Update yamllint
This commit is contained in:
parent
9f59b30f1e
commit
f878866f10
20 changed files with 90 additions and 90 deletions
|
@ -1,3 +1,3 @@
|
||||||
-r requirements.txt
|
-r requirements.txt
|
||||||
ansible-lint==4.2.0
|
ansible-lint==4.2.0
|
||||||
yamllint==1.21.0
|
yamllint==1.23.0
|
||||||
|
|
|
@ -12,6 +12,6 @@ services:
|
||||||
- ./config:/config
|
- ./config:/config
|
||||||
- /srv/nextcloud-data/data/jake/files/EBooks:/books:ro
|
- /srv/nextcloud-data/data/jake/files/EBooks:/books:ro
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.calibre.rule=Host(`calibre.jakehoward.tech`)"
|
- traefik.http.routers.calibre.rule=Host(`calibre.jakehoward.tech`)
|
||||||
- "traefik.http.routers.calibre.tls.certresolver=le"
|
- traefik.http.routers.calibre.tls.certresolver=le
|
||||||
|
|
|
@ -16,6 +16,6 @@ services:
|
||||||
- 8096:8096
|
- 8096:8096
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.emby.rule=Host(`media.jakehoward.tech`)"
|
- traefik.http.routers.emby.rule=Host(`media.jakehoward.tech`)
|
||||||
- "traefik.http.routers.emby.tls.certresolver=le"
|
- traefik.http.routers.emby.tls.certresolver=le
|
||||||
|
|
|
@ -9,10 +9,10 @@ services:
|
||||||
- USER_UID={{ docker_user.id }}
|
- USER_UID={{ docker_user.id }}
|
||||||
- USER_GID={{ docker_user.id }}
|
- USER_GID={{ docker_user.id }}
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.gitea.rule=(Host(`git.theorangeone.net`) || Host(`git.0rng.one`))"
|
- traefik.http.routers.gitea.rule=(Host(`git.theorangeone.net`) || Host(`git.0rng.one`))
|
||||||
- "traefik.http.routers.gitea.tls.certresolver=le"
|
- traefik.http.routers.gitea.tls.certresolver=le
|
||||||
- "traefik.http.services.gitea-gitea.loadbalancer.server.port=3000"
|
- traefik.http.services.gitea-gitea.loadbalancer.server.port=3000
|
||||||
ports:
|
ports:
|
||||||
- "{{ wireguard.clients.intersect.ip }}:3022:3022"
|
- "{{ wireguard.clients.intersect.ip }}:3022:3022"
|
||||||
volumes:
|
volumes:
|
||||||
|
|
|
@ -9,6 +9,6 @@ services:
|
||||||
- ./data:/app/data
|
- ./data:/app/data
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.gotify.rule=Host(`gotify.jakehoward.tech`)"
|
- traefik.http.routers.gotify.rule=Host(`gotify.jakehoward.tech`)
|
||||||
- "traefik.http.routers.gotify.tls.certresolver=le"
|
- traefik.http.routers.gotify.tls.certresolver=le
|
||||||
|
|
|
@ -11,8 +11,8 @@ services:
|
||||||
- 33377:80
|
- 33377:80
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.librespeed.rule=Host(`speed.jakehoward.tech`)"
|
- traefik.http.routers.librespeed.rule=Host(`speed.jakehoward.tech`)
|
||||||
- "traefik.http.routers.librespeed.tls.certresolver=le"
|
- traefik.http.routers.librespeed.tls.certresolver=le
|
||||||
- "traefik.http.routers.librespeed.middlewares=librespeed-auth@docker"
|
- traefik.http.routers.librespeed.middlewares=librespeed-auth@docker
|
||||||
- "traefik.http.middlewares.librespeed-auth.basicauth.users={{ librespeed_basicauth }}"
|
- traefik.http.middlewares.librespeed-auth.basicauth.users={{ librespeed_basicauth }}
|
||||||
|
|
|
@ -18,13 +18,13 @@ services:
|
||||||
tmpfs:
|
tmpfs:
|
||||||
- /config/log
|
- /config/log
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.nextcloud.rule=Host(`intersect.jakehoward.tech`)"
|
- traefik.http.routers.nextcloud.rule=Host(`intersect.jakehoward.tech`)
|
||||||
- "traefik.http.routers.nextcloud.tls.certresolver=le"
|
- traefik.http.routers.nextcloud.tls.certresolver=le
|
||||||
- "traefik.http.services.nextcloud-nextcloud.loadbalancer.server.port=443"
|
- traefik.http.services.nextcloud-nextcloud.loadbalancer.server.port=443
|
||||||
- "traefik.http.services.nextcloud-nextcloud.loadbalancer.server.scheme=https"
|
- traefik.http.services.nextcloud-nextcloud.loadbalancer.server.scheme=https
|
||||||
- "traefik.http.middlewares.nextcloud-hsts.headers.stsseconds=15552000"
|
- traefik.http.middlewares.nextcloud-hsts.headers.stsseconds=15552000
|
||||||
- "traefik.http.routers.nextcloud.middlewares=nextcloud-hsts@docker"
|
- traefik.http.routers.nextcloud.middlewares=nextcloud-hsts@docker
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: postgres:12-alpine
|
image: postgres:12-alpine
|
||||||
|
@ -63,9 +63,9 @@ services:
|
||||||
cap_add:
|
cap_add:
|
||||||
- MKNOD
|
- MKNOD
|
||||||
environment:
|
environment:
|
||||||
- "domain=intersect\\.jakehoward\\.tech"
|
- domain=intersect\\.jakehoward\\.tech
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.collabora.rule=Host(`collabora.jakehoward.tech`)"
|
- traefik.http.routers.collabora.rule=Host(`collabora.jakehoward.tech`)
|
||||||
- "traefik.http.routers.collabora.tls.certresolver=le"
|
- traefik.http.routers.collabora.tls.certresolver=le
|
||||||
- "traefik.http.services.collabora-nextcloud.loadbalancer.server.scheme=https"
|
- traefik.http.services.collabora-nextcloud.loadbalancer.server.scheme=https
|
||||||
|
|
|
@ -15,8 +15,8 @@ services:
|
||||||
- ./dnsmasq.d/:/etc/dnsmasq.d/
|
- ./dnsmasq.d/:/etc/dnsmasq.d/
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.pihole.rule=Host(`pihole.jakehoward.tech`)"
|
- traefik.http.routers.pihole.rule=Host(`pihole.jakehoward.tech`)
|
||||||
- "traefik.http.routers.pihole.tls.certresolver=le"
|
- traefik.http.routers.pihole.tls.certresolver=le
|
||||||
- "traefik.http.routers.pihole.middlewares=internal-only@file"
|
- traefik.http.routers.pihole.middlewares=internal-only@file
|
||||||
- "traefik.http.services.pihole-pihole.loadbalancer.server.port=80"
|
- traefik.http.services.pihole-pihole.loadbalancer.server.port=80
|
||||||
|
|
|
@ -16,10 +16,10 @@ services:
|
||||||
expose:
|
expose:
|
||||||
- 8008
|
- 8008
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.synapse.rule=Host(`matrix.jakehoward.tech`)"
|
- traefik.http.routers.synapse.rule=Host(`matrix.jakehoward.tech`)
|
||||||
- "traefik.http.routers.synapse.tls.certresolver=le"
|
- traefik.http.routers.synapse.tls.certresolver=le
|
||||||
- "traefik.http.routers.synapse.entrypoints=web-secure,matrix"
|
- traefik.http.routers.synapse.entrypoints=web-secure,matrix
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: postgres:12-alpine
|
image: postgres:12-alpine
|
||||||
|
|
|
@ -108,15 +108,15 @@ pid_file: /data/homeserver.pid
|
||||||
# listed here, since they correspond to unroutable addresses.)
|
# listed here, since they correspond to unroutable addresses.)
|
||||||
#
|
#
|
||||||
federation_ip_range_blacklist:
|
federation_ip_range_blacklist:
|
||||||
- '127.0.0.0/8'
|
- 127.0.0.0/8
|
||||||
- '10.0.0.0/8'
|
- 10.0.0.0/8
|
||||||
- '172.16.0.0/12'
|
- 172.16.0.0/12
|
||||||
- '192.168.0.0/16'
|
- 192.168.0.0/16
|
||||||
- '100.64.0.0/10'
|
- 100.64.0.0/10
|
||||||
- '169.254.0.0/16'
|
- 169.254.0.0/16
|
||||||
- '::1/128'
|
- ::1/128
|
||||||
- 'fe80::/64'
|
- fe80::/64
|
||||||
- 'fc00::/7'
|
- fc00::/7
|
||||||
|
|
||||||
# List of ports that Synapse should listen on, their purpose and their
|
# List of ports that Synapse should listen on, their purpose and their
|
||||||
# configuration.
|
# configuration.
|
||||||
|
@ -469,7 +469,7 @@ acme:
|
||||||
# Again, you may want to change this if you are forwarding connections
|
# Again, you may want to change this if you are forwarding connections
|
||||||
# through Apache/Nginx/etc.
|
# through Apache/Nginx/etc.
|
||||||
#
|
#
|
||||||
bind_addresses: ['::', '0.0.0.0']
|
bind_addresses: ["::", 0.0.0.0]
|
||||||
# How many days remaining on a certificate before it is renewed.
|
# How many days remaining on a certificate before it is renewed.
|
||||||
#
|
#
|
||||||
reprovision_threshold: 30
|
reprovision_threshold: 30
|
||||||
|
|
|
@ -15,10 +15,10 @@ services:
|
||||||
- 8112:8112
|
- 8112:8112
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.deluge.rule=Host(`deluge.jakehoward.tech`)"
|
- traefik.http.routers.deluge.rule=Host(`deluge.jakehoward.tech`)
|
||||||
- "traefik.http.routers.deluge.tls.certresolver=le"
|
- traefik.http.routers.deluge.tls.certresolver=le
|
||||||
- "traefik.http.routers.deluge.middlewares=internal-only@file"
|
- traefik.http.routers.deluge.middlewares=internal-only@file
|
||||||
|
|
||||||
tor-socks-proxy:
|
tor-socks-proxy:
|
||||||
image: peterdavehello/tor-socks-proxy:latest
|
image: peterdavehello/tor-socks-proxy:latest
|
||||||
|
|
|
@ -12,9 +12,9 @@ services:
|
||||||
- ./config:/config
|
- ./config:/config
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.tt-rss.rule=Host(`tt-rss.jakehoward.tech`)"
|
- traefik.http.routers.tt-rss.rule=Host(`tt-rss.jakehoward.tech`)
|
||||||
- "traefik.http.routers.tt-rss.tls.certresolver=le"
|
- traefik.http.routers.tt-rss.tls.certresolver=le
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: postgres:12-alpine
|
image: postgres:12-alpine
|
||||||
|
|
|
@ -12,9 +12,9 @@ services:
|
||||||
- ./data:/var/www/wallabag/data
|
- ./data:/var/www/wallabag/data
|
||||||
- ./images:/var/www/wallabag/images
|
- ./images:/var/www/wallabag/images
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.wallabag.rule=Host(`wallabag.jakehoward.tech`)"
|
- traefik.http.routers.wallabag.rule=Host(`wallabag.jakehoward.tech`)
|
||||||
- "traefik.http.routers.wallabag.tls.certresolver=le"
|
- traefik.http.routers.wallabag.tls.certresolver=le
|
||||||
|
|
||||||
redis:
|
redis:
|
||||||
image: redis:6-alpine
|
image: redis:6-alpine
|
||||||
|
|
|
@ -6,6 +6,6 @@ services:
|
||||||
container_name: web-rng
|
container_name: web-rng
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.web-rng.rule=Host(`rng.theorangeone.net`)"
|
- traefik.http.routers.web-rng.rule=Host(`rng.theorangeone.net`)
|
||||||
- "traefik.http.routers.web-rng.tls.certresolver=le"
|
- traefik.http.routers.web-rng.tls.certresolver=le
|
||||||
|
|
|
@ -6,6 +6,6 @@ services:
|
||||||
container_name: whoami
|
container_name: whoami
|
||||||
restart: unless-stopped
|
restart: unless-stopped
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.whoami.rule=Host(`whoami.theorangeone.net`) || Host(`who.0rng.one`)"
|
- traefik.http.routers.whoami.rule=Host(`whoami.theorangeone.net`) || Host(`who.0rng.one`)
|
||||||
- "traefik.http.routers.whoami.tls.certresolver=le"
|
- traefik.http.routers.whoami.tls.certresolver=le
|
||||||
|
|
|
@ -8,9 +8,9 @@ services:
|
||||||
volumes:
|
volumes:
|
||||||
- ./statping:/app
|
- ./statping:/app
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.statping.rule=Host(`stats.theorangeone.net`)"
|
- traefik.http.routers.statping.rule=Host(`stats.theorangeone.net`)
|
||||||
- "traefik.http.routers.statping.tls.certresolver=le"
|
- traefik.http.routers.statping.tls.certresolver=le
|
||||||
|
|
||||||
db:
|
db:
|
||||||
image: postgres:12-alpine
|
image: postgres:12-alpine
|
||||||
|
|
|
@ -3,9 +3,9 @@ http:
|
||||||
internal-only:
|
internal-only:
|
||||||
ipWhiteList:
|
ipWhiteList:
|
||||||
sourceRange:
|
sourceRange:
|
||||||
- "10.0.0.0/8"
|
- 10.0.0.0/8
|
||||||
- "172.16.0.0/12"
|
- 172.16.0.0/12
|
||||||
- "192.168.0.0/16"
|
- 192.168.0.0/16
|
||||||
tls-redirect:
|
tls-redirect:
|
||||||
redirectScheme:
|
redirectScheme:
|
||||||
scheme: https
|
scheme: https
|
||||||
|
|
|
@ -1,16 +1,16 @@
|
||||||
entryPoints:
|
entryPoints:
|
||||||
web:
|
web:
|
||||||
address: ":80"
|
address: :80
|
||||||
proxyProtocol:
|
proxyProtocol:
|
||||||
trustedIPs:
|
trustedIPs:
|
||||||
- "{{ wireguard.cidr }}"
|
- "{{ wireguard.cidr }}"
|
||||||
web-secure:
|
web-secure:
|
||||||
address: ":443"
|
address: :443
|
||||||
proxyProtocol:
|
proxyProtocol:
|
||||||
trustedIPs:
|
trustedIPs:
|
||||||
- "{{ wireguard.cidr }}"
|
- "{{ wireguard.cidr }}"
|
||||||
matrix:
|
matrix:
|
||||||
address: ":8448"
|
address: :8448
|
||||||
proxyProtocol:
|
proxyProtocol:
|
||||||
trustedIPs:
|
trustedIPs:
|
||||||
- "{{ wireguard.cidr }}"
|
- "{{ wireguard.cidr }}"
|
||||||
|
|
|
@ -11,9 +11,9 @@ services:
|
||||||
- MINIO_ACCESS_KEY={{ minio_access_key }}
|
- MINIO_ACCESS_KEY={{ minio_access_key }}
|
||||||
- MINIO_SECRET_KEY={{ minio_secret_key }}
|
- MINIO_SECRET_KEY={{ minio_secret_key }}
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.upload.rule=Host(`upload.theorangeone.net`)"
|
- traefik.http.routers.upload.rule=Host(`upload.theorangeone.net`)
|
||||||
- "traefik.http.routers.upload.tls.certresolver=le"
|
- traefik.http.routers.upload.tls.certresolver=le
|
||||||
|
|
||||||
img:
|
img:
|
||||||
image: theorangeone/static-server:latest
|
image: theorangeone/static-server:latest
|
||||||
|
@ -21,9 +21,9 @@ services:
|
||||||
volumes:
|
volumes:
|
||||||
- ./data/img:/srv:ro
|
- ./data/img:/srv:ro
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.img.rule=Host(`img.theorangeone.net`) || Host(`img.0rng.one`)"
|
- traefik.http.routers.img.rule=Host(`img.theorangeone.net`) || Host(`img.0rng.one`)
|
||||||
- "traefik.http.routers.img.tls.certresolver=le"
|
- traefik.http.routers.img.tls.certresolver=le
|
||||||
|
|
||||||
bg:
|
bg:
|
||||||
image: theorangeone/static-server:latest
|
image: theorangeone/static-server:latest
|
||||||
|
@ -33,9 +33,9 @@ services:
|
||||||
environment:
|
environment:
|
||||||
- FANCY_INDEX=on
|
- FANCY_INDEX=on
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.bg.rule=Host(`bg.theorangeone.net`)"
|
- traefik.http.routers.bg.rule=Host(`bg.theorangeone.net`)
|
||||||
- "traefik.http.routers.bg.tls.certresolver=le"
|
- traefik.http.routers.bg.tls.certresolver=le
|
||||||
|
|
||||||
dl:
|
dl:
|
||||||
image: theorangeone/static-server:latest
|
image: theorangeone/static-server:latest
|
||||||
|
@ -43,6 +43,6 @@ services:
|
||||||
volumes:
|
volumes:
|
||||||
- ./data/download:/srv:ro
|
- ./data/download:/srv:ro
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.dl.rule=Host(`dl.theorangeone.net`) || Host(`dl.0rng.one`)"
|
- traefik.http.routers.dl.rule=Host(`dl.theorangeone.net`) || Host(`dl.0rng.one`)
|
||||||
- "traefik.http.routers.dl.tls.certresolver=le"
|
- traefik.http.routers.dl.tls.certresolver=le
|
||||||
|
|
|
@ -10,9 +10,9 @@ services:
|
||||||
- ./access.log:/var/log/nginx/access.log
|
- ./access.log:/var/log/nginx/access.log
|
||||||
- ./report.html:/usr/share/nginx/html/stats/index.html:ro
|
- ./report.html:/usr/share/nginx/html/stats/index.html:ro
|
||||||
labels:
|
labels:
|
||||||
- "traefik.enable=true"
|
- traefik.enable=true
|
||||||
- "traefik.http.routers.website.rule=Host(`theorangeone.net`) || Host(`www.theorangeone.net`)"
|
- traefik.http.routers.website.rule=Host(`theorangeone.net`) || Host(`www.theorangeone.net`)
|
||||||
- "traefik.http.routers.website.tls.certresolver=le"
|
- traefik.http.routers.website.tls.certresolver=le
|
||||||
|
|
||||||
stats:
|
stats:
|
||||||
image: theorangeone/goaccess-static:latest
|
image: theorangeone/goaccess-static:latest
|
||||||
|
|
Loading…
Reference in a new issue