mirror of
https://github.com/davestephens/ansible-nas
synced 2025-01-26 10:15:14 +00:00
♻️ switched from booleans enclosed in strings ("true" "false") to standard booleans. Bools are casted to strings where necessary
This commit is contained in:
parent
3a603062fa
commit
3c5dc50a8b
135 changed files with 152 additions and 164 deletions
|
@ -8,7 +8,7 @@ If Gitea isn't powerful enough for you then consider GitLab. It's a much more po
|
||||||
|
|
||||||
Set `gitlab_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `gitlab_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
To make GitLab available externally via Traefik set `gitlab_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
To make GitLab available externally via Traefik set `gitlab_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
The first time you run GitLab you'll be prompted for an account's password. The password is for GitLab's `root` administrator account. From there you can log in to create additional users and further configure the application.
|
The first time you run GitLab you'll be prompted for an account's password. The password is for GitLab's `root` administrator account. From there you can log in to create additional users and further configure the application.
|
||||||
|
|
||||||
|
|
|
@ -8,6 +8,6 @@ Open source home automation that puts local control and privacy first. Powered b
|
||||||
|
|
||||||
Set `homeassistant_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `homeassistant_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
If you want to access Home Assistant externally, don't forget to set `homeassistant_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
If you want to access Home Assistant externally, don't forget to set `homeassistant_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
The Home Assistant web interface can be found at http://ansible_nas_host_or_ip:8123.
|
The Home Assistant web interface can be found at http://ansible_nas_host_or_ip:8123.
|
||||||
|
|
|
@ -8,7 +8,7 @@ Joomla! is an award-winning content management system (CMS), which enables you t
|
||||||
|
|
||||||
Set `joomla_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `joomla_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
If you want to access Joomla externally, set `joomla_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
If you want to access Joomla externally, set `joomla_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
The Joomla web interface can be found at http://ansible_nas_host_or_ip:8181.
|
The Joomla web interface can be found at http://ansible_nas_host_or_ip:8181.
|
||||||
|
|
||||||
|
|
|
@ -11,6 +11,6 @@ An automated Comic Book downloader (cbr/cbz) for use with SABnzbd, NZBGet and to
|
||||||
|
|
||||||
Set `mylar_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `mylar_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
If you want to access Mylar externally, don't forget to set `mylar_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
If you want to access Mylar externally, don't forget to set `mylar_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
The Mylar web interface can be found at http://ansible_nas_host_or_ip:5858.
|
The Mylar web interface can be found at http://ansible_nas_host_or_ip:5858.
|
||||||
|
|
|
@ -8,7 +8,7 @@ Piwigo is open source photo gallery software for the web. Designed for organisat
|
||||||
|
|
||||||
Set `piwigo_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `piwigo_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
If you want to access Piwigo externally, set `piwigo_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
If you want to access Piwigo externally, set `piwigo_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
The Piwigo web interface can be found at http://ansible_nas_host_or_ip:16923.
|
The Piwigo web interface can be found at http://ansible_nas_host_or_ip:16923.
|
||||||
|
|
||||||
|
|
|
@ -10,6 +10,6 @@ Continuously track your internet speed
|
||||||
|
|
||||||
Set `speedtest_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `speedtest_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
If you want to access Speedtest-Tracker externally, don't forget to set `speedtest_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
If you want to access Speedtest-Tracker externally, don't forget to set `speedtest_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
The Speedtest-Tracker interface can be found at http://ansible_nas_host_or_ip:8765.
|
The Speedtest-Tracker interface can be found at http://ansible_nas_host_or_ip:8765.
|
||||||
|
|
|
@ -8,7 +8,7 @@ TiddlyWiki is a unique non-linear notebook for capturing, organizing, and sharin
|
||||||
|
|
||||||
Set `tiddlywiki_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `tiddlywiki_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
If you want to access TiddlyWiki externally, set `tiddlywiki_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
If you want to access TiddlyWiki externally, set `tiddlywiki_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
The TiddlyWiki web interface can be found at http://ansible_nas_host_or_ip:8092.
|
The TiddlyWiki web interface can be found at http://ansible_nas_host_or_ip:8092.
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ Docker Container: [https://hub.docker.com/r/ekho/utorrent](https://hub.docker.co
|
||||||
|
|
||||||
Set `utorrent_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `utorrent_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
If you want to access uTorrent externally, don't forget to set `utorrent_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
If you want to access uTorrent externally, don't forget to set `utorrent_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
The uTorrent web interface can be found at http://ansible_nas_host_or_ip:8111/gui:
|
The uTorrent web interface can be found at http://ansible_nas_host_or_ip:8111/gui:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ wallabag is a self-hostable PHP application allowing you to not miss any content
|
||||||
|
|
||||||
Set `wallabag_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
Set `wallabag_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
If you want to access wallabag externally, don't forget to set `wallabag_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
If you want to access wallabag externally, don't forget to set `wallabag_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||||
|
|
||||||
I recommend using the mobile app, which will sync with this installation so you have access to your saved articles even if you don't have signal or wifi access.
|
I recommend using the mobile app, which will sync with this installation so you have access to your saved articles even if you don't have signal or wifi access.
|
||||||
|
|
||||||
|
|
|
@ -236,7 +236,7 @@ samba_netbios_name: "{{ ansible_nas_hostname }}"
|
||||||
### Joomla
|
### Joomla
|
||||||
###
|
###
|
||||||
joomla_data_directory: "{{ docker_home }}/joomla"
|
joomla_data_directory: "{{ docker_home }}/joomla"
|
||||||
joomla_available_externally: "false"
|
joomla_available_externally: false
|
||||||
joomla_database_password: top_secret
|
joomla_database_password: top_secret
|
||||||
joomla_port: "8181"
|
joomla_port: "8181"
|
||||||
|
|
||||||
|
@ -248,14 +248,14 @@ openvpn_config_directory: "{{ docker_home }}/openvpn"
|
||||||
###
|
###
|
||||||
### Guacamole
|
### Guacamole
|
||||||
###
|
###
|
||||||
guacamole_available_externally: "false"
|
guacamole_available_externally: false
|
||||||
guacamole_data_directory: "{{ docker_home }}/guacamole"
|
guacamole_data_directory: "{{ docker_home }}/guacamole"
|
||||||
guacamole_port: "8090"
|
guacamole_port: "8090"
|
||||||
|
|
||||||
###
|
###
|
||||||
### Krusader
|
### Krusader
|
||||||
###
|
###
|
||||||
krusader_available_externally: "false"
|
krusader_available_externally: false
|
||||||
krusader_config_directory: "{{ docker_home }}/krusader/config"
|
krusader_config_directory: "{{ docker_home }}/krusader/config"
|
||||||
krusader_browse_directory: "/"
|
krusader_browse_directory: "/"
|
||||||
krusader_user_id: "0"
|
krusader_user_id: "0"
|
||||||
|
@ -278,7 +278,7 @@ timemachine_port: "10445"
|
||||||
###
|
###
|
||||||
### The Lounge
|
### The Lounge
|
||||||
###
|
###
|
||||||
thelounge_available_externally: "false"
|
thelounge_available_externally: false
|
||||||
thelounge_data_directory: "{{ docker_home }}/thelounge"
|
thelounge_data_directory: "{{ docker_home }}/thelounge"
|
||||||
thelounge_port_one: "113"
|
thelounge_port_one: "113"
|
||||||
thelounge_port_two: "9002"
|
thelounge_port_two: "9002"
|
||||||
|
@ -286,14 +286,14 @@ thelounge_port_two: "9002"
|
||||||
###
|
###
|
||||||
### Wallabag
|
### Wallabag
|
||||||
###
|
###
|
||||||
wallabag_available_externally: "false"
|
wallabag_available_externally: false
|
||||||
wallabag_data_directory: "{{ docker_home }}/wallabag"
|
wallabag_data_directory: "{{ docker_home }}/wallabag"
|
||||||
wallabag_port: "7780"
|
wallabag_port: "7780"
|
||||||
|
|
||||||
###
|
###
|
||||||
### Calibre-web
|
### Calibre-web
|
||||||
###
|
###
|
||||||
calibre_available_externally: "false"
|
calibre_available_externally: false
|
||||||
calibre_data_directory: "{{ docker_home }}/calibre"
|
calibre_data_directory: "{{ docker_home }}/calibre"
|
||||||
calibre_user_id: "0"
|
calibre_user_id: "0"
|
||||||
calibre_group_id: "0"
|
calibre_group_id: "0"
|
||||||
|
@ -305,7 +305,7 @@ calibre_ebook_conversion: "linuxserver/calibre-web:calibre"
|
||||||
###
|
###
|
||||||
### openHAB
|
### openHAB
|
||||||
###
|
###
|
||||||
openhab_available_externally: "false"
|
openhab_available_externally: false
|
||||||
openhab_docker_image: openhab/openhab:latest
|
openhab_docker_image: openhab/openhab:latest
|
||||||
openhab_data_directory: "{{ docker_home }}/openhab"
|
openhab_data_directory: "{{ docker_home }}/openhab"
|
||||||
openhab_port_http: "7777"
|
openhab_port_http: "7777"
|
||||||
|
@ -314,7 +314,7 @@ openhab_port_https: "7778"
|
||||||
###
|
###
|
||||||
### Ubooquity
|
### Ubooquity
|
||||||
###
|
###
|
||||||
ubooquity_available_externally: "false"
|
ubooquity_available_externally: false
|
||||||
ubooquity_data_directory: "{{ docker_home }}/ubooquity"
|
ubooquity_data_directory: "{{ docker_home }}/ubooquity"
|
||||||
ubooquity_user_id: "0"
|
ubooquity_user_id: "0"
|
||||||
ubooquity_group_id: "0"
|
ubooquity_group_id: "0"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
airsonic_enabled: false
|
airsonic_enabled: false
|
||||||
airsonic_available_externally: "false"
|
airsonic_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
airsonic_data_directory: "{{ docker_home }}/airsonic"
|
airsonic_data_directory: "{{ docker_home }}/airsonic"
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ airsonic_memory }}"
|
memory: "{{ airsonic_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ airsonic_available_externally }}"
|
traefik.enable: "{{ airsonic_available_externally | string}}"
|
||||||
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.airsonic.tls.certresolver: "letsencrypt"
|
traefik.http.routers.airsonic.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.airsonic.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.airsonic.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
bazarr_enabled: false
|
bazarr_enabled: false
|
||||||
bazarr_available_externally: "false"
|
bazarr_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
bazarr_data_directory: "{{ docker_home }}/bazarr/config"
|
bazarr_data_directory: "{{ docker_home }}/bazarr/config"
|
||||||
|
|
|
@ -24,7 +24,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ bazarr_memory }}"
|
memory: "{{ bazarr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ bazarr_available_externally }}"
|
traefik.enable: "{{ bazarr_available_externally | string}}"
|
||||||
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.bazarr.tls.certresolver: "letsencrypt"
|
traefik.http.routers.bazarr.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.bazarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.bazarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
bitwarden_enabled: false
|
bitwarden_enabled: false
|
||||||
bitwarden_available_externally: "false"
|
bitwarden_available_externally: false
|
||||||
bitwarden_data_directory: "{{ docker_home }}/bitwarden"
|
bitwarden_data_directory: "{{ docker_home }}/bitwarden"
|
||||||
bitwarden_port_a: "19080"
|
bitwarden_port_a: "19080"
|
||||||
bitwarden_port_b: "3012"
|
bitwarden_port_b: "3012"
|
||||||
|
|
|
@ -3,7 +3,7 @@
|
||||||
file:
|
file:
|
||||||
path: "{{ item }}"
|
path: "{{ item }}"
|
||||||
state: directory
|
state: directory
|
||||||
mode: '0755'
|
mode: "0755"
|
||||||
with_items:
|
with_items:
|
||||||
- "{{ bitwarden_data_directory }}"
|
- "{{ bitwarden_data_directory }}"
|
||||||
|
|
||||||
|
@ -23,7 +23,7 @@
|
||||||
LOG_FILE: "/data/bitwarden.log"
|
LOG_FILE: "/data/bitwarden.log"
|
||||||
WEBSOCKET_ENABLED: "true"
|
WEBSOCKET_ENABLED: "true"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ bitwarden_available_externally }}"
|
traefik.enable: "{{ bitwarden_available_externally | string}}"
|
||||||
traefik.http.routers.bitwarden.rule: "Host(`{{ bitwarden_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.bitwarden.rule: "Host(`{{ bitwarden_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.bitwarden.tls.certresolver: "letsencrypt"
|
traefik.http.routers.bitwarden.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.bitwarden.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.bitwarden.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
booksonic_enabled: false
|
booksonic_enabled: false
|
||||||
booksonic_available_externally: "false"
|
booksonic_available_externally: false
|
||||||
|
|
||||||
# uid / gid
|
# uid / gid
|
||||||
booksonic_user_id: "1000"
|
booksonic_user_id: "1000"
|
||||||
|
|
|
@ -27,7 +27,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ booksonic_memory }}"
|
memory: "{{ booksonic_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ booksonic_available_externally }}"
|
traefik.enable: "{{ booksonic_available_externally | string}}"
|
||||||
traefik.http.routers.booksonic.rule: "Host(`{{ booksonic_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.booksonic.rule: "Host(`{{ booksonic_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.booksonic.tls.certresolver: "letsencrypt"
|
traefik.http.routers.booksonic.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.booksonic.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.booksonic.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
cloudcmd_enabled: false
|
cloudcmd_enabled: false
|
||||||
cloudcmd_available_externally: "false"
|
cloudcmd_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
cloudcmd_data_directory: "{{ docker_home }}/cloudcmd/config"
|
cloudcmd_data_directory: "{{ docker_home }}/cloudcmd/config"
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ cloudcmd_memory }}"
|
memory: "{{ cloudcmd_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ cloudcmd_available_externally }}"
|
traefik.enable: "{{ cloudcmd_available_externally | string}}"
|
||||||
traefik.http.routers.cloudcmd.rule: "Host(`{{ cloudcmd_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.cloudcmd.rule: "Host(`{{ cloudcmd_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.cloudcmd.tls.certresolver: "letsencrypt"
|
traefik.http.routers.cloudcmd.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.cloudcmd.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.cloudcmd.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
couchpotato_enabled: false
|
couchpotato_enabled: false
|
||||||
couchpotato_available_externally: "false"
|
couchpotato_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
couchpotato_config_directory: "{{ docker_home }}/couchpotato/config"
|
couchpotato_config_directory: "{{ docker_home }}/couchpotato/config"
|
||||||
|
|
|
@ -26,7 +26,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ couchpotato_memory }}"
|
memory: "{{ couchpotato_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ couchpotato_available_externally }}"
|
traefik.enable: "{{ couchpotato_available_externally | string}}"
|
||||||
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.couchpotato.tls.certresolver: "letsencrypt"
|
traefik.http.routers.couchpotato.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.couchpotato.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.couchpotato.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
dashy_enabled: false
|
dashy_enabled: false
|
||||||
dashy_available_externally: "false"
|
dashy_available_externally: false
|
||||||
|
|
||||||
# network
|
# network
|
||||||
dashy_port: "8082"
|
dashy_port: "8082"
|
||||||
|
|
|
@ -9,7 +9,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ dashy_memory }}"
|
memory: "{{ dashy_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ dashy_available_externally }}"
|
traefik.enable: "{{ dashy_available_externally | string}}"
|
||||||
traefik.http.routers.dashy.rule: "Host(`{{ dashy_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.dashy.rule: "Host(`{{ dashy_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.dashy.tls.certresolver: "letsencrypt"
|
traefik.http.routers.dashy.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.dashy.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.dashy.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
deluge_enabled: false
|
deluge_enabled: false
|
||||||
deluge_available_externally: "false"
|
deluge_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
deluge_config_directory: "{{ docker_home }}/deluge/config"
|
deluge_config_directory: "{{ docker_home }}/deluge/config"
|
||||||
|
|
|
@ -25,7 +25,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ deluge_memory }}"
|
memory: "{{ deluge_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ deluge_available_externally }}"
|
traefik.enable: "{{ deluge_available_externally | string}}"
|
||||||
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.deluge.tls.certresolver: "letsencrypt"
|
traefik.http.routers.deluge.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.deluge.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.deluge.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
dokuwiki_enabled: false
|
dokuwiki_enabled: false
|
||||||
dokuwiki_available_externally: "false"
|
dokuwiki_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
dokuwiki_data_directory: "{{ docker_home }}/dokuwiki"
|
dokuwiki_data_directory: "{{ docker_home }}/dokuwiki"
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ dokuwiki_memory }}"
|
memory: "{{ dokuwiki_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ dokuwiki_available_externally }}"
|
traefik.enable: "{{ dokuwiki_available_externally | string}}"
|
||||||
traefik.http.routers.dokuwiki.rule: "Host(`{{ dokuwiki_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.dokuwiki.rule: "Host(`{{ dokuwiki_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.dokuwiki.tls.certresolver: "letsencrypt"
|
traefik.http.routers.dokuwiki.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.dokuwiki.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.dokuwiki.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
duplicacy_enabled: false
|
duplicacy_enabled: false
|
||||||
duplicacy_available_externally: "false"
|
duplicacy_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
duplicacy_config_directory: "{{ docker_home }}/duplicacy/config"
|
duplicacy_config_directory: "{{ docker_home }}/duplicacy/config"
|
||||||
|
@ -8,7 +8,7 @@ duplicacy_logs_directory: "{{ docker_home }}/duplicacy/logs"
|
||||||
duplicacy_cache_directory: "{{ docker_home }}/duplicacy/cache"
|
duplicacy_cache_directory: "{{ docker_home }}/duplicacy/cache"
|
||||||
|
|
||||||
# permissions
|
# permissions
|
||||||
duplicacy_data_permissions: "ro" # Change to 'rw' to allow the UI to restore data
|
duplicacy_data_permissions: "ro" # Change to 'rw' to allow the UI to restore data
|
||||||
|
|
||||||
# version
|
# version
|
||||||
duplicacy_web_version: "Stable"
|
duplicacy_web_version: "Stable"
|
||||||
|
|
|
@ -29,7 +29,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ duplicacy_memory }}"
|
memory: "{{ duplicacy_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ duplicacy_available_externally }}"
|
traefik.enable: "{{ duplicacy_available_externally | string}}"
|
||||||
traefik.http.routers.duplicacy.rule: "Host(`{{ duplicacy_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.duplicacy.rule: "Host(`{{ duplicacy_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.duplicacy.tls.certresolver: "letsencrypt"
|
traefik.http.routers.duplicacy.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.duplicacy.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.duplicacy.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
duplicati_enabled: false
|
duplicati_enabled: false
|
||||||
duplicati_available_externally: "false"
|
duplicati_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
duplicati_data_directory: "{{ docker_home }}/duplicati/config"
|
duplicati_data_directory: "{{ docker_home }}/duplicati/config"
|
||||||
|
|
|
@ -25,7 +25,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ duplicati_memory }}"
|
memory: "{{ duplicati_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ duplicati_available_externally }}"
|
traefik.enable: "{{ duplicati_available_externally | string}}"
|
||||||
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.duplicati.tls.certresolver: "letsencrypt"
|
traefik.http.routers.duplicati.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.duplicati.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.duplicati.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,13 +1,12 @@
|
||||||
---
|
---
|
||||||
emby_enabled: false
|
emby_enabled: false
|
||||||
emby_available_externally: "false"
|
emby_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
emby_config_directory: "{{ docker_home }}/emby/config"
|
emby_config_directory: "{{ docker_home }}/emby/config"
|
||||||
emby_movies_directory: "{{ movies_root }}"
|
emby_movies_directory: "{{ movies_root }}"
|
||||||
emby_tv_directory: "{{ tv_root }}"
|
emby_tv_directory: "{{ tv_root }}"
|
||||||
|
|
||||||
|
|
||||||
# If you're paranoid, set permissions to "ro" so Emby won't ever be able to
|
# If you're paranoid, set permissions to "ro" so Emby won't ever be able to
|
||||||
# delete your files
|
# delete your files
|
||||||
emby_movies_permissions: "rw"
|
emby_movies_permissions: "rw"
|
||||||
|
|
|
@ -25,7 +25,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ emby_memory }}"
|
memory: "{{ emby_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ emby_available_externally }}"
|
traefik.enable: "{{ emby_available_externally | string}}"
|
||||||
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.emby.tls.certresolver: "letsencrypt"
|
traefik.http.routers.emby.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.emby.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.emby.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
esphome_enabled: false
|
esphome_enabled: false
|
||||||
esphome_available_externally: "false"
|
esphome_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
esphome_data_directory: "{{ docker_home }}/esphome"
|
esphome_data_directory: "{{ docker_home }}/esphome"
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ esphome_memory }}"
|
memory: "{{ esphome_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ esphome_available_externally }}"
|
traefik.enable: "{{ esphome_available_externally | string}}"
|
||||||
traefik.http.routers.esphome.rule: "Host(`{{ esphome_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.esphome.rule: "Host(`{{ esphome_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.esphome.tls.certresolver: "letsencrypt"
|
traefik.http.routers.esphome.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.esphome.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.esphome.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
firefly_enabled: false
|
firefly_enabled: false
|
||||||
firefly_available_externally: "false"
|
firefly_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
firefly_data_directory: "{{ docker_home }}/firefly"
|
firefly_data_directory: "{{ docker_home }}/firefly"
|
||||||
|
|
|
@ -52,7 +52,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ firefly_memory }}"
|
memory: "{{ firefly_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ firefly_available_externally }}"
|
traefik.enable: "{{ firefly_available_externally | string}}"
|
||||||
traefik.http.routers.firefly.rule: "Host(`{{ firefly_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.firefly.rule: "Host(`{{ firefly_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.firefly.tls.certresolver: "letsencrypt"
|
traefik.http.routers.firefly.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.firefly.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.firefly.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,12 +1,11 @@
|
||||||
---
|
---
|
||||||
freshrss_enabled: false
|
freshrss_enabled: false
|
||||||
freshrss_available_externally: "false"
|
freshrss_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
freshrss_data_directory: "{{ docker_home }}/freshrss"
|
freshrss_data_directory: "{{ docker_home }}/freshrss"
|
||||||
freshrss_extensions_directory: "{{ docker_home }}/freshrss"
|
freshrss_extensions_directory: "{{ docker_home }}/freshrss"
|
||||||
|
|
||||||
|
|
||||||
# network
|
# network
|
||||||
freshrss_port: "8089"
|
freshrss_port: "8089"
|
||||||
freshrss_hostname: "freshrss"
|
freshrss_hostname: "freshrss"
|
||||||
|
|
|
@ -24,7 +24,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ freshrss_memory }}"
|
memory: "{{ freshrss_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ freshrss_available_externally }}"
|
traefik.enable: "{{ freshrss_available_externally | string}}"
|
||||||
traefik.http.routers.freshrss.rule: "Host(`{{ freshrss_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.freshrss.rule: "Host(`{{ freshrss_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.freshrss.tls.certresolver: "letsencrypt"
|
traefik.http.routers.freshrss.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.freshrss.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.freshrss.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
gitea_enabled: false
|
gitea_enabled: false
|
||||||
gitea_available_externally: "false"
|
gitea_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
gitea_data_directory: "{{ docker_home }}/gitea"
|
gitea_data_directory: "{{ docker_home }}/gitea"
|
||||||
|
|
|
@ -68,7 +68,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ gitea_memory }}"
|
memory: "{{ gitea_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ gitea_available_externally }}"
|
traefik.enable: "{{ gitea_available_externally | string}}"
|
||||||
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.gitea.tls.certresolver: "letsencrypt"
|
traefik.http.routers.gitea.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.gitea.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.gitea.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
gitlab_enabled: false
|
gitlab_enabled: false
|
||||||
gitlab_available_externally: "false"
|
gitlab_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
gitlab_data_directory: "{{ docker_home }}/gitlab"
|
gitlab_data_directory: "{{ docker_home }}/gitlab"
|
||||||
|
|
|
@ -59,7 +59,7 @@
|
||||||
hostname: "{{ gitlab_hostname }}.{{ ansible_nas_domain }}"
|
hostname: "{{ gitlab_hostname }}.{{ ansible_nas_domain }}"
|
||||||
memory: "{{ gitlab_memory }}"
|
memory: "{{ gitlab_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ gitlab_available_externally }}"
|
traefik.enable: "{{ gitlab_available_externally | string}}"
|
||||||
traefik.http.routers.gitlab.rule: "Host(`{{ gitlab_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.gitlab.rule: "Host(`{{ gitlab_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.gitlab.tls.certresolver: "letsencrypt"
|
traefik.http.routers.gitlab.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.gitlab.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.gitlab.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
glances_enabled: false
|
glances_enabled: false
|
||||||
glances_available_externally: "false"
|
glances_available_externally: false
|
||||||
|
|
||||||
# network
|
# network
|
||||||
glances_hostname: "glances"
|
glances_hostname: "glances"
|
||||||
|
|
|
@ -17,7 +17,7 @@
|
||||||
security_opts: "{{ glances_security_options }}"
|
security_opts: "{{ glances_security_options }}"
|
||||||
memory: "{{ glances_memory }}"
|
memory: "{{ glances_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ glances_available_externally }}"
|
traefik.enable: "{{ glances_available_externally | string}}"
|
||||||
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.glances.tls.certresolver: "letsencrypt"
|
traefik.http.routers.glances.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.glances.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.glances.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
gotify_enabled: false
|
gotify_enabled: false
|
||||||
gotify_available_externally: "false"
|
gotify_available_externally: false
|
||||||
|
|
||||||
# data directory
|
# data directory
|
||||||
gotify_data_directory: "{{ docker_home }}/gotify"
|
gotify_data_directory: "{{ docker_home }}/gotify"
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ gotify_memory }}"
|
memory: "{{ gotify_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ gotify_available_externally }}"
|
traefik.enable: "{{ gotify_available_externally | string}}"
|
||||||
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.gotify.tls.certresolver: "letsencrypt"
|
traefik.http.routers.gotify.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.gotify.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.gotify.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
heimdall_enabled: true
|
heimdall_enabled: true
|
||||||
heimdall_available_externally: "false"
|
heimdall_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
heimdall_docker_image: linuxserver/heimdall:latest
|
heimdall_docker_image: linuxserver/heimdall:latest
|
||||||
|
|
|
@ -41,7 +41,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ heimdall_memory }}"
|
memory: "{{ heimdall_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ heimdall_available_externally }}"
|
traefik.enable: "{{ heimdall_available_externally | string}}"
|
||||||
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.heimdall.tls.certresolver: "letsencrypt"
|
traefik.http.routers.heimdall.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.heimdall.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.heimdall.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
homeassistant_enabled: false
|
homeassistant_enabled: false
|
||||||
homeassistant_available_externally: "false"
|
homeassistant_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
homeassistant_data_directory: "{{ docker_home }}/homeassistant"
|
homeassistant_data_directory: "{{ docker_home }}/homeassistant"
|
||||||
|
|
|
@ -18,7 +18,7 @@
|
||||||
env:
|
env:
|
||||||
TZ: "{{ ansible_nas_timezone }}"
|
TZ: "{{ ansible_nas_timezone }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ homeassistant_available_externally }}"
|
traefik.enable: "{{ homeassistant_available_externally | string}}"
|
||||||
traefik.http.routers.homeassistant.rule: "Host(`{{ homeassistant_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.homeassistant.rule: "Host(`{{ homeassistant_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.homeassistant.tls.certresolver: "letsencrypt"
|
traefik.http.routers.homeassistant.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
homebridge_enabled: false
|
homebridge_enabled: false
|
||||||
homebridge_available_externally: "false"
|
homebridge_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
homebridge_config_directory: "{{ docker_home }}/homebridge/config"
|
homebridge_config_directory: "{{ docker_home }}/homebridge/config"
|
||||||
|
|
|
@ -24,7 +24,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ homebridge_memory }}"
|
memory: "{{ homebridge_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ homebridge_available_externally }}"
|
traefik.enable: "{{ homebridge_available_externally | string}}"
|
||||||
traefik.http.routers.homebridge.rule: "Host(`{{ homebridge_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.homebridge.rule: "Host(`{{ homebridge_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.homebridge.tls.certresolver: "letsencrypt"
|
traefik.http.routers.homebridge.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.homebridge.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.homebridge.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
jackett_enabled: false
|
jackett_enabled: false
|
||||||
jackett_available_externally: "false"
|
jackett_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
jackett_data_directory: "{{ docker_home }}/jackett"
|
jackett_data_directory: "{{ docker_home }}/jackett"
|
||||||
|
|
|
@ -21,7 +21,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ jackett_memory }}"
|
memory: "{{ jackett_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ jackett_available_externally }}"
|
traefik.enable: "{{ jackett_available_externally | string}}"
|
||||||
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.jackett.tls.certresolver: "letsencrypt"
|
traefik.http.routers.jackett.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.jackett.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.jackett.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
jellyfin_enabled: false
|
jellyfin_enabled: false
|
||||||
jellyfin_available_externally: "false"
|
jellyfin_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
jellyfin_config_directory: "{{ docker_home }}/jellyfin/config"
|
jellyfin_config_directory: "{{ docker_home }}/jellyfin/config"
|
||||||
|
|
|
@ -29,7 +29,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ jellyfin_memory }}"
|
memory: "{{ jellyfin_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ jellyfin_available_externally }}"
|
traefik.enable: "{{ jellyfin_available_externally | string}}"
|
||||||
traefik.http.routers.jellyfin.rule: "Host(`{{ jellyfin_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.jellyfin.rule: "Host(`{{ jellyfin_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.jellyfin.tls.certresolver: "letsencrypt"
|
traefik.http.routers.jellyfin.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.jellyfin.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.jellyfin.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
komga_enabled: false
|
komga_enabled: false
|
||||||
komga_available_externally: "false"
|
komga_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
komga_data_directory: "{{ docker_home }}/komga"
|
komga_data_directory: "{{ docker_home }}/komga"
|
||||||
|
|
|
@ -28,7 +28,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ komga_memory }}"
|
memory: "{{ komga_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ komga_available_externally }}"
|
traefik.enable: "{{ komga_available_externally | string}}"
|
||||||
traefik.http.routers.komga.rule: "Host(`{{ komga_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.komga.rule: "Host(`{{ komga_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.komga.tls.certresolver: "letsencrypt"
|
traefik.http.routers.komga.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.komga.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.komga.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
lidarr_enabled: false
|
lidarr_enabled: false
|
||||||
lidarr_available_externally: "false"
|
lidarr_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
lidarr_data_directory: "{{ docker_home }}/lidarr/config"
|
lidarr_data_directory: "{{ docker_home }}/lidarr/config"
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ lidarr_memory }}"
|
memory: "{{ lidarr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ lidarr_available_externally }}"
|
traefik.enable: "{{ lidarr_available_externally | string}}"
|
||||||
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.lidarr.tls.certresolver: "letsencrypt"
|
traefik.http.routers.lidarr.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.lidarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.lidarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
mealie_enabled: false
|
mealie_enabled: false
|
||||||
mealie_available_externally: "false"
|
mealie_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
mealie_data_directory: "{{ docker_home }}/mealie"
|
mealie_data_directory: "{{ docker_home }}/mealie"
|
||||||
|
|
|
@ -19,17 +19,17 @@
|
||||||
TZ: "{{ ansible_nas_timezone }}"
|
TZ: "{{ ansible_nas_timezone }}"
|
||||||
PUID: "{{ mealie_user_id }}"
|
PUID: "{{ mealie_user_id }}"
|
||||||
PGID: "{{ mealie_group_id }}"
|
PGID: "{{ mealie_group_id }}"
|
||||||
RECIPE_PUBLIC: 'true'
|
RECIPE_PUBLIC: "true"
|
||||||
RECIPE_SHOW_NUTRITION: 'true'
|
RECIPE_SHOW_NUTRITION: "true"
|
||||||
RECIPE_SHOW_ASSETS: 'true'
|
RECIPE_SHOW_ASSETS: "true"
|
||||||
RECIPE_LANDSCAPE_VIEW: 'true'
|
RECIPE_LANDSCAPE_VIEW: "true"
|
||||||
RECIPE_DISABLE_COMMENTS: 'false'
|
RECIPE_DISABLE_COMMENTS: "false"
|
||||||
RECIPE_DISABLE_AMOUNT: 'false'
|
RECIPE_DISABLE_AMOUNT: "false"
|
||||||
BASE_URL: "{{ ansible_nas_domain }}:{{ mealie_port }}"
|
BASE_URL: "{{ ansible_nas_domain }}:{{ mealie_port }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ mealie_memory }}"
|
memory: "{{ mealie_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ mealie_available_externally }}"
|
traefik.enable: "{{ mealie_available_externally | string}}"
|
||||||
traefik.http.routers.mealie.rule: "Host(`{{ mealie_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.mealie.rule: "Host(`{{ mealie_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.mealie.tls.certresolver: "letsencrypt"
|
traefik.http.routers.mealie.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.mealie.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.mealie.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
minidlna_enabled: false
|
minidlna_enabled: false
|
||||||
minidlna_available_externally: "false"
|
minidlna_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
minidlna_media_directory1: "{{ movies_root }}"
|
minidlna_media_directory1: "{{ movies_root }}"
|
||||||
|
|
|
@ -1,12 +1,11 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
miniflux_enabled: false
|
miniflux_enabled: false
|
||||||
miniflux_available_externally: "false"
|
miniflux_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
miniflux_data_directory: "{{ docker_home }}/miniflux"
|
miniflux_data_directory: "{{ docker_home }}/miniflux"
|
||||||
|
|
||||||
|
|
||||||
# env
|
# env
|
||||||
miniflux_admin_username: admin
|
miniflux_admin_username: admin
|
||||||
miniflux_admin_password: supersecure
|
miniflux_admin_password: supersecure
|
||||||
|
|
|
@ -37,7 +37,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ miniflux_memory }}"
|
memory: "{{ miniflux_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ miniflux_available_externally }}"
|
traefik.enable: "{{ miniflux_available_externally | string}}"
|
||||||
traefik.http.routers.miniflux.rule: "Host(`{{ miniflux_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.miniflux.rule: "Host(`{{ miniflux_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.miniflux.tls.certresolver: "letsencrypt"
|
traefik.http.routers.miniflux.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.miniflux.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.miniflux.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,14 +1,13 @@
|
||||||
---
|
---
|
||||||
# enable or disable the application
|
# enable or disable the application
|
||||||
mylar_enabled: false
|
mylar_enabled: false
|
||||||
mylar_available_externally: "false"
|
mylar_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
mylar_data_directory: "{{ docker_home }}/mylar"
|
mylar_data_directory: "{{ docker_home }}/mylar"
|
||||||
mylar_comics_directory: "{{ comics_root }}"
|
mylar_comics_directory: "{{ comics_root }}"
|
||||||
mylar_downloads_directory: "{{ downloads_root }}"
|
mylar_downloads_directory: "{{ downloads_root }}"
|
||||||
|
|
||||||
|
|
||||||
# uid / gid
|
# uid / gid
|
||||||
mylar_user_id: "0"
|
mylar_user_id: "0"
|
||||||
mylar_group_id: "0"
|
mylar_group_id: "0"
|
||||||
|
|
|
@ -26,7 +26,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ mylar_memory }}"
|
memory: "{{ mylar_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ mylar_available_externally }}"
|
traefik.enable: "{{ mylar_available_externally | string}}"
|
||||||
traefik.http.routers.mylar.rule: "Host(`{{ mylar_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.mylar.rule: "Host(`{{ mylar_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.mylar.tls.certresolver: "letsencrypt"
|
traefik.http.routers.mylar.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.mylar.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.mylar.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -2,14 +2,13 @@
|
||||||
n8n_enabled: false
|
n8n_enabled: false
|
||||||
|
|
||||||
# Networking
|
# Networking
|
||||||
n8n_available_externally: "false"
|
n8n_available_externally: false
|
||||||
n8n_port: 5678
|
n8n_port: 5678
|
||||||
n8n_hostname: "n8n"
|
n8n_hostname: "n8n"
|
||||||
|
|
||||||
# Directories
|
# Directories
|
||||||
n8n_data_directory: "{{ docker_home }}/n8n"
|
n8n_data_directory: "{{ docker_home }}/n8n"
|
||||||
|
|
||||||
|
|
||||||
# Security
|
# Security
|
||||||
n8n_basic_auth_user: "n8n_user"
|
n8n_basic_auth_user: "n8n_user"
|
||||||
n8n_basic_auth_password: "n8n_change_me"
|
n8n_basic_auth_password: "n8n_change_me"
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"
|
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"
|
||||||
N8N_BASIC_AUTH_PASSWORD: "{{ n8n_basic_auth_password }}"
|
N8N_BASIC_AUTH_PASSWORD: "{{ n8n_basic_auth_password }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ n8n_available_externally }}"
|
traefik.enable: "{{ n8n_available_externally | string}}"
|
||||||
traefik.http.routers.n8n.rule: "Host(`{{ n8n_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.n8n.rule: "Host(`{{ n8n_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.n8n.tls.certresolver: "letsencrypt"
|
traefik.http.routers.n8n.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.n8n.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.n8n.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,12 +1,11 @@
|
||||||
---
|
---
|
||||||
navidrome_enabled: false
|
navidrome_enabled: false
|
||||||
navidrome_available_externally: "false"
|
navidrome_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
navidrome_data_directory: "{{ docker_home }}/navidrome"
|
navidrome_data_directory: "{{ docker_home }}/navidrome"
|
||||||
navidrome_music_directory: "{{ music_root }}"
|
navidrome_music_directory: "{{ music_root }}"
|
||||||
|
|
||||||
|
|
||||||
# network
|
# network
|
||||||
navidrome_port: "4533"
|
navidrome_port: "4533"
|
||||||
navidrome_hostname: "navidrome"
|
navidrome_hostname: "navidrome"
|
||||||
|
|
|
@ -27,7 +27,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ navidrome_memory }}"
|
memory: "{{ navidrome_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ navidrome_available_externally }}"
|
traefik.enable: "{{ navidrome_available_externally | string}}"
|
||||||
traefik.http.routers.navidrome.rule: "Host(`{{ navidrome_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.navidrome.rule: "Host(`{{ navidrome_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.navidrome.tls.certresolver: "letsencrypt"
|
traefik.http.routers.navidrome.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.navidrome.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.navidrome.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
netbootxyz_enabled: false
|
netbootxyz_enabled: false
|
||||||
netbootxyz_available_externally: "false"
|
netbootxyz_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
netbootxyz_config_directory: "{{ docker_home }}/netbootxyz/config"
|
netbootxyz_config_directory: "{{ docker_home }}/netbootxyz/config"
|
||||||
|
|
|
@ -26,7 +26,7 @@
|
||||||
PGID: "{{ netbootxyz_group_id }}"
|
PGID: "{{ netbootxyz_group_id }}"
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ netbootxyz_available_externally }}"
|
traefik.enable: "{{ netbootxyz_available_externally | string}}"
|
||||||
traefik.http.routers.netdata.rule: "Host(`{{ netbootxyz_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.netdata.rule: "Host(`{{ netbootxyz_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
|
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
netdata_enabled: false
|
netdata_enabled: false
|
||||||
netdata_available_externally: "false"
|
netdata_available_externally: false
|
||||||
|
|
||||||
# network
|
# network
|
||||||
netdata_hostname: "netdata"
|
netdata_hostname: "netdata"
|
||||||
|
|
|
@ -26,7 +26,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ netdata_memory }}"
|
memory: "{{ netdata_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ netdata_available_externally }}"
|
traefik.enable: "{{ netdata_available_externally | string}}"
|
||||||
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
|
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
nextcloud_enabled: false
|
nextcloud_enabled: false
|
||||||
nextcloud_available_externally: "false"
|
nextcloud_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
nextcloud_data_directory: "{{ docker_home }}/nextcloud"
|
nextcloud_data_directory: "{{ docker_home }}/nextcloud"
|
||||||
|
|
|
@ -42,7 +42,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ nextcloud_memory }}"
|
memory: "{{ nextcloud_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ nextcloud_available_externally }}"
|
traefik.enable: "{{ nextcloud_available_externally | string}}"
|
||||||
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.nextcloud.tls.certresolver: "letsencrypt"
|
traefik.http.routers.nextcloud.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.nextcloud.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.nextcloud.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
nzbget_enabled: false
|
nzbget_enabled: false
|
||||||
nzbget_available_externally: "false"
|
nzbget_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
nzbget_data_directory: "{{ docker_home }}/nzbget"
|
nzbget_data_directory: "{{ docker_home }}/nzbget"
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ nzbget_memory }}"
|
memory: "{{ nzbget_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ nzbget_available_externally }}"
|
traefik.enable: "{{ nzbget_available_externally | string}}"
|
||||||
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.nzbget.tls.certresolver: "letsencrypt"
|
traefik.http.routers.nzbget.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.nzbget.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.nzbget.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
ombi_enabled: false
|
ombi_enabled: false
|
||||||
ombi_available_externally: "false"
|
ombi_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
ombi_config_directory: "{{ docker_home }}/ombi/config"
|
ombi_config_directory: "{{ docker_home }}/ombi/config"
|
||||||
|
|
|
@ -20,7 +20,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ ombi_memory }}"
|
memory: "{{ ombi_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ ombi_available_externally }}"
|
traefik.enable: "{{ ombi_available_externally | string}}"
|
||||||
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.ombi.tls.certresolver: "letsencrypt"
|
traefik.http.routers.ombi.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.ombi.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.ombi.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
organizr_enabled: false
|
organizr_enabled: false
|
||||||
organizr_available_externally: "false"
|
organizr_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
organizr_data_directory: "{{ docker_home }}/organizr"
|
organizr_data_directory: "{{ docker_home }}/organizr"
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ organizr_memory }}"
|
memory: "{{ organizr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ organizr_available_externally }}"
|
traefik.enable: "{{ organizr_available_externally | string}}"
|
||||||
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.organizr.tls.certresolver: "letsencrypt"
|
traefik.http.routers.organizr.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.organizr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.organizr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
overseerr_enabled: false
|
overseerr_enabled: false
|
||||||
overseerr_available_externally: "false"
|
overseerr_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
overseerr_data_directory: "{{ docker_home }}/overseerr"
|
overseerr_data_directory: "{{ docker_home }}/overseerr"
|
||||||
|
|
|
@ -23,7 +23,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ overseerr_memory }}"
|
memory: "{{ overseerr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ overseerr_available_externally }}"
|
traefik.enable: "{{ overseerr_available_externally | string}}"
|
||||||
traefik.http.routers.overseerr.rule: "Host(`{{ overseerr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.overseerr.rule: "Host(`{{ overseerr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.overseerr.tls.certresolver: "letsencrypt"
|
traefik.http.routers.overseerr.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.overseerr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.overseerr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
piwigo_enabled: false
|
piwigo_enabled: false
|
||||||
piwigo_available_externally: "false"
|
piwigo_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
piwigo_config_directory: "{{ docker_home }}/piwigo/config"
|
piwigo_config_directory: "{{ docker_home }}/piwigo/config"
|
||||||
|
|
|
@ -43,7 +43,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ piwigo_memory }}"
|
memory: "{{ piwigo_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ piwigo_available_externally }}"
|
traefik.enable: "{{ piwigo_available_externally | string}}"
|
||||||
traefik.http.routers.piwigo.rule: "Host(`{{ piwigo_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.piwigo.rule: "Host(`{{ piwigo_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.piwigo.tls.certresolver: "letsencrypt"
|
traefik.http.routers.piwigo.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.piwigo.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.piwigo.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
plex_enabled: false
|
plex_enabled: false
|
||||||
plex_available_externally: "false"
|
plex_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
plex_config_directory: "{{ docker_home }}/plex/config"
|
plex_config_directory: "{{ docker_home }}/plex/config"
|
||||||
|
|
|
@ -32,7 +32,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ plex_memory }}"
|
memory: "{{ plex_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ plex_available_externally }}"
|
traefik.enable: "{{ plex_available_externally | string}}"
|
||||||
traefik.http.routers.plex.rule: "Host(`{{ plex_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.plex.rule: "Host(`{{ plex_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.plex.tls.certresolver: "letsencrypt"
|
traefik.http.routers.plex.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.plex.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.plex.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
portainer_enabled: false
|
portainer_enabled: false
|
||||||
portainer_available_externally: "false"
|
portainer_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
portainer_data_directory: "{{ docker_home }}/portainer/config"
|
portainer_data_directory: "{{ docker_home }}/portainer/config"
|
||||||
|
|
|
@ -20,7 +20,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ portainer_memory }}"
|
memory: "{{ portainer_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ portainer_available_externally }}"
|
traefik.enable: "{{ portainer_available_externally | string}}"
|
||||||
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.portainer.tls.certresolver: "letsencrypt"
|
traefik.http.routers.portainer.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.portainer.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.portainer.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
prowlarr_enabled: false
|
prowlarr_enabled: false
|
||||||
prowlarr_available_externally: "false"
|
prowlarr_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
prowlarr_data_directory: "{{ docker_home }}/prowlarr/config"
|
prowlarr_data_directory: "{{ docker_home }}/prowlarr/config"
|
||||||
|
|
|
@ -22,7 +22,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ prowlarr_memory }}"
|
memory: "{{ prowlarr_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ prowlarr_available_externally }}"
|
traefik.enable: "{{ prowlarr_available_externally | string}}"
|
||||||
traefik.http.routers.prowlarr.rule: "Host(`{{ prowlarr_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.prowlarr.rule: "Host(`{{ prowlarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.prowlarr.tls.certresolver: "letsencrypt"
|
traefik.http.routers.prowlarr.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.prowlarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.prowlarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,12 +1,11 @@
|
||||||
---
|
---
|
||||||
pyload_enabled: false
|
pyload_enabled: false
|
||||||
pyload_available_externally: "false"
|
pyload_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
pyload_config_directory: "{{ docker_home }}/pyload"
|
pyload_config_directory: "{{ docker_home }}/pyload"
|
||||||
pyload_download_directory: "{{ downloads_root }}"
|
pyload_download_directory: "{{ downloads_root }}"
|
||||||
|
|
||||||
|
|
||||||
# uid / gid
|
# uid / gid
|
||||||
pyload_user_id: "0"
|
pyload_user_id: "0"
|
||||||
pyload_group_id: "0"
|
pyload_group_id: "0"
|
||||||
|
|
|
@ -25,7 +25,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: "{{ pyload_memory }}"
|
memory: "{{ pyload_memory }}"
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ pyload_available_externally }}"
|
traefik.enable: "{{ pyload_available_externally | string}}"
|
||||||
traefik.http.routers.pyload.rule: "Host(`{{ pyload_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.pyload.rule: "Host(`{{ pyload_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.pyload.tls.certresolver: "letsencrypt"
|
traefik.http.routers.pyload.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.pyload.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.pyload.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
pytivo_enabled: false
|
pytivo_enabled: false
|
||||||
pytivo_available_externally: "false"
|
pytivo_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
pytivo_config_directory: "{{ docker_home }}/pytivo/config"
|
pytivo_config_directory: "{{ docker_home }}/pytivo/config"
|
||||||
|
|
|
@ -30,7 +30,7 @@
|
||||||
restart_policy: unless-stopped
|
restart_policy: unless-stopped
|
||||||
memory: 1g
|
memory: 1g
|
||||||
labels:
|
labels:
|
||||||
traefik.enable: "{{ pytivo_available_externally }}"
|
traefik.enable: "{{ pytivo_available_externally | string}}"
|
||||||
traefik.http.routers.pytivo.rule: "Host(`{{ pytivo_hostname }}.{{ ansible_nas_domain }}`)"
|
traefik.http.routers.pytivo.rule: "Host(`{{ pytivo_hostname }}.{{ ansible_nas_domain }}`)"
|
||||||
traefik.http.routers.pytivo.tls.certresolver: "letsencrypt"
|
traefik.http.routers.pytivo.tls.certresolver: "letsencrypt"
|
||||||
traefik.http.routers.pytivo.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
traefik.http.routers.pytivo.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
---
|
---
|
||||||
radarr_enabled: false
|
radarr_enabled: false
|
||||||
radarr_available_externally: "false"
|
radarr_available_externally: false
|
||||||
|
|
||||||
# directories
|
# directories
|
||||||
radarr_movies_directory: "{{ movies_root }}"
|
radarr_movies_directory: "{{ movies_root }}"
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue