Update yamllint

This commit is contained in:
Jake Howard
2020-06-18 20:49:12 +01:00
parent 9f59b30f1e
commit f878866f10
20 changed files with 90 additions and 90 deletions

View File

@ -12,6 +12,6 @@ services:
- ./config:/config
- /srv/nextcloud-data/data/jake/files/EBooks:/books:ro
labels:
- "traefik.enable=true"
- "traefik.http.routers.calibre.rule=Host(`calibre.jakehoward.tech`)"
- "traefik.http.routers.calibre.tls.certresolver=le"
- traefik.enable=true
- traefik.http.routers.calibre.rule=Host(`calibre.jakehoward.tech`)
- traefik.http.routers.calibre.tls.certresolver=le

View File

@ -16,6 +16,6 @@ services:
- 8096:8096
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.emby.rule=Host(`media.jakehoward.tech`)"
- "traefik.http.routers.emby.tls.certresolver=le"
- traefik.enable=true
- traefik.http.routers.emby.rule=Host(`media.jakehoward.tech`)
- traefik.http.routers.emby.tls.certresolver=le

View File

@ -9,10 +9,10 @@ services:
- USER_UID={{ docker_user.id }}
- USER_GID={{ docker_user.id }}
labels:
- "traefik.enable=true"
- "traefik.http.routers.gitea.rule=(Host(`git.theorangeone.net`) || Host(`git.0rng.one`))"
- "traefik.http.routers.gitea.tls.certresolver=le"
- "traefik.http.services.gitea-gitea.loadbalancer.server.port=3000"
- traefik.enable=true
- traefik.http.routers.gitea.rule=(Host(`git.theorangeone.net`) || Host(`git.0rng.one`))
- traefik.http.routers.gitea.tls.certresolver=le
- traefik.http.services.gitea-gitea.loadbalancer.server.port=3000
ports:
- "{{ wireguard.clients.intersect.ip }}:3022:3022"
volumes:

View File

@ -9,6 +9,6 @@ services:
- ./data:/app/data
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.gotify.rule=Host(`gotify.jakehoward.tech`)"
- "traefik.http.routers.gotify.tls.certresolver=le"
- traefik.enable=true
- traefik.http.routers.gotify.rule=Host(`gotify.jakehoward.tech`)
- traefik.http.routers.gotify.tls.certresolver=le

View File

@ -11,8 +11,8 @@ services:
- 33377:80
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.librespeed.rule=Host(`speed.jakehoward.tech`)"
- "traefik.http.routers.librespeed.tls.certresolver=le"
- "traefik.http.routers.librespeed.middlewares=librespeed-auth@docker"
- "traefik.http.middlewares.librespeed-auth.basicauth.users={{ librespeed_basicauth }}"
- traefik.enable=true
- traefik.http.routers.librespeed.rule=Host(`speed.jakehoward.tech`)
- traefik.http.routers.librespeed.tls.certresolver=le
- traefik.http.routers.librespeed.middlewares=librespeed-auth@docker
- traefik.http.middlewares.librespeed-auth.basicauth.users={{ librespeed_basicauth }}

View File

@ -18,13 +18,13 @@ services:
tmpfs:
- /config/log
labels:
- "traefik.enable=true"
- "traefik.http.routers.nextcloud.rule=Host(`intersect.jakehoward.tech`)"
- "traefik.http.routers.nextcloud.tls.certresolver=le"
- "traefik.http.services.nextcloud-nextcloud.loadbalancer.server.port=443"
- "traefik.http.services.nextcloud-nextcloud.loadbalancer.server.scheme=https"
- "traefik.http.middlewares.nextcloud-hsts.headers.stsseconds=15552000"
- "traefik.http.routers.nextcloud.middlewares=nextcloud-hsts@docker"
- traefik.enable=true
- traefik.http.routers.nextcloud.rule=Host(`intersect.jakehoward.tech`)
- traefik.http.routers.nextcloud.tls.certresolver=le
- traefik.http.services.nextcloud-nextcloud.loadbalancer.server.port=443
- traefik.http.services.nextcloud-nextcloud.loadbalancer.server.scheme=https
- traefik.http.middlewares.nextcloud-hsts.headers.stsseconds=15552000
- traefik.http.routers.nextcloud.middlewares=nextcloud-hsts@docker
db:
image: postgres:12-alpine
@ -63,9 +63,9 @@ services:
cap_add:
- MKNOD
environment:
- "domain=intersect\\.jakehoward\\.tech"
- domain=intersect\\.jakehoward\\.tech
labels:
- "traefik.enable=true"
- "traefik.http.routers.collabora.rule=Host(`collabora.jakehoward.tech`)"
- "traefik.http.routers.collabora.tls.certresolver=le"
- "traefik.http.services.collabora-nextcloud.loadbalancer.server.scheme=https"
- traefik.enable=true
- traefik.http.routers.collabora.rule=Host(`collabora.jakehoward.tech`)
- traefik.http.routers.collabora.tls.certresolver=le
- traefik.http.services.collabora-nextcloud.loadbalancer.server.scheme=https

View File

@ -15,8 +15,8 @@ services:
- ./dnsmasq.d/:/etc/dnsmasq.d/
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.pihole.rule=Host(`pihole.jakehoward.tech`)"
- "traefik.http.routers.pihole.tls.certresolver=le"
- "traefik.http.routers.pihole.middlewares=internal-only@file"
- "traefik.http.services.pihole-pihole.loadbalancer.server.port=80"
- traefik.enable=true
- traefik.http.routers.pihole.rule=Host(`pihole.jakehoward.tech`)
- traefik.http.routers.pihole.tls.certresolver=le
- traefik.http.routers.pihole.middlewares=internal-only@file
- traefik.http.services.pihole-pihole.loadbalancer.server.port=80

View File

@ -16,10 +16,10 @@ services:
expose:
- 8008
labels:
- "traefik.enable=true"
- "traefik.http.routers.synapse.rule=Host(`matrix.jakehoward.tech`)"
- "traefik.http.routers.synapse.tls.certresolver=le"
- "traefik.http.routers.synapse.entrypoints=web-secure,matrix"
- traefik.enable=true
- traefik.http.routers.synapse.rule=Host(`matrix.jakehoward.tech`)
- traefik.http.routers.synapse.tls.certresolver=le
- traefik.http.routers.synapse.entrypoints=web-secure,matrix
db:
image: postgres:12-alpine

View File

@ -108,15 +108,15 @@ pid_file: /data/homeserver.pid
# listed here, since they correspond to unroutable addresses.)
#
federation_ip_range_blacklist:
- '127.0.0.0/8'
- '10.0.0.0/8'
- '172.16.0.0/12'
- '192.168.0.0/16'
- '100.64.0.0/10'
- '169.254.0.0/16'
- '::1/128'
- 'fe80::/64'
- 'fc00::/7'
- 127.0.0.0/8
- 10.0.0.0/8
- 172.16.0.0/12
- 192.168.0.0/16
- 100.64.0.0/10
- 169.254.0.0/16
- ::1/128
- fe80::/64
- fc00::/7
# List of ports that Synapse should listen on, their purpose and their
# configuration.
@ -469,7 +469,7 @@ acme:
# Again, you may want to change this if you are forwarding connections
# through Apache/Nginx/etc.
#
bind_addresses: ['::', '0.0.0.0']
bind_addresses: ["::", 0.0.0.0]
# How many days remaining on a certificate before it is renewed.
#
reprovision_threshold: 30

View File

@ -15,10 +15,10 @@ services:
- 8112:8112
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.deluge.rule=Host(`deluge.jakehoward.tech`)"
- "traefik.http.routers.deluge.tls.certresolver=le"
- "traefik.http.routers.deluge.middlewares=internal-only@file"
- traefik.enable=true
- traefik.http.routers.deluge.rule=Host(`deluge.jakehoward.tech`)
- traefik.http.routers.deluge.tls.certresolver=le
- traefik.http.routers.deluge.middlewares=internal-only@file
tor-socks-proxy:
image: peterdavehello/tor-socks-proxy:latest

View File

@ -12,9 +12,9 @@ services:
- ./config:/config
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.tt-rss.rule=Host(`tt-rss.jakehoward.tech`)"
- "traefik.http.routers.tt-rss.tls.certresolver=le"
- traefik.enable=true
- traefik.http.routers.tt-rss.rule=Host(`tt-rss.jakehoward.tech`)
- traefik.http.routers.tt-rss.tls.certresolver=le
db:
image: postgres:12-alpine

View File

@ -12,9 +12,9 @@ services:
- ./data:/var/www/wallabag/data
- ./images:/var/www/wallabag/images
labels:
- "traefik.enable=true"
- "traefik.http.routers.wallabag.rule=Host(`wallabag.jakehoward.tech`)"
- "traefik.http.routers.wallabag.tls.certresolver=le"
- traefik.enable=true
- traefik.http.routers.wallabag.rule=Host(`wallabag.jakehoward.tech`)
- traefik.http.routers.wallabag.tls.certresolver=le
redis:
image: redis:6-alpine

View File

@ -6,6 +6,6 @@ services:
container_name: web-rng
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.web-rng.rule=Host(`rng.theorangeone.net`)"
- "traefik.http.routers.web-rng.tls.certresolver=le"
- traefik.enable=true
- traefik.http.routers.web-rng.rule=Host(`rng.theorangeone.net`)
- traefik.http.routers.web-rng.tls.certresolver=le

View File

@ -6,6 +6,6 @@ services:
container_name: whoami
restart: unless-stopped
labels:
- "traefik.enable=true"
- "traefik.http.routers.whoami.rule=Host(`whoami.theorangeone.net`) || Host(`who.0rng.one`)"
- "traefik.http.routers.whoami.tls.certresolver=le"
- traefik.enable=true
- traefik.http.routers.whoami.rule=Host(`whoami.theorangeone.net`) || Host(`who.0rng.one`)
- traefik.http.routers.whoami.tls.certresolver=le