORD" = "[REDACTED]";
hostname = "komodo"; "DB_USERNAME" = "admin";
ports = [ "9120:9120" ]; "KOMODO_DATABASE_ADDRESS" = "mongo:27017";
environmentFiles = [ ./komodo.env ]; "KOMODO_DATABASE_PASSWORD" = "[REDACTED]";
environment = { "KOMODO_DATABASE_USERNAME" = "admin";
KOMODO_HOST = "\${KOMODO_HOST}"; "KOMODO_DISABLE_CONFIRM_DIALOG" = "false";
KOMODO_TITLE = "\${KOMODO_TITLE}"; "KOMODO_DISABLE_NON_ADMIN_CREATE" = "false";
KOMODO_ENSURE_SERVER = "http://periphery:8120"; "KOMODO_DISABLE_USER_REGISTRATION" = "false";
KOMODO_MONGO_ADDRESS = "mongo:27017"; "KOMODO_ENABLE_NEW_USERS" = "false";
KOMODO_MONGO_USERNAME = "\${DB_USERNAME}"; "KOMODO_FIRST_SERVER" = "https://periphery:8120";
KOMODO_MONGO_PASSWORD = "\${DB_PASSWORD}"; "KOMODO_GITHUB_OAUTH_ENABLED" = "false";
KOMODO_PASSKEY = "\${KOMODO_PASSKEY}"; "KOMODO_GOOGLE_OAUTH_ENABLED" = "false";
KOMODO_WEBHOOK_SECRET = "\${KOMODO_WEBHOOK_SECRET}"; "KOMODO_JWT_SECRET" = "x5jVLA6ClfJKaOVymKtLUbFJbWnA2mGS5AbKL5FoJmB9fdZ30BzMAzXXcfLbFdxT";
KOMODO_JWT_SECRET = "\${KOMODO_JWT_SECRET}"; "KOMODO_JWT_TTL" = "1-day";
KOMODO_LOCAL_AUTH = "\${KOMODO_LOCAL_AUTH}"; "KOMODO_LOCAL_AUTH" = "true";
KOMODO_DISABLE_USER_REGISTRATION = "\${KOMODO_DISABLE_USER_REGISTRATION}"; "KOMODO_MONITORING_INTERVAL" = "15-sec";
KOMODO_GITHUB_OAUTH_ENABLED = "\${KOMODO_GITHUB_OAUTH_ENABLED}"; "KOMODO_OIDC_ENABLED" = "false";
KOMODO_GITHUB_OAUTH_ID = "\${KOMODO_GITHUB_OAUTH_ID}"; "KOMODO_PASSKEY" = "tvjs5utkaW0Xvpru7qjEKJF3w6RdkBUm98StyOGKJFy5kdpQ3ZRzJbSyJmpMYIhA";
KOMODO_GITHUB_OAUTH_SECRET = "\${KOMODO_GITHUB_OAUTH_SECRET}"; "KOMODO_RESOURCE_POLL_INTERVAL" = "5-min";
KOMODO_GOOGLE_OAUTH_ENABLED = "\${KOMODO_GOOGLE_OAUTH_ENABLED}"; "KOMODO_TITLE" = "Komodo";
KOMODO_GOOGLE_OAUTH_ID = "\${KOMODO_GOOGLE_OAUTH_ID}"; "KOMODO_TRANSPARENT_MODE" = "false";
KOMODO_GOOGLE_OAUTH_SECRET = "\${KOMODO_GOOGLE_OAUTH_SECRET}"; "KOMODO_WEBHOOK_SECRET" = "ZUjiO97F9z3gliI8nIfmxzhbtP1TZ9FJUGr870sGxIhtxXMshRwHfhELScXMnQxK";
KOMODO_AWS_ACCESS_KEY_ID = "\${KOMODO_AWS_ACCESS_KEY_ID}"; "PASSKEY" = "tvjs5utkaW0Xvpru7qjEKJF3w6RdkBUm98StyOGKJFy5kdpQ3ZRzJbSyJmpMYIhA";
KOMODO_AWS_SECRET_ACCESS_KEY = "\${KOMODO_AWS_SECRET_ACCESS_KEY}"; "PERIPHERY_INCLUDE_DISK_MOUNTS" = "/etc/hostname";
KOMODO_HETZNER_TOKEN = "\${KOMODO_HETZNER_TOKEN}"; "PERIPHERY_PASSKEYS" = "tvjs5utkaW0Xvpru7qjEKJF3w6RdkBUm98StyOGKJFy5kdpQ3ZRzJbSyJmpMYIhA";
}; "PERIPHERY_SSL_ENABLED" = "true";
}; };
environmentFiles = [
"/home/toph/git/dotfiles/host/komodo/modules/komodo/komodo.env"
];
volumes = [
"/mnt/DockerStorage/komodo/cache:/repo-cache:rw"
];
ports = [
"9120:9120/tcp"
];
labels = {
"komodo.skip" = "";
};
dependsOn = [
"komodo-mongo"
];
log-driver = "local";
extraOptions = [
"--network-alias=core"
"--network=komodo_default"
];
};
periphery = { systemd.services."docker-komodo-core" = {
image = "ghcr.io/mbecker20/periphery:latest"; serviceConfig = {
autoStart = true; Restart = lib.mkOverride 90 "always";
extraOptions = [ "--network=komodo-net" ]; RestartMaxDelaySec = lib.mkOverride 90 "1m";
log-driver = "passthrough-tty"; RestartSec = lib.mkOverride 90 "100ms";
hostname = "periphery"; RestartSteps = lib.mkOverride 90 9;
volumes = [
"/var/run/podman.sock:/var/run/docker.sock"
"/mnt/DockerStorage/komodo/repos:/etc/komodo/repos"
"mnt/DockerStorage/komodo/stacks:/etc/komodo/stacks"
];
environment = {
PERIPHERY_INCLUDE_DISK_MOUNTS = "/etc/hostname";
};
}; };
after = [
"docker-network-komodo_default.service"
# "docker-volume-komodo_repo-cache.service"
];
requires = [
"docker-network-komodo_default.service"
# "docker-volume-komodo_repo-cache.service"
];
partOf = [
"docker-compose-komodo-root.target"
];
wantedBy = [
"docker-compose-komodo-root.target"
];
};
virtualisation.oci-containers.containers."komodo-mongo" = {
image = "mongo";
environment = {
"MONGO_INITDB_ROOT_PASSWORD" = "[REDACTED]";
"MONGO_INITDB_ROOT_USERNAME" = "admin";
};
environmentFiles = [
"/home/toph/git/dotfiles/host/komodo/modules/komodo/komodo.env"
];
volumes = [
"/mnt/DockerStorage/komodo/mongo/config:/data/configdb:rw"
"/mnt/DockerStorage/komodo/mongo/data:/data/db:rw"
];
cmd = [
"--quiet"
"--wiredTigerCacheSizeGB"
"0.25"
];
labels = {
"komodo.skip" = "";
};
log-driver = "local";
extraOptions = [
"--network-alias=mongo"
"--network=komodo_default"
];
};
systemd.services."docker-komodo-mongo" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-komodo_default.service"
# "docker-volume-komodo_mongo-config.service"
# "docker-volume-komodo_mongo-data.service"
];
requires = [
"docker-network-komodo_default.service"
# "docker-volume-komodo_mongo-config.service"
# "docker-volume-komodo_mongo-data.service"
];
partOf = [
"docker-compose-komodo-root.target"
];
wantedBy = [
"docker-compose-komodo-root.target"
];
};
virtualisation.oci-containers.containers."komodo-periphery" = {
image = "ghcr.io/mbecker20/periphery:latest";
environment = {
"COMPOSE_KOMODO_IMAGE_TAG" = "latest";
"DB_PASSWORD" = "[REDACTED]";
"DB_USERNAME" = "admin";
"KOMODO_DISABLE_CONFIRM_DIALOG" = "false";
"KOMODO_DISABLE_NON_ADMIN_CREATE" = "false";
"KOMODO_DISABLE_USER_REGISTRATION" = "false";
"KOMODO_ENABLE_NEW_USERS" = "false";
"KOMODO_FIRST_SERVER" = "https://periphery:8120";
"KOMODO_GITHUB_OAUTH_ENABLED" = "false";
"KOMODO_GOOGLE_OAUTH_ENABLED" = "false";
"KOMODO_JWT_SECRET" = "x5jVLA6ClfJKaOVymKtLUbFJbWnA2mGS5AbKL5FoJmB9fdZ30BzMAzXXcfLbFdxT";
"KOMODO_JWT_TTL" = "1-day";
"KOMODO_LOCAL_AUTH" = "true";
"KOMODO_MONITORING_INTERVAL" = "15-sec";
"KOMODO_OIDC_ENABLED" = "false";
"KOMODO_PASSKEY" = "tvjs5utkaW0Xvpru7qjEKJF3w6RdkBUm98StyOGKJFy5kdpQ3ZRzJbSyJmpMYIhA";
"KOMODO_RESOURCE_POLL_INTERVAL" = "5-min";
"KOMODO_TITLE" = "Komodo";
"KOMODO_TRANSPARENT_MODE" = "false";
"KOMODO_WEBHOOK_SECRET" = "ZUjiO97F9z3gliI8nIfmxzhbtP1TZ9FJUGr870sGxIhtxXMshRwHfhELScXMnQxK";
"PASSKEY" = "tvjs5utkaW0Xvpru7qjEKJF3w6RdkBUm98StyOGKJFy5kdpQ3ZRzJbSyJmpMYIhA";
"PERIPHERY_INCLUDE_DISK_MOUNTS" = "/etc/hostname";
"PERIPHERY_PASSKEYS" = "tvjs5utkaW0Xvpru7qjEKJF3w6RdkBUm98StyOGKJFy5kdpQ3ZRzJbSyJmpMYIhA";
"PERIPHERY_SSL_ENABLED" = "true";
};
environmentFiles = [
"/home/toph/git/dotfiles/host/komodo/modules/komodo/komodo.env"
];
volumes = [
"/proc:/proc:rw"
"/var/run/docker.sock:/var/run/docker.sock:rw"
"/mnt/DockerStorage/komodo/repos:/etc/komodo/repos:rw"
"/mnt/DockerStorage/komodo/ssl:/etc/komodo/ssl:rw"
"/mnt/DockerStorage/komodo/stacks:/etc/komodo/stacks:rw"
];
labels = {
"komodo.skip" = "";
};
log-driver = "local";
extraOptions = [
"--network-alias=periphery"
"--network=komodo_default"
];
};
systemd.services."docker-komodo-periphery" = {
serviceConfig = {
Restart = lib.mkOverride 90 "always";
RestartMaxDelaySec = lib.mkOverride 90 "1m";
RestartSec = lib.mkOverride 90 "100ms";
RestartSteps = lib.mkOverride 90 9;
};
after = [
"docker-network-komodo_default.service"
# "docker-volume-komodo_repos.service"
# "docker-volume-komodo_ssl-certs.service"
# "docker-volume-komodo_stacks.service"
];
requires = [
"docker-network-komodo_default.service"
# "docker-volume-komodo_repos.service"
# "docker-volume-komodo_ssl-certs.service"
# "docker-volume-komodo_stacks.service"
];
partOf = [
"docker-compose-komodo-root.target"
];
wantedBy = [
"docker-compose-komodo-root.target"
];
};
# Networks
systemd.services."docker-network-komodo_default" = {
path = [ pkgs.docker ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
ExecStop = "docker network rm -f komodo_default";
};
script = ''
docker network inspect komodo_default || docker network create komodo_default
'';
partOf = [ "docker-compose-komodo-root.target" ];
wantedBy = [ "docker-compose-komodo-root.target" ];
};
# # Volumes
# systemd.services."docker-volume-komodo_mongo-config" = {
# path = [ pkgs.docker ];
# serviceConfig = {
# Type = "oneshot";
# RemainAfterExit = true;
# };
# script = ''
# docker volume inspect komodo_mongo-config || docker volume create komodo_mongo-config
# '';
# partOf = [ "docker-compose-komodo-root.target" ];
# wantedBy = [ "docker-compose-komodo-root.target" ];
# };
# systemd.services."docker-volume-komodo_mongo-data" = {
# path = [ pkgs.docker ];
# serviceConfig = {
# Type = "oneshot";
# RemainAfterExit = true;
# };
# script = ''
# docker volume inspect komodo_mongo-data || docker volume create komodo_mongo-data
# '';
# partOf = [ "docker-compose-komodo-root.target" ];
# wantedBy = [ "docker-compose-komodo-root.target" ];
# };
# systemd.services."docker-volume-komodo_repo-cache" = {
# path = [ pkgs.docker ];
# serviceConfig = {
# Type = "oneshot";
# RemainAfterExit = true;
# };
# script = ''
# docker volume inspect komodo_repo-cache || docker volume create komodo_repo-cache
# '';
# partOf = [ "docker-compose-komodo-root.target" ];
# wantedBy = [ "docker-compose-komodo-root.target" ];
# };
# systemd.services."docker-volume-komodo_repos" = {
# path = [ pkgs.docker ];
# serviceConfig = {
# Type = "oneshot";
# RemainAfterExit = true;
# };
# script = ''
# docker volume inspect komodo_repos || docker volume create komodo_repos
# '';
# partOf = [ "docker-compose-komodo-root.target" ];
# wantedBy = [ "docker-compose-komodo-root.target" ];
# };
# systemd.services."docker-volume-komodo_ssl-certs" = {
# path = [ pkgs.docker ];
# serviceConfig = {
# Type = "oneshot";
# RemainAfterExit = true;
# };
# script = ''
# docker volume inspect komodo_ssl-certs || docker volume create komodo_ssl-certs
# '';
# partOf = [ "docker-compose-komodo-root.target" ];
# wantedBy = [ "docker-compose-komodo-root.target" ];
# };
# systemd.services."docker-volume-komodo_stacks" = {
# path = [ pkgs.docker ];
# serviceConfig = {
# Type = "oneshot";
# RemainAfterExit = true;
# };
# script = ''
# docker volume inspect komodo_stacks || docker volume create komodo_stacks
# '';
# partOf = [ "docker-compose-komodo-root.target" ];
# wantedBy = [ "docker-compose-komodo-root.target" ];
# };
# Root service
# When started, this will automatically create all resources and start
# the containers. When stopped, this will teardown all resources.
systemd.targets."docker-compose-komodo-root" = {
unitConfig = {
Description = "Root target generated by compose2nix.";
};
wantedBy = [ "multi-user.target" ];
}; };
} }