Add Portainer #45
|
@ -3,8 +3,9 @@
|
||||||
roles:
|
roles:
|
||||||
- docker
|
- docker
|
||||||
- nginx
|
- nginx
|
||||||
- jellyfin
|
|
||||||
- openldap
|
- openldap
|
||||||
|
- portainer
|
||||||
|
- jellyfin
|
||||||
- postgres
|
- postgres
|
||||||
- authelia
|
- authelia
|
||||||
- keycloak
|
- keycloak
|
||||||
|
|
|
@ -17,8 +17,8 @@
|
||||||
ports:
|
ports:
|
||||||
- "9091:9091"
|
- "9091:9091"
|
||||||
networks:
|
networks:
|
||||||
- name: bridge
|
- name: external
|
||||||
- name: nginx-internal
|
- name: openldap
|
||||||
volumes:
|
volumes:
|
||||||
- "{{ data_folder }}/authelia:/config"
|
- "{{ data_folder }}/authelia:/config"
|
||||||
- name: copy nginx endpoint conf
|
- name: copy nginx endpoint conf
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
server {
|
server {
|
||||||
listen 80;
|
|
||||||
server_name auth.{{ base_domain }};
|
server_name auth.{{ base_domain }};
|
||||||
return 301 https://$host$request_uri;
|
listen 80;
|
||||||
|
return 301 https://$server_name$request_uri;
|
||||||
}
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
|
|
|
@ -26,9 +26,19 @@ authentication_backend:
|
||||||
password: {{ vault_openldap_admin_password }}
|
password: {{ vault_openldap_admin_password }}
|
||||||
access_control:
|
access_control:
|
||||||
default_policy: deny
|
default_policy: deny
|
||||||
|
networks:
|
||||||
|
- name: local
|
||||||
|
networks:
|
||||||
|
- 192.168.0.0/24
|
||||||
rules:
|
rules:
|
||||||
- domain: "*.{{ base_domain }}"
|
- domain: "*.{{ base_domain }}"
|
||||||
|
networks:
|
||||||
|
- local
|
||||||
policy: bypass
|
policy: bypass
|
||||||
|
- domain: portainer.{{ base_domain }}
|
||||||
|
policy: one_factor
|
||||||
|
- domain: keycloak.{{ base_domain }}
|
||||||
|
policy: one_factor
|
||||||
session:
|
session:
|
||||||
name: authelia_session
|
name: authelia_session
|
||||||
secret: somerandomsecret
|
secret: somerandomsecret
|
||||||
|
|
|
@ -3,6 +3,9 @@
|
||||||
name:
|
name:
|
||||||
- docker
|
- docker
|
||||||
- python-pip
|
- python-pip
|
||||||
|
- neovim
|
||||||
|
- fish
|
||||||
|
- curlie
|
||||||
state: present
|
state: present
|
||||||
update_cache: true
|
update_cache: true
|
||||||
- name: start
|
- name: start
|
||||||
|
@ -12,8 +15,9 @@
|
||||||
- name: add user to group
|
- name: add user to group
|
||||||
user:
|
user:
|
||||||
name: lukas
|
name: lukas
|
||||||
groups: docker
|
groups: docker,wheel
|
||||||
append: true
|
append: true
|
||||||
|
shell: /usr/bin/fish
|
||||||
- name: install python docker
|
- name: install python docker
|
||||||
pip:
|
pip:
|
||||||
name:
|
name:
|
||||||
|
|
|
@ -12,7 +12,7 @@
|
||||||
name: 'jellyfin'
|
name: 'jellyfin'
|
||||||
image: linuxserver/jellyfin
|
image: linuxserver/jellyfin
|
||||||
networks:
|
networks:
|
||||||
- name: nginx-internal
|
- name: external
|
||||||
volumes:
|
volumes:
|
||||||
- "{{ data_folder }}/jellyfin:/config"
|
- "{{ data_folder }}/jellyfin:/config"
|
||||||
- "{{ media.tv }}:/data/tv"
|
- "{{ media.tv }}:/data/tv"
|
||||||
|
@ -29,7 +29,6 @@
|
||||||
devices:
|
devices:
|
||||||
- /dev/dri:/dev/dri
|
- /dev/dri:/dev/dri
|
||||||
state: started
|
state: started
|
||||||
restart: yes
|
|
||||||
- name: copy jellyfin nginx config
|
- name: copy jellyfin nginx config
|
||||||
template:
|
template:
|
||||||
src: jellyfin.conf.j2
|
src: jellyfin.conf.j2
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
server {
|
server {
|
||||||
|
server_name "jellyfin.{{ base_domain }}";
|
||||||
listen 80;
|
listen 80;
|
||||||
return 301 https://$host$request_uri;
|
return 301 https://$server_name$request_uri;
|
||||||
}
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
|
|
|
@ -5,8 +5,9 @@
|
||||||
ports:
|
ports:
|
||||||
- "8080:8080"
|
- "8080:8080"
|
||||||
networks:
|
networks:
|
||||||
|
- name: external
|
||||||
- name: postgres
|
- name: postgres
|
||||||
- name: nginx-internal
|
- name: openldap
|
||||||
env:
|
env:
|
||||||
"KEYCLOAK_USER": "{{ vault_keycloak_user }}"
|
"KEYCLOAK_USER": "{{ vault_keycloak_user }}"
|
||||||
"KEYCLOAK_PASSWORD": "{{ vault_keycloak_password }}"
|
"KEYCLOAK_PASSWORD": "{{ vault_keycloak_password }}"
|
||||||
|
@ -20,6 +21,6 @@
|
||||||
- name: copy nginx conf
|
- name: copy nginx conf
|
||||||
template:
|
template:
|
||||||
src: "keycloak.conf.j2"
|
src: "keycloak.conf.j2"
|
||||||
dest: "{{ data_folder }}/nginx/conf.d/{{ role_name}}.{{ base_domain }}.conf"
|
dest: "{{ data_folder }}/nginx/conf.d/{{ role_name }}.{{ base_domain }}.conf"
|
||||||
mode: "755"
|
mode: "755"
|
||||||
notify: reload nginx
|
notify: reload nginx
|
|
@ -1,6 +1,7 @@
|
||||||
server {
|
server {
|
||||||
listen 80;
|
server_name "keycloak.{{ base_domain }}";
|
||||||
return 301 https://$host$request_uri;
|
listen 80;
|
||||||
|
return 301 https://$server_name$request_uri;
|
||||||
}
|
}
|
||||||
|
|
||||||
server {
|
server {
|
||||||
|
|
|
@ -14,11 +14,11 @@
|
||||||
- name: generate self-signed certs
|
- name: generate self-signed certs
|
||||||
import_tasks: self-signed.yml
|
import_tasks: self-signed.yml
|
||||||
when: self_signed
|
when: self_signed
|
||||||
- name: create nginx bridge network
|
- name: create external bridge network
|
||||||
docker_network:
|
docker_network:
|
||||||
name: nginx-internal
|
name: external
|
||||||
attachable: true
|
attachable: true
|
||||||
internal: true
|
internal: false
|
||||||
state: present
|
state: present
|
||||||
- name: copy nginx.conf
|
- name: copy nginx.conf
|
||||||
template:
|
template:
|
||||||
|
@ -37,8 +37,7 @@
|
||||||
name: 'nginx'
|
name: 'nginx'
|
||||||
image: nginx
|
image: nginx
|
||||||
networks:
|
networks:
|
||||||
- name: bridge
|
- name: external
|
||||||
- name: nginx-internal
|
|
||||||
volumes:
|
volumes:
|
||||||
- "{{ data_folder }}/nginx/conf.d:/etc/nginx/conf.d"
|
- "{{ data_folder }}/nginx/conf.d:/etc/nginx/conf.d"
|
||||||
- "{{ data_folder }}/nginx/nginx.conf:/etc/nginx/nginx.conf"
|
- "{{ data_folder }}/nginx/nginx.conf:/etc/nginx/nginx.conf"
|
||||||
|
@ -54,4 +53,3 @@
|
||||||
NGINX_HOST: "{{ base_domain }}"
|
NGINX_HOST: "{{ base_domain }}"
|
||||||
NGINX_PORT: '80'
|
NGINX_PORT: '80'
|
||||||
state: started
|
state: started
|
||||||
restart: yes
|
|
||||||
|
|
|
@ -6,13 +6,19 @@
|
||||||
loop:
|
loop:
|
||||||
- "{{ data_folder }}/openldap"
|
- "{{ data_folder }}/openldap"
|
||||||
- "{{ data_folder }}/openldap/data"
|
- "{{ data_folder }}/openldap/data"
|
||||||
|
- name: create network
|
||||||
|
docker_network:
|
||||||
|
name: openldap
|
||||||
|
attachable: true
|
||||||
|
internal: true
|
||||||
|
state: present
|
||||||
- name: run container
|
- name: run container
|
||||||
docker_container:
|
docker_container:
|
||||||
name: "openldap"
|
name: "openldap"
|
||||||
image: osixia/openldap
|
image: osixia/openldap
|
||||||
hostname: openldap
|
hostname: openldap
|
||||||
networks:
|
networks:
|
||||||
- name: nginx-internal
|
- name: openldap
|
||||||
ports:
|
ports:
|
||||||
- "389:389"
|
- "389:389"
|
||||||
- "636:636"
|
- "636:636"
|
||||||
|
@ -24,4 +30,3 @@
|
||||||
LDAP_ADMIN_PASSWORD: "{{ vault_openldap_admin_password }}"
|
LDAP_ADMIN_PASSWORD: "{{ vault_openldap_admin_password }}"
|
||||||
LDAP_REMOVE_CONFIG_AFTER_SETUP: "false"
|
LDAP_REMOVE_CONFIG_AFTER_SETUP: "false"
|
||||||
state: started
|
state: started
|
||||||
restart: yes
|
|
|
@ -1,6 +0,0 @@
|
||||||
dn: dc=kucharczyk,dc=xyz
|
|
||||||
objectclass: top
|
|
||||||
objectclass: dcObject
|
|
||||||
objectclass: organization
|
|
||||||
dc: kucharczyk
|
|
||||||
o: Homelab
|
|
|
@ -0,0 +1,19 @@
|
||||||
|
- name: run container
|
||||||
|
docker_container:
|
||||||
|
name: 'portainer'
|
||||||
|
image: portainer/portainer-ce
|
||||||
|
networks:
|
||||||
|
- name: external
|
||||||
|
- name: openldap
|
||||||
|
volumes:
|
||||||
|
- "/var/run/docker.sock:/var/run/docker.sock"
|
||||||
|
ports:
|
||||||
|
- "8000:8000"
|
||||||
|
- "9000:9000"
|
||||||
|
state: started
|
||||||
|
- name: copy nginx conf
|
||||||
|
template:
|
||||||
|
src: portainer.conf.j2
|
||||||
|
dest: "{{ data_folder }}/nginx/conf.d/{{ role_name }}.{{ base_domain }}.conf"
|
||||||
|
mode: "755"
|
||||||
|
notify: reload nginx
|
|
@ -0,0 +1,20 @@
|
||||||
|
server {
|
||||||
|
server_name portainer.{{ base_domain }};
|
||||||
|
listen 80;
|
||||||
|
return 301 https://$server_name$request_uri;
|
||||||
|
}
|
||||||
|
|
||||||
|
server {
|
||||||
|
server_name portainer.{{ base_domain }};
|
||||||
|
listen 443 ssl http2;
|
||||||
|
|
||||||
|
include /etc/nginx/snippets/authelia-endpoint.conf;
|
||||||
|
|
||||||
|
location / {
|
||||||
|
include /etc/nginx/snippets/proxy.conf;
|
||||||
|
include /etc/nginx/snippets/authelia-auth.conf;
|
||||||
|
|
||||||
|
set $upstream http://portainer:9000; # This example assumes a Docker deployment
|
||||||
|
proxy_pass $upstream;
|
||||||
|
}
|
||||||
|
}
|
Loading…
Reference in New Issue