mirror of
https://github.com/davestephens/ansible-nas
synced 2025-01-12 11:38:47 +00:00
♻️ switched from booleans enclosed in strings ("true" "false") to standard booleans. Bools are casted to strings where necessary
This commit is contained in:
parent
3a603062fa
commit
3c5dc50a8b
135 changed files with 152 additions and 164 deletions
|
@ -8,7 +8,7 @@ If Gitea isn't powerful enough for you then consider GitLab. It's a much more po
|
|||
|
||||
Set `gitlab_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
To make GitLab available externally via Traefik set `gitlab_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
To make GitLab available externally via Traefik set `gitlab_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
The first time you run GitLab you'll be prompted for an account's password. The password is for GitLab's `root` administrator account. From there you can log in to create additional users and further configure the application.
|
||||
|
||||
|
|
|
@ -8,6 +8,6 @@ Open source home automation that puts local control and privacy first. Powered b
|
|||
|
||||
Set `homeassistant_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
If you want to access Home Assistant externally, don't forget to set `homeassistant_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
If you want to access Home Assistant externally, don't forget to set `homeassistant_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
The Home Assistant web interface can be found at http://ansible_nas_host_or_ip:8123.
|
||||
|
|
|
@ -8,7 +8,7 @@ Joomla! is an award-winning content management system (CMS), which enables you t
|
|||
|
||||
Set `joomla_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
If you want to access Joomla externally, set `joomla_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
If you want to access Joomla externally, set `joomla_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
The Joomla web interface can be found at http://ansible_nas_host_or_ip:8181.
|
||||
|
||||
|
|
|
@ -11,6 +11,6 @@ An automated Comic Book downloader (cbr/cbz) for use with SABnzbd, NZBGet and to
|
|||
|
||||
Set `mylar_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
If you want to access Mylar externally, don't forget to set `mylar_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
If you want to access Mylar externally, don't forget to set `mylar_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
The Mylar web interface can be found at http://ansible_nas_host_or_ip:5858.
|
||||
|
|
|
@ -8,7 +8,7 @@ Piwigo is open source photo gallery software for the web. Designed for organisat
|
|||
|
||||
Set `piwigo_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
If you want to access Piwigo externally, set `piwigo_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
If you want to access Piwigo externally, set `piwigo_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
The Piwigo web interface can be found at http://ansible_nas_host_or_ip:16923.
|
||||
|
||||
|
|
|
@ -10,6 +10,6 @@ Continuously track your internet speed
|
|||
|
||||
Set `speedtest_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
If you want to access Speedtest-Tracker externally, don't forget to set `speedtest_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
If you want to access Speedtest-Tracker externally, don't forget to set `speedtest_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
The Speedtest-Tracker interface can be found at http://ansible_nas_host_or_ip:8765.
|
||||
|
|
|
@ -8,7 +8,7 @@ TiddlyWiki is a unique non-linear notebook for capturing, organizing, and sharin
|
|||
|
||||
Set `tiddlywiki_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
If you want to access TiddlyWiki externally, set `tiddlywiki_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
If you want to access TiddlyWiki externally, set `tiddlywiki_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
The TiddlyWiki web interface can be found at http://ansible_nas_host_or_ip:8092.
|
||||
|
||||
|
|
|
@ -8,7 +8,7 @@ Docker Container: [https://hub.docker.com/r/ekho/utorrent](https://hub.docker.co
|
|||
|
||||
Set `utorrent_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
If you want to access uTorrent externally, don't forget to set `utorrent_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
If you want to access uTorrent externally, don't forget to set `utorrent_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
The uTorrent web interface can be found at http://ansible_nas_host_or_ip:8111/gui:
|
||||
|
||||
|
|
|
@ -8,7 +8,7 @@ wallabag is a self-hostable PHP application allowing you to not miss any content
|
|||
|
||||
Set `wallabag_enabled: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
If you want to access wallabag externally, don't forget to set `wallabag_available_externally: "true"` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
If you want to access wallabag externally, don't forget to set `wallabag_available_externally: true` in your `inventories/<your_inventory>/nas.yml` file.
|
||||
|
||||
I recommend using the mobile app, which will sync with this installation so you have access to your saved articles even if you don't have signal or wifi access.
|
||||
|
||||
|
|
|
@ -236,7 +236,7 @@ samba_netbios_name: "{{ ansible_nas_hostname }}"
|
|||
### Joomla
|
||||
###
|
||||
joomla_data_directory: "{{ docker_home }}/joomla"
|
||||
joomla_available_externally: "false"
|
||||
joomla_available_externally: false
|
||||
joomla_database_password: top_secret
|
||||
joomla_port: "8181"
|
||||
|
||||
|
@ -248,14 +248,14 @@ openvpn_config_directory: "{{ docker_home }}/openvpn"
|
|||
###
|
||||
### Guacamole
|
||||
###
|
||||
guacamole_available_externally: "false"
|
||||
guacamole_available_externally: false
|
||||
guacamole_data_directory: "{{ docker_home }}/guacamole"
|
||||
guacamole_port: "8090"
|
||||
|
||||
###
|
||||
### Krusader
|
||||
###
|
||||
krusader_available_externally: "false"
|
||||
krusader_available_externally: false
|
||||
krusader_config_directory: "{{ docker_home }}/krusader/config"
|
||||
krusader_browse_directory: "/"
|
||||
krusader_user_id: "0"
|
||||
|
@ -278,7 +278,7 @@ timemachine_port: "10445"
|
|||
###
|
||||
### The Lounge
|
||||
###
|
||||
thelounge_available_externally: "false"
|
||||
thelounge_available_externally: false
|
||||
thelounge_data_directory: "{{ docker_home }}/thelounge"
|
||||
thelounge_port_one: "113"
|
||||
thelounge_port_two: "9002"
|
||||
|
@ -286,14 +286,14 @@ thelounge_port_two: "9002"
|
|||
###
|
||||
### Wallabag
|
||||
###
|
||||
wallabag_available_externally: "false"
|
||||
wallabag_available_externally: false
|
||||
wallabag_data_directory: "{{ docker_home }}/wallabag"
|
||||
wallabag_port: "7780"
|
||||
|
||||
###
|
||||
### Calibre-web
|
||||
###
|
||||
calibre_available_externally: "false"
|
||||
calibre_available_externally: false
|
||||
calibre_data_directory: "{{ docker_home }}/calibre"
|
||||
calibre_user_id: "0"
|
||||
calibre_group_id: "0"
|
||||
|
@ -305,7 +305,7 @@ calibre_ebook_conversion: "linuxserver/calibre-web:calibre"
|
|||
###
|
||||
### openHAB
|
||||
###
|
||||
openhab_available_externally: "false"
|
||||
openhab_available_externally: false
|
||||
openhab_docker_image: openhab/openhab:latest
|
||||
openhab_data_directory: "{{ docker_home }}/openhab"
|
||||
openhab_port_http: "7777"
|
||||
|
@ -314,7 +314,7 @@ openhab_port_https: "7778"
|
|||
###
|
||||
### Ubooquity
|
||||
###
|
||||
ubooquity_available_externally: "false"
|
||||
ubooquity_available_externally: false
|
||||
ubooquity_data_directory: "{{ docker_home }}/ubooquity"
|
||||
ubooquity_user_id: "0"
|
||||
ubooquity_group_id: "0"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
airsonic_enabled: false
|
||||
airsonic_available_externally: "false"
|
||||
airsonic_available_externally: false
|
||||
|
||||
# directories
|
||||
airsonic_data_directory: "{{ docker_home }}/airsonic"
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ airsonic_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ airsonic_available_externally }}"
|
||||
traefik.enable: "{{ airsonic_available_externally | string}}"
|
||||
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.airsonic.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.airsonic.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
bazarr_enabled: false
|
||||
bazarr_available_externally: "false"
|
||||
bazarr_available_externally: false
|
||||
|
||||
# directories
|
||||
bazarr_data_directory: "{{ docker_home }}/bazarr/config"
|
||||
|
|
|
@ -24,7 +24,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ bazarr_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ bazarr_available_externally }}"
|
||||
traefik.enable: "{{ bazarr_available_externally | string}}"
|
||||
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.bazarr.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.bazarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
bitwarden_enabled: false
|
||||
bitwarden_available_externally: "false"
|
||||
bitwarden_available_externally: false
|
||||
bitwarden_data_directory: "{{ docker_home }}/bitwarden"
|
||||
bitwarden_port_a: "19080"
|
||||
bitwarden_port_b: "3012"
|
||||
|
|
|
@ -3,7 +3,7 @@
|
|||
file:
|
||||
path: "{{ item }}"
|
||||
state: directory
|
||||
mode: '0755'
|
||||
mode: "0755"
|
||||
with_items:
|
||||
- "{{ bitwarden_data_directory }}"
|
||||
|
||||
|
@ -23,7 +23,7 @@
|
|||
LOG_FILE: "/data/bitwarden.log"
|
||||
WEBSOCKET_ENABLED: "true"
|
||||
labels:
|
||||
traefik.enable: "{{ bitwarden_available_externally }}"
|
||||
traefik.enable: "{{ bitwarden_available_externally | string}}"
|
||||
traefik.http.routers.bitwarden.rule: "Host(`{{ bitwarden_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.bitwarden.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.bitwarden.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
booksonic_enabled: false
|
||||
booksonic_available_externally: "false"
|
||||
booksonic_available_externally: false
|
||||
|
||||
# uid / gid
|
||||
booksonic_user_id: "1000"
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ booksonic_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ booksonic_available_externally }}"
|
||||
traefik.enable: "{{ booksonic_available_externally | string}}"
|
||||
traefik.http.routers.booksonic.rule: "Host(`{{ booksonic_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.booksonic.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.booksonic.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
cloudcmd_enabled: false
|
||||
cloudcmd_available_externally: "false"
|
||||
cloudcmd_available_externally: false
|
||||
|
||||
# directories
|
||||
cloudcmd_data_directory: "{{ docker_home }}/cloudcmd/config"
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ cloudcmd_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ cloudcmd_available_externally }}"
|
||||
traefik.enable: "{{ cloudcmd_available_externally | string}}"
|
||||
traefik.http.routers.cloudcmd.rule: "Host(`{{ cloudcmd_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.cloudcmd.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.cloudcmd.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
couchpotato_enabled: false
|
||||
couchpotato_available_externally: "false"
|
||||
couchpotato_available_externally: false
|
||||
|
||||
# directories
|
||||
couchpotato_config_directory: "{{ docker_home }}/couchpotato/config"
|
||||
|
|
|
@ -26,7 +26,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ couchpotato_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ couchpotato_available_externally }}"
|
||||
traefik.enable: "{{ couchpotato_available_externally | string}}"
|
||||
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.couchpotato.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.couchpotato.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
dashy_enabled: false
|
||||
dashy_available_externally: "false"
|
||||
dashy_available_externally: false
|
||||
|
||||
# network
|
||||
dashy_port: "8082"
|
||||
|
|
|
@ -9,7 +9,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ dashy_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ dashy_available_externally }}"
|
||||
traefik.enable: "{{ dashy_available_externally | string}}"
|
||||
traefik.http.routers.dashy.rule: "Host(`{{ dashy_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.dashy.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.dashy.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
deluge_enabled: false
|
||||
deluge_available_externally: "false"
|
||||
deluge_available_externally: false
|
||||
|
||||
# directories
|
||||
deluge_config_directory: "{{ docker_home }}/deluge/config"
|
||||
|
|
|
@ -25,7 +25,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ deluge_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ deluge_available_externally }}"
|
||||
traefik.enable: "{{ deluge_available_externally | string}}"
|
||||
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.deluge.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.deluge.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
dokuwiki_enabled: false
|
||||
dokuwiki_available_externally: "false"
|
||||
dokuwiki_available_externally: false
|
||||
|
||||
# directories
|
||||
dokuwiki_data_directory: "{{ docker_home }}/dokuwiki"
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ dokuwiki_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ dokuwiki_available_externally }}"
|
||||
traefik.enable: "{{ dokuwiki_available_externally | string}}"
|
||||
traefik.http.routers.dokuwiki.rule: "Host(`{{ dokuwiki_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.dokuwiki.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.dokuwiki.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
duplicacy_enabled: false
|
||||
duplicacy_available_externally: "false"
|
||||
duplicacy_available_externally: false
|
||||
|
||||
# directories
|
||||
duplicacy_config_directory: "{{ docker_home }}/duplicacy/config"
|
||||
|
@ -8,7 +8,7 @@ duplicacy_logs_directory: "{{ docker_home }}/duplicacy/logs"
|
|||
duplicacy_cache_directory: "{{ docker_home }}/duplicacy/cache"
|
||||
|
||||
# permissions
|
||||
duplicacy_data_permissions: "ro" # Change to 'rw' to allow the UI to restore data
|
||||
duplicacy_data_permissions: "ro" # Change to 'rw' to allow the UI to restore data
|
||||
|
||||
# version
|
||||
duplicacy_web_version: "Stable"
|
||||
|
|
|
@ -29,7 +29,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ duplicacy_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ duplicacy_available_externally }}"
|
||||
traefik.enable: "{{ duplicacy_available_externally | string}}"
|
||||
traefik.http.routers.duplicacy.rule: "Host(`{{ duplicacy_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.duplicacy.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.duplicacy.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
duplicati_enabled: false
|
||||
duplicati_available_externally: "false"
|
||||
duplicati_available_externally: false
|
||||
|
||||
# directories
|
||||
duplicati_data_directory: "{{ docker_home }}/duplicati/config"
|
||||
|
|
|
@ -25,7 +25,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ duplicati_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ duplicati_available_externally }}"
|
||||
traefik.enable: "{{ duplicati_available_externally | string}}"
|
||||
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.duplicati.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.duplicati.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,13 +1,12 @@
|
|||
---
|
||||
emby_enabled: false
|
||||
emby_available_externally: "false"
|
||||
emby_available_externally: false
|
||||
|
||||
# directories
|
||||
emby_config_directory: "{{ docker_home }}/emby/config"
|
||||
emby_movies_directory: "{{ movies_root }}"
|
||||
emby_tv_directory: "{{ tv_root }}"
|
||||
|
||||
|
||||
# If you're paranoid, set permissions to "ro" so Emby won't ever be able to
|
||||
# delete your files
|
||||
emby_movies_permissions: "rw"
|
||||
|
|
|
@ -25,7 +25,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ emby_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ emby_available_externally }}"
|
||||
traefik.enable: "{{ emby_available_externally | string}}"
|
||||
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.emby.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.emby.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
esphome_enabled: false
|
||||
esphome_available_externally: "false"
|
||||
esphome_available_externally: false
|
||||
|
||||
# directories
|
||||
esphome_data_directory: "{{ docker_home }}/esphome"
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ esphome_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ esphome_available_externally }}"
|
||||
traefik.enable: "{{ esphome_available_externally | string}}"
|
||||
traefik.http.routers.esphome.rule: "Host(`{{ esphome_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.esphome.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.esphome.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
firefly_enabled: false
|
||||
firefly_available_externally: "false"
|
||||
firefly_available_externally: false
|
||||
|
||||
# directories
|
||||
firefly_data_directory: "{{ docker_home }}/firefly"
|
||||
|
|
|
@ -52,7 +52,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ firefly_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ firefly_available_externally }}"
|
||||
traefik.enable: "{{ firefly_available_externally | string}}"
|
||||
traefik.http.routers.firefly.rule: "Host(`{{ firefly_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.firefly.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.firefly.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,12 +1,11 @@
|
|||
---
|
||||
freshrss_enabled: false
|
||||
freshrss_available_externally: "false"
|
||||
freshrss_available_externally: false
|
||||
|
||||
# directories
|
||||
freshrss_data_directory: "{{ docker_home }}/freshrss"
|
||||
freshrss_extensions_directory: "{{ docker_home }}/freshrss"
|
||||
|
||||
|
||||
# network
|
||||
freshrss_port: "8089"
|
||||
freshrss_hostname: "freshrss"
|
||||
|
|
|
@ -24,7 +24,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ freshrss_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ freshrss_available_externally }}"
|
||||
traefik.enable: "{{ freshrss_available_externally | string}}"
|
||||
traefik.http.routers.freshrss.rule: "Host(`{{ freshrss_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.freshrss.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.freshrss.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
gitea_enabled: false
|
||||
gitea_available_externally: "false"
|
||||
gitea_available_externally: false
|
||||
|
||||
# directories
|
||||
gitea_data_directory: "{{ docker_home }}/gitea"
|
||||
|
|
|
@ -68,7 +68,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ gitea_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ gitea_available_externally }}"
|
||||
traefik.enable: "{{ gitea_available_externally | string}}"
|
||||
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.gitea.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.gitea.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
gitlab_enabled: false
|
||||
gitlab_available_externally: "false"
|
||||
gitlab_available_externally: false
|
||||
|
||||
# directories
|
||||
gitlab_data_directory: "{{ docker_home }}/gitlab"
|
||||
|
|
|
@ -59,7 +59,7 @@
|
|||
hostname: "{{ gitlab_hostname }}.{{ ansible_nas_domain }}"
|
||||
memory: "{{ gitlab_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ gitlab_available_externally }}"
|
||||
traefik.enable: "{{ gitlab_available_externally | string}}"
|
||||
traefik.http.routers.gitlab.rule: "Host(`{{ gitlab_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.gitlab.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.gitlab.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
glances_enabled: false
|
||||
glances_available_externally: "false"
|
||||
glances_available_externally: false
|
||||
|
||||
# network
|
||||
glances_hostname: "glances"
|
||||
|
|
|
@ -17,7 +17,7 @@
|
|||
security_opts: "{{ glances_security_options }}"
|
||||
memory: "{{ glances_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ glances_available_externally }}"
|
||||
traefik.enable: "{{ glances_available_externally | string}}"
|
||||
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.glances.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.glances.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
gotify_enabled: false
|
||||
gotify_available_externally: "false"
|
||||
gotify_available_externally: false
|
||||
|
||||
# data directory
|
||||
gotify_data_directory: "{{ docker_home }}/gotify"
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ gotify_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ gotify_available_externally }}"
|
||||
traefik.enable: "{{ gotify_available_externally | string}}"
|
||||
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.gotify.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.gotify.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
heimdall_enabled: true
|
||||
heimdall_available_externally: "false"
|
||||
heimdall_available_externally: false
|
||||
|
||||
# directories
|
||||
heimdall_docker_image: linuxserver/heimdall:latest
|
||||
|
|
|
@ -41,7 +41,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ heimdall_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ heimdall_available_externally }}"
|
||||
traefik.enable: "{{ heimdall_available_externally | string}}"
|
||||
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.heimdall.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.heimdall.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
homeassistant_enabled: false
|
||||
homeassistant_available_externally: "false"
|
||||
homeassistant_available_externally: false
|
||||
|
||||
# directories
|
||||
homeassistant_data_directory: "{{ docker_home }}/homeassistant"
|
||||
|
|
|
@ -18,7 +18,7 @@
|
|||
env:
|
||||
TZ: "{{ ansible_nas_timezone }}"
|
||||
labels:
|
||||
traefik.enable: "{{ homeassistant_available_externally }}"
|
||||
traefik.enable: "{{ homeassistant_available_externally | string}}"
|
||||
traefik.http.routers.homeassistant.rule: "Host(`{{ homeassistant_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.homeassistant.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
homebridge_enabled: false
|
||||
homebridge_available_externally: "false"
|
||||
homebridge_available_externally: false
|
||||
|
||||
# directories
|
||||
homebridge_config_directory: "{{ docker_home }}/homebridge/config"
|
||||
|
|
|
@ -24,7 +24,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ homebridge_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ homebridge_available_externally }}"
|
||||
traefik.enable: "{{ homebridge_available_externally | string}}"
|
||||
traefik.http.routers.homebridge.rule: "Host(`{{ homebridge_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.homebridge.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.homebridge.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
jackett_enabled: false
|
||||
jackett_available_externally: "false"
|
||||
jackett_available_externally: false
|
||||
|
||||
# directories
|
||||
jackett_data_directory: "{{ docker_home }}/jackett"
|
||||
|
|
|
@ -21,7 +21,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ jackett_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ jackett_available_externally }}"
|
||||
traefik.enable: "{{ jackett_available_externally | string}}"
|
||||
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.jackett.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.jackett.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
jellyfin_enabled: false
|
||||
jellyfin_available_externally: "false"
|
||||
jellyfin_available_externally: false
|
||||
|
||||
# directories
|
||||
jellyfin_config_directory: "{{ docker_home }}/jellyfin/config"
|
||||
|
|
|
@ -29,7 +29,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ jellyfin_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ jellyfin_available_externally }}"
|
||||
traefik.enable: "{{ jellyfin_available_externally | string}}"
|
||||
traefik.http.routers.jellyfin.rule: "Host(`{{ jellyfin_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.jellyfin.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.jellyfin.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
komga_enabled: false
|
||||
komga_available_externally: "false"
|
||||
komga_available_externally: false
|
||||
|
||||
# directories
|
||||
komga_data_directory: "{{ docker_home }}/komga"
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ komga_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ komga_available_externally }}"
|
||||
traefik.enable: "{{ komga_available_externally | string}}"
|
||||
traefik.http.routers.komga.rule: "Host(`{{ komga_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.komga.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.komga.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
lidarr_enabled: false
|
||||
lidarr_available_externally: "false"
|
||||
lidarr_available_externally: false
|
||||
|
||||
# directories
|
||||
lidarr_data_directory: "{{ docker_home }}/lidarr/config"
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ lidarr_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ lidarr_available_externally }}"
|
||||
traefik.enable: "{{ lidarr_available_externally | string}}"
|
||||
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.lidarr.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.lidarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
mealie_enabled: false
|
||||
mealie_available_externally: "false"
|
||||
mealie_available_externally: false
|
||||
|
||||
# directories
|
||||
mealie_data_directory: "{{ docker_home }}/mealie"
|
||||
|
|
|
@ -19,17 +19,17 @@
|
|||
TZ: "{{ ansible_nas_timezone }}"
|
||||
PUID: "{{ mealie_user_id }}"
|
||||
PGID: "{{ mealie_group_id }}"
|
||||
RECIPE_PUBLIC: 'true'
|
||||
RECIPE_SHOW_NUTRITION: 'true'
|
||||
RECIPE_SHOW_ASSETS: 'true'
|
||||
RECIPE_LANDSCAPE_VIEW: 'true'
|
||||
RECIPE_DISABLE_COMMENTS: 'false'
|
||||
RECIPE_DISABLE_AMOUNT: 'false'
|
||||
RECIPE_PUBLIC: "true"
|
||||
RECIPE_SHOW_NUTRITION: "true"
|
||||
RECIPE_SHOW_ASSETS: "true"
|
||||
RECIPE_LANDSCAPE_VIEW: "true"
|
||||
RECIPE_DISABLE_COMMENTS: "false"
|
||||
RECIPE_DISABLE_AMOUNT: "false"
|
||||
BASE_URL: "{{ ansible_nas_domain }}:{{ mealie_port }}"
|
||||
restart_policy: unless-stopped
|
||||
memory: "{{ mealie_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ mealie_available_externally }}"
|
||||
traefik.enable: "{{ mealie_available_externally | string}}"
|
||||
traefik.http.routers.mealie.rule: "Host(`{{ mealie_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.mealie.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.mealie.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
minidlna_enabled: false
|
||||
minidlna_available_externally: "false"
|
||||
minidlna_available_externally: false
|
||||
|
||||
# directories
|
||||
minidlna_media_directory1: "{{ movies_root }}"
|
||||
|
|
|
@ -1,12 +1,11 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
miniflux_enabled: false
|
||||
miniflux_available_externally: "false"
|
||||
miniflux_available_externally: false
|
||||
|
||||
# directories
|
||||
miniflux_data_directory: "{{ docker_home }}/miniflux"
|
||||
|
||||
|
||||
# env
|
||||
miniflux_admin_username: admin
|
||||
miniflux_admin_password: supersecure
|
||||
|
|
|
@ -37,7 +37,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ miniflux_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ miniflux_available_externally }}"
|
||||
traefik.enable: "{{ miniflux_available_externally | string}}"
|
||||
traefik.http.routers.miniflux.rule: "Host(`{{ miniflux_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.miniflux.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.miniflux.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,14 +1,13 @@
|
|||
---
|
||||
# enable or disable the application
|
||||
mylar_enabled: false
|
||||
mylar_available_externally: "false"
|
||||
mylar_available_externally: false
|
||||
|
||||
# directories
|
||||
mylar_data_directory: "{{ docker_home }}/mylar"
|
||||
mylar_comics_directory: "{{ comics_root }}"
|
||||
mylar_downloads_directory: "{{ downloads_root }}"
|
||||
|
||||
|
||||
# uid / gid
|
||||
mylar_user_id: "0"
|
||||
mylar_group_id: "0"
|
||||
|
|
|
@ -26,7 +26,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ mylar_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ mylar_available_externally }}"
|
||||
traefik.enable: "{{ mylar_available_externally | string}}"
|
||||
traefik.http.routers.mylar.rule: "Host(`{{ mylar_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.mylar.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.mylar.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -2,14 +2,13 @@
|
|||
n8n_enabled: false
|
||||
|
||||
# Networking
|
||||
n8n_available_externally: "false"
|
||||
n8n_available_externally: false
|
||||
n8n_port: 5678
|
||||
n8n_hostname: "n8n"
|
||||
|
||||
# Directories
|
||||
n8n_data_directory: "{{ docker_home }}/n8n"
|
||||
|
||||
|
||||
# Security
|
||||
n8n_basic_auth_user: "n8n_user"
|
||||
n8n_basic_auth_password: "n8n_change_me"
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"
|
||||
N8N_BASIC_AUTH_PASSWORD: "{{ n8n_basic_auth_password }}"
|
||||
labels:
|
||||
traefik.enable: "{{ n8n_available_externally }}"
|
||||
traefik.enable: "{{ n8n_available_externally | string}}"
|
||||
traefik.http.routers.n8n.rule: "Host(`{{ n8n_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.n8n.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.n8n.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,12 +1,11 @@
|
|||
---
|
||||
navidrome_enabled: false
|
||||
navidrome_available_externally: "false"
|
||||
navidrome_available_externally: false
|
||||
|
||||
# directories
|
||||
navidrome_data_directory: "{{ docker_home }}/navidrome"
|
||||
navidrome_music_directory: "{{ music_root }}"
|
||||
|
||||
|
||||
# network
|
||||
navidrome_port: "4533"
|
||||
navidrome_hostname: "navidrome"
|
||||
|
|
|
@ -27,7 +27,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ navidrome_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ navidrome_available_externally }}"
|
||||
traefik.enable: "{{ navidrome_available_externally | string}}"
|
||||
traefik.http.routers.navidrome.rule: "Host(`{{ navidrome_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.navidrome.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.navidrome.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
netbootxyz_enabled: false
|
||||
netbootxyz_available_externally: "false"
|
||||
netbootxyz_available_externally: false
|
||||
|
||||
# directories
|
||||
netbootxyz_config_directory: "{{ docker_home }}/netbootxyz/config"
|
||||
|
|
|
@ -26,7 +26,7 @@
|
|||
PGID: "{{ netbootxyz_group_id }}"
|
||||
restart_policy: unless-stopped
|
||||
labels:
|
||||
traefik.enable: "{{ netbootxyz_available_externally }}"
|
||||
traefik.enable: "{{ netbootxyz_available_externally | string}}"
|
||||
traefik.http.routers.netdata.rule: "Host(`{{ netbootxyz_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
netdata_enabled: false
|
||||
netdata_available_externally: "false"
|
||||
netdata_available_externally: false
|
||||
|
||||
# network
|
||||
netdata_hostname: "netdata"
|
||||
|
|
|
@ -26,7 +26,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ netdata_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ netdata_available_externally }}"
|
||||
traefik.enable: "{{ netdata_available_externally | string}}"
|
||||
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
nextcloud_enabled: false
|
||||
nextcloud_available_externally: "false"
|
||||
nextcloud_available_externally: false
|
||||
|
||||
# directories
|
||||
nextcloud_data_directory: "{{ docker_home }}/nextcloud"
|
||||
|
|
|
@ -42,7 +42,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ nextcloud_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ nextcloud_available_externally }}"
|
||||
traefik.enable: "{{ nextcloud_available_externally | string}}"
|
||||
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.nextcloud.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.nextcloud.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
nzbget_enabled: false
|
||||
nzbget_available_externally: "false"
|
||||
nzbget_available_externally: false
|
||||
|
||||
# directories
|
||||
nzbget_data_directory: "{{ docker_home }}/nzbget"
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ nzbget_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ nzbget_available_externally }}"
|
||||
traefik.enable: "{{ nzbget_available_externally | string}}"
|
||||
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.nzbget.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.nzbget.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
ombi_enabled: false
|
||||
ombi_available_externally: "false"
|
||||
ombi_available_externally: false
|
||||
|
||||
# directories
|
||||
ombi_config_directory: "{{ docker_home }}/ombi/config"
|
||||
|
|
|
@ -20,7 +20,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ ombi_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ ombi_available_externally }}"
|
||||
traefik.enable: "{{ ombi_available_externally | string}}"
|
||||
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.ombi.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.ombi.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
organizr_enabled: false
|
||||
organizr_available_externally: "false"
|
||||
organizr_available_externally: false
|
||||
|
||||
# directories
|
||||
organizr_data_directory: "{{ docker_home }}/organizr"
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ organizr_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ organizr_available_externally }}"
|
||||
traefik.enable: "{{ organizr_available_externally | string}}"
|
||||
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.organizr.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.organizr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
overseerr_enabled: false
|
||||
overseerr_available_externally: "false"
|
||||
overseerr_available_externally: false
|
||||
|
||||
# directories
|
||||
overseerr_data_directory: "{{ docker_home }}/overseerr"
|
||||
|
|
|
@ -23,7 +23,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ overseerr_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ overseerr_available_externally }}"
|
||||
traefik.enable: "{{ overseerr_available_externally | string}}"
|
||||
traefik.http.routers.overseerr.rule: "Host(`{{ overseerr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.overseerr.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.overseerr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
piwigo_enabled: false
|
||||
piwigo_available_externally: "false"
|
||||
piwigo_available_externally: false
|
||||
|
||||
# directories
|
||||
piwigo_config_directory: "{{ docker_home }}/piwigo/config"
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ piwigo_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ piwigo_available_externally }}"
|
||||
traefik.enable: "{{ piwigo_available_externally | string}}"
|
||||
traefik.http.routers.piwigo.rule: "Host(`{{ piwigo_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.piwigo.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.piwigo.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
plex_enabled: false
|
||||
plex_available_externally: "false"
|
||||
plex_available_externally: false
|
||||
|
||||
# directories
|
||||
plex_config_directory: "{{ docker_home }}/plex/config"
|
||||
|
|
|
@ -32,7 +32,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ plex_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ plex_available_externally }}"
|
||||
traefik.enable: "{{ plex_available_externally | string}}"
|
||||
traefik.http.routers.plex.rule: "Host(`{{ plex_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.plex.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.plex.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
portainer_enabled: false
|
||||
portainer_available_externally: "false"
|
||||
portainer_available_externally: false
|
||||
|
||||
# directories
|
||||
portainer_data_directory: "{{ docker_home }}/portainer/config"
|
||||
|
|
|
@ -20,7 +20,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ portainer_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ portainer_available_externally }}"
|
||||
traefik.enable: "{{ portainer_available_externally | string}}"
|
||||
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.portainer.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.portainer.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
prowlarr_enabled: false
|
||||
prowlarr_available_externally: "false"
|
||||
prowlarr_available_externally: false
|
||||
|
||||
# directories
|
||||
prowlarr_data_directory: "{{ docker_home }}/prowlarr/config"
|
||||
|
|
|
@ -22,7 +22,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ prowlarr_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ prowlarr_available_externally }}"
|
||||
traefik.enable: "{{ prowlarr_available_externally | string}}"
|
||||
traefik.http.routers.prowlarr.rule: "Host(`{{ prowlarr_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.prowlarr.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.prowlarr.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,12 +1,11 @@
|
|||
---
|
||||
pyload_enabled: false
|
||||
pyload_available_externally: "false"
|
||||
pyload_available_externally: false
|
||||
|
||||
# directories
|
||||
pyload_config_directory: "{{ docker_home }}/pyload"
|
||||
pyload_download_directory: "{{ downloads_root }}"
|
||||
|
||||
|
||||
# uid / gid
|
||||
pyload_user_id: "0"
|
||||
pyload_group_id: "0"
|
||||
|
|
|
@ -25,7 +25,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: "{{ pyload_memory }}"
|
||||
labels:
|
||||
traefik.enable: "{{ pyload_available_externally }}"
|
||||
traefik.enable: "{{ pyload_available_externally | string}}"
|
||||
traefik.http.routers.pyload.rule: "Host(`{{ pyload_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.pyload.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.pyload.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
pytivo_enabled: false
|
||||
pytivo_available_externally: "false"
|
||||
pytivo_available_externally: false
|
||||
|
||||
# directories
|
||||
pytivo_config_directory: "{{ docker_home }}/pytivo/config"
|
||||
|
|
|
@ -30,7 +30,7 @@
|
|||
restart_policy: unless-stopped
|
||||
memory: 1g
|
||||
labels:
|
||||
traefik.enable: "{{ pytivo_available_externally }}"
|
||||
traefik.enable: "{{ pytivo_available_externally | string}}"
|
||||
traefik.http.routers.pytivo.rule: "Host(`{{ pytivo_hostname }}.{{ ansible_nas_domain }}`)"
|
||||
traefik.http.routers.pytivo.tls.certresolver: "letsencrypt"
|
||||
traefik.http.routers.pytivo.tls.domains[0].main: "{{ ansible_nas_domain }}"
|
||||
|
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
radarr_enabled: false
|
||||
radarr_available_externally: "false"
|
||||
radarr_available_externally: false
|
||||
|
||||
# directories
|
||||
radarr_movies_directory: "{{ movies_root }}"
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue