Compare commits
	
		
			17 Commits
		
	
	
		
			main
			...
			08572f6ef8
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 08572f6ef8 | |||
| c542668491 | |||
| 79170487c7 | |||
| f1b3417202 | |||
| 57c7b06f03 | |||
| 11c96fe48d | |||
| 8175a62c0b | |||
| 53570a1f08 | |||
| a0b1b75a73 | |||
| d6a6e418b6 | |||
| f07c3128e1 | |||
| a2651e5f79 | |||
| 7e2c66c907 | |||
| e28b445cd8 | |||
| f2d80dbe15 | |||
| 7e7c28d68c | |||
| 8ab660cebb | 
| @ -12,14 +12,12 @@ homelab. | |||||||
|  |  | ||||||
| === Containers | === Containers | ||||||
|  |  | ||||||
| * Authelia |  | ||||||
| * Jellyfin |  | ||||||
| * Keycloak |  | ||||||
| * NGINX | * NGINX | ||||||
|  | * Jellyfin | ||||||
| * OpenLDAP | * OpenLDAP | ||||||
| * Portainer |  | ||||||
| * PostgreSQL | * PostgreSQL | ||||||
| * Radarr | * Keycloak | ||||||
|  | * Authelia | ||||||
|  |  | ||||||
| === Testing | === Testing | ||||||
| To run locally, specify the inventory file with `-i hosts`. | To run locally, specify the inventory file with `-i hosts`. | ||||||
|  | |||||||
| @ -13,9 +13,4 @@ pgid: "1000" | |||||||
| tz: "Europe/Prague" | tz: "Europe/Prague" | ||||||
| media: | media: | ||||||
|   tv: "{{ data_folder }}/media/tv" |   tv: "{{ data_folder }}/media/tv" | ||||||
|   movies: "{{ data_folder }}/media/movies" |   movies: "{{ data_folder }}/media/movies" | ||||||
| downloads: |  | ||||||
|   nzb: "{{ data_folder }}/downloads/nzb" |  | ||||||
|   torrent: "{{ data_folder }}/downloads/torrent" |  | ||||||
|   torrent_blackhole: "{{ data_folder }}/downloads/blackhole" |  | ||||||
|   music: "{{ data_folder }}/downloads/music" |  | ||||||
| @ -9,7 +9,6 @@ | |||||||
|     - postgres |     - postgres | ||||||
|     - authelia |     - authelia | ||||||
|     - keycloak |     - keycloak | ||||||
|     - radarr |  | ||||||
|   vars_files: |   vars_files: | ||||||
|     - vault/certs/{{ base_domain }}.yml |     - vault/certs/{{ base_domain }}.yml | ||||||
|     - vault/passwords.yml |     - vault/passwords.yml | ||||||
|  | |||||||
| @ -39,8 +39,6 @@ access_control: | |||||||
|       policy: one_factor |       policy: one_factor | ||||||
|     - domain: keycloak.{{ base_domain }} |     - domain: keycloak.{{ base_domain }} | ||||||
|       policy: one_factor |       policy: one_factor | ||||||
|     - domain: radarr.{{ base_domain }} |  | ||||||
|       policy: two_factor |  | ||||||
| session: | session: | ||||||
|   name: authelia_session |   name: authelia_session | ||||||
|   secret: somerandomsecret |   secret: somerandomsecret | ||||||
|  | |||||||
| @ -1,34 +0,0 @@ | |||||||
| - name: ensure directories exist |  | ||||||
|   file: |  | ||||||
|     path: "{{ item }}" |  | ||||||
|     state: directory |  | ||||||
|     mode: '0755' |  | ||||||
|   loop: |  | ||||||
|     - "{{ data_folder }}/radarr" |  | ||||||
|     - "{{ media.tv }}" |  | ||||||
|     - "{{ media.movies }}" |  | ||||||
|     - "{{ downloads.nzb }}" |  | ||||||
| - name: run container |  | ||||||
|   docker_container: |  | ||||||
|     name: "{{ role_name }}" |  | ||||||
|     image: "linuxserver/radarr" |  | ||||||
|     networks: |  | ||||||
|       - name: external |  | ||||||
|     env: |  | ||||||
|       "TZ": "{{ tz }}" |  | ||||||
|       "PUID": "{{ puid }}" |  | ||||||
|       "PGID": "{{  pgid }}" |  | ||||||
|       "UMASK": "022" |  | ||||||
|     volumes: |  | ||||||
|       - "{{ data_folder }}/radarr:/config" |  | ||||||
|       - "{{ downloads.nzb }}:/downloads" |  | ||||||
|       - "{{ media.movies }}:/movies" |  | ||||||
|     ports: |  | ||||||
|       - "7878:7878" |  | ||||||
|     state: started |  | ||||||
| - name: copy nginx conf |  | ||||||
|   template: |  | ||||||
|     src: "{{ role_name }}.conf.j2" |  | ||||||
|     dest: "{{ data_folder }}/nginx/conf.d/{{ role_name }}.{{ base_domain }}.conf" |  | ||||||
|     mode: "755" |  | ||||||
|   notify: reload nginx |  | ||||||
| @ -1,20 +0,0 @@ | |||||||
| server { |  | ||||||
|     server_name {{ role_name }}.{{ base_domain }}; |  | ||||||
|     listen 80; |  | ||||||
|     return 301 https://$server_name$request_uri; |  | ||||||
| } |  | ||||||
|  |  | ||||||
| server { |  | ||||||
|     server_name {{ role_name }}.{{ base_domain }}; |  | ||||||
|     listen 443 ssl http2; |  | ||||||
|  |  | ||||||
|     include /etc/nginx/snippets/authelia-endpoint.conf; |  | ||||||
|  |  | ||||||
|     location / { |  | ||||||
|         include /etc/nginx/snippets/proxy.conf; |  | ||||||
|         include /etc/nginx/snippets/authelia-auth.conf; |  | ||||||
|  |  | ||||||
|         set $upstream http://{{ role_name }}:7878; |  | ||||||
|         proxy_pass $upstream; |  | ||||||
|     } |  | ||||||
| } |  | ||||||
		Reference in New Issue
	
	Block a user