🚨 fixed jinja linter warning

This commit is contained in:
HitLuca 2022-07-23 17:40:36 +02:00
parent 3c5dc50a8b
commit 78899cd26d
66 changed files with 67 additions and 68 deletions

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ airsonic_memory }}"
labels:
traefik.enable: "{{ airsonic_available_externally | string}}"
traefik.enable: "{{ airsonic_available_externally | string }}"
traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.airsonic.tls.certresolver: "letsencrypt"
traefik.http.routers.airsonic.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: "{{ bazarr_memory }}"
labels:
traefik.enable: "{{ bazarr_available_externally | string}}"
traefik.enable: "{{ bazarr_available_externally | string }}"
traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.bazarr.tls.certresolver: "letsencrypt"
traefik.http.routers.bazarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
LOG_FILE: "/data/bitwarden.log"
WEBSOCKET_ENABLED: "true"
labels:
traefik.enable: "{{ bitwarden_available_externally | string}}"
traefik.enable: "{{ bitwarden_available_externally | string }}"
traefik.http.routers.bitwarden.rule: "Host(`{{ bitwarden_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.bitwarden.tls.certresolver: "letsencrypt"
traefik.http.routers.bitwarden.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -27,7 +27,7 @@
restart_policy: unless-stopped
memory: "{{ booksonic_memory }}"
labels:
traefik.enable: "{{ booksonic_available_externally | string}}"
traefik.enable: "{{ booksonic_available_externally | string }}"
traefik.http.routers.booksonic.rule: "Host(`{{ booksonic_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.booksonic.tls.certresolver: "letsencrypt"
traefik.http.routers.booksonic.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ cloudcmd_memory }}"
labels:
traefik.enable: "{{ cloudcmd_available_externally | string}}"
traefik.enable: "{{ cloudcmd_available_externally | string }}"
traefik.http.routers.cloudcmd.rule: "Host(`{{ cloudcmd_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.cloudcmd.tls.certresolver: "letsencrypt"
traefik.http.routers.cloudcmd.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped
memory: "{{ couchpotato_memory }}"
labels:
traefik.enable: "{{ couchpotato_available_externally | string}}"
traefik.enable: "{{ couchpotato_available_externally | string }}"
traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)"
traefik.http.routers.couchpotato.tls.certresolver: "letsencrypt"
traefik.http.routers.couchpotato.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -9,7 +9,7 @@
restart_policy: unless-stopped
memory: "{{ dashy_memory }}"
labels:
traefik.enable: "{{ dashy_available_externally | string}}"
traefik.enable: "{{ dashy_available_externally | string }}"
traefik.http.routers.dashy.rule: "Host(`{{ dashy_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.dashy.tls.certresolver: "letsencrypt"
traefik.http.routers.dashy.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ deluge_memory }}"
labels:
traefik.enable: "{{ deluge_available_externally | string}}"
traefik.enable: "{{ deluge_available_externally | string }}"
traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.deluge.tls.certresolver: "letsencrypt"
traefik.http.routers.deluge.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped
memory: "{{ dokuwiki_memory }}"
labels:
traefik.enable: "{{ dokuwiki_available_externally | string}}"
traefik.enable: "{{ dokuwiki_available_externally | string }}"
traefik.http.routers.dokuwiki.rule: "Host(`{{ dokuwiki_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.dokuwiki.tls.certresolver: "letsencrypt"
traefik.http.routers.dokuwiki.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -29,7 +29,7 @@
restart_policy: unless-stopped
memory: "{{ duplicacy_memory }}"
labels:
traefik.enable: "{{ duplicacy_available_externally | string}}"
traefik.enable: "{{ duplicacy_available_externally | string }}"
traefik.http.routers.duplicacy.rule: "Host(`{{ duplicacy_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.duplicacy.tls.certresolver: "letsencrypt"
traefik.http.routers.duplicacy.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ duplicati_memory }}"
labels:
traefik.enable: "{{ duplicati_available_externally | string}}"
traefik.enable: "{{ duplicati_available_externally | string }}"
traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.duplicati.tls.certresolver: "letsencrypt"
traefik.http.routers.duplicati.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ emby_memory }}"
labels:
traefik.enable: "{{ emby_available_externally | string}}"
traefik.enable: "{{ emby_available_externally | string }}"
traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.emby.tls.certresolver: "letsencrypt"
traefik.http.routers.emby.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ esphome_memory }}"
labels:
traefik.enable: "{{ esphome_available_externally | string}}"
traefik.enable: "{{ esphome_available_externally | string }}"
traefik.http.routers.esphome.rule: "Host(`{{ esphome_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.esphome.tls.certresolver: "letsencrypt"
traefik.http.routers.esphome.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -52,7 +52,7 @@
restart_policy: unless-stopped
memory: "{{ firefly_memory }}"
labels:
traefik.enable: "{{ firefly_available_externally | string}}"
traefik.enable: "{{ firefly_available_externally | string }}"
traefik.http.routers.firefly.rule: "Host(`{{ firefly_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.firefly.tls.certresolver: "letsencrypt"
traefik.http.routers.firefly.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: "{{ freshrss_memory }}"
labels:
traefik.enable: "{{ freshrss_available_externally | string}}"
traefik.enable: "{{ freshrss_available_externally | string }}"
traefik.http.routers.freshrss.rule: "Host(`{{ freshrss_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.freshrss.tls.certresolver: "letsencrypt"
traefik.http.routers.freshrss.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -68,7 +68,7 @@
restart_policy: unless-stopped
memory: "{{ gitea_memory }}"
labels:
traefik.enable: "{{ gitea_available_externally | string}}"
traefik.enable: "{{ gitea_available_externally | string }}"
traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gitea.tls.certresolver: "letsencrypt"
traefik.http.routers.gitea.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -59,7 +59,7 @@
hostname: "{{ gitlab_hostname }}.{{ ansible_nas_domain }}"
memory: "{{ gitlab_memory }}"
labels:
traefik.enable: "{{ gitlab_available_externally | string}}"
traefik.enable: "{{ gitlab_available_externally | string }}"
traefik.http.routers.gitlab.rule: "Host(`{{ gitlab_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gitlab.tls.certresolver: "letsencrypt"
traefik.http.routers.gitlab.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -17,7 +17,7 @@
security_opts: "{{ glances_security_options }}"
memory: "{{ glances_memory }}"
labels:
traefik.enable: "{{ glances_available_externally | string}}"
traefik.enable: "{{ glances_available_externally | string }}"
traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.glances.tls.certresolver: "letsencrypt"
traefik.http.routers.glances.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ gotify_memory }}"
labels:
traefik.enable: "{{ gotify_available_externally | string}}"
traefik.enable: "{{ gotify_available_externally | string }}"
traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.gotify.tls.certresolver: "letsencrypt"
traefik.http.routers.gotify.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -41,7 +41,7 @@
restart_policy: unless-stopped
memory: "{{ heimdall_memory }}"
labels:
traefik.enable: "{{ heimdall_available_externally | string}}"
traefik.enable: "{{ heimdall_available_externally | string }}"
traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.heimdall.tls.certresolver: "letsencrypt"
traefik.http.routers.heimdall.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -18,7 +18,7 @@
env:
TZ: "{{ ansible_nas_timezone }}"
labels:
traefik.enable: "{{ homeassistant_available_externally | string}}"
traefik.enable: "{{ homeassistant_available_externally | string }}"
traefik.http.routers.homeassistant.rule: "Host(`{{ homeassistant_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.homeassistant.tls.certresolver: "letsencrypt"
traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: "{{ homebridge_memory }}"
labels:
traefik.enable: "{{ homebridge_available_externally | string}}"
traefik.enable: "{{ homebridge_available_externally | string }}"
traefik.http.routers.homebridge.rule: "Host(`{{ homebridge_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.homebridge.tls.certresolver: "letsencrypt"
traefik.http.routers.homebridge.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -21,7 +21,7 @@
restart_policy: unless-stopped
memory: "{{ jackett_memory }}"
labels:
traefik.enable: "{{ jackett_available_externally | string}}"
traefik.enable: "{{ jackett_available_externally | string }}"
traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.jackett.tls.certresolver: "letsencrypt"
traefik.http.routers.jackett.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -29,7 +29,7 @@
restart_policy: unless-stopped
memory: "{{ jellyfin_memory }}"
labels:
traefik.enable: "{{ jellyfin_available_externally | string}}"
traefik.enable: "{{ jellyfin_available_externally | string }}"
traefik.http.routers.jellyfin.rule: "Host(`{{ jellyfin_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.jellyfin.tls.certresolver: "letsencrypt"
traefik.http.routers.jellyfin.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -28,7 +28,7 @@
restart_policy: unless-stopped
memory: "{{ komga_memory }}"
labels:
traefik.enable: "{{ komga_available_externally | string}}"
traefik.enable: "{{ komga_available_externally | string }}"
traefik.http.routers.komga.rule: "Host(`{{ komga_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.komga.tls.certresolver: "letsencrypt"
traefik.http.routers.komga.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped
memory: "{{ lidarr_memory }}"
labels:
traefik.enable: "{{ lidarr_available_externally | string}}"
traefik.enable: "{{ lidarr_available_externally | string }}"
traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.lidarr.tls.certresolver: "letsencrypt"
traefik.http.routers.lidarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -29,7 +29,7 @@
restart_policy: unless-stopped
memory: "{{ mealie_memory }}"
labels:
traefik.enable: "{{ mealie_available_externally | string}}"
traefik.enable: "{{ mealie_available_externally | string }}"
traefik.http.routers.mealie.rule: "Host(`{{ mealie_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.mealie.tls.certresolver: "letsencrypt"
traefik.http.routers.mealie.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -37,7 +37,7 @@
restart_policy: unless-stopped
memory: "{{ miniflux_memory }}"
labels:
traefik.enable: "{{ miniflux_available_externally | string}}"
traefik.enable: "{{ miniflux_available_externally | string }}"
traefik.http.routers.miniflux.rule: "Host(`{{ miniflux_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.miniflux.tls.certresolver: "letsencrypt"
traefik.http.routers.miniflux.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped
memory: "{{ mylar_memory }}"
labels:
traefik.enable: "{{ mylar_available_externally | string}}"
traefik.enable: "{{ mylar_available_externally | string }}"
traefik.http.routers.mylar.rule: "Host(`{{ mylar_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.mylar.tls.certresolver: "letsencrypt"
traefik.http.routers.mylar.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}"
N8N_BASIC_AUTH_PASSWORD: "{{ n8n_basic_auth_password }}"
labels:
traefik.enable: "{{ n8n_available_externally | string}}"
traefik.enable: "{{ n8n_available_externally | string }}"
traefik.http.routers.n8n.rule: "Host(`{{ n8n_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.n8n.tls.certresolver: "letsencrypt"
traefik.http.routers.n8n.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -27,7 +27,7 @@
restart_policy: unless-stopped
memory: "{{ navidrome_memory }}"
labels:
traefik.enable: "{{ navidrome_available_externally | string}}"
traefik.enable: "{{ navidrome_available_externally | string }}"
traefik.http.routers.navidrome.rule: "Host(`{{ navidrome_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.navidrome.tls.certresolver: "letsencrypt"
traefik.http.routers.navidrome.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -26,7 +26,7 @@
PGID: "{{ netbootxyz_group_id }}"
restart_policy: unless-stopped
labels:
traefik.enable: "{{ netbootxyz_available_externally | string}}"
traefik.enable: "{{ netbootxyz_available_externally | string }}"
traefik.http.routers.netdata.rule: "Host(`{{ netbootxyz_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped
memory: "{{ netdata_memory }}"
labels:
traefik.enable: "{{ netdata_available_externally | string}}"
traefik.enable: "{{ netdata_available_externally | string }}"
traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.netdata.tls.certresolver: "letsencrypt"
traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -42,7 +42,7 @@
restart_policy: unless-stopped
memory: "{{ nextcloud_memory }}"
labels:
traefik.enable: "{{ nextcloud_available_externally | string}}"
traefik.enable: "{{ nextcloud_available_externally | string }}"
traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.nextcloud.tls.certresolver: "letsencrypt"
traefik.http.routers.nextcloud.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ nzbget_memory }}"
labels:
traefik.enable: "{{ nzbget_available_externally | string}}"
traefik.enable: "{{ nzbget_available_externally | string }}"
traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.nzbget.tls.certresolver: "letsencrypt"
traefik.http.routers.nzbget.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -20,7 +20,7 @@
restart_policy: unless-stopped
memory: "{{ ombi_memory }}"
labels:
traefik.enable: "{{ ombi_available_externally | string}}"
traefik.enable: "{{ ombi_available_externally | string }}"
traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.ombi.tls.certresolver: "letsencrypt"
traefik.http.routers.ombi.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ organizr_memory }}"
labels:
traefik.enable: "{{ organizr_available_externally | string}}"
traefik.enable: "{{ organizr_available_externally | string }}"
traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.organizr.tls.certresolver: "letsencrypt"
traefik.http.routers.organizr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ overseerr_memory }}"
labels:
traefik.enable: "{{ overseerr_available_externally | string}}"
traefik.enable: "{{ overseerr_available_externally | string }}"
traefik.http.routers.overseerr.rule: "Host(`{{ overseerr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.overseerr.tls.certresolver: "letsencrypt"
traefik.http.routers.overseerr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -43,7 +43,7 @@
restart_policy: unless-stopped
memory: "{{ piwigo_memory }}"
labels:
traefik.enable: "{{ piwigo_available_externally | string}}"
traefik.enable: "{{ piwigo_available_externally | string }}"
traefik.http.routers.piwigo.rule: "Host(`{{ piwigo_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.piwigo.tls.certresolver: "letsencrypt"
traefik.http.routers.piwigo.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -32,7 +32,7 @@
restart_policy: unless-stopped
memory: "{{ plex_memory }}"
labels:
traefik.enable: "{{ plex_available_externally | string}}"
traefik.enable: "{{ plex_available_externally | string }}"
traefik.http.routers.plex.rule: "Host(`{{ plex_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.plex.tls.certresolver: "letsencrypt"
traefik.http.routers.plex.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -20,7 +20,7 @@
restart_policy: unless-stopped
memory: "{{ portainer_memory }}"
labels:
traefik.enable: "{{ portainer_available_externally | string}}"
traefik.enable: "{{ portainer_available_externally | string }}"
traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.portainer.tls.certresolver: "letsencrypt"
traefik.http.routers.portainer.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped
memory: "{{ prowlarr_memory }}"
labels:
traefik.enable: "{{ prowlarr_available_externally | string}}"
traefik.enable: "{{ prowlarr_available_externally | string }}"
traefik.http.routers.prowlarr.rule: "Host(`{{ prowlarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.prowlarr.tls.certresolver: "letsencrypt"
traefik.http.routers.prowlarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ pyload_memory }}"
labels:
traefik.enable: "{{ pyload_available_externally | string}}"
traefik.enable: "{{ pyload_available_externally | string }}"
traefik.http.routers.pyload.rule: "Host(`{{ pyload_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.pyload.tls.certresolver: "letsencrypt"
traefik.http.routers.pyload.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -30,7 +30,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ pytivo_available_externally | string}}"
traefik.enable: "{{ pytivo_available_externally | string }}"
traefik.http.routers.pytivo.rule: "Host(`{{ pytivo_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.pytivo.tls.certresolver: "letsencrypt"
traefik.http.routers.pytivo.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: "{{ radarr_memory }}"
labels:
traefik.enable: "{{ radarr_available_externally | string}}"
traefik.enable: "{{ radarr_available_externally | string }}"
traefik.http.routers.radarr.rule: "Host(`{{ radarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.radarr.tls.certresolver: "letsencrypt"
traefik.http.routers.radarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -19,7 +19,7 @@
restart_policy: unless-stopped
memory: "{{ rssbridge_memory }}"
labels:
traefik.enable: "{{ rssbridge_available_externally | string}}"
traefik.enable: "{{ rssbridge_available_externally | string }}"
traefik.http.routers.rssbridge.rule: "Host(`{{ rssbridge_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.rssbridge.tls.certresolver: "letsencrypt"
traefik.http.routers.rssbridge.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
PGID: "{{ sabnzbd_group_id }}"
restart_policy: unless-stopped
labels:
traefik.enable: "{{ sabnzbd_available_externally | string}}"
traefik.enable: "{{ sabnzbd_available_externally | string }}"
traefik.http.routers.sabnzbd.rule: "Host(`{{ sabnzbd_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.sabnzbd.tls.certresolver: "letsencrypt"
traefik.http.routers.sabnzbd.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ sickchill_memory }}"
labels:
traefik.enable: "{{ sickchill_available_externally | string}}"
traefik.enable: "{{ sickchill_available_externally | string }}"
traefik.http.routers.sickchill.rule: "Host(`{{ sickchill_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.sickchill.tls.certresolver: "letsencrypt"
traefik.http.routers.sickchill.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: "{{ sonarr_memory }}"
labels:
traefik.enable: "{{ sonarr_available_externally | string}}"
traefik.enable: "{{ sonarr_available_externally | string }}"
traefik.http.routers.sonarr.rule: "Host(`{{ sonarr_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.sonarr.tls.certresolver: "letsencrypt"
traefik.http.routers.sonarr.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -21,7 +21,7 @@
restart_policy: unless-stopped
memory: "1g"
labels:
traefik.enable: "{{ speedtest_tracker_available_externally | string}}"
traefik.enable: "{{ speedtest_tracker_available_externally | string }}"
traefik.http.routers.speedtest_tracker.rule: "Host(`{{ speedtest_tracker_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.speedtest_tracker.tls.certresolver: "letsencrypt"
traefik.http.routers.speedtest_tracker.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped
memory: "{{ syncthing_memory }}"
labels:
traefik.enable: "{{ syncthing_available_externally | string}}"
traefik.enable: "{{ syncthing_available_externally | string }}"
traefik.http.routers.syncthing.rule: "Host(`{{ syncthing_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.syncthing.tls.certresolver: "letsencrypt"
traefik.http.routers.syncthing.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -25,7 +25,7 @@
restart_policy: unless-stopped
memory: "{{ tautulli_memory }}"
labels:
traefik.enable: "{{ tautulli_available_externally | string}}"
traefik.enable: "{{ tautulli_available_externally | string }}"
traefik.http.routers.tautulli.rule: "Host(`{{ tautulli_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.tautulli.tls.certresolver: "letsencrypt"
traefik.http.routers.tautulli.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -21,7 +21,7 @@
restart_policy: unless-stopped
memory: "{{ tiddlywiki_memory }}"
labels:
traefik.enable: "{{ tiddlywiki_available_externally | string}}"
traefik.enable: "{{ tiddlywiki_available_externally | string }}"
traefik.http.routers.tiddlywiki.rule: "Host(`{{ tiddlywiki_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.tiddlywiki.tls.certresolver: "letsencrypt"
traefik.http.routers.tiddlywiki.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -31,7 +31,7 @@
TRANSMISSION_INCOMPLETE_DIR: "/downloads/.incomplete"
TRANSMISSION_WATCH_DIR: "/watch"
TRANSMISSION_RATIO_LIMIT: "{{ transmission_openvpn_ratio_limit }}"
TRANSMISSION_RATIO_LIMIT_ENABLED: "{{ transmission_openvpn_ratio_limit_enabled | string}}"
TRANSMISSION_RATIO_LIMIT_ENABLED: "{{ transmission_openvpn_ratio_limit_enabled | string }}"
OPENVPN_PROVIDER: "{{ openvpn_provider }}"
OPENVPN_USERNAME: "{{ openvpn_username }}"
OPENVPN_PASSWORD: "{{ openvpn_password }}"
@ -49,7 +49,7 @@
restart_policy: unless-stopped
memory: "{{ transmission_openvpn_memory }}"
labels:
traefik.enable: "{{ transmission_openvpn_available_externally | string}}"
traefik.enable: "{{ transmission_openvpn_available_externally | string }}"
traefik.http.routers.transmission_openvpn.rule: "Host(`{{ transmission_openvpn_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.transmission_openvpn.tls.certresolver: "letsencrypt"
traefik.http.routers.transmission_openvpn.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -29,7 +29,7 @@
restart_policy: unless-stopped
memory: "{{ transmission_memory }}"
labels:
traefik.enable: "{{ transmission_available_externally | string}}"
traefik.enable: "{{ transmission_available_externally | string }}"
traefik.http.routers.transmission.rule: "Host(`{{ transmission_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.transmission.tls.certresolver: "letsencrypt"
traefik.http.routers.transmission.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -31,7 +31,7 @@
restart_policy: unless-stopped
memory: "{{ utorrent_memory }}"
labels:
traefik.enable: "{{ utorrent_available_externally | string}}"
traefik.enable: "{{ utorrent_available_externally | string }}"
traefik.http.routers.utorrent.rule: "Host(`{{ utorrent_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.utorrent.tls.certresolver: "letsencrypt"
traefik.http.routers.utorrent.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -32,7 +32,7 @@
restart_policy: unless-stopped
memory: "{{ youtubedlmaterial_memory }}"
labels:
traefik.enable: "{{ youtubedlmaterial_available_externally | string}}"
traefik.enable: "{{ youtubedlmaterial_available_externally | string }}"
traefik.http.routers.youtubedlmaterial.rule: "Host(`{{ youtubedlmaterial_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.youtubedlmaterial.tls.certresolver: "letsencrypt"
traefik.http.routers.youtubedlmaterial.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -23,7 +23,7 @@
restart_policy: unless-stopped
memory: "{{ znc_memory }}"
labels:
traefik.enable: "{{ znc_available_externally | string}}"
traefik.enable: "{{ znc_available_externally | string }}"
traefik.http.routers.znc.rule: "Host(`{{ znc_hostname }}.{{ ansible_nas_domain }}`)"
traefik.http.routers.znc.tls.certresolver: "letsencrypt"
traefik.http.routers.znc.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -24,7 +24,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ calibre_available_externally | string}}"
traefik.enable: "{{ calibre_available_externally | string }}"
traefik.http.routers.calibre.rule: "Host(`calibre.{{ ansible_nas_domain }}`)"
traefik.http.routers.calibre.tls.certresolver: "letsencrypt"
traefik.http.routers.calibre.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -27,7 +27,6 @@
# docker run -v /home/david/.guac:/config:rw -p 8080:8080 oznu/guacamole
- name: Guacamole Container
docker_container:
name: guacamole
@ -40,7 +39,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ guacamole_available_externally | string}}"
traefik.enable: "{{ guacamole_available_externally | string }}"
traefik.http.routers.guacamole.rule: "Host(`guacamole.{{ ansible_nas_domain }}`)"
traefik.http.routers.guacamole.tls.certresolver: "letsencrypt"
traefik.http.routers.guacamole.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -39,7 +39,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ joomla_available_externally | string}}"
traefik.enable: "{{ joomla_available_externally | string }}"
traefik.http.routers.joomla.rule: "Host(`joomla.{{ ansible_nas_domain }}`)"
traefik.http.routers.joomla.tls.certresolver: "letsencrypt"
traefik.http.routers.joomla.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -26,7 +26,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ krusader_available_externally | string}}"
traefik.enable: "{{ krusader_available_externally | string }}"
traefik.http.routers.krusader.rule: "Host(`krusader.{{ ansible_nas_domain }}`)"
traefik.http.routers.krusader.tls.certresolver: "letsencrypt"
traefik.http.routers.krusader.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -45,7 +45,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ openhab_available_externally | string}}"
traefik.enable: "{{ openhab_available_externally | string }}"
traefik.http.routers.openhab.rule: "Host(`openhab.{{ ansible_nas_domain }}`)"
traefik.http.routers.openhab.tls.certresolver: "letsencrypt"
traefik.http.routers.openhab.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -27,7 +27,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ thelounge_available_externally | string}}"
traefik.enable: "{{ thelounge_available_externally | string }}"
traefik.http.routers.thelounge.rule: "Host(`thelounge.{{ ansible_nas_domain }}`)"
traefik.http.routers.thelounge.tls.certresolver: "letsencrypt"
traefik.http.routers.thelounge.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -26,7 +26,7 @@
- "{{ ubooquity_port_admin }}:2203"
restart_policy: unless-stopped
labels:
traefik.enable: "{{ ubooquity_available_externally | string}}"
traefik.enable: "{{ ubooquity_available_externally | string }}"
traefik.http.routers.ubooquity.rule: "Host(`ubooquity.{{ ansible_nas_domain }}`)"
traefik.http.routers.ubooquity.tls.certresolver: "letsencrypt"
traefik.http.routers.ubooquity.tls.domains[0].main: "{{ ansible_nas_domain }}"

View file

@ -22,7 +22,7 @@
restart_policy: unless-stopped
memory: 1g
labels:
traefik.enable: "{{ wallabag_available_externally | string}}"
traefik.enable: "{{ wallabag_available_externally | string }}"
traefik.http.routers.wallabag.rule: "Host(`wallabag.{{ ansible_nas_domain }}`)"
traefik.http.routers.wallabag.tls.certresolver: "letsencrypt"
traefik.http.routers.wallabag.tls.domains[0].main: "{{ ansible_nas_domain }}"