ConfigLMM 0.4.0 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (227) hide show
  1. checksums.yaml +4 -4
  2. data/CHANGELOG.md +34 -0
  3. data/CNAME +1 -0
  4. data/Examples/.lmm.state.yaml +159 -0
  5. data/Examples/ConfigLMM.mm.yaml +32 -0
  6. data/Examples/Implemented.mm.yaml +252 -4
  7. data/Examples/SmallBusiness.mm.yaml +492 -0
  8. data/Plugins/Apps/Answer/answer.lmm.rb +165 -0
  9. data/Plugins/Apps/Answer/answer@.service +40 -0
  10. data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.conf.erb +0 -3
  11. data/Plugins/Apps/ArchiSteamFarm/ArchiSteamFarm.lmm.rb +0 -1
  12. data/Plugins/Apps/Authentik/Authentik-ProxyOutpost.container +7 -1
  13. data/Plugins/Apps/Authentik/Authentik-Server.container +6 -1
  14. data/Plugins/Apps/Authentik/Authentik-Worker.container +6 -1
  15. data/Plugins/Apps/Authentik/Authentik.conf.erb +12 -7
  16. data/Plugins/Apps/Authentik/Authentik.lmm.rb +226 -61
  17. data/Plugins/Apps/BookStack/BookStack.conf.erb +0 -3
  18. data/Plugins/Apps/BookStack/BookStack.container +5 -0
  19. data/Plugins/Apps/BookStack/BookStack.lmm.rb +14 -3
  20. data/Plugins/Apps/Cassandra/Cassandra.lmm.rb +9 -19
  21. data/Plugins/Apps/ClickHouse/ClickHouse.container +28 -0
  22. data/Plugins/Apps/ClickHouse/ClickHouse.lmm.rb +113 -0
  23. data/Plugins/Apps/ClickHouse/Config/listen.yaml +2 -0
  24. data/Plugins/Apps/ClickHouse/Config/logger.yaml +8 -0
  25. data/Plugins/Apps/ClickHouse/Config/zookeepers.yaml +5 -0
  26. data/Plugins/Apps/ClickHouse/Connection.rb +96 -0
  27. data/Plugins/Apps/Discourse/Discourse-Sidekiq.container +5 -0
  28. data/Plugins/Apps/Discourse/Discourse.conf.erb +1 -4
  29. data/Plugins/Apps/Discourse/Discourse.container +4 -0
  30. data/Plugins/Apps/Discourse/Discourse.lmm.rb +116 -55
  31. data/Plugins/Apps/Dovecot/Dovecot.lmm.rb +74 -62
  32. data/Plugins/Apps/ERPNext/ERPNext-Frontend.container +6 -1
  33. data/Plugins/Apps/ERPNext/ERPNext-Queue.container +5 -0
  34. data/Plugins/Apps/ERPNext/ERPNext-Scheduler.container +5 -0
  35. data/Plugins/Apps/ERPNext/ERPNext-Websocket.container +6 -1
  36. data/Plugins/Apps/ERPNext/ERPNext.container +6 -1
  37. data/Plugins/Apps/ERPNext/ERPNext.lmm.rb +138 -127
  38. data/Plugins/Apps/GitLab/GitLab.container +6 -0
  39. data/Plugins/Apps/GitLab/GitLab.lmm.rb +43 -49
  40. data/Plugins/Apps/Homepage/Homepage.conf.erb +86 -0
  41. data/Plugins/Apps/Homepage/Homepage.container +19 -0
  42. data/Plugins/Apps/Homepage/Homepage.lmm.rb +54 -0
  43. data/Plugins/Apps/IPFS/IPFS.conf.erb +0 -3
  44. data/Plugins/Apps/IPFS/IPFS.lmm.rb +0 -1
  45. data/Plugins/Apps/InfluxDB/InfluxDB.conf.erb +0 -3
  46. data/Plugins/Apps/InfluxDB/InfluxDB.lmm.rb +0 -1
  47. data/Plugins/Apps/Jackett/Jackett.conf.erb +0 -3
  48. data/Plugins/Apps/Jackett/Jackett.lmm.rb +0 -1
  49. data/Plugins/Apps/Jellyfin/Jellyfin.conf.erb +0 -3
  50. data/Plugins/Apps/Jellyfin/Jellyfin.lmm.rb +0 -1
  51. data/Plugins/Apps/LetsEncrypt/LetsEncrypt.lmm.rb +49 -28
  52. data/Plugins/Apps/LibreTranslate/LibreTranslate.container +21 -0
  53. data/Plugins/Apps/LibreTranslate/LibreTranslate.lmm.rb +34 -0
  54. data/Plugins/Apps/Lobsters/Containerfile +81 -0
  55. data/Plugins/Apps/Lobsters/Lobsters-Tasks.container +26 -0
  56. data/Plugins/Apps/Lobsters/Lobsters.conf.erb +99 -0
  57. data/Plugins/Apps/Lobsters/Lobsters.container +27 -0
  58. data/Plugins/Apps/Lobsters/Lobsters.lmm.rb +196 -0
  59. data/Plugins/Apps/Lobsters/crontab +3 -0
  60. data/Plugins/Apps/Lobsters/database.yml +26 -0
  61. data/Plugins/Apps/Lobsters/entrypoint.sh +30 -0
  62. data/Plugins/Apps/Lobsters/generateCredentials.rb +19 -0
  63. data/Plugins/Apps/Lobsters/lobsters-cron.sh +25 -0
  64. data/Plugins/Apps/Lobsters/lobsters-daily.sh +23 -0
  65. data/Plugins/Apps/Lobsters/puma.rb +49 -0
  66. data/Plugins/Apps/MariaDB/Connection.rb +55 -0
  67. data/Plugins/Apps/MariaDB/MariaDB.lmm.rb +60 -53
  68. data/Plugins/Apps/Mastodon/Mastodon-Sidekiq.container +22 -0
  69. data/Plugins/Apps/Mastodon/Mastodon-Streaming.container +20 -0
  70. data/Plugins/Apps/Mastodon/Mastodon.conf.erb +34 -45
  71. data/Plugins/Apps/Mastodon/Mastodon.container +28 -0
  72. data/Plugins/Apps/Mastodon/Mastodon.lmm.rb +240 -5
  73. data/Plugins/Apps/Mastodon/configlmm.rake +30 -0
  74. data/Plugins/Apps/Mastodon/entrypoint.sh +16 -0
  75. data/Plugins/Apps/Matrix/Element.container +5 -0
  76. data/Plugins/Apps/Matrix/Matrix.conf.erb +2 -8
  77. data/Plugins/Apps/Matrix/Matrix.lmm.rb +100 -71
  78. data/Plugins/Apps/Matrix/Synapse.container +5 -0
  79. data/Plugins/Apps/Netdata/Netdata.conf.erb +0 -3
  80. data/Plugins/Apps/Netdata/Netdata.lmm.rb +0 -1
  81. data/Plugins/Apps/Nextcloud/Nextcloud.conf.erb +3 -4
  82. data/Plugins/Apps/Nextcloud/Nextcloud.lmm.rb +150 -68
  83. data/Plugins/Apps/Nextcloud/autoconfig.php +13 -0
  84. data/Plugins/Apps/Nextcloud/config.php +10 -1
  85. data/Plugins/Apps/Nextcloud/nextcloudcron.service +8 -0
  86. data/Plugins/Apps/Nextcloud/nextcloudcron.timer +10 -0
  87. data/Plugins/Apps/Nginx/Connection.rb +93 -0
  88. data/Plugins/Apps/Nginx/conf.d/configlmm.conf +50 -9
  89. data/Plugins/Apps/Nginx/conf.d/languages.conf +21 -0
  90. data/Plugins/Apps/Nginx/config-lmm/errors.conf +25 -20
  91. data/Plugins/Apps/Nginx/config-lmm/gateway-errors.conf +20 -0
  92. data/Plugins/Apps/Nginx/config-lmm/proxy.conf +1 -1
  93. data/Plugins/Apps/Nginx/main.conf.erb +7 -3
  94. data/Plugins/Apps/Nginx/nginx.conf +2 -2
  95. data/Plugins/Apps/Nginx/nginx.lmm.rb +99 -81
  96. data/Plugins/Apps/Nginx/proxy.conf.erb +11 -3
  97. data/Plugins/Apps/Odoo/Odoo.conf.erb +0 -3
  98. data/Plugins/Apps/Odoo/Odoo.container +5 -0
  99. data/Plugins/Apps/Odoo/Odoo.lmm.rb +4 -5
  100. data/Plugins/Apps/Ollama/Ollama.container +26 -0
  101. data/Plugins/Apps/Ollama/Ollama.lmm.rb +73 -0
  102. data/Plugins/Apps/OpenTelemetry/Config/config.yaml +704 -0
  103. data/Plugins/Apps/OpenTelemetry/OpenTelemetry.lmm.rb +154 -0
  104. data/Plugins/Apps/OpenVidu/Ingress.container +5 -0
  105. data/Plugins/Apps/OpenVidu/OpenVidu.conf.erb +0 -3
  106. data/Plugins/Apps/OpenVidu/OpenVidu.container +5 -0
  107. data/Plugins/Apps/OpenVidu/OpenVidu.lmm.rb +7 -3
  108. data/Plugins/Apps/OpenVidu/OpenViduCall.conf.erb +0 -3
  109. data/Plugins/Apps/OpenVidu/OpenViduCall.container +5 -0
  110. data/Plugins/Apps/PHP-FPM/Connection.rb +91 -0
  111. data/Plugins/Apps/PHP-FPM/PHP-FPM.lmm.rb +31 -4
  112. data/Plugins/Apps/Peppermint/Peppermint.conf.erb +2 -5
  113. data/Plugins/Apps/Peppermint/Peppermint.container +5 -0
  114. data/Plugins/Apps/Peppermint/Peppermint.lmm.rb +29 -33
  115. data/Plugins/Apps/Perplexica/Perplexica.container +25 -0
  116. data/Plugins/Apps/Perplexica/Perplexica.lmm.rb +92 -0
  117. data/Plugins/Apps/Perplexica/config.toml +26 -0
  118. data/Plugins/Apps/Podman/Connection.rb +24 -0
  119. data/Plugins/Apps/Podman/Podman.lmm.rb +80 -0
  120. data/Plugins/Apps/Podman/storage.conf +6 -0
  121. data/Plugins/Apps/Postfix/Postfix.lmm.rb +242 -164
  122. data/Plugins/Apps/PostgreSQL/Connection.rb +97 -0
  123. data/Plugins/Apps/PostgreSQL/PostgreSQL.lmm.rb +184 -148
  124. data/Plugins/Apps/Pterodactyl/Pterodactyl.conf.erb +0 -3
  125. data/Plugins/Apps/Pterodactyl/Pterodactyl.lmm.rb +0 -2
  126. data/Plugins/Apps/Pterodactyl/Wings.conf.erb +0 -3
  127. data/Plugins/Apps/RVM/RVM.lmm.rb +57 -0
  128. data/Plugins/Apps/Roundcube/Roundcube.conf.erb +0 -3
  129. data/Plugins/Apps/Roundcube/Roundcube.lmm.rb +15 -19
  130. data/Plugins/Apps/SSH/SSH.lmm.rb +9 -15
  131. data/Plugins/Apps/SearXNG/SearXNG.container +22 -0
  132. data/Plugins/Apps/SearXNG/SearXNG.lmm.rb +79 -0
  133. data/Plugins/Apps/SearXNG/limiter.toml +40 -0
  134. data/Plugins/Apps/SearXNG/settings.yml +2 -0
  135. data/Plugins/Apps/SigNoz/Config/alerts.yml +11 -0
  136. data/Plugins/Apps/SigNoz/Config/otel-collector-config.yaml +110 -0
  137. data/Plugins/Apps/SigNoz/Config/otel-collector-opamp-config.yaml +1 -0
  138. data/Plugins/Apps/SigNoz/Config/prometheus.yml +18 -0
  139. data/Plugins/Apps/SigNoz/SigNoz-Collector.container +23 -0
  140. data/Plugins/Apps/SigNoz/SigNoz-Migrator.container +17 -0
  141. data/Plugins/Apps/SigNoz/SigNoz.conf.erb +61 -0
  142. data/Plugins/Apps/SigNoz/SigNoz.container +26 -0
  143. data/Plugins/Apps/SigNoz/SigNoz.lmm.rb +319 -0
  144. data/Plugins/Apps/Solr/log4j2.xml +89 -0
  145. data/Plugins/Apps/Solr/solr.lmm.rb +82 -0
  146. data/Plugins/Apps/Sunshine/Sunshine.conf.erb +0 -3
  147. data/Plugins/Apps/Sunshine/Sunshine.lmm.rb +0 -1
  148. data/Plugins/Apps/Tunnel/tunnel.lmm.rb +33 -37
  149. data/Plugins/Apps/UVdesk/UVdesk.conf.erb +0 -3
  150. data/Plugins/Apps/Umami/Umami.container +19 -0
  151. data/Plugins/Apps/Umami/Umami.lmm.rb +108 -0
  152. data/Plugins/Apps/Valkey/Valkey.lmm.rb +54 -42
  153. data/Plugins/Apps/Vaultwarden/Vaultwarden.conf.erb +9 -6
  154. data/Plugins/Apps/Vaultwarden/Vaultwarden.container +7 -1
  155. data/Plugins/Apps/Vaultwarden/Vaultwarden.lmm.rb +64 -29
  156. data/Plugins/Apps/Wiki.js/Wiki.js.conf.erb +1 -4
  157. data/Plugins/Apps/Wiki.js/Wiki.js.container +5 -0
  158. data/Plugins/Apps/Wiki.js/Wiki.js.lmm.rb +31 -37
  159. data/Plugins/Apps/YaCy/YaCy.conf.erb +93 -0
  160. data/Plugins/Apps/YaCy/YaCy.container +21 -0
  161. data/Plugins/Apps/YaCy/YaCy.lmm.rb +160 -0
  162. data/Plugins/Apps/ZooKeeper/ZooKeeper.container +24 -0
  163. data/Plugins/Apps/ZooKeeper/ZooKeeper.lmm.rb +68 -0
  164. data/Plugins/Apps/bitmagnet/bitmagnet.conf.erb +0 -3
  165. data/Plugins/Apps/bitmagnet/bitmagnet.lmm.rb +0 -1
  166. data/Plugins/Apps/gollum/gollum.conf.erb +2 -4
  167. data/Plugins/Apps/gollum/gollum.container +6 -0
  168. data/Plugins/Apps/gollum/gollum.lmm.rb +51 -50
  169. data/Plugins/Apps/llama.cpp/llama.cpp.container +28 -0
  170. data/Plugins/Apps/llama.cpp/llama.cpp.lmm.rb +90 -0
  171. data/Plugins/Apps/vLLM/vLLM.container +32 -0
  172. data/Plugins/Apps/vLLM/vLLM.lmm.rb +89 -0
  173. data/Plugins/OS/General/Utils.lmm.rb +26 -0
  174. data/Plugins/OS/Linux/Connection.rb +472 -0
  175. data/Plugins/OS/Linux/Debian/preseed.cfg.erb +25 -6
  176. data/Plugins/OS/Linux/Flavours.yaml +13 -0
  177. data/Plugins/OS/Linux/Grub/grub.cfg +10 -0
  178. data/Plugins/OS/Linux/HTTP.rb +32 -0
  179. data/Plugins/OS/Linux/Linux.lmm.rb +533 -187
  180. data/Plugins/OS/Linux/Packages.yaml +20 -1
  181. data/Plugins/OS/Linux/Services.yaml +8 -0
  182. data/Plugins/OS/Linux/Shell.rb +70 -0
  183. data/Plugins/OS/Linux/Syslinux/default +8 -0
  184. data/Plugins/OS/Linux/WireGuard/WireGuard.lmm.rb +83 -59
  185. data/Plugins/OS/Linux/WireGuard/wg0.conf.erb +3 -0
  186. data/Plugins/OS/Linux/openSUSE/autoinst.xml.erb +29 -3
  187. data/Plugins/OS/Linux/systemd/systemd.lmm.rb +13 -11
  188. data/Plugins/OS/Routers/Aruba/ArubaInstant.lmm.rb +6 -5
  189. data/Plugins/Platforms/GitHub.lmm.rb +73 -28
  190. data/Plugins/Platforms/GoDaddy/GoDaddy.lmm.rb +9 -6
  191. data/Plugins/Platforms/Proxmox/Proxmox.lmm.rb +402 -0
  192. data/Plugins/Platforms/Proxmox/XTerm.rb +321 -0
  193. data/Plugins/Platforms/libvirt/libvirt.lmm.rb +38 -13
  194. data/Plugins/Platforms/porkbun.lmm.rb +12 -2
  195. data/Plugins/Platforms/porkbun_spec.rb +2 -2
  196. data/Plugins/Services/DNS/AmberBit.lmm.rb +1 -1
  197. data/Plugins/Services/DNS/ArubaItDNS.lmm.rb +1 -1
  198. data/Plugins/Services/DNS/NICLV.lmm.rb +1 -1
  199. data/Plugins/Services/DNS/PowerDNS.lmm.rb +70 -68
  200. data/Plugins/Services/DNS/tonic.lmm.rb +22 -12
  201. data/lib/ConfigLMM/Framework/plugins/dns.rb +4 -3
  202. data/lib/ConfigLMM/Framework/plugins/linuxApp.rb +145 -184
  203. data/lib/ConfigLMM/Framework/plugins/nginxApp.rb +34 -17
  204. data/lib/ConfigLMM/Framework/plugins/plugin.rb +53 -181
  205. data/lib/ConfigLMM/Framework/plugins/store.rb +4 -4
  206. data/lib/ConfigLMM/Framework/variables.rb +75 -0
  207. data/lib/ConfigLMM/Framework.rb +1 -0
  208. data/lib/ConfigLMM/cli.rb +12 -6
  209. data/lib/ConfigLMM/commands/configsCommand.rb +37 -6
  210. data/lib/ConfigLMM/commands/diff.rb +33 -9
  211. data/lib/ConfigLMM/context.rb +22 -3
  212. data/lib/ConfigLMM/io/configList.rb +82 -6
  213. data/lib/ConfigLMM/io/connection.rb +143 -0
  214. data/lib/ConfigLMM/io/dhcp.rb +330 -0
  215. data/lib/ConfigLMM/io/http.rb +78 -0
  216. data/lib/ConfigLMM/io/local.rb +207 -0
  217. data/lib/ConfigLMM/io/pxe.rb +92 -0
  218. data/lib/ConfigLMM/io/ssh.rb +156 -0
  219. data/lib/ConfigLMM/io/tftp.rb +105 -0
  220. data/lib/ConfigLMM/io.rb +2 -0
  221. data/lib/ConfigLMM/secrets/envStore.rb +39 -0
  222. data/lib/ConfigLMM/secrets/fileStore.rb +43 -0
  223. data/lib/ConfigLMM/state.rb +2 -1
  224. data/lib/ConfigLMM/version.rb +2 -1
  225. data/lib/ConfigLMM.rb +1 -0
  226. data/{Examples → scripts}/configlmmAuth.sh +7 -5
  227. metadata +205 -8
@@ -1,37 +1,44 @@
1
1
 
2
2
  module ConfigLMM
3
3
  module LMM
4
- class ERPNext < Framework::NginxApp
4
+ class ERPNext < Framework::Plugin
5
5
 
6
6
  USER = 'erpnext'
7
7
  HOME_DIR = '/var/lib/erpnext'
8
8
  VERSION = '15'
9
9
  FRAPPE_REPO = 'https://github.com/frappe/frappe_docker.git'
10
10
  IMAGE_ID = 'ConfigLM.moe/erpnext:v' + VERSION
11
+ CONTAINER_NAME = 'ERPNext'
11
12
 
12
13
  def actionERPNextBuild(id, target, activeState, context, options)
13
14
  buildContainer(id, target, options)
14
15
  end
15
16
 
16
17
  def buildContainer(id, target, options)
17
- begin
18
- Framework::LinuxApp.ensurePackage('git', '@me', 'git')
19
- Framework::LinuxApp.ensurePackage('Podman', '@me', 'podman')
20
- rescue RuntimeError => error
21
- prompt.say(error, :color => :red)
22
- end
23
- frappe = File.expand_path(REPOS_CACHE + '/frappe_docker')
24
- if !File.exist?(frappe)
25
- mkdir(File.expand_path(REPOS_CACHE), false)
26
- self.class.exec('cd #{REPOS_CACHE} && git clone --quiet #{FRAPPE_REPO}')
27
- else
28
- self.class.exec('cd #{REPOS_CACHE}/frappe_docker && git pull --quiet')
29
- end
30
- self.class.exec('cd #{REPOS_CACHE}/frappe_docker && git checkout . --quiet')
31
-
32
- if !self.class.cmdSuccess?("podman image exists #{IMAGE_ID}")
33
- appsJSON = Base64.urlsafe_encode64(File.read(__dir__ + '/sites/apps.json').gsub('$VERSION', VERSION))
34
- self.class.exec("cd #{REPOS_CACHE}/frappe_docker && podman build --tag=#{IMAGE_ID} --build-arg APPS_JSON_BASE64=#{appsJSON} --build-arg FRAPPE_BRANCH=version-#{VERSION} --file images/custom/Containerfile .")
18
+ Linux.withConnection(local) do |localLinux|
19
+ begin
20
+ localLinux.ensurePackages(['git', 'Podman'], options) unless localLinux.hasBinaries?(['git', 'podman'], options)
21
+ rescue RuntimeError => error
22
+ prompt.say(error, :color => :red)
23
+ end
24
+ frappe = File.expand_path(REPOS_CACHE + '/frappe_docker')
25
+ if !File.exist?(frappe)
26
+ localLinux.createDirs(options, File.expand_path(REPOS_CACHE))
27
+ localLinux.exec("cd #{REPOS_CACHE} && git clone --quiet #{FRAPPE_REPO}", false, options)
28
+ else
29
+ localLinux.exec("cd #{REPOS_CACHE}/frappe_docker && git pull --quiet", false, options)
30
+ end
31
+ localLinux.exec("cd #{REPOS_CACHE}/frappe_docker && git checkout . --quiet", false, options)
32
+
33
+ if !IO::Connection.cmdSuccess?("podman image exists #{IMAGE_ID}")
34
+ appsJSON = Base64.urlsafe_encode64(File.read(__dir__ + '/sites/apps.json').gsub('$VERSION', VERSION))
35
+ # if you see error like "newuidmap 5227 0 1000 1 1 100000 65536: newuidmap: write to uid_map failed: Operation not permitted"
36
+ # then for LXC you need to set idmap like:
37
+ # LXC:
38
+ # - idmap: u 0 100000 165536
39
+ # - idmap: g 0 100000 165536
40
+ localLinux.exec("cd #{REPOS_CACHE}/frappe_docker && podman build --tag=#{IMAGE_ID} --build-arg APPS_JSON_BASE64=#{appsJSON} --build-arg FRAPPE_BRANCH=version-#{VERSION} --file images/custom/Containerfile .", false, options)
41
+ end
35
42
  end
36
43
  end
37
44
 
@@ -39,149 +46,153 @@ module ConfigLMM
39
46
  raise Framework::PluginProcessError.new('Domain field must be set!') if (!target.key?('Proxy') || target['Proxy']) && !target['Domain']
40
47
 
41
48
  target['Database'] ||= {}
42
- if target['Location'] && target['Location'] != '@me'
43
- uri = Addressable::URI.parse(target['Location'])
44
- raise Framework::PluginProcessError.new("#{id}: Unknown Protocol: #{uri.scheme}!") if uri.scheme != 'ssh'
49
+ self.withConnection(target['Location'], target) do |connection|
50
+ Linux.withConnection(connection) do |linuxConnection|
51
+
52
+ dbPassword = self.configureMariaDB(target['Database'], activeState, linuxConnection, options)
45
53
 
46
- self.class.sshStart(uri) do |ssh|
54
+ Podman.ensurePresent(linuxConnection, options)
55
+ Podman.createUser(USER, HOME_DIR, 'ERPNext', linuxConnection, options)
47
56
 
48
- activeState['Database'] = target['Database']
49
- dbPassword = self.configureMariaDB(target['Database'], activeState, ssh)
50
- distroInfo = Framework::LinuxApp.currentDistroInfo(ssh)
51
- Framework::LinuxApp.configurePodmanServiceOverSSH(USER, HOME_DIR, 'ERPNext', distroInfo, ssh)
52
- self.class.exec("su --login #{USER} --shell /bin/sh --command 'mkdir -p ~/sites ~/logs'", ssh)
57
+ cmd = IO::SSH.cmd(target['Location'])
58
+ local.exec("podman image save ConfigLM.moe/erpnext:v#{VERSION} | #{cmd} 'cat > #{HOME_DIR}/erpnext.tar'", false, options)
59
+
60
+ linuxConnection.withUserShell(USER) do |shell|
61
+ shell.createDirs(options, '~/sites', '~/logs')
62
+ Podman.loadImage(shell, 'erpnext.tar', options)
63
+ end
53
64
 
54
- cmd = self.class.cmdSSH(uri)
55
- self.class.exec("podman image save ConfigLM.moe/erpnext:v#{VERSION} | #{cmd} 'cat > #{HOME_DIR}/erpnext.tar'")
56
- self.class.exec("su --login #{USER} --shell /usr/bin/sh --command 'podman image load --input erpnext.tar'", ssh)
57
- self.class.exec("rm -f #{HOME_DIR}/erpnext.tar", ssh)
65
+ linuxConnection.exec("rm -f #{HOME_DIR}/erpnext.tar", false, options)
58
66
 
59
- path = Framework::LinuxApp::SYSTEMD_CONTAINERS_PATH.gsub('~', HOME_DIR)
60
- self.class.exec(" echo 'FRAPPE_DB_PASSWORD=#{dbPassword}' > #{path}/ERPNext.env", ssh)
61
- self.class.exec("echo 'FRAPPE_SITE_NAME_HEADER=erpnext' >> #{path}/ERPNext.env", ssh)
62
- #self.class.exec("echo 'UPSTREAM_REAL_IP_ADDRESS=127.0.0.1' >> #{path}/ERPNext.env", ssh)
63
- #self.class.exec("echo 'UPSTREAM_REAL_IP_RECURSIVE=on' >> #{path}/ERPNext.env", ssh)
64
- self.class.exec("echo 'BACKEND=10.90.50.10:8000' >> #{path}/ERPNext.env", ssh)
65
- self.class.exec("echo 'SOCKETIO=10.90.50.11:9000' >> #{path}/ERPNext.env", ssh)
67
+ path = Podman.containersPath(HOME_DIR)
68
+ linuxConnection.exec(" echo 'FRAPPE_DB_PASSWORD=#{dbPassword}' > #{path}/ERPNext.env", false, options)
69
+ linuxConnection.exec("echo 'FRAPPE_SITE_NAME_HEADER=site' >> #{path}/ERPNext.env", false, options)
70
+ #linuxConnection.exec("echo 'UPSTREAM_REAL_IP_ADDRESS=127.0.0.1' >> #{path}/ERPNext.env", false, options)
71
+ #linuxConnection.exec("echo 'UPSTREAM_REAL_IP_RECURSIVE=on' >> #{path}/ERPNext.env", false, options)
72
+ linuxConnection.exec("echo 'BACKEND=10.90.50.10:8000' >> #{path}/ERPNext.env", false, options)
73
+ linuxConnection.exec("echo 'SOCKETIO=10.90.50.11:9000' >> #{path}/ERPNext.env", false, options)
66
74
 
67
- self.class.exec("chown #{USER}:#{USER} #{path}/ERPNext.env", ssh)
68
- self.class.exec("chmod 600 #{path}/ERPNext.env", ssh)
75
+ linuxConnection.exec("chown #{USER}:#{USER} #{path}/ERPNext.env", false, options)
76
+ linuxConnection.exec("chmod 600 #{path}/ERPNext.env", false, options)
69
77
 
70
- ssh.scp.upload!(__dir__ + '/sites/apps.txt', HOME_DIR + '/sites/')
71
- ssh.scp.upload!(__dir__ + '/sites/common_site_config.json', HOME_DIR + '/sites/')
78
+ linuxConnection.upload(__dir__ + '/sites/apps.txt', HOME_DIR + '/sites/', options)
79
+ linuxConnection.upload(__dir__ + '/sites/common_site_config.json', HOME_DIR + '/sites/', options)
72
80
 
73
81
  if target['Database'] && target['Database']['HostName']
74
- self.class.exec("sed -i 's|\"10.0.2.2\"|\"#{target['Database']['HostName']}\"|' #{HOME_DIR}/sites/common_site_config.json", ssh)
82
+ linuxConnection.exec("sed -i 's|\"10.0.2.2\"|\"#{target['Database']['HostName']}\"|' #{HOME_DIR}/sites/common_site_config.json", false, options)
75
83
  end
76
84
 
77
85
  if target['Valkey']
78
- self.class.exec("sed -i 's|10.0.2.2:6379|#{target['Valkey']}|' #{HOME_DIR}/sites/common_site_config.json", ssh)
86
+ linuxConnection.exec("sed -i 's|10.0.2.2:6379|#{target['Valkey']}|' #{HOME_DIR}/sites/common_site_config.json", false, options)
79
87
  end
80
88
 
81
- valkeyPassword = ENV[id + '-VALKEY_PASSWORD'] || ENV['VALKEY_PASSWORD']
82
- if valkeyPassword
83
- self.class.exec("sed -i 's|\"use_rq_auth\": false|\"use_rq_auth\": true|' #{HOME_DIR}/sites/common_site_config.json", ssh)
84
- self.class.exec("sed -i 's|$VALKEY_PASSWORD|#{valkeyPassword}|' #{HOME_DIR}/sites/common_site_config.json", ssh)
89
+ if target['ValkeySecretId']
90
+ valkeyPassword = context.secrets.load(target['ValkeySecretId'], 'VALKEY_PASSWORD')
91
+ linuxConnection.exec("sed -i 's|\"use_rq_auth\": false|\"use_rq_auth\": true|' #{HOME_DIR}/sites/common_site_config.json", false, options)
92
+ linuxConnection.exec("sed -i 's|$VALKEY_PASSWORD|#{valkeyPassword}|' #{HOME_DIR}/sites/common_site_config.json", false, { **options, hide: true })
85
93
  end
86
94
 
87
- self.class.exec("chown -R #{USER}:#{USER} " + HOME_DIR + '/sites', ssh)
95
+ linuxConnection.exec("chown -R #{USER}:#{USER} " + HOME_DIR + '/sites', false, options)
88
96
 
89
- ssh.scp.upload!(__dir__ + '/ERPNext.network', path)
90
- ssh.scp.upload!(__dir__ + '/ERPNext.container', path)
91
- ssh.scp.upload!(__dir__ + '/ERPNext-Queue.container', path)
92
- ssh.scp.upload!(__dir__ + '/ERPNext-Scheduler.container', path)
93
- ssh.scp.upload!(__dir__ + '/ERPNext-Websocket.container', path)
94
- ssh.scp.upload!(__dir__ + '/ERPNext-Frontend.container', path)
95
- self.class.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext.container", ssh)
96
- self.class.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext-Queue.container", ssh)
97
- self.class.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext-Scheduler.container", ssh)
98
- self.class.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext-Websocket.container", ssh)
99
- self.class.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext-Frontend.container", ssh)
97
+ linuxConnection.upload(__dir__ + '/ERPNext.network', path, options)
98
+ linuxConnection.upload(__dir__ + '/ERPNext.container', path, options)
99
+ linuxConnection.upload(__dir__ + '/ERPNext-Queue.container', path, options)
100
+ linuxConnection.upload(__dir__ + '/ERPNext-Scheduler.container', path, options)
101
+ linuxConnection.upload(__dir__ + '/ERPNext-Websocket.container', path, options)
102
+ linuxConnection.upload(__dir__ + '/ERPNext-Frontend.container', path, options)
103
+ linuxConnection.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext.container", false, options)
104
+ linuxConnection.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext-Queue.container", false, options)
105
+ linuxConnection.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext-Scheduler.container", false, options)
106
+ linuxConnection.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext-Websocket.container", false, options)
107
+ linuxConnection.exec("sed -i 's|$VERSION|#{VERSION}|' #{path}/ERPNext-Frontend.container", false, options)
100
108
 
101
109
  if !target.key?('Proxy') || target['Proxy']
102
- deployNginxProxyConfig('http://127.0.0.1:18400', 'ERPNext', id, target, activeState, state, context, options, ssh)
110
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
111
+ nginxConnection.provisionProxy('http://127.0.0.1:18400', 'ERPNext', target, activeState, context, options)
112
+ end
103
113
  elsif target.key?('Proxy') && target['Proxy'] == false
104
- self.class.exec("sed -i 's|PublishPort=127.0.0.1:18400:|PublishPort=0.0.0.0:18400:|' #{path}ERPNext-Frontend.container", ssh)
105
- Framework::LinuxApp.firewallAddPort('18400/tcp', ssh)
114
+ linuxConnection.exec("sed -i 's|PublishPort=127.0.0.1:18400:|PublishPort=0.0.0.0:18400:|' #{path}/ERPNext-Frontend.container", false, options)
115
+ linuxConnection.firewallAddPort('18400/tcp', options)
106
116
  end
107
117
 
108
- self.class.exec("systemctl --user --machine=#{USER}@ daemon-reload", ssh)
109
- self.class.exec("systemctl --user --machine=#{USER}@ restart ERPNext-network", ssh)
110
- self.class.exec("systemctl --user --machine=#{USER}@ restart ERPNext", ssh)
111
-
112
- containers = JSON.parse(self.class.exec("su --login #{USER} --shell /usr/bin/sh --command 'podman ps --format json --filter name=^ERPNext$'", ssh).strip)
113
- raise 'Failed to find container!' if containers.empty?
114
-
115
- MariaDB.executeRemotely(target['Database'], ssh) do |sshDB|
116
- if !MariaDB.tableExist?(USER, 'tabUser', sshDB)
117
- adminPassword = SecureRandom.alphanumeric(20)
118
- self.class.exec("rm -rf " + HOME_DIR + '/sites/erpnext', ssh)
119
- #self.class.exec(" su --login #{USER} --shell /usr/bin/sh --command \"podman exec #{containers.first['Id']} sh -c 'bench new-site --no-setup-db --db-name erpnext --db-user erpnext --admin-password #{adminPassword} --install-app erpnext --set-default erpnext'\"", ssh)
120
- dbAdminPassword = MariaDB.createAdmin(sshDB)
121
- MariaDB.executeSQL("DROP DATABASE #{USER}", nil, sshDB)
122
- self.class.exec(" su --login #{USER} --shell /usr/bin/sh --command \" podman exec #{containers.first['Id']} sh -c ' bench new-site --db-root-username admin --db-root-password #{dbAdminPassword} --db-name erpnext --admin-password #{adminPassword} --install-app erpnext --set-default erpnext'\"", ssh)
123
- MariaDB.dropAdmin(sshDB)
124
- self.class.exec("su --login #{USER} --shell /usr/bin/sh --command \"podman exec #{containers.first['Id']} sh -c 'bench --site erpnext install-app hrms'\"", ssh)
125
- prompt.say("Administrator password: #{adminPassword}", :color => :magenta)
118
+ linuxConnection.reloadUserServices(USER, options)
119
+ linuxConnection.restartUserService(USER, 'ERPNext-network', options)
120
+ linuxConnection.restartUserService(USER, 'ERPNext', options)
121
+
122
+ MariaDB.withConnection(target['Database'], linuxConnection) do |connectionDB|
123
+ if !connectionDB.tableExist?(USER, 'tabUser', { **options, 'dry': false })
124
+ linuxConnection.withUserShell(USER) do |shellConnection|
125
+ Podman.withConnection(shellConnection, Podman.container(CONTAINER_NAME, shellConnection, options)) do |podmanConnection|
126
+ adminPassword = SecureRandom.alphanumeric(20)
127
+ dbAdminPassword = connectionDB.createAdmin(options)
128
+ linuxConnection.exec("rm -rf " + HOME_DIR + '/sites/erpnext', false, options)
129
+ #podmanConnection.exec("bench new-site --no-setup-db --db-name erpnext --db-user erpnext --admin-password #{adminPassword} --install-app erpnext --set-default site", false, { **options, hide: true })
130
+ connectionDB.dropDB(USER, options)
131
+ podmanConnection.exec("bench new-site --db-root-username admin --db-root-password #{dbAdminPassword} --db-name erpnext --admin-password #{adminPassword} --install-app erpnext --set-default site", false, { **options, hide: true })
132
+ podmanConnection.exec("bench --site site install-app hrms", false, options)
133
+ prompt.say("Administrator password: #{adminPassword}", :color => :magenta)
134
+ connectionDB.dropAdmin(options)
135
+ end
136
+ end
126
137
  end
127
138
  end
128
139
 
129
- self.class.exec("systemctl --user --machine=#{USER}@ restart ERPNext-Queue", ssh)
130
- self.class.exec("systemctl --user --machine=#{USER}@ restart ERPNext-Scheduler", ssh)
131
- self.class.exec("systemctl --user --machine=#{USER}@ restart ERPNext-Websocket", ssh)
132
- self.class.exec("systemctl --user --machine=#{USER}@ restart ERPNext-Frontend", ssh)
133
-
134
-
140
+ linuxConnection.restartUserService(USER, 'ERPNext-Queue', options)
141
+ linuxConnection.restartUserService(USER, 'ERPNext-Scheduler', options)
142
+ linuxConnection.restartUserService(USER, 'ERPNext-Websocket', options)
143
+ linuxConnection.restartUserService(USER, 'ERPNext-Frontend', options)
135
144
  end
136
- else
137
- # TODO
138
145
  end
139
146
  end
140
147
 
141
- def configureMariaDB(settings, activeState, ssh)
148
+ def configureMariaDB(settings, activeState, linuxConnection, options)
142
149
  password = SecureRandom.alphanumeric(20)
143
- MariaDB.createRemoteUserAndDB(settings, USER, password, ssh)
150
+ MariaDB.withConnection(settings, linuxConnection) do |mariaConnection|
151
+ mariaConnection.createUserAndDB(USER, password, nil, options)
152
+ end
144
153
  password
145
154
  end
146
155
 
147
156
  def cleanup(configs, state, context, options)
148
- cleanupType(:ERPNext, configs, state, context, options) do |item, id, state, context, options, ssh|
149
- if item['Proxy'].nil? || item['Proxy']
150
- self.cleanupNginxConfig('ERPNext', id, state, context, options, ssh)
151
- self.class.reload(ssh, options[:dry])
152
- end
153
- Framework::LinuxApp.firewallRemovePort('18400/tcp', ssh, options[:dry])
154
-
155
- self.class.exec("systemctl --user --machine=#{USER}@ stop ERPNext", ssh, true, options[:dry])
156
- self.class.exec("systemctl --user --machine=#{USER}@ stop ERPNext-Frontend", ssh, true, options[:dry])
157
- self.class.exec("systemctl --user --machine=#{USER}@ stop ERPNext-Websocket", ssh, true, options[:dry])
158
- self.class.exec("systemctl --user --machine=#{USER}@ stop ERPNext-Scheduler", ssh, true, options[:dry])
159
- self.class.exec("systemctl --user --machine=#{USER}@ stop ERPNext-Queue", ssh, true, options[:dry])
160
- self.class.exec("systemctl --user --machine=#{USER}@ stop ERPNext-network", ssh, true, options[:dry])
161
-
162
- path = Framework::LinuxApp::SYSTEMD_CONTAINERS_PATH.gsub('~', HOME_DIR)
163
- rm(path + 'ERPNext.network', options[:dry], ssh)
164
- rm(path + 'ERPNext.container', options[:dry], ssh)
165
- rm(path + 'ERPNext-Queue.container', options[:dry], ssh)
166
- rm(path + 'ERPNext-Scheduler.container', options[:dry], ssh)
167
- rm(path + 'ERPNext-Websocket.container', options[:dry], ssh)
168
- rm(path + 'ERPNext-Frontend.container', options[:dry], ssh)
169
-
170
- self.class.exec("podman rmi #{IMAGE_ID}", ssh, true, options[:dry])
171
-
172
- state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
173
-
174
- if options[:destroy]
175
- item['Database'] ||= {}
176
- MariaDB.executeRemotely(item['Database'], ssh) do |sshDB|
177
- MariaDB.executeSQL("DROP DATABASE #{USER}", nil, sshDB, true, options[:dry])
157
+ cleanupType(:ERPNext, configs, state, context, options) do |item, id, state, context, options, connection|
158
+ Linux.withConnection(connection) do |linuxConnection|
159
+ if item['Config']['Proxy'].nil? || item['Config']['Proxy']
160
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
161
+ nginxConnection.cleanupConfig('ERPNext', context, options)
162
+ nginxConnection.reload(options)
163
+ end
178
164
  end
179
- Framework::LinuxApp.deleteUserAndGroup(USER, ssh, options[:dry])
180
- rm(HOME_DIR, options[:dry], ssh)
181
- rm('/var/log/nginx/erpnext.access.log', options[:dry], ssh)
182
- rm('/var/log/nginx/erpnext.error.log', options[:dry], ssh)
165
+ linuxConnection.firewallRemovePort('18400/tcp', options)
166
+
167
+ linuxConnection.stopUserService(USER, 'ERPNext-Frontend', options)
168
+ linuxConnection.stopUserService(USER, 'ERPNext', options)
169
+ linuxConnection.stopUserService(USER, 'ERPNext-Websocket', options)
170
+ linuxConnection.stopUserService(USER, 'ERPNext-Scheduler', options)
171
+ linuxConnection.stopUserService(USER, 'ERPNext-Queue', options)
172
+ linuxConnection.stopUserService(USER, 'ERPNext-network', options)
173
+
174
+ path = Podman.containersPath(HOME_DIR)
175
+ linuxConnection.rm(path + 'ERPNext.network', options[:dry])
176
+ linuxConnection.rm(path + 'ERPNext.container', options[:dry])
177
+ linuxConnection.rm(path + 'ERPNext-Queue.container', options[:dry])
178
+ linuxConnection.rm(path + 'ERPNext-Scheduler.container', options[:dry])
179
+ linuxConnection.rm(path + 'ERPNext-Websocket.container', options[:dry])
180
+ linuxConnection.rm(path + 'ERPNext-Frontend.container', options[:dry])
181
+
182
+ linuxConnection.exec("podman rmi #{IMAGE_ID}", true, options)
183
+
184
+ state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
185
+
186
+ if options[:destroy]
187
+ item['Config']['Database'] ||= {}
188
+ MariaDB.withConnection(item['Config']['Database'], linuxConnection) do |connectionDB|
189
+ connectionDB.dropDB(USER, options)
190
+ end
191
+ linuxConnection.deleteUserAndGroup(USER, options)
192
+ linuxConnection.rm(HOME_DIR, options[:dry])
183
193
 
184
- state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
194
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
195
+ end
185
196
  end
186
197
  end
187
198
  end
@@ -4,6 +4,7 @@ Description=GitLab container
4
4
  After=local-fs.target firewalld.service
5
5
 
6
6
  [Container]
7
+ ContainerName=GitLab
7
8
  Image=docker.io/gitlab/gitlab-ce:latest
8
9
  PublishPort=127.0.0.1:18100:80
9
10
  PublishPort=0.0.0.0:22:22
@@ -12,7 +13,12 @@ Volume=/var/lib/gitlab/logs:/var/log/gitlab
12
13
  Volume=/var/lib/gitlab/data:/var/opt/gitlab
13
14
  Volume=/var/lib/gitlab/backups:/var/opt/gitlab/backups
14
15
  ShmSize=256M
16
+ LogDriver=journald
15
17
  AutoUpdate=registry
16
18
 
19
+ [Service]
20
+ TimeoutStartSec=20min
21
+ Restart=on-failure
22
+
17
23
  [Install]
18
24
  WantedBy=multi-user.target default.target
@@ -1,44 +1,46 @@
1
1
 
2
2
  module ConfigLMM
3
3
  module LMM
4
- class GitLab < Framework::NginxApp
4
+ class GitLab < Framework::Plugin
5
5
 
6
6
  HOME_DIR = '/var/lib/gitlab'
7
7
  IMAGE_ID = 'docker.io/gitlab/gitlab-ce:latest'
8
8
 
9
9
  def actionGitLabDeploy(id, target, activeState, context, options)
10
+ raise Framework::PluginProcessError.new('Domain field must be set!') unless target['Domain']
10
11
 
11
- if target['Location'] && target['Location'] != '@me'
12
- uri = Addressable::URI.parse(target['Location'])
13
- raise Framework::PluginProcessError.new("#{id}: Unknown Protocol: #{uri.scheme}!") if uri.scheme != 'ssh'
12
+ self.withConnection(target['Location'], target) do |connection|
13
+ Linux.withConnection(connection) do |linuxConnection|
14
14
 
15
- self.class.sshStart(uri) do |ssh|
16
- self.prepareConfig(target, ssh)
17
-
18
- distroInfo = Framework::LinuxApp.currentDistroInfo(ssh)
19
- self.class.exec("mkdir -p #{HOME_DIR}/config", ssh)
20
- self.class.exec("mkdir -p #{HOME_DIR}/logs", ssh)
21
- self.class.exec("mkdir -p #{HOME_DIR}/data", ssh)
22
- self.class.exec("mkdir -p #{HOME_DIR}/backups", ssh)
15
+ linuxConnection.createDirs(options, "#{HOME_DIR}/config", "#{HOME_DIR}/logs", "#{HOME_DIR}/data", "#{HOME_DIR}/backups")
23
16
 
24
17
  path = '/etc/containers/systemd'
25
- ssh.scp.upload!(__dir__ + '/GitLab.container', path)
18
+ linuxConnection.upload(__dir__ + '/GitLab.container', path, options)
26
19
 
27
20
  if !target.key?('Proxy') || target['Proxy']
28
- deployNginxProxyConfig('http://127.0.0.1:18100', 'GitLab', id, target, activeState, state, context, options, ssh)
21
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
22
+ nginxConnection.provisionProxy('http://127.0.0.1:18100', 'GitLab', target, activeState, context, options)
23
+ end
29
24
  elsif target.key?('Proxy') && target['Proxy'] == false
30
- self.class.exec("sed -i 's|PublishPort=127.0.0.1:18100:|PublishPort=0.0.0.0:18100:|' #{path}/GitLab.container", ssh)
31
- Framework::LinuxApp.firewallAddPort('18100/tcp', ssh)
25
+ linuxConnection.fileReplace("#{path}/GitLab.container", 'PublishPort=127.0.0.1:18100:', 'PublishPort=0.0.0.0:18100:', options)
26
+ linuxConnection.firewallAddPort('18100/tcp', options)
32
27
  end
33
28
 
34
- Framework::LinuxApp.reloadServiceManager(ssh)
35
- Framework::LinuxApp.restartService('GitLab', ssh)
29
+ linuxConnection.reloadServiceManager(options)
30
+ linuxConnection.restartService('GitLab', options)
36
31
 
37
32
  configFile = HOME_DIR + '/config/gitlab.rb'
38
- while !self.class.remoteFilePresent?(configFile, ssh)
39
- sleep(2)
33
+ if options['dry']
34
+ linuxConnection.filePresent?(configFile, options)
35
+ else
36
+ counter = 200
37
+ while !linuxConnection.filePresent?(configFile, options)
38
+ counter -= 1
39
+ raise "Timeout while waiting for #{configFile}!" if counter <= 0
40
+ sleep(2)
41
+ end
40
42
  end
41
- updateRemoteFile(ssh, configFile, options, true) do |fileLines|
43
+ linuxConnection.updateFile(configFile, options, true) do |fileLines|
42
44
  fileLines << "external_url 'https://#{target['Domain']}'\n"
43
45
  fileLines << "letsencrypt['enable'] = false\n"
44
46
  fileLines << "nginx['listen_port'] = 80\n"
@@ -48,9 +50,9 @@ module ConfigLMM
48
50
  fileLines << "mattermost_nginx['listen_port'] = 80\n"
49
51
  fileLines << "mattermost_nginx['listen_https'] = false\n"
50
52
  if target['SMTP']
51
- fileLines << "gitlab_rails['smtp_address'] = '#{target['SMTP']['HostName']}'\n"
53
+ fileLines << "gitlab_rails['smtp_address'] = '#{target['SMTP']['Host']}'\n"
52
54
  fileLines << "gitlab_rails['smtp_port'] = '#{target['SMTP']['Port']}'\n"
53
- fileLines << "gitlab_rails['smtp_user_name'] = '#{target['SMTP']['User']}'\n"
55
+ fileLines << "gitlab_rails['smtp_user_name'] = '#{target['SMTP']['Username']}'\n"
54
56
  if target['SMTP']['TLS']
55
57
  fileLines << "gitlab_rails['smtp_tls'] = true\n"
56
58
  fileLines << "gitlab_rails['smtp_openssl_verify_mode'] = 'peer'\n"
@@ -58,37 +60,29 @@ module ConfigLMM
58
60
  end
59
61
  end
60
62
 
61
- Framework::LinuxApp.restartService('GitLab', ssh)
63
+ linuxConnection.restartService('GitLab', options)
62
64
  end
63
- else
64
- # TODO
65
65
  end
66
- activeState['Status'] = State::STATUS_DEPLOYED
67
- end
68
-
69
- def prepareConfig(target, ssh)
70
- raise Framework::PluginProcessError.new('Domain field must be set!') unless target['Domain']
71
-
72
- Framework::LinuxApp.ensurePackages([NGINX_PACKAGE], ssh)
73
- self.class.prepareNginxConfig(target, ssh)
74
66
  end
75
67
 
76
68
  def cleanup(configs, state, context, options)
77
- cleanupType(:GitLab, configs, state, context, options) do |item, id, state, context, options, ssh|
78
- if item['Proxy'].nil? || item['Proxy']
79
- self.cleanupNginxConfig('GitLab', id, state, context, options, ssh)
80
- self.class.reload(ssh, options[:dry])
81
- end
82
- Framework::LinuxApp.firewallRemovePort('18100/tcp', ssh, options[:dry])
83
- Framework::LinuxApp.stopService('GitLab', ssh, options[:dry])
84
- rm('/etc/containers/systemd/GitLab.container', options[:dry], ssh)
85
- self.class.exec("podman rmi #{IMAGE_ID}", ssh, true, options[:dry])
86
- state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
87
- if options[:destroy]
88
- rm('/var/lib/gitlab', options[:dry], ssh)
89
- rm('/var/log/nginx/gitlab.access.log', options[:dry], ssh)
90
- rm('/var/log/nginx/gitlab.error.log', options[:dry], ssh)
91
- state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
69
+ cleanupType(:GitLab, configs, state, context, options) do |item, id, state, context, options, connection|
70
+ Linux.withConnection(connection) do |linuxConnection|
71
+ if item['Config']['Proxy'].nil? || item['Config']['Proxy']
72
+ Nginx.withConnection(linuxConnection) do |nginxConnection|
73
+ nginxConnection.cleanupConfig('GitLab', context, options)
74
+ nginxConnection.reload(options)
75
+ end
76
+ end
77
+ linuxConnection.firewallRemovePort('18100/tcp', options)
78
+ linuxConnection.stopService('GitLab', options)
79
+ linuxConnection.rm('/etc/containers/systemd/GitLab.container', options[:dry])
80
+ linuxConnection.exec("podman rmi #{IMAGE_ID}", true, options)
81
+ state.item(id)['Status'] = State::STATUS_DELETED unless options[:dry]
82
+ if options[:destroy]
83
+ connection.rm('/var/lib/gitlab', options[:dry])
84
+ state.item(id)['Status'] = State::STATUS_DESTROYED unless options[:dry]
85
+ end
92
86
  end
93
87
  end
94
88
  end
@@ -0,0 +1,86 @@
1
+
2
+ server {
3
+
4
+ <% if config['NginxVersion'] >= 1.25 %>
5
+ <% if !config['TLS'] %>
6
+ listen <%= config['Port'] %>;
7
+ listen [::]:<%= config['Port'] %>;
8
+ <% else %>
9
+ listen <%= config['Port'] %> ssl;
10
+ listen [::]:<%= config['Port'] %> ssl;
11
+
12
+ include config-lmm/ssl.conf;
13
+ <% end %>
14
+ http2 on;
15
+ http3 on;
16
+ quic_retry on;
17
+ add_header Alt-Svc 'h3=":443"; ma=86400';
18
+ <% else %>
19
+ <% if !config['TLS'] %>
20
+ listen <%= config['Port'] %>;
21
+ listen [::]:<%= config['Port'] %>;
22
+ <% else %>
23
+ listen <%= config['Port'] %> ssl http2;
24
+ listen [::]:<%= config['Port'] %> ssl http2;
25
+
26
+ include config-lmm/ssl.conf;
27
+ <% end %>
28
+ <% end %>
29
+
30
+ server_name <%= config['Domain'] %>;
31
+
32
+ <% if config['AuthentikDomain'].nil? %>
33
+ include config-lmm/private.conf;
34
+ <% end %>
35
+
36
+ include config-lmm/errors.conf;
37
+
38
+ <% if config['CertName'] %>
39
+ ssl_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/fullchain.pem";
40
+ ssl_certificate_key "/etc/letsencrypt/live/<%= config['CertName'] %>/privkey.pem";
41
+ ssl_trusted_certificate "/etc/letsencrypt/live/<%= config['CertName'] %>/chain.pem";
42
+ <% end %>
43
+
44
+ location / {
45
+ proxy_pass <%= config['Server'] %>;
46
+
47
+ <% if config['AuthentikDomain'] %>
48
+ error_page 401 = @authenticate;
49
+ include config-lmm/errors.conf;
50
+
51
+ auth_request /outpost.goauthentik.io/auth/nginx;
52
+
53
+ # translate headers from the outposts back to the actual upstream
54
+ auth_request_set $authentik_username $upstream_http_x_authentik_username;
55
+ auth_request_set $authentik_groups $upstream_http_x_authentik_groups;
56
+ auth_request_set $authentik_email $upstream_http_x_authentik_email;
57
+ auth_request_set $authentik_name $upstream_http_x_authentik_name;
58
+ auth_request_set $authentik_uid $upstream_http_x_authentik_uid;
59
+
60
+ proxy_set_header REMOTE_USER $authentik_username;
61
+ proxy_set_header REMOTE_GROUPS $authentik_groups;
62
+ proxy_set_header REMOTE_EMAIL $authentik_email;
63
+ proxy_set_header REMOTE_NAME $authentik_name;
64
+ proxy_set_header REMOTE_UID $authentik_uid;
65
+ <% end %>
66
+
67
+ include config-lmm/proxy.conf;
68
+ }
69
+
70
+ <% if config['AuthentikDomain'] %>
71
+ location /outpost.goauthentik.io {
72
+ proxy_pass https://<%= config['AuthentikDomain'] %>/outpost.goauthentik.io;
73
+ proxy_ssl_protocols TLSv1.2 TLSv1.3;
74
+ proxy_set_header X-Authentik-Host $host;
75
+ proxy_set_header X-Original-URL $scheme://$http_host$request_uri;
76
+ proxy_pass_request_body off;
77
+ proxy_set_header Content-Length "";
78
+ }
79
+
80
+ location @authenticate {
81
+ internal;
82
+ return 302 /outpost.goauthentik.io/start?rd=$request_uri;
83
+ }
84
+ <% end %>
85
+ }
86
+
@@ -0,0 +1,19 @@
1
+
2
+ [Unit]
3
+ Description=Homepage container
4
+ After=local-fs.target
5
+
6
+ [Container]
7
+ ContainerName=Homepage
8
+ Image=ghcr.io/gethomepage/homepage:latest
9
+ PublishPort=127.0.0.1:13400:3000
10
+ LogDriver=journald
11
+ AutoUpdate=registry
12
+ Volume=/var/lib/homepage/config:/app/config
13
+
14
+ [Service]
15
+ TimeoutStartSec=3min
16
+ Restart=on-failure
17
+
18
+ [Install]
19
+ WantedBy=multi-user.target default.target