ConfigLMM 0.3.0 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (250) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +70 -0
  3. data/CNAME +1 -0
  4. data/Examples/.lmm.state.yaml +159 -0
  5. data/Examples/ConfigLMM.mm.yaml +32 -0
  6. data/Examples/Implemented.mm.yaml +252 -4
  7. data/Examples/SmallBusiness.mm.yaml +492 -0
  8. data/Plugins/Apps/Answer/answer.lmm.rb +165 -0
  9. data/Plugins/Apps/Answer/answer@.service +40 -0
  10. data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.conf.erb +0 -3
  11. data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.lmm.rb +0 -1
  12. data/Plugins/Apps/Authentik/Authentik-ProxyOutpost.container +20 -0
  13. data/Plugins/Apps/Authentik/Authentik-Server.container +7 -1
  14. data/Plugins/Apps/Authentik/Authentik-Worker.container +7 -1
  15. data/Plugins/Apps/Authentik/Authentik.conf.erb +18 -6
  16. data/Plugins/Apps/Authentik/Authentik.lmm.rb +232 -45
  17. data/Plugins/Apps/BookStack/BookStack.conf.erb +38 -0
  18. data/Plugins/Apps/BookStack/BookStack.container +20 -0
  19. data/Plugins/Apps/BookStack/BookStack.lmm.rb +91 -0
  20. data/Plugins/Apps/Cassandra/Cassandra.lmm.rb +9 -19
  21. data/Plugins/Apps/ClickHouse/ClickHouse.container +28 -0
  22. data/Plugins/Apps/ClickHouse/ClickHouse.lmm.rb +113 -0
  23. data/Plugins/Apps/ClickHouse/Config/listen.yaml +2 -0
  24. data/Plugins/Apps/ClickHouse/Config/logger.yaml +8 -0
  25. data/Plugins/Apps/ClickHouse/Config/zookeepers.yaml +5 -0
  26. data/Plugins/Apps/ClickHouse/Connection.rb +96 -0
  27. data/Plugins/Apps/Discourse/Discourse-Sidekiq.container +22 -0
  28. data/Plugins/Apps/Discourse/Discourse.conf.erb +38 -0
  29. data/Plugins/Apps/Discourse/Discourse.container +21 -0
  30. data/Plugins/Apps/Discourse/Discourse.lmm.rb +156 -0
  31. data/Plugins/Apps/Dovecot/Dovecot.lmm.rb +87 -52
  32. data/Plugins/Apps/ERPNext/ERPNext-Frontend.container +24 -0
  33. data/Plugins/Apps/ERPNext/ERPNext-Queue.container +22 -0
  34. data/Plugins/Apps/ERPNext/ERPNext-Scheduler.container +22 -0
  35. data/Plugins/Apps/ERPNext/ERPNext-Websocket.container +24 -0
  36. data/Plugins/Apps/ERPNext/ERPNext.container +23 -0
  37. data/Plugins/Apps/ERPNext/ERPNext.lmm.rb +204 -0
  38. data/Plugins/Apps/ERPNext/ERPNext.network +12 -0
  39. data/Plugins/Apps/ERPNext/sites/apps.json +10 -0
  40. data/Plugins/Apps/ERPNext/sites/apps.txt +3 -0
  41. data/Plugins/Apps/ERPNext/sites/common_site_config.json +11 -0
  42. data/Plugins/Apps/GitLab/GitLab.container +9 -2
  43. data/Plugins/Apps/GitLab/GitLab.lmm.rb +52 -33
  44. data/Plugins/Apps/Homepage/Homepage.conf.erb +86 -0
  45. data/Plugins/Apps/Homepage/Homepage.container +19 -0
  46. data/Plugins/Apps/Homepage/Homepage.lmm.rb +54 -0
  47. data/Plugins/Apps/IPFS/IPFS.conf.erb +0 -3
  48. data/Plugins/Apps/IPFS/IPFS.lmm.rb +0 -1
  49. data/Plugins/Apps/InfluxDB/InfluxDB.conf.erb +0 -3
  50. data/Plugins/Apps/InfluxDB/InfluxDB.lmm.rb +0 -1
  51. data/Plugins/Apps/Jackett/Jackett.conf.erb +0 -3
  52. data/Plugins/Apps/Jackett/Jackett.lmm.rb +0 -1
  53. data/Plugins/Apps/Jellyfin/Jellyfin.conf.erb +0 -3
  54. data/Plugins/Apps/Jellyfin/Jellyfin.lmm.rb +0 -1
  55. data/Plugins/Apps/LetsEncrypt/LetsEncrypt.lmm.rb +78 -0
  56. data/Plugins/Apps/LetsEncrypt/hooks/dovecot.sh +2 -0
  57. data/Plugins/Apps/LetsEncrypt/hooks/nginx.sh +2 -0
  58. data/Plugins/Apps/LetsEncrypt/hooks/postfix.sh +2 -0
  59. data/Plugins/Apps/LetsEncrypt/renew-certificates.service +7 -0
  60. data/Plugins/Apps/LetsEncrypt/renew-certificates.timer +12 -0
  61. data/Plugins/Apps/LetsEncrypt/rfc2136.ini +11 -0
  62. data/Plugins/Apps/LibreTranslate/LibreTranslate.container +21 -0
  63. data/Plugins/Apps/LibreTranslate/LibreTranslate.lmm.rb +34 -0
  64. data/Plugins/Apps/Lobsters/Containerfile +81 -0
  65. data/Plugins/Apps/Lobsters/Lobsters-Tasks.container +26 -0
  66. data/Plugins/Apps/Lobsters/Lobsters.conf.erb +99 -0
  67. data/Plugins/Apps/Lobsters/Lobsters.container +27 -0
  68. data/Plugins/Apps/Lobsters/Lobsters.lmm.rb +196 -0
  69. data/Plugins/Apps/Lobsters/crontab +3 -0
  70. data/Plugins/Apps/Lobsters/database.yml +26 -0
  71. data/Plugins/Apps/Lobsters/entrypoint.sh +30 -0
  72. data/Plugins/Apps/Lobsters/generateCredentials.rb +19 -0
  73. data/Plugins/Apps/Lobsters/lobsters-cron.sh +25 -0
  74. data/Plugins/Apps/Lobsters/lobsters-daily.sh +23 -0
  75. data/Plugins/Apps/Lobsters/puma.rb +49 -0
  76. data/Plugins/Apps/MariaDB/Connection.rb +55 -0
  77. data/Plugins/Apps/MariaDB/MariaDB.lmm.rb +122 -0
  78. data/Plugins/Apps/Mastodon/Mastodon-Sidekiq.container +22 -0
  79. data/Plugins/Apps/Mastodon/Mastodon-Streaming.container +20 -0
  80. data/Plugins/Apps/Mastodon/Mastodon.conf.erb +34 -45
  81. data/Plugins/Apps/Mastodon/Mastodon.container +28 -0
  82. data/Plugins/Apps/Mastodon/Mastodon.lmm.rb +240 -5
  83. data/Plugins/Apps/Mastodon/configlmm.rake +30 -0
  84. data/Plugins/Apps/Mastodon/entrypoint.sh +16 -0
  85. data/Plugins/Apps/Matrix/Element.container +19 -0
  86. data/Plugins/Apps/Matrix/Matrix.conf.erb +47 -9
  87. data/Plugins/Apps/Matrix/Matrix.lmm.rb +119 -5
  88. data/Plugins/Apps/Matrix/Synapse.container +22 -0
  89. data/Plugins/Apps/Matrix/config.json +50 -0
  90. data/Plugins/Apps/Matrix/homeserver.yaml +70 -0
  91. data/Plugins/Apps/Matrix/log.config +30 -0
  92. data/Plugins/Apps/Netdata/Netdata.conf.erb +0 -3
  93. data/Plugins/Apps/Netdata/Netdata.lmm.rb +0 -1
  94. data/Plugins/Apps/Nextcloud/Nextcloud.conf.erb +3 -4
  95. data/Plugins/Apps/Nextcloud/Nextcloud.lmm.rb +155 -48
  96. data/Plugins/Apps/Nextcloud/autoconfig.php +13 -0
  97. data/Plugins/Apps/Nextcloud/config.php +10 -1
  98. data/Plugins/Apps/Nextcloud/nextcloudcron.service +8 -0
  99. data/Plugins/Apps/Nextcloud/nextcloudcron.timer +10 -0
  100. data/Plugins/Apps/Nginx/Connection.rb +93 -0
  101. data/Plugins/Apps/Nginx/conf.d/configlmm.conf +54 -4
  102. data/Plugins/Apps/Nginx/conf.d/languages.conf +21 -0
  103. data/Plugins/Apps/Nginx/config-lmm/errors.conf +33 -22
  104. data/Plugins/Apps/Nginx/config-lmm/gateway-errors.conf +20 -0
  105. data/Plugins/Apps/Nginx/config-lmm/proxy.conf +6 -2
  106. data/Plugins/Apps/Nginx/main.conf.erb +7 -3
  107. data/Plugins/Apps/Nginx/nginx.conf +2 -2
  108. data/Plugins/Apps/Nginx/nginx.lmm.rb +103 -81
  109. data/Plugins/Apps/Nginx/proxy.conf.erb +24 -6
  110. data/Plugins/Apps/Odoo/Odoo.conf.erb +0 -3
  111. data/Plugins/Apps/Odoo/Odoo.container +7 -1
  112. data/Plugins/Apps/Odoo/Odoo.lmm.rb +4 -5
  113. data/Plugins/Apps/Ollama/Ollama.container +26 -0
  114. data/Plugins/Apps/Ollama/Ollama.lmm.rb +73 -0
  115. data/Plugins/Apps/OpenTelemetry/Config/config.yaml +704 -0
  116. data/Plugins/Apps/OpenTelemetry/OpenTelemetry.lmm.rb +154 -0
  117. data/Plugins/Apps/OpenVidu/Ingress.container +23 -0
  118. data/Plugins/Apps/{GitLab/GitLab.conf.erb → OpenVidu/OpenVidu.conf.erb} +8 -3
  119. data/Plugins/Apps/OpenVidu/OpenVidu.container +21 -0
  120. data/Plugins/Apps/OpenVidu/OpenVidu.lmm.rb +94 -0
  121. data/Plugins/Apps/OpenVidu/OpenViduCall.conf.erb +32 -0
  122. data/Plugins/Apps/OpenVidu/OpenViduCall.container +20 -0
  123. data/Plugins/Apps/OpenVidu/ingress.yaml +10 -0
  124. data/Plugins/Apps/OpenVidu/livekit.yaml +13 -0
  125. data/Plugins/Apps/PHP-FPM/Connection.rb +91 -0
  126. data/Plugins/Apps/PHP-FPM/PHP-FPM.lmm.rb +31 -4
  127. data/Plugins/Apps/Peppermint/Peppermint.conf.erb +2 -9
  128. data/Plugins/Apps/Peppermint/Peppermint.container +7 -1
  129. data/Plugins/Apps/Peppermint/Peppermint.lmm.rb +29 -33
  130. data/Plugins/Apps/Perplexica/Perplexica.container +25 -0
  131. data/Plugins/Apps/Perplexica/Perplexica.lmm.rb +92 -0
  132. data/Plugins/Apps/Perplexica/config.toml +26 -0
  133. data/Plugins/Apps/Podman/Connection.rb +24 -0
  134. data/Plugins/Apps/Podman/Podman.lmm.rb +80 -0
  135. data/Plugins/Apps/Podman/storage.conf +6 -0
  136. data/Plugins/Apps/Postfix/Postfix.lmm.rb +249 -145
  137. data/Plugins/Apps/PostgreSQL/Connection.rb +97 -0
  138. data/Plugins/Apps/PostgreSQL/PostgreSQL.lmm.rb +204 -99
  139. data/Plugins/Apps/Pterodactyl/Pterodactyl.conf.erb +0 -3
  140. data/Plugins/Apps/Pterodactyl/Pterodactyl.lmm.rb +0 -2
  141. data/Plugins/Apps/Pterodactyl/Wings.conf.erb +0 -3
  142. data/Plugins/Apps/RVM/RVM.lmm.rb +57 -0
  143. data/Plugins/Apps/Roundcube/Roundcube.conf.erb +72 -0
  144. data/Plugins/Apps/Roundcube/Roundcube.lmm.rb +141 -0
  145. data/Plugins/Apps/SSH/SSH.lmm.rb +9 -15
  146. data/Plugins/Apps/SearXNG/SearXNG.container +22 -0
  147. data/Plugins/Apps/SearXNG/SearXNG.lmm.rb +79 -0
  148. data/Plugins/Apps/SearXNG/limiter.toml +40 -0
  149. data/Plugins/Apps/SearXNG/settings.yml +2 -0
  150. data/Plugins/Apps/SigNoz/Config/alerts.yml +11 -0
  151. data/Plugins/Apps/SigNoz/Config/otel-collector-config.yaml +110 -0
  152. data/Plugins/Apps/SigNoz/Config/otel-collector-opamp-config.yaml +1 -0
  153. data/Plugins/Apps/SigNoz/Config/prometheus.yml +18 -0
  154. data/Plugins/Apps/SigNoz/SigNoz-Collector.container +23 -0
  155. data/Plugins/Apps/SigNoz/SigNoz-Migrator.container +17 -0
  156. data/Plugins/Apps/SigNoz/SigNoz.conf.erb +61 -0
  157. data/Plugins/Apps/SigNoz/SigNoz.container +26 -0
  158. data/Plugins/Apps/SigNoz/SigNoz.lmm.rb +319 -0
  159. data/Plugins/Apps/Solr/log4j2.xml +89 -0
  160. data/Plugins/Apps/Solr/solr.lmm.rb +82 -0
  161. data/Plugins/Apps/Sunshine/Sunshine.conf.erb +0 -3
  162. data/Plugins/Apps/Sunshine/Sunshine.lmm.rb +0 -1
  163. data/Plugins/Apps/Tunnel/tunnel.lmm.rb +59 -0
  164. data/Plugins/Apps/Tunnel/tunnelTCP.service +9 -0
  165. data/Plugins/Apps/Tunnel/tunnelTCP.socket +9 -0
  166. data/Plugins/Apps/Tunnel/tunnelUDP.service +9 -0
  167. data/Plugins/Apps/Tunnel/tunnelUDP.socket +9 -0
  168. data/Plugins/Apps/UVdesk/UVdesk.conf.erb +0 -3
  169. data/Plugins/Apps/Umami/Umami.container +19 -0
  170. data/Plugins/Apps/Umami/Umami.lmm.rb +108 -0
  171. data/Plugins/Apps/Valkey/Valkey.lmm.rb +64 -20
  172. data/Plugins/Apps/Vaultwarden/Vaultwarden.conf.erb +9 -6
  173. data/Plugins/Apps/Vaultwarden/Vaultwarden.container +7 -1
  174. data/Plugins/Apps/Vaultwarden/Vaultwarden.lmm.rb +67 -28
  175. data/Plugins/Apps/Wiki.js/Wiki.js.conf.erb +39 -0
  176. data/Plugins/Apps/Wiki.js/Wiki.js.container +20 -0
  177. data/Plugins/Apps/Wiki.js/Wiki.js.lmm.rb +55 -0
  178. data/Plugins/Apps/YaCy/YaCy.conf.erb +93 -0
  179. data/Plugins/Apps/YaCy/YaCy.container +21 -0
  180. data/Plugins/Apps/YaCy/YaCy.lmm.rb +160 -0
  181. data/Plugins/Apps/ZooKeeper/ZooKeeper.container +24 -0
  182. data/Plugins/Apps/ZooKeeper/ZooKeeper.lmm.rb +68 -0
  183. data/Plugins/Apps/bitmagnet/bitmagnet.conf.erb +0 -3
  184. data/Plugins/Apps/bitmagnet/bitmagnet.lmm.rb +0 -1
  185. data/Plugins/Apps/gollum/gollum.conf.erb +40 -4
  186. data/Plugins/Apps/gollum/gollum.container +10 -1
  187. data/Plugins/Apps/gollum/gollum.lmm.rb +56 -47
  188. data/Plugins/Apps/llama.cpp/llama.cpp.container +28 -0
  189. data/Plugins/Apps/llama.cpp/llama.cpp.lmm.rb +90 -0
  190. data/Plugins/Apps/vLLM/vLLM.container +32 -0
  191. data/Plugins/Apps/vLLM/vLLM.lmm.rb +89 -0
  192. data/Plugins/OS/General/Utils.lmm.rb +26 -0
  193. data/Plugins/OS/Linux/Connection.rb +472 -0
  194. data/Plugins/OS/Linux/Debian/preseed.cfg.erb +81 -0
  195. data/Plugins/OS/Linux/Distributions.yaml +32 -0
  196. data/Plugins/OS/Linux/Flavours.yaml +24 -0
  197. data/Plugins/OS/Linux/Grub/grub.cfg +10 -0
  198. data/Plugins/OS/Linux/HTTP.rb +32 -0
  199. data/Plugins/OS/Linux/Linux.lmm.rb +708 -174
  200. data/Plugins/OS/Linux/Packages.yaml +67 -3
  201. data/Plugins/OS/Linux/Proxmox/answer.toml.erb +30 -0
  202. data/Plugins/OS/Linux/Services.yaml +8 -0
  203. data/Plugins/OS/Linux/Shell.rb +70 -0
  204. data/Plugins/OS/Linux/Syslinux/default +8 -0
  205. data/Plugins/OS/Linux/WireGuard/WireGuard.lmm.rb +93 -40
  206. data/Plugins/OS/Linux/WireGuard/wg0.conf.erb +3 -0
  207. data/Plugins/OS/Linux/openSUSE/autoinst.xml.erb +29 -3
  208. data/Plugins/OS/Linux/systemd/systemd.lmm.rb +13 -11
  209. data/Plugins/OS/Routers/Aruba/ArubaInstant.lmm.rb +6 -5
  210. data/Plugins/Platforms/GitHub.lmm.rb +73 -28
  211. data/Plugins/Platforms/GoDaddy/GoDaddy.lmm.rb +10 -7
  212. data/Plugins/Platforms/Proxmox/Proxmox.lmm.rb +402 -0
  213. data/Plugins/Platforms/Proxmox/XTerm.rb +321 -0
  214. data/Plugins/Platforms/libvirt/libvirt.lmm.rb +41 -15
  215. data/Plugins/Platforms/porkbun.lmm.rb +12 -2
  216. data/Plugins/Platforms/porkbun_spec.rb +2 -2
  217. data/Plugins/Services/DNS/AmberBit.lmm.rb +1 -1
  218. data/Plugins/Services/DNS/ArubaItDNS.lmm.rb +1 -1
  219. data/Plugins/Services/DNS/NICLV.lmm.rb +1 -1
  220. data/Plugins/Services/DNS/PowerDNS.lmm.rb +130 -41
  221. data/Plugins/Services/DNS/tonic.lmm.rb +22 -12
  222. data/bootstrap.sh +41 -3
  223. data/lib/ConfigLMM/Framework/plugins/dns.rb +4 -3
  224. data/lib/ConfigLMM/Framework/plugins/linuxApp.rb +187 -144
  225. data/lib/ConfigLMM/Framework/plugins/nginxApp.rb +54 -6
  226. data/lib/ConfigLMM/Framework/plugins/plugin.rb +68 -140
  227. data/lib/ConfigLMM/Framework/plugins/store.rb +4 -4
  228. data/lib/ConfigLMM/Framework/variables.rb +75 -0
  229. data/lib/ConfigLMM/Framework.rb +1 -0
  230. data/lib/ConfigLMM/cli.rb +13 -5
  231. data/lib/ConfigLMM/commands/cleanup.rb +1 -0
  232. data/lib/ConfigLMM/commands/configsCommand.rb +38 -5
  233. data/lib/ConfigLMM/commands/diff.rb +33 -9
  234. data/lib/ConfigLMM/context.rb +22 -3
  235. data/lib/ConfigLMM/io/configList.rb +85 -7
  236. data/lib/ConfigLMM/io/connection.rb +143 -0
  237. data/lib/ConfigLMM/io/dhcp.rb +330 -0
  238. data/lib/ConfigLMM/io/http.rb +78 -0
  239. data/lib/ConfigLMM/io/local.rb +207 -0
  240. data/lib/ConfigLMM/io/pxe.rb +92 -0
  241. data/lib/ConfigLMM/io/ssh.rb +156 -0
  242. data/lib/ConfigLMM/io/tftp.rb +105 -0
  243. data/lib/ConfigLMM/io.rb +2 -0
  244. data/lib/ConfigLMM/secrets/envStore.rb +39 -0
  245. data/lib/ConfigLMM/secrets/fileStore.rb +43 -0
  246. data/lib/ConfigLMM/state.rb +12 -3
  247. data/lib/ConfigLMM/version.rb +2 -1
  248. data/lib/ConfigLMM.rb +1 -0
  249. data/{Examples → scripts}/configlmmAuth.sh +7 -5
  250. metadata +257 -9
@@ -0,0 +1,108 @@
1
+
2
+ module ConfigLMM
3
+ module LMM
4
+ class Umami < Framework::Plugin
5
+
6
+ USER = 'umami'
7
+ HOME_DIR = '/var/lib/umami'
8
+ HOST_IP = '10.0.2.2'
9
+
10
+ def actionUmamiDeploy(id, target, activeState, context, options)
11
+ raise Framework::PluginProcessError.new('Domain field must be set!') if (!target.key?('Proxy') || target['Proxy']) && !target['Domain']
12
+
13
+ self.withConnection(target['Location'], target) do |connection|
14
+ Linux.withConnection(connection) do |linuxConnection|
15
+ if !target.key?('Proxy') || target['Proxy'] == false
16
+ dbUser, dbPassword = self.configurePostgreSQL(target, linuxConnection, context, options)
17
+ Podman.ensurePresent(linuxConnection, options)
18
+ Podman.createUser(USER, HOME_DIR, 'Umami', linuxConnection, options)
19
+
20
+ path = Podman.containersPath(HOME_DIR)
21
+
22
+ dbHost = target['Database']['HostName']
23
+ dbPort = target['Database']['Port']
24
+ linuxConnection.fileWrite("#{path}/Umami.env", "DATABASE_URL=postgresql://#{dbUser}:#{dbPassword}@#{dbHost}:#{dbPort}/#{dbUser}", { **options, hide: true })
25
+
26
+ linuxConnection.setUserGroup("#{path}/Umami.env", USER, USER, options)
27
+ linuxConnection.setPrivate("#{path}/Umami.env", options)
28
+
29
+ linuxConnection.upload(__dir__ + '/Umami.container', path, options)
30
+ end
31
+
32
+ if !target.key?('Proxy') || target['Proxy']
33
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
34
+ nginxConnection.provisionProxy('http://127.0.0.1:13300', 'Umami', target, activeState, context, options)
35
+ end
36
+ elsif target.key?('Proxy') && target['Proxy'] == false
37
+ linuxConnection.fileReplace("#{path}/Umami.container", 'PublishPort=127.0.0.1:13300:', 'PublishPort=0.0.0.0:13300:', options)
38
+ linuxConnection.firewallAddPort('13300/tcp', options)
39
+ end
40
+
41
+ if !target.key?('Proxy') || target['Proxy'] == false
42
+ linuxConnection.reloadUserServices(USER, options)
43
+ linuxConnection.restartUserService(USER, 'Umami', options)
44
+ end
45
+ end
46
+ end
47
+ end
48
+
49
+ def configurePostgreSQL(target, linuxConnection, context, options)
50
+ target['Database'] ||= {}
51
+ target['Database']['Type'] = 'pgsql'
52
+ PostgreSQL.defaults(target['Database'])
53
+ username = target['Database']['Username'] || context.secrets.load(target['SecretId'], 'POSTGRESQL_USERNAME') || USER
54
+ context.secrets.store(target['SecretId'], 'POSTGRESQL_USERNAME', username)
55
+ password = context.secrets.load(target['SecretId'], 'POSTGRESQL_PASSWORD')
56
+ if password.nil?
57
+ password = SecureRandom.alphanumeric(20)
58
+ context.secrets.store(target['SecretId'], 'POSTGRESQL_PASSWORD', password)
59
+ end
60
+ PostgreSQL.withConnection(target['Database'], linuxConnection) do |postgres|
61
+ postgres.createUserAndDB(username, password, options)
62
+ end
63
+ if target['Database']['HostName'] == 'localhost'
64
+ target['Database']['HostName'] = HOST_IP
65
+ end
66
+ [username, password]
67
+ end
68
+
69
+ def cleanup(configs, state, context, options)
70
+ cleanupType(:Umami, configs, state, context, options) do |item, id, state, context, options, connection|
71
+ Linux.withConnection(connection) do |linuxConnection|
72
+ if !item['Config'].key?('Proxy') || item['Config']['Proxy']
73
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
74
+ nginxConnection.cleanupConfig('Umami', context, options)
75
+ nginxConnection.reload(connection, options[:dry])
76
+ end
77
+ elsif item['Config'].key?('Proxy') && item['Config']['Proxy'] == false
78
+ linuxConnection.firewallRemovePort('13300/tcp', connection, options)
79
+ end
80
+
81
+ if !item['Config'].key?('Proxy') || item['Config']['Proxy'] == false
82
+ linuxConnection.stopUserService(USER, 'Umami', options)
83
+
84
+ path = Podman.containersPath(HOME_DIR)
85
+ linuxConnection.rm(path + '/Umami.container', options[:dry])
86
+ end
87
+
88
+ state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
89
+
90
+ if options[:destroy]
91
+ if !item['Config'].key?('Proxy') || item['Config']['Proxy'] == false
92
+ if item['Config']['Database']['Type'] == 'pgsql'
93
+ username = context.secrets.load(target['SecretId'], 'POSTGRESQL_USERNAME') || USER
94
+ PostgreSQL.withConnection(settings, linuxConnection) do |postgres|
95
+ postgres.dropUserAndDB(item['Config']['Database'], username, options)
96
+ end
97
+ end
98
+ linuxConnection.deleteUserAndGroup(USER, options)
99
+ end
100
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
101
+ end
102
+ end
103
+ end
104
+ end
105
+
106
+ end
107
+ end
108
+ end
@@ -1,3 +1,4 @@
1
+ require 'uri'
1
2
 
2
3
  module ConfigLMM
3
4
  module LMM
@@ -7,16 +8,14 @@ module ConfigLMM
7
8
  PID_FILE = '/run/redis/redis.pid'
8
9
 
9
10
  def actionValkeyDeploy(id, target, activeState, context, options)
10
- self.ensurePackage(PACKAGE_NAME, target['Location'])
11
+ self.withConnection(target['Location'], target) do |connection|
12
+ Linux.withConnection(connection) do |linuxConnection|
13
+ linuxConnection.ensurePackage(PACKAGE_NAME, options)
11
14
 
12
- serviceName = 'redis'
13
-
14
- if target['Location'] && target['Location'] != '@me'
15
- self.class.sshStart(target['Location']) do |ssh|
16
- distroId = self.class.distroID(ssh)
17
- if distroId == SUSE_ID
15
+ serviceName = 'redis'
16
+ if linuxConnection.distroID == SUSE_ID
18
17
  serviceName = 'redis@redis'
19
- self.class.sshExec!(ssh, "touch #{CONFIG_FILE}")
18
+ linuxConnection.exec("touch #{CONFIG_FILE}", false, options)
20
19
 
21
20
  target['Settings'] ||= {}
22
21
  target['Settings']['pidfile'] = PID_FILE
@@ -24,32 +23,77 @@ module ConfigLMM
24
23
  target['Settings']['dir'] = '/var/lib/redis/default/'
25
24
  end
26
25
 
26
+ password = context.secrets.load(target['SecretId'], 'VALKEY_PASSWORD')
27
+ if password.nil?
28
+ password = SecureRandom.urlsafe_base64(20)
29
+ context.secrets.store(target['SecretId'], 'VALKEY_PASSWORD', password)
30
+ end
31
+
32
+ if !password.empty? && password != 'no' && target['Password'] != false
33
+ target['Settings']['requirepass'] = password
34
+ end
35
+
27
36
  if target['Settings']
28
37
  target['Settings']['bind'] = '127.0.0.1' unless target['Settings']['bind']
29
- updateRemoteFile(ssh, CONFIG_FILE, options, false) do |configLines|
38
+ linuxConnection.updateFile(CONFIG_FILE, options, false) do |configLines|
30
39
  target['Settings'].each do |name, value|
31
40
  configLines << "#{name} #{value}\n"
32
41
  end
33
42
  configLines
34
43
  end
35
44
  end
45
+
46
+ target['Settings']['requirepass'] = '<REDACTED>' if target['Settings']['requirepass']
47
+
48
+ linuxConnection.setUserGroup(CONFIG_FILE, 'redis', nil, options)
49
+ linuxConnection.setPrivate(CONFIG_FILE, options)
50
+
51
+ linuxConnection.ensureServiceAutoStart(serviceName, options)
52
+ linuxConnection.restartService(serviceName, options)
36
53
  end
37
- else
38
- if target['Settings']
39
- `touch #{CONFIG_FILE}`
40
- updateLocalFile(CONFIG_FILE, options) do |configLines|
41
- target['Settings'].each do |name, value|
42
- configLines << "#{name} #{value}\n"
43
- end
44
- configLines
54
+ end
55
+ end
56
+
57
+ def cleanup(configs, state, context, options)
58
+ cleanupType(:Valkey, configs, state, context, options) do |item, id, state, context, options, connection|
59
+ Linux.withConnection(connection) do |linuxConnection|
60
+ serviceName = 'redis'
61
+ serviceName = 'redis@redis' if linuxConnection.distroID == SUSE_ID
62
+
63
+ linuxConnection.stopService(serviceName, options)
64
+ linuxConnection.removePackage(PACKAGE_NAME, options)
65
+
66
+ state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
67
+
68
+ if options[:destroy]
69
+ linuxConnection.rm('/etc/redis', options[:dry])
70
+
71
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
45
72
  end
46
73
  end
47
74
  end
48
-
49
- self.ensureServiceAutoStart(serviceName, target['Location'])
50
- self.startService(serviceName, target['Location'])
51
75
  end
52
76
 
77
+ def self.connectionURL(params)
78
+ args = { scheme: 'redis', host: params[:host].to_s, path: '/' }
79
+ args[:scheme] += 's' if params[:ssl]
80
+ args[:path] += params[:db] if params[:db]
81
+
82
+ if args[:host].include?(':')
83
+ args[:host], args[:port] = args[:host].split(':')
84
+ end
85
+
86
+ userinfo = ''
87
+ if params[:username]
88
+ userinfo = URI.encode_uri_component(params[:username])
89
+ end
90
+ if params.key?(:password) && !params[:password].nil?
91
+ userinfo += ':' + URI.encode_uri_component(params[:password])
92
+ end
93
+ args[:userinfo] = userinfo unless userinfo.empty?
94
+
95
+ URI::Generic.build(args).to_s
96
+ end
53
97
  end
54
98
 
55
99
  end
@@ -1,5 +1,5 @@
1
1
 
2
- upstream vaultwarden {
2
+ upstream <%= config['Name'] %> {
3
3
  <% if config['Server'] %>
4
4
  server <%= config['Server'] %>;
5
5
  <% else %>
@@ -38,19 +38,22 @@ server {
38
38
 
39
39
  server_name <%= config['Domain'] %>;
40
40
 
41
+ <% if config['CertName'] %>
42
+ ssl_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/fullchain.pem";
43
+ ssl_certificate_key "/etc/letsencrypt/live/<%= config['CertName'] %>/privkey.pem";
44
+ ssl_trusted_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/chain.pem";
45
+ <% end %>
46
+
41
47
  <% if config['Private'] %>
42
48
  include config-lmm/private.conf;
43
49
  <% end %>
44
50
 
45
- access_log /var/log/nginx/vaultwarden.access.log;
46
- error_log /var/log/nginx/vaultwarden.error.log;
47
-
48
51
  client_max_body_size 200M;
49
52
 
50
- include config-lmm/errors.conf;
53
+ include config-lmm/gateway-errors.conf;
51
54
 
52
55
  location / {
53
- proxy_pass http://vaultwarden;
56
+ proxy_pass http://<%= config['Name'] %>;
54
57
  include config-lmm/proxy.conf;
55
58
  }
56
59
 
@@ -3,7 +3,7 @@ Description=vaultwarden container
3
3
  After=local-fs.target
4
4
 
5
5
  [Container]
6
- AutoUpdate=registry
6
+ ContainerName=Vaultwarden
7
7
  Image=ghcr.io/dani-garcia/vaultwarden:latest
8
8
  Exec=/start.sh
9
9
  EnvironmentFile=/var/lib/vaultwarden/.config/containers/systemd/Vaultwarden.env
@@ -11,6 +11,12 @@ Network=slirp4netns:allow_host_loopback=true
11
11
  PublishPort=0.0.0.0:18000:8000
12
12
  UserNS=keep-id:uid=1000,gid=1000
13
13
  Volume=/var/lib/vaultwarden/data/:/data/
14
+ LogDriver=journald
15
+ AutoUpdate=registry
16
+
17
+ [Service]
18
+ TimeoutStartSec=6min
19
+ Restart=on-failure
14
20
 
15
21
  [Install]
16
22
  WantedBy=multi-user.target default.target
@@ -1,16 +1,21 @@
1
1
 
2
2
  require 'fileutils'
3
+ require 'argon2'
4
+ require 'securerandom'
3
5
 
4
6
  module ConfigLMM
5
7
  module LMM
6
- class Vaultwarden < Framework::NginxApp
8
+ class Vaultwarden < Framework::Plugin
7
9
 
8
10
  NAME = 'Vaultwarden'
9
11
  USER = 'vaultwarden'
10
12
  HOME_DIR = '/var/lib/vaultwarden'
13
+ SERVICE_PORT = '18000'
11
14
 
12
15
  def actionVaultwardenBuild(id, target, state, context, options)
13
- writeNginxConfig(__dir__, NAME, id, target, state, context, options)
16
+ Nginx.withConnection(local) do |nginxConnection|
17
+ nginxConnection.writeConfig(__dir__, NAME, target, state, context, options)
18
+ end
14
19
  end
15
20
 
16
21
  def actionVaultwardenDiff(id, target, activeState, context, options)
@@ -18,44 +23,78 @@ module ConfigLMM
18
23
  end
19
24
 
20
25
  def actionVaultwardenDeploy(id, target, activeState, context, options)
21
- if target['Location'] && target['Location'] != '@me'
22
- uri = Addressable::URI.parse(target['Location'])
23
- self.class.sshStart(uri) do |ssh|
26
+ self.withConnection(target['Location'], target) do |connection|
27
+ Linux.withConnection(connection) do |linuxConnection|
24
28
  if !target.key?('Proxy') || target['Proxy'] != 'only'
25
- distroInfo = Framework::LinuxApp.currentDistroInfo(ssh)
26
- Framework::LinuxApp.configurePodmanServiceOverSSH(USER, HOME_DIR, 'Vaultwarden', distroInfo, ssh)
27
- self.class.sshExec!(ssh, "su --login #{USER} --shell /bin/sh --command 'mkdir -p ~/data'")
28
- path = Framework::LinuxApp::SYSTEMD_CONTAINERS_PATH.gsub('~', HOME_DIR)
29
- self.class.sshExec!(ssh, "echo 'ROCKET_PORT=8000' > #{path}/Vaultwarden.env")
29
+
30
+ Podman.ensurePresent(linuxConnection, options)
31
+ Podman.createUser(USER, HOME_DIR, 'Vaultwarden', linuxConnection, options)
32
+ linuxConnection.withUserShell(USER) do |shell|
33
+ shell.createDirs(options, '~/data')
34
+ end
35
+
36
+ path = Podman.containersPath(HOME_DIR)
37
+ linuxConnection.fileWrite("#{path}/Vaultwarden.env", 'ROCKET_PORT=8000', options)
30
38
  if target['Domain']
31
- self.class.sshExec!(ssh, "echo 'DOMAIN=https://#{target['Domain']}' >> #{path}/Vaultwarden.env")
39
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "DOMAIN=https://#{target['Domain']}", options)
32
40
  end
33
41
  target['Signups'] = false unless target['Signups']
34
- self.class.sshExec!(ssh, "echo 'SIGNUPS_ALLOWED=#{target['Signups'].to_s}' >> #{path}/Vaultwarden.env")
42
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "SIGNUPS_ALLOWED=#{target['Signups'].to_s}", options)
35
43
  if target.key?('Invitations')
36
- self.class.sshExec!(ssh, "echo 'INVITATIONS_ALLOWED=#{target['Invitations'].to_s}' >> #{path}/Vaultwarden.env")
44
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "INVITATIONS_ALLOWED=#{target['Invitations'].to_s}", options)
37
45
  end
38
- if ENV.key?('VAULTWARDEN_ADMIN_TOKEN')
39
- token = ENV['VAULTWARDEN_ADMIN_TOKEN']
40
- token = SecureRandom.alphanumeric(40) if token.empty?
41
- self.class.sshExec!(ssh, "echo 'ADMIN_TOKEN=#{token}' >> #{path}/Vaultwarden.env")
46
+ adminToken = context.secrets.load(target['SecretId'], 'VAULTWARDEN_ADMIN_TOKEN')
47
+ if !adminToken
48
+ adminToken = SecureRandom.alphanumeric(40)
49
+ context.secrets.store(target['SecretId'], 'VAULTWARDEN_ADMIN_TOKEN', adminToken)
42
50
  end
43
- self.class.sshExec!(ssh, "chown #{USER}:#{USER} #{path}/Vaultwarden.env")
44
- self.class.sshExec!(ssh, "chmod 600 #{path}/Vaultwarden.env")
45
51
 
46
- ssh.scp.upload!(__dir__ + '/Vaultwarden.container', path)
47
- self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@ daemon-reload")
48
- self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@ start Vaultwarden")
52
+ adminTokenHash = Argon2::Password.new(profile: :rfc_9106_low_memory).create(adminToken)
53
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "ADMIN_TOKEN=#{adminTokenHash}", { **options, hide: true })
54
+
55
+
56
+ if target['SMTP']
57
+ host = target['SMTP']['Host']
58
+ host = HOST_IP if host.to_s.empty? || ['localhost', '127.0.0.1'].include?(host)
59
+
60
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "SMTP_HOST=#{host}", options)
61
+ if target['SMTP']['Port']
62
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "SMTP_PORT=#{target['SMTP']['Port']}", options)
63
+ end
64
+
65
+ raise 'SMTP.FromAddress must be set!' unless target['SMTP']['FromAddress']
66
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "SMTP_FROM=#{target['SMTP']['FromAddress']}", options)
67
+
68
+ if target['SMTP']['Username']
69
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "SMTP_USERNAME=#{target['SMTP']['Username']}", options)
70
+ end
71
+
72
+ if target['SMTP']['SecretId']
73
+ smtpPassword = context.secrets.load(target['SMTP']['SecretId'], target['SMTP']['Username'].upcase + '_PASSWORD')
74
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "SMTP_PASSWORD=#{smtpPassword}", { **options, hide: true })
75
+ end
76
+
77
+ if target['SMTP']['Port'] == 465
78
+ linuxConnection.fileAppend("#{path}/Vaultwarden.env", "SMTP_SECURITY=force_tls", options)
79
+ end
80
+ end
81
+
82
+ linuxConnection.setUserGroup("#{path}/Vaultwarden.env", USER, USER, options)
83
+ linuxConnection.setPrivate("#{path}/Vaultwarden.env", options)
84
+ linuxConnection.upload(__dir__ + '/Vaultwarden.container', path, options)
85
+ linuxConnection.reloadUserServices(USER, options)
86
+ linuxConnection.restartUserService(USER, 'Vaultwarden', options)
87
+ if target['Proxy'] != 'only'
88
+ linuxConnection.firewallAddPort(SERVICE_PORT + '/tcp', options)
89
+ end
49
90
  end
50
91
  if !target.key?('Proxy') || !!target['Proxy']
51
- self.class.prepareNginxConfig(target, ssh)
52
- writeNginxConfig(__dir__, NAME, id, target, state, context, options)
53
- deployNginxConfig(id, target, activeState, context, options)
92
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
93
+ target['ConfigName'] = target['Name']
94
+ nginxConnection.provision(__dir__, NAME, target, activeState, context, options)
95
+ end
54
96
  end
55
97
  end
56
- else
57
- # TODO
58
- activeState['Location'] = '@me'
59
98
  end
60
99
  end
61
100
 
@@ -0,0 +1,39 @@
1
+
2
+ server {
3
+
4
+ <% if !config['TLS'] %>
5
+ listen <%= config['Port'] %>;
6
+ listen [::]:<%= config['Port'] %>;
7
+ <% else %>
8
+ <% if config['NginxVersion'] >= 1.25 %>
9
+ listen <%= config['Port'] %> ssl;
10
+ listen [::]:<%= config['Port'] %> ssl;
11
+ http2 on;
12
+ http3 on;
13
+ quic_retry on;
14
+ add_header Alt-Svc 'h3=":<%= config['Port'] %>"; ma=86400';
15
+ <% else %>
16
+ listen <%= config['Port'] %> ssl http2;
17
+ listen [::]:<%= config['Port'] %> ssl http2;
18
+ <% end %>
19
+
20
+ include config-lmm/ssl.conf;
21
+ <% end %>
22
+
23
+ server_name <%= config['Domain'] %>;
24
+
25
+ include config-lmm/gateway-errors.conf;
26
+ include config-lmm/security.conf;
27
+
28
+ location / {
29
+ <% if config['Server'] %>
30
+ proxy_pass <%= config['Server'] %>;
31
+ <% else %>
32
+ proxy_pass http://127.0.0.1:13200;
33
+ <% end %>
34
+
35
+ include config-lmm/proxy.conf;
36
+ }
37
+
38
+ }
39
+
@@ -0,0 +1,20 @@
1
+
2
+ [Unit]
3
+ Description=Wiki.js container
4
+ After=local-fs.target
5
+
6
+ [Container]
7
+ ContainerName=WikiJS
8
+ Image=docker.io/requarks/wiki:latest
9
+ EnvironmentFile=/var/lib/wikijs/.config/containers/systemd/Wiki.js.env
10
+ Network=slirp4netns:allow_host_loopback=true
11
+ PublishPort=127.0.0.1:13200:3000
12
+ UserNS=keep-id:uid=1000,gid=1000
13
+ LogDriver=journald
14
+ AutoUpdate=registry
15
+
16
+ [Service]
17
+ Restart=on-failure
18
+
19
+ [Install]
20
+ WantedBy=multi-user.target default.target
@@ -0,0 +1,55 @@
1
+
2
+ module ConfigLMM
3
+ module LMM
4
+ class WikiJS < Framework::Plugin
5
+
6
+ USER = 'wikijs'
7
+ HOME_DIR = '/var/lib/wikijs'
8
+ HOST_IP = '10.0.2.2'
9
+
10
+ def actionWikiJSDeploy(id, target, activeState, context, options)
11
+ raise Framework::PluginProcessError.new('Domain field must be set!') unless target['Domain']
12
+
13
+ target['Database'] ||= {}
14
+ self.withConnection(target['Location'], target) do |connection|
15
+ Linux.withConnection(connection) do |linuxConnection|
16
+ target['Database'] ||= {}
17
+ dbPassword = self.configurePostgreSQL(target['Database'], linuxConnection, options)
18
+
19
+ Podman.ensurePresent(linuxConnection, options)
20
+ Podman.createUser(USER, HOME_DIR, 'Wiki.js', linuxConnection, options)
21
+
22
+ path = Podman.containersPath(HOME_DIR)
23
+ linuxConnection.fileWrite("#{path}/Wiki.js.env", 'DB_TYPE=postgres', options)
24
+ linuxConnection.fileAppend("#{path}/Wiki.js.env", "DB_HOST=#{HOST_IP}", options)
25
+ linuxConnection.fileAppend("#{path}/Wiki.js.env", "DB_PORT=5432", options)
26
+ linuxConnection.fileAppend("#{path}/Wiki.js.env", "DB_USER=#{USER}", options)
27
+ linuxConnection.fileAppend("#{path}/Wiki.js.env", "DB_NAME=#{USER}", options)
28
+ linuxConnection.fileAppend("#{path}/Wiki.js.env", "DB_PASS=#{dbPassword}", { **options, hide: true })
29
+
30
+ linuxConnection.setUserGroup("#{path}/Wiki.js.env", USER, USER, options)
31
+ linuxConnection.setPrivate("#{path}/Wiki.js.env", options)
32
+
33
+ linuxConnection.upload(__dir__ + '/Wiki.js.container', path, options)
34
+
35
+ linuxConnection.reloadUserServices(USER, options)
36
+ linuxConnection.restartUserService(USER, 'Wiki.js', options)
37
+
38
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
39
+ nginxConnection.provision(__dir__, 'Wiki.js', target, activeState, context, options)
40
+ end
41
+ end
42
+ end
43
+ end
44
+
45
+ def configurePostgreSQL(dbSettings, linuxConnection, options)
46
+ password = SecureRandom.alphanumeric(20)
47
+ PostgreSQL.withConnection(dbSettings, linuxConnection) do |postgresConnection|
48
+ postgresConnection.createUserAndDB(USER, password, options)
49
+ end
50
+ password
51
+ end
52
+
53
+ end
54
+ end
55
+ end
@@ -0,0 +1,93 @@
1
+
2
+ upstream yacy {
3
+ <% if config['Server'] %>
4
+ server <%= config['Server'] %>;
5
+ <% else %>
6
+ server 127.0.0.1:8090;
7
+ <% end %>
8
+ }
9
+
10
+ server {
11
+
12
+ <% if config['NginxVersion'] >= 1.25 %>
13
+ <% if !config['TLS'] %>
14
+ listen <%= config['Port'] %>;
15
+ listen [::]:<%= config['Port'] %>;
16
+ <% else %>
17
+ listen <%= config['Port'] %> ssl;
18
+ listen [::]:<%= config['Port'] %> ssl;
19
+
20
+ include config-lmm/ssl.conf;
21
+ <% end %>
22
+ http2 on;
23
+ http3 on;
24
+ quic_retry on;
25
+ add_header Alt-Svc 'h3=":443"; ma=86400';
26
+ <% else %>
27
+ <% if !config['TLS'] %>
28
+ listen <%= config['Port'] %>;
29
+ listen [::]:<%= config['Port'] %>;
30
+ <% else %>
31
+ listen <%= config['Port'] %> ssl http2;
32
+ listen [::]:<%= config['Port'] %> ssl http2;
33
+
34
+ include config-lmm/ssl.conf;
35
+ <% end %>
36
+ <% end %>
37
+
38
+ server_name <%= config['Domain'] %>;
39
+
40
+ <% if config['CertName'] %>
41
+ ssl_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/fullchain.pem";
42
+ ssl_certificate_key "/etc/letsencrypt/live/<%= config['CertName'] %>/privkey.pem";
43
+ ssl_trusted_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/chain.pem";
44
+ <% end %>
45
+
46
+ <% if config['Private'] && config['Private'] != 'partial' %>
47
+ include config-lmm/private.conf;
48
+ <% end %>
49
+
50
+ include config-lmm/errors.conf;
51
+
52
+ <% if config['Private'] == 'partial' %>
53
+ # YaCy exposes a lot of functionality and hence big attack surface
54
+ # it can be useful to limit it
55
+
56
+ location = / {
57
+ return 403;
58
+ }
59
+
60
+ location / {
61
+ include config-lmm/private.conf;
62
+
63
+ proxy_pass http://yacy;
64
+ include config-lmm/proxy.conf;
65
+ }
66
+
67
+ location = /seed.txt {
68
+ proxy_pass http://yacy/seed.txt;
69
+ include config-lmm/proxy.conf;
70
+ }
71
+
72
+ location /yacy {
73
+ proxy_pass http://yacy;
74
+ include config-lmm/proxy.conf;
75
+ }
76
+
77
+ location /solr {
78
+ proxy_pass http://yacy;
79
+ include config-lmm/proxy.conf;
80
+ }
81
+
82
+ location /p2p {
83
+ proxy_pass http://yacy;
84
+ include config-lmm/proxy.conf;
85
+ }
86
+ <% else %>
87
+ location / {
88
+ proxy_pass http://yacy;
89
+ include config-lmm/proxy.conf;
90
+ }
91
+ <% end %>
92
+
93
+ }
@@ -0,0 +1,21 @@
1
+
2
+ [Unit]
3
+ Description=YaCy container
4
+ After=local-fs.target
5
+
6
+ [Container]
7
+ ContainerName=YaCy
8
+ Image=docker.io/yacy/yacy_search_server:latest
9
+ EnvironmentFile=/var/lib/yacy/.config/containers/systemd/YaCy.env
10
+ PublishPort=127.0.0.1:8090:8090
11
+ UserNS=keep-id:uid=107,gid=113
12
+ Volume=/var/lib/yacy/DATA:/opt/yacy_search_server/DATA
13
+ LogDriver=journald
14
+ AutoUpdate=registry
15
+
16
+ [Service]
17
+ TimeoutStartSec=6min
18
+ Restart=on-failure
19
+
20
+ [Install]
21
+ WantedBy=multi-user.target default.target