ConfigLMM 0.3.0 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (250) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +70 -0
  3. data/CNAME +1 -0
  4. data/Examples/.lmm.state.yaml +159 -0
  5. data/Examples/ConfigLMM.mm.yaml +32 -0
  6. data/Examples/Implemented.mm.yaml +252 -4
  7. data/Examples/SmallBusiness.mm.yaml +492 -0
  8. data/Plugins/Apps/Answer/answer.lmm.rb +165 -0
  9. data/Plugins/Apps/Answer/answer@.service +40 -0
  10. data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.conf.erb +0 -3
  11. data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.lmm.rb +0 -1
  12. data/Plugins/Apps/Authentik/Authentik-ProxyOutpost.container +20 -0
  13. data/Plugins/Apps/Authentik/Authentik-Server.container +7 -1
  14. data/Plugins/Apps/Authentik/Authentik-Worker.container +7 -1
  15. data/Plugins/Apps/Authentik/Authentik.conf.erb +18 -6
  16. data/Plugins/Apps/Authentik/Authentik.lmm.rb +232 -45
  17. data/Plugins/Apps/BookStack/BookStack.conf.erb +38 -0
  18. data/Plugins/Apps/BookStack/BookStack.container +20 -0
  19. data/Plugins/Apps/BookStack/BookStack.lmm.rb +91 -0
  20. data/Plugins/Apps/Cassandra/Cassandra.lmm.rb +9 -19
  21. data/Plugins/Apps/ClickHouse/ClickHouse.container +28 -0
  22. data/Plugins/Apps/ClickHouse/ClickHouse.lmm.rb +113 -0
  23. data/Plugins/Apps/ClickHouse/Config/listen.yaml +2 -0
  24. data/Plugins/Apps/ClickHouse/Config/logger.yaml +8 -0
  25. data/Plugins/Apps/ClickHouse/Config/zookeepers.yaml +5 -0
  26. data/Plugins/Apps/ClickHouse/Connection.rb +96 -0
  27. data/Plugins/Apps/Discourse/Discourse-Sidekiq.container +22 -0
  28. data/Plugins/Apps/Discourse/Discourse.conf.erb +38 -0
  29. data/Plugins/Apps/Discourse/Discourse.container +21 -0
  30. data/Plugins/Apps/Discourse/Discourse.lmm.rb +156 -0
  31. data/Plugins/Apps/Dovecot/Dovecot.lmm.rb +87 -52
  32. data/Plugins/Apps/ERPNext/ERPNext-Frontend.container +24 -0
  33. data/Plugins/Apps/ERPNext/ERPNext-Queue.container +22 -0
  34. data/Plugins/Apps/ERPNext/ERPNext-Scheduler.container +22 -0
  35. data/Plugins/Apps/ERPNext/ERPNext-Websocket.container +24 -0
  36. data/Plugins/Apps/ERPNext/ERPNext.container +23 -0
  37. data/Plugins/Apps/ERPNext/ERPNext.lmm.rb +204 -0
  38. data/Plugins/Apps/ERPNext/ERPNext.network +12 -0
  39. data/Plugins/Apps/ERPNext/sites/apps.json +10 -0
  40. data/Plugins/Apps/ERPNext/sites/apps.txt +3 -0
  41. data/Plugins/Apps/ERPNext/sites/common_site_config.json +11 -0
  42. data/Plugins/Apps/GitLab/GitLab.container +9 -2
  43. data/Plugins/Apps/GitLab/GitLab.lmm.rb +52 -33
  44. data/Plugins/Apps/Homepage/Homepage.conf.erb +86 -0
  45. data/Plugins/Apps/Homepage/Homepage.container +19 -0
  46. data/Plugins/Apps/Homepage/Homepage.lmm.rb +54 -0
  47. data/Plugins/Apps/IPFS/IPFS.conf.erb +0 -3
  48. data/Plugins/Apps/IPFS/IPFS.lmm.rb +0 -1
  49. data/Plugins/Apps/InfluxDB/InfluxDB.conf.erb +0 -3
  50. data/Plugins/Apps/InfluxDB/InfluxDB.lmm.rb +0 -1
  51. data/Plugins/Apps/Jackett/Jackett.conf.erb +0 -3
  52. data/Plugins/Apps/Jackett/Jackett.lmm.rb +0 -1
  53. data/Plugins/Apps/Jellyfin/Jellyfin.conf.erb +0 -3
  54. data/Plugins/Apps/Jellyfin/Jellyfin.lmm.rb +0 -1
  55. data/Plugins/Apps/LetsEncrypt/LetsEncrypt.lmm.rb +78 -0
  56. data/Plugins/Apps/LetsEncrypt/hooks/dovecot.sh +2 -0
  57. data/Plugins/Apps/LetsEncrypt/hooks/nginx.sh +2 -0
  58. data/Plugins/Apps/LetsEncrypt/hooks/postfix.sh +2 -0
  59. data/Plugins/Apps/LetsEncrypt/renew-certificates.service +7 -0
  60. data/Plugins/Apps/LetsEncrypt/renew-certificates.timer +12 -0
  61. data/Plugins/Apps/LetsEncrypt/rfc2136.ini +11 -0
  62. data/Plugins/Apps/LibreTranslate/LibreTranslate.container +21 -0
  63. data/Plugins/Apps/LibreTranslate/LibreTranslate.lmm.rb +34 -0
  64. data/Plugins/Apps/Lobsters/Containerfile +81 -0
  65. data/Plugins/Apps/Lobsters/Lobsters-Tasks.container +26 -0
  66. data/Plugins/Apps/Lobsters/Lobsters.conf.erb +99 -0
  67. data/Plugins/Apps/Lobsters/Lobsters.container +27 -0
  68. data/Plugins/Apps/Lobsters/Lobsters.lmm.rb +196 -0
  69. data/Plugins/Apps/Lobsters/crontab +3 -0
  70. data/Plugins/Apps/Lobsters/database.yml +26 -0
  71. data/Plugins/Apps/Lobsters/entrypoint.sh +30 -0
  72. data/Plugins/Apps/Lobsters/generateCredentials.rb +19 -0
  73. data/Plugins/Apps/Lobsters/lobsters-cron.sh +25 -0
  74. data/Plugins/Apps/Lobsters/lobsters-daily.sh +23 -0
  75. data/Plugins/Apps/Lobsters/puma.rb +49 -0
  76. data/Plugins/Apps/MariaDB/Connection.rb +55 -0
  77. data/Plugins/Apps/MariaDB/MariaDB.lmm.rb +122 -0
  78. data/Plugins/Apps/Mastodon/Mastodon-Sidekiq.container +22 -0
  79. data/Plugins/Apps/Mastodon/Mastodon-Streaming.container +20 -0
  80. data/Plugins/Apps/Mastodon/Mastodon.conf.erb +34 -45
  81. data/Plugins/Apps/Mastodon/Mastodon.container +28 -0
  82. data/Plugins/Apps/Mastodon/Mastodon.lmm.rb +240 -5
  83. data/Plugins/Apps/Mastodon/configlmm.rake +30 -0
  84. data/Plugins/Apps/Mastodon/entrypoint.sh +16 -0
  85. data/Plugins/Apps/Matrix/Element.container +19 -0
  86. data/Plugins/Apps/Matrix/Matrix.conf.erb +47 -9
  87. data/Plugins/Apps/Matrix/Matrix.lmm.rb +119 -5
  88. data/Plugins/Apps/Matrix/Synapse.container +22 -0
  89. data/Plugins/Apps/Matrix/config.json +50 -0
  90. data/Plugins/Apps/Matrix/homeserver.yaml +70 -0
  91. data/Plugins/Apps/Matrix/log.config +30 -0
  92. data/Plugins/Apps/Netdata/Netdata.conf.erb +0 -3
  93. data/Plugins/Apps/Netdata/Netdata.lmm.rb +0 -1
  94. data/Plugins/Apps/Nextcloud/Nextcloud.conf.erb +3 -4
  95. data/Plugins/Apps/Nextcloud/Nextcloud.lmm.rb +155 -48
  96. data/Plugins/Apps/Nextcloud/autoconfig.php +13 -0
  97. data/Plugins/Apps/Nextcloud/config.php +10 -1
  98. data/Plugins/Apps/Nextcloud/nextcloudcron.service +8 -0
  99. data/Plugins/Apps/Nextcloud/nextcloudcron.timer +10 -0
  100. data/Plugins/Apps/Nginx/Connection.rb +93 -0
  101. data/Plugins/Apps/Nginx/conf.d/configlmm.conf +54 -4
  102. data/Plugins/Apps/Nginx/conf.d/languages.conf +21 -0
  103. data/Plugins/Apps/Nginx/config-lmm/errors.conf +33 -22
  104. data/Plugins/Apps/Nginx/config-lmm/gateway-errors.conf +20 -0
  105. data/Plugins/Apps/Nginx/config-lmm/proxy.conf +6 -2
  106. data/Plugins/Apps/Nginx/main.conf.erb +7 -3
  107. data/Plugins/Apps/Nginx/nginx.conf +2 -2
  108. data/Plugins/Apps/Nginx/nginx.lmm.rb +103 -81
  109. data/Plugins/Apps/Nginx/proxy.conf.erb +24 -6
  110. data/Plugins/Apps/Odoo/Odoo.conf.erb +0 -3
  111. data/Plugins/Apps/Odoo/Odoo.container +7 -1
  112. data/Plugins/Apps/Odoo/Odoo.lmm.rb +4 -5
  113. data/Plugins/Apps/Ollama/Ollama.container +26 -0
  114. data/Plugins/Apps/Ollama/Ollama.lmm.rb +73 -0
  115. data/Plugins/Apps/OpenTelemetry/Config/config.yaml +704 -0
  116. data/Plugins/Apps/OpenTelemetry/OpenTelemetry.lmm.rb +154 -0
  117. data/Plugins/Apps/OpenVidu/Ingress.container +23 -0
  118. data/Plugins/Apps/{GitLab/GitLab.conf.erb → OpenVidu/OpenVidu.conf.erb} +8 -3
  119. data/Plugins/Apps/OpenVidu/OpenVidu.container +21 -0
  120. data/Plugins/Apps/OpenVidu/OpenVidu.lmm.rb +94 -0
  121. data/Plugins/Apps/OpenVidu/OpenViduCall.conf.erb +32 -0
  122. data/Plugins/Apps/OpenVidu/OpenViduCall.container +20 -0
  123. data/Plugins/Apps/OpenVidu/ingress.yaml +10 -0
  124. data/Plugins/Apps/OpenVidu/livekit.yaml +13 -0
  125. data/Plugins/Apps/PHP-FPM/Connection.rb +91 -0
  126. data/Plugins/Apps/PHP-FPM/PHP-FPM.lmm.rb +31 -4
  127. data/Plugins/Apps/Peppermint/Peppermint.conf.erb +2 -9
  128. data/Plugins/Apps/Peppermint/Peppermint.container +7 -1
  129. data/Plugins/Apps/Peppermint/Peppermint.lmm.rb +29 -33
  130. data/Plugins/Apps/Perplexica/Perplexica.container +25 -0
  131. data/Plugins/Apps/Perplexica/Perplexica.lmm.rb +92 -0
  132. data/Plugins/Apps/Perplexica/config.toml +26 -0
  133. data/Plugins/Apps/Podman/Connection.rb +24 -0
  134. data/Plugins/Apps/Podman/Podman.lmm.rb +80 -0
  135. data/Plugins/Apps/Podman/storage.conf +6 -0
  136. data/Plugins/Apps/Postfix/Postfix.lmm.rb +249 -145
  137. data/Plugins/Apps/PostgreSQL/Connection.rb +97 -0
  138. data/Plugins/Apps/PostgreSQL/PostgreSQL.lmm.rb +204 -99
  139. data/Plugins/Apps/Pterodactyl/Pterodactyl.conf.erb +0 -3
  140. data/Plugins/Apps/Pterodactyl/Pterodactyl.lmm.rb +0 -2
  141. data/Plugins/Apps/Pterodactyl/Wings.conf.erb +0 -3
  142. data/Plugins/Apps/RVM/RVM.lmm.rb +57 -0
  143. data/Plugins/Apps/Roundcube/Roundcube.conf.erb +72 -0
  144. data/Plugins/Apps/Roundcube/Roundcube.lmm.rb +141 -0
  145. data/Plugins/Apps/SSH/SSH.lmm.rb +9 -15
  146. data/Plugins/Apps/SearXNG/SearXNG.container +22 -0
  147. data/Plugins/Apps/SearXNG/SearXNG.lmm.rb +79 -0
  148. data/Plugins/Apps/SearXNG/limiter.toml +40 -0
  149. data/Plugins/Apps/SearXNG/settings.yml +2 -0
  150. data/Plugins/Apps/SigNoz/Config/alerts.yml +11 -0
  151. data/Plugins/Apps/SigNoz/Config/otel-collector-config.yaml +110 -0
  152. data/Plugins/Apps/SigNoz/Config/otel-collector-opamp-config.yaml +1 -0
  153. data/Plugins/Apps/SigNoz/Config/prometheus.yml +18 -0
  154. data/Plugins/Apps/SigNoz/SigNoz-Collector.container +23 -0
  155. data/Plugins/Apps/SigNoz/SigNoz-Migrator.container +17 -0
  156. data/Plugins/Apps/SigNoz/SigNoz.conf.erb +61 -0
  157. data/Plugins/Apps/SigNoz/SigNoz.container +26 -0
  158. data/Plugins/Apps/SigNoz/SigNoz.lmm.rb +319 -0
  159. data/Plugins/Apps/Solr/log4j2.xml +89 -0
  160. data/Plugins/Apps/Solr/solr.lmm.rb +82 -0
  161. data/Plugins/Apps/Sunshine/Sunshine.conf.erb +0 -3
  162. data/Plugins/Apps/Sunshine/Sunshine.lmm.rb +0 -1
  163. data/Plugins/Apps/Tunnel/tunnel.lmm.rb +59 -0
  164. data/Plugins/Apps/Tunnel/tunnelTCP.service +9 -0
  165. data/Plugins/Apps/Tunnel/tunnelTCP.socket +9 -0
  166. data/Plugins/Apps/Tunnel/tunnelUDP.service +9 -0
  167. data/Plugins/Apps/Tunnel/tunnelUDP.socket +9 -0
  168. data/Plugins/Apps/UVdesk/UVdesk.conf.erb +0 -3
  169. data/Plugins/Apps/Umami/Umami.container +19 -0
  170. data/Plugins/Apps/Umami/Umami.lmm.rb +108 -0
  171. data/Plugins/Apps/Valkey/Valkey.lmm.rb +64 -20
  172. data/Plugins/Apps/Vaultwarden/Vaultwarden.conf.erb +9 -6
  173. data/Plugins/Apps/Vaultwarden/Vaultwarden.container +7 -1
  174. data/Plugins/Apps/Vaultwarden/Vaultwarden.lmm.rb +67 -28
  175. data/Plugins/Apps/Wiki.js/Wiki.js.conf.erb +39 -0
  176. data/Plugins/Apps/Wiki.js/Wiki.js.container +20 -0
  177. data/Plugins/Apps/Wiki.js/Wiki.js.lmm.rb +55 -0
  178. data/Plugins/Apps/YaCy/YaCy.conf.erb +93 -0
  179. data/Plugins/Apps/YaCy/YaCy.container +21 -0
  180. data/Plugins/Apps/YaCy/YaCy.lmm.rb +160 -0
  181. data/Plugins/Apps/ZooKeeper/ZooKeeper.container +24 -0
  182. data/Plugins/Apps/ZooKeeper/ZooKeeper.lmm.rb +68 -0
  183. data/Plugins/Apps/bitmagnet/bitmagnet.conf.erb +0 -3
  184. data/Plugins/Apps/bitmagnet/bitmagnet.lmm.rb +0 -1
  185. data/Plugins/Apps/gollum/gollum.conf.erb +40 -4
  186. data/Plugins/Apps/gollum/gollum.container +10 -1
  187. data/Plugins/Apps/gollum/gollum.lmm.rb +56 -47
  188. data/Plugins/Apps/llama.cpp/llama.cpp.container +28 -0
  189. data/Plugins/Apps/llama.cpp/llama.cpp.lmm.rb +90 -0
  190. data/Plugins/Apps/vLLM/vLLM.container +32 -0
  191. data/Plugins/Apps/vLLM/vLLM.lmm.rb +89 -0
  192. data/Plugins/OS/General/Utils.lmm.rb +26 -0
  193. data/Plugins/OS/Linux/Connection.rb +472 -0
  194. data/Plugins/OS/Linux/Debian/preseed.cfg.erb +81 -0
  195. data/Plugins/OS/Linux/Distributions.yaml +32 -0
  196. data/Plugins/OS/Linux/Flavours.yaml +24 -0
  197. data/Plugins/OS/Linux/Grub/grub.cfg +10 -0
  198. data/Plugins/OS/Linux/HTTP.rb +32 -0
  199. data/Plugins/OS/Linux/Linux.lmm.rb +708 -174
  200. data/Plugins/OS/Linux/Packages.yaml +67 -3
  201. data/Plugins/OS/Linux/Proxmox/answer.toml.erb +30 -0
  202. data/Plugins/OS/Linux/Services.yaml +8 -0
  203. data/Plugins/OS/Linux/Shell.rb +70 -0
  204. data/Plugins/OS/Linux/Syslinux/default +8 -0
  205. data/Plugins/OS/Linux/WireGuard/WireGuard.lmm.rb +93 -40
  206. data/Plugins/OS/Linux/WireGuard/wg0.conf.erb +3 -0
  207. data/Plugins/OS/Linux/openSUSE/autoinst.xml.erb +29 -3
  208. data/Plugins/OS/Linux/systemd/systemd.lmm.rb +13 -11
  209. data/Plugins/OS/Routers/Aruba/ArubaInstant.lmm.rb +6 -5
  210. data/Plugins/Platforms/GitHub.lmm.rb +73 -28
  211. data/Plugins/Platforms/GoDaddy/GoDaddy.lmm.rb +10 -7
  212. data/Plugins/Platforms/Proxmox/Proxmox.lmm.rb +402 -0
  213. data/Plugins/Platforms/Proxmox/XTerm.rb +321 -0
  214. data/Plugins/Platforms/libvirt/libvirt.lmm.rb +41 -15
  215. data/Plugins/Platforms/porkbun.lmm.rb +12 -2
  216. data/Plugins/Platforms/porkbun_spec.rb +2 -2
  217. data/Plugins/Services/DNS/AmberBit.lmm.rb +1 -1
  218. data/Plugins/Services/DNS/ArubaItDNS.lmm.rb +1 -1
  219. data/Plugins/Services/DNS/NICLV.lmm.rb +1 -1
  220. data/Plugins/Services/DNS/PowerDNS.lmm.rb +130 -41
  221. data/Plugins/Services/DNS/tonic.lmm.rb +22 -12
  222. data/bootstrap.sh +41 -3
  223. data/lib/ConfigLMM/Framework/plugins/dns.rb +4 -3
  224. data/lib/ConfigLMM/Framework/plugins/linuxApp.rb +187 -144
  225. data/lib/ConfigLMM/Framework/plugins/nginxApp.rb +54 -6
  226. data/lib/ConfigLMM/Framework/plugins/plugin.rb +68 -140
  227. data/lib/ConfigLMM/Framework/plugins/store.rb +4 -4
  228. data/lib/ConfigLMM/Framework/variables.rb +75 -0
  229. data/lib/ConfigLMM/Framework.rb +1 -0
  230. data/lib/ConfigLMM/cli.rb +13 -5
  231. data/lib/ConfigLMM/commands/cleanup.rb +1 -0
  232. data/lib/ConfigLMM/commands/configsCommand.rb +38 -5
  233. data/lib/ConfigLMM/commands/diff.rb +33 -9
  234. data/lib/ConfigLMM/context.rb +22 -3
  235. data/lib/ConfigLMM/io/configList.rb +85 -7
  236. data/lib/ConfigLMM/io/connection.rb +143 -0
  237. data/lib/ConfigLMM/io/dhcp.rb +330 -0
  238. data/lib/ConfigLMM/io/http.rb +78 -0
  239. data/lib/ConfigLMM/io/local.rb +207 -0
  240. data/lib/ConfigLMM/io/pxe.rb +92 -0
  241. data/lib/ConfigLMM/io/ssh.rb +156 -0
  242. data/lib/ConfigLMM/io/tftp.rb +105 -0
  243. data/lib/ConfigLMM/io.rb +2 -0
  244. data/lib/ConfigLMM/secrets/envStore.rb +39 -0
  245. data/lib/ConfigLMM/secrets/fileStore.rb +43 -0
  246. data/lib/ConfigLMM/state.rb +12 -3
  247. data/lib/ConfigLMM/version.rb +2 -1
  248. data/lib/ConfigLMM.rb +1 -0
  249. data/{Examples → scripts}/configlmmAuth.sh +7 -5
  250. metadata +257 -9
@@ -0,0 +1,160 @@
1
+ require 'digest'
2
+
3
+ module ConfigLMM
4
+ module LMM
5
+ class YaCy < Framework::Plugin
6
+
7
+ USER = 'yacy'
8
+ HOME_DIR = '/var/lib/yacy'
9
+ PORT = 8090
10
+
11
+ def actionYaCyDeploy(id, target, activeState, context, options)
12
+ self.withConnection(target['Location'], target) do |connection|
13
+ Linux.withConnection(connection) do |linuxConnection|
14
+ if !target.key?('Proxy') || target['Proxy'] == false
15
+ deployYaCyService(linuxConnection, target, activeState, context, options)
16
+ end
17
+
18
+ deployYaCyProxy(linuxConnection, target, activeState, context, options)
19
+
20
+ if !target.key?('Proxy') || target['Proxy'] == false
21
+ linuxConnection.reloadUserServices(USER, options)
22
+ linuxConnection.restartUserService(USER, 'YaCy', options)
23
+ end
24
+ end
25
+ end
26
+ end
27
+
28
+ def deployYaCyService(linuxConnection, target, activeState, context, options)
29
+ Podman.ensurePresent(linuxConnection, options)
30
+ Podman.createUser(USER, HOME_DIR, 'YaCy', linuxConnection, options)
31
+ linuxConnection.withUserShell(USER) do |shell|
32
+ shell.createDirs(options, '~/DATA')
33
+ end
34
+
35
+ path = Podman.containersPath(HOME_DIR)
36
+
37
+ linuxConnection.fileWrite("#{path}/YaCy.env", '', options)
38
+
39
+ linuxConnection.setUserGroup("#{path}/YaCy.env", USER, USER, options)
40
+ linuxConnection.setPrivate("#{path}/YaCy.env", options)
41
+
42
+ linuxConnection.upload(__dir__ + '/YaCy.container', path, options)
43
+
44
+ linuxConnection.reloadUserServices(USER, options)
45
+
46
+ configMissing = !linuxConnection.filePresent?("#{HOME_DIR}/DATA/SETTINGS/yacy.conf", { **options, 'dry': false })
47
+
48
+ linuxConnection.restartUserService(USER, 'YaCy', options) if configMissing
49
+
50
+ linuxConnection.stopUserService(USER, 'YaCy', options)
51
+
52
+ settings = target['Settings'].to_h
53
+ settings['remotesearch.https.preferred'] = true if settings['remotesearch.https.preferred'] != false
54
+ settings['network.unit.protocol.https.preferred'] = true if settings['network.unit.protocol.https.preferred'] != false
55
+ settings['upnp.enabled'] = false if settings['upnp.enabled'] != true
56
+ settings['browserPopUpTrigger'] = false if settings['browserPopUpTrigger'] != false
57
+ settings['seedFilePath'] = '/opt/yacy_search_server/DATA/HTDOCS/seed.txt' unless settings['seedFilePath']
58
+
59
+ settings['adminAccountUserName'] = nil
60
+ settings['adminRealm'] = nil
61
+
62
+ if !target['Admin'].to_h.empty?
63
+ settings['adminAccountUserName'] = target['Admin']['Username']
64
+ settings['adminRealm'] = target['Admin']['Realm']
65
+ end
66
+
67
+ if !settings['adminAccountUserName']
68
+ settings['adminAccountUserName'] = linuxConnection.exec("grep '^adminAccountUserName=' '#{HOME_DIR}/DATA/SETTINGS/yacy.conf' | cut -d= -f2").strip
69
+ end
70
+
71
+ if !settings['adminRealm']
72
+ settings['adminRealm'] = linuxConnection.exec("grep '^adminRealm=' '#{HOME_DIR}/DATA/SETTINGS/yacy.conf' | cut -d= -f2").strip
73
+ end
74
+
75
+ adminPassword = context.secrets.load(target['SecretId'], 'ADMIN_PASSWORD')
76
+ if !adminPassword
77
+ adminPassword = SecureRandom.alphanumeric(30)
78
+ if !options['dry']
79
+ context.secrets.store(target['SecretId'], 'ADMIN_PASSWORD', adminPassword)
80
+ context.secrets.print("YaCy Admin '#{settings['adminAccountUserName']}' password", adminPassword)
81
+ end
82
+ end
83
+
84
+ settings['adminAccountBase64MD5'] = 'MD5:' + Digest::MD5.hexdigest("#{settings['adminAccountUserName']}:#{settings['adminRealm']}:#{adminPassword}")
85
+
86
+ settings.each do |name, value|
87
+ hide = name == 'adminAccountBase64MD5'
88
+ linuxConnection.fileReplace("#{HOME_DIR}/DATA/SETTINGS/yacy.conf", "^#{name}=.*", "#{name}=#{value}", { **options, hide: hide })
89
+ end
90
+
91
+ target['Profile'].to_h.each do |name, value|
92
+ linuxConnection.fileReplace("#{HOME_DIR}/DATA/SETTINGS/profile.txt", "^#{name}=.*", "#{name}=#{value.gsub(':', '\\:')}", options)
93
+ end
94
+
95
+ if settings['staticIP']
96
+ linuxConnection.fileReplace("#{HOME_DIR}/DATA/INDEX/freeworld/NETWORK/mySeed.txt", "IP=[^,]*,", "IP=#{settings['staticIP']},", options)
97
+ end
98
+
99
+ if target['PeerName']
100
+ linuxConnection.fileReplace("#{HOME_DIR}/DATA/INDEX/freeworld/NETWORK/mySeed.txt", "Name=[^,]*,", "Name=#{target['PeerName']},", options)
101
+ end
102
+
103
+ if target['SeedURL']
104
+ linuxConnection.fileReplace("#{HOME_DIR}/DATA/INDEX/freeworld/NETWORK/mySeed.txt", "seedURL=[^,]*,", "seedURL=#{target['SeedURL']},", options)
105
+ end
106
+
107
+ settings['adminAccountBase64MD5'] = '<REDACTED>'
108
+ end
109
+
110
+ def deployYaCyProxy(linuxConnection, target, activeState, context, options)
111
+ if !target.key?('Proxy') || target['Proxy']
112
+ raise Framework::PluginProcessError.new('Domain field must be set!') if !target['Domain'] && (!target.key?('Proxy') || target['Proxy'])
113
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
114
+ target['Server'] = '127.0.0.1:' + PORT.to_s unless target['Server']
115
+ target['Server'] += ':' + PORT.to_s unless target['Server'].include?(':')
116
+ nginxConnection.writeConfig(__dir__, 'YaCy', target, activeState, context, options)
117
+ nginxConnection.deployAllConfigs(target, activeState, context, options)
118
+ end
119
+ elsif target.key?('Proxy') && target['Proxy'] == false
120
+ path = Podman.containersPath(HOME_DIR)
121
+ linuxConnection.fileReplace("#{path}/YaCy.container", 'PublishPort=127.0.0.1:', 'PublishPort=0.0.0.0:', options)
122
+ linuxConnection.firewallAddPort("#{PORT}/tcp", options)
123
+ end
124
+ end
125
+
126
+ def cleanup(configs, state, context, options)
127
+ cleanupType(:YaCy, configs, state, context, options) do |item, id, state, context, options, connection|
128
+ Linux.withConnection(connection) do |linuxConnection|
129
+
130
+ if !item['Config'].key?('Proxy') || item['Config']['Proxy']
131
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
132
+ nginxConnection.cleanupConfig('YaCy', context, options)
133
+ nginxConnection.reload(options)
134
+ end
135
+ elsif item['Config'].key?('Proxy') && item['Config']['Proxy'] == false
136
+ linuxConnection.firewallRemovePort("#{PORT}/tcp", options)
137
+ end
138
+
139
+ if !target.key?('Proxy') || target['Proxy'] == false
140
+ linuxConnection.stopUserService(USER, 'YaCy', options)
141
+
142
+ path = Podman.containersPath(HOME_DIR)
143
+ linuxConnection.rm(path + '/YaCy.container', options[:dry])
144
+
145
+ state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
146
+
147
+ if options[:destroy]
148
+ linuxConnection.deleteUserAndGroup(USER, options)
149
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
150
+ end
151
+ else
152
+ state.item(id)['Status'] = options[:destroy] ? State::STATUS_DESTROYED : State::STATUS_DELETED unless options[:dry]
153
+ end
154
+ end
155
+ end
156
+ end
157
+
158
+ end
159
+ end
160
+ end
@@ -0,0 +1,24 @@
1
+
2
+ [Unit]
3
+ Description=Apache ZooKeeper container
4
+ After=local-fs.target
5
+
6
+ [Container]
7
+ ContainerName=ZooKeeper
8
+ Image=docker.io/bitnami/zookeeper:latest
9
+ EnvironmentFile=/var/lib/zookeeper/.config/containers/systemd/ZooKeeper.env
10
+ PublishPort=127.0.0.1:2181:2181
11
+ PublishPort=127.0.0.1:2888:2888
12
+ PublishPort=127.0.0.1:3888:3888
13
+ PublishPort=127.0.0.1:18500:8080
14
+ UserNS=keep-id:uid=1001,gid=1001
15
+ Volume=/var/lib/zookeeper/data:/bitnami/zookeeper/data
16
+ LogDriver=journald
17
+ AutoUpdate=registry
18
+
19
+ [Service]
20
+ TimeoutStartSec=6min
21
+ Restart=on-failure
22
+
23
+ [Install]
24
+ WantedBy=multi-user.target default.target
@@ -0,0 +1,68 @@
1
+
2
+ module ConfigLMM
3
+ module LMM
4
+ class ZooKeeper < Framework::Plugin
5
+
6
+ USER = 'zookeeper'
7
+ HOME_DIR = '/var/lib/zookeeper'
8
+ SERVICE_NAME = 'ZooKeeper'
9
+
10
+ def actionZooKeeperDeploy(id, target, activeState, context, options)
11
+ self.withConnection(target['Location'], target) do |connection|
12
+ Linux.withConnection(connection) do |linuxConnection|
13
+ Podman.ensurePresent(linuxConnection, options)
14
+ Podman.createUser(USER, HOME_DIR, 'ZooKeeper', linuxConnection, options)
15
+ linuxConnection.withUserShell(USER) do |shell|
16
+ shell.createDirs(options, '~/data')
17
+ end
18
+
19
+ username = target['Username'] || context.secrets.load(target['SecretId'], 'USERNAME') || 'zookeeper'
20
+ context.secrets.store(target['SecretId'], 'USERNAME', username)
21
+ password = context.secrets.load(target['SecretId'], 'PASSWORD')
22
+ if password.nil?
23
+ password = SecureRandom.alphanumeric(20)
24
+ context.secrets.store(target['SecretId'], 'PASSWORD', password)
25
+ context.secrets.print("#{username} password", password)
26
+ end
27
+
28
+ path = Podman.containersPath(HOME_DIR)
29
+ linuxConnection.fileWrite("#{path}/ZooKeeper.env", 'ZOO_ENABLE_AUTH=yes', options)
30
+ linuxConnection.fileAppend("#{path}/ZooKeeper.env", 'ZOO_AUTOPURGE_INTERVAL=1', options)
31
+
32
+ if target['ServerID']
33
+ linuxConnection.fileAppend("#{path}/ZooKeeper.env", "ZOO_SERVER_ID=#{target['ServerID']}", options)
34
+ end
35
+
36
+ linuxConnection.fileAppend("#{path}/ZooKeeper.env", "ZOO_SERVER_USERS=#{username}", options)
37
+ linuxConnection.fileAppend("#{path}/ZooKeeper.env", "ZOO_SERVER_PASSWORDS=#{password}", { **options, hide: true })
38
+ linuxConnection.setUserGroup("#{path}/ZooKeeper.env", USER, USER, options)
39
+ linuxConnection.setPrivate("#{path}/ZooKeeper.env", options)
40
+
41
+ linuxConnection.upload(__dir__ + '/ZooKeeper.container', path, options)
42
+ linuxConnection.reloadUserServices(USER, options)
43
+ linuxConnection.restartUserService(USER, SERVICE_NAME, options)
44
+ end
45
+ end
46
+ end
47
+
48
+ def cleanup(configs, state, context, options)
49
+ cleanupType(:ZooKeeper, configs, state, context, options) do |item, id, state, context, options, connection|
50
+ Linux.withConnection(connection) do |linuxConnection|
51
+ linuxConnection.stopUserService(USER, SERVICE_NAME, options)
52
+
53
+ path = Podman.containersPath(HOME_DIR)
54
+ linuxConnection.rm("#{path}/ZooKeeper.container", options[:dry])
55
+
56
+ state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
57
+
58
+ if options[:destroy]
59
+ linuxConnection.deleteUserAndGroup(USER, options)
60
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
61
+ end
62
+ end
63
+ end
64
+ end
65
+
66
+ end
67
+ end
68
+ end
@@ -16,9 +16,6 @@ server {
16
16
 
17
17
  server_name <%= config['Domain'] %>;
18
18
 
19
- access_log /var/log/nginx/bitmagnet.access.log;
20
- error_log /var/log/nginx/bitmagnet.error.log;
21
-
22
19
  include config-lmm/private.conf;
23
20
  include config-lmm/errors.conf;
24
21
 
@@ -10,7 +10,6 @@ module ConfigLMM
10
10
  def actionBitmagnetDeploy(id, target, activeState, context, options)
11
11
  if !target['Location'] || target['Location'] == '@me'
12
12
  deployNginxConfig(id, target, activeState, context, options)
13
- activeState['Location'] = '@me'
14
13
  end
15
14
  end
16
15
 
@@ -33,11 +33,11 @@ server {
33
33
  root <%= config['Root'] %>;
34
34
  <% end %>
35
35
 
36
- access_log /var/log/nginx/gollum.access.log;
37
- error_log /var/log/nginx/gollum.error.log;
36
+ <% if config['AuthentikDomain'].nil? %>
37
+ include config-lmm/private.conf;
38
+ <% end %>
38
39
 
39
- include config-lmm/private.conf;
40
- include config-lmm/errors.conf;
40
+ include config-lmm/gateway-errors.conf;
41
41
 
42
42
  <% if config['CertName'] %>
43
43
  ssl_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/fullchain.pem";
@@ -62,7 +62,43 @@ server {
62
62
  location / {
63
63
  proxy_pass <%= config['Server'] %>;
64
64
 
65
+ <% if config['AuthentikDomain'] %>
66
+ error_page 401 = @authenticate;
67
+ include config-lmm/errors.conf;
68
+
69
+ auth_request /outpost.goauthentik.io/auth/nginx;
70
+
71
+ # translate headers from the outposts back to the actual upstream
72
+ auth_request_set $authentik_username $upstream_http_x_authentik_username;
73
+ auth_request_set $authentik_groups $upstream_http_x_authentik_groups;
74
+ auth_request_set $authentik_email $upstream_http_x_authentik_email;
75
+ auth_request_set $authentik_name $upstream_http_x_authentik_name;
76
+ auth_request_set $authentik_uid $upstream_http_x_authentik_uid;
77
+
78
+ proxy_set_header REMOTE_USER $authentik_username;
79
+ proxy_set_header REMOTE_GROUPS $authentik_groups;
80
+ proxy_set_header REMOTE_EMAIL $authentik_email;
81
+ proxy_set_header REMOTE_NAME $authentik_name;
82
+ proxy_set_header REMOTE_UID $authentik_uid;
83
+ <% end %>
84
+
65
85
  include config-lmm/proxy.conf;
66
86
  }
67
87
  <% end %>
88
+
89
+ <% if config['AuthentikDomain'] %>
90
+ location /outpost.goauthentik.io {
91
+ proxy_pass https://<%= config['AuthentikDomain'] %>/outpost.goauthentik.io;
92
+ proxy_ssl_protocols TLSv1.2 TLSv1.3;
93
+ proxy_set_header X-Authentik-Host $host;
94
+ proxy_set_header X-Original-URL $scheme://$http_host$request_uri;
95
+ proxy_pass_request_body off;
96
+ proxy_set_header Content-Length "";
97
+ }
98
+
99
+ location @authenticate {
100
+ internal;
101
+ return 302 /outpost.goauthentik.io/start?rd=$request_uri;
102
+ }
103
+ <% end %>
68
104
  }
@@ -3,10 +3,19 @@ Description=gollum container
3
3
  After=local-fs.target
4
4
 
5
5
  [Container]
6
- Image=gollumwiki/gollum:master
6
+ ContainerName=gollum
7
+ Image=docker.io/gollumwiki/gollum:master
8
+ Exec=--config=/config/config.rb
7
9
  PublishPort=0.0.0.0:14567:4567
8
10
  UserNS=keep-id:uid=1000,gid=1000
9
11
  Volume=/srv/gollum/repo:/wiki
12
+ Volume=/srv/gollum/config:/config
13
+ LogDriver=journald
14
+ AutoUpdate=registry
15
+
16
+ [Service]
17
+ TimeoutStartSec=6min
18
+ Restart=on-failure
10
19
 
11
20
  [Install]
12
21
  WantedBy=multi-user.target default.target
@@ -1,19 +1,21 @@
1
1
 
2
2
  module ConfigLMM
3
3
  module LMM
4
- class Gollum < Framework::NginxApp
4
+ class Gollum < Framework::Plugin
5
5
 
6
6
  NAME = 'gollum'
7
7
  USER = 'gollum'
8
8
  GOLLUM_PATH = '/srv/gollum'
9
- HOME_DIR = '/var/lib/authentik'
9
+ GOLLUM_PORT = '14567'
10
10
 
11
11
  def actionGollumBuild(id, target, activeState, context, options)
12
- writeNginxConfig(__dir__, NAME, id, target, activeState, context, options)
12
+ Nginx.withConnection(local) do |nginxConnection|
13
+ nginxConnection.writeConfig(__dir__, NAME, target, state, context, options)
14
+ end
13
15
  targetDir = options['output'] + GOLLUM_PATH
14
- mkdir(targetDir, options['dry'])
15
- copy(__dir__ + '/config.ru', targetDir, options['dry'])
16
- `git init #{targetDir}/repo`
16
+ local.mkdir(targetDir + '/config', options['dry'])
17
+ local.copy(__dir__ + '/config.ru', targetDir, options['dry'])
18
+ local.exec("git init #{targetDir}/repo", options)
17
19
  end
18
20
 
19
21
  def actionGollumRefresh(id, target, activeState, context, options)
@@ -21,57 +23,64 @@ module ConfigLMM
21
23
  end
22
24
 
23
25
  def actionGollumDeploy(id, target, activeState, context, options)
24
- if target['Location'] && target['Location'] != '@me'
25
- uri = Addressable::URI.parse(target['Location'])
26
- self.class.sshStart(uri) do |ssh|
26
+ self.withConnection(target['Location'], target) do |connection|
27
+ Linux.withConnection(connection) do |linuxConnection|
27
28
  if !target.key?('Proxy') || !!target['Proxy']
28
- self.class.prepareNginxConfig(target, ssh)
29
- if !target['Root']
30
- gollumPath = ssh.exec!('gem which gollum').strip
31
- target['Root'] = File.dirname(gollumPath) + '/gollum/public'
29
+ #if !target['Root']
30
+ # gollumPath = linuxConnection.exec('gem which gollum', true).strip
31
+ # target['Root'] = File.dirname(gollumPath) + '/gollum/public'
32
+ #end
33
+
34
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
35
+ target['ConfigName'] = target['Name']
36
+ nginxConnection.provision(__dir__, NAME, target, activeState, context, options)
32
37
  end
33
- writeNginxConfig(__dir__, NAME, id, target, state, context, options)
34
- deployNginxConfig(id, target, activeState, context, options)
35
38
  end
36
39
  if !target.key?('Proxy') || target['Proxy'] != 'only'
37
- distroInfo = Framework::LinuxApp.currentDistroInfo(ssh)
38
- Framework::LinuxApp.configurePodmanServiceOverSSH(USER, GOLLUM_PATH, 'gollum', distroInfo, ssh)
39
- self.class.uploadFolder(options['output'] + GOLLUM_PATH, '/srv', ssh)
40
- path = Framework::LinuxApp::SYSTEMD_CONTAINERS_PATH.gsub('~', GOLLUM_PATH)
41
- ssh.scp.upload!(__dir__ + '/gollum.container', path)
42
- self.class.sshExec!(ssh, "chown -R #{USER}:#{USER} #{GOLLUM_PATH}")
43
- self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@ daemon-reload")
44
- self.class.sshExec!(ssh, "systemctl --user --machine=#{USER}@ start gollum")
45
- end
46
- end
47
- else
48
- targetDir = GOLLUM_PATH
49
- mkdir(targetDir, options['dry'])
50
- if !target.key?('Proxy') || !!target['Proxy']
51
- self.class.prepareNginxConfig(target)
52
- if !target['Root']
53
- target['Root'] = File.dirname(`gem which gollum`.strip) + '/gollum/public'
40
+ Podman.ensurePresent(linuxConnection, options)
41
+ Podman.createUser(USER, GOLLUM_PATH, 'gollum', linuxConnection, options)
42
+ linuxConnection.withUserShell(USER) do |shell|
43
+ shell.createDirs(options, '~/data')
44
+ end
45
+
46
+ if !linuxConnection.filePresent?(GOLLUM_PATH, options)
47
+ if target['Config']
48
+ local.copy(target['Config'], "#{options['output'] + GOLLUM_PATH}/config/config.rb", options['dry'])
49
+ else
50
+ local.fileWrite(options['output'] + GOLLUM_PATH + "/config/config.rb", '', options['dry'])
51
+ end
52
+ linuxConnection.uploadFolder(options['output'] + GOLLUM_PATH, '/srv', options)
53
+ else
54
+ if target['Config']
55
+ linuxConnection.upload(target['Config'], "#{GOLLUM_PATH}/config/config.rb", options)
56
+ end
57
+ end
58
+
59
+ path = Podman.containersPath(GOLLUM_PATH)
60
+ linuxConnection.upload(__dir__ + '/gollum.container', path, options)
61
+
62
+ linuxConnection.setUserGroup(GOLLUM_PATH, USER, USER, options)
63
+ linuxConnection.reloadUserServices(USER, options)
64
+ linuxConnection.restartUserService(USER, 'gollum', options)
65
+ if target['Proxy'] != 'only'
66
+ linuxConnection.firewallAddPort(GOLLUM_PORT + '/tcp', options)
67
+ end
54
68
  end
55
- writeNginxConfig(__dir__, NAME, id, target, state, context, options)
56
- deployNginxConfig(id, target, activeState, context, options)
57
- end
58
- if !target.key?('Proxy') || target['Proxy'] != 'only'
59
- copy(options['output'] + GOLLUM_PATH + '/config.ru', GOLLUM_PATH, options['dry'])
60
- copyNotPresent(options['output'] + GOLLUM_PATH + '/repo', GOLLUM_PATH, options['dry'])
61
- chown('http', 'http', GOLLUM_PATH, options['dry'])
62
69
  end
63
- activeState['Location'] = '@me'
64
70
  end
65
71
  end
66
72
 
67
73
  def cleanup(configs, state, context, options)
68
- items = state.selectType(:Gollum)
69
- items.each do |id, item|
70
- if !configs.key?(id)
71
- if item['Location'] == '@me'
72
- cleanupNginxConfig(NAME, id, state, context, options)
73
- else
74
- # TODO
74
+ cleanupType(:Gollum, configs, state, context, options) do |item, id, state, context, options, connection|
75
+ if !item['Config'].key?('Proxy') || !!item['Config']['Proxy']
76
+ Linux.withConnection(connection) do |linuxConnection|
77
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
78
+ configName = NAME
79
+ configName = item['Config']['ConfigName'] if item['Config']['ConfigName']
80
+ nginxConnection.cleanupConfig(configName, context, options)
81
+ nginxConnection.reload(options)
82
+ end
83
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
75
84
  end
76
85
  end
77
86
  end
@@ -0,0 +1,28 @@
1
+
2
+ [Unit]
3
+ Description=llama.cpp container
4
+ After=local-fs.target
5
+
6
+ [Container]
7
+ ContainerName=llama.cpp
8
+ Image=ghcr.io/ggml-org/llama.cpp:full
9
+ Exec=--server --host 0.0.0.0 $ARGS
10
+ EnvironmentFile=/var/lib/llama.cpp/.config/containers/systemd/llama.cpp.env
11
+ PublishPort=127.0.0.1:18900:8080
12
+ UserNS=keep-id:uid=1000,gid=1000
13
+ # Need newer Podman to use this
14
+ #GroupAdd=keep-groups
15
+ PodmanArgs=--group-add keep-groups
16
+ #PodmanArgs=--passwd-entry 'llama.cpp:x:1000:1000:llama.cpp:/home/llama.cpp:/bin/bash'
17
+ Volume=/var/lib/llama.cpp/.cache:/app/.cache
18
+ Volume=/var/lib/llama.cpp/models:/models
19
+ $DEVICES
20
+ LogDriver=journald
21
+ AutoUpdate=registry
22
+
23
+ [Service]
24
+ TimeoutStartSec=12min
25
+ Restart=on-failure
26
+
27
+ [Install]
28
+ WantedBy=multi-user.target default.target
@@ -0,0 +1,90 @@
1
+
2
+
3
+ module ConfigLMM
4
+ module LMM
5
+ class Llamacpp < Framework::Plugin
6
+
7
+ USER = 'llama.cpp'
8
+ HOME_DIR = '/var/lib/llama.cpp'
9
+ PORT = 18900
10
+
11
+ def actionLlamacppDeploy(id, target, activeState, context, options)
12
+ raise Framework::PluginProcessError.new('Model field must be set!') unless target['Model']
13
+
14
+ self.withConnection(target['Location'], target) do |connection|
15
+ Linux.withConnection(connection) do |linuxConnection|
16
+ Podman.ensurePresent(linuxConnection, options)
17
+ Podman.createUser(USER, HOME_DIR, 'llama.cpp', linuxConnection, options)
18
+ linuxConnection.withUserShell(USER) do |shell|
19
+ shell.createDirs(options, '~/models', '~/.cache')
20
+ end
21
+
22
+ path = Podman.containersPath(HOME_DIR)
23
+
24
+ linuxConnection.fileWrite("#{path}/llama.cpp.env", '', options)
25
+ if target['Model'].end_with?('.gguf')
26
+ linuxConnection.fileAppend("#{path}/llama.cpp.env", 'LLAMA_ARG_MODEL=' + target['Model'], options)
27
+ else
28
+ linuxConnection.fileAppend("#{path}/llama.cpp.env", 'LLAMA_ARG_HF_REPO=' + target['Model'], options)
29
+ end
30
+
31
+ linuxConnection.setUserGroup("#{path}/llama.cpp.env", USER, USER, options)
32
+ linuxConnection.setPrivate("#{path}/llama.cpp.env", options)
33
+
34
+ linuxConnection.upload(__dir__ + '/llama.cpp.container', path, options)
35
+
36
+ devices = linuxConnection.getGPUDevices(options)
37
+ groups = linuxConnection.getGPUGroups(devices, options)
38
+ linuxConnection.userAddGroups(USER, groups, options)
39
+
40
+ image = nil
41
+ if devices.include?('/dev/kfd')
42
+ #image = 'full-rocm'
43
+ elsif devices.include?('nvidia.com/gpu=all')
44
+ image = 'full-cuda'
45
+ end
46
+
47
+ if image
48
+ linuxConnection.fileReplace("#{path}/llama.cpp.container", ':full', ':' + image, options)
49
+ end
50
+
51
+ args = target['Args'].to_s
52
+ linuxConnection.fileReplace("#{path}/llama.cpp.container", '\$ARGS', args, options)
53
+
54
+ devicesString = ''
55
+ if !devices.empty?
56
+ devicesString = devices.map { |device| "AddDevice=#{device}" }.join('\n')
57
+ end
58
+ linuxConnection.fileReplace("#{path}/llama.cpp.container", '\$DEVICES', devicesString, { **options, escape: false })
59
+
60
+ linuxConnection.reloadUserServices(USER, options)
61
+ linuxConnection.restartUserService(USER, 'llama.cpp', options)
62
+ end
63
+ end
64
+ end
65
+
66
+ def cleanup(configs, state, context, options)
67
+ cleanupType(:llamacpp, configs, state, context, options) do |item, id, state, context, options, connection|
68
+ Linux.withConnection(connection) do |linuxConnection|
69
+
70
+ linuxConnection.stopUserService(USER, 'llama.cpp', options)
71
+
72
+ path = Podman.containersPath(HOME_DIR)
73
+ linuxConnection.rm(path + '/llama.cpp.container', options[:dry])
74
+
75
+ linuxConnection.reloadUserServices(USER, options)
76
+
77
+ state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
78
+
79
+ if options[:destroy]
80
+ linuxConnection.deleteUserAndGroup(USER, options)
81
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
82
+ end
83
+ end
84
+ end
85
+ end
86
+
87
+ end
88
+ end
89
+ end
90
+
@@ -0,0 +1,32 @@
1
+
2
+ [Unit]
3
+ Description=vLLM container
4
+ After=local-fs.target
5
+
6
+ [Container]
7
+ ContainerName=vLLM
8
+ Image=$IMAGE
9
+ Entrypoint=["python3", "-m", "vllm.entrypoints.openai.api_server"]
10
+ Exec=$ARGS
11
+ EnvironmentFile=/var/lib/vllm/.config/containers/systemd/vLLM.env
12
+ PublishPort=127.0.0.1:18050:8000
13
+ UserNS=keep-id:uid=1000,gid=1000
14
+ # Need newer Podman to use this
15
+ #GroupAdd=keep-groups
16
+ PodmanArgs=--group-add keep-groups
17
+ #PodmanArgs=--passwd-entry 'vllm:x:1000:1000:vLLM:/home/vllm:/bin/bash'
18
+ Volume=/var/lib/vllm/.cache:/app/.cache
19
+ Volume=/var/lib/vllm/.triton:/app/.triton
20
+ Volume=/var/lib/vllm/.cache:/root/.cache
21
+ Volume=/var/lib/vllm/.cache:/workspace/.cache
22
+ ShmSize=1G
23
+ $DEVICES
24
+ LogDriver=journald
25
+ AutoUpdate=registry
26
+
27
+ [Service]
28
+ TimeoutStartSec=12min
29
+ Restart=on-failure
30
+
31
+ [Install]
32
+ WantedBy=multi-user.target default.target