2024-02-17 19:01:04 +01:00
|
|
|
domain: viyurz.fr
|
|
|
|
timezone: "Europe/Paris"
|
|
|
|
host_uid: 1000
|
|
|
|
docker_projects_dir: "{{ ansible_env['HOME'] }}/docker-projects"
|
|
|
|
|
|
|
|
# UID shift for mapping between host & containers
|
|
|
|
uid_shift: 99999
|
|
|
|
|
|
|
|
|
2024-02-22 19:09:43 +01:00
|
|
|
# cifs_credentials is undefined when we run the backup playbook
|
|
|
|
# as a cronjob, so set empty default value to prevent errors,
|
|
|
|
# which is fine because we don't use it.
|
|
|
|
cifs_host: "{{ cifs_credentials['username'] | default('') }}.your-storagebox.de"
|
2024-02-17 19:01:04 +01:00
|
|
|
|
|
|
|
cifs_mounts:
|
|
|
|
backups:
|
|
|
|
src: "//{{ cifs_host }}/backup/backups"
|
|
|
|
path: /mnt/storagebox/backups
|
|
|
|
uid: 0
|
|
|
|
gid: "{{ host_uid }}"
|
|
|
|
file_mode: 640
|
|
|
|
dir_mode: 750
|
|
|
|
storagebox:
|
|
|
|
src: "//{{ cifs_host }}/backup"
|
|
|
|
path: /mnt/storagebox
|
|
|
|
uid: 0
|
|
|
|
gid: 0
|
|
|
|
file_mode: 640
|
|
|
|
dir_mode: 751
|
|
|
|
syncthing:
|
|
|
|
src: "//{{ cifs_host }}/backup/syncthing"
|
|
|
|
path: /mnt/storagebox/syncthing
|
|
|
|
uid: "{{ users['syncthing'] + uid_shift }}"
|
|
|
|
gid: "{{ users['syncthing'] + uid_shift }}"
|
|
|
|
file_mode: 640
|
|
|
|
dir_mode: 750
|
|
|
|
|
|
|
|
|
|
|
|
projects:
|
|
|
|
- coturn
|
|
|
|
- element
|
|
|
|
- etebase
|
|
|
|
- hedgedoc
|
|
|
|
- homepage
|
2024-03-16 13:49:47 +01:00
|
|
|
- mailserver
|
2024-02-17 19:01:04 +01:00
|
|
|
- reverse-proxy
|
|
|
|
- searxng
|
|
|
|
- synapse
|
|
|
|
- syncthing
|
2024-03-08 16:35:07 +01:00
|
|
|
- uptime-kuma
|
2024-02-17 19:01:04 +01:00
|
|
|
- vaultwarden
|
|
|
|
|
|
|
|
|
2024-02-22 19:09:43 +01:00
|
|
|
projects_to_backup:
|
2024-02-23 12:51:17 +01:00
|
|
|
- etebase
|
2024-03-05 11:15:10 +01:00
|
|
|
- hedgedoc
|
2024-03-16 13:49:47 +01:00
|
|
|
- mailserver
|
2024-02-23 12:17:32 +01:00
|
|
|
- synapse
|
2024-03-08 16:35:07 +01:00
|
|
|
- uptime-kuma
|
2024-02-22 19:09:43 +01:00
|
|
|
- vaultwarden
|
|
|
|
|
|
|
|
|
|
|
|
borg_repodir: "{{ cifs_mounts['backups']['path'] }}/borg"
|
|
|
|
borg_passphrase_file: /etc/borg-passphrase.txt
|
2024-03-05 11:15:10 +01:00
|
|
|
hedgedoc_mysql_root_password_file: "/etc/hedgedoc-mysql-root-password.txt"
|
2024-02-22 19:09:43 +01:00
|
|
|
borg_prune_options: |
|
|
|
|
--keep-within=1d
|
|
|
|
--keep-daily=7
|
|
|
|
--keep-weekly=4
|
|
|
|
--keep-monthly=12
|
|
|
|
--keep-yearly=10
|
|
|
|
|
|
|
|
|
2024-02-17 19:01:04 +01:00
|
|
|
# Ports exposed to host
|
|
|
|
ports:
|
|
|
|
coturn_listening: 3478
|
|
|
|
coturn_tls_listening: 5349
|
|
|
|
coturn_relay_min: 49152
|
|
|
|
coturn_relay_max: 49172
|
|
|
|
element: 8084
|
|
|
|
etebase: 3735
|
|
|
|
hedgedoc: 8086
|
|
|
|
homepage: 8082
|
2024-03-16 13:49:47 +01:00
|
|
|
mailserver_smtp: 1025
|
|
|
|
mailserver_smtps: 1465
|
|
|
|
mailserver_imaps: 1993
|
|
|
|
mailserver_jmap: 1443
|
2024-02-17 19:01:04 +01:00
|
|
|
searxng: 8083
|
|
|
|
synapse: 8008
|
|
|
|
syncthing_discosrv: 8443
|
2024-02-19 11:03:16 +01:00
|
|
|
# Public port, forwarded to 22067 by nftables
|
|
|
|
syncthing_relaysrv: 143
|
2024-02-17 19:01:04 +01:00
|
|
|
syncthing_webui: 8384
|
|
|
|
syncthing_tcp: 5432
|
|
|
|
syncthing_udp: 22000
|
2024-03-08 16:35:07 +01:00
|
|
|
uptime_kuma: 3001
|
2024-02-17 19:01:04 +01:00
|
|
|
vaultwarden: 8081
|
|
|
|
|
|
|
|
|
|
|
|
# UID in containers
|
|
|
|
users:
|
|
|
|
coturn: 666
|
|
|
|
etebase: 373
|
|
|
|
hedgedoc: 1004
|
|
|
|
hedgedoc_mysql: 1005
|
2024-02-25 19:15:58 +01:00
|
|
|
homepage: 8686
|
2024-03-16 13:49:47 +01:00
|
|
|
mailserver: 8
|
2024-02-17 19:01:04 +01:00
|
|
|
searxng: 977
|
|
|
|
searxng_redis: 999
|
|
|
|
synapse: 991
|
|
|
|
synapse_postgres: 70
|
|
|
|
syncthing: 1001
|
|
|
|
syncthing_discosrv: 1002
|
2024-02-19 11:03:16 +01:00
|
|
|
syncthing_relaysrv: 1003
|
2024-03-08 16:35:07 +01:00
|
|
|
uptime_kuma: 1006
|
2024-02-17 19:01:04 +01:00
|
|
|
vaultwarden: 1000
|
|
|
|
|
|
|
|
|
|
|
|
volumes:
|
|
|
|
coturn_tls_certificate_file: "/etc/letsencrypt/live/turn.{{ domain }}/fullchain.pem"
|
|
|
|
coturn_tls_certificate_key_file: "/etc/letsencrypt/live/turn.{{ domain }}/privkey.pem"
|
|
|
|
etebase_datadir: /mnt/etebasedata
|
|
|
|
hedgedoc_mysql_datadir: /mnt/hedgedoc/mysql-data
|
|
|
|
hedgedoc_configdir: /mnt/hedgedoc/config
|
2024-03-16 13:49:47 +01:00
|
|
|
mailserver_datadir: /mnt/mailserverdata
|
|
|
|
mailserver_tls_certificate_file: "/etc/letsencrypt/live/mail.{{ domain }}/fullchain.pem"
|
|
|
|
mailserver_tls_certificate_key_file: "/etc/letsencrypt/live/mail.{{ domain }}/privkey.pem"
|
2024-02-17 19:01:04 +01:00
|
|
|
synapse_datadir: /mnt/synapsedata
|
|
|
|
synapse_postgres_datadir: /mnt/synapsepgdata
|
|
|
|
syncthing_datadir: "{{ cifs_mounts['syncthing']['path'] }}"
|
2024-03-08 16:35:07 +01:00
|
|
|
uptime_kuma_datadir: /mnt/uptimekumadata
|
2024-02-17 19:01:04 +01:00
|
|
|
vaultwarden_datadir: /mnt/vwdata
|
|
|
|
|
|
|
|
|
|
|
|
# Service-specific variables
|
|
|
|
reverse_proxy:
|
|
|
|
ssl_certificate_file: "/etc/letsencrypt/live/{{ domain }}/fullchain.pem"
|
|
|
|
ssl_certificate_key_file: "/etc/letsencrypt/live/{{ domain }}/privkey.pem"
|
|
|
|
ssl_trusted_certificate_file: "/etc/letsencrypt/live/{{ domain }}/chain.pem"
|
|
|
|
resolver: "185.12.64.12 [a01:4ff:ff00::add:2] [2a01:4ff:ff00::add:1]"
|
|
|
|
|
|
|
|
|
|
|
|
synapse:
|
|
|
|
max_upload_size: 50M
|