ConfigLMM 0.4.0 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +34 -0
- data/CNAME +1 -0
- data/Examples/.lmm.state.yaml +159 -0
- data/Examples/ConfigLMM.mm.yaml +32 -0
- data/Examples/Implemented.mm.yaml +252 -4
- data/Examples/SmallBusiness.mm.yaml +492 -0
- data/Plugins/Apps/Answer/answer.lmm.rb +165 -0
- data/Plugins/Apps/Answer/answer@.service +40 -0
- data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.conf.erb +0 -3
- data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.lmm.rb +0 -1
- data/Plugins/Apps/Authentik/Authentik-ProxyOutpost.container +7 -1
- data/Plugins/Apps/Authentik/Authentik-Server.container +6 -1
- data/Plugins/Apps/Authentik/Authentik-Worker.container +6 -1
- data/Plugins/Apps/Authentik/Authentik.conf.erb +12 -7
- data/Plugins/Apps/Authentik/Authentik.lmm.rb +226 -61
- data/Plugins/Apps/BookStack/BookStack.conf.erb +0 -3
- data/Plugins/Apps/BookStack/BookStack.container +5 -0
- data/Plugins/Apps/BookStack/BookStack.lmm.rb +14 -3
- data/Plugins/Apps/Cassandra/Cassandra.lmm.rb +9 -19
- data/Plugins/Apps/ClickHouse/ClickHouse.container +28 -0
- data/Plugins/Apps/ClickHouse/ClickHouse.lmm.rb +113 -0
- data/Plugins/Apps/ClickHouse/Config/listen.yaml +2 -0
- data/Plugins/Apps/ClickHouse/Config/logger.yaml +8 -0
- data/Plugins/Apps/ClickHouse/Config/zookeepers.yaml +5 -0
- data/Plugins/Apps/ClickHouse/Connection.rb +96 -0
- data/Plugins/Apps/Discourse/Discourse-Sidekiq.container +5 -0
- data/Plugins/Apps/Discourse/Discourse.conf.erb +1 -4
- data/Plugins/Apps/Discourse/Discourse.container +4 -0
- data/Plugins/Apps/Discourse/Discourse.lmm.rb +116 -55
- data/Plugins/Apps/Dovecot/Dovecot.lmm.rb +74 -62
- data/Plugins/Apps/ERPNext/ERPNext-Frontend.container +6 -1
- data/Plugins/Apps/ERPNext/ERPNext-Queue.container +5 -0
- data/Plugins/Apps/ERPNext/ERPNext-Scheduler.container +5 -0
- data/Plugins/Apps/ERPNext/ERPNext-Websocket.container +6 -1
- data/Plugins/Apps/ERPNext/ERPNext.container +6 -1
- data/Plugins/Apps/ERPNext/ERPNext.lmm.rb +138 -127
- data/Plugins/Apps/GitLab/GitLab.container +6 -0
- data/Plugins/Apps/GitLab/GitLab.lmm.rb +43 -49
- data/Plugins/Apps/Homepage/Homepage.conf.erb +86 -0
- data/Plugins/Apps/Homepage/Homepage.container +19 -0
- data/Plugins/Apps/Homepage/Homepage.lmm.rb +54 -0
- data/Plugins/Apps/IPFS/IPFS.conf.erb +0 -3
- data/Plugins/Apps/IPFS/IPFS.lmm.rb +0 -1
- data/Plugins/Apps/InfluxDB/InfluxDB.conf.erb +0 -3
- data/Plugins/Apps/InfluxDB/InfluxDB.lmm.rb +0 -1
- data/Plugins/Apps/Jackett/Jackett.conf.erb +0 -3
- data/Plugins/Apps/Jackett/Jackett.lmm.rb +0 -1
- data/Plugins/Apps/Jellyfin/Jellyfin.conf.erb +0 -3
- data/Plugins/Apps/Jellyfin/Jellyfin.lmm.rb +0 -1
- data/Plugins/Apps/LetsEncrypt/LetsEncrypt.lmm.rb +49 -28
- data/Plugins/Apps/LibreTranslate/LibreTranslate.container +21 -0
- data/Plugins/Apps/LibreTranslate/LibreTranslate.lmm.rb +34 -0
- data/Plugins/Apps/Lobsters/Containerfile +81 -0
- data/Plugins/Apps/Lobsters/Lobsters-Tasks.container +26 -0
- data/Plugins/Apps/Lobsters/Lobsters.conf.erb +99 -0
- data/Plugins/Apps/Lobsters/Lobsters.container +27 -0
- data/Plugins/Apps/Lobsters/Lobsters.lmm.rb +196 -0
- data/Plugins/Apps/Lobsters/crontab +3 -0
- data/Plugins/Apps/Lobsters/database.yml +26 -0
- data/Plugins/Apps/Lobsters/entrypoint.sh +30 -0
- data/Plugins/Apps/Lobsters/generateCredentials.rb +19 -0
- data/Plugins/Apps/Lobsters/lobsters-cron.sh +25 -0
- data/Plugins/Apps/Lobsters/lobsters-daily.sh +23 -0
- data/Plugins/Apps/Lobsters/puma.rb +49 -0
- data/Plugins/Apps/MariaDB/Connection.rb +55 -0
- data/Plugins/Apps/MariaDB/MariaDB.lmm.rb +60 -53
- data/Plugins/Apps/Mastodon/Mastodon-Sidekiq.container +22 -0
- data/Plugins/Apps/Mastodon/Mastodon-Streaming.container +20 -0
- data/Plugins/Apps/Mastodon/Mastodon.conf.erb +34 -45
- data/Plugins/Apps/Mastodon/Mastodon.container +28 -0
- data/Plugins/Apps/Mastodon/Mastodon.lmm.rb +240 -5
- data/Plugins/Apps/Mastodon/configlmm.rake +30 -0
- data/Plugins/Apps/Mastodon/entrypoint.sh +16 -0
- data/Plugins/Apps/Matrix/Element.container +5 -0
- data/Plugins/Apps/Matrix/Matrix.conf.erb +2 -8
- data/Plugins/Apps/Matrix/Matrix.lmm.rb +100 -71
- data/Plugins/Apps/Matrix/Synapse.container +5 -0
- data/Plugins/Apps/Netdata/Netdata.conf.erb +0 -3
- data/Plugins/Apps/Netdata/Netdata.lmm.rb +0 -1
- data/Plugins/Apps/Nextcloud/Nextcloud.conf.erb +3 -4
- data/Plugins/Apps/Nextcloud/Nextcloud.lmm.rb +150 -68
- data/Plugins/Apps/Nextcloud/autoconfig.php +13 -0
- data/Plugins/Apps/Nextcloud/config.php +10 -1
- data/Plugins/Apps/Nextcloud/nextcloudcron.service +8 -0
- data/Plugins/Apps/Nextcloud/nextcloudcron.timer +10 -0
- data/Plugins/Apps/Nginx/Connection.rb +93 -0
- data/Plugins/Apps/Nginx/conf.d/configlmm.conf +50 -9
- data/Plugins/Apps/Nginx/conf.d/languages.conf +21 -0
- data/Plugins/Apps/Nginx/config-lmm/errors.conf +25 -20
- data/Plugins/Apps/Nginx/config-lmm/gateway-errors.conf +20 -0
- data/Plugins/Apps/Nginx/config-lmm/proxy.conf +1 -1
- data/Plugins/Apps/Nginx/main.conf.erb +7 -3
- data/Plugins/Apps/Nginx/nginx.conf +2 -2
- data/Plugins/Apps/Nginx/nginx.lmm.rb +99 -81
- data/Plugins/Apps/Nginx/proxy.conf.erb +11 -3
- data/Plugins/Apps/Odoo/Odoo.conf.erb +0 -3
- data/Plugins/Apps/Odoo/Odoo.container +5 -0
- data/Plugins/Apps/Odoo/Odoo.lmm.rb +4 -5
- data/Plugins/Apps/Ollama/Ollama.container +26 -0
- data/Plugins/Apps/Ollama/Ollama.lmm.rb +73 -0
- data/Plugins/Apps/OpenTelemetry/Config/config.yaml +704 -0
- data/Plugins/Apps/OpenTelemetry/OpenTelemetry.lmm.rb +154 -0
- data/Plugins/Apps/OpenVidu/Ingress.container +5 -0
- data/Plugins/Apps/OpenVidu/OpenVidu.conf.erb +0 -3
- data/Plugins/Apps/OpenVidu/OpenVidu.container +5 -0
- data/Plugins/Apps/OpenVidu/OpenVidu.lmm.rb +7 -3
- data/Plugins/Apps/OpenVidu/OpenViduCall.conf.erb +0 -3
- data/Plugins/Apps/OpenVidu/OpenViduCall.container +5 -0
- data/Plugins/Apps/PHP-FPM/Connection.rb +91 -0
- data/Plugins/Apps/PHP-FPM/PHP-FPM.lmm.rb +31 -4
- data/Plugins/Apps/Peppermint/Peppermint.conf.erb +2 -5
- data/Plugins/Apps/Peppermint/Peppermint.container +5 -0
- data/Plugins/Apps/Peppermint/Peppermint.lmm.rb +29 -33
- data/Plugins/Apps/Perplexica/Perplexica.container +25 -0
- data/Plugins/Apps/Perplexica/Perplexica.lmm.rb +92 -0
- data/Plugins/Apps/Perplexica/config.toml +26 -0
- data/Plugins/Apps/Podman/Connection.rb +24 -0
- data/Plugins/Apps/Podman/Podman.lmm.rb +80 -0
- data/Plugins/Apps/Podman/storage.conf +6 -0
- data/Plugins/Apps/Postfix/Postfix.lmm.rb +242 -164
- data/Plugins/Apps/PostgreSQL/Connection.rb +97 -0
- data/Plugins/Apps/PostgreSQL/PostgreSQL.lmm.rb +184 -148
- data/Plugins/Apps/Pterodactyl/Pterodactyl.conf.erb +0 -3
- data/Plugins/Apps/Pterodactyl/Pterodactyl.lmm.rb +0 -2
- data/Plugins/Apps/Pterodactyl/Wings.conf.erb +0 -3
- data/Plugins/Apps/RVM/RVM.lmm.rb +57 -0
- data/Plugins/Apps/Roundcube/Roundcube.conf.erb +0 -3
- data/Plugins/Apps/Roundcube/Roundcube.lmm.rb +15 -19
- data/Plugins/Apps/SSH/SSH.lmm.rb +9 -15
- data/Plugins/Apps/SearXNG/SearXNG.container +22 -0
- data/Plugins/Apps/SearXNG/SearXNG.lmm.rb +79 -0
- data/Plugins/Apps/SearXNG/limiter.toml +40 -0
- data/Plugins/Apps/SearXNG/settings.yml +2 -0
- data/Plugins/Apps/SigNoz/Config/alerts.yml +11 -0
- data/Plugins/Apps/SigNoz/Config/otel-collector-config.yaml +110 -0
- data/Plugins/Apps/SigNoz/Config/otel-collector-opamp-config.yaml +1 -0
- data/Plugins/Apps/SigNoz/Config/prometheus.yml +18 -0
- data/Plugins/Apps/SigNoz/SigNoz-Collector.container +23 -0
- data/Plugins/Apps/SigNoz/SigNoz-Migrator.container +17 -0
- data/Plugins/Apps/SigNoz/SigNoz.conf.erb +61 -0
- data/Plugins/Apps/SigNoz/SigNoz.container +26 -0
- data/Plugins/Apps/SigNoz/SigNoz.lmm.rb +319 -0
- data/Plugins/Apps/Solr/log4j2.xml +89 -0
- data/Plugins/Apps/Solr/solr.lmm.rb +82 -0
- data/Plugins/Apps/Sunshine/Sunshine.conf.erb +0 -3
- data/Plugins/Apps/Sunshine/Sunshine.lmm.rb +0 -1
- data/Plugins/Apps/Tunnel/tunnel.lmm.rb +33 -37
- data/Plugins/Apps/UVdesk/UVdesk.conf.erb +0 -3
- data/Plugins/Apps/Umami/Umami.container +19 -0
- data/Plugins/Apps/Umami/Umami.lmm.rb +108 -0
- data/Plugins/Apps/Valkey/Valkey.lmm.rb +54 -42
- data/Plugins/Apps/Vaultwarden/Vaultwarden.conf.erb +9 -6
- data/Plugins/Apps/Vaultwarden/Vaultwarden.container +7 -1
- data/Plugins/Apps/Vaultwarden/Vaultwarden.lmm.rb +64 -29
- data/Plugins/Apps/Wiki.js/Wiki.js.conf.erb +1 -4
- data/Plugins/Apps/Wiki.js/Wiki.js.container +5 -0
- data/Plugins/Apps/Wiki.js/Wiki.js.lmm.rb +31 -37
- data/Plugins/Apps/YaCy/YaCy.conf.erb +93 -0
- data/Plugins/Apps/YaCy/YaCy.container +21 -0
- data/Plugins/Apps/YaCy/YaCy.lmm.rb +160 -0
- data/Plugins/Apps/ZooKeeper/ZooKeeper.container +24 -0
- data/Plugins/Apps/ZooKeeper/ZooKeeper.lmm.rb +68 -0
- data/Plugins/Apps/bitmagnet/bitmagnet.conf.erb +0 -3
- data/Plugins/Apps/bitmagnet/bitmagnet.lmm.rb +0 -1
- data/Plugins/Apps/gollum/gollum.conf.erb +2 -4
- data/Plugins/Apps/gollum/gollum.container +6 -0
- data/Plugins/Apps/gollum/gollum.lmm.rb +51 -50
- data/Plugins/Apps/llama.cpp/llama.cpp.container +28 -0
- data/Plugins/Apps/llama.cpp/llama.cpp.lmm.rb +90 -0
- data/Plugins/Apps/vLLM/vLLM.container +32 -0
- data/Plugins/Apps/vLLM/vLLM.lmm.rb +89 -0
- data/Plugins/OS/General/Utils.lmm.rb +26 -0
- data/Plugins/OS/Linux/Connection.rb +472 -0
- data/Plugins/OS/Linux/Debian/preseed.cfg.erb +25 -6
- data/Plugins/OS/Linux/Flavours.yaml +13 -0
- data/Plugins/OS/Linux/Grub/grub.cfg +10 -0
- data/Plugins/OS/Linux/HTTP.rb +32 -0
- data/Plugins/OS/Linux/Linux.lmm.rb +533 -187
- data/Plugins/OS/Linux/Packages.yaml +20 -1
- data/Plugins/OS/Linux/Services.yaml +8 -0
- data/Plugins/OS/Linux/Shell.rb +70 -0
- data/Plugins/OS/Linux/Syslinux/default +8 -0
- data/Plugins/OS/Linux/WireGuard/WireGuard.lmm.rb +83 -59
- data/Plugins/OS/Linux/WireGuard/wg0.conf.erb +3 -0
- data/Plugins/OS/Linux/openSUSE/autoinst.xml.erb +29 -3
- data/Plugins/OS/Linux/systemd/systemd.lmm.rb +13 -11
- data/Plugins/OS/Routers/Aruba/ArubaInstant.lmm.rb +6 -5
- data/Plugins/Platforms/GitHub.lmm.rb +73 -28
- data/Plugins/Platforms/GoDaddy/GoDaddy.lmm.rb +9 -6
- data/Plugins/Platforms/Proxmox/Proxmox.lmm.rb +402 -0
- data/Plugins/Platforms/Proxmox/XTerm.rb +321 -0
- data/Plugins/Platforms/libvirt/libvirt.lmm.rb +38 -13
- data/Plugins/Platforms/porkbun.lmm.rb +12 -2
- data/Plugins/Platforms/porkbun_spec.rb +2 -2
- data/Plugins/Services/DNS/AmberBit.lmm.rb +1 -1
- data/Plugins/Services/DNS/ArubaItDNS.lmm.rb +1 -1
- data/Plugins/Services/DNS/NICLV.lmm.rb +1 -1
- data/Plugins/Services/DNS/PowerDNS.lmm.rb +70 -68
- data/Plugins/Services/DNS/tonic.lmm.rb +22 -12
- data/lib/ConfigLMM/Framework/plugins/dns.rb +4 -3
- data/lib/ConfigLMM/Framework/plugins/linuxApp.rb +145 -184
- data/lib/ConfigLMM/Framework/plugins/nginxApp.rb +34 -17
- data/lib/ConfigLMM/Framework/plugins/plugin.rb +53 -181
- data/lib/ConfigLMM/Framework/plugins/store.rb +4 -4
- data/lib/ConfigLMM/Framework/variables.rb +75 -0
- data/lib/ConfigLMM/Framework.rb +1 -0
- data/lib/ConfigLMM/cli.rb +12 -6
- data/lib/ConfigLMM/commands/configsCommand.rb +37 -6
- data/lib/ConfigLMM/commands/diff.rb +33 -9
- data/lib/ConfigLMM/context.rb +22 -3
- data/lib/ConfigLMM/io/configList.rb +82 -6
- data/lib/ConfigLMM/io/connection.rb +143 -0
- data/lib/ConfigLMM/io/dhcp.rb +330 -0
- data/lib/ConfigLMM/io/http.rb +78 -0
- data/lib/ConfigLMM/io/local.rb +207 -0
- data/lib/ConfigLMM/io/pxe.rb +92 -0
- data/lib/ConfigLMM/io/ssh.rb +156 -0
- data/lib/ConfigLMM/io/tftp.rb +105 -0
- data/lib/ConfigLMM/io.rb +2 -0
- data/lib/ConfigLMM/secrets/envStore.rb +39 -0
- data/lib/ConfigLMM/secrets/fileStore.rb +43 -0
- data/lib/ConfigLMM/state.rb +2 -1
- data/lib/ConfigLMM/version.rb +2 -1
- data/lib/ConfigLMM.rb +1 -0
- data/{Examples → scripts}/configlmmAuth.sh +7 -5
- metadata +205 -8
@@ -0,0 +1,93 @@
|
|
1
|
+
|
2
|
+
upstream yacy {
|
3
|
+
<% if config['Server'] %>
|
4
|
+
server <%= config['Server'] %>;
|
5
|
+
<% else %>
|
6
|
+
server 127.0.0.1:8090;
|
7
|
+
<% end %>
|
8
|
+
}
|
9
|
+
|
10
|
+
server {
|
11
|
+
|
12
|
+
<% if config['NginxVersion'] >= 1.25 %>
|
13
|
+
<% if !config['TLS'] %>
|
14
|
+
listen <%= config['Port'] %>;
|
15
|
+
listen [::]:<%= config['Port'] %>;
|
16
|
+
<% else %>
|
17
|
+
listen <%= config['Port'] %> ssl;
|
18
|
+
listen [::]:<%= config['Port'] %> ssl;
|
19
|
+
|
20
|
+
include config-lmm/ssl.conf;
|
21
|
+
<% end %>
|
22
|
+
http2 on;
|
23
|
+
http3 on;
|
24
|
+
quic_retry on;
|
25
|
+
add_header Alt-Svc 'h3=":443"; ma=86400';
|
26
|
+
<% else %>
|
27
|
+
<% if !config['TLS'] %>
|
28
|
+
listen <%= config['Port'] %>;
|
29
|
+
listen [::]:<%= config['Port'] %>;
|
30
|
+
<% else %>
|
31
|
+
listen <%= config['Port'] %> ssl http2;
|
32
|
+
listen [::]:<%= config['Port'] %> ssl http2;
|
33
|
+
|
34
|
+
include config-lmm/ssl.conf;
|
35
|
+
<% end %>
|
36
|
+
<% end %>
|
37
|
+
|
38
|
+
server_name <%= config['Domain'] %>;
|
39
|
+
|
40
|
+
<% if config['CertName'] %>
|
41
|
+
ssl_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/fullchain.pem";
|
42
|
+
ssl_certificate_key "/etc/letsencrypt/live/<%= config['CertName'] %>/privkey.pem";
|
43
|
+
ssl_trusted_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/chain.pem";
|
44
|
+
<% end %>
|
45
|
+
|
46
|
+
<% if config['Private'] && config['Private'] != 'partial' %>
|
47
|
+
include config-lmm/private.conf;
|
48
|
+
<% end %>
|
49
|
+
|
50
|
+
include config-lmm/errors.conf;
|
51
|
+
|
52
|
+
<% if config['Private'] == 'partial' %>
|
53
|
+
# YaCy exposes a lot of functionality and hence big attack surface
|
54
|
+
# it can be useful to limit it
|
55
|
+
|
56
|
+
location = / {
|
57
|
+
return 403;
|
58
|
+
}
|
59
|
+
|
60
|
+
location / {
|
61
|
+
include config-lmm/private.conf;
|
62
|
+
|
63
|
+
proxy_pass http://yacy;
|
64
|
+
include config-lmm/proxy.conf;
|
65
|
+
}
|
66
|
+
|
67
|
+
location = /seed.txt {
|
68
|
+
proxy_pass http://yacy/seed.txt;
|
69
|
+
include config-lmm/proxy.conf;
|
70
|
+
}
|
71
|
+
|
72
|
+
location /yacy {
|
73
|
+
proxy_pass http://yacy;
|
74
|
+
include config-lmm/proxy.conf;
|
75
|
+
}
|
76
|
+
|
77
|
+
location /solr {
|
78
|
+
proxy_pass http://yacy;
|
79
|
+
include config-lmm/proxy.conf;
|
80
|
+
}
|
81
|
+
|
82
|
+
location /p2p {
|
83
|
+
proxy_pass http://yacy;
|
84
|
+
include config-lmm/proxy.conf;
|
85
|
+
}
|
86
|
+
<% else %>
|
87
|
+
location / {
|
88
|
+
proxy_pass http://yacy;
|
89
|
+
include config-lmm/proxy.conf;
|
90
|
+
}
|
91
|
+
<% end %>
|
92
|
+
|
93
|
+
}
|
@@ -0,0 +1,21 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=YaCy container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=YaCy
|
8
|
+
Image=docker.io/yacy/yacy_search_server:latest
|
9
|
+
EnvironmentFile=/var/lib/yacy/.config/containers/systemd/YaCy.env
|
10
|
+
PublishPort=127.0.0.1:8090:8090
|
11
|
+
UserNS=keep-id:uid=107,gid=113
|
12
|
+
Volume=/var/lib/yacy/DATA:/opt/yacy_search_server/DATA
|
13
|
+
LogDriver=journald
|
14
|
+
AutoUpdate=registry
|
15
|
+
|
16
|
+
[Service]
|
17
|
+
TimeoutStartSec=6min
|
18
|
+
Restart=on-failure
|
19
|
+
|
20
|
+
[Install]
|
21
|
+
WantedBy=multi-user.target default.target
|
@@ -0,0 +1,160 @@
|
|
1
|
+
require 'digest'
|
2
|
+
|
3
|
+
module ConfigLMM
|
4
|
+
module LMM
|
5
|
+
class YaCy < Framework::Plugin
|
6
|
+
|
7
|
+
USER = 'yacy'
|
8
|
+
HOME_DIR = '/var/lib/yacy'
|
9
|
+
PORT = 8090
|
10
|
+
|
11
|
+
def actionYaCyDeploy(id, target, activeState, context, options)
|
12
|
+
self.withConnection(target['Location'], target) do |connection|
|
13
|
+
Linux.withConnection(connection) do |linuxConnection|
|
14
|
+
if !target.key?('Proxy') || target['Proxy'] == false
|
15
|
+
deployYaCyService(linuxConnection, target, activeState, context, options)
|
16
|
+
end
|
17
|
+
|
18
|
+
deployYaCyProxy(linuxConnection, target, activeState, context, options)
|
19
|
+
|
20
|
+
if !target.key?('Proxy') || target['Proxy'] == false
|
21
|
+
linuxConnection.reloadUserServices(USER, options)
|
22
|
+
linuxConnection.restartUserService(USER, 'YaCy', options)
|
23
|
+
end
|
24
|
+
end
|
25
|
+
end
|
26
|
+
end
|
27
|
+
|
28
|
+
def deployYaCyService(linuxConnection, target, activeState, context, options)
|
29
|
+
Podman.ensurePresent(linuxConnection, options)
|
30
|
+
Podman.createUser(USER, HOME_DIR, 'YaCy', linuxConnection, options)
|
31
|
+
linuxConnection.withUserShell(USER) do |shell|
|
32
|
+
shell.createDirs(options, '~/DATA')
|
33
|
+
end
|
34
|
+
|
35
|
+
path = Podman.containersPath(HOME_DIR)
|
36
|
+
|
37
|
+
linuxConnection.fileWrite("#{path}/YaCy.env", '', options)
|
38
|
+
|
39
|
+
linuxConnection.setUserGroup("#{path}/YaCy.env", USER, USER, options)
|
40
|
+
linuxConnection.setPrivate("#{path}/YaCy.env", options)
|
41
|
+
|
42
|
+
linuxConnection.upload(__dir__ + '/YaCy.container', path, options)
|
43
|
+
|
44
|
+
linuxConnection.reloadUserServices(USER, options)
|
45
|
+
|
46
|
+
configMissing = !linuxConnection.filePresent?("#{HOME_DIR}/DATA/SETTINGS/yacy.conf", { **options, 'dry': false })
|
47
|
+
|
48
|
+
linuxConnection.restartUserService(USER, 'YaCy', options) if configMissing
|
49
|
+
|
50
|
+
linuxConnection.stopUserService(USER, 'YaCy', options)
|
51
|
+
|
52
|
+
settings = target['Settings'].to_h
|
53
|
+
settings['remotesearch.https.preferred'] = true if settings['remotesearch.https.preferred'] != false
|
54
|
+
settings['network.unit.protocol.https.preferred'] = true if settings['network.unit.protocol.https.preferred'] != false
|
55
|
+
settings['upnp.enabled'] = false if settings['upnp.enabled'] != true
|
56
|
+
settings['browserPopUpTrigger'] = false if settings['browserPopUpTrigger'] != false
|
57
|
+
settings['seedFilePath'] = '/opt/yacy_search_server/DATA/HTDOCS/seed.txt' unless settings['seedFilePath']
|
58
|
+
|
59
|
+
settings['adminAccountUserName'] = nil
|
60
|
+
settings['adminRealm'] = nil
|
61
|
+
|
62
|
+
if !target['Admin'].to_h.empty?
|
63
|
+
settings['adminAccountUserName'] = target['Admin']['Username']
|
64
|
+
settings['adminRealm'] = target['Admin']['Realm']
|
65
|
+
end
|
66
|
+
|
67
|
+
if !settings['adminAccountUserName']
|
68
|
+
settings['adminAccountUserName'] = linuxConnection.exec("grep '^adminAccountUserName=' '#{HOME_DIR}/DATA/SETTINGS/yacy.conf' | cut -d= -f2").strip
|
69
|
+
end
|
70
|
+
|
71
|
+
if !settings['adminRealm']
|
72
|
+
settings['adminRealm'] = linuxConnection.exec("grep '^adminRealm=' '#{HOME_DIR}/DATA/SETTINGS/yacy.conf' | cut -d= -f2").strip
|
73
|
+
end
|
74
|
+
|
75
|
+
adminPassword = context.secrets.load(target['SecretId'], 'ADMIN_PASSWORD')
|
76
|
+
if !adminPassword
|
77
|
+
adminPassword = SecureRandom.alphanumeric(30)
|
78
|
+
if !options['dry']
|
79
|
+
context.secrets.store(target['SecretId'], 'ADMIN_PASSWORD', adminPassword)
|
80
|
+
context.secrets.print("YaCy Admin '#{settings['adminAccountUserName']}' password", adminPassword)
|
81
|
+
end
|
82
|
+
end
|
83
|
+
|
84
|
+
settings['adminAccountBase64MD5'] = 'MD5:' + Digest::MD5.hexdigest("#{settings['adminAccountUserName']}:#{settings['adminRealm']}:#{adminPassword}")
|
85
|
+
|
86
|
+
settings.each do |name, value|
|
87
|
+
hide = name == 'adminAccountBase64MD5'
|
88
|
+
linuxConnection.fileReplace("#{HOME_DIR}/DATA/SETTINGS/yacy.conf", "^#{name}=.*", "#{name}=#{value}", { **options, hide: hide })
|
89
|
+
end
|
90
|
+
|
91
|
+
target['Profile'].to_h.each do |name, value|
|
92
|
+
linuxConnection.fileReplace("#{HOME_DIR}/DATA/SETTINGS/profile.txt", "^#{name}=.*", "#{name}=#{value.gsub(':', '\\:')}", options)
|
93
|
+
end
|
94
|
+
|
95
|
+
if settings['staticIP']
|
96
|
+
linuxConnection.fileReplace("#{HOME_DIR}/DATA/INDEX/freeworld/NETWORK/mySeed.txt", "IP=[^,]*,", "IP=#{settings['staticIP']},", options)
|
97
|
+
end
|
98
|
+
|
99
|
+
if target['PeerName']
|
100
|
+
linuxConnection.fileReplace("#{HOME_DIR}/DATA/INDEX/freeworld/NETWORK/mySeed.txt", "Name=[^,]*,", "Name=#{target['PeerName']},", options)
|
101
|
+
end
|
102
|
+
|
103
|
+
if target['SeedURL']
|
104
|
+
linuxConnection.fileReplace("#{HOME_DIR}/DATA/INDEX/freeworld/NETWORK/mySeed.txt", "seedURL=[^,]*,", "seedURL=#{target['SeedURL']},", options)
|
105
|
+
end
|
106
|
+
|
107
|
+
settings['adminAccountBase64MD5'] = '<REDACTED>'
|
108
|
+
end
|
109
|
+
|
110
|
+
def deployYaCyProxy(linuxConnection, target, activeState, context, options)
|
111
|
+
if !target.key?('Proxy') || target['Proxy']
|
112
|
+
raise Framework::PluginProcessError.new('Domain field must be set!') if !target['Domain'] && (!target.key?('Proxy') || target['Proxy'])
|
113
|
+
Nginx.withConnection(linuxConnection) do |nginxConnection|
|
114
|
+
target['Server'] = '127.0.0.1:' + PORT.to_s unless target['Server']
|
115
|
+
target['Server'] += ':' + PORT.to_s unless target['Server'].include?(':')
|
116
|
+
nginxConnection.writeConfig(__dir__, 'YaCy', target, activeState, context, options)
|
117
|
+
nginxConnection.deployAllConfigs(target, activeState, context, options)
|
118
|
+
end
|
119
|
+
elsif target.key?('Proxy') && target['Proxy'] == false
|
120
|
+
path = Podman.containersPath(HOME_DIR)
|
121
|
+
linuxConnection.fileReplace("#{path}/YaCy.container", 'PublishPort=127.0.0.1:', 'PublishPort=0.0.0.0:', options)
|
122
|
+
linuxConnection.firewallAddPort("#{PORT}/tcp", options)
|
123
|
+
end
|
124
|
+
end
|
125
|
+
|
126
|
+
def cleanup(configs, state, context, options)
|
127
|
+
cleanupType(:YaCy, configs, state, context, options) do |item, id, state, context, options, connection|
|
128
|
+
Linux.withConnection(connection) do |linuxConnection|
|
129
|
+
|
130
|
+
if !item['Config'].key?('Proxy') || item['Config']['Proxy']
|
131
|
+
Nginx.withConnection(linuxConnection) do |nginxConnection|
|
132
|
+
nginxConnection.cleanupConfig('YaCy', context, options)
|
133
|
+
nginxConnection.reload(options)
|
134
|
+
end
|
135
|
+
elsif item['Config'].key?('Proxy') && item['Config']['Proxy'] == false
|
136
|
+
linuxConnection.firewallRemovePort("#{PORT}/tcp", options)
|
137
|
+
end
|
138
|
+
|
139
|
+
if !target.key?('Proxy') || target['Proxy'] == false
|
140
|
+
linuxConnection.stopUserService(USER, 'YaCy', options)
|
141
|
+
|
142
|
+
path = Podman.containersPath(HOME_DIR)
|
143
|
+
linuxConnection.rm(path + '/YaCy.container', options[:dry])
|
144
|
+
|
145
|
+
state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
|
146
|
+
|
147
|
+
if options[:destroy]
|
148
|
+
linuxConnection.deleteUserAndGroup(USER, options)
|
149
|
+
state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
|
150
|
+
end
|
151
|
+
else
|
152
|
+
state.item(id)['Status'] = options[:destroy] ? State::STATUS_DESTROYED : State::STATUS_DELETED unless options[:dry]
|
153
|
+
end
|
154
|
+
end
|
155
|
+
end
|
156
|
+
end
|
157
|
+
|
158
|
+
end
|
159
|
+
end
|
160
|
+
end
|
@@ -0,0 +1,24 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=Apache ZooKeeper container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=ZooKeeper
|
8
|
+
Image=docker.io/bitnami/zookeeper:latest
|
9
|
+
EnvironmentFile=/var/lib/zookeeper/.config/containers/systemd/ZooKeeper.env
|
10
|
+
PublishPort=127.0.0.1:2181:2181
|
11
|
+
PublishPort=127.0.0.1:2888:2888
|
12
|
+
PublishPort=127.0.0.1:3888:3888
|
13
|
+
PublishPort=127.0.0.1:18500:8080
|
14
|
+
UserNS=keep-id:uid=1001,gid=1001
|
15
|
+
Volume=/var/lib/zookeeper/data:/bitnami/zookeeper/data
|
16
|
+
LogDriver=journald
|
17
|
+
AutoUpdate=registry
|
18
|
+
|
19
|
+
[Service]
|
20
|
+
TimeoutStartSec=6min
|
21
|
+
Restart=on-failure
|
22
|
+
|
23
|
+
[Install]
|
24
|
+
WantedBy=multi-user.target default.target
|
@@ -0,0 +1,68 @@
|
|
1
|
+
|
2
|
+
module ConfigLMM
|
3
|
+
module LMM
|
4
|
+
class ZooKeeper < Framework::Plugin
|
5
|
+
|
6
|
+
USER = 'zookeeper'
|
7
|
+
HOME_DIR = '/var/lib/zookeeper'
|
8
|
+
SERVICE_NAME = 'ZooKeeper'
|
9
|
+
|
10
|
+
def actionZooKeeperDeploy(id, target, activeState, context, options)
|
11
|
+
self.withConnection(target['Location'], target) do |connection|
|
12
|
+
Linux.withConnection(connection) do |linuxConnection|
|
13
|
+
Podman.ensurePresent(linuxConnection, options)
|
14
|
+
Podman.createUser(USER, HOME_DIR, 'ZooKeeper', linuxConnection, options)
|
15
|
+
linuxConnection.withUserShell(USER) do |shell|
|
16
|
+
shell.createDirs(options, '~/data')
|
17
|
+
end
|
18
|
+
|
19
|
+
username = target['Username'] || context.secrets.load(target['SecretId'], 'USERNAME') || 'zookeeper'
|
20
|
+
context.secrets.store(target['SecretId'], 'USERNAME', username)
|
21
|
+
password = context.secrets.load(target['SecretId'], 'PASSWORD')
|
22
|
+
if password.nil?
|
23
|
+
password = SecureRandom.alphanumeric(20)
|
24
|
+
context.secrets.store(target['SecretId'], 'PASSWORD', password)
|
25
|
+
context.secrets.print("#{username} password", password)
|
26
|
+
end
|
27
|
+
|
28
|
+
path = Podman.containersPath(HOME_DIR)
|
29
|
+
linuxConnection.fileWrite("#{path}/ZooKeeper.env", 'ZOO_ENABLE_AUTH=yes', options)
|
30
|
+
linuxConnection.fileAppend("#{path}/ZooKeeper.env", 'ZOO_AUTOPURGE_INTERVAL=1', options)
|
31
|
+
|
32
|
+
if target['ServerID']
|
33
|
+
linuxConnection.fileAppend("#{path}/ZooKeeper.env", "ZOO_SERVER_ID=#{target['ServerID']}", options)
|
34
|
+
end
|
35
|
+
|
36
|
+
linuxConnection.fileAppend("#{path}/ZooKeeper.env", "ZOO_SERVER_USERS=#{username}", options)
|
37
|
+
linuxConnection.fileAppend("#{path}/ZooKeeper.env", "ZOO_SERVER_PASSWORDS=#{password}", { **options, hide: true })
|
38
|
+
linuxConnection.setUserGroup("#{path}/ZooKeeper.env", USER, USER, options)
|
39
|
+
linuxConnection.setPrivate("#{path}/ZooKeeper.env", options)
|
40
|
+
|
41
|
+
linuxConnection.upload(__dir__ + '/ZooKeeper.container', path, options)
|
42
|
+
linuxConnection.reloadUserServices(USER, options)
|
43
|
+
linuxConnection.restartUserService(USER, SERVICE_NAME, options)
|
44
|
+
end
|
45
|
+
end
|
46
|
+
end
|
47
|
+
|
48
|
+
def cleanup(configs, state, context, options)
|
49
|
+
cleanupType(:ZooKeeper, configs, state, context, options) do |item, id, state, context, options, connection|
|
50
|
+
Linux.withConnection(connection) do |linuxConnection|
|
51
|
+
linuxConnection.stopUserService(USER, SERVICE_NAME, options)
|
52
|
+
|
53
|
+
path = Podman.containersPath(HOME_DIR)
|
54
|
+
linuxConnection.rm("#{path}/ZooKeeper.container", options[:dry])
|
55
|
+
|
56
|
+
state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
|
57
|
+
|
58
|
+
if options[:destroy]
|
59
|
+
linuxConnection.deleteUserAndGroup(USER, options)
|
60
|
+
state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
|
61
|
+
end
|
62
|
+
end
|
63
|
+
end
|
64
|
+
end
|
65
|
+
|
66
|
+
end
|
67
|
+
end
|
68
|
+
end
|
@@ -33,14 +33,11 @@ server {
|
|
33
33
|
root <%= config['Root'] %>;
|
34
34
|
<% end %>
|
35
35
|
|
36
|
-
access_log /var/log/nginx/gollum.access.log;
|
37
|
-
error_log /var/log/nginx/gollum.error.log;
|
38
|
-
|
39
36
|
<% if config['AuthentikDomain'].nil? %>
|
40
37
|
include config-lmm/private.conf;
|
41
38
|
<% end %>
|
42
39
|
|
43
|
-
include config-lmm/errors.conf;
|
40
|
+
include config-lmm/gateway-errors.conf;
|
44
41
|
|
45
42
|
<% if config['CertName'] %>
|
46
43
|
ssl_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/fullchain.pem";
|
@@ -93,6 +90,7 @@ server {
|
|
93
90
|
location /outpost.goauthentik.io {
|
94
91
|
proxy_pass https://<%= config['AuthentikDomain'] %>/outpost.goauthentik.io;
|
95
92
|
proxy_ssl_protocols TLSv1.2 TLSv1.3;
|
93
|
+
proxy_set_header X-Authentik-Host $host;
|
96
94
|
proxy_set_header X-Original-URL $scheme://$http_host$request_uri;
|
97
95
|
proxy_pass_request_body off;
|
98
96
|
proxy_set_header Content-Length "";
|
@@ -3,13 +3,19 @@ Description=gollum container
|
|
3
3
|
After=local-fs.target
|
4
4
|
|
5
5
|
[Container]
|
6
|
+
ContainerName=gollum
|
6
7
|
Image=docker.io/gollumwiki/gollum:master
|
7
8
|
Exec=--config=/config/config.rb
|
8
9
|
PublishPort=0.0.0.0:14567:4567
|
9
10
|
UserNS=keep-id:uid=1000,gid=1000
|
10
11
|
Volume=/srv/gollum/repo:/wiki
|
11
12
|
Volume=/srv/gollum/config:/config
|
13
|
+
LogDriver=journald
|
12
14
|
AutoUpdate=registry
|
13
15
|
|
16
|
+
[Service]
|
17
|
+
TimeoutStartSec=6min
|
18
|
+
Restart=on-failure
|
19
|
+
|
14
20
|
[Install]
|
15
21
|
WantedBy=multi-user.target default.target
|
@@ -1,7 +1,7 @@
|
|
1
1
|
|
2
2
|
module ConfigLMM
|
3
3
|
module LMM
|
4
|
-
class Gollum < Framework::
|
4
|
+
class Gollum < Framework::Plugin
|
5
5
|
|
6
6
|
NAME = 'gollum'
|
7
7
|
USER = 'gollum'
|
@@ -9,11 +9,13 @@ module ConfigLMM
|
|
9
9
|
GOLLUM_PORT = '14567'
|
10
10
|
|
11
11
|
def actionGollumBuild(id, target, activeState, context, options)
|
12
|
-
|
12
|
+
Nginx.withConnection(local) do |nginxConnection|
|
13
|
+
nginxConnection.writeConfig(__dir__, NAME, target, state, context, options)
|
14
|
+
end
|
13
15
|
targetDir = options['output'] + GOLLUM_PATH
|
14
|
-
mkdir(targetDir + '/config', options['dry'])
|
15
|
-
copy(__dir__ + '/config.ru', targetDir, options['dry'])
|
16
|
-
|
16
|
+
local.mkdir(targetDir + '/config', options['dry'])
|
17
|
+
local.copy(__dir__ + '/config.ru', targetDir, options['dry'])
|
18
|
+
local.exec("git init #{targetDir}/repo", options)
|
17
19
|
end
|
18
20
|
|
19
21
|
def actionGollumRefresh(id, target, activeState, context, options)
|
@@ -21,65 +23,64 @@ module ConfigLMM
|
|
21
23
|
end
|
22
24
|
|
23
25
|
def actionGollumDeploy(id, target, activeState, context, options)
|
24
|
-
|
25
|
-
|
26
|
-
self.class.sshStart(uri) do |ssh|
|
26
|
+
self.withConnection(target['Location'], target) do |connection|
|
27
|
+
Linux.withConnection(connection) do |linuxConnection|
|
27
28
|
if !target.key?('Proxy') || !!target['Proxy']
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
|
29
|
+
#if !target['Root']
|
30
|
+
# gollumPath = linuxConnection.exec('gem which gollum', true).strip
|
31
|
+
# target['Root'] = File.dirname(gollumPath) + '/gollum/public'
|
32
|
+
#end
|
33
|
+
|
34
|
+
Nginx.withConnection(linuxConnection) do |nginxConnection|
|
35
|
+
target['ConfigName'] = target['Name']
|
36
|
+
nginxConnection.provision(__dir__, NAME, target, activeState, context, options)
|
32
37
|
end
|
33
|
-
writeNginxConfig(__dir__, NAME, id, target, state, context, options)
|
34
|
-
deployNginxConfig(id, target, activeState, context, options)
|
35
38
|
end
|
36
39
|
if !target.key?('Proxy') || target['Proxy'] != 'only'
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
|
40
|
+
Podman.ensurePresent(linuxConnection, options)
|
41
|
+
Podman.createUser(USER, GOLLUM_PATH, 'gollum', linuxConnection, options)
|
42
|
+
linuxConnection.withUserShell(USER) do |shell|
|
43
|
+
shell.createDirs(options, '~/data')
|
44
|
+
end
|
45
|
+
|
46
|
+
if !linuxConnection.filePresent?(GOLLUM_PATH, options)
|
47
|
+
if target['Config']
|
48
|
+
local.copy(target['Config'], "#{options['output'] + GOLLUM_PATH}/config/config.rb", options['dry'])
|
49
|
+
else
|
50
|
+
local.fileWrite(options['output'] + GOLLUM_PATH + "/config/config.rb", '', options['dry'])
|
51
|
+
end
|
52
|
+
linuxConnection.uploadFolder(options['output'] + GOLLUM_PATH, '/srv', options)
|
41
53
|
else
|
42
|
-
|
54
|
+
if target['Config']
|
55
|
+
linuxConnection.upload(target['Config'], "#{GOLLUM_PATH}/config/config.rb", options)
|
56
|
+
end
|
43
57
|
end
|
44
|
-
|
45
|
-
path =
|
46
|
-
|
47
|
-
|
48
|
-
|
49
|
-
|
58
|
+
|
59
|
+
path = Podman.containersPath(GOLLUM_PATH)
|
60
|
+
linuxConnection.upload(__dir__ + '/gollum.container', path, options)
|
61
|
+
|
62
|
+
linuxConnection.setUserGroup(GOLLUM_PATH, USER, USER, options)
|
63
|
+
linuxConnection.reloadUserServices(USER, options)
|
64
|
+
linuxConnection.restartUserService(USER, 'gollum', options)
|
50
65
|
if target['Proxy'] != 'only'
|
51
|
-
|
66
|
+
linuxConnection.firewallAddPort(GOLLUM_PORT + '/tcp', options)
|
52
67
|
end
|
53
68
|
end
|
54
69
|
end
|
55
|
-
else
|
56
|
-
targetDir = GOLLUM_PATH
|
57
|
-
mkdir(targetDir, options['dry'])
|
58
|
-
if !target.key?('Proxy') || !!target['Proxy']
|
59
|
-
self.class.prepareNginxConfig(target)
|
60
|
-
if !target['Root']
|
61
|
-
target['Root'] = File.dirname(`gem which gollum`.strip) + '/gollum/public'
|
62
|
-
end
|
63
|
-
writeNginxConfig(__dir__, NAME, id, target, state, context, options)
|
64
|
-
deployNginxConfig(id, target, activeState, context, options)
|
65
|
-
end
|
66
|
-
if !target.key?('Proxy') || target['Proxy'] != 'only'
|
67
|
-
copy(options['output'] + GOLLUM_PATH + '/config.ru', GOLLUM_PATH, options['dry'])
|
68
|
-
copyNotPresent(options['output'] + GOLLUM_PATH + '/repo', GOLLUM_PATH, options['dry'])
|
69
|
-
chown('http', 'http', GOLLUM_PATH, options['dry'])
|
70
|
-
end
|
71
|
-
activeState['Location'] = '@me'
|
72
70
|
end
|
73
71
|
end
|
74
72
|
|
75
73
|
def cleanup(configs, state, context, options)
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
74
|
+
cleanupType(:Gollum, configs, state, context, options) do |item, id, state, context, options, connection|
|
75
|
+
if !item['Config'].key?('Proxy') || !!item['Config']['Proxy']
|
76
|
+
Linux.withConnection(connection) do |linuxConnection|
|
77
|
+
Nginx.withConnection(linuxConnection) do |nginxConnection|
|
78
|
+
configName = NAME
|
79
|
+
configName = item['Config']['ConfigName'] if item['Config']['ConfigName']
|
80
|
+
nginxConnection.cleanupConfig(configName, context, options)
|
81
|
+
nginxConnection.reload(options)
|
82
|
+
end
|
83
|
+
state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
|
83
84
|
end
|
84
85
|
end
|
85
86
|
end
|
@@ -0,0 +1,28 @@
|
|
1
|
+
|
2
|
+
[Unit]
|
3
|
+
Description=llama.cpp container
|
4
|
+
After=local-fs.target
|
5
|
+
|
6
|
+
[Container]
|
7
|
+
ContainerName=llama.cpp
|
8
|
+
Image=ghcr.io/ggml-org/llama.cpp:full
|
9
|
+
Exec=--server --host 0.0.0.0 $ARGS
|
10
|
+
EnvironmentFile=/var/lib/llama.cpp/.config/containers/systemd/llama.cpp.env
|
11
|
+
PublishPort=127.0.0.1:18900:8080
|
12
|
+
UserNS=keep-id:uid=1000,gid=1000
|
13
|
+
# Need newer Podman to use this
|
14
|
+
#GroupAdd=keep-groups
|
15
|
+
PodmanArgs=--group-add keep-groups
|
16
|
+
#PodmanArgs=--passwd-entry 'llama.cpp:x:1000:1000:llama.cpp:/home/llama.cpp:/bin/bash'
|
17
|
+
Volume=/var/lib/llama.cpp/.cache:/app/.cache
|
18
|
+
Volume=/var/lib/llama.cpp/models:/models
|
19
|
+
$DEVICES
|
20
|
+
LogDriver=journald
|
21
|
+
AutoUpdate=registry
|
22
|
+
|
23
|
+
[Service]
|
24
|
+
TimeoutStartSec=12min
|
25
|
+
Restart=on-failure
|
26
|
+
|
27
|
+
[Install]
|
28
|
+
WantedBy=multi-user.target default.target
|