added photopsirm cloud and other fixes

This commit is contained in:
Bastian de Byl
2022-09-28 00:49:14 -04:00
parent b0ca89c2c6
commit 99a41d2a74
12 changed files with 197 additions and 3 deletions

View File

@@ -6,3 +6,4 @@
- role: common
- role: git
- role: podman
- role: ssl

View File

@@ -5,6 +5,7 @@ graylog_path: "{{ podman_volumes }}/graylog"
hass_path: "{{ podman_volumes }}/hass"
nginx_path: "{{ podman_volumes }}/nginx"
partkeepr_path: "{{ podman_volumes }}/partkeepr"
cloud_path: "{{ podman_volumes }}/cloud"
pihole_path: "{{ podman_volumes }}/pihole"
drone_server_proto: "https"
@@ -15,6 +16,7 @@ ci_server_name: ci.bdebyl.net
pi_server_name: pi.bdebyl.net
assistant_server_name: assistant.bdebyl.net
bookstack_server_name: wiki.skudakrennsport.com
cloud_server_name: cloud.bdebyl.net
home_server_name: home.bdebyl.net
parts_server_name: parts.bdebyl.net
video_server_name: video.bdebyl.net

View File

@@ -1,4 +1,3 @@
---
dependencies:
- role: common
- role: ssl

View File

@@ -68,6 +68,7 @@
- "{{ bookstack_server_name }}.conf"
- "{{ video_server_name }}.conf"
- "{{ parts_server_name }}.conf"
- "{{ cloud_server_name }}.conf"
- "{{ logs_server_name }}.conf"
notify:
- restorecon podman
@@ -86,6 +87,7 @@
- "{{ ci_server_name }}.http.conf"
- "{{ pi_server_name }}.conf"
- "{{ parts_server_name }}.conf"
- "{{ cloud_server_name }}.conf"
- "{{ home_server_name }}.conf"
- "{{ assistant_server_name }}.conf"
- "{{ bookstack_server_name }}.conf"

View File

@@ -36,6 +36,7 @@
loop:
- "{{ ci_server_name }}.https.conf"
- "{{ parts_server_name }}.https.conf"
- "{{ cloud_server_name }}.https.conf"
- "{{ bookstack_server_name }}.https.conf"
notify:
- restorecon podman
@@ -53,6 +54,7 @@
loop:
- "{{ ci_server_name }}.https.conf"
- "{{ parts_server_name }}.https.conf"
- "{{ cloud_server_name }}.https.conf"
- "{{ bookstack_server_name }}.https.conf"
notify:
- restorecon podman

View File

@@ -0,0 +1,108 @@
---
- name: create required cloud volumes
become: true
ansible.builtin.file:
path: "{{ item }}"
state: directory
owner: "{{ podman_subuid.stdout }}"
group: "{{ podman_user }}"
mode: 0755
notify: restorecon podman
loop:
- "{{ cloud_path }}/mysql"
- "{{ cloud_path }}/storage"
tags: cloud
- name: flush handlers
ansible.builtin.meta: flush_handlers
tags: cloud
- name: mount cloud cifs
become: true
ansible.posix.mount:
src: "{{ cloud_cifs_src }}"
path: "{{ cloud_path }}/storage"
fstype: cifs
opts: "username=cloud,password={{ cloud_cifs_pass }},uid={{ podman_subuid.stdout }},gid={{ podman_subuid.stdout }}"
state: mounted
tags: cloud
- name: create cloud-db container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: cloud-db
image: docker.io/mariadb:10.8
recreate: false
restart: false
restart_policy: on-failure
log_driver: journald
network:
- shared
env:
MARIADB_AUTO_UPGRADE: "1"
MYSQL_RANDOM_ROOT_PASSWORD: "yes"
MYSQL_DATABASE: cloud
MYSQL_USER: cloud
MYSQL_PASSWORD: "{{ cloud_db_pass }}"
volumes:
- "{{ cloud_path }}/mysql:/var/lib/mysql"
tags: cloud
- name: create systemd startup job for cloud-db
include_tasks: systemd-generate.yml
vars:
container_name: cloud-db
tags: cloud
- name: create cloud container
become: true
become_user: "{{ podman_user }}"
containers.podman.podman_container:
name: cloud
image: docker.io/photoprism/photoprism:220901-bookworm
recreate: false
restart: false
restart_policy: on-failure
log_driver: journald
network:
- shared
env:
PHOTOPRISM_ADMIN_PASSWORD: "{{ cloud_user_pass }}"
PHOTOPRISM_AUTH_MODE: "password"
PHOTOPRISM_SITE_URL: "http://localhost:2342/"
PHOTOPRISM_ORIGINALS_LIMIT: 5000
PHOTOPRISM_HTTP_COMPRESSION: "gzip"
PHOTOPRISM_LOG_LEVEL: "info"
PHOTOPRISM_READONLY: "false"
PHOTOPRISM_EXPERIMENTAL: "false"
PHOTOPRISM_DISABLE_CHOWN: "false"
PHOTOPRISM_DISABLE_WEBDAV: "false"
PHOTOPRISM_DISABLE_SETTINGS: "false"
PHOTOPRISM_DISABLE_TENSORFLOW: "false"
PHOTOPRISM_DISABLE_FACES: "false"
PHOTOPRISM_DISABLE_CLASSIFICATION: "false"
PHOTOPRISM_DISABLE_RAW: "false"
PHOTOPRISM_RAW_PRESETS: "false"
PHOTOPRISM_JPEG_QUALITY: 85
PHOTOPRISM_DETECT_NSFW: "false"
PHOTOPRISM_UPLOAD_NSFW: "true"
PHOTOPRISM_DATABASE_DRIVER: "mysql"
PHOTOPRISM_DATABASE_SERVER: "cloud-db:3306"
PHOTOPRISM_DATABASE_NAME: "cloud"
PHOTOPRISM_DATABASE_USER: "cloud"
PHOTOPRISM_DATABASE_PASSWORD: "{{ cloud_db_pass }}"
PHOTOPRISM_SITE_CAPTION: "AI-Powered Photos App"
PHOTOPRISM_SITE_DESCRIPTION: ""
PHOTOPRISM_SITE_AUTHOR: "Bastian D."
volumes:
- "{{ cloud_path }}/storage:/photoprism/"
ports:
- "8088:2342"
tags: cloud
- name: create systemd startup job for cloud
include_tasks: systemd-generate.yml
vars:
container_name: cloud
tags: cloud

View File

@@ -9,4 +9,5 @@
- import_tasks: container-graylog.yml
- import_tasks: container-pihole.yml
- import_tasks: container-bookstack.yml
- import_tasks: container-cloud.yml
- import_tasks: container-nginx.yml

View File

@@ -60,6 +60,16 @@
- podman
- selinux
- name: selinux allow podman samba
become: true
ansible.posix.seboolean:
name: virt_use_samba
state: true
persistent: true
tags:
- podman
- selinux
- name: create podman system directories
become: true
become_user: "{{ podman_user }}"

View File

@@ -0,0 +1,21 @@
geo $whitelisted {
default 0;
192.168.1.0/24 1;
}
server {
modsecurity on;
modsecurity_rules_file /etc/nginx/modsec_includes.conf;
listen 80;
server_name {{ cloud_server_name }};
location '/.well-known/acme-challenge' {
default_type "text/plain";
root /srv/http/letsencrypt;
}
location / {
return 302 https://$host$request_uri;
}
}

View File

@@ -0,0 +1,47 @@
geo $whitelisted {
default 0;
192.168.1.0/24 1;
}
upstream cloud {
server 127.0.0.1:8088;
}
server {
modsecurity on;
modsecurity_rules_file /etc/nginx/modsec_includes.conf;
resolver 127.0.0.1 127.0.0.53 9.9.9.9 valid=60s;
listen 443 ssl http2;
server_name {{ cloud_server_name }};
client_max_body_size 500M;
ssl_certificate /etc/letsencrypt/live/{{ cloud_server_name }}/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/{{ cloud_server_name }}/privkey.pem;
ssl_trusted_certificate /etc/letsencrypt/live/{{ cloud_server_name }}/fullchain.pem;
ssl_dhparam /etc/nginx/ssl/dhparam.pem;
ssl_ciphers ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384;
ssl_prefer_server_ciphers off;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_session_cache shared:SSL:10m;
ssl_session_tickets off;
ssl_session_timeout 1d;
ssl_stapling on;
ssl_stapling_verify on;
location / {
add_header Referrer-Policy "same-origin" always;
# add_header Strict-Transport-Security "max-age=630720000; includeSubDomains" always;
add_header X-Content-Type-Options "nosniff" always;
proxy_set_header Host $http_host;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header Upgrade $http_upgrade;
proxy_buffering off;
proxy_http_version 1.1;
proxy_pass http://cloud;
}
}

View File

@@ -8,9 +8,10 @@
args:
creates: "/etc/letsencrypt/live/{{ item }}"
loop:
- "{{ ci_server_name }}"
- "{{ parts_server_name }}"
- "{{ bookstack_server_name }}"
- "{{ ci_server_name }}"
- "{{ cloud_server_name }}"
- "{{ parts_server_name }}"
tags: ssl
- name: set group ownership for /etc/letsencrypt/

Binary file not shown.