♻️ switched from booleans enclosed in strings ("true" "false") to standard booleans. Bools are casted to strings where necessary

This commit is contained in:
HitLuca 2022-07-23 17:32:51 +02:00
parent 3a603062fa
commit 3c5dc50a8b
135 changed files with 152 additions and 164 deletions

View file

@ -8,7 +8,7 @@ If Gitea isn't powerful enough for you then consider GitLab. It's a much more po
Set `gitlab_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
To make GitLab available externally via Traefik set `gitlab_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
To make GitLab available externally via Traefik set `gitlab_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The first time you run GitLab you'll be prompted for an account's password. The password is for GitLab's `root` administrator account. From there you can log in to create additional users and further configure the application.

View file

@ -8,6 +8,6 @@ Open source home automation that puts local control and privacy first. Powered b
Set `homeassistant_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Home Assistant externally, don't forget to set `homeassistant_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Home Assistant externally, don't forget to set `homeassistant_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Home Assistant web interface can be found at http://ansible_nas_host_or_ip:8123.

View file

@ -8,7 +8,7 @@ Joomla! is an award-winning content management system (CMS), which enables you t
Set `joomla_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Joomla externally, set `joomla_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Joomla externally, set `joomla_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Joomla web interface can be found at http://ansible_nas_host_or_ip:8181.

View file

@ -11,6 +11,6 @@ An automated Comic Book downloader (cbr/cbz) for use with SABnzbd, NZBGet and to
Set `mylar_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Mylar externally, don't forget to set `mylar_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Mylar externally, don't forget to set `mylar_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Mylar web interface can be found at http://ansible_nas_host_or_ip:5858.

View file

@ -8,7 +8,7 @@ Piwigo is open source photo gallery software for the web. Designed for organisat
Set `piwigo_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Piwigo externally, set `piwigo_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Piwigo externally, set `piwigo_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Piwigo web interface can be found at http://ansible_nas_host_or_ip:16923.

View file

@ -10,6 +10,6 @@ Continuously track your internet speed
Set `speedtest_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Speedtest-Tracker externally, don't forget to set `speedtest_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Speedtest-Tracker externally, don't forget to set `speedtest_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Speedtest-Tracker interface can be found at http://ansible_nas_host_or_ip:8765.

View file

@ -8,7 +8,7 @@ TiddlyWiki is a unique non-linear notebook for capturing, organizing, and sharin
Set `tiddlywiki_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access TiddlyWiki externally, set `tiddlywiki_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access TiddlyWiki externally, set `tiddlywiki_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The TiddlyWiki web interface can be found at http://ansible_nas_host_or_ip:8092.

View file

@ -8,7 +8,7 @@ Docker Container: [https://hub.docker.com/r/ekho/utorrent](https://hub.docker.co
Set `utorrent_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access uTorrent externally, don't forget to set `utorrent_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access uTorrent externally, don't forget to set `utorrent_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The uTorrent web interface can be found at http://ansible_nas_host_or_ip:8111/gui:

View file

@ -8,7 +8,7 @@ wallabag is a self-hostable PHP application allowing you to not miss any content
Set `wallabag_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access wallabag externally, don't forget to set `wallabag_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access wallabag externally, don't forget to set `wallabag_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
I recommend using the mobile app, which will sync with this installation so you have access to your saved articles even if you don't have signal or wifi access.

View file

@ -236,7 +236,7 @@ samba_netbios_name: "{{ ansible_nas_hostname }}"
### Joomla
###
joomla_data_directory: "{{ docker_home }}/joomla"
joomla_available_externally: "false"
joomla_available_externally: false
joomla_database_password: top_secret
joomla_port: "8181"
@ -248,14 +248,14 @@ openvpn_config_directory: "{{ docker_home }}/openvpn"
###
### Guacamole
###
guacamole_available_externally: "false"
guacamole_available_externally: false
guacamole_data_directory: "{{ docker_home }}/guacamole"
guacamole_port: "8090"
###
### Krusader
###
krusader_available_externally: "false"
krusader_available_externally: false
krusader_config_directory: "{{ docker_home }}/krusader/config"
krusader_browse_directory: "/"
krusader_user_id: "0"
@ -278,7 +278,7 @@ timemachine_port: "10445"
###
### The Lounge
###
thelounge_available_externally: "false"
thelounge_available_externally: false
thelounge_data_directory: "{{ docker_home }}/thelounge"
thelounge_port_one: "113"
thelounge_port_two: "9002"
@ -286,14 +286,14 @@ thelounge_port_two: "9002"
###
### Wallabag
###
wallabag_available_externally: "false"
wallabag_available_externally: false
wallabag_data_directory: "{{ docker_home }}/wallabag"
wallabag_port: "7780"
###
### Calibre-web
###
calibre_available_externally: "false"
calibre_available_externally: false
calibre_data_directory: "{{ docker_home }}/calibre"
calibre_user_id: "0"
calibre_group_id: "0"
@ -305,7 +305,7 @@ calibre_ebook_conversion: "linuxserver/calibre-web:calibre"
###
### openHAB
###
openhab_available_externally: "false"
openhab_available_externally: false
openhab_docker_image: openhab/openhab:latest
openhab_data_directory: "{{ docker_home }}/openhab"
openhab_port_http: "7777"
@ -314,7 +314,7 @@ openhab_port_https: "7778"
###
### Ubooquity
###
ubooquity_available_externally: "false"
ubooquity_available_externally: false
ubooquity_data_directory: "{{ docker_home }}/ubooquity"
ubooquity_user_id: "0"
ubooquity_group_id: "0"

View file

@ -1,6 +1,6 @@
---
airsonic_enabled: false
airsonic_available_externally: "false"
airsonic_available_externally: false
# directories
airsonic_data_directory: "{{ docker_home }}/airsonic"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ airsonic_memory }}"
labels:
traefik.enable: "{{ airsonic_available_externally }}"
traefik.enable: "{{ airsonic_available_externally | string}}"
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.airsonic.tls.certresolver: "letsencrypt"
traefik.http.routers.airsonic.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
bazarr_enabled: false
bazarr_available_externally: "false"
bazarr_available_externally: false
# directories
bazarr_data_directory: "{{ docker_home }}/bazarr/config"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: "{{ bazarr_memory }}"
labels:
traefik.enable: "{{ bazarr_available_externally }}"
traefik.enable: "{{ bazarr_available_externally | string}}"
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.bazarr.tls.certresolver: "letsencrypt"
traefik.http.routers.bazarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
bitwarden_enabled: false
bitwarden_available_externally: "false"
bitwarden_available_externally: false
bitwarden_data_directory: "{{ docker_home }}/bitwarden"
bitwarden_port_a: "19080"
bitwarden_port_b: "3012"

View file

@ -3,7 +3,7 @@
file:
path: "{{ item }}"
state: directory
mode: '0755'
mode: "0755"
with_items:
- "{{ bitwarden_data_directory }}"
@ -23,7 +23,7 @@
LOG_FILE: "/data/bitwarden.log"
WEBSOCKET_ENABLED: "true"
labels:
traefik.enable: "{{ bitwarden_available_externally }}"
traefik.enable: "{{ bitwarden_available_externally | string}}"
traefik.http.routers.bitwarden.rule: "Host(`{{ bitwarden_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.bitwarden.tls.certresolver: "letsencrypt"
traefik.http.routers.bitwarden.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
booksonic_enabled: false
booksonic_available_externally: "false"
booksonic_available_externally: false
# uid / gid
booksonic_user_id: "1000"

View file

@ -27,7 +27,7 @@
restart_policy: unless-stopped
memory: "{{ booksonic_memory }}"
labels:
traefik.enable: "{{ booksonic_available_externally }}"
traefik.enable: "{{ booksonic_available_externally | string}}"
traefik.http.routers.booksonic.rule: "Host(`{{ booksonic_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.booksonic.tls.certresolver: "letsencrypt"
traefik.http.routers.booksonic.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
cloudcmd_enabled: false
cloudcmd_available_externally: "false"
cloudcmd_available_externally: false
# directories
cloudcmd_data_directory: "{{ docker_home }}/cloudcmd/config"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ cloudcmd_memory }}"
labels:
traefik.enable: "{{ cloudcmd_available_externally }}"
traefik.enable: "{{ cloudcmd_available_externally | string}}"
traefik.http.routers.cloudcmd.rule: "Host(`{{ cloudcmd_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.cloudcmd.tls.certresolver: "letsencrypt"
traefik.http.routers.cloudcmd.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
couchpotato_enabled: false
couchpotato_available_externally: "false"
couchpotato_available_externally: false
# directories
couchpotato_config_directory: "{{ docker_home }}/couchpotato/config"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped
memory: "{{ couchpotato_memory }}"
labels:
traefik.enable: "{{ couchpotato_available_externally }}"
traefik.enable: "{{ couchpotato_available_externally | string}}"
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"
traefik.http.routers.couchpotato.tls.certresolver: "letsencrypt"
traefik.http.routers.couchpotato.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
dashy_enabled: false
dashy_available_externally: "false"
dashy_available_externally: false
# network
dashy_port: "8082"

View file

@ -9,7 +9,7 @@
restart_policy: unless-stopped
memory: "{{ dashy_memory }}"
labels:
traefik.enable: "{{ dashy_available_externally }}"
traefik.enable: "{{ dashy_available_externally | string}}"
traefik.http.routers.dashy.rule: "Host(`{{ dashy_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.dashy.tls.certresolver: "letsencrypt"
traefik.http.routers.dashy.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
deluge_enabled: false
deluge_available_externally: "false"
deluge_available_externally: false
# directories
deluge_config_directory: "{{ docker_home }}/deluge/config"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ deluge_memory }}"
labels:
traefik.enable: "{{ deluge_available_externally }}"
traefik.enable: "{{ deluge_available_externally | string}}"
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.deluge.tls.certresolver: "letsencrypt"
traefik.http.routers.deluge.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
dokuwiki_enabled: false
dokuwiki_available_externally: "false"
dokuwiki_available_externally: false
# directories
dokuwiki_data_directory: "{{ docker_home }}/dokuwiki"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped
memory: "{{ dokuwiki_memory }}"
labels:
traefik.enable: "{{ dokuwiki_available_externally }}"
traefik.enable: "{{ dokuwiki_available_externally | string}}"
traefik.http.routers.dokuwiki.rule: "Host(`{{ dokuwiki_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.dokuwiki.tls.certresolver: "letsencrypt"
traefik.http.routers.dokuwiki.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
duplicacy_enabled: false
duplicacy_available_externally: "false"
duplicacy_available_externally: false
# directories
duplicacy_config_directory: "{{ docker_home }}/duplicacy/config"
@ -8,7 +8,7 @@ duplicacy_logs_directory: "{{ docker_home }}/duplicacy/logs"
duplicacy_cache_directory: "{{ docker_home }}/duplicacy/cache"
# permissions
duplicacy_data_permissions: "ro" # Change to 'rw' to allow the UI to restore data
duplicacy_data_permissions: "ro" # Change to 'rw' to allow the UI to restore data
# version
duplicacy_web_version: "Stable"

View file

@ -29,7 +29,7 @@
restart_policy: unless-stopped
memory: "{{ duplicacy_memory }}"
labels:
traefik.enable: "{{ duplicacy_available_externally }}"
traefik.enable: "{{ duplicacy_available_externally | string}}"
traefik.http.routers.duplicacy.rule: "Host(`{{ duplicacy_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.duplicacy.tls.certresolver: "letsencrypt"
traefik.http.routers.duplicacy.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
duplicati_enabled: false
duplicati_available_externally: "false"
duplicati_available_externally: false
# directories
duplicati_data_directory: "{{ docker_home }}/duplicati/config"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ duplicati_memory }}"
labels:
traefik.enable: "{{ duplicati_available_externally }}"
traefik.enable: "{{ duplicati_available_externally | string}}"
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.duplicati.tls.certresolver: "letsencrypt"
traefik.http.routers.duplicati.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,13 +1,12 @@
---
emby_enabled: false
emby_available_externally: "false"
emby_available_externally: false
# directories
emby_config_directory: "{{ docker_home }}/emby/config"
emby_movies_directory: "{{ movies_root }}"
emby_tv_directory: "{{ tv_root }}"
# If you're paranoid, set permissions to "ro" so Emby won't ever be able to
# delete your files
emby_movies_permissions: "rw"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ emby_memory }}"
labels:
traefik.enable: "{{ emby_available_externally }}"
traefik.enable: "{{ emby_available_externally | string}}"
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.emby.tls.certresolver: "letsencrypt"
traefik.http.routers.emby.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
esphome_enabled: false
esphome_available_externally: "false"
esphome_available_externally: false
# directories
esphome_data_directory: "{{ docker_home }}/esphome"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ esphome_memory }}"
labels:
traefik.enable: "{{ esphome_available_externally }}"
traefik.enable: "{{ esphome_available_externally | string}}"
traefik.http.routers.esphome.rule: "Host(`{{ esphome_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.esphome.tls.certresolver: "letsencrypt"
traefik.http.routers.esphome.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
firefly_enabled: false
firefly_available_externally: "false"
firefly_available_externally: false
# directories
firefly_data_directory: "{{ docker_home }}/firefly"

View file

@ -52,7 +52,7 @@
restart_policy: unless-stopped
memory: "{{ firefly_memory }}"
labels:
traefik.enable: "{{ firefly_available_externally }}"
traefik.enable: "{{ firefly_available_externally | string}}"
traefik.http.routers.firefly.rule: "Host(`{{ firefly_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.firefly.tls.certresolver: "letsencrypt"
traefik.http.routers.firefly.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,12 +1,11 @@
---
freshrss_enabled: false
freshrss_available_externally: "false"
freshrss_available_externally: false
# directories
freshrss_data_directory: "{{ docker_home }}/freshrss"
freshrss_extensions_directory: "{{ docker_home }}/freshrss"
# network
freshrss_port: "8089"
freshrss_hostname: "freshrss"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: "{{ freshrss_memory }}"
labels:
traefik.enable: "{{ freshrss_available_externally }}"
traefik.enable: "{{ freshrss_available_externally | string}}"
traefik.http.routers.freshrss.rule: "Host(`{{ freshrss_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.freshrss.tls.certresolver: "letsencrypt"
traefik.http.routers.freshrss.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
gitea_enabled: false
gitea_available_externally: "false"
gitea_available_externally: false
# directories
gitea_data_directory: "{{ docker_home }}/gitea"

View file

@ -68,7 +68,7 @@
restart_policy: unless-stopped
memory: "{{ gitea_memory }}"
labels:
traefik.enable: "{{ gitea_available_externally }}"
traefik.enable: "{{ gitea_available_externally | string}}"
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gitea.tls.certresolver: "letsencrypt"
traefik.http.routers.gitea.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
gitlab_enabled: false
gitlab_available_externally: "false"
gitlab_available_externally: false
# directories
gitlab_data_directory: "{{ docker_home }}/gitlab"

View file

@ -59,7 +59,7 @@
hostname: "{{ gitlab_hostname }}.{{ ansible_nas_domain }}"
memory: "{{ gitlab_memory }}"
labels:
traefik.enable: "{{ gitlab_available_externally }}"
traefik.enable: "{{ gitlab_available_externally | string}}"
traefik.http.routers.gitlab.rule: "Host(`{{ gitlab_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gitlab.tls.certresolver: "letsencrypt"
traefik.http.routers.gitlab.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
glances_enabled: false
glances_available_externally: "false"
glances_available_externally: false
# network
glances_hostname: "glances"

View file

@ -17,7 +17,7 @@
security_opts: "{{ glances_security_options }}"
memory: "{{ glances_memory }}"
labels:
traefik.enable: "{{ glances_available_externally }}"
traefik.enable: "{{ glances_available_externally | string}}"
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.glances.tls.certresolver: "letsencrypt"
traefik.http.routers.glances.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
gotify_enabled: false
gotify_available_externally: "false"
gotify_available_externally: false
# data directory
gotify_data_directory: "{{ docker_home }}/gotify"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ gotify_memory }}"
labels:
traefik.enable: "{{ gotify_available_externally }}"
traefik.enable: "{{ gotify_available_externally | string}}"
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gotify.tls.certresolver: "letsencrypt"
traefik.http.routers.gotify.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
heimdall_enabled: true
heimdall_available_externally: "false"
heimdall_available_externally: false
# directories
heimdall_docker_image: linuxserver/heimdall:latest

View file

@ -41,7 +41,7 @@
restart_policy: unless-stopped
memory: "{{ heimdall_memory }}"
labels:
traefik.enable: "{{ heimdall_available_externally }}"
traefik.enable: "{{ heimdall_available_externally | string}}"
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.heimdall.tls.certresolver: "letsencrypt"
traefik.http.routers.heimdall.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
homeassistant_enabled: false
homeassistant_available_externally: "false"
homeassistant_available_externally: false
# directories
homeassistant_data_directory: "{{ docker_home }}/homeassistant"

View file

@ -18,7 +18,7 @@
env:
TZ: "{{ ansible_nas_timezone }}"
labels:
traefik.enable: "{{ homeassistant_available_externally }}"
traefik.enable: "{{ homeassistant_available_externally | string}}"
traefik.http.routers.homeassistant.rule: "Host(`{{ homeassistant_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.homeassistant.tls.certresolver: "letsencrypt"
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
homebridge_enabled: false
homebridge_available_externally: "false"
homebridge_available_externally: false
# directories
homebridge_config_directory: "{{ docker_home }}/homebridge/config"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: "{{ homebridge_memory }}"
labels:
traefik.enable: "{{ homebridge_available_externally }}"
traefik.enable: "{{ homebridge_available_externally | string}}"
traefik.http.routers.homebridge.rule: "Host(`{{ homebridge_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.homebridge.tls.certresolver: "letsencrypt"
traefik.http.routers.homebridge.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
jackett_enabled: false
jackett_available_externally: "false"
jackett_available_externally: false
# directories
jackett_data_directory: "{{ docker_home }}/jackett"

View file

@ -21,7 +21,7 @@
restart_policy: unless-stopped
memory: "{{ jackett_memory }}"
labels:
traefik.enable: "{{ jackett_available_externally }}"
traefik.enable: "{{ jackett_available_externally | string}}"
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.jackett.tls.certresolver: "letsencrypt"
traefik.http.routers.jackett.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
jellyfin_enabled: false
jellyfin_available_externally: "false"
jellyfin_available_externally: false
# directories
jellyfin_config_directory: "{{ docker_home }}/jellyfin/config"

View file

@ -29,7 +29,7 @@
restart_policy: unless-stopped
memory: "{{ jellyfin_memory }}"
labels:
traefik.enable: "{{ jellyfin_available_externally }}"
traefik.enable: "{{ jellyfin_available_externally | string}}"
traefik.http.routers.jellyfin.rule: "Host(`{{ jellyfin_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.jellyfin.tls.certresolver: "letsencrypt"
traefik.http.routers.jellyfin.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
komga_enabled: false
komga_available_externally: "false"
komga_available_externally: false
# directories
komga_data_directory: "{{ docker_home }}/komga"

View file

@ -28,7 +28,7 @@
restart_policy: unless-stopped
memory: "{{ komga_memory }}"
labels:
traefik.enable: "{{ komga_available_externally }}"
traefik.enable: "{{ komga_available_externally | string}}"
traefik.http.routers.komga.rule: "Host(`{{ komga_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.komga.tls.certresolver: "letsencrypt"
traefik.http.routers.komga.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
lidarr_enabled: false
lidarr_available_externally: "false"
lidarr_available_externally: false
# directories
lidarr_data_directory: "{{ docker_home }}/lidarr/config"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped
memory: "{{ lidarr_memory }}"
labels:
traefik.enable: "{{ lidarr_available_externally }}"
traefik.enable: "{{ lidarr_available_externally | string}}"
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.lidarr.tls.certresolver: "letsencrypt"
traefik.http.routers.lidarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
mealie_enabled: false
mealie_available_externally: "false"
mealie_available_externally: false
# directories
mealie_data_directory: "{{ docker_home }}/mealie"

View file

@ -19,17 +19,17 @@
TZ: "{{ ansible_nas_timezone }}"
PUID: "{{ mealie_user_id }}"
PGID: "{{ mealie_group_id }}"
RECIPE_PUBLIC: 'true'
RECIPE_SHOW_NUTRITION: 'true'
RECIPE_SHOW_ASSETS: 'true'
RECIPE_LANDSCAPE_VIEW: 'true'
RECIPE_DISABLE_COMMENTS: 'false'
RECIPE_DISABLE_AMOUNT: 'false'
RECIPE_PUBLIC: "true"
RECIPE_SHOW_NUTRITION: "true"
RECIPE_SHOW_ASSETS: "true"
RECIPE_LANDSCAPE_VIEW: "true"
RECIPE_DISABLE_COMMENTS: "false"
RECIPE_DISABLE_AMOUNT: "false"
BASE_URL: "{{ ansible_nas_domain }}:{{ mealie_port }}"
restart_policy: unless-stopped
memory: "{{ mealie_memory }}"
labels:
traefik.enable: "{{ mealie_available_externally }}"
traefik.enable: "{{ mealie_available_externally | string}}"
traefik.http.routers.mealie.rule: "Host(`{{ mealie_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.mealie.tls.certresolver: "letsencrypt"
traefik.http.routers.mealie.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
---
# enable or disable the application
minidlna_enabled: false
minidlna_available_externally: "false"
minidlna_available_externally: false
# directories
minidlna_media_directory1: "{{ movies_root }}"

View file

@ -1,12 +1,11 @@
---
# enable or disable the application
miniflux_enabled: false
miniflux_available_externally: "false"
miniflux_available_externally: false
# directories
miniflux_data_directory: "{{ docker_home }}/miniflux"
# env
miniflux_admin_username: admin
miniflux_admin_password: supersecure

View file

@ -37,7 +37,7 @@
restart_policy: unless-stopped
memory: "{{ miniflux_memory }}"
labels:
traefik.enable: "{{ miniflux_available_externally }}"
traefik.enable: "{{ miniflux_available_externally | string}}"
traefik.http.routers.miniflux.rule: "Host(`{{ miniflux_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.miniflux.tls.certresolver: "letsencrypt"
traefik.http.routers.miniflux.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,14 +1,13 @@
---
# enable or disable the application
mylar_enabled: false
mylar_available_externally: "false"
mylar_available_externally: false
# directories
mylar_data_directory: "{{ docker_home }}/mylar"
mylar_comics_directory: "{{ comics_root }}"
mylar_downloads_directory: "{{ downloads_root }}"
# uid / gid
mylar_user_id: "0"
mylar_group_id: "0"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped
memory: "{{ mylar_memory }}"
labels:
traefik.enable: "{{ mylar_available_externally }}"
traefik.enable: "{{ mylar_available_externally | string}}"
traefik.http.routers.mylar.rule: "Host(`{{ mylar_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.mylar.tls.certresolver: "letsencrypt"
traefik.http.routers.mylar.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -2,14 +2,13 @@
n8n_enabled: false
# Networking
n8n_available_externally: "false"
n8n_available_externally: false
n8n_port: 5678
n8n_hostname: "n8n"
# Directories
n8n_data_directory: "{{ docker_home }}/n8n"
# Security
n8n_basic_auth_user: "n8n_user"
n8n_basic_auth_password: "n8n_change_me"

View file

@ -23,7 +23,7 @@
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"
N8N_BASIC_AUTH_PASSWORD: "{{ n8n_basic_auth_password }}"
labels:
traefik.enable: "{{ n8n_available_externally }}"
traefik.enable: "{{ n8n_available_externally | string}}"
traefik.http.routers.n8n.rule: "Host(`{{ n8n_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.n8n.tls.certresolver: "letsencrypt"
traefik.http.routers.n8n.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,12 +1,11 @@
---
navidrome_enabled: false
navidrome_available_externally: "false"
navidrome_available_externally: false
# directories
navidrome_data_directory: "{{ docker_home }}/navidrome"
navidrome_music_directory: "{{ music_root }}"
# network
navidrome_port: "4533"
navidrome_hostname: "navidrome"

View file

@ -27,7 +27,7 @@
restart_policy: unless-stopped
memory: "{{ navidrome_memory }}"
labels:
traefik.enable: "{{ navidrome_available_externally }}"
traefik.enable: "{{ navidrome_available_externally | string}}"
traefik.http.routers.navidrome.rule: "Host(`{{ navidrome_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.navidrome.tls.certresolver: "letsencrypt"
traefik.http.routers.navidrome.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
netbootxyz_enabled: false
netbootxyz_available_externally: "false"
netbootxyz_available_externally: false
# directories
netbootxyz_config_directory: "{{ docker_home }}/netbootxyz/config"

View file

@ -26,7 +26,7 @@
PGID: "{{ netbootxyz_group_id }}"
restart_policy: unless-stopped
labels:
traefik.enable: "{{ netbootxyz_available_externally }}"
traefik.enable: "{{ netbootxyz_available_externally | string}}"
traefik.http.routers.netdata.rule: "Host(`{{ netbootxyz_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
netdata_enabled: false
netdata_available_externally: "false"
netdata_available_externally: false
# network
netdata_hostname: "netdata"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped
memory: "{{ netdata_memory }}"
labels:
traefik.enable: "{{ netdata_available_externally }}"
traefik.enable: "{{ netdata_available_externally | string}}"
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
nextcloud_enabled: false
nextcloud_available_externally: "false"
nextcloud_available_externally: false
# directories
nextcloud_data_directory: "{{ docker_home }}/nextcloud"

View file

@ -42,7 +42,7 @@
restart_policy: unless-stopped
memory: "{{ nextcloud_memory }}"
labels:
traefik.enable: "{{ nextcloud_available_externally }}"
traefik.enable: "{{ nextcloud_available_externally | string}}"
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.nextcloud.tls.certresolver: "letsencrypt"
traefik.http.routers.nextcloud.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
nzbget_enabled: false
nzbget_available_externally: "false"
nzbget_available_externally: false
# directories
nzbget_data_directory: "{{ docker_home }}/nzbget"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ nzbget_memory }}"
labels:
traefik.enable: "{{ nzbget_available_externally }}"
traefik.enable: "{{ nzbget_available_externally | string}}"
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.nzbget.tls.certresolver: "letsencrypt"
traefik.http.routers.nzbget.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
ombi_enabled: false
ombi_available_externally: "false"
ombi_available_externally: false
# directories
ombi_config_directory: "{{ docker_home }}/ombi/config"

View file

@ -20,7 +20,7 @@
restart_policy: unless-stopped
memory: "{{ ombi_memory }}"
labels:
traefik.enable: "{{ ombi_available_externally }}"
traefik.enable: "{{ ombi_available_externally | string}}"
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.ombi.tls.certresolver: "letsencrypt"
traefik.http.routers.ombi.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
organizr_enabled: false
organizr_available_externally: "false"
organizr_available_externally: false
# directories
organizr_data_directory: "{{ docker_home }}/organizr"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ organizr_memory }}"
labels:
traefik.enable: "{{ organizr_available_externally }}"
traefik.enable: "{{ organizr_available_externally | string}}"
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.organizr.tls.certresolver: "letsencrypt"
traefik.http.routers.organizr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
overseerr_enabled: false
overseerr_available_externally: "false"
overseerr_available_externally: false
# directories
overseerr_data_directory: "{{ docker_home }}/overseerr"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ overseerr_memory }}"
labels:
traefik.enable: "{{ overseerr_available_externally }}"
traefik.enable: "{{ overseerr_available_externally | string}}"
traefik.http.routers.overseerr.rule: "Host(`{{ overseerr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.overseerr.tls.certresolver: "letsencrypt"
traefik.http.routers.overseerr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
piwigo_enabled: false
piwigo_available_externally: "false"
piwigo_available_externally: false
# directories
piwigo_config_directory: "{{ docker_home }}/piwigo/config"

View file

@ -43,7 +43,7 @@
restart_policy: unless-stopped
memory: "{{ piwigo_memory }}"
labels:
traefik.enable: "{{ piwigo_available_externally }}"
traefik.enable: "{{ piwigo_available_externally | string}}"
traefik.http.routers.piwigo.rule: "Host(`{{ piwigo_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.piwigo.tls.certresolver: "letsencrypt"
traefik.http.routers.piwigo.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
plex_enabled: false
plex_available_externally: "false"
plex_available_externally: false
# directories
plex_config_directory: "{{ docker_home }}/plex/config"

View file

@ -32,7 +32,7 @@
restart_policy: unless-stopped
memory: "{{ plex_memory }}"
labels:
traefik.enable: "{{ plex_available_externally }}"
traefik.enable: "{{ plex_available_externally | string}}"
traefik.http.routers.plex.rule: "Host(`{{ plex_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.plex.tls.certresolver: "letsencrypt"
traefik.http.routers.plex.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
portainer_enabled: false
portainer_available_externally: "false"
portainer_available_externally: false
# directories
portainer_data_directory: "{{ docker_home }}/portainer/config"

View file

@ -20,7 +20,7 @@
restart_policy: unless-stopped
memory: "{{ portainer_memory }}"
labels:
traefik.enable: "{{ portainer_available_externally }}"
traefik.enable: "{{ portainer_available_externally | string}}"
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.portainer.tls.certresolver: "letsencrypt"
traefik.http.routers.portainer.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
prowlarr_enabled: false
prowlarr_available_externally: "false"
prowlarr_available_externally: false
# directories
prowlarr_data_directory: "{{ docker_home }}/prowlarr/config"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped
memory: "{{ prowlarr_memory }}"
labels:
traefik.enable: "{{ prowlarr_available_externally }}"
traefik.enable: "{{ prowlarr_available_externally | string}}"
traefik.http.routers.prowlarr.rule: "Host(`{{ prowlarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.prowlarr.tls.certresolver: "letsencrypt"
traefik.http.routers.prowlarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,12 +1,11 @@
---
pyload_enabled: false
pyload_available_externally: "false"
pyload_available_externally: false
# directories
pyload_config_directory: "{{ docker_home }}/pyload"
pyload_download_directory: "{{ downloads_root }}"
# uid / gid
pyload_user_id: "0"
pyload_group_id: "0"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ pyload_memory }}"
labels:
traefik.enable: "{{ pyload_available_externally }}"
traefik.enable: "{{ pyload_available_externally | string}}"
traefik.http.routers.pyload.rule: "Host(`{{ pyload_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.pyload.tls.certresolver: "letsencrypt"
traefik.http.routers.pyload.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
pytivo_enabled: false
pytivo_available_externally: "false"
pytivo_available_externally: false
# directories
pytivo_config_directory: "{{ docker_home }}/pytivo/config"

View file

@ -30,7 +30,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ pytivo_available_externally }}"
traefik.enable: "{{ pytivo_available_externally | string}}"
traefik.http.routers.pytivo.rule: "Host(`{{ pytivo_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.pytivo.tls.certresolver: "letsencrypt"
traefik.http.routers.pytivo.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
---
radarr_enabled: false
radarr_available_externally: "false"
radarr_available_externally: false
# directories
radarr_movies_directory: "{{ movies_root }}"

Some files were not shown because too many files have changed in this diff Show more