2024-02-17 19:01:04 +01:00
|
|
|
domain: viyurz.fr
|
|
|
|
timezone: "Europe/Paris"
|
|
|
|
host_uid: 1000
|
|
|
|
docker_projects_dir: "{{ ansible_env['HOME'] }}/docker-projects"
|
|
|
|
|
|
|
|
# UID shift for mapping between host & containers
|
|
|
|
uid_shift: 99999
|
|
|
|
|
|
|
|
|
2024-02-22 19:09:43 +01:00
|
|
|
# cifs_credentials is undefined when we run the backup playbook
|
|
|
|
# as a cronjob, so set empty default value to prevent errors,
|
|
|
|
# which is fine because we don't use it.
|
|
|
|
cifs_host: "{{ cifs_credentials['username'] | default('') }}.your-storagebox.de"
|
2024-02-17 19:01:04 +01:00
|
|
|
|
|
|
|
cifs_mounts:
|
|
|
|
backups:
|
|
|
|
src: "//{{ cifs_host }}/backup/backups"
|
|
|
|
path: /mnt/storagebox/backups
|
|
|
|
uid: 0
|
|
|
|
gid: "{{ host_uid }}"
|
|
|
|
file_mode: 640
|
|
|
|
dir_mode: 750
|
|
|
|
storagebox:
|
|
|
|
src: "//{{ cifs_host }}/backup"
|
|
|
|
path: /mnt/storagebox
|
|
|
|
uid: 0
|
|
|
|
gid: 0
|
|
|
|
file_mode: 640
|
|
|
|
dir_mode: 751
|
|
|
|
syncthing:
|
|
|
|
src: "//{{ cifs_host }}/backup/syncthing"
|
|
|
|
path: /mnt/storagebox/syncthing
|
|
|
|
uid: "{{ users['syncthing'] + uid_shift }}"
|
|
|
|
gid: "{{ users['syncthing'] + uid_shift }}"
|
|
|
|
file_mode: 640
|
|
|
|
dir_mode: 750
|
|
|
|
|
|
|
|
|
|
|
|
projects:
|
|
|
|
- coturn
|
|
|
|
- element
|
|
|
|
- etebase
|
|
|
|
- hedgedoc
|
|
|
|
- homepage
|
|
|
|
- reverse-proxy
|
|
|
|
- searxng
|
|
|
|
- synapse
|
|
|
|
- syncthing
|
|
|
|
- vaultwarden
|
|
|
|
|
|
|
|
|
2024-02-22 19:09:43 +01:00
|
|
|
projects_to_backup:
|
2024-02-23 12:17:32 +01:00
|
|
|
- synapse
|
2024-02-22 19:09:43 +01:00
|
|
|
- vaultwarden
|
|
|
|
|
|
|
|
|
|
|
|
borg_repodir: "{{ cifs_mounts['backups']['path'] }}/borg"
|
|
|
|
borg_passphrase_file: /etc/borg-passphrase.txt
|
|
|
|
borg_prune_options: |
|
|
|
|
--keep-within=1d
|
|
|
|
--keep-daily=7
|
|
|
|
--keep-weekly=4
|
|
|
|
--keep-monthly=12
|
|
|
|
--keep-yearly=10
|
|
|
|
|
|
|
|
|
2024-02-17 19:01:04 +01:00
|
|
|
# Ports exposed to host
|
|
|
|
ports:
|
|
|
|
coturn_listening: 3478
|
|
|
|
coturn_tls_listening: 5349
|
|
|
|
coturn_relay_min: 49152
|
|
|
|
coturn_relay_max: 49172
|
|
|
|
element: 8084
|
|
|
|
etebase: 3735
|
|
|
|
hedgedoc: 8086
|
|
|
|
homepage: 8082
|
|
|
|
searxng: 8083
|
|
|
|
synapse: 8008
|
|
|
|
syncthing_discosrv: 8443
|
2024-02-19 11:03:16 +01:00
|
|
|
# Public port, forwarded to 22067 by nftables
|
|
|
|
syncthing_relaysrv: 143
|
2024-02-17 19:01:04 +01:00
|
|
|
syncthing_webui: 8384
|
|
|
|
syncthing_tcp: 5432
|
|
|
|
syncthing_udp: 22000
|
|
|
|
vaultwarden: 8081
|
|
|
|
|
|
|
|
|
|
|
|
# UID in containers
|
|
|
|
users:
|
|
|
|
coturn: 666
|
|
|
|
etebase: 373
|
|
|
|
hedgedoc: 1004
|
|
|
|
hedgedoc_mysql: 1005
|
|
|
|
homepage: 101
|
|
|
|
searxng: 977
|
|
|
|
searxng_redis: 999
|
|
|
|
synapse: 991
|
|
|
|
synapse_postgres: 70
|
|
|
|
syncthing: 1001
|
|
|
|
syncthing_discosrv: 1002
|
2024-02-19 11:03:16 +01:00
|
|
|
syncthing_relaysrv: 1003
|
2024-02-17 19:01:04 +01:00
|
|
|
vaultwarden: 1000
|
|
|
|
|
|
|
|
|
|
|
|
volumes:
|
|
|
|
coturn_tls_certificate_file: "/etc/letsencrypt/live/turn.{{ domain }}/fullchain.pem"
|
|
|
|
coturn_tls_certificate_key_file: "/etc/letsencrypt/live/turn.{{ domain }}/privkey.pem"
|
|
|
|
etebase_datadir: /mnt/etebasedata
|
|
|
|
hedgedoc_mysql_datadir: /mnt/hedgedoc/mysql-data
|
|
|
|
hedgedoc_configdir: /mnt/hedgedoc/config
|
|
|
|
synapse_datadir: /mnt/synapsedata
|
|
|
|
synapse_postgres_datadir: /mnt/synapsepgdata
|
|
|
|
syncthing_datadir: "{{ cifs_mounts['syncthing']['path'] }}"
|
|
|
|
vaultwarden_datadir: /mnt/vwdata
|
|
|
|
|
|
|
|
|
|
|
|
# Service-specific variables
|
|
|
|
reverse_proxy:
|
|
|
|
ssl_certificate_file: "/etc/letsencrypt/live/{{ domain }}/fullchain.pem"
|
|
|
|
ssl_certificate_key_file: "/etc/letsencrypt/live/{{ domain }}/privkey.pem"
|
|
|
|
ssl_trusted_certificate_file: "/etc/letsencrypt/live/{{ domain }}/chain.pem"
|
|
|
|
resolver: "185.12.64.12 [a01:4ff:ff00::add:2] [2a01:4ff:ff00::add:1]"
|
|
|
|
|
|
|
|
|
|
|
|
synapse:
|
|
|
|
max_upload_size: 50M
|