♻️ switched from booleans enclosed in strings ("true" "false") to standard booleans. Bools are casted to strings where necessary

This commit is contained in:
HitLuca 2022-07-23 17:32:51 +02:00
parent 3a603062fa
commit 3c5dc50a8b
135 changed files with 152 additions and 164 deletions

View file

@ -8,7 +8,7 @@ If Gitea isn't powerful enough for you then consider GitLab. It's a much more po
Set `gitlab_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `gitlab_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
To make GitLab available externally via Traefik set `gitlab_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. To make GitLab available externally via Traefik set `gitlab_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The first time you run GitLab you'll be prompted for an account's password. The password is for GitLab's `root` administrator account. From there you can log in to create additional users and further configure the application. The first time you run GitLab you'll be prompted for an account's password. The password is for GitLab's `root` administrator account. From there you can log in to create additional users and further configure the application.

View file

@ -8,6 +8,6 @@ Open source home automation that puts local control and privacy first. Powered b
Set `homeassistant_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `homeassistant_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Home Assistant externally, don't forget to set `homeassistant_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. If you want to access Home Assistant externally, don't forget to set `homeassistant_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Home Assistant web interface can be found at http://ansible_nas_host_or_ip:8123. The Home Assistant web interface can be found at http://ansible_nas_host_or_ip:8123.

View file

@ -8,7 +8,7 @@ Joomla! is an award-winning content management system (CMS), which enables you t
Set `joomla_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `joomla_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Joomla externally, set `joomla_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. If you want to access Joomla externally, set `joomla_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Joomla web interface can be found at http://ansible_nas_host_or_ip:8181. The Joomla web interface can be found at http://ansible_nas_host_or_ip:8181.

View file

@ -11,6 +11,6 @@ An automated Comic Book downloader (cbr/cbz) for use with SABnzbd, NZBGet and to
Set `mylar_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `mylar_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Mylar externally, don't forget to set `mylar_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. If you want to access Mylar externally, don't forget to set `mylar_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Mylar web interface can be found at http://ansible_nas_host_or_ip:5858. The Mylar web interface can be found at http://ansible_nas_host_or_ip:5858.

View file

@ -8,7 +8,7 @@ Piwigo is open source photo gallery software for the web. Designed for organisat
Set `piwigo_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `piwigo_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Piwigo externally, set `piwigo_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. If you want to access Piwigo externally, set `piwigo_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Piwigo web interface can be found at http://ansible_nas_host_or_ip:16923. The Piwigo web interface can be found at http://ansible_nas_host_or_ip:16923.

View file

@ -10,6 +10,6 @@ Continuously track your internet speed
Set `speedtest_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `speedtest_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access Speedtest-Tracker externally, don't forget to set `speedtest_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. If you want to access Speedtest-Tracker externally, don't forget to set `speedtest_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The Speedtest-Tracker interface can be found at http://ansible_nas_host_or_ip:8765. The Speedtest-Tracker interface can be found at http://ansible_nas_host_or_ip:8765.

View file

@ -8,7 +8,7 @@ TiddlyWiki is a unique non-linear notebook for capturing, organizing, and sharin
Set `tiddlywiki_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `tiddlywiki_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access TiddlyWiki externally, set `tiddlywiki_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. If you want to access TiddlyWiki externally, set `tiddlywiki_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The TiddlyWiki web interface can be found at http://ansible_nas_host_or_ip:8092. The TiddlyWiki web interface can be found at http://ansible_nas_host_or_ip:8092.

View file

@ -8,7 +8,7 @@ Docker Container: [https://hub.docker.com/r/ekho/utorrent](https://hub.docker.co
Set `utorrent_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `utorrent_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access uTorrent externally, don't forget to set `utorrent_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. If you want to access uTorrent externally, don't forget to set `utorrent_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
The uTorrent web interface can be found at http://ansible_nas_host_or_ip:8111/gui: The uTorrent web interface can be found at http://ansible_nas_host_or_ip:8111/gui:

View file

@ -8,7 +8,7 @@ wallabag is a self-hostable PHP application allowing you to not miss any content
Set `wallabag_enabled: true` in your `inventories/<your_inventory>/nas.yml` file. Set `wallabag_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
If you want to access wallabag externally, don't forget to set `wallabag_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file. If you want to access wallabag externally, don't forget to set `wallabag_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
I recommend using the mobile app, which will sync with this installation so you have access to your saved articles even if you don't have signal or wifi access. I recommend using the mobile app, which will sync with this installation so you have access to your saved articles even if you don't have signal or wifi access.

View file

@ -236,7 +236,7 @@ samba_netbios_name: "{{ ansible_nas_hostname }}"
### Joomla ### Joomla
### ###
joomla_data_directory: "{{ docker_home }}/joomla" joomla_data_directory: "{{ docker_home }}/joomla"
joomla_available_externally: "false" joomla_available_externally: false
joomla_database_password: top_secret joomla_database_password: top_secret
joomla_port: "8181" joomla_port: "8181"
@ -248,14 +248,14 @@ openvpn_config_directory: "{{ docker_home }}/openvpn"
### ###
### Guacamole ### Guacamole
### ###
guacamole_available_externally: "false" guacamole_available_externally: false
guacamole_data_directory: "{{ docker_home }}/guacamole" guacamole_data_directory: "{{ docker_home }}/guacamole"
guacamole_port: "8090" guacamole_port: "8090"
### ###
### Krusader ### Krusader
### ###
krusader_available_externally: "false" krusader_available_externally: false
krusader_config_directory: "{{ docker_home }}/krusader/config" krusader_config_directory: "{{ docker_home }}/krusader/config"
krusader_browse_directory: "/" krusader_browse_directory: "/"
krusader_user_id: "0" krusader_user_id: "0"
@ -278,7 +278,7 @@ timemachine_port: "10445"
### ###
### The Lounge ### The Lounge
### ###
thelounge_available_externally: "false" thelounge_available_externally: false
thelounge_data_directory: "{{ docker_home }}/thelounge" thelounge_data_directory: "{{ docker_home }}/thelounge"
thelounge_port_one: "113" thelounge_port_one: "113"
thelounge_port_two: "9002" thelounge_port_two: "9002"
@ -286,14 +286,14 @@ thelounge_port_two: "9002"
### ###
### Wallabag ### Wallabag
### ###
wallabag_available_externally: "false" wallabag_available_externally: false
wallabag_data_directory: "{{ docker_home }}/wallabag" wallabag_data_directory: "{{ docker_home }}/wallabag"
wallabag_port: "7780" wallabag_port: "7780"
### ###
### Calibre-web ### Calibre-web
### ###
calibre_available_externally: "false" calibre_available_externally: false
calibre_data_directory: "{{ docker_home }}/calibre" calibre_data_directory: "{{ docker_home }}/calibre"
calibre_user_id: "0" calibre_user_id: "0"
calibre_group_id: "0" calibre_group_id: "0"
@ -305,7 +305,7 @@ calibre_ebook_conversion: "linuxserver/calibre-web:calibre"
### ###
### openHAB ### openHAB
### ###
openhab_available_externally: "false" openhab_available_externally: false
openhab_docker_image: openhab/openhab:latest openhab_docker_image: openhab/openhab:latest
openhab_data_directory: "{{ docker_home }}/openhab" openhab_data_directory: "{{ docker_home }}/openhab"
openhab_port_http: "7777" openhab_port_http: "7777"
@ -314,7 +314,7 @@ openhab_port_https: "7778"
### ###
### Ubooquity ### Ubooquity
### ###
ubooquity_available_externally: "false" ubooquity_available_externally: false
ubooquity_data_directory: "{{ docker_home }}/ubooquity" ubooquity_data_directory: "{{ docker_home }}/ubooquity"
ubooquity_user_id: "0" ubooquity_user_id: "0"
ubooquity_group_id: "0" ubooquity_group_id: "0"

View file

@ -1,6 +1,6 @@
--- ---
airsonic_enabled: false airsonic_enabled: false
airsonic_available_externally: "false" airsonic_available_externally: false
# directories # directories
airsonic_data_directory: "{{ docker_home }}/airsonic" airsonic_data_directory: "{{ docker_home }}/airsonic"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ airsonic_memory }}" memory: "{{ airsonic_memory }}"
labels: labels:
traefik.enable: "{{ airsonic_available_externally }}" traefik.enable: "{{ airsonic_available_externally | string}}"
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.airsonic.tls.certresolver: "letsencrypt" traefik.http.routers.airsonic.tls.certresolver: "letsencrypt"
traefik.http.routers.airsonic.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.airsonic.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
bazarr_enabled: false bazarr_enabled: false
bazarr_available_externally: "false" bazarr_available_externally: false
# directories # directories
bazarr_data_directory: "{{ docker_home }}/bazarr/config" bazarr_data_directory: "{{ docker_home }}/bazarr/config"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ bazarr_memory }}" memory: "{{ bazarr_memory }}"
labels: labels:
traefik.enable: "{{ bazarr_available_externally }}" traefik.enable: "{{ bazarr_available_externally | string}}"
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.bazarr.tls.certresolver: "letsencrypt" traefik.http.routers.bazarr.tls.certresolver: "letsencrypt"
traefik.http.routers.bazarr.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.bazarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
bitwarden_enabled: false bitwarden_enabled: false
bitwarden_available_externally: "false" bitwarden_available_externally: false
bitwarden_data_directory: "{{ docker_home }}/bitwarden" bitwarden_data_directory: "{{ docker_home }}/bitwarden"
bitwarden_port_a: "19080" bitwarden_port_a: "19080"
bitwarden_port_b: "3012" bitwarden_port_b: "3012"

View file

@ -3,7 +3,7 @@
file: file:
path: "{{ item }}" path: "{{ item }}"
state: directory state: directory
mode: '0755' mode: "0755"
with_items: with_items:
- "{{ bitwarden_data_directory }}" - "{{ bitwarden_data_directory }}"
@ -23,7 +23,7 @@
LOG_FILE: "/data/bitwarden.log" LOG_FILE: "/data/bitwarden.log"
WEBSOCKET_ENABLED: "true" WEBSOCKET_ENABLED: "true"
labels: labels:
traefik.enable: "{{ bitwarden_available_externally }}" traefik.enable: "{{ bitwarden_available_externally | string}}"
traefik.http.routers.bitwarden.rule: "Host(`{{ bitwarden_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.bitwarden.rule: "Host(`{{ bitwarden_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.bitwarden.tls.certresolver: "letsencrypt" traefik.http.routers.bitwarden.tls.certresolver: "letsencrypt"
traefik.http.routers.bitwarden.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.bitwarden.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
booksonic_enabled: false booksonic_enabled: false
booksonic_available_externally: "false" booksonic_available_externally: false
# uid / gid # uid / gid
booksonic_user_id: "1000" booksonic_user_id: "1000"

View file

@ -27,7 +27,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ booksonic_memory }}" memory: "{{ booksonic_memory }}"
labels: labels:
traefik.enable: "{{ booksonic_available_externally }}" traefik.enable: "{{ booksonic_available_externally | string}}"
traefik.http.routers.booksonic.rule: "Host(`{{ booksonic_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.booksonic.rule: "Host(`{{ booksonic_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.booksonic.tls.certresolver: "letsencrypt" traefik.http.routers.booksonic.tls.certresolver: "letsencrypt"
traefik.http.routers.booksonic.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.booksonic.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
cloudcmd_enabled: false cloudcmd_enabled: false
cloudcmd_available_externally: "false" cloudcmd_available_externally: false
# directories # directories
cloudcmd_data_directory: "{{ docker_home }}/cloudcmd/config" cloudcmd_data_directory: "{{ docker_home }}/cloudcmd/config"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ cloudcmd_memory }}" memory: "{{ cloudcmd_memory }}"
labels: labels:
traefik.enable: "{{ cloudcmd_available_externally }}" traefik.enable: "{{ cloudcmd_available_externally | string}}"
traefik.http.routers.cloudcmd.rule: "Host(`{{ cloudcmd_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.cloudcmd.rule: "Host(`{{ cloudcmd_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.cloudcmd.tls.certresolver: "letsencrypt" traefik.http.routers.cloudcmd.tls.certresolver: "letsencrypt"
traefik.http.routers.cloudcmd.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.cloudcmd.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
couchpotato_enabled: false couchpotato_enabled: false
couchpotato_available_externally: "false" couchpotato_available_externally: false
# directories # directories
couchpotato_config_directory: "{{ docker_home }}/couchpotato/config" couchpotato_config_directory: "{{ docker_home }}/couchpotato/config"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ couchpotato_memory }}" memory: "{{ couchpotato_memory }}"
labels: labels:
traefik.enable: "{{ couchpotato_available_externally }}" traefik.enable: "{{ couchpotato_available_externally | string}}"
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)" traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"
traefik.http.routers.couchpotato.tls.certresolver: "letsencrypt" traefik.http.routers.couchpotato.tls.certresolver: "letsencrypt"
traefik.http.routers.couchpotato.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.couchpotato.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
dashy_enabled: false dashy_enabled: false
dashy_available_externally: "false" dashy_available_externally: false
# network # network
dashy_port: "8082" dashy_port: "8082"

View file

@ -9,7 +9,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ dashy_memory }}" memory: "{{ dashy_memory }}"
labels: labels:
traefik.enable: "{{ dashy_available_externally }}" traefik.enable: "{{ dashy_available_externally | string}}"
traefik.http.routers.dashy.rule: "Host(`{{ dashy_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.dashy.rule: "Host(`{{ dashy_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.dashy.tls.certresolver: "letsencrypt" traefik.http.routers.dashy.tls.certresolver: "letsencrypt"
traefik.http.routers.dashy.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.dashy.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
deluge_enabled: false deluge_enabled: false
deluge_available_externally: "false" deluge_available_externally: false
# directories # directories
deluge_config_directory: "{{ docker_home }}/deluge/config" deluge_config_directory: "{{ docker_home }}/deluge/config"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ deluge_memory }}" memory: "{{ deluge_memory }}"
labels: labels:
traefik.enable: "{{ deluge_available_externally }}" traefik.enable: "{{ deluge_available_externally | string}}"
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.deluge.tls.certresolver: "letsencrypt" traefik.http.routers.deluge.tls.certresolver: "letsencrypt"
traefik.http.routers.deluge.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.deluge.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
dokuwiki_enabled: false dokuwiki_enabled: false
dokuwiki_available_externally: "false" dokuwiki_available_externally: false
# directories # directories
dokuwiki_data_directory: "{{ docker_home }}/dokuwiki" dokuwiki_data_directory: "{{ docker_home }}/dokuwiki"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ dokuwiki_memory }}" memory: "{{ dokuwiki_memory }}"
labels: labels:
traefik.enable: "{{ dokuwiki_available_externally }}" traefik.enable: "{{ dokuwiki_available_externally | string}}"
traefik.http.routers.dokuwiki.rule: "Host(`{{ dokuwiki_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.dokuwiki.rule: "Host(`{{ dokuwiki_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.dokuwiki.tls.certresolver: "letsencrypt" traefik.http.routers.dokuwiki.tls.certresolver: "letsencrypt"
traefik.http.routers.dokuwiki.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.dokuwiki.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
duplicacy_enabled: false duplicacy_enabled: false
duplicacy_available_externally: "false" duplicacy_available_externally: false
# directories # directories
duplicacy_config_directory: "{{ docker_home }}/duplicacy/config" duplicacy_config_directory: "{{ docker_home }}/duplicacy/config"
@ -8,7 +8,7 @@ duplicacy_logs_directory: "{{ docker_home }}/duplicacy/logs"
duplicacy_cache_directory: "{{ docker_home }}/duplicacy/cache" duplicacy_cache_directory: "{{ docker_home }}/duplicacy/cache"
# permissions # permissions
duplicacy_data_permissions: "ro" # Change to 'rw' to allow the UI to restore data duplicacy_data_permissions: "ro" # Change to 'rw' to allow the UI to restore data
# version # version
duplicacy_web_version: "Stable" duplicacy_web_version: "Stable"

View file

@ -29,7 +29,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ duplicacy_memory }}" memory: "{{ duplicacy_memory }}"
labels: labels:
traefik.enable: "{{ duplicacy_available_externally }}" traefik.enable: "{{ duplicacy_available_externally | string}}"
traefik.http.routers.duplicacy.rule: "Host(`{{ duplicacy_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.duplicacy.rule: "Host(`{{ duplicacy_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.duplicacy.tls.certresolver: "letsencrypt" traefik.http.routers.duplicacy.tls.certresolver: "letsencrypt"
traefik.http.routers.duplicacy.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.duplicacy.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
duplicati_enabled: false duplicati_enabled: false
duplicati_available_externally: "false" duplicati_available_externally: false
# directories # directories
duplicati_data_directory: "{{ docker_home }}/duplicati/config" duplicati_data_directory: "{{ docker_home }}/duplicati/config"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ duplicati_memory }}" memory: "{{ duplicati_memory }}"
labels: labels:
traefik.enable: "{{ duplicati_available_externally }}" traefik.enable: "{{ duplicati_available_externally | string}}"
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.duplicati.tls.certresolver: "letsencrypt" traefik.http.routers.duplicati.tls.certresolver: "letsencrypt"
traefik.http.routers.duplicati.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.duplicati.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,13 +1,12 @@
--- ---
emby_enabled: false emby_enabled: false
emby_available_externally: "false" emby_available_externally: false
# directories # directories
emby_config_directory: "{{ docker_home }}/emby/config" emby_config_directory: "{{ docker_home }}/emby/config"
emby_movies_directory: "{{ movies_root }}" emby_movies_directory: "{{ movies_root }}"
emby_tv_directory: "{{ tv_root }}" emby_tv_directory: "{{ tv_root }}"
# If you're paranoid, set permissions to "ro" so Emby won't ever be able to # If you're paranoid, set permissions to "ro" so Emby won't ever be able to
# delete your files # delete your files
emby_movies_permissions: "rw" emby_movies_permissions: "rw"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ emby_memory }}" memory: "{{ emby_memory }}"
labels: labels:
traefik.enable: "{{ emby_available_externally }}" traefik.enable: "{{ emby_available_externally | string}}"
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.emby.tls.certresolver: "letsencrypt" traefik.http.routers.emby.tls.certresolver: "letsencrypt"
traefik.http.routers.emby.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.emby.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
esphome_enabled: false esphome_enabled: false
esphome_available_externally: "false" esphome_available_externally: false
# directories # directories
esphome_data_directory: "{{ docker_home }}/esphome" esphome_data_directory: "{{ docker_home }}/esphome"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ esphome_memory }}" memory: "{{ esphome_memory }}"
labels: labels:
traefik.enable: "{{ esphome_available_externally }}" traefik.enable: "{{ esphome_available_externally | string}}"
traefik.http.routers.esphome.rule: "Host(`{{ esphome_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.esphome.rule: "Host(`{{ esphome_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.esphome.tls.certresolver: "letsencrypt" traefik.http.routers.esphome.tls.certresolver: "letsencrypt"
traefik.http.routers.esphome.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.esphome.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
firefly_enabled: false firefly_enabled: false
firefly_available_externally: "false" firefly_available_externally: false
# directories # directories
firefly_data_directory: "{{ docker_home }}/firefly" firefly_data_directory: "{{ docker_home }}/firefly"

View file

@ -52,7 +52,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ firefly_memory }}" memory: "{{ firefly_memory }}"
labels: labels:
traefik.enable: "{{ firefly_available_externally }}" traefik.enable: "{{ firefly_available_externally | string}}"
traefik.http.routers.firefly.rule: "Host(`{{ firefly_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.firefly.rule: "Host(`{{ firefly_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.firefly.tls.certresolver: "letsencrypt" traefik.http.routers.firefly.tls.certresolver: "letsencrypt"
traefik.http.routers.firefly.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.firefly.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,12 +1,11 @@
--- ---
freshrss_enabled: false freshrss_enabled: false
freshrss_available_externally: "false" freshrss_available_externally: false
# directories # directories
freshrss_data_directory: "{{ docker_home }}/freshrss" freshrss_data_directory: "{{ docker_home }}/freshrss"
freshrss_extensions_directory: "{{ docker_home }}/freshrss" freshrss_extensions_directory: "{{ docker_home }}/freshrss"
# network # network
freshrss_port: "8089" freshrss_port: "8089"
freshrss_hostname: "freshrss" freshrss_hostname: "freshrss"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ freshrss_memory }}" memory: "{{ freshrss_memory }}"
labels: labels:
traefik.enable: "{{ freshrss_available_externally }}" traefik.enable: "{{ freshrss_available_externally | string}}"
traefik.http.routers.freshrss.rule: "Host(`{{ freshrss_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.freshrss.rule: "Host(`{{ freshrss_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.freshrss.tls.certresolver: "letsencrypt" traefik.http.routers.freshrss.tls.certresolver: "letsencrypt"
traefik.http.routers.freshrss.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.freshrss.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
gitea_enabled: false gitea_enabled: false
gitea_available_externally: "false" gitea_available_externally: false
# directories # directories
gitea_data_directory: "{{ docker_home }}/gitea" gitea_data_directory: "{{ docker_home }}/gitea"

View file

@ -68,7 +68,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ gitea_memory }}" memory: "{{ gitea_memory }}"
labels: labels:
traefik.enable: "{{ gitea_available_externally }}" traefik.enable: "{{ gitea_available_externally | string}}"
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gitea.tls.certresolver: "letsencrypt" traefik.http.routers.gitea.tls.certresolver: "letsencrypt"
traefik.http.routers.gitea.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.gitea.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
gitlab_enabled: false gitlab_enabled: false
gitlab_available_externally: "false" gitlab_available_externally: false
# directories # directories
gitlab_data_directory: "{{ docker_home }}/gitlab" gitlab_data_directory: "{{ docker_home }}/gitlab"

View file

@ -59,7 +59,7 @@
hostname: "{{ gitlab_hostname }}.{{ ansible_nas_domain }}" hostname: "{{ gitlab_hostname }}.{{ ansible_nas_domain }}"
memory: "{{ gitlab_memory }}" memory: "{{ gitlab_memory }}"
labels: labels:
traefik.enable: "{{ gitlab_available_externally }}" traefik.enable: "{{ gitlab_available_externally | string}}"
traefik.http.routers.gitlab.rule: "Host(`{{ gitlab_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.gitlab.rule: "Host(`{{ gitlab_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gitlab.tls.certresolver: "letsencrypt" traefik.http.routers.gitlab.tls.certresolver: "letsencrypt"
traefik.http.routers.gitlab.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.gitlab.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
glances_enabled: false glances_enabled: false
glances_available_externally: "false" glances_available_externally: false
# network # network
glances_hostname: "glances" glances_hostname: "glances"

View file

@ -17,7 +17,7 @@
security_opts: "{{ glances_security_options }}" security_opts: "{{ glances_security_options }}"
memory: "{{ glances_memory }}" memory: "{{ glances_memory }}"
labels: labels:
traefik.enable: "{{ glances_available_externally }}" traefik.enable: "{{ glances_available_externally | string}}"
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.glances.tls.certresolver: "letsencrypt" traefik.http.routers.glances.tls.certresolver: "letsencrypt"
traefik.http.routers.glances.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.glances.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
gotify_enabled: false gotify_enabled: false
gotify_available_externally: "false" gotify_available_externally: false
# data directory # data directory
gotify_data_directory: "{{ docker_home }}/gotify" gotify_data_directory: "{{ docker_home }}/gotify"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ gotify_memory }}" memory: "{{ gotify_memory }}"
labels: labels:
traefik.enable: "{{ gotify_available_externally }}" traefik.enable: "{{ gotify_available_externally | string}}"
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gotify.tls.certresolver: "letsencrypt" traefik.http.routers.gotify.tls.certresolver: "letsencrypt"
traefik.http.routers.gotify.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.gotify.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
heimdall_enabled: true heimdall_enabled: true
heimdall_available_externally: "false" heimdall_available_externally: false
# directories # directories
heimdall_docker_image: linuxserver/heimdall:latest heimdall_docker_image: linuxserver/heimdall:latest

View file

@ -41,7 +41,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ heimdall_memory }}" memory: "{{ heimdall_memory }}"
labels: labels:
traefik.enable: "{{ heimdall_available_externally }}" traefik.enable: "{{ heimdall_available_externally | string}}"
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.heimdall.tls.certresolver: "letsencrypt" traefik.http.routers.heimdall.tls.certresolver: "letsencrypt"
traefik.http.routers.heimdall.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.heimdall.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
homeassistant_enabled: false homeassistant_enabled: false
homeassistant_available_externally: "false" homeassistant_available_externally: false
# directories # directories
homeassistant_data_directory: "{{ docker_home }}/homeassistant" homeassistant_data_directory: "{{ docker_home }}/homeassistant"

View file

@ -18,7 +18,7 @@
env: env:
TZ: "{{ ansible_nas_timezone }}" TZ: "{{ ansible_nas_timezone }}"
labels: labels:
traefik.enable: "{{ homeassistant_available_externally }}" traefik.enable: "{{ homeassistant_available_externally | string}}"
traefik.http.routers.homeassistant.rule: "Host(`{{ homeassistant_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.homeassistant.rule: "Host(`{{ homeassistant_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.homeassistant.tls.certresolver: "letsencrypt" traefik.http.routers.homeassistant.tls.certresolver: "letsencrypt"
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
homebridge_enabled: false homebridge_enabled: false
homebridge_available_externally: "false" homebridge_available_externally: false
# directories # directories
homebridge_config_directory: "{{ docker_home }}/homebridge/config" homebridge_config_directory: "{{ docker_home }}/homebridge/config"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ homebridge_memory }}" memory: "{{ homebridge_memory }}"
labels: labels:
traefik.enable: "{{ homebridge_available_externally }}" traefik.enable: "{{ homebridge_available_externally | string}}"
traefik.http.routers.homebridge.rule: "Host(`{{ homebridge_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.homebridge.rule: "Host(`{{ homebridge_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.homebridge.tls.certresolver: "letsencrypt" traefik.http.routers.homebridge.tls.certresolver: "letsencrypt"
traefik.http.routers.homebridge.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.homebridge.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
jackett_enabled: false jackett_enabled: false
jackett_available_externally: "false" jackett_available_externally: false
# directories # directories
jackett_data_directory: "{{ docker_home }}/jackett" jackett_data_directory: "{{ docker_home }}/jackett"

View file

@ -21,7 +21,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ jackett_memory }}" memory: "{{ jackett_memory }}"
labels: labels:
traefik.enable: "{{ jackett_available_externally }}" traefik.enable: "{{ jackett_available_externally | string}}"
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.jackett.tls.certresolver: "letsencrypt" traefik.http.routers.jackett.tls.certresolver: "letsencrypt"
traefik.http.routers.jackett.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.jackett.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
jellyfin_enabled: false jellyfin_enabled: false
jellyfin_available_externally: "false" jellyfin_available_externally: false
# directories # directories
jellyfin_config_directory: "{{ docker_home }}/jellyfin/config" jellyfin_config_directory: "{{ docker_home }}/jellyfin/config"

View file

@ -29,7 +29,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ jellyfin_memory }}" memory: "{{ jellyfin_memory }}"
labels: labels:
traefik.enable: "{{ jellyfin_available_externally }}" traefik.enable: "{{ jellyfin_available_externally | string}}"
traefik.http.routers.jellyfin.rule: "Host(`{{ jellyfin_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.jellyfin.rule: "Host(`{{ jellyfin_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.jellyfin.tls.certresolver: "letsencrypt" traefik.http.routers.jellyfin.tls.certresolver: "letsencrypt"
traefik.http.routers.jellyfin.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.jellyfin.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
komga_enabled: false komga_enabled: false
komga_available_externally: "false" komga_available_externally: false
# directories # directories
komga_data_directory: "{{ docker_home }}/komga" komga_data_directory: "{{ docker_home }}/komga"

View file

@ -28,7 +28,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ komga_memory }}" memory: "{{ komga_memory }}"
labels: labels:
traefik.enable: "{{ komga_available_externally }}" traefik.enable: "{{ komga_available_externally | string}}"
traefik.http.routers.komga.rule: "Host(`{{ komga_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.komga.rule: "Host(`{{ komga_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.komga.tls.certresolver: "letsencrypt" traefik.http.routers.komga.tls.certresolver: "letsencrypt"
traefik.http.routers.komga.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.komga.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
lidarr_enabled: false lidarr_enabled: false
lidarr_available_externally: "false" lidarr_available_externally: false
# directories # directories
lidarr_data_directory: "{{ docker_home }}/lidarr/config" lidarr_data_directory: "{{ docker_home }}/lidarr/config"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ lidarr_memory }}" memory: "{{ lidarr_memory }}"
labels: labels:
traefik.enable: "{{ lidarr_available_externally }}" traefik.enable: "{{ lidarr_available_externally | string}}"
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.lidarr.tls.certresolver: "letsencrypt" traefik.http.routers.lidarr.tls.certresolver: "letsencrypt"
traefik.http.routers.lidarr.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.lidarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
mealie_enabled: false mealie_enabled: false
mealie_available_externally: "false" mealie_available_externally: false
# directories # directories
mealie_data_directory: "{{ docker_home }}/mealie" mealie_data_directory: "{{ docker_home }}/mealie"

View file

@ -19,17 +19,17 @@
TZ: "{{ ansible_nas_timezone }}" TZ: "{{ ansible_nas_timezone }}"
PUID: "{{ mealie_user_id }}" PUID: "{{ mealie_user_id }}"
PGID: "{{ mealie_group_id }}" PGID: "{{ mealie_group_id }}"
RECIPE_PUBLIC: 'true' RECIPE_PUBLIC: "true"
RECIPE_SHOW_NUTRITION: 'true' RECIPE_SHOW_NUTRITION: "true"
RECIPE_SHOW_ASSETS: 'true' RECIPE_SHOW_ASSETS: "true"
RECIPE_LANDSCAPE_VIEW: 'true' RECIPE_LANDSCAPE_VIEW: "true"
RECIPE_DISABLE_COMMENTS: 'false' RECIPE_DISABLE_COMMENTS: "false"
RECIPE_DISABLE_AMOUNT: 'false' RECIPE_DISABLE_AMOUNT: "false"
BASE_URL: "{{ ansible_nas_domain }}:{{ mealie_port }}" BASE_URL: "{{ ansible_nas_domain }}:{{ mealie_port }}"
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ mealie_memory }}" memory: "{{ mealie_memory }}"
labels: labels:
traefik.enable: "{{ mealie_available_externally }}" traefik.enable: "{{ mealie_available_externally | string}}"
traefik.http.routers.mealie.rule: "Host(`{{ mealie_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.mealie.rule: "Host(`{{ mealie_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.mealie.tls.certresolver: "letsencrypt" traefik.http.routers.mealie.tls.certresolver: "letsencrypt"
traefik.http.routers.mealie.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.mealie.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,7 +1,7 @@
--- ---
# enable or disable the application # enable or disable the application
minidlna_enabled: false minidlna_enabled: false
minidlna_available_externally: "false" minidlna_available_externally: false
# directories # directories
minidlna_media_directory1: "{{ movies_root }}" minidlna_media_directory1: "{{ movies_root }}"

View file

@ -1,12 +1,11 @@
--- ---
# enable or disable the application # enable or disable the application
miniflux_enabled: false miniflux_enabled: false
miniflux_available_externally: "false" miniflux_available_externally: false
# directories # directories
miniflux_data_directory: "{{ docker_home }}/miniflux" miniflux_data_directory: "{{ docker_home }}/miniflux"
# env # env
miniflux_admin_username: admin miniflux_admin_username: admin
miniflux_admin_password: supersecure miniflux_admin_password: supersecure

View file

@ -37,7 +37,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ miniflux_memory }}" memory: "{{ miniflux_memory }}"
labels: labels:
traefik.enable: "{{ miniflux_available_externally }}" traefik.enable: "{{ miniflux_available_externally | string}}"
traefik.http.routers.miniflux.rule: "Host(`{{ miniflux_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.miniflux.rule: "Host(`{{ miniflux_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.miniflux.tls.certresolver: "letsencrypt" traefik.http.routers.miniflux.tls.certresolver: "letsencrypt"
traefik.http.routers.miniflux.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.miniflux.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,14 +1,13 @@
--- ---
# enable or disable the application # enable or disable the application
mylar_enabled: false mylar_enabled: false
mylar_available_externally: "false" mylar_available_externally: false
# directories # directories
mylar_data_directory: "{{ docker_home }}/mylar" mylar_data_directory: "{{ docker_home }}/mylar"
mylar_comics_directory: "{{ comics_root }}" mylar_comics_directory: "{{ comics_root }}"
mylar_downloads_directory: "{{ downloads_root }}" mylar_downloads_directory: "{{ downloads_root }}"
# uid / gid # uid / gid
mylar_user_id: "0" mylar_user_id: "0"
mylar_group_id: "0" mylar_group_id: "0"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ mylar_memory }}" memory: "{{ mylar_memory }}"
labels: labels:
traefik.enable: "{{ mylar_available_externally }}" traefik.enable: "{{ mylar_available_externally | string}}"
traefik.http.routers.mylar.rule: "Host(`{{ mylar_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.mylar.rule: "Host(`{{ mylar_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.mylar.tls.certresolver: "letsencrypt" traefik.http.routers.mylar.tls.certresolver: "letsencrypt"
traefik.http.routers.mylar.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.mylar.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -2,14 +2,13 @@
n8n_enabled: false n8n_enabled: false
# Networking # Networking
n8n_available_externally: "false" n8n_available_externally: false
n8n_port: 5678 n8n_port: 5678
n8n_hostname: "n8n" n8n_hostname: "n8n"
# Directories # Directories
n8n_data_directory: "{{ docker_home }}/n8n" n8n_data_directory: "{{ docker_home }}/n8n"
# Security # Security
n8n_basic_auth_user: "n8n_user" n8n_basic_auth_user: "n8n_user"
n8n_basic_auth_password: "n8n_change_me" n8n_basic_auth_password: "n8n_change_me"

View file

@ -23,7 +23,7 @@
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}" N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"
N8N_BASIC_AUTH_PASSWORD: "{{ n8n_basic_auth_password }}" N8N_BASIC_AUTH_PASSWORD: "{{ n8n_basic_auth_password }}"
labels: labels:
traefik.enable: "{{ n8n_available_externally }}" traefik.enable: "{{ n8n_available_externally | string}}"
traefik.http.routers.n8n.rule: "Host(`{{ n8n_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.n8n.rule: "Host(`{{ n8n_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.n8n.tls.certresolver: "letsencrypt" traefik.http.routers.n8n.tls.certresolver: "letsencrypt"
traefik.http.routers.n8n.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.n8n.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,12 +1,11 @@
--- ---
navidrome_enabled: false navidrome_enabled: false
navidrome_available_externally: "false" navidrome_available_externally: false
# directories # directories
navidrome_data_directory: "{{ docker_home }}/navidrome" navidrome_data_directory: "{{ docker_home }}/navidrome"
navidrome_music_directory: "{{ music_root }}" navidrome_music_directory: "{{ music_root }}"
# network # network
navidrome_port: "4533" navidrome_port: "4533"
navidrome_hostname: "navidrome" navidrome_hostname: "navidrome"

View file

@ -27,7 +27,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ navidrome_memory }}" memory: "{{ navidrome_memory }}"
labels: labels:
traefik.enable: "{{ navidrome_available_externally }}" traefik.enable: "{{ navidrome_available_externally | string}}"
traefik.http.routers.navidrome.rule: "Host(`{{ navidrome_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.navidrome.rule: "Host(`{{ navidrome_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.navidrome.tls.certresolver: "letsencrypt" traefik.http.routers.navidrome.tls.certresolver: "letsencrypt"
traefik.http.routers.navidrome.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.navidrome.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
netbootxyz_enabled: false netbootxyz_enabled: false
netbootxyz_available_externally: "false" netbootxyz_available_externally: false
# directories # directories
netbootxyz_config_directory: "{{ docker_home }}/netbootxyz/config" netbootxyz_config_directory: "{{ docker_home }}/netbootxyz/config"

View file

@ -26,7 +26,7 @@
PGID: "{{ netbootxyz_group_id }}" PGID: "{{ netbootxyz_group_id }}"
restart_policy: unless-stopped restart_policy: unless-stopped
labels: labels:
traefik.enable: "{{ netbootxyz_available_externally }}" traefik.enable: "{{ netbootxyz_available_externally | string}}"
traefik.http.routers.netdata.rule: "Host(`{{ netbootxyz_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.netdata.rule: "Host(`{{ netbootxyz_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.netdata.tls.certresolver: "letsencrypt" traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
netdata_enabled: false netdata_enabled: false
netdata_available_externally: "false" netdata_available_externally: false
# network # network
netdata_hostname: "netdata" netdata_hostname: "netdata"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ netdata_memory }}" memory: "{{ netdata_memory }}"
labels: labels:
traefik.enable: "{{ netdata_available_externally }}" traefik.enable: "{{ netdata_available_externally | string}}"
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.netdata.tls.certresolver: "letsencrypt" traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
nextcloud_enabled: false nextcloud_enabled: false
nextcloud_available_externally: "false" nextcloud_available_externally: false
# directories # directories
nextcloud_data_directory: "{{ docker_home }}/nextcloud" nextcloud_data_directory: "{{ docker_home }}/nextcloud"

View file

@ -42,7 +42,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ nextcloud_memory }}" memory: "{{ nextcloud_memory }}"
labels: labels:
traefik.enable: "{{ nextcloud_available_externally }}" traefik.enable: "{{ nextcloud_available_externally | string}}"
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.nextcloud.tls.certresolver: "letsencrypt" traefik.http.routers.nextcloud.tls.certresolver: "letsencrypt"
traefik.http.routers.nextcloud.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.nextcloud.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
nzbget_enabled: false nzbget_enabled: false
nzbget_available_externally: "false" nzbget_available_externally: false
# directories # directories
nzbget_data_directory: "{{ docker_home }}/nzbget" nzbget_data_directory: "{{ docker_home }}/nzbget"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ nzbget_memory }}" memory: "{{ nzbget_memory }}"
labels: labels:
traefik.enable: "{{ nzbget_available_externally }}" traefik.enable: "{{ nzbget_available_externally | string}}"
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.nzbget.tls.certresolver: "letsencrypt" traefik.http.routers.nzbget.tls.certresolver: "letsencrypt"
traefik.http.routers.nzbget.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.nzbget.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
ombi_enabled: false ombi_enabled: false
ombi_available_externally: "false" ombi_available_externally: false
# directories # directories
ombi_config_directory: "{{ docker_home }}/ombi/config" ombi_config_directory: "{{ docker_home }}/ombi/config"

View file

@ -20,7 +20,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ ombi_memory }}" memory: "{{ ombi_memory }}"
labels: labels:
traefik.enable: "{{ ombi_available_externally }}" traefik.enable: "{{ ombi_available_externally | string}}"
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.ombi.tls.certresolver: "letsencrypt" traefik.http.routers.ombi.tls.certresolver: "letsencrypt"
traefik.http.routers.ombi.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.ombi.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
organizr_enabled: false organizr_enabled: false
organizr_available_externally: "false" organizr_available_externally: false
# directories # directories
organizr_data_directory: "{{ docker_home }}/organizr" organizr_data_directory: "{{ docker_home }}/organizr"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ organizr_memory }}" memory: "{{ organizr_memory }}"
labels: labels:
traefik.enable: "{{ organizr_available_externally }}" traefik.enable: "{{ organizr_available_externally | string}}"
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.organizr.tls.certresolver: "letsencrypt" traefik.http.routers.organizr.tls.certresolver: "letsencrypt"
traefik.http.routers.organizr.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.organizr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
overseerr_enabled: false overseerr_enabled: false
overseerr_available_externally: "false" overseerr_available_externally: false
# directories # directories
overseerr_data_directory: "{{ docker_home }}/overseerr" overseerr_data_directory: "{{ docker_home }}/overseerr"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ overseerr_memory }}" memory: "{{ overseerr_memory }}"
labels: labels:
traefik.enable: "{{ overseerr_available_externally }}" traefik.enable: "{{ overseerr_available_externally | string}}"
traefik.http.routers.overseerr.rule: "Host(`{{ overseerr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.overseerr.rule: "Host(`{{ overseerr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.overseerr.tls.certresolver: "letsencrypt" traefik.http.routers.overseerr.tls.certresolver: "letsencrypt"
traefik.http.routers.overseerr.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.overseerr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
piwigo_enabled: false piwigo_enabled: false
piwigo_available_externally: "false" piwigo_available_externally: false
# directories # directories
piwigo_config_directory: "{{ docker_home }}/piwigo/config" piwigo_config_directory: "{{ docker_home }}/piwigo/config"

View file

@ -43,7 +43,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ piwigo_memory }}" memory: "{{ piwigo_memory }}"
labels: labels:
traefik.enable: "{{ piwigo_available_externally }}" traefik.enable: "{{ piwigo_available_externally | string}}"
traefik.http.routers.piwigo.rule: "Host(`{{ piwigo_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.piwigo.rule: "Host(`{{ piwigo_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.piwigo.tls.certresolver: "letsencrypt" traefik.http.routers.piwigo.tls.certresolver: "letsencrypt"
traefik.http.routers.piwigo.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.piwigo.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
plex_enabled: false plex_enabled: false
plex_available_externally: "false" plex_available_externally: false
# directories # directories
plex_config_directory: "{{ docker_home }}/plex/config" plex_config_directory: "{{ docker_home }}/plex/config"

View file

@ -32,7 +32,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ plex_memory }}" memory: "{{ plex_memory }}"
labels: labels:
traefik.enable: "{{ plex_available_externally }}" traefik.enable: "{{ plex_available_externally | string}}"
traefik.http.routers.plex.rule: "Host(`{{ plex_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.plex.rule: "Host(`{{ plex_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.plex.tls.certresolver: "letsencrypt" traefik.http.routers.plex.tls.certresolver: "letsencrypt"
traefik.http.routers.plex.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.plex.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
portainer_enabled: false portainer_enabled: false
portainer_available_externally: "false" portainer_available_externally: false
# directories # directories
portainer_data_directory: "{{ docker_home }}/portainer/config" portainer_data_directory: "{{ docker_home }}/portainer/config"

View file

@ -20,7 +20,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ portainer_memory }}" memory: "{{ portainer_memory }}"
labels: labels:
traefik.enable: "{{ portainer_available_externally }}" traefik.enable: "{{ portainer_available_externally | string}}"
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.portainer.tls.certresolver: "letsencrypt" traefik.http.routers.portainer.tls.certresolver: "letsencrypt"
traefik.http.routers.portainer.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.portainer.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
prowlarr_enabled: false prowlarr_enabled: false
prowlarr_available_externally: "false" prowlarr_available_externally: false
# directories # directories
prowlarr_data_directory: "{{ docker_home }}/prowlarr/config" prowlarr_data_directory: "{{ docker_home }}/prowlarr/config"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ prowlarr_memory }}" memory: "{{ prowlarr_memory }}"
labels: labels:
traefik.enable: "{{ prowlarr_available_externally }}" traefik.enable: "{{ prowlarr_available_externally | string}}"
traefik.http.routers.prowlarr.rule: "Host(`{{ prowlarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.prowlarr.rule: "Host(`{{ prowlarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.prowlarr.tls.certresolver: "letsencrypt" traefik.http.routers.prowlarr.tls.certresolver: "letsencrypt"
traefik.http.routers.prowlarr.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.prowlarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,12 +1,11 @@
--- ---
pyload_enabled: false pyload_enabled: false
pyload_available_externally: "false" pyload_available_externally: false
# directories # directories
pyload_config_directory: "{{ docker_home }}/pyload" pyload_config_directory: "{{ docker_home }}/pyload"
pyload_download_directory: "{{ downloads_root }}" pyload_download_directory: "{{ downloads_root }}"
# uid / gid # uid / gid
pyload_user_id: "0" pyload_user_id: "0"
pyload_group_id: "0" pyload_group_id: "0"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: "{{ pyload_memory }}" memory: "{{ pyload_memory }}"
labels: labels:
traefik.enable: "{{ pyload_available_externally }}" traefik.enable: "{{ pyload_available_externally | string}}"
traefik.http.routers.pyload.rule: "Host(`{{ pyload_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.pyload.rule: "Host(`{{ pyload_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.pyload.tls.certresolver: "letsencrypt" traefik.http.routers.pyload.tls.certresolver: "letsencrypt"
traefik.http.routers.pyload.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.pyload.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
pytivo_enabled: false pytivo_enabled: false
pytivo_available_externally: "false" pytivo_available_externally: false
# directories # directories
pytivo_config_directory: "{{ docker_home }}/pytivo/config" pytivo_config_directory: "{{ docker_home }}/pytivo/config"

View file

@ -30,7 +30,7 @@
restart_policy: unless-stopped restart_policy: unless-stopped
memory: 1g memory: 1g
labels: labels:
traefik.enable: "{{ pytivo_available_externally }}" traefik.enable: "{{ pytivo_available_externally | string}}"
traefik.http.routers.pytivo.rule: "Host(`{{ pytivo_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.pytivo.rule: "Host(`{{ pytivo_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.pytivo.tls.certresolver: "letsencrypt" traefik.http.routers.pytivo.tls.certresolver: "letsencrypt"
traefik.http.routers.pytivo.tls.domains[0].main: "{{ ansible_nas_domain }}" traefik.http.routers.pytivo.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -1,6 +1,6 @@
--- ---
radarr_enabled: false radarr_enabled: false
radarr_available_externally: "false" radarr_available_externally: false
# directories # directories
radarr_movies_directory: "{{ movies_root }}" radarr_movies_directory: "{{ movies_root }}"

Some files were not shown because too many files have changed in this diff Show more