systemd_mounts: diskstation_git: share: diskstation.ducamps.win:/volume2/git mount: /mnt/diskstation/git type: nfs options: - " " automount: true diskstation_CardDav: share: diskstation.ducamps.win:/volume2/CardDav mount: /mnt/diskstation/CardDav type: nfs options: - " " automount: true backup_disk: share: /dev/sdb1 mount: /mnt/backup type: ntfs-3g options: - uid=1024 - guid=100 - vers=3.0 automount: true diskstation_home: share: //diskstation.ducamps.win/homes/admin mount: /mnt/diskstation/home type: cifs options: - credentials=/etc/creds/.diskstation_credentials - uid=http - gid=100 - vers=3.0 automount: true diskstation_photo: share: //diskstation.ducamps.win/photo mount: /mnt/diskstation/photo type: cifs options: - credentials=/etc/creds/.diskstation_credentials - uid=http - gid=100 - vers=3.0 automount: true diskstation_music: share: //diskstation.ducamps.win/music mount: /mnt/diskstation/music type: cifs options: - credentials=/etc/creds/.diskstation_credentials - uid=http - gid=100 - vers=3.0 automount: true diskstation_media: share: //diskstation.ducamps.win/media mount: /mnt/diskstation/media type: cifs options: - credentials=/etc/creds/.diskstation_credentials - uid=http - gid=100 - vers=3.0 automount: true diskstation_ebook: share: //diskstation.ducamps.win/ebook mount: /mnt/diskstation/ebook type: cifs options: - credentials=/etc/creds/.diskstation_credentials - uid=http - gid=100 - vers=3.0 automount: true systemd_mounts_enabled: - diskstation_git - diskstation_music - backup_disk - diskstation_photo - diskstation_home - diskstation_CardDav - diskstation_media - diskstation_ebook credentials_files: 1: type: smb path: /etc/creds/.diskstation_credentials username: admin password: "{{ vault_default_password }}" syncthing_address: "0.0.0.0:8384" syncthing_gui_user: "{{user.name}}" syncthing_gui_password: $2a$10$nJZ8YN/1mB84Cbi79BKka.6SFMAKF.CBwyCNJDA9qUgXdkcuBilx2 notification_mail: "{{ user.mail }}" ssmtp_mailhub: smtp.{{ domain.name }}:587 ssmtp_hostname: "{{ domain.name }}" ssmtp_auth_user: "{{ user.mail }}" ssmtp_auth_pass: "{{ vault_default_password }}" rsynclocations: - name: backup nas location: /mnt/backup readonly: "no" rsynchostalloawed: 192.168.1.10 fail2ban_destmail: "{{ user.mail }}" fail2ban_sendmail: "{{ user.mail }}" Gandi_API_KEYS: "{{ vault_gandi_API_Keys }}" Gandi_Domain: "{{ domain.name }}" Gandi_Record: www certbot_force: false certbot_auto_renew_user: root certbot_create_if_missing: true certbot_cert_name: "{{domain.name}}" certbot_certs: - email: "{{user.mail}}" domains: - www.{{domain.name}} - git.{{domain.name}} - supysonic.{{domain.name}} - syno.{{domain.name}} - file.{{domain.name}} - hass.{{domain.name}} nginx_upstreams: - name: PHP-handler servers: - unix:/var/run/php-fpm/php-fpm.sock nginx_extra_http_options: | proxy_connect_timeout 600s; proxy_send_timeout 600s; proxy_read_timeout 600s; fastcgi_send_timeout 600s; fastcgi_read_timeout 600s; nginx_vhosts: - listen: "80" server_name: "_" filename: "redirect80.conf" state: "present" template: "{{ nginx_vhost_template }}" extra_parameters: | return 301 https://$host; - listen: "443 ssl" server_name: "www.{{domain.name}}" root: "/usr/share/nginx/html/" error_page: "404 /404/404.html" filename: "default.conf" state: "present" template: "{{ nginx_vhost_template }}" extra_parameters: | include /etc/nginx/conf.d/{{domain.name}}.ssl; error_page 500 502 503 504 /50x.html; location = /50x.html { root /usr/share/nginx/html; } location / { rewrite ^/.well-known/carddav /radicale/$remote_user/carddav/ redirect; rewrite ^/.well-known/caldav /radicale/$remote_user/caldav/ redirect; index index.php index.html index.htm ; default_type text/html; } location =/ { rewrite ^ /starter; } location /radicale/ { # The trailing / is important! proxy_pass http://localhost:5232/; # The / is important! proxy_set_header X-Script-Name /radicale; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_pass_header Authorization; } location ~ \.php$ { # try_files $uri =404; fastcgi_split_path_info ^(.+\.php)(/.+)$; fastcgi_pass unix:/run/php-fpm/php-fpm.sock; fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; fastcgi_read_timeout 800; fastcgi_index index.php; include fastcgi_params; } include /etc/nginx/conf.d/*.default; - listen: "443 ssl" server_name: "git.{{domain.name}}" filename: "gitea.conf" state: "present" template: "{{ nginx_vhost_template }}" extra_parameters: | include /etc/nginx/conf.d/{{domain.name}}.ssl; location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-Host $host:$server_port; proxy_set_header X-Forwarded-Server $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; proxy_pass http://localhost:3000; } - listen: "443 ssl" server_name: "syno.{{domain.name}}" filename: "syno.conf" state: "present" template: "{{ nginx_vhost_template }}" extra_parameters: | include /etc/nginx/conf.d/{{domain.name}}.ssl; location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-Host $host:$server_port; proxy_set_header X-Forwarded-Server $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; proxy_pass http://192.168.1.10:5000; } - listen: "443 ssl" server_name: "supysonic.{{domain.name}}" filename: "supysonic.conf" state: "present" template: "{{ nginx_vhost_template }}" extra_parameters: | include /etc/nginx/conf.d/{{domain.name}}.ssl; location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-Host $host:$server_port; proxy_set_header X-Forwarded-Server $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; proxy_pass http://localhost:8001; } - listen: "443 ssl" server_name: "file.{{domain.name}}" filename: "nextcloud.conf" state: "present" template: "{{ nginx_vhost_template }}" extra_parameters: | include /etc/nginx/conf.d/{{domain.name}}.ssl; add_header X-Content-Type-Options nosniff; add_header X-XSS-Protection "1; mode=block"; add_header X-Robots-Tag none; add_header X-Download-Options noopen; add_header X-Permitted-Cross-Domain-Policies none; # Path to the root of your installation root /usr/share/webapps/nextcloud/; location = /robots.txt { allow all; log_not_found off; access_log off; } # The following 2 rules are only needed for the user_webfinger app. # Uncomment it if you're planning to use this app. #rewrite ^/.well-known/host-meta /public.php?service=host-meta last; #rewrite ^/.well-known/host-meta.json /public.php?service=host-meta-json # last; location = /.well-known/carddav { return 301 $scheme://$host/remote.php/dav; } location = /.well-known/caldav { return 301 $scheme://$host/remote.php/dav; } # set max upload size client_max_body_size 512M; fastcgi_buffers 64 4K; # Enable gzip but do not remove ETag headers gzip on; gzip_vary on; gzip_comp_level 4; gzip_min_length 256; gzip_proxied expired no-cache no-store private no_last_modified no_etag auth; gzip_types application/atom+xml application/javascript application/json application/ld+json application/manifest+json application/rss+xml application/vnd.geo+json application/vnd.ms-fontobject application/x-font-ttf application/x-web-app-manifest+json application/xhtml+xml application/xml font/opentype image/bmp image/svg+xml image/x-icon text/cache-manifest text/css text/plain text/vcard text/vnd.rim.location.xloc text/vtt text/x-component text/x-cross-domain-policy; # Uncomment if your server is build with the ngx_pagespeed module # This module is currently not supported. #pagespeed off; location / { rewrite ^ /index.php$request_uri; } location ~ ^/(?:build|tests|config|lib|3rdparty|templates|data)/ { deny all; } location ~ ^/(?:\.|autotest|occ|issue|indie|db_|console) { deny all; } location ~ ^/(?:index|remote|public|cron|core/ajax/update|status|ocs/v[12]|updater/.+|ocs-provider/.+)\.php(?:$|/) { fastcgi_split_path_info ^(.+?\.php)(/.*)$; include fastcgi_params; fastcgi_param SCRIPT_FILENAME $document_root$fastcgi_script_name; fastcgi_param PATH_INFO $fastcgi_path_info; #fastcgi_param HTTPS on; #Avoid sending the security headers twice fastcgi_param modHeadersAvailable true; fastcgi_param front_controller_active true; fastcgi_pass php-handler; fastcgi_intercept_errors on; fastcgi_request_buffering off; } location ~ ^/(?:updater|ocs-provider)(?:$|/) { try_files $uri/ =404; index index.php; } # Adding the cache control header for js and css files # Make sure it is BELOW the PHP block location ~ \.(?:css|js|woff|svg|gif)$ { try_files $uri /index.php$request_uri; add_header Cache-Control "public, max-age=15778463"; # Add headers to serve security related headers (It is intended to # have those duplicated to the ones above) # Before enabling Strict-Transport-Security headers please read into # this topic first. # add_header Strict-Transport-Security "max-age=15768000; includeSubDomains; preload;"; # # WARNING: Only add the preload option once you read about # the consequences in https://hstspreload.org/. This option # will add the domain to a hardcoded list that is shipped # in all major browsers and getting removed from this list # could take several months. add_header X-Content-Type-Options nosniff; add_header X-XSS-Protection "1; mode=block"; add_header X-Robots-Tag none; add_header X-Download-Options noopen; add_header X-Permitted-Cross-Domain-Policies none; # Optional: Don't log access to assets access_log off; } location ~ \.(?:png|html|ttf|ico|jpg|jpeg)$ { try_files $uri /index.php$request_uri; # Optional: Don't log access to other assets access_log off; } - listen: "443 ssl" server_name: "hass.{{domain.name}}" filename: "hass.conf" state: "present" template: "{{ nginx_vhost_template }}" extra_parameters: | include /etc/nginx/conf.d/{{domain.name}}.ssl; location / { proxy_set_header Host $host; proxy_set_header X-Real-IP $remote_addr; proxy_set_header X-Forwarded-Host $host:$server_port; proxy_set_header X-Forwarded-Server $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; proxy_pass http://localhost:8123; } location /api/websocket { proxy_pass http://localhost:8123/api/websocket; proxy_set_header Host $host; proxy_http_version 1.1; proxy_set_header Upgrade $http_upgrade; proxy_set_header Connection "upgrade"; } nginx_realIP_Proxy: 192.168.1.40/24 PHP_ReadWritePaths: - /usr/share/webapps/nextcloud/apps - /etc/webapps/nextcloud/config - /var/nextcloud - /mnt/diskstation php_memory_limit: 512M #need for nextcloud be carefull on low memory device php_extention_enable: - iconv - mysqli - pdo_mysql - soap - intl - gd #need for nextcloud mysql_root_password: "{{ vault_mysql_root }}" mysql_root_password_update: true # Users. mysql_users: - name: dump host: localhost password: "{{ vault_mysql_dump }}" priv: "*.*:SELECT,SHOW DATABASES,LOCK TABLES" ttrss_db_password: "{{ vault_mysql_ttrss }}" ttrss_log_destination: "" ttrss_SQl_target_file: /mnt/diskstation/git/backup/mysql/last/ttrss.sql ttrss_url_path: "https://www.{{domain.name}}/tt-rss" bind_listen_ipv4: ['any'] bind_allow_query: ['any'] bind_zone_master_server_ip: 192.168.1.10 bind_zone_domains: - name: ducamps.win hostmaster_email: "vincent@ducamps.win" - name: 1.168.192.in-addr.arpa hostmaster_email: "vincent@ducamps.win" bind_forwarders: - '1.1.1.1' - '80.67.169.40' bind_recursion: true bind_allow_recursion: - "192.168.1.0/24" gitea_http_listen: 0.0.0.0 gitea_db_type: mysql gitea_db_host: localhost:3306 gitea_db_name: gitea gitea_db_user: gitea gitea_db_password: "{{ vault_mysql_gitea }}" gitea_ssh_domain: git.{{ domain.name }} gitea_start_ssh: false gitea_ssh_port: 22 gitea_SQl_target_file: /mnt/diskstation/git/backup/mysql/last/gitea.sql gitea_http_domain: git.{{domain.name}} gitea_root_url: https://git.{{domain.name}} supysonic_db_password: "{{ vault_mysql_supysonic }}" supysonic_SQl_target_file: /mnt/diskstation/git/backup/mysql/last/supysonic.sql supysonic_force_site_update: true docker_users: "{{user.name}}" hass_SQl_target_file: /mnt/diskstation/git/backup/mysql/last/hass.sql hass_db_password: "{{ vault_mysql_hass }}" hass_repo: "gitea@git.{{ domain.name }}:vincent/HASS_conf.git" hass_users: "{{user.name}}" nextcloud_db_password: "{{ vault_mysql_nextcloud }}" nextcloud_admin_password: "{{ vault_default_password }}" nextcloud_admin_user: "{{user.name}}" nextcloud_trusted_domains: - localhost - file.ducamps.win nextcloud_config_options: # additional options to set in config.php - option: overwrite.cli.url value: "'https://file.ducamps.win'" - option: maintenance value: "false" - option: loglevel value: "2" samba_shares: - name: hassconfig path: /var/lib/hass read_only: no writable: yes directory_mode: 770 owner: hass group: hass write_list: "{{user.name}}" samba_users: - name: "{{user.name}}" password: "{{ vault_default_password }}" keystodeploy: - name: fixe-pc sshkey: ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDfJj3fN0PK7ELn82wOZwL1JncL5prlM1kHVpmVJzhrrXF5ITzlqnaNaYLIpJVD5enbl7uJm0n1DNG58MKkW5ILyFIV9zKlW4AJ4q+sQC2MqcSNkkXXdnxGf/9TuF83zMZ2Ex43dxtURIjXPVBgy963BPdBGLepbDJATFe+GiUAJMwEm3A5DTT5Bo7Oh1mjZkuFn6fWsUK0uZr4oi7ZkZFRcHTy9fVKG2XWWOAobFw7WjwP3F4IY9FWwU4TjeHv+gc9xQzRDtfWN/P4yTsALYvqqDrYxBplOyqtz8Hkd4prujVFt4KA60P4KbwsR/nCHFTcFSSvdUldlfVdSD95n8Vb - name: juicessh with password sshkey: ecdsa-sha2-nistp384 AAAAE2VjZHNhLXNoYTItbmlzdHAzODQAAAAIbmlzdHAzODQAAABhBAGEZxSjFEw/CwouzhEaaOOSCKms1hc1a0yf8tsxOfnyaazzmThIeYMJDlMf8lXdZzPDZd6wqZC/qb+H2zppIcvU0PJZYrwiPcr8u3ul24YGZ4dV79wC2DmqDY0YuN51jQ== juicewithpassword - name: fixe-pc new sshkey: ssh-rsa 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 vincent@fixe-pc-2020-03-01