diff --git a/roles/airsonic/tasks/main.yml b/roles/airsonic/tasks/main.yml index f2fd33a3..1ee415b2 100644 --- a/roles/airsonic/tasks/main.yml +++ b/roles/airsonic/tasks/main.yml @@ -23,7 +23,7 @@ restart_policy: unless-stopped memory: "{{ airsonic_memory }}" labels: - traefik.enable: "{{ airsonic_available_externally | string}}" + traefik.enable: "{{ airsonic_available_externally | string }}" traefik.http.routers.airsonic.rule: "Host(`{{ airsonic_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.airsonic.tls.certresolver: "letsencrypt" traefik.http.routers.airsonic.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/bazarr/tasks/main.yml b/roles/bazarr/tasks/main.yml index 754018c9..f3201499 100644 --- a/roles/bazarr/tasks/main.yml +++ b/roles/bazarr/tasks/main.yml @@ -24,7 +24,7 @@ restart_policy: unless-stopped memory: "{{ bazarr_memory }}" labels: - traefik.enable: "{{ bazarr_available_externally | string}}" + traefik.enable: "{{ bazarr_available_externally | string }}" traefik.http.routers.bazarr.rule: "Host(`{{ bazarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.bazarr.tls.certresolver: "letsencrypt" traefik.http.routers.bazarr.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/bitwarden/tasks/main.yml b/roles/bitwarden/tasks/main.yml index 712b2126..e842164a 100644 --- a/roles/bitwarden/tasks/main.yml +++ b/roles/bitwarden/tasks/main.yml @@ -23,7 +23,7 @@ LOG_FILE: "/data/bitwarden.log" WEBSOCKET_ENABLED: "true" labels: - traefik.enable: "{{ bitwarden_available_externally | string}}" + traefik.enable: "{{ bitwarden_available_externally | string }}" traefik.http.routers.bitwarden.rule: "Host(`{{ bitwarden_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.bitwarden.tls.certresolver: "letsencrypt" traefik.http.routers.bitwarden.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/booksonic/tasks/main.yml b/roles/booksonic/tasks/main.yml index 648d57a3..9db66328 100644 --- a/roles/booksonic/tasks/main.yml +++ b/roles/booksonic/tasks/main.yml @@ -27,7 +27,7 @@ restart_policy: unless-stopped memory: "{{ booksonic_memory }}" labels: - traefik.enable: "{{ booksonic_available_externally | string}}" + traefik.enable: "{{ booksonic_available_externally | string }}" traefik.http.routers.booksonic.rule: "Host(`{{ booksonic_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.booksonic.tls.certresolver: "letsencrypt" traefik.http.routers.booksonic.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/cloudcmd/tasks/main.yml b/roles/cloudcmd/tasks/main.yml index a034c392..0c999986 100644 --- a/roles/cloudcmd/tasks/main.yml +++ b/roles/cloudcmd/tasks/main.yml @@ -23,7 +23,7 @@ restart_policy: unless-stopped memory: "{{ cloudcmd_memory }}" labels: - traefik.enable: "{{ cloudcmd_available_externally | string}}" + traefik.enable: "{{ cloudcmd_available_externally | string }}" traefik.http.routers.cloudcmd.rule: "Host(`{{ cloudcmd_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.cloudcmd.tls.certresolver: "letsencrypt" traefik.http.routers.cloudcmd.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/couchpotato/tasks/main.yml b/roles/couchpotato/tasks/main.yml index ac32e75d..0528147c 100644 --- a/roles/couchpotato/tasks/main.yml +++ b/roles/couchpotato/tasks/main.yml @@ -26,7 +26,7 @@ restart_policy: unless-stopped memory: "{{ couchpotato_memory }}" labels: - traefik.enable: "{{ couchpotato_available_externally | string}}" + traefik.enable: "{{ couchpotato_available_externally | string }}" traefik.http.routers.couchpotato.rule: "Host(`couchpotato.{{ ansible_nas_domain }}`)" traefik.http.routers.couchpotato.tls.certresolver: "letsencrypt" traefik.http.routers.couchpotato.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/dashy/tasks/main.yml b/roles/dashy/tasks/main.yml index c80aef03..1d2786d2 100644 --- a/roles/dashy/tasks/main.yml +++ b/roles/dashy/tasks/main.yml @@ -9,7 +9,7 @@ restart_policy: unless-stopped memory: "{{ dashy_memory }}" labels: - traefik.enable: "{{ dashy_available_externally | string}}" + traefik.enable: "{{ dashy_available_externally | string }}" traefik.http.routers.dashy.rule: "Host(`{{ dashy_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.dashy.tls.certresolver: "letsencrypt" traefik.http.routers.dashy.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/deluge/tasks/main.yml b/roles/deluge/tasks/main.yml index 5c997224..b482e5bb 100644 --- a/roles/deluge/tasks/main.yml +++ b/roles/deluge/tasks/main.yml @@ -25,7 +25,7 @@ restart_policy: unless-stopped memory: "{{ deluge_memory }}" labels: - traefik.enable: "{{ deluge_available_externally | string}}" + traefik.enable: "{{ deluge_available_externally | string }}" traefik.http.routers.deluge.rule: "Host(`{{ deluge_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.deluge.tls.certresolver: "letsencrypt" traefik.http.routers.deluge.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/dokuwiki/tasks/main.yml b/roles/dokuwiki/tasks/main.yml index b680edca..a39a9ea9 100644 --- a/roles/dokuwiki/tasks/main.yml +++ b/roles/dokuwiki/tasks/main.yml @@ -22,7 +22,7 @@ restart_policy: unless-stopped memory: "{{ dokuwiki_memory }}" labels: - traefik.enable: "{{ dokuwiki_available_externally | string}}" + traefik.enable: "{{ dokuwiki_available_externally | string }}" traefik.http.routers.dokuwiki.rule: "Host(`{{ dokuwiki_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.dokuwiki.tls.certresolver: "letsencrypt" traefik.http.routers.dokuwiki.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/duplicacy/tasks/main.yml b/roles/duplicacy/tasks/main.yml index ad6800d6..cd9fc15d 100644 --- a/roles/duplicacy/tasks/main.yml +++ b/roles/duplicacy/tasks/main.yml @@ -29,7 +29,7 @@ restart_policy: unless-stopped memory: "{{ duplicacy_memory }}" labels: - traefik.enable: "{{ duplicacy_available_externally | string}}" + traefik.enable: "{{ duplicacy_available_externally | string }}" traefik.http.routers.duplicacy.rule: "Host(`{{ duplicacy_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.duplicacy.tls.certresolver: "letsencrypt" traefik.http.routers.duplicacy.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/duplicati/tasks/main.yml b/roles/duplicati/tasks/main.yml index 7c7b90bb..0b5771ea 100644 --- a/roles/duplicati/tasks/main.yml +++ b/roles/duplicati/tasks/main.yml @@ -25,7 +25,7 @@ restart_policy: unless-stopped memory: "{{ duplicati_memory }}" labels: - traefik.enable: "{{ duplicati_available_externally | string}}" + traefik.enable: "{{ duplicati_available_externally | string }}" traefik.http.routers.duplicati.rule: "Host(`{{ duplicati_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.duplicati.tls.certresolver: "letsencrypt" traefik.http.routers.duplicati.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/emby/tasks/main.yml b/roles/emby/tasks/main.yml index cf215f99..88e3ab51 100644 --- a/roles/emby/tasks/main.yml +++ b/roles/emby/tasks/main.yml @@ -25,7 +25,7 @@ restart_policy: unless-stopped memory: "{{ emby_memory }}" labels: - traefik.enable: "{{ emby_available_externally | string}}" + traefik.enable: "{{ emby_available_externally | string }}" traefik.http.routers.emby.rule: "Host(`{{ emby_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.emby.tls.certresolver: "letsencrypt" traefik.http.routers.emby.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/esphome/tasks/main.yml b/roles/esphome/tasks/main.yml index f34ac78f..6d678fc7 100644 --- a/roles/esphome/tasks/main.yml +++ b/roles/esphome/tasks/main.yml @@ -23,7 +23,7 @@ restart_policy: unless-stopped memory: "{{ esphome_memory }}" labels: - traefik.enable: "{{ esphome_available_externally | string}}" + traefik.enable: "{{ esphome_available_externally | string }}" traefik.http.routers.esphome.rule: "Host(`{{ esphome_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.esphome.tls.certresolver: "letsencrypt" traefik.http.routers.esphome.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/firefly/tasks/main.yml b/roles/firefly/tasks/main.yml index 48ae1f88..f87a0cb7 100644 --- a/roles/firefly/tasks/main.yml +++ b/roles/firefly/tasks/main.yml @@ -52,7 +52,7 @@ restart_policy: unless-stopped memory: "{{ firefly_memory }}" labels: - traefik.enable: "{{ firefly_available_externally | string}}" + traefik.enable: "{{ firefly_available_externally | string }}" traefik.http.routers.firefly.rule: "Host(`{{ firefly_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.firefly.tls.certresolver: "letsencrypt" traefik.http.routers.firefly.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/freshrss/tasks/main.yml b/roles/freshrss/tasks/main.yml index c812d4a6..c39bd64d 100644 --- a/roles/freshrss/tasks/main.yml +++ b/roles/freshrss/tasks/main.yml @@ -24,7 +24,7 @@ restart_policy: unless-stopped memory: "{{ freshrss_memory }}" labels: - traefik.enable: "{{ freshrss_available_externally | string}}" + traefik.enable: "{{ freshrss_available_externally | string }}" traefik.http.routers.freshrss.rule: "Host(`{{ freshrss_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.freshrss.tls.certresolver: "letsencrypt" traefik.http.routers.freshrss.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/gitea/tasks/main.yml b/roles/gitea/tasks/main.yml index 5b99b2ee..006e9513 100644 --- a/roles/gitea/tasks/main.yml +++ b/roles/gitea/tasks/main.yml @@ -68,7 +68,7 @@ restart_policy: unless-stopped memory: "{{ gitea_memory }}" labels: - traefik.enable: "{{ gitea_available_externally | string}}" + traefik.enable: "{{ gitea_available_externally | string }}" traefik.http.routers.gitea.rule: "Host(`{{ gitea_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.gitea.tls.certresolver: "letsencrypt" traefik.http.routers.gitea.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/gitlab/tasks/main.yml b/roles/gitlab/tasks/main.yml index 7398379c..9e23a280 100644 --- a/roles/gitlab/tasks/main.yml +++ b/roles/gitlab/tasks/main.yml @@ -59,7 +59,7 @@ hostname: "{{ gitlab_hostname }}.{{ ansible_nas_domain }}" memory: "{{ gitlab_memory }}" labels: - traefik.enable: "{{ gitlab_available_externally | string}}" + traefik.enable: "{{ gitlab_available_externally | string }}" traefik.http.routers.gitlab.rule: "Host(`{{ gitlab_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.gitlab.tls.certresolver: "letsencrypt" traefik.http.routers.gitlab.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/glances/tasks/main.yml b/roles/glances/tasks/main.yml index 83e8089a..f732f268 100644 --- a/roles/glances/tasks/main.yml +++ b/roles/glances/tasks/main.yml @@ -17,7 +17,7 @@ security_opts: "{{ glances_security_options }}" memory: "{{ glances_memory }}" labels: - traefik.enable: "{{ glances_available_externally | string}}" + traefik.enable: "{{ glances_available_externally | string }}" traefik.http.routers.glances.rule: "Host(`{{ glances_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.glances.tls.certresolver: "letsencrypt" traefik.http.routers.glances.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/gotify/tasks/main.yml b/roles/gotify/tasks/main.yml index 921fa0a0..7560d692 100644 --- a/roles/gotify/tasks/main.yml +++ b/roles/gotify/tasks/main.yml @@ -23,7 +23,7 @@ restart_policy: unless-stopped memory: "{{ gotify_memory }}" labels: - traefik.enable: "{{ gotify_available_externally | string}}" + traefik.enable: "{{ gotify_available_externally | string }}" traefik.http.routers.gotify.rule: "Host(`{{ gotify_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.gotify.tls.certresolver: "letsencrypt" traefik.http.routers.gotify.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/heimdall/tasks/main.yml b/roles/heimdall/tasks/main.yml index 71fc8b2c..da2bd423 100644 --- a/roles/heimdall/tasks/main.yml +++ b/roles/heimdall/tasks/main.yml @@ -41,7 +41,7 @@ restart_policy: unless-stopped memory: "{{ heimdall_memory }}" labels: - traefik.enable: "{{ heimdall_available_externally | string}}" + traefik.enable: "{{ heimdall_available_externally | string }}" traefik.http.routers.heimdall.rule: "Host(`{{ heimdall_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.heimdall.tls.certresolver: "letsencrypt" traefik.http.routers.heimdall.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/homeassistant/tasks/main.yml b/roles/homeassistant/tasks/main.yml index 4686b14f..1f211cd1 100644 --- a/roles/homeassistant/tasks/main.yml +++ b/roles/homeassistant/tasks/main.yml @@ -18,7 +18,7 @@ env: TZ: "{{ ansible_nas_timezone }}" labels: - traefik.enable: "{{ homeassistant_available_externally | string}}" + traefik.enable: "{{ homeassistant_available_externally | string }}" traefik.http.routers.homeassistant.rule: "Host(`{{ homeassistant_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.homeassistant.tls.certresolver: "letsencrypt" traefik.http.routers.homeassistant.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/homebridge/tasks/main.yml b/roles/homebridge/tasks/main.yml index f2c9a41d..55f50fd6 100644 --- a/roles/homebridge/tasks/main.yml +++ b/roles/homebridge/tasks/main.yml @@ -24,7 +24,7 @@ restart_policy: unless-stopped memory: "{{ homebridge_memory }}" labels: - traefik.enable: "{{ homebridge_available_externally | string}}" + traefik.enable: "{{ homebridge_available_externally | string }}" traefik.http.routers.homebridge.rule: "Host(`{{ homebridge_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.homebridge.tls.certresolver: "letsencrypt" traefik.http.routers.homebridge.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/jackett/tasks/main.yml b/roles/jackett/tasks/main.yml index 93cb65c9..e4e704d6 100644 --- a/roles/jackett/tasks/main.yml +++ b/roles/jackett/tasks/main.yml @@ -21,7 +21,7 @@ restart_policy: unless-stopped memory: "{{ jackett_memory }}" labels: - traefik.enable: "{{ jackett_available_externally | string}}" + traefik.enable: "{{ jackett_available_externally | string }}" traefik.http.routers.jackett.rule: "Host(`{{ jackett_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.jackett.tls.certresolver: "letsencrypt" traefik.http.routers.jackett.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/jellyfin/tasks/main.yml b/roles/jellyfin/tasks/main.yml index 4d53dac6..d7f7ae29 100644 --- a/roles/jellyfin/tasks/main.yml +++ b/roles/jellyfin/tasks/main.yml @@ -29,7 +29,7 @@ restart_policy: unless-stopped memory: "{{ jellyfin_memory }}" labels: - traefik.enable: "{{ jellyfin_available_externally | string}}" + traefik.enable: "{{ jellyfin_available_externally | string }}" traefik.http.routers.jellyfin.rule: "Host(`{{ jellyfin_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.jellyfin.tls.certresolver: "letsencrypt" traefik.http.routers.jellyfin.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/komga/tasks/main.yml b/roles/komga/tasks/main.yml index 1a9af2b6..a08b866c 100644 --- a/roles/komga/tasks/main.yml +++ b/roles/komga/tasks/main.yml @@ -28,7 +28,7 @@ restart_policy: unless-stopped memory: "{{ komga_memory }}" labels: - traefik.enable: "{{ komga_available_externally | string}}" + traefik.enable: "{{ komga_available_externally | string }}" traefik.http.routers.komga.rule: "Host(`{{ komga_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.komga.tls.certresolver: "letsencrypt" traefik.http.routers.komga.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/lidarr/tasks/main.yml b/roles/lidarr/tasks/main.yml index f0503245..8e6fa9ae 100644 --- a/roles/lidarr/tasks/main.yml +++ b/roles/lidarr/tasks/main.yml @@ -22,7 +22,7 @@ restart_policy: unless-stopped memory: "{{ lidarr_memory }}" labels: - traefik.enable: "{{ lidarr_available_externally | string}}" + traefik.enable: "{{ lidarr_available_externally | string }}" traefik.http.routers.lidarr.rule: "Host(`{{ lidarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.lidarr.tls.certresolver: "letsencrypt" traefik.http.routers.lidarr.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/mealie/tasks/main.yml b/roles/mealie/tasks/main.yml index 78b8c6a7..b480eafa 100644 --- a/roles/mealie/tasks/main.yml +++ b/roles/mealie/tasks/main.yml @@ -29,7 +29,7 @@ restart_policy: unless-stopped memory: "{{ mealie_memory }}" labels: - traefik.enable: "{{ mealie_available_externally | string}}" + traefik.enable: "{{ mealie_available_externally | string }}" traefik.http.routers.mealie.rule: "Host(`{{ mealie_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.mealie.tls.certresolver: "letsencrypt" traefik.http.routers.mealie.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/miniflux/tasks/main.yml b/roles/miniflux/tasks/main.yml index 3df53eb5..969f3585 100644 --- a/roles/miniflux/tasks/main.yml +++ b/roles/miniflux/tasks/main.yml @@ -37,7 +37,7 @@ restart_policy: unless-stopped memory: "{{ miniflux_memory }}" labels: - traefik.enable: "{{ miniflux_available_externally | string}}" + traefik.enable: "{{ miniflux_available_externally | string }}" traefik.http.routers.miniflux.rule: "Host(`{{ miniflux_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.miniflux.tls.certresolver: "letsencrypt" traefik.http.routers.miniflux.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/mylar/tasks/main.yml b/roles/mylar/tasks/main.yml index 826c8ab2..d92a4278 100644 --- a/roles/mylar/tasks/main.yml +++ b/roles/mylar/tasks/main.yml @@ -26,7 +26,7 @@ restart_policy: unless-stopped memory: "{{ mylar_memory }}" labels: - traefik.enable: "{{ mylar_available_externally | string}}" + traefik.enable: "{{ mylar_available_externally | string }}" traefik.http.routers.mylar.rule: "Host(`{{ mylar_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.mylar.tls.certresolver: "letsencrypt" traefik.http.routers.mylar.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/n8n/tasks/main.yml b/roles/n8n/tasks/main.yml index 2a07dbda..b50a0cf7 100644 --- a/roles/n8n/tasks/main.yml +++ b/roles/n8n/tasks/main.yml @@ -23,7 +23,7 @@ N8N_BASIC_AUTH_USER: "{{ n8n_basic_auth_user }}" N8N_BASIC_AUTH_PASSWORD: "{{ n8n_basic_auth_password }}" labels: - traefik.enable: "{{ n8n_available_externally | string}}" + traefik.enable: "{{ n8n_available_externally | string }}" traefik.http.routers.n8n.rule: "Host(`{{ n8n_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.n8n.tls.certresolver: "letsencrypt" traefik.http.routers.n8n.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/navidrome/tasks/main.yml b/roles/navidrome/tasks/main.yml index 7d5bd5eb..9913c807 100644 --- a/roles/navidrome/tasks/main.yml +++ b/roles/navidrome/tasks/main.yml @@ -27,7 +27,7 @@ restart_policy: unless-stopped memory: "{{ navidrome_memory }}" labels: - traefik.enable: "{{ navidrome_available_externally | string}}" + traefik.enable: "{{ navidrome_available_externally | string }}" traefik.http.routers.navidrome.rule: "Host(`{{ navidrome_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.navidrome.tls.certresolver: "letsencrypt" traefik.http.routers.navidrome.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/netbootxyz/tasks/main.yml b/roles/netbootxyz/tasks/main.yml index 4818b55d..e4c96aa5 100644 --- a/roles/netbootxyz/tasks/main.yml +++ b/roles/netbootxyz/tasks/main.yml @@ -26,7 +26,7 @@ PGID: "{{ netbootxyz_group_id }}" restart_policy: unless-stopped labels: - traefik.enable: "{{ netbootxyz_available_externally | string}}" + traefik.enable: "{{ netbootxyz_available_externally | string }}" traefik.http.routers.netdata.rule: "Host(`{{ netbootxyz_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.netdata.tls.certresolver: "letsencrypt" traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/netdata/tasks/main.yml b/roles/netdata/tasks/main.yml index 6b288e16..d41c3486 100644 --- a/roles/netdata/tasks/main.yml +++ b/roles/netdata/tasks/main.yml @@ -26,7 +26,7 @@ restart_policy: unless-stopped memory: "{{ netdata_memory }}" labels: - traefik.enable: "{{ netdata_available_externally | string}}" + traefik.enable: "{{ netdata_available_externally | string }}" traefik.http.routers.netdata.rule: "Host(`{{ netdata_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.netdata.tls.certresolver: "letsencrypt" traefik.http.routers.netdata.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/nextcloud/tasks/main.yml b/roles/nextcloud/tasks/main.yml index 300c5528..2021a276 100644 --- a/roles/nextcloud/tasks/main.yml +++ b/roles/nextcloud/tasks/main.yml @@ -42,7 +42,7 @@ restart_policy: unless-stopped memory: "{{ nextcloud_memory }}" labels: - traefik.enable: "{{ nextcloud_available_externally | string}}" + traefik.enable: "{{ nextcloud_available_externally | string }}" traefik.http.routers.nextcloud.rule: "Host(`{{ nextcloud_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.nextcloud.tls.certresolver: "letsencrypt" traefik.http.routers.nextcloud.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/nzbget/tasks/main.yml b/roles/nzbget/tasks/main.yml index 9cccdf99..d951041d 100644 --- a/roles/nzbget/tasks/main.yml +++ b/roles/nzbget/tasks/main.yml @@ -23,7 +23,7 @@ restart_policy: unless-stopped memory: "{{ nzbget_memory }}" labels: - traefik.enable: "{{ nzbget_available_externally | string}}" + traefik.enable: "{{ nzbget_available_externally | string }}" traefik.http.routers.nzbget.rule: "Host(`{{ nzbget_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.nzbget.tls.certresolver: "letsencrypt" traefik.http.routers.nzbget.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/ombi/tasks/main.yml b/roles/ombi/tasks/main.yml index 721ddaab..226a368e 100644 --- a/roles/ombi/tasks/main.yml +++ b/roles/ombi/tasks/main.yml @@ -20,7 +20,7 @@ restart_policy: unless-stopped memory: "{{ ombi_memory }}" labels: - traefik.enable: "{{ ombi_available_externally | string}}" + traefik.enable: "{{ ombi_available_externally | string }}" traefik.http.routers.ombi.rule: "Host(`{{ ombi_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.ombi.tls.certresolver: "letsencrypt" traefik.http.routers.ombi.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/organizr/tasks/main.yml b/roles/organizr/tasks/main.yml index 7595c605..a6e197b3 100644 --- a/roles/organizr/tasks/main.yml +++ b/roles/organizr/tasks/main.yml @@ -23,7 +23,7 @@ restart_policy: unless-stopped memory: "{{ organizr_memory }}" labels: - traefik.enable: "{{ organizr_available_externally | string}}" + traefik.enable: "{{ organizr_available_externally | string }}" traefik.http.routers.organizr.rule: "Host(`{{ organizr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.organizr.tls.certresolver: "letsencrypt" traefik.http.routers.organizr.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/overseerr/tasks/main.yml b/roles/overseerr/tasks/main.yml index 75963d46..1f513875 100644 --- a/roles/overseerr/tasks/main.yml +++ b/roles/overseerr/tasks/main.yml @@ -23,7 +23,7 @@ restart_policy: unless-stopped memory: "{{ overseerr_memory }}" labels: - traefik.enable: "{{ overseerr_available_externally | string}}" + traefik.enable: "{{ overseerr_available_externally | string }}" traefik.http.routers.overseerr.rule: "Host(`{{ overseerr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.overseerr.tls.certresolver: "letsencrypt" traefik.http.routers.overseerr.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/piwigo/tasks/main.yml b/roles/piwigo/tasks/main.yml index 9a2a5728..6c9fe283 100644 --- a/roles/piwigo/tasks/main.yml +++ b/roles/piwigo/tasks/main.yml @@ -43,7 +43,7 @@ restart_policy: unless-stopped memory: "{{ piwigo_memory }}" labels: - traefik.enable: "{{ piwigo_available_externally | string}}" + traefik.enable: "{{ piwigo_available_externally | string }}" traefik.http.routers.piwigo.rule: "Host(`{{ piwigo_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.piwigo.tls.certresolver: "letsencrypt" traefik.http.routers.piwigo.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/plex/tasks/main.yml b/roles/plex/tasks/main.yml index a3564105..b1866d09 100644 --- a/roles/plex/tasks/main.yml +++ b/roles/plex/tasks/main.yml @@ -32,7 +32,7 @@ restart_policy: unless-stopped memory: "{{ plex_memory }}" labels: - traefik.enable: "{{ plex_available_externally | string}}" + traefik.enable: "{{ plex_available_externally | string }}" traefik.http.routers.plex.rule: "Host(`{{ plex_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.plex.tls.certresolver: "letsencrypt" traefik.http.routers.plex.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/portainer/tasks/main.yml b/roles/portainer/tasks/main.yml index f4152b81..d49f1e78 100644 --- a/roles/portainer/tasks/main.yml +++ b/roles/portainer/tasks/main.yml @@ -20,7 +20,7 @@ restart_policy: unless-stopped memory: "{{ portainer_memory }}" labels: - traefik.enable: "{{ portainer_available_externally | string}}" + traefik.enable: "{{ portainer_available_externally | string }}" traefik.http.routers.portainer.rule: "Host(`{{ portainer_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.portainer.tls.certresolver: "letsencrypt" traefik.http.routers.portainer.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/prowlarr/tasks/main.yml b/roles/prowlarr/tasks/main.yml index c3139b55..b4ce9dde 100644 --- a/roles/prowlarr/tasks/main.yml +++ b/roles/prowlarr/tasks/main.yml @@ -22,7 +22,7 @@ restart_policy: unless-stopped memory: "{{ prowlarr_memory }}" labels: - traefik.enable: "{{ prowlarr_available_externally | string}}" + traefik.enable: "{{ prowlarr_available_externally | string }}" traefik.http.routers.prowlarr.rule: "Host(`{{ prowlarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.prowlarr.tls.certresolver: "letsencrypt" traefik.http.routers.prowlarr.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/pyload/tasks/main.yml b/roles/pyload/tasks/main.yml index f02c692d..2fe46be0 100644 --- a/roles/pyload/tasks/main.yml +++ b/roles/pyload/tasks/main.yml @@ -25,7 +25,7 @@ restart_policy: unless-stopped memory: "{{ pyload_memory }}" labels: - traefik.enable: "{{ pyload_available_externally | string}}" + traefik.enable: "{{ pyload_available_externally | string }}" traefik.http.routers.pyload.rule: "Host(`{{ pyload_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.pyload.tls.certresolver: "letsencrypt" traefik.http.routers.pyload.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/pytivo/tasks/main.yml b/roles/pytivo/tasks/main.yml index 5815fb3c..219d93cb 100644 --- a/roles/pytivo/tasks/main.yml +++ b/roles/pytivo/tasks/main.yml @@ -30,7 +30,7 @@ restart_policy: unless-stopped memory: 1g labels: - traefik.enable: "{{ pytivo_available_externally | string}}" + traefik.enable: "{{ pytivo_available_externally | string }}" traefik.http.routers.pytivo.rule: "Host(`{{ pytivo_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.pytivo.tls.certresolver: "letsencrypt" traefik.http.routers.pytivo.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/radarr/tasks/main.yml b/roles/radarr/tasks/main.yml index f9e3eee7..c7b1dad8 100644 --- a/roles/radarr/tasks/main.yml +++ b/roles/radarr/tasks/main.yml @@ -24,7 +24,7 @@ restart_policy: unless-stopped memory: "{{ radarr_memory }}" labels: - traefik.enable: "{{ radarr_available_externally | string}}" + traefik.enable: "{{ radarr_available_externally | string }}" traefik.http.routers.radarr.rule: "Host(`{{ radarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.radarr.tls.certresolver: "letsencrypt" traefik.http.routers.radarr.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/rssbridge/tasks/main.yml b/roles/rssbridge/tasks/main.yml index 356696d7..1c942ce1 100644 --- a/roles/rssbridge/tasks/main.yml +++ b/roles/rssbridge/tasks/main.yml @@ -19,7 +19,7 @@ restart_policy: unless-stopped memory: "{{ rssbridge_memory }}" labels: - traefik.enable: "{{ rssbridge_available_externally | string}}" + traefik.enable: "{{ rssbridge_available_externally | string }}" traefik.http.routers.rssbridge.rule: "Host(`{{ rssbridge_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.rssbridge.tls.certresolver: "letsencrypt" traefik.http.routers.rssbridge.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/sabnzbd/tasks/main.yml b/roles/sabnzbd/tasks/main.yml index 7a74a3fc..914769bd 100644 --- a/roles/sabnzbd/tasks/main.yml +++ b/roles/sabnzbd/tasks/main.yml @@ -23,7 +23,7 @@ PGID: "{{ sabnzbd_group_id }}" restart_policy: unless-stopped labels: - traefik.enable: "{{ sabnzbd_available_externally | string}}" + traefik.enable: "{{ sabnzbd_available_externally | string }}" traefik.http.routers.sabnzbd.rule: "Host(`{{ sabnzbd_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.sabnzbd.tls.certresolver: "letsencrypt" traefik.http.routers.sabnzbd.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/sickchill/tasks/main.yml b/roles/sickchill/tasks/main.yml index 4081b7f2..4c058a5b 100644 --- a/roles/sickchill/tasks/main.yml +++ b/roles/sickchill/tasks/main.yml @@ -25,7 +25,7 @@ restart_policy: unless-stopped memory: "{{ sickchill_memory }}" labels: - traefik.enable: "{{ sickchill_available_externally | string}}" + traefik.enable: "{{ sickchill_available_externally | string }}" traefik.http.routers.sickchill.rule: "Host(`{{ sickchill_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.sickchill.tls.certresolver: "letsencrypt" traefik.http.routers.sickchill.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/sonarr/tasks/main.yml b/roles/sonarr/tasks/main.yml index 4ec875e7..4eeb70fa 100644 --- a/roles/sonarr/tasks/main.yml +++ b/roles/sonarr/tasks/main.yml @@ -24,7 +24,7 @@ restart_policy: unless-stopped memory: "{{ sonarr_memory }}" labels: - traefik.enable: "{{ sonarr_available_externally | string}}" + traefik.enable: "{{ sonarr_available_externally | string }}" traefik.http.routers.sonarr.rule: "Host(`{{ sonarr_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.sonarr.tls.certresolver: "letsencrypt" traefik.http.routers.sonarr.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/speedtest-tracker/tasks/main.yml b/roles/speedtest-tracker/tasks/main.yml index 06a1217c..cc870a06 100644 --- a/roles/speedtest-tracker/tasks/main.yml +++ b/roles/speedtest-tracker/tasks/main.yml @@ -21,7 +21,7 @@ restart_policy: unless-stopped memory: "1g" labels: - traefik.enable: "{{ speedtest_tracker_available_externally | string}}" + traefik.enable: "{{ speedtest_tracker_available_externally | string }}" traefik.http.routers.speedtest_tracker.rule: "Host(`{{ speedtest_tracker_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.speedtest_tracker.tls.certresolver: "letsencrypt" traefik.http.routers.speedtest_tracker.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/syncthing/tasks/main.yml b/roles/syncthing/tasks/main.yml index ad804a6e..da7f69fa 100644 --- a/roles/syncthing/tasks/main.yml +++ b/roles/syncthing/tasks/main.yml @@ -22,7 +22,7 @@ restart_policy: unless-stopped memory: "{{ syncthing_memory }}" labels: - traefik.enable: "{{ syncthing_available_externally | string}}" + traefik.enable: "{{ syncthing_available_externally | string }}" traefik.http.routers.syncthing.rule: "Host(`{{ syncthing_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.syncthing.tls.certresolver: "letsencrypt" traefik.http.routers.syncthing.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/tautulli/tasks/main.yml b/roles/tautulli/tasks/main.yml index 4ddf1ac3..ae986bcf 100644 --- a/roles/tautulli/tasks/main.yml +++ b/roles/tautulli/tasks/main.yml @@ -25,7 +25,7 @@ restart_policy: unless-stopped memory: "{{ tautulli_memory }}" labels: - traefik.enable: "{{ tautulli_available_externally | string}}" + traefik.enable: "{{ tautulli_available_externally | string }}" traefik.http.routers.tautulli.rule: "Host(`{{ tautulli_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.tautulli.tls.certresolver: "letsencrypt" traefik.http.routers.tautulli.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/tiddlywiki/tasks/main.yml b/roles/tiddlywiki/tasks/main.yml index 8d292d0f..220d1f22 100644 --- a/roles/tiddlywiki/tasks/main.yml +++ b/roles/tiddlywiki/tasks/main.yml @@ -21,7 +21,7 @@ restart_policy: unless-stopped memory: "{{ tiddlywiki_memory }}" labels: - traefik.enable: "{{ tiddlywiki_available_externally | string}}" + traefik.enable: "{{ tiddlywiki_available_externally | string }}" traefik.http.routers.tiddlywiki.rule: "Host(`{{ tiddlywiki_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.tiddlywiki.tls.certresolver: "letsencrypt" traefik.http.routers.tiddlywiki.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/transmission-with-openvpn/tasks/main.yml b/roles/transmission-with-openvpn/tasks/main.yml index 9fcb0130..5a67fbd9 100644 --- a/roles/transmission-with-openvpn/tasks/main.yml +++ b/roles/transmission-with-openvpn/tasks/main.yml @@ -31,7 +31,7 @@ TRANSMISSION_INCOMPLETE_DIR: "/downloads/.incomplete" TRANSMISSION_WATCH_DIR: "/watch" TRANSMISSION_RATIO_LIMIT: "{{ transmission_openvpn_ratio_limit }}" - TRANSMISSION_RATIO_LIMIT_ENABLED: "{{ transmission_openvpn_ratio_limit_enabled | string}}" + TRANSMISSION_RATIO_LIMIT_ENABLED: "{{ transmission_openvpn_ratio_limit_enabled | string }}" OPENVPN_PROVIDER: "{{ openvpn_provider }}" OPENVPN_USERNAME: "{{ openvpn_username }}" OPENVPN_PASSWORD: "{{ openvpn_password }}" @@ -49,7 +49,7 @@ restart_policy: unless-stopped memory: "{{ transmission_openvpn_memory }}" labels: - traefik.enable: "{{ transmission_openvpn_available_externally | string}}" + traefik.enable: "{{ transmission_openvpn_available_externally | string }}" traefik.http.routers.transmission_openvpn.rule: "Host(`{{ transmission_openvpn_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.transmission_openvpn.tls.certresolver: "letsencrypt" traefik.http.routers.transmission_openvpn.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/transmission/tasks/main.yml b/roles/transmission/tasks/main.yml index bf1ed82c..aeaf5e29 100644 --- a/roles/transmission/tasks/main.yml +++ b/roles/transmission/tasks/main.yml @@ -29,7 +29,7 @@ restart_policy: unless-stopped memory: "{{ transmission_memory }}" labels: - traefik.enable: "{{ transmission_available_externally | string}}" + traefik.enable: "{{ transmission_available_externally | string }}" traefik.http.routers.transmission.rule: "Host(`{{ transmission_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.transmission.tls.certresolver: "letsencrypt" traefik.http.routers.transmission.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/utorrent/tasks/main.yml b/roles/utorrent/tasks/main.yml index 130aebcf..e93acf22 100644 --- a/roles/utorrent/tasks/main.yml +++ b/roles/utorrent/tasks/main.yml @@ -31,7 +31,7 @@ restart_policy: unless-stopped memory: "{{ utorrent_memory }}" labels: - traefik.enable: "{{ utorrent_available_externally | string}}" + traefik.enable: "{{ utorrent_available_externally | string }}" traefik.http.routers.utorrent.rule: "Host(`{{ utorrent_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.utorrent.tls.certresolver: "letsencrypt" traefik.http.routers.utorrent.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/youtubedlmaterial/tasks/main.yml b/roles/youtubedlmaterial/tasks/main.yml index f8843b4b..e65ae0c0 100644 --- a/roles/youtubedlmaterial/tasks/main.yml +++ b/roles/youtubedlmaterial/tasks/main.yml @@ -32,7 +32,7 @@ restart_policy: unless-stopped memory: "{{ youtubedlmaterial_memory }}" labels: - traefik.enable: "{{ youtubedlmaterial_available_externally | string}}" + traefik.enable: "{{ youtubedlmaterial_available_externally | string }}" traefik.http.routers.youtubedlmaterial.rule: "Host(`{{ youtubedlmaterial_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.youtubedlmaterial.tls.certresolver: "letsencrypt" traefik.http.routers.youtubedlmaterial.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/roles/znc/tasks/main.yml b/roles/znc/tasks/main.yml index a3057d7f..9469afd8 100644 --- a/roles/znc/tasks/main.yml +++ b/roles/znc/tasks/main.yml @@ -23,7 +23,7 @@ restart_policy: unless-stopped memory: "{{ znc_memory }}" labels: - traefik.enable: "{{ znc_available_externally | string}}" + traefik.enable: "{{ znc_available_externally | string }}" traefik.http.routers.znc.rule: "Host(`{{ znc_hostname }}.{{ ansible_nas_domain }}`)" traefik.http.routers.znc.tls.certresolver: "letsencrypt" traefik.http.routers.znc.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/tasks/calibre.yml b/tasks/calibre.yml index 3fffbf21..66eb5fdd 100644 --- a/tasks/calibre.yml +++ b/tasks/calibre.yml @@ -24,7 +24,7 @@ restart_policy: unless-stopped memory: 1g labels: - traefik.enable: "{{ calibre_available_externally | string}}" + traefik.enable: "{{ calibre_available_externally | string }}" traefik.http.routers.calibre.rule: "Host(`calibre.{{ ansible_nas_domain }}`)" traefik.http.routers.calibre.tls.certresolver: "letsencrypt" traefik.http.routers.calibre.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/tasks/guacamole.yml b/tasks/guacamole.yml index 518d2a3b..d4c8b3ed 100644 --- a/tasks/guacamole.yml +++ b/tasks/guacamole.yml @@ -27,7 +27,6 @@ # docker run -v /home/david/.guac:/config:rw -p 8080:8080 oznu/guacamole - - name: Guacamole Container docker_container: name: guacamole @@ -40,7 +39,7 @@ restart_policy: unless-stopped memory: 1g labels: - traefik.enable: "{{ guacamole_available_externally | string}}" + traefik.enable: "{{ guacamole_available_externally | string }}" traefik.http.routers.guacamole.rule: "Host(`guacamole.{{ ansible_nas_domain }}`)" traefik.http.routers.guacamole.tls.certresolver: "letsencrypt" traefik.http.routers.guacamole.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/tasks/joomla.yml b/tasks/joomla.yml index 8cbc3930..7d1f33ce 100644 --- a/tasks/joomla.yml +++ b/tasks/joomla.yml @@ -39,7 +39,7 @@ restart_policy: unless-stopped memory: 1g labels: - traefik.enable: "{{ joomla_available_externally | string}}" + traefik.enable: "{{ joomla_available_externally | string }}" traefik.http.routers.joomla.rule: "Host(`joomla.{{ ansible_nas_domain }}`)" traefik.http.routers.joomla.tls.certresolver: "letsencrypt" traefik.http.routers.joomla.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/tasks/krusader.yml b/tasks/krusader.yml index b5092815..5bcc4389 100644 --- a/tasks/krusader.yml +++ b/tasks/krusader.yml @@ -26,7 +26,7 @@ restart_policy: unless-stopped memory: 1g labels: - traefik.enable: "{{ krusader_available_externally | string}}" + traefik.enable: "{{ krusader_available_externally | string }}" traefik.http.routers.krusader.rule: "Host(`krusader.{{ ansible_nas_domain }}`)" traefik.http.routers.krusader.tls.certresolver: "letsencrypt" traefik.http.routers.krusader.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/tasks/openhab.yml b/tasks/openhab.yml index eb110c71..656f889d 100644 --- a/tasks/openhab.yml +++ b/tasks/openhab.yml @@ -45,7 +45,7 @@ restart_policy: unless-stopped memory: 1g labels: - traefik.enable: "{{ openhab_available_externally | string}}" + traefik.enable: "{{ openhab_available_externally | string }}" traefik.http.routers.openhab.rule: "Host(`openhab.{{ ansible_nas_domain }}`)" traefik.http.routers.openhab.tls.certresolver: "letsencrypt" traefik.http.routers.openhab.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/tasks/thelounge.yml b/tasks/thelounge.yml index e346c0d1..153749a1 100644 --- a/tasks/thelounge.yml +++ b/tasks/thelounge.yml @@ -27,7 +27,7 @@ restart_policy: unless-stopped memory: 1g labels: - traefik.enable: "{{ thelounge_available_externally | string}}" + traefik.enable: "{{ thelounge_available_externally | string }}" traefik.http.routers.thelounge.rule: "Host(`thelounge.{{ ansible_nas_domain }}`)" traefik.http.routers.thelounge.tls.certresolver: "letsencrypt" traefik.http.routers.thelounge.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/tasks/ubooquity.yml b/tasks/ubooquity.yml index fdae8d22..63bf2e20 100644 --- a/tasks/ubooquity.yml +++ b/tasks/ubooquity.yml @@ -26,7 +26,7 @@ - "{{ ubooquity_port_admin }}:2203" restart_policy: unless-stopped labels: - traefik.enable: "{{ ubooquity_available_externally | string}}" + traefik.enable: "{{ ubooquity_available_externally | string }}" traefik.http.routers.ubooquity.rule: "Host(`ubooquity.{{ ansible_nas_domain }}`)" traefik.http.routers.ubooquity.tls.certresolver: "letsencrypt" traefik.http.routers.ubooquity.tls.domains[0].main: "{{ ansible_nas_domain }}" diff --git a/tasks/wallabag.yml b/tasks/wallabag.yml index 7dec90a2..e40c1aaa 100644 --- a/tasks/wallabag.yml +++ b/tasks/wallabag.yml @@ -22,7 +22,7 @@ restart_policy: unless-stopped memory: 1g labels: - traefik.enable: "{{ wallabag_available_externally | string}}" + traefik.enable: "{{ wallabag_available_externally | string }}" traefik.http.routers.wallabag.rule: "Host(`wallabag.{{ ansible_nas_domain }}`)" traefik.http.routers.wallabag.tls.certresolver: "letsencrypt" traefik.http.routers.wallabag.tls.domains[0].main: "{{ ansible_nas_domain }}"