Compare commits

...

26 Commits

Author SHA1 Message Date
uumas
ad33ffca06 unifi 2022-05-12 00:48:15 +03:00
uumas
49ddfcc0a9 support more modular container reverse proxy config and host networking 2022-05-12 00:47:25 +03:00
uumas
12fa8d5d81 Start working on unifi role 2022-05-03 22:15:43 +03:00
uumas
7003364276 support setting docker network mode for container 2022-05-03 22:15:05 +03:00
uumas
dd40c7334e 0.5.2 2022-04-22 03:18:36 +03:00
uumas
9694b8ca98 Support smtp auth 2022-04-22 03:14:36 +03:00
uumas
65bc78ea1b rename common docs 2022-04-21 23:49:34 +03:00
uumas
1d70a35f9a Add WeKan 2022-03-15 21:26:58 +02:00
uumas
cee98cb62a release 0.5.0 2022-03-10 09:09:03 +02:00
uumas
71b98366f0 add hedgedoc 2022-03-10 09:07:22 +02:00
uumas
724b302ecf fix keycloak 2022-03-10 09:05:45 +02:00
uumas
b63efbf66b Implement ssh config of gitea role 2022-03-10 09:05:33 +02:00
uumas
ef9e2cdee5 Add keycloak 2022-03-10 05:35:13 +02:00
uumas
cb25e8c01a Add gitea and a generic container role 2022-03-10 02:57:09 +02:00
uumas
b1638ad7af release 0.4.2 2022-01-18 03:31:42 +02:00
uumas
4ce2ca74f4 Element traefik support probably 2022-01-08 02:04:42 +02:00
uumas
6d3e84e1d4 fix an oopsie 2021-12-20 04:41:10 +02:00
uumas
8e5e0b3873 use reverse_proxy role, traefik for jitsi 2021-12-20 04:37:55 +02:00
uumas
24dabf63aa removed unneeded template from element role 2021-12-20 03:56:14 +02:00
uumas
e2eac5e5e0 update jitsi 2021-12-18 17:15:11 +02:00
uumas
c941e0105e Made docker role compatible with other architectures and ubuntu 2021-12-02 03:34:30 +02:00
Uumas
13c8081395 Fix some ansible-lint warnings 2021-10-05 22:24:55 +03:00
Uumas
7e76a7f79a Element 2021-10-05 21:40:05 +03:00
Uumas
73c5bf51a8 move bitwarden_rs docs to vaultwarden 2021-10-02 12:02:03 +03:00
Uumas
528de042b1 Prepare for publisihing 2021-09-25 20:39:32 +03:00
Uumas
a2ceeaaba7 update to python 3 2021-09-25 20:19:44 +03:00
44 changed files with 523 additions and 44 deletions

1
.gitignore vendored Normal file
View File

@@ -0,0 +1 @@
uumas-docker-*.tar.gz

View File

@@ -1,3 +1,9 @@
# uumas.docker
Roles for services running on docker.
To add a new role:
1. Add it
1. usually meta/main.yml with depend on container
1. README.md
1. Add docs to docs/

21
docs/all.md Normal file
View File

@@ -0,0 +1,21 @@
# Required variables
These variables are required by multiple roles. Example values included.
```
timezone: 'Europe/Helsinki'
admin_email: 'admin@domain.tld'
smtp_server: smtp.domain.tld
smtp_from: sender@domain.tld
```
# Optional variables
These variables are used by multiple roles and have the following default values:
```
reverse_proxy_type: caddy # Allowed values: caddy, traefik, none
smtp_from: # not defined, no smtp login by default
smtp_pw: # not defined, see above
```

View File

@@ -1,6 +0,0 @@
# Required variables
These variables are required by some roles. Example values included.
```
timezone: 'Europe/Helsinki'
```

23
docs/element.md Normal file
View File

@@ -0,0 +1,23 @@
# Required variables
These variables are required. Example values included.
```
ports:
element_http: 8080
element_domains: # not required if reverse_proxy_type is set to none
- chat.domain.tld
- element.domain.tld
matrix_domain: domain.tld
matrix_server_domain: matrix.domain.tld
```
# Optional variables
These variables are optional and have the following default values:
```
matrix_external_url: https://{{ matrix_server_domain }}
jitsi_domain: jitsi.riot.im
```

View File

@@ -1,6 +0,0 @@
# Required variables
These variables are required by some roles. Example values included.
```
timezone: 'Europe/Helsinki'
```

16
docs/gitea.md Normal file
View File

@@ -0,0 +1,16 @@
# Required variables
These variables are required. Example values included. Some general variables might also be required for this role.
```
ports:
gitea:
http: 8080
ssh: 2222
docker_vhost_domains:
gitea:
- gitea.domain.tld
database_passwords:
gitea: secret
```

15
docs/hedgedoc.md Normal file
View File

@@ -0,0 +1,15 @@
# Required variables
These variables are required. Example values included. Some general variables might also be required for this role.
```
ports:
hedgedoc:
http: 8080
docker_vhost_domains:
hedgedoc:
- hedgedoc.domain.tld
database_passwords:
hedgedoc: secret
```

View File

@@ -5,5 +5,5 @@ These variables are required. Example values included. Some general variables mi
ports:
jitsi_http: 8080
jitsi_external_url: 'https://jitsi.domain.tld'
jitsi_domain: 'jitsi.domain.tld'
```

17
docs/keycloak.md Normal file
View File

@@ -0,0 +1,17 @@
# Required variables
These variables are required. Example values included. Some general variables might also be required for this role.
```
ports:
keycloak:
http: 8080
docker_vhost_domains:
keycloak:
- keycloak.domain.tld
database_passwords:
keycloak: secret
keycloak_admin_pw: secret
```

18
docs/vaultwarden.md Normal file
View File

@@ -0,0 +1,18 @@
# Required variables
These variables are required. Example values included. Some general variables might also be required for this role.
```
ports:
vaultwarden_http: 8080
vaultwarden_websocket: 3012
vaultwarden_external_url: 'https://vaultwarden.domain.tld'
```
These variables should be encrypted using ansible vault
```
vaultwarden_admin_pw: 'rcWJYfkSZcqzV74B8Y7qtWzB7DYozH5xwXrochZZMwkvrNMBTzEKbN5tj3wjyzu6X'
vaultwarden_postgres_pw: 'oefnh937f87nh9efm3ew0f8390g8nh0tm80d87n07nh4nfrfgiugingnuogme'
```

13
docs/wekan.md Normal file
View File

@@ -0,0 +1,13 @@
# Required variables
These variables are required. Example values included. Some general variables might also be required for this role.
```
ports:
wekan:
http: 8080
docker_vhost_domains:
hedgedoc:
- wekan.domain.tld
```

View File

@@ -2,10 +2,11 @@
namespace: uumas
name: docker
version: 0.1.0
version: 0.5.3
readme: README.md
repository: https://git.uumas.fi/uumas/ansible-docker
license_file: LICENSE
dependencies:
- uumas.general(>0.3.0)
uumas.general: '>=0.5.0'
authors:
- uumas

3
meta/runtime.yml Normal file
View File

@@ -0,0 +1,3 @@
---
requires_ansible: ">=2.10"

View File

@@ -0,0 +1 @@
Sets up a docker container

View File

@@ -0,0 +1,5 @@
---
reverse_proxy_type: caddy
docker_additional_env: {}
docker_published_ports: []

View File

@@ -0,0 +1,10 @@
---
dependencies:
- docker
- role: uumas.general.reverse_proxy
vhost_id: "{{ docker_service }}"
vhost_domains: "{{ docker_vhost_domains[docker_service] }}"
proxy_target_protocol: "{{ docker_proxy_target_protocol | default('http') }}"
proxy_target_port: "{{ ports[docker_service][proxy_target_protocol] }}"
when: reverse_proxy_type != 'none' and reverse_proxy_type != 'traefik'

View File

@@ -0,0 +1,65 @@
---
- name: "{{ docker_service }} docker network"
docker_network:
name: "{{ docker_service }}"
when: docker_network_mode is not defined or docker_network_mode != 'host'
- name: Set published ports variable
set_fact:
container_published_ports: ["127.0.0.1:{{ ports[docker_service][proxy_target_protocol] }}:{{ docker_image_http_port }}"]
when: reverse_proxy_type != 'traefik' and (docker_network_mode is not defined or docker_network_mode != 'host')
- name: Set networks variable
set_fact:
container_networks:
- name: "{{ docker_service }}"
when: docker_network_mode is not defined or docker_network_mode != 'host'
- name: Include traefik vars
include_vars: traefik.yml
when: reverse_proxy_type == 'traefik'
- name: Set postgres container env
set_fact:
db_container_image: 'postgres:14-alpine'
db_container_env:
POSTGRES_USER: "{{ docker_service }}"
POSTGRES_PASSWORD: "{{ database_passwords[docker_service] }}"
db_container_data: /var/lib/postgresql/data
when: docker_database is defined and docker_database == 'postgres'
- name: Set mongo container env
set_fact:
db_container_image: 'mongo:latest'
db_container_data: /data/db
when: docker_database is defined and docker_database == 'mongo'
- name: "{{ docker_database }} database container for {{ docker_service }}"
docker_container:
name: "{{ docker_service }}_db"
image: "{{ db_container_image }}"
pull: yes
container_default_behavior: no_defaults
env: "{{ db_container_env | default(omit) }}"
restart_policy: always
volumes:
- "{{ docker_service }}_db:{{ db_container_data }}"
networks: "{{ container_networks | default(omit) }}"
when: docker_database is defined
- name: "Container for {{ docker_service }}"
docker_container:
name: "{{ docker_service }}"
image: "{{ docker_image }}"
pull: true
container_default_behavior: no_defaults
volumes: "{{ docker_volumes | default(omit) }}"
published_ports: "{{ container_published_ports | default([]) + docker_published_ports | default(omit) }}"
labels: "{{ traefik_labels | default(omit) }}"
env: "{{ docker_env | combine(docker_additional_env) }}"
entrypoint: "{{ docker_entrypoint | default(omit) }}"
restart_policy: always
network_mode: "{{ docker_network_mode | default(omit) }}"
networks: "{{ container_networks | default(omit) }}"
register: container_out

View File

@@ -0,0 +1,6 @@
---
traefik_labels:
traefik.enable: 'true'
"traefik.http.routers.{{ docker_service }}.rule": "Host(`{{ vhost_domains[docker_service] | join('`) || Host(`') }}`)"
"traefik.http.routers.{{ docker_service }}.tls.certresolver": 'le'

1
roles/docker/README.md Normal file
View File

@@ -0,0 +1 @@
Installs docker

View File

@@ -8,7 +8,16 @@
- curl
- gnupg
- lsb-release
update_cache: yes
update_cache: true
- name: Set dpkg arch (amd64)
set_fact:
dpkg_arch: amd64
when: ansible_architecture == 'x86_64'
- name: Set dpkg arch (arm64)
set_fact:
dpkg_arch: arm64
when: ansible_architecture == 'aarch64'
- name: Add docker repo signing key
apt_key:
@@ -16,7 +25,7 @@
url: 'https://download.docker.com/linux/debian/gpg'
- name: Add docker repo
apt_repository:
repo: "deb [arch=amd64] https://download.docker.com/linux/debian {{ ansible_distribution_release }} stable"
repo: "deb [arch={{ dpkg_arch }}] https://download.docker.com/linux/{{ ansible_distribution|lower }} {{ ansible_distribution_release }} stable"
filename: 'docker'
mode: '644'
@@ -26,4 +35,4 @@
- docker-ce
- docker-ce-cli
- containerd.io
- python-docker
- python3-docker

1
roles/element/README.md Normal file
View File

@@ -0,0 +1 @@
Installs element in docker

View File

@@ -0,0 +1,3 @@
---
reverse_proxy_type: caddy

View File

@@ -0,0 +1,9 @@
---
dependencies:
- docker
- role: uumas.general.reverse_proxy
vhost_id: element
vhost_domains: "{{ element_domains }}"
proxy_target: http://127.0.0.1:{{ ports.element_http }}
when: reverse_proxy_type != 'none' and reverse_proxy_type != 'traefik'

View File

@@ -0,0 +1,36 @@
---
- name: Set element published ports variable
set_fact:
element_published_ports: ["127.0.0.1:{{ ports.element_http }}:80"]
when: reverse_proxy_type != 'traefik'
- name: Include traefik vars
include_vars: traefik.yml
when: reverse_proxy_type == 'traefik'
- name: Element web
docker_container:
name: 'element'
image: 'vectorim/element-web:latest'
pull: true
container_default_behavior: no_defaults
volumes:
- /app
published_ports: "{{ element_published_ports | default(omit) }}"
labels: "{{ element_traefik_labels | default(omit) }}"
restart_policy: always
register: element_out
- name: Get element config volume path from container creation output
set_fact:
element_config_volume: "{{ element_out.container.Mounts | selectattr('Destination', 'equalto', '/app') | join }}"
- name: Read element config to variable
include_vars: element_config.yml
- name: Put element config in place
copy:
content: "{{ element_config }}"
dest: "{{ element_config_volume.Source }}/config.json"
mode: '644'

View File

@@ -0,0 +1,35 @@
---
element_config:
default_server_config:
m.homeserver:
base_url: "{{ matrix_external_url }}"
server_name: "{{ matrix_domain }}"
disable_custom_urls: true
disable_guests: true
disable_login_language_selector: false
disable_3pid_login: true
brand: Element
integrations_ui_url: https://scalar.vector.im/
integrations_rest_url: https://scalar.vector.im/api
integrations_widgets_urls:
- https://scalar.vector.im/_matrix/integrations/v1
- https://scalar.vector.im/api
- https://scalar-staging.vector.im/_matrix/integrations/v1
- https://scalar-staging.vector.im/api
- https://scalar-staging.riot.im/scalar/api
bug_report_endpoint_url: https://element.io/bugreports/submit
"defaultCountryCode": GB
showLabsSettings: false
default_federate: true
default_theme: dark
roomDirectory:
servers:
- "{{ matrix_domain }}"
enable_presence_by_hs_url:
"https://matrix.org": false
"https://matrix-client.matrix.org": false
settingDefaults:
breadcrumbs: true
jitsi:
preferredDomain: "{{ jitsi_domain | default('jitsi.riot.im') }}"

View File

@@ -0,0 +1,6 @@
---
element_traefik_labels:
traefik.enable: 'true'
traefik.http.routers.element.rule: "Host(`{{ element_domains | join('`) || Host(`') }}`)"
traefik.http.routers.element.tls.certresolver: 'le'

1
roles/gitea/README.md Normal file
View File

@@ -0,0 +1 @@
Installs gitea in docker and configures ssh

29
roles/gitea/meta/main.yml Normal file
View File

@@ -0,0 +1,29 @@
---
dependencies:
- role: container
docker_service: gitea
docker_image: gitea/gitea:latest
docker_image_http_port: 3000
docker_database: postgres
docker_volumes:
- gitea_data:/data
- /var/lib/gitea/.ssh/:/data/git/.ssh
docker_published_ports:
- "127.0.0.1:{{ ports.gitea.ssh }}:22"
docker_env:
USER_UID: '2132'
USER_GID: '2132'
GITEA__database__DB_TYPE: postgres
GITEA__database__USER: gitea
GITEA__database__HOST: gitea_db:5432
GITEA__database__PASSWD: "{{ database_passwords.gitea }}"
GITEA__server__DOMAIN: "{{ docker_vhost_domains.gitea[0] }}"
GITEA__server__PROTOCOL: "http"
GITEA__server__ROOT_URL: "https://{{ docker_vhost_domains.gitea[0] }}"
GITEA__mailer__ENABLED: "true"
GITEA__mailer__HOST: "{{ smtp_server }}:587"
GITEA__mailer__FROM: "{{ smtp_from }}"
GITEA__mailer__MAILER_TYPE: smtp
GITERA__mailer__USER: "{{ smtp_user | default(omit) }}"
GITERA__mailer__PASSWD: "{{ smtp_pw | default(omit) }}"

View File

@@ -0,0 +1,28 @@
---
- name: Create git group on host for gitea ssh
group:
name: git
gid: 2132
system: yes
- name: Create git user on host for gitea ssh
user:
name: git
uid: 2132
group: git
system: yes
home: /var/lib/gitea
generate_ssh_key: yes
register: git_user
- name: Add git user's own ssh key to its authorized keys
authorized_key:
user: git
key: "{{ git_user.ssh_public_key }}"
- name: Put gitea ssh forwarder in place
template:
src: gitea_ssh_forward.j2
dest: /usr/local/bin/gitea
mode: '755'

View File

@@ -0,0 +1,2 @@
#!/bin/sh
ssh -p {{ ports.gitea.ssh }} -o StrictHostKeyChecking=no git@127.0.0.1 "SSH_ORIGINAL_COMMAND=\"$SSH_ORIGINAL_COMMAND\" $0 $@"

1
roles/hedgedoc/README.md Normal file
View File

@@ -0,0 +1 @@
Installs hedgedoc in docker

View File

@@ -0,0 +1,18 @@
---
dependencies:
- role: container
docker_service: hedgedoc
docker_image: quay.io/hedgedoc/hedgedoc:latest
docker_image_http_port: 3000
docker_database: postgres
docker_volumes:
- hedgedoc_uploads:/hedgedoc/public/uploads
docker_env:
CMD_DB_URL: postgres://hedgedoc:{{ database_passwords.hedgedoc }}@hedgedoc_db:5432/hedgedoc
CMD_DOMAIN: "{{ docker_vhost_domains.hedgedoc[0] }}"
CMD_PROTOCOL_USESSL: "true"
CMD_ALLOW_ANONYMOUS: "false"
CMD_ALLOW_ANONYMOUS_EDITS: "true"
CMD_ALLOW_FREEURL: "true"

1
roles/jitsi/README.md Normal file
View File

@@ -0,0 +1 @@
Installs jitsi in docker

View File

@@ -2,4 +2,9 @@
dependencies:
- docker
- uumas.general.caddy
- role: uumas.general.reverse_proxy
vhost_id: jitsi
vhost_domains:
- "{{ jitsi_domain }}"
proxy_target: http://127.0.0.1:{{ ports.jitsi_http }}
when: reverse_proxy_type != 'traefik'

View File

@@ -4,44 +4,67 @@
docker_network:
name: meet.jitsi
- name: Set jitsi meet web published ports variable
set_fact:
jitsi_web_published_ports: ["127.0.0.1:{{ ports.jitsi_http }}:80"]
when: reverse_proxy_type != 'traefik'
- name: Include traefik vars
include_vars: traefik.yml
when: reverse_proxy_type == 'traefik'
- name: Jitsi meet web
docker_container:
name: 'jitsi_meet_web'
image: 'jitsi/web:latest'
pull: yes
pull: true
container_default_behavior: no_defaults
published_ports:
- "{{ localhost_ip }}:{{ ports.jitsi_http }}:80"
published_ports: "{{ jitsi_web_published_ports | default(omit) }}"
env:
DISABLE_HTTPS: '1'
PUBLIC_URL: "{{ jitsi_external_url }}"
PUBLIC_URL: "https://{{ jitsi_domain }}"
TZ: "{{ timezone }}"
ENABLE_PREJOIN_PAGE: '1'
ENABLE_REQUIRE_DISPLAY_NAME: '1'
ENABLE_NOISY_MIC_DETECTION: '0'
ENABLE_RECORDING: '0'
ENABLE_BREAKOUT_ROOMS: '1'
JICOFO_AUTH_USER: focus
XMPP_BOSH_URL_BASE: 'http://xmpp.meet.jitsi:5280'
XMPP_DOMAIN: meet.jitsi
XMPP_AUTH_DOMAIN: auth.meet.jitsi
XMPP_MUC_DOMAIN: muc.meet.jitsi
labels: "{{ jitsi_traefik_labels.web | default(omit) }}"
restart_policy: always
networks:
- name: meet.jitsi
aliases:
- meet.jitsi
register: jitsi_meet_web_out
- set_fact:
jitsi_meet_web_config_volume: "{{ jitsi_meet_web_out.container.Mounts | selectattr('Destination', 'equalto', '/config') | join }}"
- name: Disable recording and livestreaming
lineinfile:
path: "{{ jitsi_meet_web_config_volume.Source }}/config.js"
regexp: "^ (\/\/ )?{{ item }}: .*,$"
line: " {{ item }}: false,"
state: present
loop:
- fileRecordingsEnabled
- liveStreamingEnabled
- name: Jitsi meet prosody
docker_container:
name: 'jitsi_meet_prosody'
image: 'jitsi/prosody:latest'
pull: yes
pull: true
container_default_behavior: no_defaults
env:
PUBLIC_URL: "{{ jitsi_external_url }}"
PUBLIC_URL: "https://{{ jitsi_domain }}"
TZ: "{{ timezone }}"
ENABLE_LOBBY: '1'
JICOFO_COMPONENT_SECRET: "{{ jitsi_pw.jicofo_component }}"
ENABLE_BREAKOUT_ROOMS: '1'
JICOFO_AUTH_USER: focus
JICOFO_AUTH_PASSWORD: "{{ jitsi_pw.jicofo_auth }}"
JVB_AUTH_USER: jvb
@@ -63,12 +86,11 @@
docker_container:
name: 'jitsi_meet_jicofo'
image: 'jitsi/jicofo:latest'
pull: yes
pull: true
container_default_behavior: no_defaults
env:
TZ: "{{ timezone }}"
JVB_BREWERY_MUC: jvbbrewery
JICOFO_COMPONENT_SECRET: "{{ jitsi_pw.jicofo_component }}"
JICOFO_AUTH_USER: focus
JICOFO_AUTH_PASSWORD: "{{ jitsi_pw.jicofo_auth }}"
XMPP_DOMAIN: meet.jitsi
@@ -87,13 +109,13 @@
docker_container:
name: 'jitsi_meet_jvb'
image: 'jitsi/jvb:latest'
pull: yes
pull: true
container_default_behavior: no_defaults
published_ports:
- "{{ ports.jitsi_jvb | default(10000) }}:10000/udp"
- "{{ ports.jitsi_jvb_tcp | default(4443) }}:4443"
env:
PUBLIC_URL: "{{ jitsi_external_url }}"
PUBLIC_URL: "https://{{ jitsi_domain }}"
TZ: "{{ timezone }}"
JVB_PORT: '10000'
JVB_TCP_PORT: '4443'
@@ -111,14 +133,3 @@
aliases:
- meet.jitsi
- name: Add caddy reverse proxy config
blockinfile:
path: /etc/caddy/Caddyfile
marker: "# {mark} ANSIBLE MANAGED BLOCK jitsi"
block: |
{{ jitsi_external_url }} {
reverse_proxy http://{{ localhost_ip }}:{{ ports.jitsi_http }}
}
validate: 'caddy validate --config %s --adapter caddyfile'
backup: yes
notify: reload caddy

View File

@@ -0,0 +1,7 @@
---
jitsi_traefik_labels:
web:
traefik.enable: 'true'
traefik.http.routers.jitsi.rule: "Host(`{{ jitsi_domain }}`)"
traefik.http.routers.jitsi.tls.certresolver: 'le'

1
roles/keycloak/README.md Normal file
View File

@@ -0,0 +1 @@
Installs keycloak in docker

View File

@@ -0,0 +1,23 @@
---
dependencies:
- role: container
docker_service: keycloak
docker_image: quay.io/keycloak/keycloak:latest
docker_image_http_port: 8080
docker_database: postgres
docker_entrypoint:
- /opt/keycloak/bin/kc.sh
- start
- --auto-build
docker_env:
KEYCLOAK_ADMIN: admin
KEYCLOAK_ADMIN_PASSWORD: "{{ keycloak_admin_pw }}"
KC_HOSTNAME: "{{ docker_vhost_domains.keycloak[0] }}"
KC_HTTP_ENABLED: "true"
KC_PROXY: edge
KC_DB: postgres
KC_DB_URL: jdbc:postgresql://keycloak_db/keycloak
KC_DB_USERNAME: keycloak
KC_DB_PASSWORD: "{{ database_passwords.keycloak }}"

1
roles/unifi/README.md Normal file
View File

@@ -0,0 +1 @@
Installs unifi controller in docker

14
roles/unifi/meta/main.yml Normal file
View File

@@ -0,0 +1,14 @@
---
dependencies:
- role: container
docker_proxy_target_protocol: https
docker_service: unifi
docker_image: jacobalberty/unifi:latest
docker_network_mode: host
docker_volumes:
- unifi_data:/unifi
docker_env:
UNIFI_HTTPS_PORT: "{{ ports.unifi.https }}"
PORTAL_HTTP_PORT: "8808"

1
roles/wekan/README.md Normal file
View File

@@ -0,0 +1 @@
Installs WeKan in docker

15
roles/wekan/meta/main.yml Normal file
View File

@@ -0,0 +1,15 @@
---
dependencies:
- role: container
docker_service: wekan
docker_image: quay.io/wekan/wekan
docker_image_http_port: 8080
docker_database: mongo
docker_volumes:
- wekan_data:/data
docker_env:
MONGO_URL: mongodb://wekan_db:27017/wekan
ROOT_URL: "https://{{ docker_vhost_domains.wekan[0] }}"
WRITABLE_PATH: /data

View File

@@ -0,0 +1,12 @@
---
- name: Get wekan data volume path from container creation output
set_fact:
wekan_data_volume: "{{ container_out.container.Mounts | selectattr('Destination', 'equalto', '/data') | join }}"
- name: Set wekan data volume owner
file:
path: "{{ wekan_data_volume.Source }}"
state: directory
owner: 999
group: 999