chef-recipes/containers/nextcloud/tasks.yml

256 lines
8.1 KiB
YAML

# code: language=ansible
---
- hosts: all
name: Nextcloud file sharing web service
tasks:
- name: Stop running containers
become_user: containers
become: true
ansible.builtin.systemd:
scope: user
name: container-{{ item }}.service
state: stopped
loop:
- nextcloud
- redis_nextcloud
- db_nextcloud
failed_when: false
- name: Pull container images
become_user: containers
become: true
containers.podman.podman_image:
name: docker.io/{{ item }}
loop:
- nextcloud:latest
- redis:alpine
- mariadb:latest
- name: Create podman volumes
containers.podman.podman_volume:
state: present
name: "{{ item }}"
become_user: containers
become: true
loop:
- nextcloud-html
- nextcloud-custom_apps
- nextcloud-theme
- nextcloud-data
- nextcloud-config
- redis-data
- nextcloud-db
- name: Change permission to nextcloud folder
become: true
ansible.builtin.file:
path: /etc/nextcloud
owner: containers
group: containers
mode: "0700"
state: directory
- name: Copy nextcloud config directory
become: true
ansible.builtin.copy:
src: files/nextcloud/
dest: /etc/nextcloud/config/
owner: containers
group: containers
mode: "0600"
- name: Copy systemd service and timer
become: true
become_user: containers
ansible.builtin.copy:
src: files/systemd/
dest: "/home/containers/.config/systemd/user/"
owner: containers
group: containers
mode: "0644"
- name: Copy mariadb config directory
become: true
ansible.builtin.copy:
src: files/mariadb/
dest: /etc/nextcloud/mariadb/
owner: containers
group: containers
mode: "0600"
- name: Create podman networks
containers.podman.podman_network:
name: "{{ item }}"
recreate: false
state: "present"
become_user: containers
become: true
loop:
- traefik-nextcloud
- mariadb-nextcloud
- redis-nextcloud
- nextcloud-collabora
- name: Create redis instance
become_user: containers
become: true
containers.podman.podman_container:
name: redis_nextcloud
image: docker.io/redis:latest
state: present
volume:
- redis-data:/data:Z
network:
- redis-nextcloud
generate_systemd:
path: /home/containers/.config/systemd/user/
restart_policy: on-failure
names: true
new: true
- name: Create mariadb instance
become_user: containers
become: true
containers.podman.podman_container:
name: db_nextcloud
image: docker.io/mariadb:latest
state: present
command:
- "--transaction-isolation=READ-COMMITTED"
- "--binlog-format=ROW"
volume:
- nextcloud-db:/var/lib/mysql:Z
- /etc/nextcloud/mariadb/:/etc/mysql/conf.d:Z
network:
- mariadb-nextcloud
env:
MARIADB_ROOT_PASSWORD: "{{ vault_nextcloud_mariadb_root_password }}"
MARIADB_DATABASE: "{{ vault_nextcloud_mariadb_database }}"
MARIADB_USER: "{{ vault_nextcloud_mariadb_user }}"
MARIADB_PASSWORD: "{{ vault_nextcloud_mariadb_password }}"
MARIADB_AUTO_UPGRADE: "true"
generate_systemd:
path: /home/containers/.config/systemd/user/
restart_policy: on-failure
names: true
new: true
- name: Create nextcloud instance
become_user: containers
become: true
containers.podman.podman_container:
name: nextcloud
image: docker.io/nextcloud:latest
state: present
volume:
- nextcloud-html:/var/www/html:Z
- nextcloud-custom_apps:/var/www/html/custom_apps:Z
- nextcloud-theme:/var/www/html/themes:Z
- nextcloud-data:/var/www/html/data:Z
- nextcloud-config:/var/www/html/config:Z
network:
- traefik-nextcloud
- mariadb-nextcloud
- redis-nextcloud
- nextcloud-collabora
label:
io.containers.autoupdate: "registry"
traefik.enable: "true"
traefik.http.routers.nextcloud.entrypoints: "https"
traefik.http.routers.nextcloud.rule: "Host(`{{ vault_domain }}`) && (PathPrefix(`/cloud/`) || Path(`/cloud`))"
traefik.http.routers.nextcloud.tls: "true"
traefik.http.routers.nextcloud.tls.certresolver: "wildcard"
traefik.http.routers.nextcloud.service: "nextcloud"
traefik.http.routers.nextcloud.middlewares: "force-trailing-slash@file,nextcloud-prefixstrip,nextcloud-redirectregex,nextcloud-headers,http-compress@file"
traefik.http.middlewares.nextcloud-redirectregex.redirectRegex.permanent: "true"
traefik.http.middlewares.nextcloud-redirectregex.redirectRegex.regex: "https://(.*)/.well-known/(card|cal)dav"
traefik.http.middlewares.nextcloud-redirectregex.redirectRegex.replacement: "https://${1}/remote.php/dav/"
traefik.http.middlewares.nextcloud-headers.headers.stsSeconds: "31536000"
traefik.http.middlewares.nextcloud-headers.headers.stsIncludeSubdomains: "true"
traefik.http.middlewares.nextcloud-prefixstrip.stripprefix.prefixes: "/cloud"
traefik.http.services.nextcloud.loadbalancer.server.port: "80"
traefik.docker.network: "traefik-nextcloud"
env:
REDIS_HOST: "redis_nextcloud"
REDIS_PORT: "6379"
MYSQL_DATABASE: "{{ vault_nextcloud_mariadb_database }}"
MYSQL_USER: "{{ vault_nextcloud_mariadb_user }}"
MYSQL_PASSWORD: "{{ vault_nextcloud_mariadb_password }}"
MYSQL_HOST: "db_nextcloud"
NEXTCLOUD_DATA_DIR: "/var/www/html/data"
SMTP_HOST: "{{ vault_smtp_host }}"
SMTP_SECURE: "{{ vault_smtp_protocol }}"
SMTP_PORT: "{{ vault_smtp_port }}"
SMTP_AUTHTYPE: "None"
SMTP_NAME: "{{ vault_smtp_auth_name }}"
SMTP_PASSWORD: "{{ vault_smtp_password }}"
MAIL_FROM_ADDRESS: "{{ vault_smtp_from }}"
MAIL_DOMAIN: "{{ vault_smtp_domain }}"
TRUSTED_PROXIES: "traefik"
OVERWRITEWEBROOT: "/cloud"
OVERWRITECLIURL: "https://{{ vault_domain }}/cloud"
OVERWRITEPROTOCOL: "https"
generate_systemd:
path: /home/containers/.config/systemd/user/
restart_policy: on-failure
requires: [container-db_nextcloud.service, container-redis_nextcloud.service]
names: true
new: true
- name: Change start timeout limit
become_user: containers
become: true
community.general.ini_file:
path: "/home/containers/.config/systemd/user/container-{{ item }}.service"
section: Service
option: TimeoutStartSec
value: 3600
mode: "0664"
state: "present"
no_extra_spaces: true
loop:
- nextcloud
- redis_nextcloud
- db_nextcloud
- name: Change stop timeout limit
become_user: containers
become: true
community.general.ini_file:
path: "/home/containers/.config/systemd/user/container-{{ item }}.service"
section: Service
option: TimeoutStopSec
value: 3600
mode: "0664"
state: "present"
no_extra_spaces: true
loop:
- nextcloud
- redis_nextcloud
- db_nextcloud
- name: Start containers at boot
become_user: containers
become: true
ansible.builtin.systemd:
scope: user
name: container-{{ item }}.service
enabled: true
state: started
daemon_reload: true
loop:
- nextcloud
- redis_nextcloud
- db_nextcloud
- name: Enable a timer unit
become: true
become_user: containers
ansible.builtin.systemd:
scope: user
name: nextcloudcron.timer
enabled: true
state: started
daemon_reload: true